StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Information Systems Education and Internet Safety - Annotated Bibliography Example

Cite this document
Summary
The main purpose of the author in this paper "Information Systems Education and Internet Safety" is to give the reader a conceptual framework of how internet safety has been excessively used on teenagers hence deterred many benefits that come along with it…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.2% of users find it useful

Extract of sample "Information Systems Education and Internet Safety"

Tynes, B. (2007). Internet safety gone wild? Sacrificing the educational and psychosocial benefits of online environments. Journal of adolescents research. Volume 22, Issue 6, p. 575-584. The main purpose of the author in this article is to give the reader a conceptual framework of how the internet safety has been excessively used on teenagers hence deterred many benefits that come along with it. It begins by giving most important benefits of the internet in the lives of teenagers which are basically with regard to educational and psychosocial issues. The introductory part of this article basically brings out the argument that runs systematically throughout the article. The author is quite systematic in the way he builds the argument. He takes the side that the benefits of the internet actually overweigh its negativities and therefore, to bring out his argument more clearly, he begins by highlighting these benefits. He finalizes the article by proposing several recommendations that parents can follow to safeguard their teenage children from harmful effects of YouTube and other social networking sites. The article is quite captivating and interesting to read. The English is easy which makes it easy to understand. Nevertheless, the article lacks a conclusion which is always important especially for readers who might lack sufficient time to go through the entire paper. Heath, R. (2008). Technology and teens: can they handle it? Retrieved on 3rd April 2012 from http://184.72.251.154/resources/1/Principal/2008/M-Jp66.pdf. The author of this article provides an abstract idea of how technological devices allowed in schools have negatively impacted on the education of teenagers. The article is quite precise and direct and directly gives the steps that can be undertaken to ensure safety of the internet for teenagers. The author, who is clearly a principal in a middle school, provides first hand information of what exactly happened in his school. He draws most of his examples from his experiences in the school. As the reader, I am able to form an imaginary picture of the real situation which is quite crucial in building my understanding. In comparison with Tynes (2007) publishing, this article is too shallow. In addition, it does not bring out any argument and simply gives few details concerning a topic that is quite broad. Chang, C. (2010). Internet safety survey: who will protect the children? Berkeley technology law journal. Volume 25, Issue 501, p. 501-526. The journal generally gives an overview of the measures that have been taken by various organizations to protect users of the internet from potential harm posed by certain malicious people. The author has discussed several approaches making reference to several states in the United States. Besides these concrete examples, the author also uses research findings and statistics to bring out his points. The journal is an adequate resource for people interested in this particular topic since it has finalized by providing useful solutions to the problems associated with the internet particularly with regard to cyberbullying. In my opinion, the article is rather vague on the issue of internet safety. This is so because it has tackled so many issues at the same time. Greenhow, C. (2009). Tapping the Wealth of Social Networks for Professional Development. Learning & Leading with Technology, 36 (8), 10‐11 Facebook, cloud computing, Google earth, GPS and YouTube are a few of the new technology that are been adopted into various learning systems across the globe. The Author of this article provides three examples of technology that can be used to widely repurpose various educational needs. The articles shows how the use of visual search engines, music DJ software and micro-blogging can be repurposed for numerous educational purposes through adapting a specific kind of knowledge that is referred to as technological pedagogical and content knowledge. The article give the indication that the despite technology being popular and innovative does not make it an educational technology if proper measures are not put into place. The author indicates that there is need to repurpose these web tool applications so as to meet the standards required within education system. Selwyn, N. (2009). Faceworking: Exploring Students' Education‐Related Use of "Facebook". Learning, Media and Technology, 34 (2), 157‐174 This article widely identifies the impacts of Web 2.0 technologies with more focus on social networking sites such as Youtube both inside and outside a classroom. In the quest to analyze the impacts, the author compares how students use Facebook groups for academic discussion with social discussion. The author concludes that although Facebook participation among students has exponentially grown, participation based on academic discussion has not necessarily followed the suit. Deng, L., & Yuen, A. (2009). Blogs in Higher Education: Implementation and Issues. TechTrends , 53 (3), 95‐98 In this article, the authors share their experiences as well as findings with the use of virtual office hours as a main medium for students to communicate with their lecturers using a Web 2.0 technology namely Facebook instant messaging client. From the article findings, students the use of virtual office hours by students was not significantly different from the use of normal office hours. Nevertheless, participants in classes that were engaged in offering virtual office hours reported higher level of satisfaction as opposed to those who followed a normal office hour. The authors therefore encourage learning institution to design courses using a virtual office hour both as learning and teaching tool. Dunlap, J., & Lowenthal, P. (2009). Tweeting the night away: Using Twitter to enhance social presence. Journal of Information Systems Education, 20(2) The authors in this article adopt twitter as a tool to facilitate communication between the faculty and students in the online college level instructional design course. The purpose of this article is to enhance social presence of students and school faculty thus fostering learner engagement as well as student satisfaction within the course. These two authors reference other examples of academic uses of twitter through providing several sample learners tweets to widely illustrate the various types of communication that occurred between educators and students. The authors conclude by asserting that there are numerous instructional benefits that are linked to the use of social media such as Youtube in exchanging information between students and educators. Further, the author concludes by issuing several guidelines for educators for teachers who may decide to adopt the use of twitter in their teaching systems. References Chang, C. (2010). Internet safety survey: who will protect the children? Berkeley technology law journal. Volume 25, Issue 501, p. 501-526. Deng, L., & Yuen, A. (2009). Blogs in Higher Education: Implementation and Issues. TechTrends , 53 (3), 95‐98 Dunlap, J., & Lowenthal, P. (2009). Tweeting the night away: Using Twitter to enhance social presence. Journal of Information Systems Education, 20(2) Greenhow, C. (2009). Tapping the Wealth of Social Networks for Professional Development. Learning & Leading with Technology, 36 (8), 10‐11 Heath, R. (2008). Technology and teens: can they handle it? Retrieved on 3rd April 2012 from http://184.72.251.154/resources/1/Principal/2008/M-Jp66.pdf. Selwyn, N. (2009). Faceworking: Exploring Students' Education‐Related Use of "Facebook". Learning, Media and Technology, 34 (2), 157‐174 Tynes, B. (2007). Internet safety gone wild? Sacrificing the educational and psychosocial benefits of online environments. Journal of adolescents research. Volume 22, Issue 6, p. 575-584. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Information Systems Education and Internet Safety Annotated Bibliography, n.d.)
Information Systems Education and Internet Safety Annotated Bibliography. https://studentshare.org/information-technology/2087743-internet-safety
(Information Systems Education and Internet Safety Annotated Bibliography)
Information Systems Education and Internet Safety Annotated Bibliography. https://studentshare.org/information-technology/2087743-internet-safety.
“Information Systems Education and Internet Safety Annotated Bibliography”. https://studentshare.org/information-technology/2087743-internet-safety.
  • Cited: 0 times

