Skip to main content

Home/ Digital Ethnography at Kansas State University/ Group items matching "Computer" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Bill Genereux

Opinion: Papert led revolution in learning - 26 views

  • I think he would protest the extent to which schooling — assisted by computers or not — continues to be largely dominated by a mindset presupposing young people will not learn unless they are taught, and how few freedoms are offered students to self-direct their own learning.
  • I am convinced that the best learning takes place when the learner takes charge.
  •  
    I think he would protest the extent to which schooling - assisted by computers or not - continues to be largely dominated by a mindset presupposing young people will not learn unless they are taught, and how few freedoms are offered students to self-direct their own learning.
  • ...3 more comments...
  •  
    Cheap Massage Escort In Dubai Dubai Cheap Massage Escorts Dubai Cheap Model Escort Dubai Cheap Call Girls Escorts Vip Indian Escort In Dubai Vip Pakistani Escort In Dubai Vip Russian Escort In Dubai Vip Model Girls Escort In Dubai Vip Massage Escort In Dubai
  •  
    Results 2017 | Job, Recruitment Vacancies 2017 Time Table, Admit Card, Answer Key 2017 http://haaldop.com/
  •  
    KPSC Excise Guard & Sub Inspector Results 2017-1180 Posts Karnataka Public Service Commission http://haaldop.com/kpsc-excise-guard-sub-inspector-results-2017.html
globalshop22

Buy Azure Accounts - 100% Active Best Premium Server - 0 views

  •  
    Buy Azure Accounts Microsoft Purplish blue offers a cloud computing stage. It offers a wide run of cloud-based computing administrations, counting capacity, organizing, analytics, computing, and organizing. These administrations can be utilized to construct, send and oversee applications and service. Azure permits clients run applications and administrations in both the cloud and on-premises. It employments the same improvement devices, systems, framework, and framework. Sky blue bolsters numerous programming dialects, such as.NET, Java or Python. Azure too highlights a assortment security and congruity highlights. This makes Purplish blue an alluring choice for organizations who require tall levels or compliance. Buy Azure Accounts Azure is a effective cloud stage which permits businesses to enhance, develop and gives the unwavering quality, security, versatility and steadfastness they require to run cloud-based applications and services. Advantages Of Purchase Microsoft Sky blue Account? Microsoft Purplish blue offers a wide extend of administrations and highlights through its cloud computing stage. Microsoft Sky blue gives numerous advantages. Sky blue account offers businesses numerous versatility choices, which permit them to rapidly scale up and down their assets agreeing their needs. This permits businesses to handle huge spikes in activity without stressing over server capacity. Flexibility: Purplish blue account is adaptable and can offer a wide assortment of administrations and highlights which can be customized to suit diverse trade needs. This adaptability permits businesses select the administrations they require, as it were pay for what they really utilize, and can adjust rapidly to changing needs. Buy Azure Accounts Cost-effectiveness: Purplish blue account gives a pay-as-you-go show that implies businesses as it were pay what they utilize. No framework venture is required forthright. This might offer assistance businesses cut down on capital
shirley ong

Learn to make money online: Find Extra Money Right Inside Your Computer - 1 views

  •  
    Hi, And hello to all the money maker. My name is Shirley and is a housewife with a 5 years angel. I been try and try to have a home job which sit infront computer and get extra money. but what i get is disappointed and no hope.
  •  
    Hi, And hello to all the money maker. My name is Shirley and is a housewife with a 5 years angel. I been try and try to have a home job which sit infront computer and get extra money. but what i get is disappointed and no hope.
Mike Wesch

