Skip to main content

Home/ MALET Issues/ Group items tagged software

Rss Feed Group items tagged

dpangrazio

Internet Filtering Software in K-12 Classrooms - 0 views

  •  
    The conflict between keeping students safe and interfering with educations. Explains the CIPA act but also how some inappropriate content still comes through the filters. Some schools use a variety of methods to prevent the dangers of the web from infiltrating the classroom, including acceptable use policies, internet filtering software or a combination of both.
jojowil

An Open Source Software Culture in the Undergraduate Computer Science Curriculum - 0 views

  •  
    Open source software has made inroads into mainstream computing where it was once the territory of software altruists, and the open source culture of technological collegiality and accountability may benefit education as well as industry. This paper describes the Recourse project, which seeks to transform the computer science undergraduate curriculum through teaching methods based on open source principles, values, ethics, and tools. Recourse differs from similar projects by bringing the open source culture into the curriculum comprehensively, systematically, and institutionally. The current state of the project is described, and initial results from a pilot exercise are presented.(
dpangrazio

Access denied: Internet filtering software in K-12 classrooms | SpringerLink - 0 views

  •  
    The conflict between keeping students safe and interfering with educations. Explains the CIPA act but also how some inappropriate content still comes through the filters. Some schools use a variety of methods to prevent the dangers of the web from infiltrating the classroom, including acceptable use policies, internet filtering software or a combination of both.
david_jones_2016

ERIC - Application of Plagiarism Screening Software in the Chemical Engineering Curricu... - 1 views

  •  
    Plagiarism is an area of increasing concern for written ChE assignments, such as laboratory and design reports, due to ease of access to text and other materials via the internet. This study examines the application of plagiarism screening software to four courses in a university chemical engineering curriculum.
Mark Ness

Preserving Digital Information: Report of the Task Force on Archiving of Digital Inform... - 0 views

  •  
    The preservation of cultural memory falls upon custodians of cultural memory. "Separating usage [allowing users to utilize exact replicas] from the original, digital technology affords multiple, simultaneous uses from a single original in ways that are simply not possible for materials stored in any other form" (p. 2). Although digital technologies afford advantages in the digital preservation of information, using digital technologies for preservation of original works poses ethical and moral concerns not previously encountered. Again, the continual evolution of technological devices and software severely challenges archival efforts. "…technological obsolescence represents a far greater threat to information in digital form than the inherent physical fragility of many digital media" (p. 5). "Jeff Rothenberg, for example, has recently suggested that there may be sufficient demand for entrepreneurs to create and archive emulators of software and operating systems that would allow the contents of digital information to be carried forward and used in its original format" (p. 6). Perhaps the greatest challenges facing digital archiving are "costs and the technical, legal and organizational complexities of moving digital information forward into the future raise our greatest fear about the life of information in the digital future: namely, that owners or custodians who can no longer bear the expense and difficulty will deliberately or inadvertently, through a simple failure to act, destroy the objects without regard for future use" (p. 7). To this end, the "Commission on Preservation and Access and the Research Libraries Group (RLG) have joined together in charging the Task Force on Archiving of Digital Information to take this first essential step toward a national system of digital preservation. They have asked the Task Force to "consult broadly among librarians, archivists, curators, technologists, relevant government and private sector or
dpangrazio

Internet Filtering in Schools: Protection or Censorship? - 0 views

  •  
    Filtering software does not work as intended, students are kept from important content such as examples as blocked sites include the NASA Mars Explorer site (the letters s-e-x are in the url) and sites about cancer (blocked because of the word "breast").
kamodeo1

https://www.technologyreview.com/s/428402/automate-or-perish/ - 0 views

  •  
    A study from 2009 through 2011 looked into the fastest growing job categories and the top 10 had the words computer or software in them. Clearly technology and computer abilities are key to becoming a valuable and successful employee. In the past centuries our automation process have grown substantially, need for computer operating systems and employees who can handle this type of technology.
Mark Ness