CHECK THESE SAMPLES OF Information Systems Education and Internet Safety

Inside the Classroom: Ethics and Technologies

hellip; Most of the cover news on issues that have to do with internet safety and security issues are mainly focused on the young learners and, for this reason, it is vital to begin education efforts aimed at this.... Some school districts have successfully completed the incorporation of internet safety and security lessons into their curricular, in preparing students from every grade for responsible and ethical behavior when operating online.... Not only the learners and tutors will be targeted by internet safety and security education (Vance 1)....
3 Pages (750 words) Essay

To what extent is internet banking safe

internet banking has thrived in the past decade.... Ordinary web users can fend off such software with having latest versions of anti-virus software installed and extra-thick internet firewalls.... In order to deal with these threats, online banks avoid connecting to the internet directly.... Users need an internet browser which supports the encryption of 128 bits before they can login to the internet banking (FirstBank, 2013)....
4 Pages (1000 words) Essay

A Revolution on Educational Approach to Teaching

Most of these educational forms take place through the internet.... (internet) It is undeniable that through the said process, students are given the chance to learn normally even though they are not physically present in class.... (EET, 2007, internet) The said process is still classified as part of the postcode system of education because the process still involves snail-mailing the results of exams, provision of some school materials (such as books and other materials of the same kind) that the students may need for learning....
6 Pages (1500 words) Essay

The Risk of Using the Internet

Following this, the safety of one's self is also given great importance.... Often, people question the safety of the internet in various aspects.... Of the many developments in computer technology, the internet is likely one of the most significant to surface in the past few decades.... The internet gives users the opportunity to research, communicate with others, and conduct monetary transactions.... With the internet, there are no such physiological needs that need to be fulfilled and it follows that the next concern would be security (Lester & Resnick, 2003)....
4 Pages (1000 words) Essay

Telecommunications in information system

MAN will also provide interconnections between corporate data centers and internet service providers, and support high speed connections among government, business, medical, and educational facilities.... This will provide the ethical confidence due to patients safety (Bardwell & Akin, 2005).... This will be necessary because of the use of the public internet facilities such as wireless connections.... This convergence will ensure that internet access subscribers enjoy lower rates and faster connectivity....
2 Pages (500 words) Essay

Publishing a Magazine on How Secure Your Computer

This will give the computer users the confidence that their system will be free from any emerging viruses in the internet (Caldwell, 2003).... Well, most of the people will say their computers are secure, others will say no and others will say they do not know.... A good number will also say that they do not know what computer security entails....
9 Pages (2250 words) Essay

Research and informatics

The technology improves the efficiency, safety, and cost.... Moreover, technology ensures safety by reducing human errors that endanger the health of… There are numerous technological devices used by healthcare providers all over the world.... The technology ranges from simple devices such as syringes and catheters (Howell, 2012) to complex medical equipment such as barcode medication administration systems and surgical The patient safety technology is transforming the way nurses deliver their care services....
4 Pages (1000 words) Essay

Systems and Cultural Investigation

These may include the clinicians and the supporting staffs, information, and technology and the specific healthcare processes that This paper seeks to analyze the cultural systems that exist in healthcare organizations The term system is a set of interrelated, interacting or interdependent elements that may be used to work together in a certain work environment to perform a particular task that is required by the systems aim.... systems can be improved all the time but before it is improved one must consider knowing how its products are created, the reasons why they are created and how they can be improved....
5 Pages (1250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us