Document View - 0 views

  • The possibility of genuine anonymity implicates both the positive value in protecting the sources of certain information as well as the danger inherent in allowing individuals to speak and write without detection. For some computer users, anonymity is merely fun and games. For other anonymous posters, however, the ability to remain unknown removes many of the layers of civilized behavior as they realize that they can escape responsibility for negligent or abusive postings.
  •  
    The possibility of genuine anonymity implicates both the positive value in protecting the sources of certain information as well as the danger inherent in allowing individuals to speak and write without detection. For some computer users, anonymity is merely fun and games. For other anonymous posters, however, the ability to remain unknown removes many of the layers of civilized behavior as they realize that they can escape responsibility for negligent or abusive postings.
Mike Wesch

mobiles, human rights, and anonymity - 0 views

  • So that got me wondering: is there a mobile equivalent of Tor? For those of you who aren't familiar with it, TOR is a software project that helps Internet users remain anonymous. Running the TOR software on your computer causes your online communications to bounce through a random series of relay servers around the world. That way, there's no easy way for authorities to track you or observe who's visiting banned websites. For example, let's say you're in Beijing and you publish a blog the authorities don't like. If you just used your PC as usual and logged into your publishing platform directly, they could follow your activities and track you down. With Tor, you hop-scotch around: your PC might connect to a server in Oslo, then Buenos Aires, then Miami, then Tokyo, then Greece before it finally connects to your blogging platform. Each time you did this, it would be a different series of servers. That way, it's really difficult for authorities to trace your steps.
  •  
    Mobile Phones, Human Rights and Anonymity I've been playing around with my new Nokia N95 for the last couple of weeks and quite amazed with its ability to stream live video from the phone to the Internet. Like last weekend when I streamed from the Smithsonian Kite Festival; for around 30 minutes I gave a tour of the festivities and took questions from users as they watched the stream over the Internet. I've also spent some time talking it up with colleagues at NPR, brainstorming the possibilities of what would happen if reporters used these phones - or if their sources did. The example that keeps coming to mind regarding the latter scenario is the rioting in Tibet. While some video has leaked out, it's been limited and often delayed. Imagine if the protestors were able to webcast their protests - and the ensuing crackdowns - live over their phones using China's GSM network? The video would stream live and get crossposted via tools like YouTube, Seesmic and Twitter, spreading the content around so it can't be snuffed. But that raises an obvious question - how long could protestors or dissidents get away with such activities before getting caught? If you were running software on your phone to send live video over a 3G network, like I've been doing on my N95, you'd think it wouldn't take too much effort on the part of the mobile provider and/or government to figure out which phone was sending the signal and its precise location. So that got me wondering: is there a mobile equivalent of Tor? For those of you who aren't familiar with it, TOR is a software project that helps Internet users remain anonymous. Running the TOR software on your computer causes your online communications to bounce through a random series of relay servers around the world. That way, there's no easy way for authorities to track you or observe who's visiting banned websites. For example, let's say you're in Beijing and you publish a blog the authorities don't like. If you just used your PC as
Mike Wesch

