Peer-to-Peer Computing Overview, Significance and Impact, E-learning, and Future Trends
|
|
|
- Bryce Lamb
- 10 years ago
- Views:
Transcription
1 Peer-to-Peer Computing Overview, Significance and Impact, E-learning, and Future Trends What is Peer-to-Peer Computing? When computers moved into mainstream use, PCs (personal computers) were connected together through LANs (local area networks) to central servers. These central servers were much more powerful than the PCs so any large data processing took place on these servers. Since then, PCs have become much more powerful, and they are able to handle the data processing locally rather than on central servers. Because of this, PC to PC, or peer-to-peer computing can now occur when individual computers bypass central servers to connect and collaborate directly with each other. Three Distinct Peer-to-Peer Computing Models There are three distinct peer-to-peer computing models: 1. Multiple Peer Relationship PCs are connected/networked to each other through servers, and files can be shared and collected from anyone else on that same network. One key problem is this can lead to major breeches in security and intellectual property issues. Napster - (music sharing) Note: Due to legal issues, Napster has temporarily stopped file sharing services on their site. Kazaa - (multimedia sharing)
2 2. Distributed Peer Relationship A group of computers connected together to combine their computing and processing abilities to search the Internet or solve very complex problems requiring massive process crunching. Infrasearch- (search engine) Entropia - (climate simulations and astrological calculations) Computer A Computer A Search Internet Computer B Solve Complex Problem Computer B Computer C Computer C 3. Collaborative Peer Relationship A small group of people agree to collaborate through a common interface, such as on-line gaming, chat rooms, instant messaging, or e-learning environment. Jeopardy - (on-line gaming) Chat Here - (chat room) HorizonLive - (e-learning seminars) On-line Gaming E-Learning Seminar
3 Significance and Impact of Peer-to-Peer Computing So what is the significance of peer-to-peer computing? It changes the way people interact in the areas of information sharing, collaboration, and learning. First, peer-to-peer computing changes the way people share information. Prior to the Internet and even the pervasive use of PCs, information was mostly disseminated through television, radio, or via written (not digital) correspondence. But now information is digitized via , electronic documents/files, or web pages and can be distributed to many different people in a short period of time. The format of information has also greatly changed and ranges from short, sloppy, opinionated text to lengthy, well organized, and thoroughly researched documents. People now have to filter through a lot of junk data to get to the information they may be seeking. This becomes even a greater challenge when people now have access to so many other computer systems and consequently, the masses of information on those systems. Second, peer-to-peer computing changes the way people collaborate. People no longer have to be in the same room to plan a project, conduct a workshop, or learn a computer software program. Ideas and discussions can be captured electronically and distributed to groups of people in separate locations for review and input. But in order for this to be effective, people have to learn the technical tools in order to communicate and collaborate (such as using an electronic whiteboard or a video conferencing system) and must learn to express themselves in different ways. Lastly, peer-to-peer computing changes the way people learn. Traditional classroom environments are no longer the only way to facilitate effective learning. Well designed media-rich web content can be a very effective learning format and can cover the primary ways people learn by incorporating sound, text/visual queues, combined with hands-on exercises and examples. What is different, however, is that the learner has to become more responsible for their learning. Traditional training pushes information to the learner and puts the onus of learning more on the instructor. Whereas virtual training requires the learner to pull out the information he/she is seeking, thus shifting the onus of learning onto the learner. Using Peer-to-Peer for E-Learning Currently, peer-to-peer computing and e-learning are being combined and used by businesses, academic institutions, and by individuals. For example, businesses are conducting new-hire orientation via their intranets, and new-hires can interact with each other during the training. Students can do research together or view draft documents and mark-ups real time, then electronically submit their final project to their teacher for grading. Individuals are sharing their knowledge and experiences with others