ISO/IEC AWI 8808 Information Technology for Learning, Education and Training

ISO/IEC AWI 8808 is a standard under development that focuses on Information Technology for Learning, Education, and Training. The standard aims to provide guidance and specifications for the application of information technology (IT) to support learning, education, and training activities. While the specific details of this standard are still being finalized, it generally seeks to improve the integration of IT systems in educational settings, ensuring better access, management, and delivery of educational content.

Key Areas Likely Covered by ISO/IEC AWI 8808:

  1. Digital Learning Platforms: Guidelines for the design, development, and implementation of e-learning platforms.
  2. Interoperability: Ensuring that different IT systems used in learning environments can work together effectively.
  3. Data Security and Privacy: Protecting learner data and ensuring compliance with privacy regulations.
  4. Assessment and Evaluation Tools: Specifications for technology used in testing and evaluating student performance.
  5. Accessibility: Ensuring that learning technology is accessible to all users, including those with disabilities.

This standard could play a critical role in shaping how educational institutions and training organizations implement technology in the future.

What is required ISO/IEC AWI 8808 Information Technology for Learning, Education and Training

As ISO/IEC AWI 8808 is still under development, specific detailed requirements have not been fully published yet. However, based on the general focus of Information Technology for Learning, Education, and Training, here are some likely requirements that could be involved once the standard is finalized:

Likely Requirements for ISO/IEC AWI 8808:

  1. Technological Frameworks for Education:
    • Implementation of standardized frameworks for managing, delivering, and tracking learning experiences through digital platforms.
    • Requirements for system architecture that supports e-learning, virtual classrooms, and blended learning environments.
  2. Interoperability of Learning Systems:
    • Specifications for ensuring different learning management systems (LMS), education technologies, and tools work seamlessly together.
    • Standardized protocols for content exchange, data sharing, and communication between various educational platforms.
  3. Data Privacy and Security:
    • Guidelines to ensure student and user data is protected in compliance with privacy regulations like GDPR or local data protection laws.
    • Encryption, secure storage, and access control measures for educational data.
  4. Content Accessibility:
    • Requirements to make learning platforms and tools accessible to students with disabilities, ensuring compliance with accessibility standards like WCAG (Web Content Accessibility Guidelines).
    • User interface and content design considerations for inclusive education.
  5. Learning Analytics:
    • Frameworks for collecting and analyzing data on learning progress, user engagement, and performance.
    • Specifications for integrating learning analytics into educational technologies to provide personalized learning paths.
  6. Quality Assurance and Assessment:
    • Standards for the deployment of IT systems used in assessments, testing environments, and evaluation of student outcomes.
    • Requirements for ensuring integrity, fairness, and reliability of online assessments.
  7. Content Standardization:
    • Specifications for digital educational content formats to ensure reusability, consistency, and easy adaptation across platforms.
    • Metadata standards to make learning resources easily searchable and organized.
  8. Scalability and Performance:
    • Performance benchmarks and requirements for scalability to ensure the technology can handle varying numbers of users, particularly in large-scale deployments for institutions.
    • Reliability metrics to ensure continuous access to learning resources.
  9. Professional Development and Training:
    • Requirements for the development of digital tools aimed at training educators and administrators in using educational technology efficiently.
    • Support for lifelong learning and professional certification programs through digital platforms.
  10. Sustainability and Future-Proofing:
  • Guidelines for building IT systems that are adaptable to future educational needs, including sustainability considerations in the design and deployment of educational technologies.

Once finalized, ISO/IEC AWI 8808 will likely formalize many of these requirements to support the consistent, secure, and effective use of information technology in education and training environments globally.

Who is required ISO/IEC AWI 8808 Information Technology for Learning, Education and Training

ISO/IEC AWI 8808, focusing on Information Technology for Learning, Education, and Training, would be relevant and potentially required for a wide range of stakeholders involved in education, training, and the deployment of IT solutions in these fields. Key parties who would need to follow or implement the standard once finalized include:

1. Educational Institutions

  • Schools, Colleges, and Universities: To ensure their learning management systems (LMS) and digital education platforms adhere to standardized IT requirements, ensuring accessibility, security, and interoperability.
  • Online Learning Platforms: Platforms offering e-learning, MOOCs (Massive Open Online Courses), and other virtual educational services would need to comply with the standard to provide reliable, secure, and accessible learning experiences.

2. Training and Development Organizations

  • Corporate Training Providers: Companies that provide employee training programs through digital platforms or Learning Management Systems (LMS) will need to adhere to the standard to ensure that their IT systems are secure, scalable, and able to meet the needs of diverse learners.
  • Vocational Training Institutes: Organizations offering skills-based training or professional development would be required to meet the IT guidelines to deliver effective and inclusive digital training experiences.

3. Government and Educational Authorities

  • Ministries and Departments of Education: Government bodies responsible for overseeing national education systems may mandate that institutions and e-learning providers align with this standard to ensure consistency in IT-supported learning environments.
  • Regulatory Bodies: Organizations that regulate education and training programs may require compliance with ISO/IEC AWI 8808 to guarantee quality and security in the provision of digital education services.

4. Educational Technology (EdTech) Providers

  • Software Developers and Vendors: Companies developing e-learning systems, educational software, and digital content platforms will need to design products that align with the standard’s specifications, particularly in areas like interoperability, data security, and accessibility.
  • Hardware and IT Infrastructure Providers: Providers of IT infrastructure for educational purposes, such as servers, networks, and cloud platforms, would need to comply with the standard to ensure that they support the secure and efficient delivery of digital learning.

5. Content Creators and Digital Education Providers

  • Digital Publishers: Those creating and distributing digital educational content (e.g., textbooks, online courses) must follow the standard to ensure that their content is accessible, consistent, and can integrate smoothly into various learning platforms.
  • Course Developers: Individuals or teams responsible for developing digital courses and learning materials would need to ensure that their content meets the technical and accessibility requirements outlined in the standard.

6. Educators and Trainers

  • Teachers, Trainers, and Educators: Educators responsible for using IT in their classrooms and training programs would need to understand and implement aspects of the standard to ensure they are delivering high-quality, secure, and inclusive education experiences.
  • Educational Administrators: School and college administrators would need to ensure their institutions comply with the standard when procuring and using IT solutions for learning and training purposes.

7. Accreditation and Certification Bodies

  • Accreditation Organizations: Bodies that certify or accredit educational institutions or online learning platforms may adopt the standard to ensure consistent quality in IT-supported education.
  • Certifying Authorities: Organizations responsible for awarding certifications in IT, education, or training fields may require compliance with this standard to maintain credibility and quality assurance.

8. Learners and End-Users

  • Students and Professionals: While not required to implement the standard directly, learners would benefit from the use of technology that adheres to ISO/IEC AWI 8808, as it would ensure a more secure, accessible, and standardized learning experience across different platforms and systems.

9. Consultants and Implementation Experts

  • Educational IT Consultants: Professionals who advise institutions on implementing educational technologies will need to be aware of the standard to ensure their recommendations align with best practices in the field.
  • System Integrators: Companies and individuals that integrate educational technologies into institutional frameworks will be required to follow the standard to ensure compatibility and performance.

In summary, ISO/IEC AWI 8808 would be required by a wide range of organizations and professionals involved in the design, development, implementation, and use of information technology in education and training. Its adoption would ensure standardized practices that improve quality, accessibility, and security in the educational use of IT.

When is required ISO/IEC AWI 8808 Information Technology for Learning, Education and Training

The need for compliance with ISO/IEC AWI 8808: Information Technology for Learning, Education, and Training would arise under several conditions, depending on the organization’s objectives and context. Although the standard is still under development, the following scenarios illustrate when this standard would likely be required or beneficial:

1. Implementation of New Educational Technologies

  • When introducing a new Learning Management System (LMS): Educational institutions or organizations deploying a new LMS or upgrading their existing system would need to ensure that the system aligns with this standard to maintain security, accessibility, and interoperability.
  • When developing digital learning content: Content creators and EdTech providers would need to follow the standard to ensure their materials are compatible with various educational platforms and accessible to a broad audience.

2. Compliance with Regulatory or Accreditation Requirements

  • When regulations mandate standardized IT practices: Government bodies or educational authorities may require institutions to comply with the standard when adopting or upgrading digital learning tools.
  • During the accreditation process: Institutions seeking accreditation from educational or training bodies may be required to follow the standard to demonstrate that their digital learning environments are secure, effective, and inclusive.

3. Large-Scale Adoption of E-learning or Digital Training

  • During the shift to online education: In situations where organizations are transitioning from in-person to digital learning (e.g., during the COVID-19 pandemic), they would need to ensure their IT infrastructure aligns with ISO/IEC AWI 8808 to guarantee scalability, data security, and quality.
  • For corporate or vocational training programs: Companies and training providers delivering large-scale digital training to employees or learners would need to adhere to the standard to ensure consistency and reliability across different learning platforms.

4. Ensuring Interoperability and Data Privacy

  • When integrating multiple educational systems: Schools, universities, and other institutions that use multiple software systems (e.g., LMS, assessment platforms, student information systems) would need to ensure these systems work together seamlessly, which ISO/IEC AWI 8808 aims to standardize.
  • To meet data protection regulations: Organizations must comply with global or local data privacy regulations (e.g., GDPR) when handling learner data. The standard would provide guidance on secure data management practices in learning environments.

5. Ensuring Accessibility for All Learners

  • When meeting accessibility standards: Educational institutions and providers must ensure that their digital learning platforms are accessible to all students, including those with disabilities. ISO/IEC AWI 8808 would offer guidelines to comply with accessibility standards such as WCAG (Web Content Accessibility Guidelines).

6. During Digital Transformation in Education

  • When modernizing educational technology: Institutions adopting digital technologies as part of a broader modernization strategy would find it essential to follow this standard to ensure that their technology is future-proof, scalable, and aligned with global best practices.
  • For long-term strategic planning: Educational organizations developing long-term digital education strategies may implement ISO/IEC AWI 8808 to ensure their IT infrastructure is adaptable and compliant with future standards and regulations.

7. Providing Consistent Quality and Learning Analytics

  • When enhancing the quality of education: Organizations that aim to improve learning outcomes using analytics and digital tools would benefit from following the standard’s guidance on integrating IT systems that collect and analyze educational data.
  • For quality assurance in digital assessments: ISO/IEC AWI 8808 would be needed when implementing or upgrading digital assessment tools, ensuring that they meet quality, security, and fairness standards.

8. Collaboration in International or Multi-Institution Projects

  • For cross-border or multi-institution educational programs: When multiple institutions from different regions or countries collaborate on educational projects (such as MOOCs or international degree programs), compliance with ISO/IEC AWI 8808 ensures that their IT systems and learning platforms are compatible and secure.

9. For Competitive Advantage and Certification

  • When seeking certification or competitive differentiation: Institutions and EdTech providers may implement ISO/IEC AWI 8808 to gain a competitive edge, as adherence to international standards can signify a commitment to quality, security, and accessibility in educational technology.

In summary, ISO/IEC AWI 8808 would be required when institutions, organizations, and individuals aim to implement, manage, or improve their use of IT in learning, education, and training environments in a way that ensures security, accessibility, interoperability, and data protection.

Where is required ISO/IEC AWI 8808 Information Technology for Learning, Education and Training

ISO/IEC AWI 8808 would be required in various educational and training environments across multiple regions and sectors, where the integration of information technology (IT) in learning, education, and training is critical. Below are the key contexts where this standard is likely to be required:

1. Educational Institutions

  • Schools and Universities: Both primary and higher education institutions globally will need to apply this standard when implementing digital learning platforms, online courses, or virtual learning environments. This could include countries with established e-learning frameworks or those expanding access to technology in education.
  • Online Schools and E-Learning Providers: Providers offering fully online or hybrid learning programs across multiple regions will need to meet ISO/IEC AWI 8808 standards to ensure consistency, quality, and accessibility in their offerings.

2. Corporate Training and Development

  • Corporate Training Programs: Organizations providing employee training and development programs using digital platforms (Learning Management Systems, or LMS) will need to apply this standard to ensure their systems are secure, interoperable, and accessible to all employees, regardless of location.
  • Professional Certification Bodies: Certification and skills development organizations that offer digital assessments or remote learning would also be required to follow this standard to ensure quality, fairness, and security in their training delivery.

3. Government and Public Sector

  • Public Education Systems: National or regional education departments or ministries that manage digital learning initiatives, such as remote education or digital resource platforms, will need to ensure compliance with the standard to offer secure and accessible education to students in public schools.
  • E-Government Training Programs: Governments offering digital training for public sector employees will need to follow the guidelines in this standard to ensure the secure and effective delivery of training programs.

4. International Education Programs

  • Cross-Border Education Collaborations: International universities or institutions that collaborate on cross-border programs, including online courses and joint degree programs, will be required to follow this standard to ensure consistency and compatibility between their IT systems.
  • Global Online Learning Platforms: Massive Open Online Course (MOOC) providers like Coursera, edX, or Udemy, which operate internationally, will likely be required to follow the standard to maintain compatibility and ensure that their platforms work effectively across different countries and regions.

5. Technical and Vocational Education

  • Vocational Training Centers: Technical institutes or vocational training providers offering digital learning tools for practical skills development would need to meet the standard to ensure their systems are secure and scalable for large numbers of learners.
  • Skills-Based Programs: Programs focused on IT, engineering, healthcare, or other technical fields that increasingly use simulations, digital tools, and remote learning would need to adhere to ISO/IEC AWI 8808 to deliver high-quality, standardized training.

6. EdTech Companies

  • Educational Technology (EdTech) Companies: Companies that develop e-learning platforms, virtual learning environments, or educational software for schools, universities, or training organizations globally would need to comply with ISO/IEC AWI 8808 to ensure their products meet international standards for security, interoperability, and accessibility.
  • Content Providers: Organizations creating digital educational content, such as textbooks, e-learning modules, or interactive learning tools, must align with this standard to ensure compatibility with various learning management systems and platforms across regions.

7. Healthcare and Lifelong Learning

  • Medical Training Institutions: Institutions providing medical education or healthcare training using digital tools, simulations, or virtual learning environments would be required to follow this standard to ensure the security of sensitive data and the reliability of learning outcomes.
  • Lifelong Learning and Continuing Education: Organizations offering lifelong learning opportunities, particularly those that provide courses for adults and professionals, would need to follow ISO/IEC AWI 8808 to ensure the quality of digital learning platforms and the privacy of learner data.

8. International Organizations and NGOs

  • Non-Governmental Organizations (NGOs): NGOs that provide education and training in developing countries or in remote areas, particularly through digital means, will need to implement this standard to ensure their systems are accessible, scalable, and adaptable to different environments.
  • United Nations and Global Agencies: Global organizations such as UNESCO or UNICEF that implement or support digital learning initiatives in different parts of the world may adopt this standard to ensure consistency and quality in educational technology deployments.