The Internet and Social Life (Annual Review of Psychology 2004) - 1 views

  • However, the Internet is not merely the Swiss army knife of communications media. It has other critical differences from previously available communication media and settings (see, e.g., McKenna & Bargh 2000), and two of these differences especially have been the focus of most psychological and human-computer interaction research on the Internet. First, it is possible to be relatively anonymous on the Internet, especially when participating in electronic group venues such as chat rooms or newsgroups. This turns out to have important consequences for relationship development and group participation. second, computer-mediated communication (CMC) is not conducted face-to-face but in the absence of nonverbal features of communication such as tone of voice, facial expressions, and potentially influential interpersonal features such as physical attractiveness, skin color, gender, and so on. Much of the extant computer science and communications research has explored how the absence of these features affects the process and outcome of social interactions.
  • Sproull & Kiesler (1985) considered CMC to be an impoverished communication experience, with the reduction of available social cues resulting in a greater sense or feeling of anonymity. This in turn is said to have a deindividuating effect on the individuals involved, producing behavior that is more self-centered and less socially regulated than usual. This reduced-information model of Internet communication assumes further that the reduction of social cues, compared to richer face-to-face situations, must necessarily have negative effects on social interaction (i.e., a weaker, relatively impoverished social interaction).
  • The relative anonymity of the Internet can also contribute to close relationship formation through reducing the risks inherent in self-disclosure. Because selfdisclosure contributes to a sense of intimacy, making self-disclosure easier should facilitate relationship formation. In this regard Internet communication resembles the "strangers on a train" phenomenon described by Rubin (1975; also Derlega & Chaikin 1977). As Kang (2000, p. 1161) noted, "Cyberspace makes talking with strangers easier. The fundamental point of many cyber-realms, such as chat rooms, is to make new acquaintances. By contrast, in most urban settings, few environments encourage us to walk up to strangers and start chatting. In many cities, doing so would amount to a physical threat."Overall, then, the evidence suggests that rather than being an isolating, personally and socially maladaptive activity, communicating with others over the Internet not only helps to maintain close ties with one's family and friends, but also, if the individual is so inclined, facilitates the formation of close and meaningful new relationships within a relatively safe environment.
  • ...7 more annotations...
  • STIGMATIZED IDENTITIES McKenna & Bargh (1998) reasoned that people with stigmatized social identities (see Frable 1993, Jones et al. 1984), such as homosexuality or fringe political beliefs, should be motivated to join and participate in Internet groups devoted to that identity, because of the relative anonymity and thus safety of Internet (compared to face-to-face) participation and the scarcity of such groups in "real life." Moreover, because it is their only venue in which to share and discuss this aspect of their identity, membership in the group should be quite important to these people, and so the norms of such groups should exert a stronger than usual influence over members' behavior. This prediction was confirmed by an archival and observational study of the frequency with which stigmatized-group members posted messages to (i.e., participated in) the group: Unlike in other Internet groups, participation increased when there was positive feedback from the other group members and decreased following negative feedback (McKenna & Bargh 1998, Study 1).
  • ON-LINE SUPPORT In harmony with these conclusions, Davison et al. (2000) studied the provision and seeking of social support on-line by those with grave illnesses, and found that people used Internet support groups particularly for embarrassing, stigmatized illnesses such as AIDS and prostate cancer (and also, understandably, for those illnesses that limit mobility such as multiple sclerosis). The authors point out that because of the anxiety and uncertainty they are feeling, patients are highly motivated by social comparison needs to seek out others with the same illness (p. 213), but prefer to do this on-line when the illness is an embarrassing, disfiguring, or otherwise stigmatized one, because of the anonymity afforded by Internet groups (p. 215).
  • Accordingly, Kang (2000) has argued that one potential social benefit of the Internet is to disrupt the reflexive operation of racial stereotypes, as racial anonymity is much easier to maintain on-line than off-line. For example, studies have found that African Americans and Hispanics pay more than do white consumers for the same car, but these price differences disappear if the car is instead purchased on-line (Scott Morton et al. 2003).
  • Yet racism itself is socially stigmatized-especially when it comes to extreme forms such as advocacy of white supremacy and racial violence (see McKenna & Bargh 1998, Study 3). Thus the cloak of relative anonymity afforded by the Internet can also be used as a cover for racial hate groups, especially for those members who are concerned about public disapproval of their beliefs; hence today there are more than 3000 websites containing racial hatred, agendas for violence, and even bomb-making instructions (Lee & Leets 2002). Glaser et al. (2002) infiltrated such a group and provide telling examples of the support and encouragement given by group members to each other to act on their hatreds. All things considered, then, we don't know yet whether the overall effect of the Internet will be a positive or a negative one where racial and ethnic divisions are concerned.
  • People are not passively affected by technology, but actively shape its use and influence (Fischer 1992, Hughes & Hans 2001). The Internet has unique, even transformational qualities as a communication channel, including relative anonymity and the ability to easily link with others who have similar interests, values, and beliefs. Research has found that the relative anonymity aspect encourages self-expression, and the relative absence of physical and nonverbal interaction cues (e.g., attractiveness) facilitates the formation of relationships on other, deeper bases such as shared values and beliefs. At the same time, however, these "limited bandwidth" features of Internet communication also tend to leave a lot unsaid and unspecified, and open to inference and interpretation.
  • As Lea & Spears (1995) and O'Sullivan (1996) have noted, studying how relationships form and are maintained on the Internet brings into focus the implicit assumptions and biases of our traditional (face-to-face) relationship and communication research literatures (see Cathcart & Gumpert 1983)-most especially the assumptions that face-to-face interactions, physical proximity, and nonverbal communication are necessary and essential to the processes of relating to each other effectively. By providing an alternative interaction setting in which interactions and relationships play by somewhat different rules, and have somewhat different outcomes, the Internet sheds light on those aspects of face-to-face interaction that we may have missed all along. Tyler (2002), for example, reacting to the research findings on Internet interaction, wonders whether it is the presence of physical features that makes face-to-face interaction what it is, or is it instead the immediacy of responses (compared to e-mail)? That's a question we never knew to ask before.
  • Spears et al. (2002) contrasted the engineering model with the "social science" perspective on the Internet, which assumes instead that personal goals and needs are the sole determinant of its effects. [In the domain of communications research, Blumler & Katz's (1974) "uses and gratifications" theory is an influential version of this approach.] According to this viewpoint, the particular purposes of the individuals within the communication setting determine the outcome of the interaction, regardless of the particular features of the communication channel in which the interaction takes place.The third and most recent approach has been to focus on the interaction between features of the Internet communication setting and the particular goals and needs of the communicators, as well as the social context of the interaction setting (see Bargh 2002, McKenna & Bargh 2000, Spears et al. 2002). According to this perspective, the special qualities of Internet social interaction do have an impact on the interaction and its outcomes, but this effect can be quite different depending on the social context. With these three guiding models in mind, we turn to a review of the relevant research.
Martina Dam

