Principles of App Selection and Training After Brain Injury

2014 ◽  
Vol 23 (3) ◽  
pp. 140-147 ◽  
Author(s):  
Michelle R. Wild

The growing popularity of using mainstream smart devices as assistive technology for cognition (ATC) is having a significant impact in the daily lives of individuals living with brain injury. With more than 60 percent of the mobile market using smart devices, it is becoming more common for individuals to have their own smart devices. However, the devices are often underutilized and are not being used in a way conducive to benefiting individuals postinjury. Although brain injury professionals play a significant role in the selection and training of devices and apps, the sheer number of apps and the time required to select and train others to use them present major obstacles to the broad adoption of these devices in the therapeutic environment. The purpose of this article is to provide a framework for selecting and training the use of apps that helps clients with cognitive impairments function more optimally in their day-to-day lives. We present 4 questions to help identify training and instructional needs of clients. In addition, we discuss training templates and learning tools that can be used by therapists to facilitate app training within clinical sessions as well as by clients and/or caregivers outside the clinical environment.

Author(s):  
Laurie Ehlhardt Powell ◽  
Tracey Wallace ◽  
Michelle ranae Wild

Research shows that if clinicians are to deliver effective, evidence-based assistive technology for cognition (ATC) services to clients with acquired brain injury (ABI), they first need opportunities to gain knowledge and experience with ATC assessment and training practices (O'Neil-Pirozzi, Kendrick, Goldstein, & Glenn, 2004). This article describes three examples of train the trainer materials and programs to address this need: (a) a toolkit for trainers to learn more about assessing and training ATC; (b) a comprehensive, trans-disciplinary program for training staff to provide ATC services in a metropolitan area; and (c) an overview of an on-site/online training package for rehabilitation professionals working with individuals with ABI in remote locations.


Sensors ◽  
2021 ◽  
Vol 21 (8) ◽  
pp. 2859
Author(s):  
Seong-Yun Jeon ◽  
Mun-Kyu Lee

With the recent advances in mobile technologies, biometric verification is being adopted in many smart devices as a means for authenticating their owners. As biometric data leakage may cause stringent privacy issues, many proposals have been offered to guarantee the security of stored biometric data, i.e., biometric template. One of the most promising solutions is the use of a remote server that stores the template in an encrypted form and performs a biometric comparison on the ciphertext domain, using recently proposed functional encryption (FE) techniques. However, the drawback of this approach is that considerable computation is required for the inner-pairing product operation used for the decryption procedure of the underlying FE, which is performed in the authentication phase. In this paper, we propose an enhanced method to accelerate the inner-pairing product computation and apply it to expedite the decryption operation of FE and for faster remote biometric verification. The following two important observations are the basis for our improvement—one of the two arguments for the decryption operation does not frequently change over authentication sessions, and we only need to evaluate the product of multiple pairings, rather than individual pairings. From the results of our experiments, the proposed method reduces the time required to compute an inner-pairing product by 30.7%, compared to the previous best method. With this improvement, the time required for biometric verification is expected to decrease by up to 10.0%, compared to a naive method.


Author(s):  
Nathan Boardman ◽  
Jack Munro-Berry ◽  
Judy McKimm

Research carried out in 2016 by the authors investigated the challenges that doctors in training experience around leadership and followership in the NHS. The study explored contemporary healthcare leadership culture and the role of followership from the perspective of early career doctors. It found that the leadership and followership challenges for these doctors in training were associated with issues of social and professional identity, communication, the medical hierarchy, and relationships with senior colleagues (support and trust). These challenges were exacerbated by the busy and turbulent clinical environment in which they worked. To cope with various clinical situations and forms of leadership, doctors in training engage in a range of different followership behaviours and strategies. The study raised implications for medical education and training and suggested that followership should be included as part of formal training in communication and team working skills. The importance of both leadership and followership in the delivery of safe and effective patient care has been brought sharply into focus by the COVID-19 pandemic. This article revisits these challenges in light of the pandemic and its impact on the experiences of doctors in training.


2020 ◽  
Vol 14 (1) ◽  
Author(s):  
Ika Berdiati

The supervisor’s role is quite essential to support developing teacher competencies, and also to improve their professionalism. In this article, the author formulates the problem: what is the role of supervisors in continuing professionalism development for teachers?. The purpose of this article is to describe strategies executed by supervisor on carrying out the academic task related to improving teacher’s pedagogical and professional competence. The results appertained to their role of improving teacher’s competence both pedagogically and professionally can be accomplished through academic supervision competencies. Other observable strategies are developing scientific publication, creating learning tools or teaching aids (innovative works); modifying practicum and self-development tools came under education and training, and KKG.


Author(s):  
Alexander Sergeevich Chernikov ◽  
Ravil Shamilievich Zagidullin ◽  
Alexander Alexandrovich Chibisov

The free platform Moodle was integrated with protected University Administrative Information System Electronic University (UAIS EU) of Bauman Moscow State Technical University, which serves to support the administrative work for control of educational process. The following main problems were solved: creation of unified data representation in the two systems; creation of students' and training courses' databases in Moodle based on data from UAIS EU. As result unique software was developed, new quality of service was obtained, namely different sides of University activity such as teaching, learning, and administrative control of educational process were automated and joined together; the time required for information processing and administrative decision-making was reduced; the number of errors in the systems due to the influence of a human factor was reduced. The results obtained can be used to simplify the work of teachers and enhance the performance and operational efficiency of the administrative system at any university.


2018 ◽  
Vol 10 (1) ◽  
pp. 70-77 ◽  
Author(s):  
AnnaMarie Connolly ◽  
Alice Goepfert ◽  
Anita Blanchard ◽  
Elizabeth Buys ◽  
Nicole Donnellan ◽  
...  

