Veille scientifique du CRIFPE No. 181, 18 octobre 2018

Veille scientifique du CRIFPE
No. 181, 18 octobre 2018

Livres

– Brun-Picard, Y. (2018). Positionner des jalons éducatifs. Paris, France : L’Harmattan. Lire…
– Châtelet, A.-M. (2018). Architectures scolaires, 1900-1939. Paris, France : Éditions du patrimoine. Lire…
– Cordonier, L. (2018). La nature du social. L’apport ignoré des sciences cognitives. Paris, France : Presses universitaires de France (PUF). Lire…
– Cuin, C.-H. & Hervouet, R. (dir.) (2018). Durkheim aujourd’hui. Paris, France : Presses universitaires de France (PUF). Lire…
– Garcia, S. (2018). Le goût de l’effort. La construction familiale des dispositions scolaires. Paris, France : Presses universitaires de France (PUF). Lire…
– Heimpel, D. & Taher, S. (dir.) (2018). Les défis du pluralisme. Montréal, Québec : Les Presses de l’Université de Montréal. Lire…

Mémoires et thèses

– Chayer, M.-H. (2018). Les trajectoires développementales du sentiment d’imposture, ses antécédents familiaux et ses retombées dans l’adaptation psycho-scolaire d’élèves du secondaire. Thèse de doctorat inédite, UQÀM, Montréal, Québec. Lire…
– Gagnon, Y. (2018). Apports et limites d’une communauté d’apprenants au développement des compétences professionnelles des étudiants d’un cours universitaire de 3D. Mémoire de maîtrise inédit, Université du Québec en Abitibi-Témiscamingue, Rouyn-Noranda, Québec. Lire…
– Isobe, Y. (2018). The effectiveness of integrated pronunciation instruction on aural, oral, and affective development. Thèse de doctorat inédite, McGill University, Montreal, Quebec. Lire…
– Prevel, S. (2018). Techniques de mise en langage et sports collectifs à l’école maternelle : parcours d’enseignantes au cours d’un processus de formation. Thèse de doctorat inédite, Université de Nantes, Nantes, France. Lire…
– Yachison, S. (2018). University students’ reactions to a peer’s cheating behavior. Thèse de doctorat inédite, McGill University, Montreal, Quebec. Lire…

Rapports et études

– Borgonovi, F., Ferrara, A. & Maghnouj, S. (2018). The gender gap in educational outcomes in Norway. Paris, France : OECD Publishing. Lire…
– Descheneaux, J., Pagé, G., Piazzesi, C., Pirotte, M. & Fédération du Québec pour le Planning des Naissances (2018). Promouvoir des programmes d’éducation à la sexualité positive, inclusive et émancipatrice. Méta-analyse qualitative intersectionnelle des besoins exprimés par les jeunes. Montréal, Québec : Service aux collectivités de L’UQÀM/Fédération du Québec pour le planning des naissances. Lire…
– KAIROS (2018). Éducation pour la réconciliation : rapport d’avancement 2018. Ottawa, Ontario : Kairos. Lire…
– Ministère de l’éducation nationale (2018). Évaluation de l’aide humaine pour les élèves en situation de handicap. Paris, France : Ministère de l’éducation nationale. Lire…
– OECD and European Union (2018). Supporting Entrepreneurship and Innovation in Higher Education in The Netherlands. Paris/EU, Bruxelles, Paris/ EU, Bruxelles : OECD Publishing. Lire…

Périodiques professionnels

– L’éducateur, (08) 2018 Lire…
– Teach – Le Prof 2018 Lire…
– Teacher, 31(1) 2018 Lire…
– University Affairs / Affaires universitaires 2018 Lire…

Revues scientifiques

– Administration et éducation, (159) 2018 Lire…
– Formation et profession, 26(3) 2018 Lire…
– History of Education Quartely, 58(4) 2018 Lire…
– Les Cahiers de l’Acedle, 15(3) 2008 Lire…
– Revue internationale d’éducation de Sèvres, (78) 2018 Lire…