through chat rooms and on-line support groups. The prospects for e-learning in formal or informal virtual settings are tremendous and as long as people want to share information, there is an opportunity to learn. Most experts in the peer-to-peer and e-learning industries agree that there is a great deal of hype and many companies are at the trial stage of bringing these two areas together to produce effective results. Peer-topeer computing and e-learning involves a change of paradigm or a change in how people deal with knowledge and information. Because it's a paradigm change, it is uncomfortable and the outcome is somewhat unpredictable. For more ideas and case studies on using peer-to-peer computing for e-learning, two key resources include: E-learning Magazine s web site - Online Learning Magazine s web site -
4 Future Trends and Challenges Peer-to-peer computing represents a swing of the pendulum back toward user control (Shirky, Clay - see Reference). Powerful PCs and the Internet enable people to come together through a common environment. More and more people are taking information sharing into their own hands, and companies are finding themselves in a situation of trying to control people and influence the use of the Internet. Specific examples of future trends and challenges include: Record Companies: Creating a copy protected media format for music files designed to prevent people from sharing illegal copies of music files. Corporations: Increasing network security levels on corporate networks due to employees granting unauthorized users access to their PC to enable file sharing. Education Organizations: Shifting the learning environment from traditional classrooms to virtual classrooms and developing/implementing effective peer-to-peer learning opportunities. Summary Peer-to-peer computing is becoming more and more prevalent as people are using their own PCs to bypass central servers to connect directly with each other. This is changing the way people share information, collaborate, and how they learn. However, because peer-to-peer computing gives tremendous control to the individual, the outcome is somewhat unpredictable. The future of peer-to-peer computing is being formed as we speak, so hang on for the ride! References and Related Links Dong, Francis. (2001). The advantages and challenges of teaching in the e-learning environment. [Online]. Available: [2001, March]. E-Learning Magazine. (No date). [Online]. Available: Entropia Inc. (2001). Distributed Computing and the Entropia Solution. [Online]. Available: [2001, May 7]. Gonsalves, Antone. (2001). P-To-P Vendors Must Prove They're Worthy. [Online]. Available: [2001, February 12]. Jones, Chris. (2001). Jury of your peers. Online Learning Magazine. [Online]. Available: [2001, February]. Online Learning Magazine. (No date). [Online]. Available: Peer-to-Peer Working Group. (2001). [Online]. Available: [2001, July 27]. Shirky, Clay. (2001). P2P Smuggled In Under Cover of Darkness. [Online]. Available: [2001, February 14].
5 The Editors. (2000). Six for the century. Inside Technology Training Magazine. [Online]. Available: [2000, January]. Tice, Nancy. (2001). Why the Sons of Napster won t make it either. [Online]. Available: 0D-,D%40ALL/@article@mark@7797?ROS=1&OC=75 [2001, July 26]. *This paper is written by Susan Farago-Walker for the course EDC385G Multimedia Authoring at the University of Texas - Austin.
Iowa Park CISD BYOD Policy 2013-2014
Iowa Park CISD BYOD Policy 2013-2014 Table of Contents Table of Contents Table of Contents... 2 Purpose... 3 What is the D in BYOD.... 3 Guidelines... 3 Wireless Information...5 Responsible Use Policy...6
2011-2012. Frisco ISD
2011-2012 Frisco ISD Table of Contents Table of Contents Table of Contents... 2 Purpose... 3 Google Apps for Students... 3 Responsible Use Policy... 4 Wireless Information... 5 Frequently Asked Questions...
Introducing Web Conferencing Tools
Introducing Web Conferencing Tools A Towards Maturity paper providing information and support for those new to web conferencing tools June 09 Introduction... 2 What is web conferencing?... 2 Benefits of
Harmony Hill School School Technology Plan School Year 2015/2016
School Technology Plan School Year 2015/2016 Harmony Hill School 63 Harmony Hill Road Chepachet, RI 02814 Created: September, 2014 Revised: By: William F. Kelley (401) 949-0690 x3360 Submitted to RIDE:
Improving Distance Education Through Student Online Orientation Classes
Abstract Improving Distance Education Through Student Online Orientation Classes Scott Mensch Indiana University of Pennsylvania When offering an online class the academic institution s major concern should
E-LEARNING: USIU s EXPERIENCE
E-LEARNING: USIU s EXPERIENCE Gerald W. Chege, Ph.D. Assistant Professor, Information Systems & Technology, United States International University COL Training Workshop, Pan Afric Hotel 23rd Nov 2006 1
