Managing Quality Constraints in Technology-managed Learning Content Processes

Technology-enhanced learning content processes consist of individual activities related to the creation, composition, consumption and analysis of content facilitated through services. These service processes are often enacted across different boundaries such as organisations, countries or even languages. Specifically, looking at the quality of learning content and other artefacts and the governance of respective processed through services in this context is important to control quality requirements. We assume a partially automated workflow process for the content lifecycle. We suggest a rule-based constraints monitoring of learning content processes. A learning domain ontology shall capture the key data/content types, activities and constraints, which forms the basis of a rule-based policy monitoring solution that takes content provenance data into account.

[1]  Claus Pahl,et al.  An evaluation technique for content interaction in Web-based teaching and learning environments , 2003, Proceedings 3rd IEEE International Conference on Advanced Technologies.

[2]  Claus Pahl An Evaluation of Scaffolding for Virtual Interactive Tutorials , 2002 .

[3]  Norbert Ritter,et al.  Rule-Based Coordination of Distributed Web Service Transactions , 2010, IEEE Transactions on Services Computing.

[4]  Claus Pahl,et al.  Constraint-Based Validation of Adaptive e-Learning Courseware , 2009, IEEE Transactions on Learning Technologies.

[5]  Danilo Ardagna,et al.  PAWS: A Framework for Executing Adaptive Web-Service Processes , 2007, IEEE Software.

[6]  Claus Pahl,et al.  The Generation of E-Learning Exercise Problems from Subject Ontologies , 2006, Sixth IEEE International Conference on Advanced Learning Technologies (ICALT'06).

[7]  Andrea Valente,et al.  Exploring theoretical computer science using paper toys (for kids) , 2004, IEEE International Conference on Advanced Learning Technologies, 2004. Proceedings..

[8]  Claus Pahl,et al.  A tool-mediated cognitive apprenticeship approach for a computer engineering course , 2003, Proceedings 3rd IEEE International Conference on Advanced Technologies.

[9]  Olaf Hartig Provenance Information in the Web of Data , 2009, LDOW.

[10]  Claus Pahl,et al.  Process as a Service Distributed Multi-tenant Policy-Based Process Runtime Governance , 2010, 2010 IEEE International Conference on Services Computing.

[11]  Juliana Freire,et al.  Provenance and scientific workflows: challenges and opportunities , 2008, SIGMOD Conference.

[12]  Klaus R. Dittrich,et al.  Data Provenance: A Categorization of Existing Approaches , 2007, BTW.

[13]  Rhonda S. Lunemann,et al.  Managing Enterprise Content: a Unified Content Strategy , 2003 .

[14]  Andreas Schaad,et al.  Modeling of Task-Based Authorization Constraints in BPMN , 2007, BPM.