Control and Power in Educational Computing

نویسندگان

  • Peter H. Kahn
  • Batya Friedman
چکیده

Educational computing based on the primacy of human agency is explored, considering ways in which ower can be apportioned and exercised in order to enhance edw..ational computing. Ideas about power and control are situated epistemologically. A first consideration is educating for human control of computer technology. Research suggests that children and some adults attribute agency to computer technology, and much research in computer science comes from the belief that computer technology can mimic, if not duplicate, human agency. It is argued that people should control technology and take responsibility for the consequences of computer-mediated action, and control should be minimized if not eliminated from power relations between people. To promote this, a constructivist theory of education allows for the epistemological stance that the authors articulate. The principles of constructivist education call for educational software that supports students' construction of knowledge and foster interest, autonomy, and cooperation. Technologies and approaches in this direction are explored. A constructivist approach will avoid one of the pitfalls of deconstructionism, the emphasis on power that is often the only recourse of the deconstructivist when injustice occurs. It is suggested that postmodern epistemology be set aside, but that the best of what remains of postmodern thinking and practice be used to promote democracy in educational computing. (Contains 103 references.) (SLD) *********************************************************************** Reproductions supplied by EDRS are the best that can be made from the original document. *********************************************************************** U.S. DEPARTMENT OF EDUCATION Office of Educational Research and improvement EDUCATIONAL RESOURCES INFORMATION CENTER (ERIC) o This document has been reproduced as received from the person or organization originating it r Minor changes have been made to improve reproduction duality Points ol view or opinions stated in thisclocu ment do not necessarily represent official OERI position or policy Control and Power in Educational Computing Peter H. Kahn, Jr. and Batya Friedman

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A semantic-aware role-based access control model for pervasive computing environments

Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...

متن کامل

Computing tolerance interval for binomial random variable

Tolerance interval is a random interval that contains a proportion of the population with a determined confidence level and is applied in many application fields such as reliability and quality control. In this educational paper, we investigate different methods for computing tolerance interval for the binomial random variable using the package Tolerance in statistical software R. 

متن کامل

DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation

Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...

متن کامل

Energy Aware Resource Management of Cloud Data Centers

Cloud Computing, the long-held dream of computing as a utility, has the potential to transform a large part of the IT industry, making software even more attractive as a service and shaping the way IT hardware is designed and purchased. Virtualization technology forms a key concept for new cloud computing architectures. The data centers are used to provide cloud services burdening a significant...

متن کامل

Use of Structure Codes (Counts) for Computing Topological Indices of Carbon Nanotubes: Sadhana (Sd) Index of Phenylenes and its Hexagonal Squeezes

Structural codes vis-a-vis structural counts, like polynomials of a molecular graph, are important in computing graph-theoretical descriptors which are commonly known as topological indices. These indices are most important for characterizing carbon nanotubes (CNTs). In this paper we have computed Sadhana index (Sd) for phenylenes and their hexagonal squeezes using structural codes (counts). Sa...

متن کامل

Neuro-fuzzy control of bilateral teleoperation system using FPGA

This paper presents an adaptive neuro-fuzzy controller ANFIS (Adaptive Neuro-Fuzzy Inference System) for a bilateral teleoperation system based on FPGA (Field Programmable Gate Array). The proposed controller combines the learning capabilities of neural networks with the inference capabilities of fuzzy logic, to adapt with dynamic variations in master and slave robots and to guarantee good prac...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012