53,895 research outputs found

    A Review of the Open Educational Resources (OER) Movement: Achievements, Challenges, and New Opportunities

    Get PDF
    Examines the state of the foundation's efforts to improve educational opportunities worldwide through universal access to and use of high-quality academic content

    Student experiences of technology integration in school subjects: A comparison across four middle schools

    Get PDF
    This research examined student perspectives on their in-school, subject specific, technology use in four U.S. public schools. Considering students’ perspectives may provide a significant reframing of adult-created rhetoric of the utopian power of digital technologies for changing teaching and learning. A survey and focus group interviews were administered to 6th and 7th students (n=1,544) in four public middle schools, with varying demographics, that rely on local funding. These four schools revealed moderate use of many well-established digital technologies, such as word processing, presentation software, and quiz games. Students voiced outright hatred for teacher-directed PowerPoint-supported lectures, the most prominent technology activity students experienced, yet reported enjoying creation activities. The students in the rural school with a Hispanic-majority and high economically disadvantaged population reported much lower technology use. Discussion frame the digital inequities in the four schools and emphasizes the need for awareness and inclusion of students’ digital experiences to form any trajectory toward establishing digital equity and learning in schools

    Obama’s election campaign and the integrated use of social\ud media

    Get PDF
    When Barack Obama won the 2008 US Presidential election he\ud did so partly as a result of harnessing the power of social media to\ud communicate with, and enlist the support of, millions of Americans who\ud had never previously been active in the processes of an election campaign.\ud As a result of Obama‘s invitation and his use of new media, some of the\ud poorest members of the world‘s wealthiest nation found themselves able\ud to make a critical contribution through a myriad of small activities starting\ud from seemingly inconsequential choices such as the selection of a mobile\ud phone ring tone. Although ‗people power‘ is not a new force in politics,\ud the Obama campaign set a fresh benchmark for inclusive ways in which to\ud communicate to and with a holistic cross section of the American people,\ud including many who would not have been previously seen as a critical\ud ‗target market‘. This paper examines Obama‘s use of integrated\ud communications and considers the potential implications for other\ud campaigns which may have an inclusion agenda

    Emerging technologies for learning (volume 2)

    Get PDF

    Knight News Challenge: Casting the Net Wide for Innovation

    Get PDF
    Reviews the evolution of the Knight News Challenge contest for experimental projects in digital delivery of news and information to local communities, profiles winning projects and explores the grants' impact, and considers issues of sustainability

    Future consumer mobile phone security: a case study using the data centric security model

    Get PDF
    In the interconnected world that we live in, traditional security barriers are\ud broken down. Developments such as outsourcing, increased usage of mobile\ud devices and wireless networks each cause new security problems.\ud To address the new security threats, a number of solutions have been suggested,\ud mostly aiming at securing data rather than whole systems or networks.\ud However, these visions (such as proposed by the Jericho Forum [9] and IBM\ud [4]) are mostly concerned with large (inter-) enterprise systems. Until now, it is\ud unclear what data-centric security could mean for other systems and environments.\ud One particular category of systems that has been neglected is that of\ud consumer mobile phones. Currently, data security is usually limited to a PIN\ud number on startup and the option to disable wireless connections. The lack of\ud protection does not seem justified, as these devices have steadily increased in\ud capabilities and capacity; they can connect wirelessly to the Internet and have\ud a high risk of being lost or stolen [8]. This not only puts end users at risk, but\ud also their contacts, as phones can contain privacy sensitive data of many others.\ud For example, if birth dates and addresses are kept with the contact records, in\ud many cases a thief will have enough information to impersonate a contact and\ud steal his identity.\ud Could consumer mobile phones benefit from data-centric security? How\ud useful is data-centric security in this context? These are the core questions we\ud will try to address here

    M-health review: joining up healthcare in a wireless world

    Get PDF
    In recent years, there has been a huge increase in the use of information and communication technologies (ICT) to deliver health and social care. This trend is bound to continue as providers (whether public or private) strive to deliver better care to more people under conditions of severe budgetary constraint

    Big Brother is Listening to You: Digital Eavesdropping in the Advertising Industry

    Get PDF
    In the Digital Age, information is more accessible than ever. Unfortunately, that accessibility has come at the expense of privacy. Now, more and more personal information is in the hands of corporations and governments, for uses not known to the average consumer. Although these entities have long been able to keep tabs on individuals, with the advent of virtual assistants and “always-listening” technologies, the ease by which a third party may extract information from a consumer has only increased. The stark reality is that lawmakers have left the American public behind. While other countries have enacted consumer privacy protections, the United States has no satisfactory legal framework in place to curb data collection by greedy businesses or to regulate how those companies may use and protect consumer data. This Article contemplates one use of that data: digital advertising. Inspired by stories of suspiciously well-targeted advertisements appearing on social media websites, this Article additionally questions whether companies have been honest about their collection of audio data. To address the potential harms consumers may suffer as a result of this deficient privacy protection, this Article proposes a framework wherein companies must acquire users\u27 consent and the government must ensure that businesses do not use consumer information for harmful purposes
    corecore