The Effects of Wireless Computing in Collaborative Learning Environments
نویسندگان
چکیده
Eighty-four students distributed between two different courses at a major research university (one a communication course, the other a computer science course) were given laptop computers with wireless network access during the course of a semester. Awide variety of data (from questionnaires, e-mail logs, proxy server logs, and diaries) regarding students’ use of the laptops for electronic communication, Web browsing, and local application use (e.g., word processing) was collected and analyzed. The influences of course, network (wireless–wired), student population, and the passage of time were investigated in relation to the prevalence and nature of social computing (e.g., e-mail, instant messaging, chat, discussion boards, online annotations) in students’ laptop usage. The relative prevalence of social computing increased and became more exclusive for students in the communication course, especially on the wireless network. Social computing and use of the wireless network were less prominent and influential for students in the computer science course.
منابع مشابه
DisTriB: Distributed Trust Management Model Based on Gossip Learning and Bayesian Networks in Collaborative Computing Systems
The interactions among peers in Peer-to-Peer systems as a distributed collaborative system are based on asynchronous and unreliable communications. Trust is an essential and facilitating component in these interactions specially in such uncertain environments. Various attacks are possible due to large-scale nature and openness of these systems that affects the trust. Peers has not enough inform...
متن کاملDisTriB: Distributed Trust Management Model Based on Gossip Learning and Bayesian Networks in Collaborative Computing Systems
The interactions among peers in Peer-to-Peer systems as a distributed collaborative system are based on asynchronous and unreliable communications. Trust is an essential and facilitating component in these interactions specially in such uncertain environments. Various attacks are possible due to large-scale nature and openness of these systems that affects the trust. Peers has not enough inform...
متن کاملDesigning collaborative learning model in online learning environments
Introduction: Most online learning environments are challenging for the design of collaborative learning activities to achieve high-level learning skills. Therefore, the purpose of this study was to design and validate a model for collaborative learning in online learning environments. Methods: The research method used in this study was a mixed method, including qualitative content analysis and...
متن کاملThe Collaborative Learning in the e-Learning Environments
Introduction: The collaborative learning and interactive electronic-learning (e- learning) is one of the key factors in education system success. This study examined the collaborative e-learning in the framework of constructivism theory. Methods: This is a review article. The databases such as Scientific Information Databases, Magiran, Science Direct, and Google Scholar were reviewed. Also,...
متن کاملمطالعه مواجهه عمومی با امواج مایکروویو انتشاریافته از سامانههای بدون سیم (Wireless) دانشگاه علوم پزشکی قزوین
The increasing use of wireless systems in educational and administrative environments has caused concern People working in these environments about the physical and psychological effects of the waves on health. This study was conducted to assess public exposure to microwave emissions intensity of the wireless system (Wireless) Qazvin University of Medical Sciences. In this cross-sectio...
متن کاملEvaluation of an Intrusion Detection System for Routing Attacks in Wireless Self-organised Networks
Wireless Sensor Networks (WSNs) arebecoming increasingly popular, and very useful in militaryapplications and environmental monitoring. However,security is a major challenge for WSNs because they areusually setup in unprotected environments. Our goal in thisstudy is to simulate an Intrusion Detection System (IDS)that monitors the WSN and report intrusions accurately andeffectively. We have thus...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Int. J. Hum. Comput. Interaction
دوره 13 شماره
صفحات -
تاریخ انتشار 2001