9. Military and Governmental Training

  • Defense and Military Training: Government or military organizations using digital platforms for training soldiers or defense personnel will be required to follow ISO/IEC AWI 8808 to ensure that training environments are secure, reliable, and compliant with international best practices.
  • Public Safety Training: Agencies responsible for training law enforcement or first responders using digital simulations or e-learning will need to comply with the standard to maintain training integrity and security.

10. Private and Independent Educational Institutions

  • Private Schools and Independent Colleges: Private educational institutions that offer digital or blended learning experiences will need to follow the standard to provide secure, high-quality education to their students.
  • International Schools: Institutions offering international curriculums, such as the International Baccalaureate (IB) or British curriculum schools, may adopt this standard to ensure that their digital learning platforms meet global standards.

In summary, ISO/IEC AWI 8808 will be required across a wide array of contexts in education and training where information technology is used to facilitate learning, ensure data security, and provide equitable access to educational resources. This would apply globally in both public and private sectors, ranging from traditional educational institutions to corporate and vocational training environments.

How is required ISO/IEC AWI 8808 Information Technology for Learning, Education and Training

The implementation of ISO/IEC AWI 8808: Information Technology for Learning, Education, and Training would require organizations and institutions to adhere to certain key principles and practices to ensure compliance with the standard. While the standard is still under development, its focus on IT systems for learning suggests a set of processes and approaches that would be necessary. Here’s how compliance with the standard might be achieved:

1. Adoption of Secure IT Infrastructure

  • Data Security and Privacy Compliance: Organizations implementing digital learning platforms would need to ensure that these systems comply with data protection laws such as GDPR or similar regulations. This includes securing student or learner data, applying encryption, and ensuring secure access controls.
  • Cybersecurity Measures: Implementing cybersecurity protocols such as firewalls, regular updates, and vulnerability assessments will be essential to protect the learning environment from cyber threats. ISO/IEC AWI 8808 would likely provide guidelines on maintaining secure IT systems.

2. Interoperability of Learning Systems

  • System Compatibility: Learning platforms, content management systems, and assessment tools must be interoperable. This ensures that learners, instructors, and administrators can seamlessly transition between different systems without losing functionality. Adopting open standards and APIs will be critical.
  • Integration with Existing Systems: Schools, universities, or companies that already use learning management systems (LMS) or other educational technologies will need to ensure that any new systems align with ISO/IEC AWI 8808 standards. This involves testing the integration of various IT components, ensuring they work together efficiently.

3. Ensuring Accessibility

  • Compliance with Accessibility Standards: Learning platforms, content, and tools must meet accessibility requirements, such as the Web Content Accessibility Guidelines (WCAG), to ensure learners with disabilities can use them. This could involve providing alternative text for images, ensuring content is screen-reader friendly, and making sure multimedia elements have captions or transcripts.
  • Design for Diverse Learning Needs: Educational materials and systems must be designed with inclusivity in mind, allowing learners from diverse backgrounds or with specific learning challenges to access education. This includes mobile compatibility, language support, and adjustable learning formats.

4. Development and Management of Digital Content

  • Standardized Content Formats: ISO/IEC AWI 8808 may require learning content to follow standardized formats (e.g., SCORM, xAPI) that ensure compatibility across various learning management systems. This ensures that learning materials can be reused, repurposed, and shared easily.
  • Quality Control in Content Creation: Educational content must be created according to strict quality guidelines to ensure its effectiveness in learning outcomes. Regular reviews and updates to content would be necessary to maintain relevance and accuracy.

5. Learning Analytics and Reporting

  • Data-Driven Learning Insights: Institutions and organizations may be required to implement analytics tools that can track learner progress, engagement, and outcomes. ISO/IEC AWI 8808 could provide standards for data collection and reporting to ensure consistency and transparency.
  • Monitoring Learner Performance: The system would need to provide regular, clear, and actionable reports on student performance, helping educators or trainers make informed decisions. The collection and analysis of this data must respect data privacy regulations.

6. Scalability and Flexibility of Learning Platforms

  • Scalable Systems for Growth: As the number of users or the amount of content grows, learning platforms must be scalable. ISO/IEC AWI 8808 may provide guidelines on ensuring that educational systems can handle increased loads without compromising performance or user experience.
  • Modular Design for Adaptability: Learning systems must be designed in a way that allows for easy updates and the addition of new functionalities without major disruptions. This flexibility will be necessary for adapting to new educational trends or changes in technology.

7. Stakeholder Collaboration and Communication

  • Collaboration Between IT and Educators: Implementing the standard will require close collaboration between IT departments and educators to ensure that technology supports pedagogical needs. This includes feedback loops to improve the learning experience and technical solutions tailored to learning objectives.
  • Engagement with Learners and Instructors: Continuous engagement with users of the system—both learners and instructors—will be key. Gathering feedback on the usability, functionality, and impact of the technology on learning outcomes will inform ongoing improvements.

8. System Testing and Validation

  • Regular Audits and Assessments: Institutions or companies must conduct regular audits to assess whether their digital learning systems meet ISO/IEC AWI 8808 requirements. This might involve both internal reviews and external certification processes to ensure compliance with the standard.
  • Performance Testing: Systems should be tested regularly for performance, security vulnerabilities, and user experience. These tests will help ensure that the platform remains functional and secure even as it evolves.

9. User Training and Support

  • Training for Educators and Administrators: Teachers, trainers, and administrators will need to be trained on how to use new learning technologies effectively. This training should focus on both the technical aspects and the pedagogical integration of these tools.
  • Helpdesk and User Support Systems: Organizations will need to implement robust support systems, including helpdesks, FAQs, and user guides, to assist learners and staff in navigating and troubleshooting digital learning platforms.

10. Compliance with International and Local Regulations

  • Regulatory Alignment: Depending on the region or country, organizations may need to align their learning systems with local educational or training regulations. ISO/IEC AWI 8808 would provide a framework for aligning international best practices with local legal requirements.
  • Adhering to National Education Standards: Institutions in countries with specific educational technology standards (such as the U.S., U.K., or European countries) would need to ensure that ISO/IEC AWI 8808 requirements complement or align with national standards for IT in education and training.

11. Continuous Improvement

  • Ongoing Innovation: Institutions and companies should implement processes for continuously improving their learning platforms based on the latest technological advancements and pedagogical practices. ISO/IEC AWI 8808 would likely encourage continuous innovation and adaptation.
  • Feedback and Evaluation Loops: Establishing a mechanism for collecting feedback from users and stakeholders ensures that the system is evaluated and improved on a regular basis, keeping it aligned with the evolving needs of learners and educators.

In summary, ISO/IEC AWI 8808 would require organizations and institutions to adopt a structured approach to implementing and managing their IT systems for learning, ensuring security, accessibility, interoperability, and scalability. The standard would guide the development, deployment, and continuous improvement of educational technologies, ensuring they meet international best practices and regulatory requirements.

Case Study on ISO/IEC AWI 8808 Information Technology for Learning, Education and Training

Here’s a hypothetical case study that explores how ISO/IEC AWI 8808 could be applied in a real-world scenario to improve the quality and delivery of education through information technology.


Case Study: Implementing ISO/IEC AWI 8808 in a Global E-Learning Platform

Overview

A global e-learning provider, EduWorld, offers online courses to students and professionals worldwide. With rapid growth in their user base and an increasing demand for flexible, accessible, and secure learning environments, EduWorld faces challenges in maintaining consistent learning quality, ensuring data security, and providing accessible content across regions.

To address these challenges, EduWorld decided to adopt ISO/IEC AWI 8808: Information Technology for Learning, Education, and Training to enhance their digital learning ecosystem, improve interoperability across platforms, and ensure the privacy and security of learner data.

Challenges Faced by EduWorld

  • Scalability Issues: With increasing students, their learning management system (LMS) was experiencing slowdowns, causing user dissatisfaction.
  • Data Security Risks: The platform was facing concerns regarding the safety of learners’ personal data, with new regulations like GDPR creating pressure for compliance.
  • Lack of Accessibility: The content was not fully accessible to users with disabilities, leading to complaints from students who required assistive technologies.
  • Interoperability Concerns: Different branches of the platform were using different systems that did not communicate well with each other, resulting in fragmented data and poor user experience.
  • Need for Continuous Improvement: The e-learning content needed regular updates, but the current system did not allow for efficient version control and distribution of new materials across global platforms.

Objectives

  • Ensure scalability and improve system performance to support a global user base.
  • Enhance data security and privacy protocols in compliance with international regulations.
  • Achieve content accessibility for users with disabilities in compliance with international accessibility standards.
  • Enable interoperability between different LMS platforms to provide a seamless learning experience.
  • Implement a framework for continuous improvement and innovation in learning technologies.

Approach Using ISO/IEC AWI 8808

  1. Adopting a Secure and Scalable IT Infrastructure
    • Edu World began by restructuring its IT infrastructure to meet the security requirements outlined in ISO/IEC AWI 8808. This involved implementing robust encryption methods for data storage and transmission.
    • The IT team also upgraded server capacity and introduced load-balancing technologies to address scalability issues, ensuring that the platform could handle a growing number of students without performance degradation.
  2. Interoperability and Standardization
    • One of the core aspects of ISO/IEC AWI 8808 is ensuring that educational systems are interoperable. Edu World integrated its LMS with other educational platforms using standardized APIs and protocols as suggested in the standard. This enabled seamless sharing of data and content across its global branches.
    • By using standardized file formats for content (such as SCORM), Edu World ensured that course materials could be easily imported and exported between different systems, allowing for greater flexibility in course offerings.
  3. Enhancing Accessibility
    • Edu World revamped its learning content to comply with the Web Content Accessibility Guidelines (WCAG) as part of the ISO/IEC AWI 8808 implementation. This included providing screen-reader support, adding captions and transcripts for videos, and ensuring keyboard accessibility for users with motor disabilities.
    • The design team also worked to make the platform more accessible for users with visual impairments by implementing adjustable text sizes and high-contrast themes.
  4. Strengthening Data Privacy and Security
    • To meet the security guidelines in ISO/IEC AWI 8808, Edu World implemented multi-factor authentication for all users, ensuring that student data remained secure.
    • The organization also introduced detailed data privacy policies to comply with GDPR and other regional data protection laws. Regular data security audits were conducted to maintain compliance.
  5. Continuous Improvement and Learning Analytics
    • Edu World adopted a continuous improvement framework in line with ISO/IEC AWI 8808. This included the use of learning analytics to track student performance and engagement with the platform.
    • The analytics data was used to identify areas where students struggled, allowing course creators to make targeted improvements to the curriculum.
    • The feedback loop provided by this process allowed Edu World to ensure that the platform was constantly evolving to meet learners’ needs.
  6. Providing Training and Support for Educators
    • To ensure a smooth transition, Edu World provided comprehensive training for their staff on the new system. Teachers and administrators received guidance on how to use the upgraded LMS and manage content more effectively.
    • A dedicated helpdesk was set up to assist learners in navigating the new platform and accessing the resources they needed.

Results and Benefits

  1. Improved System Performance: The new scalable IT infrastructure reduced downtime and eliminated system slowdowns, even as the number of users grew.
  2. Enhanced Security and Compliance: By following the security protocols in ISO/IEC AWI 8808, Edu World ensured compliance with international data privacy regulations, reducing the risk of data breaches.
  3. Increased Accessibility: The platform now complied with international accessibility standards, allowing students with disabilities to access content more easily. This led to an increase in student satisfaction and a broader user base.
  4. Seamless Learning Experience: Interoperability between different systems allowed for a smoother learning experience, with students able to access content from various sources without any technical issues.
  5. Data-Driven Continuous Improvement: The use of learning analytics allowed Edu World to continuously improve its course offerings and tailor content to the needs of its users, resulting in higher student success rates.
  6. Global Recognition: By complying with ISO/IEC AWI 8808, Edu World earned a reputation for quality and reliability in the e-learning space, attracting more learners from diverse regions.

Conclusion

Implementing ISO/IEC AWI 8808 helped EduWorld overcome its operational challenges and enhanced the quality, accessibility, and security of its e-learning platform. The standard provided a comprehensive framework for improving IT systems in learning, education, and training, ultimately allowing EduWorld to grow sustainably while delivering a superior learning experience to its global users.


This case study demonstrates how a global e-learning platform could benefit from the implementation of ISO/IEC AWI 8808 to ensure secure, accessible, and scalable educational services while complying with international standards.

White Paper on ISO/IEC AWI 8808 Information Technology for Learning, Education and Training

Executive Summary

The rapid evolution of technology in the education sector has led to increased demand for robust standards that ensure quality, interoperability, and security in digital learning environments. ISO/IEC AWI 8808, a draft standard under development, seeks to address these needs by providing guidelines for the effective use of information technology in learning, education, and training. This white paper outlines the importance of ISO/IEC AWI 8808, its key components, potential applications, and the benefits it can bring to educational institutions, e-learning platforms, and educators worldwide.


Introduction

Information technology has transformed education at all levels, from K-12 classrooms to professional training environments. The digitalization of learning processes offers unparalleled opportunities for improving accessibility, engagement, and personalized learning experiences. However, it also presents challenges, including the need for secure, interoperable, and accessible platforms that meet global standards.

ISO/IEC AWI 8808 aims to establish a framework that addresses these challenges, providing guidance on how to design, implement, and manage IT systems for learning environments. It covers areas such as digital content management, accessibility, privacy, security, and the interoperability of learning platforms.


Key Objectives of ISO/IEC AWI 8808

  1. Enhancing Interoperability: One of the primary objectives of ISO/IEC AWI 8808 is to enable seamless communication between various learning management systems (LMS) and e-learning platforms. By promoting standardized file formats, communication protocols, and APIs, the standard aims to facilitate data exchange and content portability across systems.
  2. Ensuring Security and Privacy: Given the sensitive nature of educational data, the standard emphasizes strong security protocols to protect student information. This includes guidelines on encryption, user authentication, and compliance with global privacy regulations such as GDPR.
  3. Promoting Accessibility: ISO/IEC AWI 8808 focuses on making digital learning content accessible to all learners, including those with disabilities. It references accessibility standards like the Web Content Accessibility Guidelines (WCAG) to ensure that learning platforms and content meet the needs of diverse user groups.
  4. Supporting Innovation and Continuous Improvement: The standard encourages educational institutions and e-learning providers to adopt a framework of continuous improvement, where learning systems evolve based on feedback, performance data, and emerging technologies.