All You Must Know Before Availing Short Term Loans! - 0 views

  •  
    If you need cash advance against you next paycheck and computer with internet access, you can simply avail the Short Term Loans,
eva smith

Plan And Payment | Epson Printer Technical Support | 1-800-436-0509 - 0 views

  •  
    epsonprintersupportnumber - Call at 1-800-436-0509 (USA) , 44-800-078-6054 (UK), +61-1800-769-903 (AUS) or mail us at info@epsonprintersupportnumber.com for any tech support related queries about computers and laptops.
Mithun path

List of social bookmarking websites - 1 views

  •  
    Social bookmarking websites allow Internet users to organize and store bookmarks to online resources. The sites provide folksonomy-based tagging, sharing features, web feeds, and bookmarklets to easily add entries. Users can access their bookmarks from any computer. : web page clipping and archiving service, founded in 2003 and acquired by Diggo in 2009.
  •  
    Social bookmarking websites allow Internet users to organize and store bookmarks to online resources. The sites provide folksonomy-based tagging, sharing features, web feeds, and bookmarklets to easily add entries. Users can access their bookmarks from any computer. : web page clipping and archiving service, founded in 2003 and acquired by Diggo in 2009.
anne brown

optical fiber - 0 views

  •  
    OFweek is a B2B trade marketplace for global importers and exporters, providing products information and business opportunities for global buyers and suppliers who focus their businesses on industrial fields such as LED, Solar, Automation, Communication, Laser, Instrument, Optoelectronics, Machinery, Consumer Electronics, Electrical Equipment, Computer, Security Products, etc.
khadija khurram

Advance your typing speed with Dora typing games - 0 views

  •  
    To double your typing speed on computer with diverse drills and tests in typing games are popular these days. Effective typing games and typing techniques can double or even triple your typing speed within a short span of time. They have proven to be effective when it comes to learning how to quickly pick up a new basic skill. They have a great impact on keeping students engaged and help build skills in an entertaining way.
michol lasti

SuperAntiSpyware 5.7.1026 Free Download | librosdigitalescs software - 0 views

  •  
    SUPERAntiSpyware 5.7.1026 Professional features our highly advanced Real time Protection to ensure protection from installation or re-installation of potential threats as you use the Internet. The used in conjunction with our First Chance Prevention and Registry Protection and your computer is protected from thousands of threats that attempt to infect and infiltrate your system at startup or while shutting down your system
michol lasti

UsbFix 8.015 Free Download | librosdigitalescs software - 0 views

  •  
    UsbFix 8.015 Free Download - UsbFix 8.015 is often a free malware removal tool that allows you to detect and remove contaminated USB memory sticks or every other USB removable devices, including external HDD's, smartphones, digital cameras or some other peripherals that connects to your laptop or computer via the USB slot
michol lasti

