Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 13 |
Descriptor
Source
Author
Bolch, Matt | 1 |
Calamari, Cal | 1 |
Campbell, Gardner | 1 |
Carl, Noah | 1 |
Cesarini, Lisa McHugh | 1 |
Cesarini, Paul | 1 |
Matt Villano | 1 |
McAnear, Anita | 1 |
Mitchell, Erik T. | 1 |
Selber, Stuart A. | 1 |
Turkle, Sherry | 1 |
More ▼ |
Publication Type
Opinion Papers | 13 |
Journal Articles | 11 |
Reports - Descriptive | 2 |
Reports - Evaluative | 2 |
Education Level
Higher Education | 4 |
Postsecondary Education | 2 |
Elementary Secondary Education | 1 |
Audience
Policymakers | 1 |
Laws, Policies, & Programs
Copyright Law 1976 | 1 |
Digital Millennium Copyright… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Carl, Noah – Academic Questions, 2021
Any academic from an overrepresented group who advocates more "diversity" is directly contributing to the lack of "diversity" by remaining in his position. Assuming the number of jobs is relatively fixed, such an individual is effectively saying, "I want the percentage of academics who have the same demographic…
Descriptors: Crime Prevention, Terrorism, Motivation, Social Theories
Turkle, Sherry – Continuing Higher Education Review, 2011
The author has been a witness to the birth of the personal computer culture, with its intense one-on-one relationships with machines, and then to the development of the networked culture, with people using the computer to communicate with each other. In her most recent work on the revolutions in social networking and sociable robotics, she sees a…
Descriptors: Intimacy, Computer Networks, Social Networks, Computers
Bolch, Matt – Technology & Learning, 2009
Whether for an entire district, a single campus, or one classroom, allowing authorized access to a computer network can be fraught with challenges. The login process should be fairly seamless to approved users, giving them speedy access to approved Web sites, databases, and other sources of information. It also should be tough on unauthorized…
Descriptors: Computer Networks, Access to Computers, Information Management, Information Technology
Mitchell, Erik T. – Journal of Web Librarianship, 2010
One of the first big shifts in how libraries manage resources was the move from print-journal purchasing models to database-subscription and electronic-journal purchasing models. Libraries found that this transition helped them scale their resources and provide better service just by thinking a bit differently about their services. Likewise,…
Descriptors: Libraries, Library Materials, Electronic Publishing, Electronic Libraries
Calamari, Cal – Teacher Librarian, 2009
As educational and research needs have changed, libraries have changed as well. They must meet ever-increasing demand for access to online media, subscriptions to archives, video, audio, and other content. The way a user/patron accesses this information has also changed. Gone are the days of a few hardwired desktops or computer carts. While…
Descriptors: Library Personnel, Research Needs, Academic Libraries, Telecommunications
Walling, Donovan R. – TechTrends: Linking Research and Practice to Improve Learning, 2009
When students engage with technology to produce media, impetus and inspiration often come from the work of others. In today's new media environment in which students blur the line between school-based technologies and personal devices and engagement, educators find themselves standing on a railroad track facing a speeding high-tech train. If…
Descriptors: Production Techniques, Computer Networks, Social Networks, Films
Selber, Stuart A. – College Composition and Communication, 2009
Academic institutions mediate online literacy practices in meaningful and significant ways. This essay explores the nature of that mediational process, using a visual-spatial method to map out and conceptualize dynamics and structures that have a bearing on the work of composition. A key argument is that composition teachers are intellectually…
Descriptors: Computer Uses in Education, Criticism, College Administration, Influence of Technology
Cesarini, Lisa McHugh; Cesarini, Paul – Journal of Technology Studies, 2008
When Lars Ulrich, drummer for the rock group Metallica, testified before Congress about his group's lawsuit against Napster in 2000, many people who followed copyright issues in the music industry were not surprised (Ulrich, 2000). Ever since downloading audio files became as easy as clicking a few buttons on a personal computer, charges of…
Descriptors: Higher Education, Legal Problems, Music, Copyrights
Matt Villano – Technology & Learning, 2006
This article presents an interview with Jim Hirsch, an associate superintendent for technology at Plano Independent School District in Plano, Texas. Hirsch serves as a liaison for the open technologies committee of the Consortium for School Networking. In this interview, he shares his opinion on the significance of open source in K-12.
Descriptors: Elementary Secondary Education, Computer Networks, Interviews, Superintendents
Windhausen, John, Jr. – EDUCAUSE, 2008
This white paper proposes bringing the federal government, state governments, and the private sector together as part of a new approach to making high-speed Internet services available across the country. It proposes the creation of a new federal Universal Broadband Fund (UBF) that, together with matching funds from the states and the private…
Descriptors: Private Sector, Telecommunications, Public Sector, Partnerships in Education
McAnear, Anita – Learning & Leading with Technology, 2006
When we planned the editorial calendar with the topic ubiquitous computing, we were thinking of ubiquitous computing as the one-to-one ratio of computers to students and teachers and 24/7 access to electronic resources. At the time, we were aware that ubiquitous computing in the computer science field had more to do with wearable computers. Our…
Descriptors: Computer Networks, Telecommunications, Computer Uses in Education, Internet
Campbell, Gardner – Change: The Magazine of Higher Learning, 2006
The author believes that information technologies are powerfully heuristic in addressing one of education's deepest ambitions. Following Engelbart's paradigm, he sees these technologies as augmenting human intellect, not simply because they permit high-speed calculations but also because they externalize our own cognitive processes in a way that…
Descriptors: Information Technology, Cognitive Processes, Heuristics, Critical Thinking
OECD Publishing (NJ1), 2006
The development of digital content raises new issues as rapid technological developments challenge existing business models and government policies. This OECD study identifies and discusses six groups of business and public policy issues and illustrates these with existing and potential OECD Digital Content Strategies and Policies: (1) Innovation…
Descriptors: Intellectual Property, Job Skills, Job Training, Foreign Countries