Components of ISO/IEC AWI 8808

  1. Learning Management System (LMS) Guidelines:
    • Recommendations for the development of scalable, secure, and interoperable LMS platforms.
    • Best practices for integrating third-party applications and content.
    • Framework for managing user data, course materials, and student progress across systems.
  2. Digital Content Standards:
    • Guidelines on creating and managing digital learning content in standardized formats.
    • Recommendations for content versioning, distribution, and metadata tagging to ensure consistency across platforms.
  3. Accessibility and Inclusivity:
    • Standards for ensuring content accessibility for learners with disabilities, including those using assistive technologies.
    • Strategies for creating multi-lingual and culturally relevant content for diverse audiences.
  4. Data Privacy and Security:
    • Protocols for protecting student and educator data, including encryption, access control, and data retention policies.
    • Guidelines for complying with international data protection laws such as GDPR and the Family Educational Rights and Privacy Act (FERPA).
  5. Interoperability Protocols:
    • Specifications for enabling cross-platform integration of educational systems.
    • Standardized APIs and data formats for sharing content and learner progress between systems.

Applications of ISO/IEC AWI 8808

  1. K-12 Education:
    • Schools can use the standard to ensure their digital platforms meet accessibility and security requirements, while also supporting interoperability with national education systems.
    • The framework helps educators provide a personalized learning experience, incorporating learning analytics to adapt content and teaching methods.
  2. Higher Education:
    • Universities and colleges can benefit from the standard’s focus on continuous improvement, using data-driven insights to refine curricula, assessments, and learning environments.
    • It facilitates collaboration between different institutions by ensuring compatibility between e-learning platforms.
  3. Corporate Training and Professional Development:
    • Organizations offering online training and certification programs can use ISO/IEC AWI 8808 to ensure that their systems provide secure, compliant, and scalable solutions.
    • The standard promotes global consistency in training programs, enabling employees to access learning materials across regions and platforms.
  4. Government and Public Institutions:
    • Governments can adopt the standard to ensure the educational technologies they implement are secure, scalable, and accessible to all citizens.
    • The guidelines can be integrated into public sector initiatives focused on lifelong learning and workforce development.

Benefits of ISO/IEC AWI 8808

  1. Improved Learning Experience: The standard ensures that learners across the world can access consistent, high-quality educational content that is secure, accessible, and engaging.
  2. Enhanced Security and Privacy: ISO/IEC AWI 8808 outlines comprehensive security protocols that protect user data and ensure compliance with global regulations, reducing the risk of data breaches.
  3. Increased Accessibility: By promoting the use of accessibility standards, ISO/IEC AWI 8808 ensures that all students, including those with disabilities, can fully engage with learning content.
  4. Global Interoperability: The focus on interoperability allows institutions to integrate and share content across different platforms and regions, enhancing collaboration and access to diverse learning resources.
  5. Scalability and Adaptability: The standard encourages the development of systems that are scalable and adaptable to future changes, ensuring that educational institutions and platforms can grow and evolve with technological advancements.

Challenges and Considerations

While the benefits of ISO/IEC AWI 8808 are clear, there are potential challenges to its widespread adoption:

  1. Initial Investment: Implementing the standard may require significant investment in upgrading or replacing existing systems to comply with security, interoperability, and accessibility requirements.
  2. Complexity in Implementation: The wide range of components covered in ISO/IEC AWI 8808 can make implementation complex, requiring institutions to work with multiple stakeholders, including IT teams, educators, and legal departments.
  3. Ongoing Maintenance: Compliance with the standard requires ongoing updates and maintenance, particularly as new technologies and regulations emerge.

Conclusion

ISO/IEC AWI 8808 represents a significant step forward in establishing a global framework for the use of information technology in learning, education, and training. By promoting security, accessibility, interoperability, and continuous improvement, the standard provides educational institutions and e-learning platforms with the tools they need to succeed in the digital age.

As the adoption of digital learning technologies continues to accelerate, ISO/IEC AWI 8808 will play a critical role in ensuring that these platforms deliver high-quality, secure, and accessible learning experiences to students around the world.


References

  • ISO/IEC JTC 1/SC 36: Information Technology for Learning, Education, and Training.
  • Web Content Accessibility Guidelines (WCAG) 2.1.
  • General Data Protection Regulation (GDPR).
  • Family Educational Rights and Privacy Act (FERPA).

This white paper provides a comprehensive overview of ISO/IEC AWI 8808, highlighting its potential to reshape the landscape of educational technology and ensure the global adoption of best practices in learning, education, and training systems.