Overcoming OER barriers and finding enablers - 1 views

    • Mark Ness
       
      This is being facilitated by latest versions of LMSs (e.g., Canvas, Desire2Learn & Schoology) that support features to create program & institutional repositories for a variety of purposes.
  • Equity re access
  • Knowing what is available
  • ...44 more annotations...
  • Support and guidance
  • Quality
  • what is available
  • how to find it
  • Movement toward
  • fully open resources
  • Ensure
  • materials
  • accessible on
  • alternative technologies
  • Increased use of content
  • Encourages peer support
  • interaction
  • Encourages dialogu
  • enhances learning opportunities
  • Quality
  • likely to rise to the top
  • search engine results
  • to use resources effectively
  • poor experience
  • low quality materials
  • deter future use
  • sDiigo
  • Social software services
  •  allow users to highlight content
  • add notes
  • Time – concerns
  • wasting time looking for content
  • adapting for
  • own purpose
  • Easier retrieval
  • Central support teams
  • help with repurposing
  • Using small chunks
  • individual items
  • supplement own materials rather than trying to adapt a large package of materials
  • review
  • which
  • resource has been used by others
  • Flexible use of content
  • Educational context
  • context is unique
  • too difficult to adapt others content
  • Make generic content open to support several courses
  •  
    EDU681102 - Module 2, Week 2. Mark Ness, article #2.
  •  
Dusty Baker

Combining Software Games with Education: Evaluation of its Educational Effectiveness - 2 views

  •  
    When reading the literature review about mobile gaming it got me thinking more about online gaming programs to use in the classroom. I did some digging to find this article about the effectiveness of games in education.
srtaharrington

An Analysis of Teachers' Processes of Technology Appropriation in Classroom - 1 views

  •  
    A study into how iPads were perceived by teachers and implemented in a school. This link might be better. Not sure. http://www.worldcat.org.library.esc.edu/title/an-analysis-of-teachers-processes-of-technology-appropriation-in-classroom/oclc/5882295313&referer=brief_results
  •  
    Interesting article and so relevant to what I, and so many others, face in the classroom every day. I feel that the initial implementation of iPad distribution (or any technology) should not be rushed just to get it out there. Teachers need to be properly educated and be comfortable using that technology. In addition, any technology should contain all necessary software or applications ready to use before distribution. One other issue that often goes over looked is the wifi in the building. If the wifi in the building is not strong or cannot support a high number of users simultaneously, how can it be used effectively in the classroom?
david_jones_2016

ERIC - The Ethics and Politics of Policing Plagiarism: A Qualitative Study of... - 1 views

  •  
    Recently, the usage of plagiarism detection software such as Turnitin® has increased dramatically among university instructors. At the same time, academic criticism of this software's employment has also increased. We interviewed 23 faculty members from various departments at a medium-sized, public university in the southeastern US to determine their perspectives on Turnitin® and student plagiarism.
david_jones_2016

ERIC - Back Translation: An Emerging Sophisticated Cyber Strategy to Subvert Advances i... - 1 views

  •  
    Advances have been made in detecting and deterring the student plagiarism that has accompanied the uptake and development of the internet. Many authors from the late 1990s onwards grappled with plagiarism in the digital age, presenting articles that were provoking and established the foundation for strategies to address cyber plagiarism, including software such as Turnitin™.
jojowil

Experience Using "MOSS" to Detect Cheating On Programming Assignments - 0 views

  •  
    Abstract - Program assignments are traditionally an area of serious concern in maintaining the integrity of the educa- tional process. Systematic inspection of all solutions for pos- sible plagiarism has generally required unrealistic amounts of time and effort. The "Measure Of Software Similarity" tool developed by Alex Aiken at UC Berkeley makes it pos- sible to objectively and automatically check all solutions for evidence of plagiarism. We have used MOSS in several large sections of a C programming course. (MOSS can also handle a variety of other languages.) We feel that MOSS is a major innovation for faculty who teach programming and recom- mend that it be used routinely to screen for plagiarism.
jojowil