TRANSITIONAL DISTANCE THEORY AND COMMUNIMCATION IN ONLINE COURSES A CASE STUDY
TRANSITIONAL DISTANCE THEORY AND COMMUNIMCATION IN ONLINE COURSES A CASE STUDY Scott Mensch, Indiana University of Pennsylvania [email protected] Azad Ali, Indiana University of Pennsylvania [email protected]
Middle secondary unit. Ethical use of technology. www.cybersmart.gov.au
www.cybersmart.gov.au Creative Commons These teaching resources on the Cybersmart website s Schools Gateway are now available to schools under Creative Commons licences. The new licensing conditions are
St. Mary s Home for Children School Technology Plan School Year 2015/2016
School Technology Plan School Year 2015/2016 St. Mary s Home for Children 420 Fruit Hill Avenue North Providence, RI 02911-2647 Revised: September, 2015 By: Patti Studley (401) 353-3900 x221 Submitted
Technology Department 1350 Main Street Cambria, CA 93428
Technology Department 1350 Main Street Cambria, CA 93428 Technology Acceptable Use and Security Policy The Technology Acceptable Use and Security Policy ( policy ) applies to all CUSD employees and any
Online Meetings and Video Collaboration
Online Meetings and Video Collaboration Skype http://www.skype.com The World s Most Popular Video Calling Software. If at least one person on the call has a Premium account, it is possible to arrange a
Peer-to-Peer: an Enabling Technology for Next-Generation E-learning
Peer-to-Peer: an Enabling Technology for Next-Generation E-learning Aleksander Bu lkowski 1, Edward Nawarecki 1, and Andrzej Duda 2 1 AGH University of Science and Technology, Dept. Of Computer Science,
Keywords Distance Learning, Instruction, Telecommunications, Curricular Policies
Categorizing Distance Learning Systems: Discovering Successful Ingredients 1 Greg Jones Department of Curriculum and Instruction / Instructional Technology College of Education University of Texas, Austin
E-Learning at school level: Challenges and Benefits
E-Learning at school level: Challenges and Benefits Joumana Dargham 1, Dana Saeed 1, and Hamid Mcheik 2 1. University of Balamand, Computer science department [email protected], [email protected]
BROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12. Employee Computer Use Agreement. Terms and Conditions
BOARD OF EDUCATION POLICY ADMINISTRATIVE GUIDELINE 6.6.1A(3) BROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12 Employee Computer Use Agreement The district is pleased to
Bring Your Own Device (BYOD) Student, Teacher and Parent Guide
Bring Your Own Device (BYOD) Student, Teacher and Parent Guide Appleton Area School District (AASD) is committed to moving students and staff forward in a 21 st century learning environment. As part of
Building Effective Blended Learning Programs. Harvey Singh
Building Effective Blended Learning Programs Harvey Singh Introduction The first generation of e-learning or Web-based learning programs focused on presenting physical classroom-based instructional content
Value Chain Formation for e-learning Outsourcing Services
Value Chain Formation for e-learning Outsourcing Services Frank T. M. Chen, Ph.D. President & CEO, HomeMeeting Inc. 18005 NE 68 th Street, Suite A101, Redmond, WA 98052 USA http://weboffice.homemeeting.com
Advanced Peer to Peer Discovery and Interaction Framework
Advanced Peer to Peer Discovery and Interaction Framework Peeyush Tugnawat J.D. Edwards and Company One, Technology Way, Denver, CO 80237 [email protected] Mohamed E. Fayad Computer Engineering
M.A. in Educational Administration
M.A. in Educational Administration Professional educators with at least three years of relevant professional experience in an educational setting related to the instructional process who wish to enter
ICT Safe and Acceptable Use Policy for Students
ICT Safe and Acceptable Use Policy for Students CONTENTS 1. DEFINITION, POLICY & RESPONSIBILITY... 3 2. NETWORK... 3 3. INTERNET... 3 4. EMAIL... 4 5. COPYRIGHT AND PLAGIARISM... 5 6. BACKUP RESPONSIBILITIES...
Bring Your Own x. INFORMATION AND PROCEDURES HANDBOOK Version 2014-12-10
Bring Your Own x INFORMATION AND PROCEDURES HANDBOOK Version 2014-12-10 Contents BYOx Transition Plan... 3 Forward... 3 Introduction... 3 BYOx Vision... 4 Software and Applications... 4 Microsoft Office...
Visualizing the Teaching / Learning Process through Computer Graphics. Visualizing, technology, computer graphics, education
Visualizing the Teaching / Learning Process through Computer Graphics 1 Aghware F. O.; 2 Egbuna E. O.; 3 Aghware A. and 4 Ojugo Arnold 1, 2, 3 Computer Science Department, College of Education, Agbor 4
Virtual Lab : Bring the Hands-on Activity to Online Courses
Virtual Lab : Bring the Hands-on Activity to Online Courses Biwu Yang East Carolina University Session 3220 Abstract A Virtual Lab has been implemented for several online courses with subject around Computer
Dearborn Public Schools. elearning Platform. Communicate. Learn. Collect. See what you can do.
