Control and Power in Educational Computing
نویسندگان
چکیده
Educational computing based on the primacy of human agency is explored, considering ways in which ower can be apportioned and exercised in order to enhance edw..ational computing. Ideas about power and control are situated epistemologically. A first consideration is educating for human control of computer technology. Research suggests that children and some adults attribute agency to computer technology, and much research in computer science comes from the belief that computer technology can mimic, if not duplicate, human agency. It is argued that people should control technology and take responsibility for the consequences of computer-mediated action, and control should be minimized if not eliminated from power relations between people. To promote this, a constructivist theory of education allows for the epistemological stance that the authors articulate. The principles of constructivist education call for educational software that supports students' construction of knowledge and foster interest, autonomy, and cooperation. Technologies and approaches in this direction are explored. A constructivist approach will avoid one of the pitfalls of deconstructionism, the emphasis on power that is often the only recourse of the deconstructivist when injustice occurs. It is suggested that postmodern epistemology be set aside, but that the best of what remains of postmodern thinking and practice be used to promote democracy in educational computing. (Contains 103 references.) (SLD) *********************************************************************** Reproductions supplied by EDRS are the best that can be made from the original document. *********************************************************************** U.S. DEPARTMENT OF EDUCATION Office of Educational Research and improvement EDUCATIONAL RESOURCES INFORMATION CENTER (ERIC) o This document has been reproduced as received from the person or organization originating it r Minor changes have been made to improve reproduction duality Points ol view or opinions stated in thisclocu ment do not necessarily represent official OERI position or policy Control and Power in Educational Computing Peter H. Kahn, Jr. and Batya Friedman
منابع مشابه
A semantic-aware role-based access control model for pervasive computing environments
Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...
متن کاملComputing tolerance interval for binomial random variable
Tolerance interval is a random interval that contains a proportion of the population with a determined confidence level and is applied in many application fields such as reliability and quality control. In this educational paper, we investigate different methods for computing tolerance interval for the binomial random variable using the package Tolerance in statistical software R.
متن کاملDoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
متن کاملEnergy Aware Resource Management of Cloud Data Centers
Cloud Computing, the long-held dream of computing as a utility, has the potential to transform a large part of the IT industry, making software even more attractive as a service and shaping the way IT hardware is designed and purchased. Virtualization technology forms a key concept for new cloud computing architectures. The data centers are used to provide cloud services burdening a significant...
متن کاملUse of Structure Codes (Counts) for Computing Topological Indices of Carbon Nanotubes: Sadhana (Sd) Index of Phenylenes and its Hexagonal Squeezes
Structural codes vis-a-vis structural counts, like polynomials of a molecular graph, are important in computing graph-theoretical descriptors which are commonly known as topological indices. These indices are most important for characterizing carbon nanotubes (CNTs). In this paper we have computed Sadhana index (Sd) for phenylenes and their hexagonal squeezes using structural codes (counts). Sa...
متن کاملNeuro-fuzzy control of bilateral teleoperation system using FPGA
This paper presents an adaptive neuro-fuzzy controller ANFIS (Adaptive Neuro-Fuzzy Inference System) for a bilateral teleoperation system based on FPGA (Field Programmable Gate Array). The proposed controller combines the learning capabilities of neural networks with the inference capabilities of fuzzy logic, to adapt with dynamic variations in master and slave robots and to guarantee good prac...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012