Ana səhifə

Design and Reusability of Learning Objects in an Academic Context: a new Economy of Education?


Yüklə 128.5 Kb.
səhifə7/7
tarix18.07.2016
ölçüsü128.5 Kb.
1   2   3   4   5   6   7

Permission Based

This principle states in effect that users of the system own their own personal data. The user’s agent operates on behalf of the user, and releases information or money only with the agent’s explicit consent. The purpose of this principle is to engender trust in the system and to ensure privacy when dealing with multiple agencies.


5. The Distributed Network

A Network Rather Than A (Single) System

What we are proposing is a set of inter-related applications distributed over the internet and communicating with each other. This seems to me to be the single major factor distinguishing our approach from other approaches as defined in IEEE/P1484.1/D9 of IMS Repositories. This is accomplished in three major steps:




  1. Separating the functionality of an LCMS / LMS architecture into distinct, stand-alone components that communicate over TCP/IP




  1. Allowing (encouraging) the development of multiple instances of these components




  1. Providing indexing or registries of these instances

Thus, for example, instead of envisioning a single metadata repository that indexes all learning objects (or, as we see within common practice, all learning objects within a specific domain, such as a geographic region or company), we envision multiple learning object repositories that may or may not focus on a particular domain.


In other words, the model we are envisioning resembles much more the model employed by the world wide web than it does the model envisioned by a content management system. In my opinion, this is a key turning point.

Core Components of the Network





  1. Learning Object Repository - hosted by vendors on vendor sites, provides vendor metadata and learning object servers




  1. Metadata Repository - hosted elsewhere, harvests metadata from vendors and amalgamates, allows queries from eLearning systems. Norm Friesen has written a useful backgrounder on harvesting: http://www.cancore.ca/harvesting.doc




  1. eLearning system - queries metadata repository, user selects resource, retrieves resource from learning object repository, displays

This core functionality is relatively simple and is already established in other domains, for example, in news syndication. Consider the following combination of components:




    1. News Object Repository - Original articles are posted on news site and RSS metadata is available for harvesting




    1. Metadata Aggregator - such as NewsIsFree collects metadata, indexes (maybe) and provides (topic-specific, sometimes) search




    1. News Viewer - such as Amphetadesk - accesses the aggregator for an index, then retrieves the selected item from the news repository



Contrast to Library Model

Most other implementations, including IEEE/P1484.1/D9, employ a model whereby learning materials are akin to books in a library (or, in some other way, 'content' to be managed). Consequently, they envision that implementations of the architecture will access collections of this content, typically (but not always) stored on location. The process they envision is therefore:




  1. Acquire the content




  1. Index or classify the content




  1. Deploy the content

In a network model, there is no need to manage collections of content. So instead of working with learning objects specifically (as defined by

IEEE/P1484.12.1 or pick your specification) the network works more generally with what may be called learning resources, or even more precisely, learning opportunities. This includes, but is not limited to:


  1. Learning objects, properly so-called




  1. Other academic works, such as journal articles




  1. In-person classes or seminars




  1. Instructors, coaches and tutors

While it is permissible to search for a specific category of learning opportunities, such as a learning object, the design does not require that all resource fit that particular category. This is enabled by tolerating the use of different schemas in learning object repositories.


Learning opportunities in this model should therefore more accurately be thought of as akin to 'processes' rather than 'things'. The desired result of, say, a learning object search system is not so much to acquire a resource as it is to locate it and, when appropriate, display it or run it.
Part or all of the learning resource may or may not be cached on location, but this is left to the discretion of the particular instance and is not a defining feature of the system.

Component Registry Services

In the network proposed, there are multiple instances of each component. Of course there are multiple learning objects. But there is in addition multiple learning object repositories (typically, one for each learning object vendor) and multiple metadata repositories.


In order to provide access to these resources, it is necessary to provide indexing or registry services. The purpose of these services is multifold:


  1. To provide a list of the available instances




  1. To establish and verify ownership of these resources, for the purpose of maintaining or updating information about them in the system

For example, consider the list of learning object repositories. A vendor wishing to offer learning objects through the network will need to declare that the repository exists and where to find the list of available resources. By registering the repository, the vendor is able to make its presence known and to ensure that important information – such as its URI – will not be changed by third parties.