Dearborn Public Schools elearning Platform Communicate. Learn. Collect. See what you can do. 1 COMMUNICATE / LEARN / COLLECT elearning Platform A Quick Introduction Dearborn Public Schools offers teachers
The Social Learning Revolution
The Social Learning Revolution Jane Hart A revolution is a fundamental change in power or organizational structures that takes place in a relatively short period of time. (Wikipedia) How we have traditionally
WITHOUT. Boosting Your Value. Traditional Education
Boosting Your Value WITHOUT Traditional Education How to Get An Education Without Attending College and Without a Lifetime of Debt, Stress, and Family Strain Table of Contents Introduction... 3 Your Local
EVALUATION Actions Activities Results Evidence of Activities & Quality
Program: Instructional Technology Technical Assistance Program Contact: Dr. Clinton Stapleton (SEA) GOALS/OBJECTIVES 1: Provide technology integration support and services to the district to develop student
United Tribes Technical College Acceptable Use Policies for United Tribes Computer System
United Tribes Technical College Acceptable Use Policies for United Tribes Computer System 1.0 Policy The purpose of this policy is to outline the acceptable use of computer equipment at United Tribes Technical
Policy # Related Policies: Computer, Electronic Communications, and Internet Usage Policy
Policy # Related Policies: Computer, Electronic Communications, and Internet Usage Policy This policy is for internal use only and does not enlarge an employee s civil liability in any way. The policy
King Fahd University of Petroleum and Minerals DEANSHIP OF ACADEMIC DEVELOPMENT KFUPM ONLINE COURSES:
King Fahd University of Petroleum and Minerals DEANSHIP OF ACADEMIC DEVELOPMENT KFUPM ONLINE COURSES: LAST REVISED: March 2003 TABLE OF CONTENTS Page 1. INTRODUCTION 1 2. ESSENTIAL FEATURES FOR AN EFFECTIVE
Information Technology Plan for Harmony Hill School
Information Technology Plan for Harmony Hill School 2011-2013 William S. Bunch 8/24/10 Harmony Hill School, Inc. 63 Harmony Hill Road Chepachet, RI 02815 Janice DeFrances, Ed.D. Chief Executive Officer
EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197
(Return this page to the Executive Staff member or Principal) MEMPHIS CITY SCHOOLS EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197 As a condition of using the MCS network, I
Online Training Made Easier with Video
Online Training Made Easier with Video A Ziff Davis White Paper Sponsored by: Contents Executive Summary... 03 Online Training... 03 Online Training with Video... 04 Primary approaches to online training
MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT
MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT TO: John Phillips, City Manager Number: 04-020 SUBJECT: Computer Network, Internet and E-Mail Access Policy Date: 9/903 Attached is copy of the Information
Network Applications
Computer Networks Network Applications Based on Computer Networking, 3 rd Edition by Kurose and Ross Network applications Sample applications E-mail Web Instant messaging Remote login P2P file sharing
Tuckahoe Student Office 365 & OneDrive User Procedures and Agreement
Tuckahoe Student Office 365 & OneDrive User Procedures and Agreement Tuckahoe Common School District 468 Magee Street Southampton, New York 11968 631-283-3550 Table of Contents Office 365 Overview... 2
The Society for Cinema and Media Studies Statement of Best Practices for Fair Use in Teaching for Film and Media Educators
The Society for Cinema and Media Studies Statement of Best Practices for Fair Use in Teaching for Film and Media Educators Introduction. The field of film and media studies in the United States was shaped
Bring Your Own Device (BYOD) to Collegium Charter School Acceptable Use Statement and Parameters of a Pilot Program for Grades 9-12
Bring Your Own Device (BYOD) to Collegium Charter School Acceptable Use Statement and Parameters of a Pilot Program for Grades 9-12 Collegium Charter School (CCS) is dedicated to providing our students
Online Design & elearning, Compressed Video & Online Meetings, Introduction to Blackboard
Online Design & elearning, Compressed Video & Online Meetings, Introduction to Blackboard NEW FACULTY ORIENTATION 2013 PENNY RICE, FAYE WALTER, AND ANNE KLINGEN Ole Miss Online Online Design and elearning
Quincy Public Schools Information Technology. Acceptable Use Policy for Staff, Students, and Guests
Quincy Public Schools Information Technology Acceptable Use Policy for Staff, Students, and Guests Revised May 6, 2013 Introduction This Acceptable Use Policy is enacted as of May 2013 by the Quincy School
Wakefield Public Schools Technology Acceptable Use Policy
Wakefield Public Schools Technology Acceptable Use Policy Vision (per Technology Strategic Plan 2013-2016) Wakefield Public Schools considers classroom technology to be an essential, imperative part of
