Satellite Workshops & Doctoral Consortium
Technology of electronic distance course development was created. This technology is useful for developing training tutorial of foreign languages. Firstly, it can be integrated into the LMS and can be used online as a web service. Secondly, it can be used as a standalone desktop tutorial. A helpful tool tip was added. The tip contains grammar information and English translation for each separated word in the tutorial. With the help of this technology there was created a distance course for Russian language as a foreign one. Additionally, on the basis of Russian National Corpus there was organized a tool for search and extraction of actual sentences with examples of word usage.
Today we could admit the growing demand for high educated experts, but modern technologies provide not only new learning opportunities, but also enormous amount Web-resources to plagiarize. In this paper we try to investigate role of intrinsic motivation on attitude towards plagiarism. Some results received during a project “A cross-cultural study of a new learning culture in Germany and in Russia” concerned intrinsic motivation of ITstudents and attitude to plagiarize are discussed. Analysis showed absence of significant differences in intrinsic motivation and significantly more tolerance of Russian students to plagiarism. We presented analysis of reasons for plagiarism and probable ways to solve with this problem in educational practice.
Today the demand is growing for information security experts capable of analyzing problems and making decisions in business situations that involve risk or uncertainty. These skills can be acquired through systematic studying of various information security incidents. In this paper we propose a framework of methods, tools and taxonomies for analysis of case studies in information security field. Our framework allows to study every situation in a formal rather than ad-hoc way, and apply a wide range of threat modeling, risk analysis and project management techniques under lifelike conditions. We illustrate it by providing a case study based on a real conflict situation between a free email service provider and a commercial bank.