ABSTRACT Background  Few tools currently exist for effective, accessible delivery of real-time, workplace feedback in the clinical setting. Objective  We developed and implemented a real-time, web-based tool for performance-based feedback in the clinical environment. Methods  The tool (myTIPreport) was designed for performance-based feedback to learners on the Accreditation Council for Graduate Medical Education (ACGME) Milestones and procedural skills. “TIP” stands for “Training for Independent Practice.” We implemented myTIPreport in obstetrics and gynecology (Ob-Gyn) and female pelvic medicine and reconstructive surgery (FPMRS) programs between November 2014 and May 2015. Residents, fellows, teachers, and program directors completed preimplementation and postimplementation surveys on their perceptions of feedback. Results  Preimplementation surveys were completed by 656 participants of a total of 980 learners and teachers in 19 programs (12 Ob-Gyn and 7 FPMRS). This represented 72% (273 of 378) of learners and 64% (383 of 602) of teachers. Seventy percent of participants (381 of 546) reported having their own individual processes for real-time feedback; the majority (79%, 340 of 430) described these processes as informal discussions. Over 6 months, one-third of teachers and two-thirds of learners used the myTIPreport tool a total of 4311 times. Milestone feedback was recorded 944 times, and procedural feedback was recorded 3367 times. Feedback addressed all ACGME Milestones and procedures programmed into myTIPreport. Most program directors reported that tool implementation was successful. Conclusions  The majority of learners successfully received workplace feedback using myTIPreport. This web-based tool, incorporating procedures and ACGME Milestones, may be an important transition from other feedback formats.


2020 ◽  
Vol 1 (2) ◽  
pp. 1-12
Author(s):  
Ritu Chauhan ◽  
Gatha Tanwar

The internet of things has brought in innovations in the daily lives of users. The enthusiasm and openness of consumers have fuelled the manufacturers to dish out new devices with more features and better aesthetics. In an attempt to keep up with the competition, the manufacturers are not paying enough attention to cyber security of these smart devices. The gravity of security vulnerabilities is further aggravated due to their connected nature. As a result, a compromised device would not only stop providing the intended service but could also act as a host for malware introduced by an attacker. This study has focused on 10 manufacturers, namely Fitbit, D-Link, Edimax, Ednet, Homematic, Smarter, Osram, Belkin Wemo, Philips Hue, and Withings. The authors studied the security issues which have been raised in the past and the communication protocols used by devices made by these brands. It was found that while security vulnerabilities could be introduced due to lack of attention to details while designing an IoT device, they could also get introduced by the protocol stack and inadequate system configuration. Researchers have iterated that protocols like TCP, UDP, and mDNS have inherent security shortcomings and manufacturers need to be mindful of the fact. Furthermore, if protocols like EAPOL or Zigbee have been used, then the device developers need to be aware of safeguarding the keys and other authentication mechanisms. The authors also analysed the packets captured during setup of 23 devices by the above-mentioned manufacturers. The analysis gave insight into the underlying protocol stack preferred by the manufacturers. In addition, they also used count vectorizer to tokenize the protocols used during device setup and use them to model a multinomial classifier to identify the manufacturers. The intent of this experiment was to determine if a manufacturer could be identified based on the tokenized protocols. The modelled classifier could then be used to drive an algorithm to checklist against possible security vulnerabilities, which are characteristic of the protocols and the manufacturer history. Such an automated system will be instrumental in regular diagnostics of a smart system. The authors then wrapped up this report by suggesting some measures a user can take to protect their local networks and connected devices.


2020 ◽  
Vol 12 (22) ◽  
pp. 9584
Author(s):  
Angel Jaramillo-Alcázar ◽  
Paz Cortez-Silva ◽  
Marco Galarza-Castillo ◽  
Sergio Luján-Mora

Video games that are used as teaching tools are called serious games. However, there is an important factor that is not usually considered in the design of serious games— the inclusion of people with disabilities. Inclusion can be reached only if accessibility takes on an important role for all. On the other hand, new trends have resulted in different smart devices being used in classrooms. These devices also allow for applications, such as serious games, to be used to support people’s learning process. Despite this, these applications are generally not multi-platform and do not usually consider accessibility features for people with disabilities. This paper proposes a method to develop accessible online serious games that consider people with disabilities as potential users. The method is applied in the case study of an online serious game that teaches about the architecture of a computer in a fun and entertaining way. The method also presents and describes several guidelines to improve online serious game accessibility for people with disabilities. Finally, tests are conducted with some users to gather information about the online serious game and the accessibility features included. This study has important implications for the development of learning tools that consider people with disabilities.


2018 ◽  
Vol 28 (11) ◽  
pp. 1708-1718 ◽  
Author(s):  
Amanda St Ivany ◽  
Linda Bullock ◽  
Donna Schminkey ◽  
Kristen Wells ◽  
Phyllis Sharps ◽  
...  

There is increasing evidence that women are receiving a traumatic brain injury (TBI) during episodes of intimate partner violence (IPV), but little qualitative research exists around how surviving this experience impacts the lives of women. Primary and secondary data ( N = 19) were used with a constructivist grounded theory approach to explore the lives of women aged 18 to 44 years, who were living with a TBI from IPV. Women described multiple aspects of living in fear that shaped their daily lives and ability to seek help and access resources. The central process of prioritizing safety emerged, with salient dimensions of maintaining a present orientation, exhibiting hyperprotection of children, invoking isolation as protection, and calculating risk of death. These findings add to the growing body of knowledge that women living with IPV are at high risk for receiving a TBI and are therefore a subgroup in need of more prevention and treatment resources.


Sign in / Sign up

Export Citation Format

Share Document