scholarly journals Paradigm Shift or Annoying Distraction

2010 ◽  
Vol 01 (02) ◽  
pp. 96-115 ◽  
Author(s):  
J. O’Donnell ◽  
M. Clayton ◽  
P. Anderson ◽  
A. Krueger ◽  
H. Spallek

SummaryWeb 2.0 technologies, known as social media, social technologies or Web 2.0, have emerged into the mainstream. As they grow, these new technologies have the opportunity to influence the methods and procedures of many fields. This paper focuses on the clinical implications of the growing Web 2.0 technologies. Five developing trends are explored: information channels, augmented reality, location-based mobile social computing, virtual worlds and serious gaming, and collaborative research networks. Each trend is discussed based on their utilization and pattern of use by healthcare providers or healthcare organizations. In addition to explorative research for each trend, a vignette is presented which provides a future example of adoption. Lastly each trend lists several research challenge questions for applied clinical informatics. Citation: Spallek H, O’Donnell J, Clayton M, Anderson P, Krueger A. Paradigm shift or annoying distraction – emerging implications of Web 2.0 for clinical practice. Appl Clin Inf 2010; 1: 96–115 http://dx.doi.org/10.4338/ACI-2010-01-CR-0003

ReCALL ◽  
2008 ◽  
Vol 20 (2) ◽  
pp. 124-140 ◽  
Author(s):  
Gráinne Conole

AbstractWhat does learning in today's technology-enhanced environment mean? Is learning as an activity fundamentally changing as a result of the opportunities offered by new technologies and tools? How are the new communicative channels and increased social dimensions possible through Web 2.0 technologies impacting on the way students work and learn? And what does this mean for the role of teachers and institutions in terms of how they support students? This paper considers these questions and reports on findings from current research evaluating how students are actually using technologies and what this research tells us about the ways in which patterns of learning might be changing. It will consider the implications for individual teachers (in terms of designing and supporting learning activities for students) and institutions in terms of the impact on policy and the associated infrastructure needed to provide an appropriate environment that maximises the potential offered by new technologies.


Author(s):  
Royce Ann Collins

Through out the years, teaching has evolved with each passing generation and adapted to the new technologies and new ways of instructing as the latest research is published. For example, once typing was taught with manual typewriters, then electric typewriters. Now, the courses are called keyboarding and they are taught on computers. Currently, the teaching platform is evolving into a virtual world with collaborative, interactive web technologies. Addressing teaching from a learner-centered approach, this chapter will discuss the evolution of teaching as new generations of adults enter the learning environment and examine a case study of one instructor’s journey in incorporating new Web 2.0 technologies into courses.


in education ◽  
2013 ◽  
Vol 16 (1) ◽  
Author(s):  
Sean Wiebe ◽  
Sandy McAuley

While the ubiquity of Web 2.0 technologies disrupts conventional notions of schooling and literacy, its impact on learning is idiosyncratic at best. Taking the form of a dialogue based on the 15-week collaboration of two colleagues implementing an innovative 1st-year university writing course, this paper documents some of the successes and challenges they faced as they sought to create a space for those technologies in their classrooms.Keywords: Web 2.0; schooling and literacy; learning; higher education; new technologies


2013 ◽  
pp. 1609-1630
Author(s):  
Gráinne Conole

This chapter considers the impact of Web 2.0 technologies on education and, in particular, how these new technologies are changing learning and teaching practices. It considers their fundamental characteristics and looks at the implications for learners, teachers, and institutions. It argues that the impact on practice can be both positive and negative, and that as a consequence, educational institutions need to develop new policies and strategies. The chapter concludes with two approaches to making sense of and harnessing these new technologies. The first is an example of applying Web 2.0 approaches to facilitating greater dialogue and sharing of learning and teaching ideas, through a social networking site for design. The second argues for greater use of metaphors and other forms of meaning making as a mechanism for understanding Web 2.0 technologies in an educational context.


2011 ◽  
pp. 909-923
Author(s):  
Samantha C. Bryant

Marketing strategy set by the marketing mix has remained fundamentally the same through years of other business disciplines being significantly disrupted by emerging technologies. Emerging Web 2.0 technologies such as wikis, blogs, YouTube, and virtual worlds are not only affecting how companies tactically approach marketing, but also their marketing strategies. This chapter will explore the impact of Web 2.0 technologies on marketing and brand management and how companies can leverage these technologies to strengthen relationships between their brands and consumers through a Web 2.0 marketing mix. This new Web 2.0 marketing mix supplements the traditional four-p marketing mix (price, product, promotion, and placement) with a new “p” lens: participation. The focus of this analysis is on B2C marketing of products and services only.


2010 ◽  
pp. 394-415 ◽  
Author(s):  
Gráinne Conole

This chapter considers the impact of Web 2.0 technologies on education and, in particular, how these new technologies are changing learning and teaching practices. It considers their fundamental characteristics and looks at the implications for learners, teachers, and institutions. It argues that the impact on practice can be both positive and negative, and that as a consequence, educational institutions need to develop new policies and strategies. The chapter concludes with two approaches to making sense of and harnessing these new technologies. The first is an example of applying Web 2.0 approaches to facilitating greater dialogue and sharing of learning and teaching ideas, through a social networking site for design. The second argues for greater use of metaphors and other forms of meaning making as a mechanism for understanding Web 2.0 technologies in an educational context.