Using "MOSS" - Plagiarism Detection Software - 0 views

  •  
    MOSS is effective in detecting similar structures in nearly every different type of language that we use here at the University at Buffalo, including C, C++, Java, LISP, Perl, Python, Scheme, Matlab and Prolog. As you can guess, it is not fooled by renaming variables, rearranging or functionalizing blocks of code, extracting code to different modules or files, or the placing of NOP or junk code between useful codes. MOSS can also exclude matching base files (code supplied by instructors or TAs) and it can exclude the consideration of code that is matched across many different submissions (code perhaps supplied by a coding book or website, like a sorting algorithm, that is not central to the assignment).
Robert Kayton

Less Is More: How to App-ify Your Library Services - 1 views

  •  
    "How will your library serve mobile device users? By building apps from scratch? By offering entirely separate content? Or by modifying your site for mobile devices? This author found that the best fit for a joint library serving Victoria College and the University of Houston-Victoria was to build a mobile website in HTML and CSS using mobile standards and best practices suitable for those devices. As the sole web services librarian, it was her duty to develop a browser-based mobile website and code it from scratch. In this article, she shares the findings, experiences, and helpful code snippets for building a mobile website on your own." [Abstract from ERIC database.] Link to full-text article in ESC ProQuest Research Library database: http://search.proquest.com.library.esc.edu/pqrl/docview/1019444398/75C2FCA9AB3D4B62PQ/1?accountid=8067 Williams, B.S. (2012). Less Is More: How to App-ify Your Library Services. Computers in Libraries. 32(5), 36-38.
Robert Kayton

Usability Study of a Library's Mobile Website: An Example from Portland State University - 0 views

  •  
    To discover how a newly developed library mobile website performed across a variety of devices, the authors used a hybrid field and laboratory methodology to conduct a usability test of the website. Twelve student participants were recruited and selected according to phone type. Results revealed a wide array of errors attributed to site design, wireless network connections, as well as phone hardware and software. This study provides an example methodology for testing library mobile websites, identifies issues associated with mobile websites, and provides recommendations for improving the user experience. [ABSTRACT FROM AUTHOR] [Abstract from ESC Academic Search Complete database] Link: http://eds.b.ebscohost.com.library.esc.edu/ehost/detail/detail?vid=2&sid=32d26eef-5aab-4af2-ad1a-c9624344797d%40sessionmgr115&hid=126&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#AN=83583519&db=a9h Pendell, K. D., & Bowman, M. S. (2012). Usability Study of a Library's Mobile Website: An Example from Portland State University. Information Technology & Libraries, 31(2), 45-62.
Mark Ness

Information Technology and Moral Values (Stanford Encyclopedia of Philosophy) - 0 views

  •  
    The article identifies common archival issues (i.e., listing and cataloging) associated with archiving digitally created information, due to rapidly changing technologies used to create digital information. This makes it challenging to appropriately list and catalog the moral impacts created by the rapidly emerging technologies. The article (n.d.) states, "ever morphing nature of information technology is changing our ability to even fully understand moral values as they change. Lorenzo Magnani claims that acquiring knowledge of how that change confounds our ability to reason morally '…has become a duty in our technological world'" (section 1.1). The article alerts to impending moral and ethical dilemmas created by smart phone apps that will be soon be capable of streaming biometric data (e.g., vital signs, physical activity logs, caloric intake, etc.) and linking it with GPS tracking to identify geo-locators tied to fluctuations in biometric data via phone applications. The advantage of such technology can lead to promotion of more healthy lifestyles. However, streaming such sensitive biometric information (data) leads to privacy and ethical concerns that are not easily resolved. Other moral, ethical and privacy issues are created surreptitiously when browsing websites on the Internet. "Browser software records all manner of data about our visits to various websites which can, for example, make webpages load faster next time you visit them. Even the websites themselves use various means to record information when your computer has accessed them and they may leave bits of information on your computer which the site can use the next time you visit. Some websites are able to detect which other sites you have visited or which pages on the website you spend the most time on. If someone were following you around a library noting down this kind of information you might find it uncomfortable or hostile, but online this kind of behavior takes place behin
Mark Ness

