Search results
1 – 10 of 95The purpose of this paper is to present an analytical review of the educational innovation field in the USA. It outlines classification of innovations, discusses the hurdles to…
Abstract
Purpose
The purpose of this paper is to present an analytical review of the educational innovation field in the USA. It outlines classification of innovations, discusses the hurdles to innovation, and offers ways to increase the scale and rate of innovation-based transformations in the education system.
Design/methodology/approach
The paper is based on a literature survey and author research.
Findings
US education badly needs effective innovations of scale that can help produce the needed high-quality learning outcomes across the system. The primary focus of educational innovations should be on teaching and learning theory and practice, as well as on the learner, parents, community, society, and its culture. Technology applications need a solid theoretical foundation based on purposeful, systemic research, and a sound pedagogy. One of the critical areas of research and innovation can be cost and time efficiency of the learning.
Practical implications
Several practical recommendations stem out of this paper: how to create a base for large-scale innovations and their implementation; how to increase effectiveness of technology innovations in education, particularly online learning; how to raise time and cost efficiency of education.
Social implications
Innovations in education are regarded, along with the education system, within the context of a societal supersystem demonstrating their interrelations and interdependencies at all levels. Raising the quality and scale of innovations in education will positively affect education itself and benefit the whole society.
Originality/value
Originality is in the systemic approach to education and educational innovations, in offering a comprehensive classification of innovations; in exposing the hurdles to innovations, in new arguments about effectiveness of technology applications, and in time efficiency of education.
Details
Keywords
Recent studies in education attempt to ‘criminologise’ some of the current practices and policies of higher education institutions – that is, to deconstruct certain philosophies…
Abstract
Recent studies in education attempt to ‘criminologise’ some of the current practices and policies of higher education institutions – that is, to deconstruct certain philosophies and practices which may be discriminatory, offensive, and biased to certain social groups. Recent theoretical frameworks problematize current higher education policies, many of which are taken for granted. This paper adopts a critical perspective, shedding light on some practices as they occur in higher educational institutions, by human and non-human agencies. The study applies a ‘detective’ approach examining some problematic uses of technology a higher education institution. In this proposed approach, researchers play the role of ‘detectives’, investigating possible breaches of good practice (possibly discriminatory) committed by higher education actors (referred hereafter as ‘defendants’). Most of these offences are committed through the use of educational and institutional technologies. The purpose of this theoretical approach is to empower alienated social groups against such practices by identifying ‘defendants’ and the implications of their acts. The study uses empirical data from interviews, visits, and observations to explain the ways in which defendants respond to the accusations levelled against them by other users of educational technologies. The investigation revealed that technology was used, among many other functions, to manoeuvre around the legal and ethical system serving the interests of some stakeholders. Then, the study categorises these manoeuvres, explaining the legal implications of each category, and recommending consideration of important academic and institutional issues.
Mariarosalba Angrisani, Lorella Cannavacciuolo and Pierluigi Rippa
This research aims to shed new lights on the most shared constructs developed on Innovation Ecosystems, Entrepreneurial Ecosystems and Technology Transfer Ecosystem proposing an…
Abstract
Purpose
This research aims to shed new lights on the most shared constructs developed on Innovation Ecosystems, Entrepreneurial Ecosystems and Technology Transfer Ecosystem proposing an additional stand-alone ecosystem.
Design/methodology/approach
This research is built upon a qual-quantitative analysis of an empirical case. The latter analysis is performed through a single case study methodology on the San Giovanni Hub of the Federico II University of Naples.
Findings
Evidences show how a technological hub orchestrates three main ecosystems for the knowledge exploitation: the technology transfer ecosystem, devoted to gather knowledge form universities' labs towards industries; the innovation ecosystem, able to manage the exploration and exploitation of new knowledge and techniques; the entrepreneurial ecosystem, that supports startup/spinoff creation process.
Research limitations/implications
Limitations mainly concern the fact that it is centred on just one case study.
Practical implications
Practical implications imply new opportunities of collaboration involving different stakeholders as university administrators, researchers, businesses and policymakers, creating a supportive environment for innovation.
Originality/value
The research offers a new vision about the role of Universities as creators and enablers of ecosystems pursuing diverse value propositions. The Academic Innovation Ecosystem is a new conceptualization of this role played by a university, and it can convey innovation and entrepreneurial attitude within its ecosystem leveraging on the transfer of university knowledge and technology.
Details
Keywords
Patrick O’Brien, Scott W.H. Young, Kenning Arlitsch and Karl Benedict
The purpose of this paper is to examine the extent to which HTTPS encryption and Google Analytics services have been implemented on academic library websites, and discuss the…
Abstract
Purpose
The purpose of this paper is to examine the extent to which HTTPS encryption and Google Analytics services have been implemented on academic library websites, and discuss the privacy implications of free services that introduce web tracking of users.
Design/methodology/approach
The home pages of 279 academic libraries were analyzed for the presence of HTTPS, Google Analytics services and privacy-protection features.
Findings
Results indicate that HTTPS implementation on library websites is not widespread, and many libraries continue to offer non-secured connections without an automatically enforced redirect to a secure connection. Furthermore, a large majority of library websites included in the study have implemented Google Analytics and/or Google Tag Manager, yet only very few connect securely to Google via HTTPS or have implemented Google Analytics IP anonymization.
Practical implications
Librarians are encouraged to increase awareness of this issue and take concerted and coherent action across five interrelated areas: implementing secure web protocols (HTTPS), user education, privacy policies, informed consent and risk/benefit analyses.
Originality/value
Third-party tracking of users is prevalent across the web, and yet few studies demonstrate its extent and consequences for academic library websites.
Details
Keywords
Robert D. Lytle, Tabrina M. Bratton and Heather K. Hudson
Bystander apathy has been a source of debate for decades. In the past half-century, psychologists developed theoretical frameworks to understand bystander activity, commonly…
Abstract
Bystander apathy has been a source of debate for decades. In the past half-century, psychologists developed theoretical frameworks to understand bystander activity, commonly referred to as bystander intervention models (BIMs). More recently, BIMs have been modified to facilitate initiatives to prevent various forms of online victimization. This chapter begins with a review of BIMs and recent applications of bystander intervention research to online environments. We also present several future directions for research along with applications for reducing technology-facilitated violence, including programming recommendations and theoretical development.
Details