This paper was presented at CUMREC 98, The College and University Computer Users Association Conference. It is the intellectual property of the
This paper was presented at CUMREC 98, The College and University Computer Users Association Conference. It is the intellectual property of the author(s). Permission to print out or disseminate all or
STUDENT USER GUIDE. User Guide for STUDENTS
STUDENT USER GUIDE BRAINFUSE elearning User Guide for STUDENTS 1 What is Brainfuse? Brainfuse develops and provides virtual learning solutions for schools, colleges, universities, libraries, government
Math TLC. MSP LNC Conference Handout. The Mathematics Teacher Leadership Center. MSP LNC Conference Handout. !!! Math TLC
The Mathematics Teacher Leadership Center The Mathematics Teacher Leadership Center () A Mathematics and Science Partnership Serving Northern Colorado and Wyoming! 1! Vision The Mathematics Teacher Leadership
Computers and Media: P2P and Business Models CSCI 1200 COMPUTERS & MEDIA, JAREK SZLICHTA
Computers and Media: P2P and Business Models CSCI 1200 JAREK SZLICHTA CSCI 1200 COMPUTERS & MEDIA, JAREK SZLICHTA 1 Agenda difference between client-server and peer-to-peer technology business models used
Students will know and be able to: 1.1. Basic Operations
Information Technology Grades 9-10 Basic Operations, Concepts, and Productivity Tools Basic Operations Word Processing Database Spreadsheet Identify the platform, version, properties, function, and interoperability
BOARD OF EDUCATION Cherry Hill, New Jersey
BOARD OF EDUCATION Cherry Hill, New Jersey POLICY 6142.12 ACCEPTABLE USE OF TECHNOLOGY Introduction The Board of Education encourages the use of technology in the classroom as an educational tool and to
Adobe Solutions for Learning Management Systems (LMS)
Solution Brief for Education Adobe Solutions for Learning Management Systems (LMS) Discover exciting, new ways to create and deliver high-impact elearning content and provide interactive online learning
Commonwealth Office of Technology
Commonwealth Office of Technology ENTERPRISE POLICY Policy Number: CIO-060 Effective Date: 05/15/96 Revision Date: 03/19/08 Policy Statement: The purpose of this enterprise policy is to define and outline
ACCEPTABLE/ RESPONSIBLE USE POLICY IIBE
ACCEPTABLE/ RESPONSIBLE USE POLICY IIBE The School Board provides technologies, including the internet, to promote educational excellence by facilitating resource sharing, innovation and communication.
It provides the performance indicators to evaluate the level of knowledge and competence of teacher to apply ICT in the educational setting.
COMMISSION ON INFORMATION AND COMMUNICATIONS TECHNOLOGY NATIONAL ICT COMPETENCY STANDARD (NICS) FOR TEACHERS INTRODUCTION The National ICT Competency Standard (NICS) for Teachers defines the competency
California Standards Implementation. Teacher Survey
California Standards Implementation Teacher Survey October 2015 Thank you for taking this survey endorsed by the California State Board of Education and California Department of Education. Its purpose
QUALITY ASSURANCE STRATEGY EUROPEAN HERITAGE DIGITAL MEDIA AND THE INFORMATION SOCIETY EUROPEAN MASTER PROGRAMME IN
Quality Assurance Strategy EuroMACHS 1 EUROPEAN MASTER PROGRAMME IN EUROPEAN HERITAGE DIGITAL MEDIA AND THE INFORMATION SOCIETY QUALITY ASSURANCE STRATEGY VERSION 1 Quality Assurance Strategy EuroMACHS
The Associate Teacher Program
The Associate Teacher Program 2 Dear Prospective Applicant: Thank you for your interest in the Associate Teacher Program at Beauvoir, the National Cathedral Elementary School. We hope that the following
III. EDUCATION A. BACKGROUND
Education 201 III. EDUCATION A. BACKGROUND Public awareness of the importance of intellectual property in the information age is essential to the successful implementation and growth of the NII. The average
The most complete Classroom Management Software
The most complete Classroom Management Software Interactivity Collaboration Communicatio Control Multimedia Assesment Messages Broadcast Sharing Remote Monitoring www.snetclass.net Key Features Snetclass
High School Distance Learning: Online/Technology Enhanced Course or Experience Guidance
Provided by: Technology Initiatives and Curriculum and Instruction Alabama Department of Education High School Distance Learning: Online/Technology Enhanced Course or Experience Guidance As part of the
Blackboard Learning System: Student Instructional Guide
Blackboard Learning System: Student Instructional Guide This manual was prepared to assist students in the understanding, orientation, and usage of the Blackboard Learning System online course management
HOW EDUCATIONAL TECHNOLOGY TOOLS CAN SOLVE CHALLENGES IN TEACHING AN ONLINE FINANCE COURSE? Presented by: Laura Vatsala & Shubha P Asst.
