Secret Standards Business?

نویسنده

  • Jon Mason
چکیده

Engagement by the higher education sector in standardisation of the technology that supports e-learning is hardly a mainstream activity. For many stakeholders, processes associated with standardisation are both perceived as opaque and tedious. Reasons for a lack of engagement are canvassed; among them, the perception that ‘secret standards business’ is conducted only by those individuals and communities with certain kind of technical understanding or calling. However, it is argued that standardisation of information technologies relevant to learning, education, and training would both be better served and better informed from wider stakeholder buy-in. Why standards are important and how they are being developed is discussed. It is further argued that standardisation of technical components enabling e-learning is no different to standardisation of technical components that make aircraft fly. Key standardisation groups relevant to higher education are profiled as is the standards lifecycle and a number of models associated with it.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Developing a Mystery Shopping Measure to Operate a Sustainable Restaurant Business: The Power of Integrating with Corporate Executive Members’ Feedback

Mystery shopping has been used to objectively measure whether employees follow the visions of a company’s quality service standards. It then creates a feedback loop that allows companies to train their employees to consistently deliver quality services. The main purposes of this project are aimed at examining (1) the overall benefits of mystery shopper projects in the hospitality business throu...

متن کامل

An efficient threshold verifiable multi-secret sharing

In 2004, C.-C. Yang, T.-Y. Chang and M.-S. Hwang proposed an efficient multi-secret sharing scheme based on two-variable one-way function and Shamir's secret sharing. In order to add the verifiable property into previous scheme, J. Shao and Z. Cao proposed an efficient (t,n) verifiable multi-secret sharing based on YCH [C.-C. Yang, T.-Y. Chang, M.-S. Hwang, A (t,n) multi-secret sharing scheme, ...

متن کامل

An Investigation on Image Secret Sharing

Numerous multimedia applications and communications are rapidly growing through the Internet. Because most of these multimedia communications are confidential and cannot be known by unauthorized users, secret image sharing has become a key technology for digital images in secured storage and confidential transmission. The ultimate objectives of secret sharing include transparency, authority (re...

متن کامل

IFRS or IFRS-Based Domestic Standards: Implications for China’s Future Accounting System

People’s Republic of China has a long history of accounting and accounting reforms. This study focuses on “whether China should continue its IFRS-based domestic accounting standards or full convergence with the IFRS is more appropriate”? Both quantitative and qualitative approaches are applied to answer the research question of this work. Binary choice model has been used in the statistical ana...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003