A Moral and Legal Obligation: Preservation in the Digital Age - 0 views

  •  
    Marcum (1997) uses a quote from Jarislav Pelikan to establish the need for archival commitment to preserve information (knowledge) in establishments such as libraries, museums, archives (federal, state and local municipalities) and the like as illustrating "embalming of the dead". To this end, a task force was formed by combining the Commission on Preservation and Access and the Research Libraries Group formed a Task Force on the Archiving of Digital Information. This task force identified a short list of five challenges associated with the preservation of digital artifacts. Specifically, organizational in nature: − "The first line of defense against loss of valuable digital information rests with the creators, providers, and owners of digital information. − Long-term preservation of digital information on a scale adequate for the demands of future research and scholarship will require a deep infrastructure capable of supporting a distributed system of digital archives. − A sufficient number of trusted organizations must exist that are capable of storing, migrating, and providing access to digital collections. − A process of certification for digital archives is needed to create an overall climate of trust about the prospects of preserving digital information. − Certified digital archives must have the right and duty to exercise an aggressive rescue function as a fail-safe mechanism for preserving valuable digital information that is in jeopardy of destruction, neglect, or abandonment by its current custodian" (pp. 358-359). The task force also established a list of greatest organizational challenges opposing support for the preservation of digital information. This list includes the following items: − "Legal bases for deposit and rescue. In individual countries and internationally, legislation and agreements are needed to encourage legal deposit of electronic resources with archival repositories, to enable rescue of abandoned resource
alberttablante

Evaluation and usage scenarios of open source digital library and collection management... - 0 views

  •  
    Purpose - The purpose of this paper is to evaluate open source software (OSS) for digital libraries and collection management and to propose different utilization scenarios based on the characteristics of the tools. Design/methodology/approach - The tools are assessed on the basis of their technical features and options, the type of the content they manage, the support for common library operations such as cataloging and circulation, the searching support and the interoperability options. Then they are evaluated by users and finally a number of usage scenarios are analyzed based on the results of the evaluation. Findings - The basic findings of the study is that open source digital library and collection management tools offer advanced operations and support various metadata and interoperability protocols with easy and user-friendly interfaces. Most of the tools are extensively used under various settings and establishments already. Language support for the interfaces should be extended with more languages and some tools with limited operations should be improved to be of practical use. Practical implications - The findings of the paper could be used support the selection of specific open source tools for various types of establishments. Originality/value - The study reviews the characteristics of a few OSS for digital libraries and collection management and reveals their specific strengths and weaknesses. It also presents a number of realistic scenarios and proposes the usage of specific tools based on time, technology and staff constraints
alberttablante

CORAL: Implementing an Open-Source ERM System. . - 0 views

  •  
    The presenters focused on the benefits and challenges of implementing an open-source electronic resource management (ERM) system called Centralized Online Resource Acquisitions and Licensing (CORAL) at their libraries. Originally developed by the University of Notre Dame's Hesburgh Libraries, CORAL offers libraries the option to reorganize ERM workflows and collect information about their electronic resources into one central place without having to commit funding for new software from the ever-shrinking library budget. CORAL currently includes four modules: Organizations, Resources, Licensing, and Usage Statistics. In addition to the challenges that are faced in any ERM system implementation, such as collecting and preparing data and training staff, issues specific to using an open-source application in an academic library were presented.w:
1 - 20 of 21 Next ›
Showing 20 items per page