HOW EDUCATIONAL TECHNOLOGY TOOLS CAN SOLVE CHALLENGES IN TEACHING AN ONLINE FINANCE COURSE? Presented by: Laura Vatsala & Shubha P Asst. Professor Outline Introduction Discussion Conclusion Introduction
Does this sound familiar: I ve done my due diligence. Why is our LMS more pain than gain?
? SIMPLICITY SAVES THE LMS Does this sound familiar: I ve done my due diligence. Why is our LMS more pain than gain? You are not alone in asking this question. Since 1998, the consultants at Michaels &
Proposal: A Design of E-learning User Authentication System
, pp.45-50 http://dx.doi.org/10.14257/ijsia.2015.9.1.05 Proposal: A Design of E-learning User Authentication System Byeong Ho Kang 1 and Hyejin Kim 2 1 School of Engineering and ICT, University of Tasmania,
INSTRUCTION: Instructional Services
INSTRUCTION: Instructional Services Technology Acceptable use Policy (TAUP) for Students I. Purpose Baltimore County Public Schools (BCPS) offers a wide array of technology resources for student use. These
Bring Your Own Device
This resource sponsored by Intel Education Bring Your Own Device A Presentation for Educators Objectives Define the characteristics of today s students Examine a 21st century learning environment Explore
An e-learning Management System for the Deaf people
An e-learning Management System for the Deaf people A.S.DRIGAS, D.KOUREMENOS Department of Applied Technologies NCSR DEMOKRITOS Ag. Paraskevi GREECE {dr, dkourem}@imm.demokritos.gr http://imm.demokritos.gr
NJ Department of Education Office of Educational Technology Digital Learning NJ (DLNJ)
8.1 Educational Technology: All students will use digital tools to access, manage, evaluate, and synthesize information in order to solve problems individually and collaborate to create and communicate
How To Use Your Cell Phone At Renaissance Academy Charter School
Renaissance Academy Charter School Bring Your Own Device (BYOD) Board Policy PURPOSE The Renaissance Academy School Board values technology and seeks to increase student access and use when it will enhance
General Procedures for Developing an Online Course
General Procedures for Developing an Online Course General Procedures for Developing an Online Course Questions to Ask before you Begin Analysis 1. What is your learner audience? Is the course for beginners
PEER-TO-PEER NETWORK
PEER-TO-PEER NETWORK February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
STUDENT PARTICIPATION INDEX: STUDENT ASSESSMENT IN ONLINE COURSES
STUDENT PARTICIPATION INDEX: STUDENT ASSESSMENT IN ONLINE COURSES Alan Y K Chan, K O Chow Department of Computer Science City University of Hong Kong K S Cheung School of Continuing Education Hong Kong
Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety
Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety Student Policy--SP004 Ventura Charter School of Arts and Global Education ("School") recognizes the
The People Process Product Continuum in E-Learning: The E-Learning P3 Model
The People Process Product Continuum in E-Learning: The E-Learning P3 Model Badrul H. Khan Contributing Editor In e-learning, people are involved in the process of creating e-learning materials and making
YOUNG PEOPLE, MUSIC & THE INTERNET
YOUNG PEOPLE, MUSIC & THE INTERNET a guide for parents about P2P, file-sharing and downloading What is P2P? As a parent, you ve probably already heard your children talk about file-sharing, downloading
An E-Learning Primer
An E-Learning Primer Online Training for Rehab Professionals and Staff By Melissa S. Cohn, OTR/L "E-learning," the electronic version of distance learning, is one of the fastest growing trends in higher
