scholarly journals Building as Interface: Sustainable Educational Ecologies

Author(s):  
Suzanne De Castell ◽  
Milena Droumeva ◽  
Jen Jenson

This paper begins with the most obvious, and yet most elusive, of educational media ecologies, the buildings which are ‹home› to pedagogic communication and interaction, and considers how we might understand «building as interface», construed first as a noun, («a structure with roof and walls» – OED) referring to places as physical structures, and then as a verb, («the action or trade of constructing something» – OED), referring to the activities of construction through which we can engage technologies central to theory, research and practice. Our concern is with exploring the larger question of educational sustainability: with what ‹sustainability› means when applied to a specifically educational context, and with the sustainability of the kinds of emerging educational environments in which new information and communications technologies play a significant role. This question of sustainable educational environments is driven by a need to be responsible and accountable for the impact of the technologies and practices we eagerly embrace in the name of «21st century learning», even as prospects for a 22nd century are so rapidly receding from view. As one prominent media ecologist put the point: «we have to find the environments in which it will be possible to live with our new inventions» (McLuhan 1967, 124).

2007 ◽  
Vol 16 (2) ◽  
pp. 77-96 ◽  
Author(s):  
Lee Komito

Can new information and communications technologies increase citizen participation in civic life and promote community development? Worldwide studies of community information systems demonstrate that new technologies can enhance the effectiveness of activists. However, there has been little evidence that they bring in new participants. This article argues that e-government systems can, if properly designed and implemented, involve citizens who have not previously been active in local community life, and describes an Irish pilot project which has this capacity. The success of such systems depends not only on design issues, but also on the willingness of government to respond to the resulting policy inputs by citizens.


2013 ◽  
pp. 60-80 ◽  
Author(s):  
Claudia Canongia ◽  
Raphael Mandarino

This chapter introduces the theme of cybersecurity, its importance in the actual scenario, and the challenges of the new Information Society, whose critical development factors are the technological revolution and innovation. The revolution that the information and communications technologies (ICTs) has already brought to modern society is, without doubt, more than visible and concrete, but the great challenge facing us is to harmonize two dimensions, the first relating to the culture of sharing, socialization, and transparency, and the second relating to the issues of security, confidentiality, and privacy. It gives a broad overview in tabular form of the national cybersecurity strategies of the developed countries, United States and United Kingdom, as well as describing a study case, Brazil, is taking its first steps on the path towards cybersecurity. The chapter ends by proposing a model, the key elements for formulating a Brazilian cybersecurity strategy.


Author(s):  
Claudia Canongia ◽  
Raphael Mandarino

This chapter introduces the theme of cybersecurity, its importance in the actual scenario, and the challenges of the new Information Society, whose critical development factors are the technological revolution and innovation. The revolution that the information and communications technologies (ICTs) has already brought to modern society is, without doubt, more than visible and concrete, but the great challenge facing us is to harmonize two dimensions, the first relating to the culture of sharing, socialization, and transparency, and the second relating to the issues of security, confidentiality, and privacy. It gives a broad overview in tabular form of the national cybersecurity strategies of the developed countries, United States and United Kingdom, as well as describing a study case, Brazil, is taking its first steps on the path towards cybersecurity. The chapter ends by proposing a model, the key elements for formulating a Brazilian cybersecurity strategy.


Author(s):  
Wendy Faulkner ◽  
Merete Lie

Strategies of Inclusion Gender and the Information Society (SIGIS) was a European study exploring initiatives to include more women in the information society.1 This article summarises its main conclusions. The work started from the premise that overall more women than men are excluded from the information society, both as users and as designers of new information and communications technologies (ICTs). Our literature review (Sørensen & Stewart, 2002) confirmed that there is still a gender gap in terms of ownership of some ICT products and, to a lesser extent, in terms of access and use. Gender cuts across other dynamics in the digital divide—income, occupation and age being generally more significant than gender—with other factors (e.g., ethnic minorities, lone parent families) also intervening. Although the trend with respect to the use of ICT products is one of a closing gender gap, it is clear that diffusion alone is not sufficient to close the gap all together; inclusion efforts are still warranted in this area. By contrast, the literature review revealed a persistent and sizeable gender gap within computer specialisms and professions designing ICTs. The proportion of women entering computer science and engineering courses in most countries is static or in decline, in spite of sustained inclusion efforts. So, the overall picture across Europe is a contradictory one: optimistic with respect to what we call women and ICT (users), and pessimistic with respect to women in ICT (professionals).


Author(s):  
Joseph Ato Forson

Purpose The purpose of this paper is to provide a conceptual framework on the relationship between corruption and development. The paper demonstrates how the impact of corruption on economic development might vary substantially from sustainable development (SD). Design/methodology/approach A combination of literature-based analysis was employed by considering concepts from corruption and development. A synthesis of these two concepts leads to the development of the conceptual framework. Findings The findings shows that corruption originates from three main sources, and that the effect of corruption on development might differ depending on how it is conceptualized, but the spate of corruption is contingent on institutional quality and gains in previous development trajectory. Originality/value Relating the concept of corruption and SD and linking it to theories of development brings a sense of novelty. This paper has in its essence contributed to the conceptualization of the relationship between corruption and development which will help deepen understanding on this contentious subject. The framework will help to improve theory, research and practice in development studies and allied fields.


2014 ◽  
Vol 5 (1) ◽  
pp. 16-30 ◽  
Author(s):  
Haya Ajjan ◽  
Stefanie Beninger ◽  
Rania Mostafa ◽  
Victoria L. Crittenden

Cyberfeminism is a woman-centered perspective that advocates women’s use of new information and communications technologies for empowerment. This paper explores the role of information technologies, in particular the role of social media, in empowering women entrepreneurship in emerging economies via increased social capital and improved self-efficacy. A conceptual model is offered and propositions are explicated.


2003 ◽  
Vol 11 (2) ◽  
Author(s):  
David Nicol ◽  
Michael Coen

Significant investments are being made in the application of new information and communications technologies (ICT) to teaching and learning in higher education. However, until recently, there has been little progress in devising an integrated costbenefit model that decision-makers can use to appraise ICT investment options from the wider institutional perspective. This paper describes and illustrates a model that has been developed to enable evaluations of the costs and benefits of the use of ICT. The strengths and limitations of the model are highlighted and discussed DOI:10.1080/0968776030110205


Sign in / Sign up

Export Citation Format

Share Document