The registry system envisioned is consistent with existing approaches to the provision of services on the internet. It is anticipated that the repository indexing service would resemble the UDDI and WSDL protocols.
Norm Friesen has written a useful discussion regarding the registration and indexing of resources. http://www.cancore.ca/Resourceids.doc

Functionality of the System versus Functionality of the Learning Resource

Many models of learning object architecture presuppose that the system being deployed contains a great deal of functionality. For example, IEEE/P1484.1/D9 includes as two (of the four) essential components the ‘coach’ function and the ‘evaluation’ function. A wide variety of other functions are embedded in LMS and LCMS design, for example, class registration, discussion and chat.


The weakness of this approach is that the purchaser of an LMS or LCMS is restricted to only one choice in the delivery of these functions, that is for example, restricted to only one discussion board or one class registration system. This makes LMS and LCMS systems needlessly complex, and needlessly restricts the range of options available to the purchaser. Thus, such functionality is envisioned in this model to reside in the learning opportunity, thus greatly increasing the range of choice available to developers.
This functionality of the system is therefore defined in the learning opportunity, rather than in the system itself. This is the most immediate and obvious different between this approach and IEEE/P1484.1/D9. In the IEEE draft standard, elements such as 'coach' and 'evaluation' are defined as components of the architecture. On this model, they are resources that may be deployed within the architecture.

Secondary Components

In addition to the three core elements, a number of secondary elements are also required in order to meet a number of the objectives of learners, learning institutions and content providers. As in the case of the core components, there may be multiple instances of any secondary component. This allows users of any core component to exercise choice in the selection of secondary components. These components include:




  1. A system of third-party metadata




  1. A digital rights system




  1. A learner (user) information system




  1. A reporting or tracking system

What is significantly different about this model and models envisioned in IEEE/P1484.1/D9 and IMS Repositories is that:




  1. The components are optional: you develop (or buy) them and use them only if you need them




  1. For any given component, you may select one of many instances




  1. These components may reside outside your own system

As in the case of the primary components, a registry service is developed for each type of secondary component.



Third Party Metadata

Third-party metadata is a cruical component of the network that is not really envisioned by IEEE-LOM or IMS (though to be fair they do permit reference to third party ontologies, as in IEEE/P1484.12.1 9.21 and 9.22. See http://www2002.org/CDROM/alternate/744/index.html for some description and uses of third party metadata.


The core principle of third party metadata is that there may be multiple metadata files, perhaps even located on different hosts, written by different authors (some for-profit), that describe a single learning resource.
For example, a single learning resource may have associated with it:


  1. A description, in IEEE/P1484.12.1, created by the author or owner of the learning object




  1. An indication of certification, using a specialized metadata schema, provided by a professional association




  1. Metadata containing a review (or a reference to a review), provided by a public service agency




  1. Digital rights information, authored by and hosted by a DRM handling company




  1. Classification of the object, authored and hosted by a library authority



Digital Rights Management

A principle objective of the digital rights system (DRM) enabled by the network is to create a system where multiple suppliers work through a common interface. To enable this, it is important to provide a choice of business models. A business model consists of two essential components:




  1. The definition of the business rules, and




  1. The application of the rules in software functionality

In traditional DRM, the definition of business rules is represented in specific DRM metadata. Two major approaches exist, ODRL and XrML, though numerous sub-variants exist. These approaches are XML schemas defining the allowable documentation of specific rights for a specific (group of) learning object(s). See http://xml.coverpages.org/drm.html


In order to establish DRM for a given learning resource, the metadata associated with this resource identifies the metadata, usually managed by a third party (see below), definiting the DRM associated with the learning resource.

Beyond Digital Rights Management: Employee/Consumer Rules

Most examinations of DRM deal in general with the application of business rules to learning object transactions. For the most part, these are rules established by the content owner or vendor. But it is important to look beyond the traditional formulations whereby all the rules are established by the vendor. Classes of employee/consumer rules will also be identified and handled by different parts of the system.


An approach similar to DRM is taken for the definition of employee/consumer rules. Using a (n as yet undefined) XML schema, the various employee/conusmer rules, such as the ones you've listed above, are defined in an XML file owned by the employee/consumer. This file may be maintained by a personal information service or buyer's agent (several such files may exist to handle different aspects of employee/consumer rules - for example, pricing, personal information, financial information and presentation will likely be located in different files, handled by different systems).

These rules are applied by various subsystems: the metadata repository, the learning object retrieval system, and the viewer itself.



Employer Rules

Employer rules are established using the same system as employee/consumer rules. By ‘employer’ in this document we could also include entities such as school boards, colleges or universities, professional associations, and indeed, any third party given permission by the employee or consumer to apply rules.


During processing, if employer rules apply (a consumer/employee uses the same system for job training as, say, hobby learning), then the employer rules are merged with the consumer/employee rules. They are then applied in the subsystem as appropriate.