Colloques en éducation

– 7e Sommet du numérique en éducation Lire…
– 6e Colloque international en éducation Lire…
– 87e Congrès de l’ACFAS Lire…
– IAC-TLEl 2019 – International Academic Conference on Teaching, Learning and E-learning. Lire…
– Politiques éducatives de l’enseignement du français : regards croisés Lire…
– ICELW 2019, the 12th annual International Conference on E-Learning in the Workplace. Lire…
– Congrès international d’Actualité de la recherche en éducation et en formation (AREF) Lire…

Les archives de la veille scientifique sont disponibles à l’adresse suivante: http://crifpe.ca/veille

Advertisements

CFP extended: Int’l Symposium on Cyber Warfare, Cyber Defense, & Cyber Security

The International Symposium on Cyber Warfare, Cyber Defense,
& Cyber Security (CSCI-ISCW)

https://americancse.org/events/csci2018/Symposiums/csci_iscw
December 13-15, 2018, Las Vegas, USA

Most Recent IEEE Xplore entry:
https://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7879541

All accepted papers will be published in the proceedings of the 2018
International Conference on Computational Science and Computational
Intelligence (CSCI: https://americancse.org/events/csci2018 )

PUBLISHER: CPS: https://www.computer.org/web/cs-cps/

INVITATION:

You are invited to submit a paper for consideration. All accepted papers
will be published by IEEE CPS (refer to ieeexplore.ieee.org for previous
years’ IEEE Xplore inclusion) in the proceedings of The 2018 International
Conference on Computational Science and Computational Intelligence (CSCI).
Extended versions of selected papers of the conference will also appear
in journals and edited research books (Springer, Elsevier, BMC, …) The
published proceedings can be accessed via IEEE CPS and other Digital
libraries.

SCOPE AND LIST OF TOPICS:

Prologue:
Cyber Warfare adds an additional dimension to warfare. Generally, it
involves the battlespace use and targeting of computers and networks in
warfare. Cyber Warfare strategies include both offensive and defensive
operations pertaining to the threat of cyberattacks, espionage, sabotage,
disruptions to infrastructures, theft of critical information, and
publishing deliberate misinformation (fake news and fabricated news)
spread via traditional media and online social media with the intend to
mislead in order to disrupt the political processes of nations. The
methods and technologies utilized in Cyber Warfare can be countered
using Cyber Defense strategies. Cyber Defense strategies involve the
heavy and targeted use of Cyber Security. Topics of interest include:

– Cyber Warfare Technologies and Strategies
– Cyber Defense Technologies and Strategies
– Authorization Infrastructures
– Autonomous Security Methods
– Novel Biometric Methods
– Cloud Security
– Forensic Technologies
– Cryptography and Formal Methods
– Trapping Technologies
– Data Protection Methods
– Security and Reverse Engineering
– Vulnerability Analysis
– Steganography and Steganalysis
– Identity Management
– Security Policies
– Legislation and Regulatory Approaches for Enhancing Security
– Safe Computing
– Identification and Prevention of Online Scams
– Mobile Protection Techniques
– Security Risk Analysis, Management and Trade-offs
– Identity, Privacy and Trust Management
– Security by Design
– Incident Response Methods
– Cybercrime and Underground Economy – Identification and Prevention
– Detection of Malicious Software
– Novel Security Tools
– Lifecycle Security Management and Identification of the Weakest Links
– Internet Security
– Network Security
– Computer Security
– Prevention of Cyber Attacks on Critical Infrastructures
– Methodologies in Reducing National Vulnerability to Cyber Attacks
– Methods for Minimizing Damage and Recovery Time from Cyber Attacks
– Prevention of Fake and Fabricated News – Media Trust Management
– Cyber Warfare and Attack Prevention during Elections
– Secure Voting Systems
– Securing Electric Power Grids + Smart Grids
– Securing Communication Systems
– Cyber Counter-intelligence
– Tools in Cyber Warfare and Cyber Defense Arsenal
– Innovative Tools for Cyber Defense Technologies
– Cyber Weapons
– Cyber Space and Security
– Threats from Social Media
– Crime and Terrorism
– IT and Countering Violent Extremism
– Global Security
– Data Analytics and Cyber Warfare
– Prevention of Bad Data Injection
– Advanced Persistent Threat (APT) and Prevention
– Data Exfiltration
– Tools for Countering Attacks by Viruses, Worms, Malware, Phishing,
SQL Injection Attack, Cross-Site Scripting, Session Hijacking,
Trojan Horses, Rootkits, Botnets, …
– Security and Social Engineering
– Tools for Countering Logic Bomb, Time Bomb, Distributed
Denial-of-Service Attack, …
– Methodologies to Address System and Data Vulnerabilities
– Novel Patching Techniques
– Next Generation Firewalls
– Intrusion Detection Techniques
– Terrorism Databases and Resources
– Terrorist Networks
– Threat Assessment
– Cyber Vandalism and Defense
– Cyber Security and Terrorism
– Counter-terrorism
– Cyber Tools and Identification of Propaganda
– Security Education and Training