AdwCleaner 5.001 | librosdigitalescs software - 0 views

  •  
    AdwCleaner 5.001 - AdwCleaner 5.001 is an application that searches for and deletes Adware and Potentially Unwanted Programs (PUP) and browser Hijackers out of your computer.
michol lasti

Winstep Nexus 15.7 Free Download | librosdigitalescs software - 0 views

  •  
    Winstep Nexus 15.7 Free Download - The Winstep Nexus Dock is usually a FREE professional pier for Windows. Having Nexus, your most regularly used applications are just a mouse press away - in addition to Nexus turns utilizing your computer in a fun and exciting experience
Mike Wesch

News 14 | 24 Hour Local News | HEADLINES | Road work sign warns about dinosaur danger - 0 views

  •  
    An electronic traffic sign on the corner of Independence and Randall parkway displayed "Caution: Raptors Ahead" instead of "Road Work Ahead." Mainland Construction workers said someone hacked into the computer and changed the sign.
Yann Leroux

The Ridiculant | Stuff we found down the back of the internet - 0 views

  • It all kicked off when Boxxy’s video was posted to the notorious EBAUMSWORLD* messageboard, as a challenge to see if anybody could make it through the entire video without going mad.
  • Posted by: HHahsHASs | January 22, 2009 at 02:08 PM Wow, this whole article is wrong. Did the journalist even bother to research? Boxxy was started by ebaumsworld.com. DO NOT GO TO 4CHAN. Only go to 4Chan if you want spam and viruses on your computer. My friend went to that site the other day and now his computer is complete dead. By the way, how is this news? Boxxy has been around for like a month now.
  • Posted by: Anonymous | January 22, 2009 at 02:57 PM It's quite clear that Tom Phillips is new to the reporting game and win not last long with shit like this.
Trapper Callender

Coming of Age in Second Life: An ... - Google Book Search - 0 views

  •  
    Millions of people around the world today spend portions of their lives in online virtual worlds. Second Life is one of the largest of these virtual worlds. The residents of Second Life create communities, buy property and build homes, go to concerts, meet in bars, attend weddings and religious services, buy and sell virtual goods and services, find friendship, fall in love--the possibilities are endless, and all encountered through a computer screen.Coming of Age in Second Lifeis the first book of anthropology to examine this thriving alternate universe. Tom Boellstorff conducted more than two years of fieldwork in Second Life, living among and observing its residents in exactly the same way anthropologists traditionally have done to learn about cultures and social groups in the so-called real world. He conducted his research as the avatar "Tom Bukowski," and applied the rigorous methods of anthropology to study many facets of this new frontier of human life, including issues of gender, race, sex, money, conflict and antisocial behavior, the construction of place and time, and the interplay of self and group. Coming of Age in Second Lifeshows how virtual worlds can change ideas about identity and society. Bringing anthropology into territory never before studied, this book demonstrates that in some ways humans have always been virtual, and that virtual worlds in all their rich complexity build upon a human capacity for culture that is as old as humanity itself.
Adam Bohannon

Excessive texting may signal mental illness - web - Technology - smh.com.au - 0 views

  • Those with the condition suffered withdrawal symptoms of anger and tension when a computer was inaccessible, and often lost their sense of time through excessive use, Dr Block said.
  • Other symptoms included feeling "the need for better computer equipment, more software, or more hours of use", and having arguments, lying, social isolation and fatigue, he said. Excessive gaming, sexual preoccupations and excessive text messages and emails were all evidence of having the disorder, he said.
  •  
    People who send large numbers of text messages and emails may have a mental disorder, a doctor writing in a leading psychiatric journal said. Jerald Block, writing in the latest issue of the American Journal Of Psychiatry, said "internet addiction" was a "common disorder" that deserved inclusion in a manual of mental disorders used by health professionals.
‹ Previous 21 - 40 of 106 Next › Last »
Showing 20 items per page