  1. Google Ngram: “technical trainer”
  2. ^ Air of Authority – A History of RAF Organisation – RAF Home Commands formed between 1939 – 1957 Archived 2011-01-11 at the Wayback Machine
  3. ^ Smith, Darryl P. “Selecting and preparing effective trainers.” Modern Casting. American Foundry Society, Inc. 1999.
  4. ^ Technical Instructors Skill Standards.pdf[permanent dead link]
  5. ^ Marope, P.T.M.; Chakroun, B.; Holmes, K.P. (26 May 2015). Unleashing the potential: transforming technical and vocational education and training. UNESCO Publishing. p. 114. ISBN 978-92-3-100091-1.
  6. ^ Gauld, D. & Miller, P. (2004), ‘The qualifications and competencies held by effective workplace trainers’, Journal of European Industrial Training, vol. 28, no. 1, pp.8-22.
  7. ^ “CompTIA and Technical Communities Partner for Government Access to Certifications.”, Health & Beauty Close-Up. Close-Up Media, Inc. 2009.
  8. Jump up to:a b Professional Organizations for Trainers, Mr PBET blog, Richard Goutal.
  9.  “Certification”. International Organization for Standardization. Archived from the original on Feb 27, 2024.
  10. ^ “Glossary of Important Assessment and Measurement Terms”NCME. Archived from the original on 2017-07-22. Retrieved 8 March 2017.
  11. ^ “Certification Bodies: what is it ?”www.theinformationstandard.org. Retrieved 2025-02-17.
  12. ^ “What Is a Certificate Authority? Certification Authorities Explained”sectigostore.com. Retrieved 2025-02-17.
  13. ^ “How Important Are Professional Certifications?”www.columbiasouthern.edu. Retrieved 2025-02-17.
  14. ^ “Sustainability Certifications: Easy Guide for Consumers & Sellers”climatesort.com. Retrieved 2025-02-17.
  15. ^ “Cybersecurity And Cloud Tech Certifications Pay The Best Salaries In 2020”www.forbes.com. Retrieved 2025-02-17.
  16. ^ “The ROI of Certifications”certifiedperformance.org. Retrieved 2025-02-17.
  17. ^ “Why get a Project Management Professional (PMP®) certification?”leanmanufacturing.online. Retrieved 2025-02-17.
  18. ^ Cem Kaner (Mar 26, 2014). “Why propose an advanced certification in software testing?”. Retrieved November 4, 2014.
  19. ^ “Academic Degrees Abbreviations”Abbreviations.com. Archived from the original on Feb 15, 2014. Retrieved January 30, 2014.
  20. ^ “Motion Picture Association of America”mpaa.orgArchived from the original on Dec 30, 2011.
  21. ^ International standards and private standards. International Organization for Standardization. 2010. ISBN 978-92-67-10518-5Archived from the original on May 21, 2023 – via DocPlayer.
  22. ^ “Attestations of conformity”CASCO. International Organization for Standardization. Archived from the original on Nov 30, 2023.
  23. ^ “U.S. Conformity Assessment System: 3rd Party Conformity Assessment”ANSI Standards Portal. Retrieved November 4, 2014.
  24. Jump up to:a b “Certifying Software Testers Worldwide – ISTQB® International Software Testing Qualifications Board”. Retrieved November 4, 2014.
  25. ^ “International Institute for Software Testing (IIST) CSTP & CTM Informational Home Page”. Testinginstitute.com. Retrieved January 30, 2014.
  26. ^ “Participatory Guarantee Systems” (PGS) are participatory certification systems which aim to guarantee buyers or users that sustainable production practices have been respected, as recognised by a quality mark or label”certification-participative.org. Retrieved 2025-02-17.
  27.  “What Is eLearning? Types, Advantages, and Drawbacks in 2024”.
  28.  Tamm, Sander (2023-01-11). “All 10 Types of E-Learning Explained”E-Student. Retrieved 2024-04-20.
  29.  “School Improvement Research Series” (PDF).
  30.  “Asynchronous and Synchronous E-Learning”EDUCAUSE Review. Retrieved 2024-04-20.
  31.  “Asynchronous and Synchronous E-Learning”EDUCAUSE Review. Retrieved 2024-04-20.
  32.  “Adaptive E-learning Research Paper”.
  33.  Jugran, Sparsh (2024-07-01). “Learn Top Impactful Examples of Scenario-Based Learning”.
  34.  “Data Protection Day”Council of Europe. Archived from the original on 27 December 2013. Retrieved 29 December 2013.
  35. ^ Peter Fleischer, Jane Horvath, Shuman Ghosemajumder (2008). “Celebrating data privacy”Google Blog. Retrieved 12 August 2011.
  36. ^ “Qatar Celebrates Privacy Day 2023”. National Data Privacy Office (NDPO). Retrieved 24 January 2024.
  37. ^ “יום הגנת הפרטיות הבינלאומי-gov.il”. The Israel Privacy Protection Authority. Retrieved 28 January 2019.
  38. ^ De Capitani Di Vimercati, Sabrina; Foresti, Sara; Livraga, Giovanni; Samarati, Pierangela (December 2012). “DATA PRIVACY: DEFINITIONS AND TECHNIQUES”International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems20 (06): 793–817. doi:10.1142/S0218488512400247ISSN 0218-4885.
  39. ^ De Capitani Di Vimercati, Sabrina; Foresti, Sara; Livraga, Giovanni; Samarati, Pierangela (December 2012). “DATA PRIVACY: DEFINITIONS AND TECHNIQUES”International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems20 (06): 793–817. doi:10.1142/S0218488512400247ISSN 0218-4885.
  40. ^ H.Res.31 Expressing support for the designation of 28 January 2009 as “National Data Privacy Day”
  41. ^ CMU Privacy Day website
  42. ^ “Data Privacy Day 2012 website”. Archived from the original on 4 January 2012. Retrieved 3 January 2012.
  43. ^ “European Privacy Day 2012 website”. Archived from the original on 29 January 2012. Retrieved 3 January 2012.
  44. ^ Yahya, Faizal Bin (2016). “The Political Economy of Data Security in the BPO Industry in India”. State, Society and Information Technology in Asia.
  45.  Rose, Kenneth H. (July 2005). Project Quality Management: Why, What and How. Fort Lauderdale, Florida: J. Ross Publishing. p. 41. ISBN 978-1-932159-48-6.
  46. ^ Deming, W. Edwards (2013). The Essential Deming: Leadership Principles from the Father of Quality. McGraw Hill. pp. 127–173. ISBN 978-0-07-179021-5.
  47. ^ Garvin, David A. (1987). “Competing on the Eight Dimensions of Quality”Harvard Business Review. Retrieved December 23, 2012.
  48. ^ Hagerty, J.R. (13 December 2013). “Bad News for U.S. Industry: China is Closing the Quality Gap”The Wall Street JournalArchived from the original on 10 October 2016. Retrieved 16 February 2018.
  49. ^ Shirouzu, N. (28 September 2017). “China carmakers narrow quality gap on global rivals: Report”ReutersArchived from the original on 17 February 2018. Retrieved 16 February 2018.
  50. ^ Research, Center for Drug Evaluation and (2020-03-12). “Quality Metrics for Drug Manufacturing”FDA.
  51. ^ Administration, Australian Government Department of Health Therapeutic Goods (2018-08-09). “Presentation: Driving a GMP / Quality Culture to provide supporting evidence of better business outcomes”Therapeutic Goods Administration (TGA). Retrieved 2020-12-22.
  52. ^ “ISPE Advances Its Focus on Cultural Excellence”ISPE | International Society for Pharmaceutical Engineering. Retrieved 2020-12-22.
  53. ^ “Quality Culture and its Measurement”www.pda.org. Retrieved 2020-12-22.
  54. ^ “Creating a Culture of Quality”Harvard Business Review. 2014-04-01. ISSN 0017-8012. Retrieved 2021-03-05.
  55. ^ Paul H. Selden (December 1998). “Sales Process Engineering: An Emerging Quality Application”. Quality Progress: 59–63.
  56. ^ Hasham, Tareq (January 2019). “The Impact of Quality Culture on Competitive Advantage in Financial Service Industries”Research Gate. Retrieved 1 July 2021.
  57. ^ Garvare, Rickard; Johansson, Peter (2010-07-01). “Management for sustainability – A stakeholder theory”Total Quality Management & Business Excellence21 (7): 737–744. doi:10.1080/14783363.2010.483095ISSN 1478-3363S2CID 153972337.
  58. ^ Siva, Vanajah; Gremyr, Ida; Bergquist, Bjarne; Garvare, Rickard; Zobel, Thomas; Isaksson, Raine (2016-12-01). “The support of Quality Management to sustainable development: a literature review”Journal of Cleaner Production138: 148–157. Bibcode:2016JCPro.138..148Sdoi:10.1016/j.jclepro.2016.01.020hdl:2262/77404ISSN 0959-6526.
  59. ^ “Customer focus” (PDF). Quality management principles. ISO quality. Archived (PDF) from the original on 26 June 2016. Retrieved 29 June 2016.
  60. ^ Fernandes, Ana Cristina; Sampaio, Paulo; Sameiro, Maria; Truong, Huy Quang (2017-01-03). “Supply chain management and quality management integration: A conceptual model proposal”International Journal of Quality & Reliability Management34 (1): 53–67. doi:10.1108/IJQRM-03-2015-0041ISSN 0265-671X.
  61. ^ “Leadership” (PDF). Quality management principles. ISO quality. Archived (PDF) from the original on 26 June 2016. Retrieved 29 June 2016.
  62. ^ “Engagement of people” (PDF). Quality management principles. ISO quality. Archived (PDF) from the original on 2016-11-19.
  63. ^ “Process approach” (PDF). Quality management principles. ISO quality. Archived (PDF) from the original on 26 June 2016. Retrieved 29 June 2016.
  64. ^ “Improvement” (PDF). Quality management principles. ISO quality. Archived (PDF) from the original on 26 June 2016. Retrieved 29 June 2016.
  65. ^ “Evidence based decision making” (PDF). Quality management principles. ISO quality. Archived (PDF) from the original on 26 June 2016. Retrieved 29 June 2016.
  66. ^ “Relationship management” (PDF). Quality management principles. ISO quality. Archived (PDF) from the original on 26 June 2016. Retrieved 29 June 2016.
  67. ^ Bettina, Warzecha (2017). Problem with Quality Management Process orientation, controllability, and zero-defect processes as modern myths. Walsrode. ISBN 9783981863833OCLC 992993108.
  68. ^ “Ungesunde Ordnung – brand eins online”www.brandeins.de (in German). Archived from the original on 2018-01-08. Retrieved 2018-01-08.
  69. ^ “Taking the First Step with PDCA”. 2 February 2009. Retrieved 17 March 2011.
  70. ^ “ISO 9001 Certification”ISO 9001 certification. Lloyd’s register LRQA. Archived from the original on 16 June 2022. Retrieved 16 June 2022.
  71. ^ “Object Oriented Quality Management, a model for quality management” (PDF). Statistics Netherlands, The Hague. 2009-04-29. Archived (PDF) from the original on 2010-02-15.
  72. ^ Stewart, Greg L.; Manges, Kirstin A.; Ward, Marcia M. (2015). “Empowering Sustained Patient Safety”Journal of Nursing Care Quality30 (3): 240–246. doi:10.1097/ncq.0000000000000103PMID 25479238S2CID 5613563.
  73. ^ http://ssrn.com/abstract=1488690 “Thareja”
  74. ^ Thareja P(2008), “Total Quality Organization Thru’ People, Each one is Capable”, FOUNDRY, Vol. XX, No. 4, July/Aug 2008
  75. ^ “ISO 9001 Quality Management System QMS Certification”. Indian Register Quality Systems. Archived from the original on 13 March 2014. Retrieved 13 March 2014.
  76. ^ “CMMI Institute”www.cmmiinstitute.comArchived from the original on 2015-02-05.
  77. ^ Littlefield, Matthew; Roberts, Michael (June 2012). “Enterprise Quality Management Software Best Practices Guide”LNS Research Quality Management Systems: 10. Archived from the original on 2012-09-26.
  78. “Certification”. International Organization for Standardization. Archived from the original on Feb 27, 2024.
  79. ^ “Glossary of Important Assessment and Measurement Terms”NCME. Archived from the original on 2017-07-22. Retrieved 8 March 2017.
  80. ^ “Certification Bodies: what is it ?”www.theinformationstandard.org. Retrieved 2025-02-17.
  81. ^ “What Is a Certificate Authority? Certification Authorities Explained”sectigostore.com. Retrieved 2025-02-17.
  82. ^ “How Important Are Professional Certifications?”www.columbiasouthern.edu. Retrieved 2025-02-17.
  83. ^ “Sustainability Certifications: Easy Guide for Consumers & Sellers”climatesort.com. Retrieved 2025-02-17.
  84. ^ “Cybersecurity And Cloud Tech Certifications Pay The Best Salaries In 2020”www.forbes.com. Retrieved 2025-02-17.
  85. ^ “The ROI of Certifications”certifiedperformance.org. Retrieved 2025-02-17.
  86. ^ “Why get a Project Management Professional (PMP®) certification?”leanmanufacturing.online. Retrieved 2025-02-17.
  87. ^ Cem Kaner (Mar 26, 2014). “Why propose an advanced certification in software testing?”. Retrieved November 4, 2014.
  88. ^ “Academic Degrees Abbreviations”Abbreviations.com. Archived from the original on Feb 15, 2014. Retrieved January 30, 2014.
  89. ^ “Motion Picture Association of America”mpaa.orgArchived from the original on Dec 30, 2011.
  90. ^ International standards and private standards. International Organization for Standardization. 2010. ISBN 978-92-67-10518-5Archived from the original on May 21, 2023 – via DocPlayer.
  91. ^ “Attestations of conformity”CASCO. International Organization for Standardization. Archived from the original on Nov 30, 2023.
  92. ^ “U.S. Conformity Assessment System: 3rd Party Conformity Assessment”ANSI Standards Portal. Retrieved November 4, 2014.
  93. Jump up to:a b “Certifying Software Testers Worldwide – ISTQB® International Software Testing Qualifications Board”. Retrieved November 4, 2014.
  94. ^ “International Institute for Software Testing (IIST) CSTP & CTM Informational Home Page”. Testinginstitute.com. Retrieved January 30, 2014.
  95. ^ “Participatory Guarantee Systems” (PGS) are participatory certification systems which aim to guarantee buyers or users that sustainable production practices have been respected, as recognised by a quality mark or label”certification-participative.org. Retrieved 2025-02-17.
  96. Jordan, David; Kiras, James D.; Lonsdale, David J.; Speller, Ian; Tuck, Christopher; Walton, C. Dale (2016). Understanding Modern Warfare (Second ed.). Cambridge University Press. p. 66. ISBN 978-1107134195.
  97. ^ Mark, Joshua J. (2 September 2009). “War in Ancient Times”World History Encyclopedia.
  98. ^ Terra cotta of massed ranks of Qin Shi Huang’s terra cotta soldiers
  99. Jump up to:a b c d “military”Oxford English Dictionary (Online ed.). Oxford University Press. Retrieved 25 March 2019. (Subscription or participating institution membership required.)
  100. ^ Harper, Douglas. “military”Online Etymology Dictionary.
  101. ^ Tucker, T.G. (1985) Etymological dictionary of Latin, Ares publishers Inc., Chicago. p. 156
  102. ^ “Merriam Webster Dictionary online”Merriam-Webster.com. Retrieved 1 August 2011.
  103. ^ Morillo, Stephen, F. Pavkovic, Michael (2006). What is Military History? (1 ed.). Cambridge: Polity Press. pp. 2, 6–7. ISBN 0-7456-3390-0.
  104. ^ British Army (2000). “Soldiering: The military covenant” (PDF). Archived (PDF) from the original on 10 October 2022. Retrieved 13 December 2017.
  105. ^ Franz-Stefan Gady. “India’s Military to Allow Women in Combat Roles”The Diplomat. Retrieved 12 December 2017.
  106. ^ “UK armed forces biannual diversity statistics: 2017”www.gov.uk. 2017. Retrieved 12 December 2017.