INSTRUCTIONS FOR SUBMISSION OF PAPERS FOR EVALUATION:

All accepted papers will be published by IEEE CPS:
https://www.computer.org/web/cs-cps/
in the proceedings of The 2018 International Conference on
Computational Science and Computational Intelligence (CSCI’18).

Past CSCI proceedings are indexed into IEEE Xplore Digital Library
and can be accessed via:
Volume I (2014):  https://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=6822065
Volume II (2014): https://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=6822285
Volume (2015):    https://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7420813
Volume (2016):    https://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7879541
Volume (2017):    Pending (end of September 2018 according to IEEE Xplore management)

Papers should be typeset by using the general typesetting
instructions available at:
https://www.ieee.org/conferences_events/conferences/publishing/templates.html
(i.e., use of regular Times New Roman, font size of 10, single line
spacing, 2-column format). Authors of accepted papers will later
receive more specific typesetting instructions. All submissions must
be original (papers must not have been previously published or
currently being considered by others for publication). 161115

Submissions must be in either MS doc or pdf formats (6 pages for
Regular Research Papers; 4 pages for Short Papers; 2 pages for
Poster Papers – the number of pages include all figures, tables, and
references). The first page should include:

– Title of the paper.
– Name, affiliation, city, country, and email address of each author
(identify the name of the Contact Author).
– Abstract (about 100 words).
– A maximum of 5 topical keywords that would best represent the work
described in the paper (see the list of topics).
– Write the type of the submission as “Full/Regular Research Papers”,
“Short Papers”, or “Poster Papers”.
– Write “CSCI-ISCW”

The actual paper can start from the first page (space permitting).
Submissions are to be uploaded to the submission/evaluation web site
portal at: https://american-cse.org/

TYPE OF SUBMISSIONS/PAPERS:

– Full/Regular Research Papers (maximum of 6 pages):
Regular Research Papers should provide detail original research
contributions. They must report new research results that represent
a contribution to the field; sufficient details and support for
the results and conclusions should also be provided. The work
presented in regular papers are expected to be at a stage of
maturity that with some additional work can be published as journal
papers.

– Short Papers (maximum of 4 pages):
Short papers report on ongoing research projects. They should provide
overall research methodologies with some results. The work presented
in short papers are expected to be at a stage of maturity that with
some additional work can be published as regular papers.

– Poster Papers (maximum of 2 pages):
Poster papers report on ongoing research projects that are still in
their infancy (i.e., at very early stages). Such papers tend to
provide research methodologies without yet concrete results.

REVIEW PROCESS

Each paper will be peer-reviewed by 2 to 4 peers (except for papers that
are philosophical in nature – such papers would be considered for panel
discussions.) Confidentiality of submitted material will be maintained.
Papers will be evaluated on the basis of originality, impact, significance,
quality of research, quality of writing, and contribution to conference
program and diversity. Papers whose authors include one or more members
of the program committee will be evaluated using the double-blinded
review process. Authors whose papers are not selected for publication
can submit a rebuttal letter; rebuttals will be evaluated by 4 members
of the Program Committee.

DEADLINES – DATES:

October 24, 2018:     Extended Submission of Papers
(11:59pm US Eastern Time Zone)
Paper submission portal (for evaluation):
https://american-cse.org/
Note that authors who have submitted papers in response
to the earlier “Call For Papers” will receive decisions
and status reports by the original announced date.
November 1, 2018:     Notification of acceptance (+/- 2 days)
November 8, 2018:     Final papers & Author Registrations
December 13-15, 2018: The International Symposium on Cyber Warfare, Cyber
Defense, & Cyber Security (CSCI-ISCW)
https://americancse.org/events/csci2018/Symposiums/csci_iscw
CSCI-ISCW will be held in conjunction with other
affiliated research events; for more information, see
https://americancse.org/events/csci2018