Author(s):  
Daniel Viney

This chapter discusses ICT trends of the past decade, the emergence of Web 2.0 technologies, mobile computing (as distinguished from cloud computing), the pitfalls of social networking, security considerations in the workplace, copyright and Intellectual Property considerations, and how to best control threats and vulnerabilities. We are in a period of aggressive technological growth to which there is no foreseeable end. New technologies, such as Web 2.0 and cloud computing, are emerging at an exponential rate, and as a consequence, security threats, controls, and standards are iteratively evolving. As yet, we do not know the security and privacy implications that such a rapid and wide uptake of cloud computing, and other multi-user virtual environment initiatives, and Web 2.0 technologies, will bring. In no way is this cause to panic, instead it is cause to focus on self-education, employee-education, and awareness. To put it simply, these offer our best defense to security threats. By being educated, aware, and vigilant, the majority of threats are nullified, as they are designed to prey upon those who rely on trust when reading emails, visiting Websites, and accessing site content, when navigating the World Wide Web. For example, there are millions of users who are completely unaware of threats, such as phishing, and other forms of Internet-based fraud. More than ever before, the onus is on the individual, both at home and in the workplace, to be responsible for maintaining best practice techniques, while utilizing digital resources to ensure that information security, individual privacy, and applicable legislation are not breached. This can only be achieved through iterative education processes, general awareness, and vigilance.


Author(s):  
Samantha C. Bryant

Marketing strategy set by the marketing mix has remained fundamentally the same through years of other business disciplines being significantly disrupted by emerging technologies. Emerging Web 2.0 technologies such as wikis, blogs, YouTube, and virtual worlds are not only affecting how companies tactically approach marketing, but also their marketing strategies. This chapter will explore the impact of Web 2.0 technologies on marketing and brand management and how companies can leverage these technologies to strengthen relationships between their brands and consumers through a Web 2.0 marketing mix. This new Web 2.0 marketing mix supplements the traditional four-p marketing mix (price, product, promotion, and placement) with a new “p” lens: participation. The focus of this analysis is on B2C marketing of products and services only.


Cyber Crime ◽  
2013 ◽  
pp. 1641-1653
Author(s):  
Daniel Viney

This chapter discusses ICT trends of the past decade, the emergence of Web 2.0 technologies, mobile computing (as distinguished from cloud computing), the pitfalls of social networking, security considerations in the workplace, copyright and Intellectual Property considerations, and how to best control threats and vulnerabilities. We are in a period of aggressive technological growth to which there is no foreseeable end. New technologies, such as Web 2.0 and cloud computing, are emerging at an exponential rate, and as a consequence, security threats, controls, and standards are iteratively evolving. As yet, we do not know the security and privacy implications that such a rapid and wide uptake of cloud computing, and other multi-user virtual environment initiatives, and Web 2.0 technologies, will bring. In no way is this cause to panic, instead it is cause to focus on self-education, employee-education, and awareness. To put it simply, these offer our best defense to security threats. By being educated, aware, and vigilant, the majority of threats are nullified, as they are designed to prey upon those who rely on trust when reading emails, visiting Websites, and accessing site content, when navigating the World Wide Web. For example, there are millions of users who are completely unaware of threats, such as phishing, and other forms of Internet-based fraud. More than ever before, the onus is on the individual, both at home and in the workplace, to be responsible for maintaining best practice techniques, while utilizing digital resources to ensure that information security, individual privacy, and applicable legislation are not breached. This can only be achieved through iterative education processes, general awareness, and vigilance.


2016 ◽  
Vol 18 (1) ◽  
Author(s):  
Winner D. Chawinga ◽  
Sandy Zinn

Background: Over the years, advancements in Internet technologies have led to the emergence of new technologies such as Web 2.0, which have taken various sectors including higher education by storm. Web 2.0 technologies are slowly but surely penetrating higher education in developing countries with much hype, according to the literature. This justifies the need for original research that aims at demystifying the application and exploiting the promises that come along with these so-called versatile technologies.Objectives: The specific objectives of the study were to ascertain students’ awareness of and familiarity with Web 2.0 technologies, to determine the purposes for which students use Web 2.0 technologies, and to identify the factors that affect students’ use or non-use of Web 2.0 technologies.Method: A mixed-methods approach was adopted. Firstly, a questionnaire was sent to 186 students; secondly, the curricula of the two departments in the Faculty of Information Science and Communication (ISC) were analysed; finally, follow-up interviews were conducted with seven lecturers in the Faculty of ISC.Results: The study found that students use Web 2.0 technologies to search for information, to communicate with lecturers, to submit assignments and to communicate with friends on academic work. Wikipedia, WhatsApp, Google Apps and YouTube are the Web 2.0 technologies most used by students. Poor bandwidth (Internet connection) coupled with the absence of Wi-Fi (wireless Internet connection) prevents the successful adoption of Web 2.0 by students.Conclusion: Web 2.0 can have a profound impact on undergraduate students and lecturers in teaching and learning. The research results indicated a high awareness of a wide range of Web 2.0 technologies, with social networks being the commonly used one. There is a need for more training to increase awareness of and familiarity with new Web 2.0 technologies. The problem of poor bandwidth needs to be addressed by the university management in order to gain significant benefits.


Sign in / Sign up

Export Citation Format

Share Document