  107. ^ Försvarsmakten. “Historik”Försvarsmakten (in Swedish). Retrieved 12 December 2017.
  108. ^ US Army (2013). “Support Army Recruiting”www.usarec.army.mil. Archived from the original on 9 November 2018. Retrieved 12 December 2017.
  109. ^ Engelbrecht, Leon (29 June 2011). “Fact file: SANDF regular force levels by race & gender: April 30, 2011 | defenceWeb”www.defenceweb.co.za. Retrieved 12 December 2017.
  110. ^ “Where are child soldiers?”Child Soldiers International. Archived from the original on 1 February 2018. Retrieved 8 December 2017.
  111. Jump up to:a b Segal, D R; et al. (1998). “The all-volunteer force in the 1970s”. Social Science Quarterly72 (2): 390–411. JSTOR 42863796.
  112. ^ Bachman, Jerald G.; Segal, David R.; Freedman-Doan, Peter; O’Malley, Patrick M. (2000). “Who chooses military service? Correlates of propensity and enlistment in the U.S. Armed Forces”. Military Psychology12 (1): 1–30. doi:10.1207/s15327876mp1201_1S2CID 143845150.
  113. ^ Brett, Rachel, and Irma Specht. Young Soldiers: Why They Choose to Fight. Boulder: Lynne Rienner Publishers, 2004. ISBN 1-58826-261-8[page needed]
  114. ^ “Machel Study 10-Year Strategic Review: Children and conflict in a changing world”UNICEF. Archived from the original on 9 December 2017. Retrieved 8 December 2017.
  115. ^ Iversen, Amy C.; Fear, Nicola T.; Simonoff, Emily; Hull, Lisa; Horn, Oded; Greenberg, Neil; Hotopf, Matthew; Rona, Roberto; Wessely, Simon (1 December 2007). “Influence of childhood adversity on health among male UK military personnel”The British Journal of Psychiatry191 (6): 506–511. doi:10.1192/bjp.bp.107.039818ISSN 0007-1250PMID 18055954.
  116. ^ Asoni, Andrea; Gilli, Andrea; Gilli, Mauro; Sanandaji, Tino (30 January 2020). “A mercenary army of the poor? Technological change and the demographic composition of the post-9/11 U.S. military”. Journal of Strategic Studies45 (4): 568–614. doi:10.1080/01402390.2019.1692660ISSN 0140-2390S2CID 213899510.
  117. ^ “Army – Artillery – Air Defender”army.defencejobs.gov.au. Retrieved 9 December 2017.[permanent dead link]
  118. ^ Gee, David; Taylor, Rachel (1 November 2016). “Is it Counterproductive to Enlist Minors into the Army?”. The RUSI Journal161 (6): 36–48. doi:10.1080/03071847.2016.1265837ISSN 0307-1847S2CID 157986637.
  119. Jump up to:a b “What is a Military Enlistment Contract?”Findlaw. Retrieved 9 December 2017.
  120. Jump up to:a b “The Army Terms of Service Regulations 2007”www.legislation.gov.uk. Retrieved 9 December 2017.
  121. Jump up to:a b c UK, Ministry of Defence (2017). “Queen’s Regulations for the Army (1975, as amended)” (PDF). Archived (PDF) from the original on 10 October 2022. Retrieved 9 December 2017.
  122. ^ McGurk, Dennis; et al. (2006). “Joining the ranks: The role of indoctrination in transforming civilians to service members”Military life: The psychology of serving in peace and combat. Vol. 2. Westport, Connecticut: Praeger Security International. pp. 13–31. ISBN 978-0-275-98302-4.
  123. Jump up to:a b c d Hockey, John (1986). Squaddies : portrait of a subculture. Exeter, Devon: University of Exeter. ISBN 978-0-85989-248-3OCLC 25283124.
  124. Jump up to:a b Bourne, Peter G. (1 May 1967). “Some Observations on the Psychosocial Phenomena Seen in Basic Training”. Psychiatry30 (2): 187–196. doi:10.1080/00332747.1967.11023507ISSN 0033-2747PMID 27791700.
  125. ^ Grossman, Dave (2009). On killing : the psychological cost of learning to kill in war and society (Rev. ed.). New York: Little, Brown and Co. ISBN 978-0-316-04093-8OCLC 427757599.
  126. ^ Faris, John H. (16 September 2016). “The Impact of Basic Combat Training: The Role of the Drill Sergeant in the All-Volunteer Army”. Armed Forces & Society2 (1): 115–127. doi:10.1177/0095327×7500200108S2CID 145213941.
  127. ^ “University Catalog 2011/2012, Master Courses: pp.99, size: 17MB” (PDF). US National Intelligence University. Archived from the original (PDF) on 23 January 2012. Retrieved 28 March 2012.
  128. ^ Statistics on Americans’ opinion about the U.S. being the world’s no1 military power Archived 10 October 2017 at the Wayback Machine, Gallup, March 2012. Retrieved May 3, 2013.
  129. ^ “Stockholm International Peace Research Institute (2021)” (PDF). www.sipri.orgArchived (PDF) from the original on 10 October 2022. Retrieved 16 August 2021.
  130. ^ 2017 data from: “Military expenditure (% of GDP). Stockholm International Peace Research Institute (SIPRI), Yearbook: Armaments, Disarmament and International Security”World Bank. Retrieved 8 March 2019.
  131. Jump up to:a b c d Dupuy, T.N. (1990) Understanding war: History and Theory of combat, Leo Cooper, London, p. 67
  132. ^ “Ukraine Deploys Anti-Drone Jamming Guns to its Forces on the Donbas Frontline”Defense Express. Retrieved 25 July 2024.
  133. ^ “The Art of War”Mypivots.com. 11 June 2011. Retrieved 1 August 2011.
  134. ^ “Welcome to the Department of History”westpoint.edu. Archived from the original on 18 May 2012. Retrieved 1 August 2011.
  135. ^ MacHenry, Robert (1993). “The New Encyclopædia Britannica”. Chicago: Encyclopaedia Britannica Inc: 305. Bibcode:1991neb..book…..G.
  136. ^ On War by General Carl von Clausewitz. 26 February 2006. Retrieved 31 May 2007 – via Gutenberg.org.
  137. ^ Craig Hooper. “Ray Mabus greening the military”NextNavy.com. Retrieved 22 May 2012.
  138. ^ Pyman, Mark (5 March 2013). “Transparency is feasible”www.DandC.euD+C Development and Cooperation, Engagement GlobalGmbH. Retrieved 2 March 2017.
  139. “IFC Jobs Study : Assessing Private Sector Contributions to Job Creation and Poverty Reduction”. January 2013.
  140. ^ Rouse, Margaret (August 2013). “What is private sector? – Definition from WhatIs.com”Tech Target. Retrieved July 16, 2017.
  141. ^ Haufler, Virginia (2013-01-25). A Public Role for the Private Sector: Industry Self-Regulation in a Global Economy. Carnegie Endowment. ISBN 9780870033377.
  142. ^ Bauer, Shane. “Private prisons are shrouded in secrecy. I took a job as a guard to get inside-then things got crazy.”Mother Jones. N.p., 06 June 2017. Web. 10 June 2017.
  143. Bondi, André B. (2000). Characteristics of scalability and their impact on performance. Proceedings of the second international workshop on Software and performance – WOSP ’00. p. 195. doi:10.1145/350391.350432ISBN 158113195X.
  144. ^ Hill, Mark D. (1990). “What is scalability?” (PDF). ACM SIGARCH Computer Architecture News18 (4): 18. doi:10.1145/121973.121975S2CID 1232925. and
    Duboc, Leticia; Rosenblum, David S.; Wicks, Tony (2006). A framework for modelling and analysis of software systems scalability (PDF). Proceedings of the 28th international conference on Software engineering – ICSE ’06. p. 949. doi:10.1145/1134285.1134460ISBN 1595933751.
  145. ^ Laudon, Kenneth Craig; Traver, Carol Guercio (2008). E-commerce: Business, Technology, Society. Pearson Prentice Hall/Pearson Education. ISBN 9780136006459.
  146. ^ “Why web-scale is the future”Network World. 2020-02-13. Retrieved 2017-06-01.
  147. ^ Building Serverless Applications on Knative. O’Reilly Media. ISBN 9781098142049.
  148. ^ Bigley, Gregory A.; Roberts, Karlene H. (2001-12-01). “The Incident Command System: High-Reliability Organizing for Complex and Volatile Task Environments”. Academy of Management Journal44 (6): 1281–1299. doi:10.5465/3069401 (inactive 1 November 2024). ISSN 0001-4273.
  149. Jump up to:a b c Hesham El-Rewini and Mostafa Abd-El-Barr (April 2005). Advanced Computer Architecture and Parallel ProcessingJohn Wiley & Sons. p. 66. ISBN 978-0-471-47839-3.
  150. ^ Michael, Maged; Moreira, Jose E.; Shiloach, Doron; Wisniewski, Robert W. (March 26, 2007). Scale-up x Scale-out: A Case Study using Nutch/Lucene. 2007 IEEE International Parallel and Distributed Processing Symposium. p. 1. doi:10.1109/IPDPS.2007.370631ISBN 978-1-4244-0909-9.
  151. ^ “Network Functions Virtualisation (NFV); Terminology for Main Concepts in NFV”. Archived from the original (PDF) on 2020-05-11. Retrieved 2016-01-12.
  152. ^ Sadek Drobi (January 11, 2008). “Eventual consistency by Werner Vogels”. InfoQ. Retrieved April 8, 2017.
  153. ^ Gunther, Neil (2007). Guerrilla Capacity Planning: A Tactical Approach to Planning for Highly Scalable Applications and ServicesISBN 978-3540261384.
  154. ^ “The Weak Scaling of DL_POLY 3”. STFC Computational Science and Engineering Department. Archived from the original on March 7, 2014. Retrieved March 8, 2014.
  155. Continuous Service Improvement — http://customerpromise.com/continuous-service-improvement
  156. ^ ASQ: Learn About Quality — http://asq.org/learn-about-quality/continuous-improvement/overview/overview.html
  157. ^ “Operational Excellence”. Flevy. Retrieved 20 May 2015.
  158. ^ “Continuous Improvement”. American Society for Quality. Retrieved 20 May 2015.
  159. ^ “Continuous Improvement process”. Retrieved 10 Dec 2020.
  160. ^ Fryer, Karen J.; Antony, Jiju; Douglas, Alex (2007). “Critical success factors of continuous improvement in the public sector: A literature review and some key findings” (PDF). Total Quality Management19 (5): 497–517. Archived from the original (PDF) on 2016-03-04. Retrieved 2015-06-30.
  161. Jump up to:a b Imai, Masaaki (1986). Kaizen: The Key to Japan’s Competitive Success. McGraw-Hill/Irwin. ISBN 0-07-554332-X.
  162. ^ Imai, Masaaki (1997). Gemba Kaizen: A Commonsense, Low-Cost Approach to Management (1st ed.). McGraw-Hill. ISBN 0-07-031446-2.
  163. ^ Pruitt, W. Frazier; Imam, S.M. Waqas. “Expert Answers: April 2021 | ASQ”asq.org54 (4): 6.
  164. ^ Gastl, René: CIP in Environmental Management Archived 2011-02-12 at the Wayback Machine, an Abstract of Gastl, René: Kontinuierliche Verbesserung im Umweltmanagement, 2nd Ed, 2009, vdf, Zurich
  165. Jump up to:a b c Russel, J.P. (2003). “Continual Improvement Auditing” (PDF). Retrieved 6 December 2017.
  166. Jump up to:a b Massé, K. (3 April 2014). “Continuous vs Continual”. Lean Enterprise Institute. Archived from the original on December 7, 2017. Retrieved 6 December 2017.
  167. ^ “Why does ISO 9001 use ‘continual’ improvement vs ‘continuous’ improvement?”Terms & Concepts. Hycom Solutions. Retrieved 6 December 2017.
  168. ^ “The Continual Improvement vs. Continuous Improvement Dilemma…” Management Coaching & Training Services. Retrieved 6 December 2017.
  169. ^ “BSI Shop link for BS 8624”.
  170. ^ Homvela
  171.  Wells, John C. (2008). Longman Pronunciation Dictionary (3rd ed.). Longman. ISBN 978-1-4058-8118-0.
  172. ^ Jones, Daniel (2011). Roach, PeterSetter, JaneEsling, John (eds.). Cambridge English Pronouncing Dictionary (18th ed.). Cambridge University Press. ISBN 978-0-521-15255-6.
  173. ^ “privacy (n.)”Etymology Dictionary, November 17, 2020, retrieved November 18, 2020
  174. ^ Alibeigi, Ali; Munir, Abu Bakar; Karim, Md. Ershadul (2019). “Right to Privacy, A Complicated Concept to Review”SSRN Electronic Journaldoi:10.2139/ssrn.3537968ISSN 1556-5068.
  175. ^ DeCew, Judith (2015), “Privacy”, in Zalta, Edward N.; Nodelman, Uri (eds.), The Stanford Encyclopedia of Philosophy (Spring 2015 ed.), Metaphysics Research Lab, Stanford University, retrieved 2024-03-21
  176. ^ “oremus Bible Browser : Ecclesiasticus 29:21”bible.oremus.org. Retrieved 2024-03-21.
  177. ^ Hayat, Muhammad Aslam (June 2007). “Privacy and Islam: From the Quran to data protection in Pakistan”Information & Communications Technology Law16 (2): 137–148. doi:10.1080/13600830701532043ISSN 1360-0834.
  178. ^ Konvitz, Milton R. (1966). “Privacy and the Law: A Philosophical Prelude”Law and Contemporary Problems31 (2): 272–280. doi:10.2307/1190671ISSN 0023-9186JSTOR 1190671.
  179. ^ Longfellow, Erica (2006). “Public, Private, and the Household in Early Seventeenth-Century England”Journal of British Studies45 (2): 313–334. doi:10.1086/499790ISSN 0021-9371JSTOR 10.1086/499790.
  180. ^ Negley, Glenn (1966). “Philosophical Views on the Value of Privacy”Law and Contemporary Problems31 (2): 319–325. doi:10.2307/1190674ISSN 0023-9186JSTOR 1190674.
  181. ^ Central Works of Philosophy: The Nineteenth Century. McGill-Queen’s University Press. 2005. ISBN 978-0-7735-3052-2JSTOR j.cttq4963.
  182. Jump up to:a b Solove, Daniel J. (2006). “A Taxonomy of Privacy”University of Pennsylvania Law Review154 (3): 477–564. doi:10.2307/40041279ISSN 0041-9907JSTOR 40041279.
  183. ^ “4 Harvard Law Review 193 (1890)”. Groups.csail.mit.edu. 1996-05-18. Retrieved 2019-08-22.
  184. ^ Information Privacy, Official Reference for the Certified Information privacy Professional (CIPP), Swire, 2007
  185. ^ “Nineteen Eighty-four | Summary, Characters, Analysis, & Facts”Encyclopedia Britannica. Retrieved 2021-09-27.
  186. ^ Leetaru, Kalev. “As Orwell’s 1984 Turns 70 It Predicted Much Of Today’s Surveillance Society”Forbes. Retrieved 2021-09-27.
  187. Jump up to:a b c d e f g h i Solove 2010, pp. 3–4.
  188. ^ “Alan Westin is the father of modern data privacy law”Osano. 2020-07-24. Retrieved 2021-09-28.
  189. Jump up to:a b c “Silicon Valley is Listening to Your Most Intimate Moments”Bloomberg.com. Bloomberg Businessweek. 2019-12-11. Retrieved 2021-06-02.
  190. ^ “United States v. Jones”Oyez. Retrieved 2021-09-27.
  191. ^ “Riley v. California”Oyez. Retrieved 2021-09-27.
  192. ^ “Carpenter v. United States”Oyez. Retrieved 2021-09-27.
  193. ^ “17 disturbing things Snowden has taught us (so far)”The World from PRX. 30 July 2016. Retrieved 2021-09-28.
  194. ^ “Privacy vs Security: A pointless false dichotomy?”Archived from the original on 2023-01-31.
  195. ^ Ari Ezra Waldman (2021). “One Book in One Page”. Industry Unbound: The Inside Story of Privacy, Data, and Corporate PowerCambridge University Press. p. x. doi:10.1017/9781108591386ISBN 978-1-108-49242-3.
  196. ^ “The Little-Known Data Broker Industry Is Spending Big Bucks Lobbying Congress”. April 2021. Archived from the original on 2023-04-22.
  197. Jump up to:a b c “The Web Means the End of Forgetting”The New York Times. 2010-07-25. Archived from the original on 2019-03-10.
  198. Jump up to:a b c Cofone, Ignacio (2023). The Privacy Fallacy: Harm and Power in the Information Economy. New York: Cambridge University Press. ISBN 9781108995443.
  199. ^ “Privacy”Electronic Frontier Foundation.
  200. ^ “Legislative Reform”Cyber Civil Rights Initiative.
  201. ^ Ben Tarnoff (2022). “Preface: Among the Eels”. Internet for the People: The Fight for Our Digital FutureVerso Books. pp. 8–9. ISBN 978-1-83976-202-4.
  202. ^ “Fighting Identity Theft with the Red Flags Rule: A How-To Guide for Business”Federal Trade Commission. 2013-05-02. Retrieved 2021-09-28.