Learner / User Information System

An additional secondary component is a set of learner information systems. The concept is similar to the ‘resume’ or ‘portfolio’ system described by Chuck Hamilton of IBM at NAWeb. Details to follow.

Notes
[1] This paragraph was significantly informed by Norm Friesen and Toni Roberts.

References


Chen, Si-Shing. 2001. NBDL (National Biology Digital Library)

. Slide Presentation. http://www.cni.org/tfms/2001a.spring/handout/Progress-SChen2001Stf-NSF.ppt


Dlnet. 2002. Guidelines for the Reviewer. National Science Digital Library. http://www.dlnet.vt.edu/ReviewerGuidelines.jsp
DRM Watch. 2002. XrML 2.0 Review. Giant Steps Media Technology Strategies. http://www.giantstepsmts.com/DRM%20Watch/xrml20.htm

GPL. 1991. The GNU General Public License. Version 2. http://www.opensource.org/licenses/gpl-license.php


Ellis, Ryann K. 2001. LCMS Roundup. Learning Circuits. http://www.learningcircuits.org/2001/aug2001/ttools.html
Friesen, Norm. 2002. Survey of Learning Object Metadata Implementations. CanCore. http://www.cancore.ca/lomsurvey.html
Heery, Rachel and Patel, Manjula. 2000. Application profiles: mixing and matching metadata schemas. Ariadne. 25. http://www.ariadne.ac.uk/issue25/app-profiles/
Hillesund, Terje. 2001. Will E-Books Change the World? First Monday, Volume 6, Number 10. http://firstmonday.org/issues/issue6_10/hillesund/index.html
Institute of Electrical and Electronics Engineers, Inc. 2002. Draft Standard for Learning Object Metadata (IEEE P1484.12/D6.1). http://ltsc.ieee.org/doc/wg12/LOM_WD6-1_without_tracking.htm
Jack, Hugh. 2001. DG: 18.2.1 Proprietary “Standard” Formats. Design Engineer on a Disk. http://claymore.engineer.gvsu.edu/eod/design/design-167.html
Kraan, Wilbert. 2002. Objective Re-Usable Competency. CETIS. http://www.cetis.ac.uk/content/20021101143354
Lyon, Gordon. 2001. The Internet Marketplace and Digital Rights Management. http://www.itl.nist.gov/div895/docs/GLyonDRMWhitepaper.pdf
Merlot. 2002. Merlot Peer Review. http://www.merlot.org/home/PeerReview.po
Microsoft Corporation. 2002. Microsoft Shared Source Philosophy: Frequently Asked Questions. http://www.microsoft.com/licensing/sharedsource/ssfaq.asp
Miller, Paul. 1999. Z39.50 for All. Ariadne. 21. http://www.ariadne.ac.uk/issue21/z3950/intro.html
National Communications System. 1996. Telecommunications: Glossary of Telecommunications Terms. http://www.its.bldrdoc.gov/fs-1037/fs-1037c.htm
Nichani, Maish. 2001. LCMS = LMS + CMS (RLOs). ELearningPost. http://www.elearningpost.com/features/archives/001022.asp
Oregon State University. 2002. Baccalaureate Core Course Equivalencies. http://www.orst.edu/Dept/admindb/arttable/scr1140_arttab.htm

Saba Software. 2002. Saba Learning, Enterprise Edition. http://www.saba.com/english/products/pdf/Saba_Learning_Ent.pdf


Place, Emma. 2000. Quality selection: ensuring the quality of your collection. DESIRE information gateways handbook. http://www.desire.org/handbook/2-1.html
Rehak, Dan. 2002. SCORM is not for everyone. CETIS. http://www.cetis.ac.uk/content/20021002000737/index_html
Shelangoske, Susan. 2002. Beginning WebCT Instruction: Lesson 4, Quizzes and Grading. Cleveland State University. http://www.csuohio.edu/a_and_s/webct/pdf/lesson4pt1.pdf
Welsch, Edward. 2002. SCORM: Clarity or Calamity. Online Learning Magazine. http://www.onlinelearningmag.com/onlinelearning/magazine/article_display.jsp?vnu_content_id=1526769
XanEdu. 2002. Press Releases. http://www.xanedu.com/company/pressroom/press.shtml
You, Jee Young. 2001. Click and Learn: Fathom. Silicon Alley Daily. http://www.siliconalleydaily.com/issues/sar08132001.html
1   2   3   4   5   6   7


Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©atelim.com 2016
rəhbərliyinə müraciət