14,856 research outputs found

    From Consumers to Producers: African American Middle School Students as Game Designers

    Get PDF
    Given the low number of African Americans in Computer Science, we recognize the need to take effective measures to build and sustain a pipeline between K-12 education and institutions of higher learning with the hope that more African American students will pursue careers in computing related fields such as gaming. To support this effort, we engage African American middle school students in a 4-day game design workshop with the intent of transitioning these students from being consumers to being producers of technology. We create and evaluate scaffolds to assist middle school students with designing their first video games using Scratch. Preliminary findings suggest that most of the students are able to define the formal elements of their games, including number players, game objectives, and rules, but struggle with the concepts of procedures and boundaries of the game. These same students also demonstrate a basic understanding of dramatic elements (e.g. challenge, play, and character), but struggle with the concept of storyline. Finally, African American students have very explicit ideas about the kinds of games they want to create, choosing to create games that promote a more inclusive gameplay experience. KEYWORDS: African American middle school students, game desig

    Some Reflections on Copyright Management Systems and Laws Designed to Protect Them

    Get PDF
    Copyright management systems (CMS)—technologies that enable copyright owners to regulate reliably and charge automatically for access to digital works—are the wave of the very near future. The advent of digital networks, which make copying and distribution of digital content quick, easy, and undetectable, has provided the impetus for CMS research and development. CMS are premised on the concept of trusted systems or secure digital envelopes that protect copyrighted content and allow access and subsequent copying only to the extent authorized by the copyright owner. Software developers are testing prototype systems designed to detect, prevent, count, and levy precise charges for uses that range from downloading to excerpting to simply viewing or listening to digital works. In a few years, for example, an individual seeking online access to a collection of short fiction might be greeted with a menu of options including: Open and view short story A — 0.50,or0.50, or 0.40 for students doing assigned reading (verified based on roster submitted by instructor) Open and view short story B (by a more popular author) — 0.80,or0.80, or 0.70 for students Download short story A (encrypted and copy-protected) — 1.35DownloadshortstoryB1.35 Download short story B — 2.25 Download entire collection — 15.00ExtractexcerptfromshortstoryA15.00 Extract excerpt from short story A — 0.03 per 50 words Extract excerpt from short story B — $0.06 per 50 words CMS also loom large on the legislative horizon. Copyright owners have argued that technological protection alone will not deter unauthorized copying unless the law provides penalties for circumventing the technology. Although a bill to protect CMS against tampering failed to reach a vote in Congress last year, the World Intellectual Property Organization\u27s recent adoption of treaty provisions requiring protection means that Congress must revisit the question soon. Part II describes these developments. The seemingly inexorable trend toward a digital CMS regime raises two questions, which the author addresses in parts III and IV, respectively. First, broadly drawn protection for CMS has the potential to proscribe technologies that have indisputably lawful uses and also to foreclose, as a practical matter, uses of copyrighted works that copyright law expressly permits. How may protection for CMS be drafted to avoid disrupting the current copyright balance? Second, and equally fundamental, CMS may enable both pervasive monitoring of individual reading activity and comprehensive private legislation designed to augment—and possibly alter beyond recognition—the default rules that define and delimit copyright owners\u27 rights. Given the unprecedented capabilities of these technologies, is it also desirable to set limits on their reach

    The impact of environmental education delivery methods and outreach messaging on attitudes, interests, and intended-behavior changes toward nature

    Get PDF
    Environmental education (EE) is important for environmental awareness and stewardship. Involving youth and adults in EE ensures current and future generations will conserve natural resources. This thesis explores impacts of delivery methods on participants’ environmental attitudes and behaviors toward nature through middle school classroom- and camp-based EE instruction, focus group interviews with rural minority youth, and adult responses to aquatic conservation outreach messaging. I observed no difference in environmental attitudes between online versus in-person delivery of EE lessons for middle-schoolers. Outdoor-based learning may be more impactful for EE than experiential, classroom-based learning. Focus group outcomes suggested youth EE programs should capitalize on exploratory learning that allows for independence and safety from wildlife and community violence. Arkansas anglers who reside near aquatic invasive species (AIS) are more aware of Clean, Drain, Dry (CDD) messaging despite all anglers’ likeliness to perform pro-environmental behaviors. Consistent, targeted CDD messaging could help minimize AIS spread

