Jason Howarth
Charles Sturt University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Jason Howarth.
information technology based higher education and training | 2006
Philip Roy; Irfan Altas; Jason Howarth
In this paper, we describe a remote networking lab (RNL) which we find useful for teaching networking subjects in distance education (DE) mode. The RNL enables students to work in a networking laboratory (via the Internet) as if physically located next to the equipment. We discuss the architecture and operational features of the RNL and the educational value it provides. We also describe some of the difficulties encountered when establishing this resource, and how these were overcome with the help of student feedback. The RNL has enabled distance students to gain experience using specialised equipment. The cost benefits of this approach are substantial, since a single set of networking devices can service a large cohort
International Journal of Lifelong Education | 2016
Jason Howarth; Steven D'Alessandro; Lester W. Johnson; Lesley White
Despite the widespread adoption of Massive Open Online Courses (MOOCs), no business model has emerged to make them sustainable from an institution standpoint. Using MOOCs as a marketing platform shows promise; but for this to succeed, it is necessary to understand the motivations of those who undertake them and to demonstrate how these same motivations can be better satisfied through enrolment in a fee-paying university course. We discuss the motivations for students as they progress through a MOOC and the factors that might lead to subsequent university enrolment. Our arguments are informed by MOOC statistics, the AIDA (attention, interest, desire, action) marketing model, and the literature on adult education, technology adoption, goal seeking and consumer value. We argue that most students are led to MOOC enrolment through close alignment of the course topic and subject matter with their personal goals and through the establishment of an attractive value proposition. Progress in the MOOC depends on whether this goal alignment is maintained, and whether the value assumptions of students are met or exceeded. We predict that subsequent university enrolment will most likely occur when the MOOC experience is both satisfying and representative of the university experience, and where the increased time and financial commitment demanded by formal study is offset by the greater likelihood of attaining the focal goal. For this strategy to succeed, it will be necessary for the host institution to actively work with MOOC students to create an awareness of appropriate fee-paying courses and to promote the benefits of university study. This has implications for the way institutions market their courses to MOOC students.
availability, reliability and security | 2010
Jason Howarth; Irfan Altas; Barney Dalgarno
e present an information flow control (IFC) Early attempts at preserving confidentiality in a computer system which monitors information leakage in single-threaded system relied on the use of an access control matrix to Java programs. Our implementation uses the Java Virtual identify the access rights an individual (or subject) had over Machine Tool Interface (JVMTI) and adapts the algorithms of a particular resource. But there is a problem with this Le Guernic et al. [1] for this purpose. We also offer a generic approach. The access rights that appear in the matrix only rule set for enforcing IFC. One advantage of our approach is control initial access to the resource. Once the resource is that it is dynamic, so that we are only concerned with the released from its access container there are no restrictions on security of the current execution of a program, not all possible its use. The mandatory access control (MAC) model was executions. Our system tracks flow at the level of primitive designed to prevent this type of abuse by removing the Java fields, allowing precise control over the information that ability of an arbitrary user to pass on permissions from the is monitored. Further, no modifications to the Java Virtual Machine (JVM) are needed for our system to work.
European Computing Conference (ECC) | 2009
Jason Howarth; Edward Stow
We describe a post-mortem debugger called JavaSpaces Debugger (JSD) that is able to detect a class of properties that occur in a distributed JavaSpaces program. To detect a property using JSD, the user specifies a global predicate to be evaluated. This global predicate is divided into a series of local predicates that are evaluated by each system node. During execution, an event message is sent to the debugger whenever one of these local predicates is true. The debugger arranges event messages according to logical time, and reports whether the global predicate occurred. JSD can detect both weak and strong unstable predicates, using integer, boolean, or bytecode expressions.
Journal of Marketing for Higher Education | 2017
Jason Howarth; Steven D'Alessandro; Lester W. Johnson; Lesley White
ABSTRACT In this paper we apply consumer goal theories to an educational context by examining how completion of a MOOC (Massive Open Online Course) may motivate enrolment in a university course. We contend that individuals who finish a MOOC are more likely to establish a new goal intention for university than those who do not finish. This new goal intention is likely to be prompted by the individual’s satisfaction with their MOOC experience as well as a sense of discontent in not having fulfilled their broader educational goals. For those who do set a new goal for university study, we contend that the institute hosting the MOOC is likely to form part of the consideration set used by individuals to narrow down their choice of tertiary provider. Moreover, we argue that this same host institute is likely to be chosen from the consideration set where the MOOC experience is a satisfying one and where a strong link can be established between the pedagogical and delivery approaches used in both the MOOC and university settings. This research has implications for how tertiary institutes create and use MOOCs, and offers insights into how providers can more effectively market higher education courses to those progressing through a MOOC pathway.
international conference on communications | 2006
Tanja Lang; Jason Howarth; Irfan Altas
In this working paper, we propose a location determination system, uni-access, which provides location information while still respecting the location privacy of the user. The uni-access system takes into account legislation, corporate policies and user input to define a set of rules for location privacy. In addition to location determination services, uni-access incorporates an intrusion detection system (IDS) for security purposes. The uni-access IDS uses location information to improve its detection capabilities.
Australian Partnership for Advanced Computing (APAC ) Conference and Exhibition | 2007
Peter White; Irfan Altas; Jason Howarth; John Weckert
The Turkish Online Journal of Distance Education | 2004
Jason Howarth; Johann Messing; Irfan Altas
international conference on information technology and applications | 2007
Jason Howarth; David Tien; Steven Woodhouse
International Association for Developement of the Information Society (IADIS) Conference | 2007
Deborah Buckley; Irfan Altas; Jason Howarth