You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
With the wealth of information that you can find on the internet today, it is easy to find answers and details quickly by entering a simple query into a search engine. While this easy access to information is convenient, it is often difficult to separate fallacy from reality when dealing with digital sources. Establishing and Evaluating Digital Ethos and Online Credibility features strategies and insight on how to determine the reliability of internet sources. Highlighting case studies and best practices on establishing protocols when utilizing digital sources for research, this publication is a critical reference source for academics, students, information literacy specialists, journalists, researchers, web designers, and writing instructors.
Technofeminist Storiographies: Women, Information Technology, and Cultural Representation analyzes both historical and contemporary accounts of women’s lived experiences of technology, from Ada Lovelace and Hedy Lamarr to women working across the tech industry today, and juxtaposes them with larger cultural representations of women and technology. The book explores both the relationship between gender and technology and the cultural contexts that enable and constrain that relationship, questions that call for opportunities for women to share their lived experiences and to have such experiences represented across media genres. Despite the rich, complex stories and histories women have with ...
An indictment of the grading system in American schools and colleges—and a blueprint for how we can change it. One of the most urgent and long-standing issues in the US education system is its obsession with grades. In Failing Our Future, Joshua R. Eyler shines a spotlight on how grades inhibit learning, cause problems between parents and children, amplify inequities, and contribute to the youth mental health crisis. Eyler, who runs the Center for Excellence in Teaching and Learning at the University of Mississippi, illustrates how grades interfere with students' intrinsic motivation and perpetuate the idea that school is a place for competition rather than discovery. Grades force students...
The censorship and surveillance of individuals, societies, and countries have been a long-debated ethical and moral issue. In consequence, it is vital to explore this controversial topic from all angles. Censorship, Surveillance, and Privacy: Concepts, Methodologies, Tools, and Applications is a vital reference source on the social, moral, religious, and political aspects of censorship and surveillance. It also explores the techniques of technologically supported censorship and surveillance. Highlighting a range of topics such as political censorship, propaganda, and information privacy, this multi-volume book is geared towards government officials, leaders, professionals, policymakers, media specialists, academicians, and researchers interested in the various facets of censorship and surveillance.
Composition and Rhetoric in Contentious Times poses critical questions of representation, accessibility, social justice, affect, and labor to better understand the entwined future of composition and rhetoric. This collection of essays offers innovative approaches for socially attuned learning and best practices to support administrators and instructors. In doing so, these essays guide educators in empowering students to write effectively and prepare for their role as global citizens. Editors Rachel McCabe and Jennifer Juszkiewicz consider how educators can respond to multiple current crises relating to composition and rhetoric with generosity and cautious optimism; in the process, they addre...
Melding universities’ strategic goals with libraries’ teaching and learning mission, the academic library makerspace can be a powerful catalyst for information literacy, offering faculty partners a place for interdisciplinary, experiential learning. If you’re pondering what it takes to get your makerspace into the curriculum, this volume’s relatable, first-hand accounts from librarians, makerspace staff, and faculty partners will give you the confidence to make the leap. Contributors, drawn from the IMLS-funded Maker Literacies project, describe pilots and assessment for a variety of demographics, course subjects, and makerspace equipment. Guided by their experiences, you’ll be rea...
In Rhetoric in the Time of Torture, Laura A. Sparks investigates how rhetoric and interrogational torture are imbricated with one another, troubling clear distinctions between persuasion and violence. In light of the U.S. government’s post-9/11 reliance on heavy interrogation techniques, Sparks offers a renewed attention to the rhetorical and temporal dimensions of torture, including the ways in which techniques utilized by military interrogators are intertwined with violent action. The author introduces compelling temporal logics related to imminence, surveillance, and prisoners’ world-times, among others, illuminating how temporal concerns figure in both justifications for and practice...
The internet is established in most households worldwide and used for entertainment purposes, shopping, social networking, business activities, banking, telemedicine, and more. As more individuals and businesses use this essential tool to connect with each other and consumers, more private data is exposed to criminals ready to exploit it for their gain. Thus, it is essential to continue discussions involving policies that regulate and monitor these activities, and anticipate new laws that should be implemented in order to protect users. Cyber Law, Privacy, and Security: Concepts, Methodologies, Tools, and Applications examines current internet and data protection laws and their impact on user experience and cybercrime, and explores the need for further policies that protect user identities, data, and privacy. It also offers the latest methodologies and applications in the areas of digital security and threats. Highlighting a range of topics such as online privacy and security, hacking, and online threat protection, this multi-volume book is ideally designed for IT specialists, administrators, policymakers, researchers, academicians, and upper-level students.
This volume is a timely intervention that not only helps demystify the idea of a digital dissertation for students and their advisors, but will be broadly applicable to the work of librarians, administrators, and anyone else concerned with the future of graduate study in the humanities and digital scholarly publishing. Roxanne Shirazi, The City University of New York Digital dissertations have been a part of academic research for years now, yet there are still many questions surrounding their processes. Are interactive dissertations significantly different from their paper-based counterparts? What are the effects of digital projects on doctoral education? How does one choose and defend a dig...
This edited collection analyzes the role of digital technology in contemporary society dialectically. While many authors, journalists, and commentators have argued that the internet and digital technologies will bring us democracy, equality, and freedom, digital culture often results in loss of privacy, misinformation, and exploitation. This collection challenges celebratory readings of digital technology by suggesting digital culture's potential is limited because of its fundamental relationship to oppressive social forces. The Dialectic of Digital Culture explores ways the digital realm challenges and reproduces power. The contributors provide innovative case studies of various phenomenon including #metoo, Etsy, mommy blogs, music streaming, sustainability, and net neutrality to reveal the reproduction of neoliberal cultural logics. In seemingly transformative digital spaces, these essays provide dialectical readings that challenge dominant narratives about technology and study specific aspects of digital culture that are often under explored. Check out the blog for more: http://blog.uta.edu/digitaldialectic