3 research outputs found

    The Influence of Students’ Perception of Pedagogical Content Knowledge on Self-efficacy in Self-regulating Learning in Training of Future Teachers

    Get PDF
    AbstractThis study aimed to evaluate students’ perceptions of teachers’ pedagogical content knowledge (PCK). In recent years, there has been growing interest in the the identification of competencies and didactical capacities for teachers and future teachers. In this context, the PCK has been defined as the blending of content and pedagogy into an understanding of how particular topics, problems, or issues are organized, represented, and adapted to the diverse interests and abilities of learners, and presented for instruction (Shulman, 1987). PCK includes the representation of concepts, pedagogical techniques, knowledge of what makes concepts difficult or easy to learn, knowledge of students’ prior knowledge and theories of epistemology. Grossman (1990) distinguish four general areas of teacher knowledge that can be seen as the cornerstones of the emerging work on professional knowledge for teaching: general pedagogical knowledge, knowledge of context, subject matter knowledge and PCK (Syh-Jong Jang, 2010). Therefore, our approach aims to highlight the influence of students’ perception regarding their teachers’ level of PCK, the level of cooperation between teacher and student and academic specialization (human and social sciences vs. mathematical sciences) on self-efficacy in self-regulating learning

    Survivor: A Fine-Grained Intrusion Response and Recovery Approach for Commodity Operating Systems

    Get PDF
    International audienceDespite the deployment of preventive security mechanisms to protect the assets and computing platforms of users, intrusions eventually occur. We propose a novel intrusion survivability approach to withstand ongoing intrusions. Our approach relies on an orchestration of fine-grained recovery and per-service responses (e.g., privileges removal). Such an approach may put the system into a degraded mode. This degraded mode prevents attackers to reinfect the system or to achieve their goals if they managed to reinfect it. It maintains the availability of core functions while waiting forpatches to be deployed. We devised a cost-sensitive response selection process to ensure that while the service is in a degraded mode, its core functions are still operating. We built a Linux-based prototype and evaluated the effectiveness of our approach against different types of intrusions. The results show that our solution removes the effects of the intrusions, that it can select appropriate responses, and that it allows services to survive when reinfected. In terms of performance overhead, in most cases, we observed a small overhead, except in the rare case of services that write many small files asynchronously in a burst, where we observed a higher but acceptable overhead
    corecore