  203. ^ Tiku, Nitasha. “How Europe’s New Privacy Law Will Change the Web, and More”WiredISSN 1059-1028. Retrieved 2021-10-26.
  204. ^ “Children’s Online Privacy Protection Rule (“COPPA”)”Federal Trade Commission. 2013-07-25. Retrieved 2021-09-28.
  205. ^ “Fair Credit Reporting Act”Federal Trade Commission. 19 July 2013. Retrieved 2023-06-18.
  206. ^ “Facebook: active users worldwide”Statista. Retrieved 2020-10-11.
  207. ^ Hugl, Ulrike (2011), “Reviewing Person’s Value of Privacy of Online Social Networking,” Internet Research, 21(4), in press, http://www.emeraldinsight.com/journals.htm?issn=1066-2243&volume=21&issue=4&articleid=1926600&show=abstract Archived 2014-03-28 at the Wayback Machine
  208. ^ Kosinski, Michal; Stillwell, D.; Graepel, T. (2013). “Private traits and attributes are predictable from digital records of human behavior”Proceedings of the National Academy of Sciences110 (15): 5802–5805. Bibcode:2013PNAS..110.5802Kdoi:10.1073/pnas.1218772110PMC 3625324PMID 23479631.
  209. ^ “Self-portraits and social media: The rise of the ‘selfie'”BBC News. 2013-06-07. Retrieved 2021-03-17.
  210. ^ Giroux, Henry A. (2015-05-04). “Selfie Culture in the Age of Corporate and State Surveillance”. Third Text29 (3): 155–164. doi:10.1080/09528822.2015.1082339ISSN 0952-8822S2CID 146571563.
  211. ^ Dhir, Amandeep; Torsheim, Torbjørn; Pallesen, Ståle; Andreassen, Cecilie S. (2017). “Do Online Privacy Concerns Predict Selfie Behavior among Adolescents, Young Adults and Adults?”Frontiers in Psychology8: 815. doi:10.3389/fpsyg.2017.00815ISSN 1664-1078PMC 5440591PMID 28588530.
  212. ^ CTVNews.ca Staff (October 14, 2012). “In wake of Amanda Todd suicide, MPs to debate anti-bullying motion”. CTV News. Archived from the original on October 29, 2013. Retrieved October 17, 2012.
  213. ^ Boutilier, Alex (April 13, 2014). “Amanda Todd’s mother raises concerns about cyberbullying bill: Families of cyberbullying victims want legislation, but some have concerns about warrantless access to Canadians personal data”www.thestar.comArchived from the original on October 28, 2016. Retrieved September 12, 2016.
  214. ^ Todd, Carol (May 14, 2014). “Carol Todd’s Testimony regarding Bill C-13”. www.openparliament.ca. Archived from the original on September 18, 2016. Retrieved September 12, 2016.
  215. ^ “Real-Name Online Registration to Be Scrapped”The Chosun IlboArchived from the original on 2023-04-23.
  216. ^ Empirical analysis of online anonymity and user behaviors: the impact of real name policy. Hawaii International Conference on System Sciences (45th ed.). IEEE Computer Society. 2012.
  217. ^ “Law, Policies and Regulations”. 24 September 2019. Retrieved 2023-06-19.
  218. ^ “Florida Anti-Bullying Laws and Policies”. 24 September 2019. Retrieved 2023-06-19.
  219. ^ de Montjoye, Yves-Alexandre; César A. Hidalgo; Michel Verleysen; Vincent D. Blondel (March 25, 2013). “Unique in the Crowd: The privacy bounds of human mobility”Scientific Reports3: 1376. Bibcode:2013NatSR…3.1376Ddoi:10.1038/srep01376PMC 3607247PMID 23524645.
  220. ^ Athanasios S. Voulodimos and Charalampos Z. Patrikakis, “Quantifying Privacy in Terms of Entropy for Context Aware Services”, special issue of the Identity in the Information Society journal, “Identity Management in Grid and SOA”, Springer, vol. 2, no 2, December 2009
  221. ^ Whittaker, Zack (Aug 22, 2017). “AccuWeather caught sending user location data – even when location sharing is off”ZDNet. Retrieved 2021-11-22.
  222. ^ Kirk, Jeremy (March 20, 2017). “McShame: McDonald’s API Leaks Data for 2.2 Million Users”BankInfoSecurity. Retrieved 2021-11-22.
  223. ^ Popkin, Helen A.S., “Government officials want answers to secret iPhone tracking”. MSNBC, “Technolog”, April 21, 2011
  224. ^ Keizer, Gregg (2011-04-21). “Apple faces questions from Congress about iPhone tracking”ComputerworldArchived from the original on 2019-07-20.
  225. ^ Keizer, Gregg (2011-04-27). “Apple denies tracking iPhone users, but promises changes”ComputerworldArchived from the original on 2023-03-29.
  226. Jump up to:a b “Complaint for Injunctive and Other Relief” (PDF). The Superior Court of the State of Arizona In and For the County of Maricopa. 2021-06-03. Retrieved 2021-06-03.
  227. ^ “Global Digital Ad Spending 2019”Insider Intelligence. Retrieved 2023-09-30.
  228. Jump up to:a b Chen, Brian X. (2021-09-16). “The Battle for Digital Privacy Is Reshaping the Internet”The New York TimesISSN 0362-4331. Retrieved 2021-11-22.
  229. ^ Hausfeld (2024-05-16). “Privacy by default, abuse by design: EU competition concerns about Apple’s new app tracking policy”Hausfeld (in German). Retrieved 2024-06-28.
  230. ^ “Google Facing Fresh E.U. Inquiry Over Ad Technology”The New York Times. 2021-06-22. Archived from the original on 2023-04-15.
  231. ^ “EFF technologist cites Google “breach of trust” on FLoC; key ad-tech change agent departs IAB Tech Lab”Information Trust Exchange Governing Association. Retrieved April 16, 2021.
  232. ^ “Google’s FLoC Is a Terrible Idea”Electronic Frontier Foundation. 2021-03-03.
  233. ^ Kosinski, Michal; Stillwell, D.; Graepel, T. (2013). “Private traits and attributes are predictable from digital records of human behavior”Proceedings of the National Academy of Sciences110 (15): 5802–5805. Bibcode:2013PNAS..110.5802Kdoi:10.1073/pnas.1218772110PMC 3625324PMID 23479631.
  234. ^ “The Italian Constitution” (PDF). The official website of the Presidency of the Italian Republic. Archived from the original on 2016-11-27.
  235. ^ Solove 2010, p. 3.
  236. ^ Quinn, Michael J. (2009). Ethics for the Information Age. Pearson Addison Wesley. ISBN 978-0-321-53685-3.
  237. ^ “Privacy Guidelines”. OECD. Retrieved 2019-08-22.
  238. ^ Cate, Fred H.; Collen, Peter; Mayer-Schönberger, Viktor. Data Protection Principles for the 21st Century. Revising the 1980 OECD Guidelines (PDF) (Report). Archived from the original (PDF) on 2018-12-31. Retrieved 2019-02-01.
  239. ^ Jensen, Carlos (2004). Privacy policies as decision-making tools: an evaluation of online privacy noticesCHI.
  240. ^ “The Privacy Act”Home. 10 March 2023.
  241. ^ “For Your Information”. Alrc.gov.au. 2008-08-12. Retrieved 2019-08-22.
  242. ^ Privacy Amendment (Enhancing Privacy Protection) Bill 2012.
  243. ^ Branch, Legislative Services (2023-09-01). “Consolidated federal laws of Canada, Privacy Act”laws-lois.justice.gc.ca. Retrieved 2024-03-21.
  244. ^ Power, Michael (2020). Access to Information and Privacy. LexisNexis Canada Inc. pp. HAP-51.
  245. ^ Branch, Legislative Services (2019-06-21). “Consolidated federal laws of Canada, Personal Information Protection and Electronic Documents Act”laws-lois.justice.gc.ca. Retrieved 2024-03-21.
  246. Jump up to:a b Power, Michael (2020). Access to Information and Privacy. LexisNexis Canada Inc. pp. HAP-81.
  247. ^ Cofone, Ignacio (2020). “Policy Proposals for PIPEDA Reform to Address Artificial Intelligence”. Office of the Privacy Commissioner.
  248. ^ Cofone, Ignacio (2021). Class Actions in Privacy Law. Routledge.
  249. ^ Jones v. Tsige, 2012 ONCA 32 (CanLII), online: https://canlii.ca/t/fpnld.
  250. ^ Branch, Legislative Services (2020-08-07). “Consolidated federal laws of Canada, THE CONSTITUTION ACTS, 1867 to 1982”laws-lois.justice.gc.ca. Retrieved 2024-03-22.
  251. ^ Penney, Steven; Rondinelli, Vincenzo; James, Stribopoulos (2013). Criminal Procedure in Canada. LexisNexis Canada Inc. pp. 143–77.
  252. ^ “- Civil Code of Québec”www.legisquebec.gouv.qc.ca. Retrieved 2024-03-22.
  253. ^ “- Charter of human rights and freedoms”www.legisquebec.gouv.qc.ca. Retrieved 2024-03-22.
  254. ^ Zhong, Guorong (2019). “E-Commerce Consumer Privacy Protection Based on Differential Privacy”Journal of Physics: Conference Series1168 (3): 032084. Bibcode:2019JPhCS1168c2084Zdoi:10.1088/1742-6596/1168/3/032084S2CID 169731837.
  255. ^ Burghardt, Buchmann, Böhm, Kühling, Sivridis A Study on the Lack of Enforcement of Data Protection Acts Proceedings of the 3rd int. conference on e-democracy, 2009.
  256. ^ Mark Scott (3 December 2014). “French Official Campaigns to Make ‘Right to be Forgotten’ Global”. nytimes. Retrieved 14 April 2018.
  257. ^ “What Happens When a Billion Identities Are Digitized?”Yale Insights. 27 March 2020. Retrieved 2021-11-22.
  258. ^ Masiero, Silvia (2018-09-24). “Explaining Trust in Large Biometric Infrastructures: A Critical Realist Case Study of India’s Aadhaar Project”The Electronic Journal of Information Systems in Developing Countries84 (6): e12053. doi:10.1002/isd2.12053.
  259. ^ McCarthy, Julie (2017-08-24). “Indian Supreme Court Declares Privacy A Fundamental Right”NPR. Retrieved 2021-11-22.
  260. ^ Saberin, Zeenat. “India’s top court upholds validity of biometric ID card”www.aljazeera.com. Retrieved 2021-11-22.
  261. ^ Does Beckham judgment change rules?, from BBC News (retrieved 27 April 2005).
  262. ^ “Personal Information Toolkit” Archived 2009-01-03 at the Wayback Machine Information Commissioner’s Office, UK
  263. ^ DeCew, Judith (2015-01-01). Zalta, Edward N. (ed.). Privacy (Spring 2015 ed.). Metaphysics Research Lab, Stanford University.
  264. ^ “Fourth Amendment”LII / Legal Information Institute. Retrieved 2021-03-20.
  265. ^ “DOBBS v. JACKSON WOMEN’S HEALTH ORGANIZATION”LII / Legal Information Institute. Retrieved 2022-06-25.
  266. ^ Frias, Lauren. “What is Griswold v. Connecticut? How access to contraception and other privacy rights could be at risk after SCOTUS overturned Roe v. Wade”Business Insider. Retrieved 2022-06-25.
  267. ^ “The Privacy Act”Freedom of Information Act. US Department of State. 2015-05-22. Archived from the original on 2015-08-10. Retrieved 2015-11-19.
  268. ^ Children’s Online Privacy Protection Act, 15 U.S.C. § 6501 et seq.
  269. ^ Fourth Amendment to the United States Constitution
  270. ^ “Visit to the United States of America”.
  271. ^ Nissenbaum, Helen (2009). Privacy in Context Technology, Policy, and the Integrity of Social Life. Stanford, CA: Stanford University Press. ISBN 978-0804772891.
  272. Jump up to:a b c Solove 2010, pp. 15–17.
  273. ^ Warren and Brandeis, “The Right To Privacy”(1890) 4 Harvard Law Review 193
  274. Jump up to:a b c d Solove 2010, p. 19.
  275. ^ Godkin, E.L. (December 1880). “Libel and its Legal Remedy”Atlantic Monthly46 (278): 729–739.
  276. ^ Oulasvirta, Antti; Suomalainen, Tiia; Hamari, Juho; Lampinen, Airi; Karvonen, Kristiina (2014). “Transparency of Intentions Decreases Privacy Concerns in Ubiquitous Surveillance”Cyberpsychology, Behavior, and Social Networking17 (10): 633–638. doi:10.1089/cyber.2013.0585PMID 25226054.
  277. ^ Gavison, Ruth (1980). “Privacy and the Limits of Law”. Yale Law Journal89 (3): 421–471. doi:10.2307/795891JSTOR 795891.
  278. ^ Bok, Sissela (1989). Secrets : on the ethics of concealment and revelation (Vintage Books ed.). New York: Vintage Books. pp. 10–11. ISBN 978-0-679-72473-5.
  279. ^ Solove 2010, p. 24.
  280. ^ The quotation is from Alan Westin.Westin, Alan F.Blom-Cooper, Louis (1970). Privacy and freedom. London: Bodley Head. p. 7. ISBN 978-0-370-01325-1.
  281. ^ “Predicting Data that People Refuse to Disclose; How Data Mining Predictions Challenge Informational Self-Determination”openaccess.leidenuniv.nl. Retrieved 2017-07-19.
  282. ^ Mantelero, Alessandro (2014-12-01). “The future of consumer data protection in the E.U. Re-thinking the “notice and consent” paradigm in the new era of predictive analytics”Computer Law & Security Review30 (6): 643–660. doi:10.1016/j.clsr.2014.09.004ISSN 0267-3649S2CID 61135032.
  283. Jump up to:a b c d Westin, Alan (1967). Privacy and Freedom. New York: Atheneum.
  284. Jump up to:a b c d Hughes, Kirsty (2012). “A Behavioural Understanding of Privacy and Its Implications for Privacy Law”. The Modern Law Review75 (5): 806–836. doi:10.1111/j.1468-2230.2012.00925.xS2CID 142188960.
  285. ^ Johnson, Carl A. (1974). “Privacy as Personal Control”Man-environment Interactions: Evaluations and Applications: Part 26: 83–100.
  286. ^ Johnson 1974, p. 90.
  287. ^ Johnson 1974, pp. 85–89.
  288. ^ Magnani, Lorenzo (2007). “4, “Knowledge as Duty: Cyberprivacy””. Morality in a Technological World: Knowledge as Duty. Cambridge: Cambridge University Press. pp. 110–118. doi:10.1017/CBO9780511498657ISBN 9780511498657.
  289. ^ Magnani (2007), p. 116, ch. 4, “Knowledge as Duty: Cyberprivacy”.
  290. ^ Johnson 1974, pp. 90–92.
  291. ^ Solove 2010, p. 21.
  292. ^ Posner, Richard A. (1983). The economics of justice (5. print ed.). Cambridge, MA: Harvard University Press. p. 271ISBN 978-0-674-23526-7.
  293. Jump up to:a b Solove 2010, pp. 22–23.
  294. Jump up to:a b c Reiman, Jeffrey (1976). “Privacy, Intimacy, and Personhood”. Philosophy & Public Affairs.
  295. Jump up to:a b c d Benn, Stanley. “Privacy, freedom, and respect for persons”. In Schoeman, Ferdinand (ed.). Philosophical Dimensions of Privacy: An Anthology. New York: Cambridge University Press.
  296. Jump up to:a b c d e f Kufer, Joseph (1987). “Privacy, Autonomy, and Self-Concept”. American Philosophical Quarterly.
  297. ^ Goffman, Erving (1968). Asylums: Essays on the Social Situation of Mental Patients and Other Inmates. New York: Doubleday.
  298. Jump up to:a b c Altman, Irwin (1975). The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding. Monterey: Brooks/Cole Publishing Company.[ISBN missing]
  299. Jump up to:a b c Solove 2010, p. 35.
  300. ^ Rachels, James (Summer 1975). “Why Privacy is Important”. Philosophy & Public Affairs4 (4): 323–333. JSTOR 2265077.
  301. ^ Citron, Danielle (2019). “Sexual Privacy”Yale Law Journal128: 1877, 1880.
  302. ^ H. Jeff Smith (1994). Managing Privacy: Information Technology and Corporate America. UNC Press Books. ISBN 978-0807821473.
  303. Jump up to:a b “Fixing the Fourth Amendment with trade secret law: A response to Kyllo v. United States”Georgetown Law Journal. 2002.
  304. ^ “Security Recommendations For Stalking Victims”. Privacyrights. 11 January 2012. Archived from the original on 11 January 2012. Retrieved 2 February 2008.
  305. ^ “FindLaw’s Writ – Amar: Executive Privilege”. Writ.corporate.findlaw.com. 2004-04-16. Retrieved 2012-01-01.
  306. ^ Popa, C., et al., “Managing Personal Information: Insights on Corporate Risk and Opportunity for Privacy-Savvy Leaders”, Carswell (2012), Ch. 6
  307. ^ Flaherty, D. (1989). Protecting privacy in surveillance societies: The federal republic of Germany, Sweden, France, Canada, and the United States. Chapel Hill, U.S.: The University of North Carolina Press.
