Emancipatory Technology Enhanced Learning’ bridging whatever technology divides
نویسندگان
چکیده
منابع مشابه
Technology-Enhanced Learning
Research issues and challenges related to technology-enhanced learning are discussed for classroom learning at a distance, online learning, digital libraries, special collections and online resources, virtual laboratories, ecollaboration, and virtual environments. Recognizing the potential of small changes in technology to have large effects on learning and learning systems, treating the develo...
متن کاملÖkonomisierung des Technology Enhanced Learning
Umsetzung und Durchführung von E-Learning sind i.d.R. mit Kosten verbunden. Um diese Kosten auszugleichen bzw. Profite zu erwirtschaften, sind passende Geschäftsmodelle zu finden und umzusetzen. Bisher fehlt ein Ansatz, um ökonomische Vorgaben in Lerntechnologien zu integrieren. In dieser Arbeit wird ein Konzept zur Ökonomisierung des Technology Enhanced Learning vorgestellt. Dazu wird ein Date...
متن کاملDesigning technology enhanced learning contexts
Through iterative participatory design-based research I aim to explore the application of the Ecology of Resources (EoR) Framework (Luckin, 2008) to the design of technology enhanced contexts that scaffold learning and collaboration. Technology enhanced learning (TEL) contexts engage learners and the ecology of resources available to them as they move through time and space, in coordinated and ...
متن کاملHCI for technology enhanced learning
The involvement of technology to support and enhance learning is ever increasing; for example moving from the traditional blackboard to electronic whiteboards, from printed books to virtual reality training simulations, and from class room meetings to (a-)synchronised meeting over the web with handheld mobile devices. These technologies promise improved efficiency for traditional ways of learni...
متن کاملWhatever Happened to Network-Access-Control Technology?
O rganizations face complex threats while providing network access for customers, vendors, mobile employees, contractors, and others. Many organizations see these inside threats as a top networksecurity challenge, one unmet by products such as firewalls and antivirus software. In response, security vendors developed network-access-control technology. NAC systems authenticate devices trying to c...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Διεθνές Συνέδριο για την Ανοικτή & εξ Αποστάσεως Εκπαίδευση
سال: 2016
ISSN: 2459-4210
DOI: 10.12681/icodl.533