    Mapping South African internet user's opinions about the use of peer-to-peer file sharing technology to infringe on copyrighted films and/or television series content

    Get PDF
    The aim of this study was to investigate the various reasons consumers continue to infringe on copyrighted content, specifically in the South African context, even if the law forbids it. This investigation is two-fold since it also recognises that there are many individuals who do not infringe on copyrighted content even though they have access to peer-to-peer file sharing technology. This information could prove valuable since it can then be used to find comprehensive market-led solutions to the problem that targets the end-user. This study adopted a mixed method approach in order to cross validate findings and to reveal aspects of empirical reality. The target population for this study consisted of 100 adult South Africans who have access to the internet. Data was collected through an online, self-administered questionnaire. Quantitative data was analysed through descriptive statistics, while qualitative data was analysed through thematic analysis. The results show that there are variety of factors that influence respondents’ attitudes towards copyright infringement of films and/or television series through peer-to-peer file sharing technology, each of which is discussed in detail. The study concluded by identifying 24 factors that favourably influence people’s attitudes towards copyright infringement, including high prices of legitimate goods, historical inequality in South Africa, and perceived low risk of being caught and punished. Based on the conclusion above, the study recommends that policy makers such as government officials, boards of directors, managers, committees, and executives use the results of the study when making decisions and determining policies, especially in the South African context.Communication ScienceM.A. (Communication Science

    Reinventing Media Activism: Public Interest Advocacy in the Making of U.S. Communication-Information Policy, 1960-2002

    Get PDF
    This report is a long-term analysis of citizens' collective action to influence public policy toward communication and information. The work discusses in greater detail what is meant by communication and information policy (CIP) and why we think it is worthwhile to study it as a distinctive domain of public policy and citizen action. The report concentrates on citizen action in the United States and looks backwards, tracing the long-term evolutionary trajectory of communications-information advocacy in the USA since the 1960s. We focus on the concept of citizen collective action and explain its relevance to CIP.Research supported by the Ford Foundation's Knowledge, Creativity and Freedom Program. The views expressed are those of the author and do not necessarily represent the views of the School of Information Studies, Syracuse University, or the Ford Foundation

    Communicating across cultures in cyberspace

    Get PDF

    A Rule Set for the Future

    Get PDF
    This volume, Digital Young, Innovation, and the Unexpected, identifies core issues concerning how young people's use of digital media may lead to various innovations and unexpected outcomes. The essays collected here examine how youth can function as drivers for technological change while simultaneously recognizing that technologies are embedded in larger social systems, including the family, schools, commercial culture, and peer groups. A broad range of topics are taken up, including issues of access and equity; of media panics and cultural anxieties; of citizenship, consumerism, and labor; of policy, privacy, and IP; of new modes of media literacy and learning; and of shifting notions of the public/private divide. The introduction also details six maxims to guide future research and inquiry in the field of digital media and learning. These maxims are "Remember History," "Consider Context," "Make the Future (Hands-on)," "Broaden Participation," "Foster Literacies," and "Learn to Toggle." They form a kind of flexible rule set for investigations into the innovative uses and unexpected outcomes now emerging or soon anticipated from young people's engagements with digital media

    Political geographies of the object

    Get PDF
    This paper examines the role of objects in the constitution and exercise of state power, drawing on a close reading of the acclaimed HBO television series The Wire, an unconventional crime drama set and shot in Baltimore, Maryland. While political geography increasingly recognizes the prosaic and intimate practices of stateness, we argue that objects themselves are central to the production, organization, and performance of state power. Specifically, we analyze how three prominent objects on The Wire—wiretaps, cameras, and standardized tests—arrange and produce the conditions we understand as ‘stateness’. Drawing on object-oriented philosophy, we offer a methodology of power that suggests it is generalized force relations rather than specifically social relations that police a population—without, of course, ever being able to fully capture it. We conclude by suggesting The Wire itself is an object of force, and explore the implications of an object-oriented approach for understanding the nature of power, and for political geography more broadly

    Breaking Down the Chain: A Guide to the Soft Drink Industry

    Get PDF
    Provides an overview of the soft drink industry's earnings, structure, markets, and determinants of demand; major players; supply chain; marketing strategies; and policy and legislative actions in response to the sugar-sweetened beverage tax
    corecore