  308. ^ Posner, R. A. (1981). “The economics of privacy”. The American Economic Review71 (2): 405–409.
  309. ^ Lessig (2006), p. 229: “In my view, the protection of privacy would be stronger if people conceived of the right as a property right.”.
  310. ^ Lessig (2006).
  311. ^ Johnson, Deborah (2009). Beauchamp; Bowie; Arnold (eds.). Ethical theory and business (8th ed.). Upper Saddle River, NJ: Pearson/Prentice Hall. pp. 428–442. ISBN 978-0-13-612602-7.
  312. ^ Regan, P. M. (1995). Legislating privacy: Technology, social values, and public policy. Chapel Hill: The University of North Carolina Press.[ISBN missing][page needed]
  313. ^ “United Nations Universal Declaration of Human Rights”. 1948. Archived from the original on 2014-12-08.
  314. ^ Shade, L.R. (2008). “Reconsidering the right to privacy in Canada”. Bulletin of Science, Technology & Society, 28(1), 80–91.
  315. ^ Watt, Eliza. “The role of international human rights law in the protection of online privacy in the age of surveillance.” In 2017 9th International Conference on Cyber Conflict (CyCon), pp. 1–14. IEEE, 2017.
  316. Jump up to:a b Swartz, J., “‘Opting In’: A Privacy Paradox”, The Washington Post, 03 Sep 2000, H.1.
  317. ^ Bedrick, B., Lerner, B., Whitehead, B. “The privacy paradox: Introduction”, News Media and the Law, Washington, DC, Volume 22, Issue 2, Spring 1998, pp. P1–P3.
  318. ^ J. Sweat “Privacy paradox: Customers want control – and coupons”, Information Week, Manhasset Iss, 781, April 10, 2000, p. 52.
  319. ^ “Volume 11, Number 9”firstmonday.org. 4 September 2006. Retrieved 2019-11-25.
  320. ^ Taddicken, Monika (January 2014). “The ‘Privacy Paradox’ in the Social Web: The Impact of Privacy Concerns, Individual Characteristics, and the Perceived Social Relevance on Different Forms of Self-Disclosure”Journal of Computer-Mediated Communication19 (2): 248–273. doi:10.1111/jcc4.12052.
  321. ^ Nemec Zlatolas, Lili; Welzer, Tatjana; Heričko, Marjan; Hölbl, Marko (April 2015). “Privacy antecedents for SNS self-disclosure: The case of Facebook”Computers in Human Behavior45: 158–167. doi:10.1016/j.chb.2014.12.012.
  322. ^ Baruh, Lemi; Secinti, Ekin; Cemalcilar, Zeynep (February 2017). “Online Privacy Concerns and Privacy Management: A Meta-Analytical Review: Privacy Concerns Meta-Analysis”Journal of Communication67 (1): 26–53. doi:10.1111/jcom.12276.
  323. ^ Gerber, Nina; Gerber, Paul; Volkamer, Melanie (August 2018). “Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior”Computers & Security77: 226–261. doi:10.1016/j.cose.2018.04.002S2CID 52884338.
  324. ^ Kaiser, Florian G.; Byrka, Katarzyna; Hartig, Terry (November 2010). “Reviving Campbell’s Paradigm for Attitude Research”Personality and Social Psychology Review14 (4): 351–367. doi:10.1177/1088868310366452ISSN 1088-8683PMID 20435803S2CID 5394359.
  325. ^ Acquisti, A., & Gross, R. (2006, June). Imagined communities: Awareness, information sharing, and privacy on the Facebook. In Privacy enhancing technologies (pp. 36–58). Springer Berlin Heidelberg.
  326. ^ S. Livingstone (2008). “Taking risky opportunities in youthful content creation: teenagers’ use of social networking sites for intimacy, privacy and self-expression” (PDF). New Media & Society10 (3): 393–411. doi:10.1177/1461444808089415S2CID 31076785.
  327. ^ Utz, S., & Kramer, N. (2009). The privacy paradox on social network sites revisited: The role of individual characteristics and group norms. Cyberpsychology: Journal of Psychosocial Research on Cyberspace, article 1. [1] Archived 2016-04-13 at the Wayback Machine
  328. Jump up to:a b Barth, Susanne; de Jong, Menno D. T. (2017-11-01). “The privacy paradox – Investigating discrepancies between expressed privacy concerns and actual online behavior – A systematic literature review”Telematics and Informatics34 (7): 1038–1058. doi:10.1016/j.tele.2017.04.013ISSN 0736-5853.
  329. Jump up to:a b Kokolakis, Spyros (January 2017). “Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon”. Computers & Security64: 122–134. doi:10.1016/j.cose.2015.07.002S2CID 422308.
  330. ^ Barth, Susanne; de Jong, Menno D. T.; Junger, Marianne; Hartel, Pieter H.; Roppelt, Janina C. (2019-08-01). “Putting the privacy paradox to the test: Online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial resources”Telematics and Informatics41: 55–69. doi:10.1016/j.tele.2019.03.003ISSN 0736-5853.
  331. Jump up to:a b Frik, Alisa; Gaudeul, Alexia (2020-03-27). “A measure of the implicit value of privacy under risk”. Journal of Consumer Marketing37 (4): 457–472. doi:10.1108/JCM-06-2019-3286ISSN 0736-3761S2CID 216265480.
  332. ^ Burkhardt, Kai. “The privacy paradox is a privacy dilemma”Internet Citizen. Retrieved 2020-01-10.
  333. ^ Egelman, Serge; Felt, Adrienne Porter; Wagner, David (2013), “Choice Architecture and Smartphone Privacy: There’s a Price for That”, The Economics of Information Security and Privacy, Springer Berlin Heidelberg, pp. 211–236, doi:10.1007/978-3-642-39498-0_10ISBN 978-3-642-39497-3S2CID 11701552
  334. Jump up to:a b Belliger, Andréa; Krieger, David J. (2018), “2. The Privacy Paradox”, Network Publicy Governance, Digitale Gesellschaft, vol. 20, transcript Verlag, pp. 45–76, doi:10.14361/9783839442135-003ISBN 978-3-8394-4213-5S2CID 239333913
  335. ^ Laufer, Robert S.; Wolfe, Maxine (July 1977). “Privacy as a Concept and a Social Issue: A Multidimensional Developmental Theory”Journal of Social Issues33 (3): 22–42. doi:10.1111/j.1540-4560.1977.tb01880.x.
  336. ^ Culnan, Mary J.; Armstrong, Pamela K. (February 1999). “Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation”Organization Science10 (1): 104–115. doi:10.1287/orsc.10.1.104ISSN 1047-7039S2CID 54041604.
  337. ^ Trepte, Sabine; Reinecke, Leonard; Ellison, Nicole B.; Quiring, Oliver; Yao, Mike Z.; Ziegele, Marc (January 2017). “A Cross-Cultural Perspective on the Privacy Calculus”Social Media + Society3 (1): 205630511668803. doi:10.1177/2056305116688035ISSN 2056-3051.
  338. ^ Krasnova, Hanna; Spiekermann, Sarah; Koroleva, Ksenia; Hildebrand, Thomas (June 2010). “Online Social Networks: Why We Disclose”Journal of Information Technology25 (2): 109–125. doi:10.1057/jit.2010.6ISSN 0268-3962S2CID 33649999.
  339. Jump up to:a b c d e Solove 2010, p. 101.
  340. ^ Prosser, William (1960). “Privacy”California Law Review48 (383): 389. doi:10.2307/3478805JSTOR 3478805.
  341. Jump up to:a b c Solove 2010, p. 103.
  342. ^ Zhou, Yinghui; Lu, Shasha; Ding, Min (2020-05-04). “Contour-as-Face Framework: A Method to Preserve Privacy and Perception”Journal of Marketing Research57 (4): 617–639. doi:10.1177/0022243720920256ISSN 0022-2437S2CID 218917353.
  343. ^ Esteve, Asunción (2017). “The business of personal data: Google, Facebook, and privacy issues in the EU and the USA”International Data Privacy Law7 (1): 36–47. doi:10.1093/idpl/ipw026.
  344. Jump up to:a b c d e f g h i j k l m n o p q r s t Solove 2010, pp. 104–05.
  345. ^ “How to Encrypt Email (Gmail, Outlook, iOS, Yahoo, Android, AOL)”Panda Security Mediacenter. 2021-03-02. Retrieved 2021-11-22.
  346. ^ “Signal Messenger: Speak Freely”Signal Messenger. Retrieved 2021-11-22.
  347. ^ Lee, Micah (2015-11-12). “Edward Snowden Explains How To Reclaim Your Privacy”The Intercept. Retrieved 2024-01-29.
  348. ^ Cheng, Evelyn (2017-08-29). “Dark web finds bitcoin increasingly more of a problem than a help, tries other digital currencies”CNBC. Retrieved 2024-01-29.
  349. ^ Ell, Kellie (2018-07-13). “Coinbase considers adding five new coins to its platform”CNBC. Retrieved 2024-01-29.
  350. ^ “Anonymizers vs. VPNs: Everything You Need to Know”Privacy & VPN Blog – Orchid. 2021-05-11. Retrieved 2022-01-22.
  351. Jump up to:a b “7 Tips to Manage Your Identity and Protect Your Privacy Online”Stay Safe Online. Retrieved 2021-11-22.
  352. ^ Obar, J. A.; Oeldorf-Hirsch, A. (2022). “Older Adults and ‘The Biggest Lie on the Internet’: From Ignoring Social Media Policies to the Privacy Paradox”International Journal of Communication16: 4779–4800. Retrieved 4 March 2025.
  353. ^ Gordon, Whitson (25 January 2019). “How to Protect Your Digital Privacy”The New York Times. Retrieved 2021-11-22.
  354. ^ “Your Technology Is Tracking You. Take These Steps For Better Online Privacy : Life Kit”NPR.org. Retrieved 2021-11-22.
  355. ^ “David Attenborough: zoos should use peepholes to respect gorillas’ privacy”The GuardianAgence France-Presse. 18 October 2016. Retrieved 10 August 2022.
  356. Jump up to:a b Pepper, Angie (December 2020). “Glass Panels and Peepholes: Nonhuman Animals and the Right to Privacy”Pacific Philosophical Quarterly101 (4): 628–650. doi:10.1111/papq.12329ISSN 0279-0750.
  357. ^ Eveleth, Rose (31 January 2020). “Animals Need Digital Privacy Too”Wired. Retrieved 10 August 2022.
  358. Henry, Shawn Lawton; Abou-Zahra, Shadi; Brewer, Judy (2014). The Role of Accessibility in a Universal Web. Proceeding W4A ’14 Proceedings of the 11th Web for All Conference Article No. 17. ISBN 978-1-4503-2651-3. Retrieved 2014-12-17.
  359. ^ “What is assistive technology?”washington.edu. Archived from the original on 2019-01-19. Retrieved 2018-07-02.
  360. ^ “Federal Communications Commission”. FCC on Telecommunications Accessibility for the Disabled. 1999.
  361. ^ Goldberg, L. (1996). “Electronic Curbcuts: Equitable Access to the Future”Getty Center for the History of Art and the Humanities and the Getty Art History Information Program, Cyberspace/Public Space: The Role of Arts and Culture in Defining a Virtual Public Sphere. Archived from the original on April 27, 1999.
  362. ^ Jacobs, S. (1999). “Section 255 of the Telecommunications Act of 1996: Fueling the Creation of New Electronic Curbcuts”.
  363. ^ Valdes, L. (2003). “Accessibility on the Internet”.
  364. ^ Brewer, J. “Access to the World Wide Web: Technical and Policy Aspects”. In Preiser, W.; Ostroff, E. (eds.). Universal Design Handbook (1st ed.). New York: MacGraw-Hill.
  365. ^ “Accessibility, Usability, and Inclusion”Web Accessibility Initiative. Retrieved 2020-07-05.
  366. ^ “The Concept of Universal Design”udeworld.com. Archived from the original on 2018-07-04. Retrieved 2018-07-02.
  367. ^ Lisney, Eleanor; Bowen, Jonathan P.; Hearn, Kirsten; Zedda, Maria (2013). “Museums and Technology: Being Inclusive Helps Accessibility for All”. Curator: The Museum Journal56 (3): 353. doi:10.1111/cura.12034.
  368. ^ Norberto Rocha, Jessica; Massarani, Luisa; de Abreu, Willian; Inacio, Gustavo; Molenzani, Aline (2020). “Investigating accessibility in Latin American science museums and centers”Annals of the Brazilian Academy of Sciences92 (1): e20191156. doi:10.1590/0001-3765202020191156PMID 32321029.
  369. ^ “Convention on the Rights of Persons with Disabilities (CRPD) | United Nations Enable”un.org. 14 May 2015. Retrieved 2018-07-02.
  370. ^ “Accessibility Tools: When is a facility considered accessible?”fs.fed.us. Retrieved 2018-07-02.
  371. ^ “Section508.gov | GSA Government-wide IT Accessibility Program”section508.gov. Retrieved 2018-07-02.
  372. ^ “An Overview of the Americans With Disabilities Act | ADA National Network”adata.org. Retrieved 2018-07-02.
  373. ^ “Home – United States Access Board”access-board.gov. Retrieved 2018-07-02.
  374. ^ “JAN – Job Accommodation Network”askjan.org. Retrieved 2018-07-02.
  375. ^ AG (July 2016). “Disability Discrimination Act 1992”legislation.gov.au. Retrieved 2018-07-02.
  376. ^ “South Africa. Promotion of Equality and Prevention of Unfair Discrimination Act, 2000”ilo.org. Retrieved 2018-07-02.
  377. ^ “Equality Act 2010: guidance”GOV.UK. Retrieved 2018-07-02.
  378. ^ Ockersz, Lynn (8 November 2009). “Landmark Supreme Court ruling – A fillip for accessibility rights of disabled”. Upali Newspapers – The Sunday Island. p. 17. Retrieved 2010-01-26.
  379. ^ “Ikke tilgjengelig:Lov om forbud mot diskriminering på grunn av nedsatt funksjonsevne (diskriminerings- og tilgjengelighetsloven) – Lovdata”lovdata.no.
  380. ^ “Lei Brasileira de Inclusão da Pessoa com Deficiência (Estatuto da Pessoa com Deficiência)”planalto.gov.br.
  381. ^ “Canada’s first federal accessibility legislation receives Royal Assent”. Employment and Social Development Canada. 21 June 2019. Retrieved 18 September 2019.
  382. ^ “About the AODA – Accessibility Ontario”accessontario.com. Retrieved 2018-07-02.
  383. ^ “EU disability strategy 2010–20: access and rights”. European Commission. Retrieved November 12, 2012.
  384. ^ “European Accessibility Act: legislative initiative to improve accessibility of goods and services in the Internal Market” (PDF). European Commission. September 2012. Retrieved 13 June 2014.
  385. ^ “European Accessibility Act proposed for 2012”Eurocities. Retrieved November 12, 2012.
  386. ^ “What is Adaptive Technology? // ACT Center”actcenter.missouri.edu. Retrieved 2018-07-02.
  387. ^ “HTML input autocomplete Attribute”w3schools.com. Retrieved 2018-07-02.
  388. ^ “What is Occupational Therapy?”aota.org. Retrieved 2018-07-02.
  389. ^ “Disability Employment Resources by Topic”. U.S. Department of Labor – Office of Disability Employment Policy. Retrieved November 30, 2012.
  390. ^ “Workers with a Disability Less Likely to be Employed, More Likely to Hold Jobs with Lower Earnings, Census Bureau Reports”. United States Census Bureau Newsroom. Retrieved 30 April 2014.
  391. Jump up to:a b Kumar, Arun; Sonpal, Deepa; Hiranandani, Vanmala (2012). “Trapped Between Ableism And Neoliberalism: Critical Reflections On Disability And Employment In India”Disability Studies Quarterly32 (3): n.p. doi:10.18061/dsq.v32i3.3235. Retrieved November 30, 2012.
  392. ^ “Nearly two-thirds of global workforce in the ‘informal’ economy – UN study”UN News. 2018-04-30. Retrieved 2018-07-02.
  393. Jump up to:a b Geisen, Thomas; Henry George Harder (2011). Disability Management and Workplace Integration: International Research Findings. Gower Publishing. p. 165. ISBN 9781409418887.
  394. ^ Dimond, Bridget C. (2009). Legal Aspects of Physiotherapy. John Wiley & Sons. pp. 263ISBN 9781405176156.
  395. ^ Dimond, Bridget C. (2011). Legal Aspects of Occupational Therapy. John Wiley & Sons. pp. n.p. ISBN 9781444348163.
  396. ^ Disability Discrimination Act 1995: Code of Practice; Employment and Occupation. Disability Rights Commission. 2004. p. 5. ISBN 9780117034198.
  397. ^ “What is BRT? – Institute for Transportation and Development Policy”Institute for Transportation and Development Policy. Retrieved 2018-07-02.
  398. ^ “Community planning in the devolved UK”The Knowledge Exchange Blog. 2017-01-25. Retrieved 2018-07-02.
