The Effects of Wireless Computing in Collaborative Learning Environments

نویسندگان

  • Geri Gay
  • Michael Stefanone
  • Michael Grace-Martin
  • Helene Hembrooke
چکیده

Eighty-four students distributed between two different courses at a major research university (one a communication course, the other a computer science course) were given laptop computers with wireless network access during the course of a semester. Awide variety of data (from questionnaires, e-mail logs, proxy server logs, and diaries) regarding students’ use of the laptops for electronic communication, Web browsing, and local application use (e.g., word processing) was collected and analyzed. The influences of course, network (wireless–wired), student population, and the passage of time were investigated in relation to the prevalence and nature of social computing (e.g., e-mail, instant messaging, chat, discussion boards, online annotations) in students’ laptop usage. The relative prevalence of social computing increased and became more exclusive for students in the communication course, especially on the wireless network. Social computing and use of the wireless network were less prominent and influential for students in the computer science course.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

DisTriB: Distributed Trust Management Model Based on Gossip Learning and Bayesian Networks in Collaborative Computing Systems

The interactions among peers in Peer-to-Peer systems as a distributed collaborative system are based on asynchronous and unreliable communications. Trust is an essential and facilitating component in these interactions specially in such uncertain environments. Various attacks are possible due to large-scale nature and openness of these systems that affects the trust. Peers has not enough inform...

متن کامل

DisTriB: Distributed Trust Management Model Based on Gossip Learning and Bayesian Networks in Collaborative Computing Systems

The interactions among peers in Peer-to-Peer systems as a distributed collaborative system are based on asynchronous and unreliable communications. Trust is an essential and facilitating component in these interactions specially in such uncertain environments. Various attacks are possible due to large-scale nature and openness of these systems that affects the trust. Peers has not enough inform...

متن کامل

Designing collaborative learning model in online learning environments

Introduction: Most online learning environments are challenging for the design of collaborative learning activities to achieve high-level learning skills. Therefore, the purpose of this study was to design and validate a model for collaborative learning in online learning environments. Methods: The research method used in this study was a mixed method, including qualitative content analysis and...

متن کامل

The Collaborative Learning in the e-Learning Environments

Introduction: The collaborative learning and interactive electronic-learning (e- learning) is one of the key factors in education system success. This study examined the collaborative e-learning in the framework of constructivism theory. Methods: This is a review article. The databases such as Scientific Information Databases, Magiran, Science Direct, and Google Scholar were reviewed. Also,...

متن کامل

مطالعه مواجهه عمومی با امواج مایکروویو انتشار‌یافته از سامانه‌های بدون‌ سیم (Wireless) دانشگاه علوم پزشکی قزوین

The increasing use of wireless systems in educational and administrative environments has caused concern People working in these environments about the physical and psychological effects of the waves on health. This study was conducted to assess public exposure to microwave emissions intensity of the wireless system (Wireless) Qazvin University of Medical Sciences.  In this cross-sectio...

متن کامل

Evaluation of an Intrusion Detection System for Routing Attacks in Wireless Self-organised Networks

Wireless Sensor Networks (WSNs) arebecoming increasingly popular, and very useful in militaryapplications and environmental monitoring. However,security is a major challenge for WSNs because they areusually setup in unprotected environments. Our goal in thisstudy is to simulate an Intrusion Detection System (IDS)that monitors the WSN and report intrusions accurately andeffectively. We have thus...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Int. J. Hum. Comput. Interaction

دوره 13  شماره 

صفحات  -

تاریخ انتشار 2001