Innovation and Inertia: Information Technology and Education in the United States

Computer ◽  
2018 ◽  
Vol 51 (10) ◽  
pp. 40-47 ◽  
Author(s):  
Jonathan Grudin
2018 ◽  
Vol 6 (2) ◽  
pp. 149
Author(s):  
Neal Grandgenett ◽  
Pam Perry ◽  
Thomas Pensabene ◽  
Karen Wegner ◽  
Robert Nirenberg ◽  
...  

The buildings in which people work, live, and spend their leisure time are increasingly embedded with sophisticated information technology (IT). This article describes the approach of Metropolitan Community College (MCC) in Omaha, Nebraska of the United States to provide an occupational context to some of their IT coursework by organizing IT instruction around the context of building automation systems (BAS). This contextualization allows IT students not only to study IT as a standalone discipline but also to study its integrated use within a specific occupational context. The article also describes MCC’s focused curriculum design efforts funded by the National Science Foundation’s Advanced Technological Education program. These efforts toward BAS-contextualization of the IT curriculum have become a catalyst for systematic contextualization of IT instruction at MCC and support the institution’s broader efforts to become a national model in IT instruction and interdisciplinary engagement within the United States. The research-based approach, activities, and outcomes of this project are all described here, as well as the lessons learned by one community college seeking to make their IT program increasingly relevant to their students and the IT workforce of today.


Medical Care ◽  
2015 ◽  
Vol 53 (2) ◽  
pp. 184-190 ◽  
Author(s):  
Chun-Ju Hsiao ◽  
Jennifer King ◽  
Esther Hing ◽  
Alan E. Simon

Author(s):  
Dillon Glasser ◽  
Aakash Taneja

Since the government began tackling the problems of cybercrime, many laws have been enacted. A lack of a comprehensive definition and taxonomy of cybercrime makes it difficult to accurately identify report and monitor cybercrime trends. There is not just a lack of international agreement on what cybercrime is; there are different laws in every state within the United States, reflecting the inconsistency of dealing with cybercrime. There is also concern that many times lawyers and information technology professions are unable to understand each other well. The deficiency of cyber laws is an obvious problem and development of effective laws is emerging as an important issue to deal with cybercrime. This research uses the routine activity theory to develop a unified framework by including the motivation of the offender to use a computer as a tool/target, suitability of the target, and the presence (or absence) of guardian. It could help states that want to update their existing laws and cover areas that were previously uncovered.


Author(s):  
Ramona Sue McNeal ◽  
Susan M. Kunkle ◽  
Lisa Dotterweich Bryan

Cyberbullying is the use of information technology to deliberately hurt, taunt, threaten or intimidate someone. Currently, there are no federal statutes in the United States which directly address this problem. The response of the states has varied from attempting to use existing anti-bullying laws to limit cyberbullying to passing new laws that specifically target cyberbullying behavior. An important question is, “why are some states taking a lead in combating this cybercrime through new laws while others are relying on existing laws?” The literature on policy adoption suggests politics, resources and public need are important factors in predicting why certain states are more likely to enact government policies. This chapter analyzes the impact of these factors and others on policy adoption by exploring the level of legislative action to update existing cyberbullying laws for 2009 through 2014.


2008 ◽  
pp. 3659-3675
Author(s):  
Steven C. Ross ◽  
Craig K. Tyran ◽  
David J. Auer

On July 3, 2002, fire destroyed a facility that served as both office and computer server room for a College of Business located in the United States. The fire also caused significant smoke damage to the office building where the computer facility was located. The monetary costs of the disaster were over $4 million. This case, written from the point of view of the chairperson of the College Technology Committee, discusses the issues faced by the college as they resumed operations and planned for rebuilding their information technology operations. The almost-total destruction of the college’s server assets offered a unique opportunity to rethink the IT architecture for the college. The reader is challenged to learn from the experiences discussed in the case to develop an IT architecture for the college that will meet operational requirements and take into account the potential threats to the system.


2008 ◽  
pp. 1-20 ◽  
Author(s):  
Kenneth Kraemer ◽  
John Leslie King

This article examines the theoretical ideal of information technology as an instrument of administrative reform and examines the extent to which that ideal has been achieved in the United States. It takes a look at the findings from research about the use and impacts of information technology from the time of the mainframe computer through the PC revolution to the current era of the Internet and e-government. It then concludes that information technology has never been an instrument of administrative reform; rather, it has been used to reinforce existing administrative and political arrangements. It assesses why this is the case and draws conclusions about what should be expected with future applications of information technologies—in the time after e-government. It concludes with a discussion of the early evidence about newer applications for automated service delivery, 24/7 e-government, and e-democracy.


2009 ◽  
pp. 1729-1735
Author(s):  
Myungsook Klassen ◽  
Russell Stockard

The issue of the underrepresentation of women in the information technology workforce has been the subject of a number of studies and the gender gap was an issue when the digital divide dominated discourse about women’s and minority groups’ use of the Internet However, a broader view is needed. That perspective would include the relation of women and IT in the communities in which they live as well as the larger society. The information society that has emerged includes the United States and the globalized economy of which it is an integral part. Women and minorities such as African Americans and Latinos are underrepresented in computer science (CS) and other information technology positions in the United States. In addition, while they areno longer numerically underrepresented in access to computers and the Internet – as of 2000, (Gorski, 2001) - they continue to enjoy fewer benefits available through the medium than white boys and men. The following article explores the diversity within women from the perspectives of race, ethnicity and social class in North America, mainly United States. The technology gender and racial gap persists in education and in the IT workforce. A broader and deeper look at women’s position in relation to the increasingly techno-centric society reveals that women may have reached equality in access, but not equity in academic study and job opportunities.


2022 ◽  
pp. 193-203

The purpose of this chapter is to analyze and review trends in digital terminology. The chapter begins by examining the origins of computerization in the United States during the 19th and 20th centuries. Next, the chapter examines the key concepts punch cards and computer science. The chapter then discusses how the term computer science is misleading. This is followed by a discussion of how information technology became the most popular term in the US. The chapter then switches focus to Europe and discusses France's promotion of informatique as well as Europe's switch from informatics to ICT. Next, the chapter considers how the internet has given rise to terms like e-commerce. The chapter concludes by considering the transition from ICT to digital informing and informing technology.


Sign in / Sign up

Export Citation Format

Share Document