  399. ^ “Local Transport Plan | PLYMOUTH.GOV.UK”plymouth.gov.uk. Archived from the original on 2018-07-02. Retrieved 2018-07-02.
  400. ^ Office of the Deputy Prime Minister – Social Exclusion Unit: “Making the Connections: Final Report on Transport and Social Exclusion Archived 2010-09-07 at the UK Government Web Archive“. February 2003.
  401. ^ Department of Transport & Transport Scotland: “Accessible Train and Station Design for Disabled People: A Code of Practice“. July 2008.
  402. ^ “Railways Act 1993”legislation.gov.uk. Expert Participation. Retrieved 2018-07-02.
  403. ^ Topham, Gwyn (5 August 2021). “South Western Railway launches 10 minutes’ notice assistance scheme”The GuardianArchived from the original on 5 August 2021. Retrieved 5 August 2021.
  404. ^ “Convention on the Rights of Persons with Disabilities”Office of the High Commissioner for Human Rights (OHCHR). 12 December 2006. Retrieved 30 October 2024.
  405. Jump up to:a b Lawson, Anna; Eskytė, Ieva; Orchard, Maria; Houtzager, Dick; De Vos, Edwin Luitzen (2022-06-26). “Pedestrians with Disabilities and Town and City Streets: From Shared to Inclusive Space?”The Journal of Public Space7 (2): 41–62. doi:10.32891/jps.v7i2.1603ISSN 2206-9658.
  406. ^ Occupational therapy research on assistive technology and physical environmental issues: A literature review, Fange et al. (2006), Canadian Journal of Occupational Therapy
  407. ^ Changes in accessibility and usability in housing: an exploration of the housing adaptation process (2005), Fange and Iwarsson, Occupational Therapy International
  408. ^ Accessibility and usability in housing: construct validity and implications for research and practice (2003), Fange and Iwarsson, Disability and Rehabilitation
  409. ^ “Visitability | WBDG Whole Building Design Guide”wbdg.org. Retrieved 2018-07-02.
  410. ^ “Accessible Home Design: Information & Ideas”Disabled World. Retrieved 2018-07-02.
  411. ^ “Government data reveals ‘accessible homes crisis’ for disabled people”. Home Care Insight. 13 July 2020. Retrieved 30 August 2020.
  412. ^ “STA: Disabled take Slovenia to Human Rights Court over polling stations accessibility”english.sta.si. Retrieved 2020-01-14.
  413. ^ “HUDOC – European Court of Human Rights”hudoc.echr.coe.int. Retrieved 2020-01-14.
  414. ^ “Top European Court to Rule on Making All Polling Stations Accessible in Europe”Wheelchair Accessible Lifestyle. 2020-03-10. Retrieved 2020-03-15.
  415. ^ “Better Web Browsing: Tips for Customizing Your Computer”. World Wide Web Consortium.
  416. ^ “Accessibility”Apple. Retrieved 2020-08-31.
  417. ^ “Android accessibility overview – Android Accessibility Help”support.google.com. Retrieved 2020-08-31.
  418. ^ “Accessibility Technology & Tools”Accessibility. Retrieved 2020-08-31.
  419. ^ “Speech and Communication Disorders”. National Institutes of Health.
  420. ^ “Hearing Disorders and Deafness”. National Library of Medicine.
  421. ^ “Visual Impairment and Blindness”. National Library of Medicine.
  422. ^ Forssman, S (1955). “Pre-employment and periodical health examinations, job analysis and placement of workers”Bulletin of the World Health Organization13 (4): 495–503. PMC 2538128PMID 13276805.
  423. ^ Clark, J. A.; Roemer, R. B. (April 1977). “Voice Operated Wheelchair”. Arch Phys Med Rehabil58 (4): 169–75. PMID 849131.
  424. ^ “Definition of hearing loss – Mild, Moderate, Severe & Profound – hear-it.org”. Retrieved 2018-07-02.
  425. ^ Kipp, Michael; Nguyen, Quan; Heloir, Alexis; Matthes, Silke (October 2011). “The proceedings of the 13th international ACM SIGACCESS conference on Computers and accessibility – ASSETS ’11”. Proceedings of the 13th International ACM SIGACCESS Conference on Computers and Accessibility (ASSETS-11). 13th ACM Sigaccess Conference on Computers and Accessibility. Dundee, Scotland: Association for Computing Machinery. pp. 107–114. doi:10.1145/2049536.2049557ISBN 9781450309202.
  426. ^ World Federation of the DeafWorld Association of Sign Language Interpreters (14 March 2018). WFD and WASLI Statement on Use of Signing Avatars (Report). p. 2. Retrieved 22 September 2020.
  427. ^ “Deluxe Launches First Brazilian Sign Language (LIBRAS) Localization Service Outside Brazil”Cision PR Newswire. Deluxe Entertainment Services Group Inc. through Cision PR Newswire. 18 Sep 2017. Retrieved 14 Nov 2023.
  428. ^ “Accessibility & The Audio Track File”Cinepedia. Retrieved 14 November 2023.
  429. ^ “Speech Synthesis Markup Language (SSML) Version 1.0”w3.org.
  430. ^ “Speech Recognition Grammar Specification Version 1.0”w3.org.
  431. ^ “WAI Resources on Introducing Web Accessibility”Web Accessibility InitiativeW3C. Retrieved 18 June 2014.
  432. ^ Section 508: 508 Training.
  433. ^ BS 8878:2010 Web accessibility – Code of Practice.
  434. ^ ISO 30071-1.
  435. ^ PAS 78 Archived 2015-07-03 at the Wayback Machine.
  436. ^ BS 8878.
  437. ^ BBC My Web My WayBBC, UK.
  438. ^ Example of an accessibility statement written by the lead-author of BS 8878.
  439. ^ “MCI asks all medical institutions to be ‘accessible'”The Hindu. 18 April 2013. Retrieved 21 April 2013.
  440. ^ “Making assessments accessible”Jisc. Retrieved 2020-08-17. Accessibility must be considered from the outset when designing assessments, otherwise disabled learners could be unintentionally disadvantaged.
  441. ^ Roelofs, Erik (2019), Veldkamp, Bernard P.; Sluijter, Cor (eds.), “A Framework for Improving the Accessibility of Assessment Tasks”, Theoretical and Practical Advances in Computer-based Educational Measurement, Methodology of Educational Measurement and Assessment, Cham: Springer International Publishing, pp. 21–45, doi:10.1007/978-3-030-18480-3_2ISBN 978-3-030-18480-3
  442. ^ Klein, Alyson. “No Child Left Behind Overview: Definitions, Requirements, Criticisms, and More”Education Week. Bethesda MD: Editorial Projects in Education. ISSN 0277-4232OCLC 07579948. Archived from the original on 2022-08-26. Retrieved 2018-07-02.
  443. ^ “Executive Summary of the No Child Left Behind Act of 2001”www2.ed.gov. 2007-11-20. Retrieved 2018-07-02.
  444. ^ “Peabody College of Education and Human Development | Vanderbilt University”. Peabody.vanderbilt.edu. 2012-07-30. Archived from the original on 2011-09-27. Retrieved 2012-08-13.
  445. Felicia, Patrick (2011). Handbook of Research on Improving Learning and Motivation. IGI Global. p. 1003. ISBN 978-1609604967.
  446. ^ The Out of Eden Walk: An Experiential Learning Journey from the Virtual to the Real, Edutopia, January 3, 2014. Retrieved 2016-03-16
  447. ^ Action Learning – How does it work in practice? MIT Sloan Management. Retrieved 2016-03-16 Archived 2016-03-08 at the Wayback Machine
  448. ^ The Power of Experiential Learning, 4-H Cooperative Curriculum System. Retrieved 2016-03-16 Archived 2016-03-06 at the Wayback Machine
  449. ^ Beard, Colin (2010). The Experiential Learning Toolkit: Blending Practice with Concepts. Kogan Page Publishers. p. 20. ISBN 9780749459345.
  450. Jump up to:a b Itin, C. M. (1999). Reasserting the Philosophy of Experiential Education as a Vehicle for Change in the 21st Century. The Journal of Physical Education 22(2), p. 91-98.
  451. ^ Breunig, Mary C. (2009). “Teaching Dewey’s Experience and Education Experientially”. In Stremba, Bob; Bisson, Christian A. (eds.). Teaching Adventure Education Theory: Best Practices. Human Kinetics. p. 122. ISBN 9780736071260.
  452. ^ “Experiential Learning Theory”Western Governors University. 2021-08-11. Retrieved 2024-05-11.
  453. ^ Nicomachean Ethics, Book 2, Chase translation (1911).
  454. ^ Dixon, Nancy M.; Adams, Doris E.; Cullins, Richard (1997). “Learning Style”Assessment, Development, and Measurement. American Society for Training and Development. p. 41. ISBN 9781562860493.
  455. ^ Hawtrey, Kim (2007). “Using Experiential Learning Techniques”. Journal of Economic Education38 (2): 143–152. doi:10.3200/JECE.38.2.143-152S2CID 144914124ProQuest 235244213.
  456. ^ McCarthy, P. R., & McCarthy, H. M. (2006). When Case Studies Are Not Enough: Integrating Experiential Learning Into Business Curricula. Journal of Education for Business, 81(4), pp. 201–204.
  457. ^ Kraft, R. G. (1994).Bike riding and the art of learning.In L. B. Barnes, C. Roland Christensen, & A. J. Hansen (Eds.), Teaching and the case method.Boston: Harvard Business School Press.
  458. ^ Loo, R. (2002). A Meta-Analytic Examination of Kolb’s Learning Style Preferences Among Business Majors. Journal of Education for Business, 77:5, 252–256
  459. Jump up to:a b c Kolb, D. (1984). Experiential Learning: experience as the source of learning and development. Englewood Cliffs, NJ: Prentice Hall. p. 21
  460. ^ “A Leading UK University | University of Leicester”www2.le.ac.uk. Archived from the original on May 16, 2013. Retrieved October 28, 2012.
  461. ^ Merriam, S. B., Caffarella, R. S., & Baumgartner, L. M. (2007). Learning in adulthood: a comprehensive guide. San Francisco: John Wiley & Sons, Inc.
  462. Jump up to:a b c Moon, J. (2004). A Handbook of Reflective and Experiential Learning:Theory and Practice. London: Routledge Falmer. p. 126.
  463. ^ Kolb, D (1984). Experiential Learning as the Science of Learning and Development. Englewood Cliffs, NJ: Prentice Hall.
  464. ^ Chickering, A (1977). Experience and Learning. New York: Change Magazine Press. p. 63.
  465. ^ Hutton, M. (1980). Learning from action: a conceptual framework, in S. Warner Weil and M. McGill (eds) Making Sense of Experiential Learning. Milton Keynes: SRHE/Open University Press. pp. 50–9, p. 51.
  466. ^ Kompf, M., & Bond, R. (2001). Critical reflection in adult education. In T. Barer-Stein & M. Kompf (Eds.), The craft of teaching adults (p. 55). Toronto, ON: Irwin.
  467. Jump up to:a b c Jacobson, M. & Ruddy, M. (2004) Open to outcome (p. 2). Oklahoma City, OK: Wood ‘N’ Barnes.
  468. ^ Pfeiffer, W. & Jones, J. E. (1975). A Handbook of Structured Experiences for Human Relations Training. La Jolla, California: University Associates.
  469. ^ Rodrigues, C. A. (2004). The importance level of ten teaching/learning techniques as rated by university business students and instructors. Journal of Management Development, 23(2), pp. 169–182.
  470. ^ ELENA project leader
  471. ^ CertificationPoint
  472. ^ Staff, Noodle. “41 Choose Your Future: Early College STEM Schools”. Retrieved 2019-09-19.
  473. ^ Out Teach
  474. ^ Life Lab
  475. ^ Nature Explore
  476. ^ National Wildlife Federation
  477. ^ The European Youth Parliament
  478. ^ Clark, J., & White, G. (2010). “Experiential Learning: A Definitive Edge In The Job Market”. American Journal of Business Education, 3(2), pp. 115–118.
  479. ^ “Learning Styles: A Misguided Attempt to Highlight Individual Differences in Learners”. 25 May 2017.
  480. Jump up to:a b Loo, R. (2002). “A Meta-Analytic Examination of Kolb’s Learning Style Preferences Among Business Majors”. Journal of Education for Business, 77:5, 252–256
  481. ^ “Experiential Learning”. 8 July 2014.
  482. ^ Faria, Anthony J. (December 1990). “4” (PDF). Business Simulation Games after Thirty Years: Current Usage Levels in the United States in Gentry (ed.) Guide to Business Gaming and Experiential Learning. The University of Michigan: Nichols/GP Pub., 1990. pp. 36–47. ISBN 978-0893973698. Archived from the original (PDF) on 20 May 2014. Retrieved 12 March 2014.
  483. ^ “David A. Kolb on experiential learning”infed.org. 2013-04-26. Retrieved 2018-10-15.
  484. ^ Greenaway, Tim Pickles and Roger. “Experiential learning articles + critiques of David Kolb’s theory”www.reviewing.co.uk. Retrieved 2018-10-15.
  485. ^ Council, Young Entrepreneur. “Seven Mentorship Methods And Opportunities Entrepreneurs Should Remember”Forbes. Retrieved 2018-10-15.
  486. ^ Stavenga de Jong, J. A., Wierstra, R. F. A. and Hermanussen, J. (2006) “An exploration of the relationship between academic and experiential learning approaches in vocational education”, British Journal of Educational Psychology. 76;1. pp. 155–169.
  487. ^ “Bus Driver Simulation Training”FAAC. Retrieved 13 January 2020.
  488. ^ “The Benefits of Experiential Learning”.
  489. Speck, M. & Knipe, C. (2005) Why can’t we get it right? Designing high-quality professional development for standards-based schools(2nd ed.). Thousand Oaks: Corwin Press[need quotation to verify]
  490. ^ Summer, Gail (2006-01-01). “Professional Education/Liberal Arts Education: Not a Case of Either-Or but Both-And”Intersections2006 (24). Available at: http://digitalcommons.augustana.edu/intersections/vol2006/iss24/6
  491. Jump up to:a b National Professional Development Center on Inclusion. (2008). “What do we mean by professional development in the early childhood field?” Archived 2018-07-24 at the Wayback Machine. Chapel Hill: The University of North Carolina, FPG Child Development Institute.
  492. ^ Golding, L. & Gray, I. (2006).Continuing professional development for clinical psychologists:A practical handbook. The British Psychological Society. Oxford: Blackwell Publishing
  493. ^ Jasper, M. (2006).Professional development, reflection, and decision-making. Oxford: Blackwell Publishing.
  494. ^ Murphy-Latta, Terry (2008). A Comparative Study of Professional Development Utilizing the Missouri Commissioner’s Award of Excellence and Indicators of Student Achievement. p. 19. ISBN 9780549489900. Retrieved 2013-08-12. Throughout the history of American education, numerous theories and issues have been emphasized as important factors in teaching and learning. The need for professional development for school staff came to the forefront in the 1960s.[permanent dead link]
  495. ^ “Professional Development and Renewal of Standard Teaching License”ArkansasEd.org. Arkansas Department of Education. Archived from the original on 30 April 2009.
  496. ^ “Indiana Certification Renewal | Find Out How to Renew Indiana Teaching Certificates on”. Teacher-world.com. Archived from the original on 2013-09-28. Retrieved 2014-03-20.
  497. ^ “Recertification Q and A – Massachusetts Department of Elementary and Secondary Education”. Doe.mass.edu. 2014-02-03. Retrieved 2014-03-20.
  498. ^ “Georgia Teacher Certification Information – Georgia PLU’s Resources Online – GA Teaching License Resources”. Teachersprofessionallearningunits.com. Archived from the original on 2013-12-16. Retrieved 2014-03-20.
  499. ^ “Continuing Competence”College of Registered Nurses of Manitoba. April 2004. Archived from the original on 31 May 2008.
  500. ^ “Continuing Education”North Dakota Board of Nursing. Archived from the original on 7 February 2009.

Share

× How can I help you?