DEMOGRAPHY HISTORY (based on 2014 through 2017 participation data):

In the past, about 40% of the attendees have been from outside
USA; from 58 nations. 51% of registrants have been from academia,
31% from industry; 17% from government agencies and research labs;
and 1% unknown. The conference has had participants, speakers,
authors affiliated with over 142 different universities; including
many from the top 40 ranked institutions; major IT corporations,
including, Microsoft, Accenture, Google, Apple, Facebook, Oracle,
Amazon, Samsung Electronics, IBM, GE, BAE Systems, Hitachi, NTT,
Intel Corp, BTS Software Solutions, NetApp, Algorkorea Co.,
Paris Saclay, ElderSafe Technologies Inc., METRON (France),
Fraunhofer IKTS (Germany), Wipro Technologies, VNIIEF (Russia),
BTU Cottbus-Senftenberg (Germany), Synchrone Technologies (France),
Bosch Software Systems (Germany), Tata Consultancy Services, …;
major corporations, including, Exxon Mobil, JPMorgan Chase,
Raytheon, PetroChina, GlaxoSmithKline, BCL Technologies, CERENA
Petroleum Group, Aerospace Electronic Technology (China), Max
Planck – Genetics (Germany), Tigard Research Institute, ENGIE
(France), Forschungszentrum Juelich (Germany), Secured Smart
Electric Vehicle (Korea), …; government research agencies and
national laboratories, including, NSF, NIH National Institutes of
Health, US Air Force (multiple research labs), NSA National Security
Agency, Pacific Northwest National Lab, NASA, LLNL, Lawrence
Berkeley National Lab, Los Alamos National Lab, Cold Spring Harbor
Lab, US National Cancer Institute, Swedish Defence Research Agency,
NIST US National Institute of Standards and Technology, U.S.
Geological Survey, US National Library of Medicine, US Air Force
(multiple research labs), SPAWAR Systems Center Pacific, China NSF,
Russian Academy of Sciences, US Navy, Hasso Plattner Institute, US
Army, Korea Internet & Security Agency, Suez Canal Research Center,
Okinawa Bureau (Japan), Canadian Medical Protective Association,
Osong Medical Innovation Foundation (Korea), National Institute of
Informatics (Japan), …; and three Venture Capitalists and nine
Intellectual Property attorneys.

CONTACT:

Questions and inquiries should be sent to:
Conference Secretariat: cs@american-cse.org

LearnTechLib Table of Contents: IJEL 17:4

The latest issue of International Journal on E-Learning is now available on LearnTechLib, the Learning & Technology Library.

International Journal on E-Learning Vol. 17, No. 4 (October 2018)
https://www.learntechlib.org/j/IJEL/v/17/n/4/

Table of Contents

Adoption of Information Communication Technology (ICT) in Distance Education: A Retrospective Analysis
Samuel Owusu-Ansah, University of Ghana, Legon,
Abstract: https://www.learntechlib.org/p/171259/

The Effect of Faculty Perceptions and Leadership Support on Social Media Utilization in Higher Education
Mariyam Al Obaidli, Zayed University, ; Lydia Barza, Zayed University, ; Laura Matherly, Zayed University,
Abstract: https://www.learntechlib.org/p/172882/

Exploring participatory learning through wiki: A review of literature
Liping Deng, Hong Kong Baptist University,
Abstract: https://www.learntechlib.org/p/173641/

Parallel online, on-campus, and blended programme delivery:  Challenges and strategies
Yvonne Cleary, University of Limerick, ; Darina Slattery, University of Limerick, ; Ann Marcus-Quinn, University of Limerick,
Abstract: https://www.learntechlib.org/p/174358/

Assessing the Virtual Collaborative needs of Capstone Project Teams
Charles Lesko, East Carolina University,
Abstract: https://www.learntechlib.org/p/178180/

Reexamining digital-learning readiness in higher education: Positioning digital competencies as key factors and a profile application as a readiness tool
Todd Blayone, EILAB, University of Ontario Institute of Technology,
Abstract: https://www.learntechlib.org/p/178285/

Table of contents for this issue: https://www.learntechlib.org/j/IJEL/v/17/n/4/