Skip to main content

Home/ Flat Classroom Project/ Group items tagged citing

Rss Feed Group items tagged

Kyle Correa

negative impacts of the world wide web on education - Google Search - 1 views

  • Computers, the internet, and cheating among secondary school ...pareonline.net/getvn.asp?v=9&n=9Cached - SimilarYou +1'd this publicly. Undoby S Conradson - Cited by 14 - Related articlesPermission is granted to distribute this article for nonprofit, educational ... And the vast realms of information on the truly, worldwide Web are so readily available. ..... policies that carry seriou
Ivey Carden

The Science Advisory Board - Protocols, Product Reviews, Member Forum, and Science News - 0 views

  •  
    "34% of users report their organization's telemedicine program has been in existence between 1 and 2 years, and almost 20% report their program has been in existence for 5 years or longer. Supporting "Continuing Medical Education" is the most common way in which telemedicine is used, followed closely by "clinical consultations". "Text documents" are the most frequently transmitted type of medical information transmitted between locations, while "real-time motion video" is transmitted least frequently. A desire to "deliver quality care to rural/under-served areas" was cited by users as the most important reason their organizations decided to implement a telemedicine, but non-users claim the "availability of affordable technology" would be their primary motivation. "Access to medical databases" was considered the most valuable clinical telemedicine application cited by users. 87% of those using telemedicine report that their organization provides them with access to the Internet. Slightly more than a third of those using telemedicine report that their organization "occasionally" uses telemedicine to assess a patient at a remote location, while almost half "occasionally" use an interactive technology to consult with a remote caregiver. "Lack of funding" was by both users and non-users as the greatest impediment to the growth of telemedicine. Budgets for the majority of new telemedicine programs (less than one year old) appear to have increased by 50% or more from 1997 to 1998. However, budgets for the majority of older telemedicine programs (5 years or more), have remained the same for the majority of the respondents. Non-users indicated that having access to medical databases and the ability to transmit medical images would be the two most valuable telemedicine capabilities. " This talks about the findings of telemedicine that researchers have discovered.
Dawid Kedzierski

Wikipedia: "Wikipedia is not a reliable source" | Beyond School - 0 views

  •  
    Why wikipedia is not a reliable cite
Steve Madsen

PC World - Business Center: Report: T-Mobile to Announce Google Phone Sept. 23 - 0 views

  •  
    T-Mobile USA will become the first company in the world to announce a mobile phone based on Google's Android OS at a New York press conference Sept. 23, the New York Times reports, citing T-Mobile.
Sydnee S

Dan Rather - Wikipedia, the free encyclopedia - 0 views

shared by Sydnee S on 23 Oct 09 - Cached
  • Rather accused Nixon of not cooperating with the grand jury investigation and the House Judiciary Committee in relation to the Watergate scandal.[11]
  • Rather who traveled through Afghanistan when the news led there. A few years into his service as anchorman, Rather began wearing sweaters beneath his suit jacket to soften and warm his on-air perceptions by viewers.[13]
  • July 12, 2001, Brent Bozell of the Media Research Center issued a press release stating that the failure of CBS News to run a single story regarding the disappearance of former Congressional intern Chandra Levy was evidence of "media bias".[16]
  • ...3 more annotations...
  • September 8, 2004, Rather reported on 60 Minutes Wednesday that a series of memos critical of President George W. Bush's Texas Air National Guard service record had been discovered in the personal files of Lt. Bush's former commanding officer, Lt. Col. Jerry B. Killian.[19
  • led to claims that the memos were forgeries.[20] The accusations then spread over the following days into mainstream media outlets including The Washington Post,[21] The New York Times,[22] and the Chicago Sun-Times.[23]
  • For the CBS Evening News, Dan Rather reporting. Good night.[37] —Dan Rather's speech at the end of his farewell newscast
  •  
    Talks about Dan Rather and shows some of the scandals that he went through.
Vicki Davis

FOXNews.com - Japanese Woman Arrested for Virtual-World 'Murder' - Science News | Scien... - 0 views

  • The woman, who is jailed on suspicion of illegally accessing a computer and manipulating electronic data, used his identification and password to log onto popular interactive game "Maple Story" to carry out the virtual murder in mid-May, a police official in northern Sapporo said on condition of anonymity, citing department policy.
  • but if convicted could face a prison term of up to five years or a fine up to $5,000.
  • The woman used login information she got from the 33-year-old office worker when their characters were happily married, and killed the character.
  • ...2 more annotations...
  • virtual lives have had consequences in the real world.
  • n Tokyo, police arrested a 16-year-old boy on charges of swindling virtual currency worth $360,000 in an interactive role playing game by manipulating another player's portfolio using a stolen ID and password.
  •  
    Important article to read about how a virtual avatar murder has consequences in the physical world.
Nick D

Flat Classroom Project - Building bridges for the future through collaborative projects - 1 views

  •  
    This project is known as one of the best uses of web 2.0 tools in education.
  • ...1 more comment...
  •  
    Our project is cited as an excellent use of Web 2.0 tools in education. You can look at past projects as examples of uses in education.
  •  
    This is the Flat Classroom Project Ning holding our reflections and partner communications for this year's project betwen 7 classes in Qatar, US, Australia, Austria, and China.
  •  
    Social network for flat classroom project.
Becca B.

IL Toolkit - Virtual Communications: 5 - How do we use Virtual Communications Tools? - 0 views

  •  
    "There are some special rules that apply to communicating virtually. The most important is to remember that you are communicating with real people, not a computer. Don't spam. That is, don't send unsolicited e-mail. Remember that the Internet is a pull system, where people can request information, rather than one where you send them information without being asked. A wise person once suggested you treat the Internet like a foreign culture; study it for a month or more, as an anthropologist would, before you participate. Using this example, it would also be advisable to strongly consider cultural differences of the people with whom we communicate. This entails avoiding profanity and slurs or criticisms against any group of people. It means respecting differences and striving for political correctness in all forms of communication and action. The CD-ROM "Information Literacy Toolkit" provides definitions of legal considerations included in dealing with virtual communications. Below are some ethical considerations for handling them. As with security considerations, ethics in dealing with material handled via virtual communication is rooted in traditional communications. That which applies to the paper world also applies in the virtual world. The fact that information is easily available does not remove traditional requirements for attribution, for the avoidance of plagiarism or for the appropriate use the information. The anonymity provided by the ability to surf and search a large number of documents provides a temptation to use material in an unauthorized way. This temptation must be avoided. The same browsing tools that allow wide access also provide a tool for proper attribution. The writer may simply insert a link (URL) to direct the reader to the source of the information cited. Privacy should be safeguarded and observed. Those who control their own information should establish systems to keep information that they do not want disclosed protected. Owners of
1 - 9 of 9
Showing 20 items per page