INVESTIGATING the USE and USEFULNESS of INSTANT MESSAGING in an ELEMENTARY STATISTICS COURSE Rachel Cunliffe University of Auck
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Management of Virtual Offices Cheryl Donaldson Howard Walden University
Walden University ScholarWorks Walden Dissertations and Doctoral Studies Walden Dissertations and Doctoral Studies Collection 2019 Management of Virtual Offices Cheryl Donaldson Howard Walden University Follow this and additional works at: https://scholarworks.waldenu.edu/dissertations Part of the Business Administration, Management, and Operations Commons, and the Management Sciences and Quantitative Methods Commons This Dissertation is brought to you for free and open access by the Walden Dissertations and Doctoral Studies Collection at ScholarWorks. It has been accepted for inclusion in Walden Dissertations and Doctoral Studies by an authorized administrator of ScholarWorks. For more information, please contact [email protected]. Walden University College of Management and Technology This is to certify that the doctoral study by Cheryl Ann Donaldson Howard has been found to be complete and satisfactory in all respects, and that any and all revisions required by the review committee have been made. Review Committee Dr. Teresa Jepma, Committee Chairperson, Doctor of Business Administration Faculty Dr. Patsy Kasen, Committee Member, Doctor of Business Administration Faculty Dr. Peter Anthony, University Reviewer, Doctor of Business Administration Faculty Chief Academic Officer Eric Riedel, Ph.D. Walden University 2019 Abstract Management of Virtual Offices by Cheryl Ann Donaldson Howard MS, NOVA Southeastern University, 1999 BS, McKendree College 1996 Doctoral Study Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Business Administration Walden University March 2019 Abstract Many organizational leaders manage virtual employees without the specific training and experience required for leading a virtual organization, which can lead to billions of dollars in lost productivity. The purpose of this multiple case study was to explore strategies managers used to manage a virtual office. -
A Conceptual Social Framework That Delivers KM Values to Corporate Organizations
EMSoD — A Conceptual Social Framework that Delivers KM Values to Corporate Organizations Christopher Adetunji, Leslie Carr Web Science Institute School of Electronics and Computer Science University of Southampton Southampton, England Email: fca6g14, [email protected] Abstract—As social software is becoming increasingly disruptive the Enterprise Mobility and Social [media] Data (EMSoD) to organizational structures and processes, Knowledge Manage- framework, our proposed conceptual social framework, with ment (KM) initiatives that have hitherto taken the form of a KM value at its core. We provide an overview of our previous ‘knowledge repository’ now need redefining. With the emergence work that culminates in an important measure of KM value of Social Media (SM) platforms like Twitter, the hierarchical — actionable knowledge — upon which a significant business boundaries within the organization are broken down and a lateral decision is made by a case study organization. This is un- flow of information is created. This has created a peculiar kind of tension between KM and SM, in which one is perceived as derpinned by the fact that the real essence of knowledge is its threatening the continued relevance of the other. Particularly, actionability, especially when it contributes to the advancement with the advances of social media and social software, KM is more of a proposed undertaking [3]. Measuring the value of such in need of delivering measurable value to corporate organizations, contributions has been one of the main issues of disagreement if it is to remain relevant in the strategic planning and positioning in Knowledge Management, which is why we devised a of organizations. In view of this, this paper presents EMSoD mechanism for measuring the KM value which our framework — Enterprise Mobility and Social Data — a conceptual social helps in delivering to corporate organizations. -
Growing up Online: Identity, Development and Agency in Networked Girlhoods
City University of New York (CUNY) CUNY Academic Works All Dissertations, Theses, and Capstone Projects Dissertations, Theses, and Capstone Projects 5-2015 Growing Up Online: Identity, Development and Agency in Networked Girlhoods Claire M. Fontaine Graduate Center, City University of New York How does access to this work benefit ou?y Let us know! More information about this work at: https://academicworks.cuny.edu/gc_etds/923 Discover additional works at: https://academicworks.cuny.edu This work is made publicly available by the City University of New York (CUNY). Contact: [email protected] Growing Up Online: Identity, Development and Agency in Networked Girlhoods by Claire M. Fontaine A dissertation submitted to the Graduate Faculty in Urban Education in partial fulfillment of the requirements for the degree of Doctor of Philosophy, The City University of New York 2015 2015 Claire M. Fontaine Some rights reserved. (See: Appendix A) This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License. http://creativecommons.org/licenses/by-nc-nd/4.0/ ii This manuscript has been read and accepted for the Graduate Faculty in Urban Education to satisfy the dissertation requirement for the degree of Doctor of Philosophy. Wendy Luttrell, PhD ________________________ ________________________________________________ Date Chair of Examining Committee Anthony Picciano, PhD Date Executive Officer Joan Greenbaum, PhD Ofelia García, PhD Supervisory Committee THE CITY UNIVERSITY OF NEW YORK iii Abstract Growing Up Online: Identity, Development and Agency in Networked Girlhoods by Claire M. Fontaine Advisor: Professor Wendy Luttrell Young women’s digital media practices unfold within a postfeminist media landscape dominated by rapidly circulating visual representations that often promote superficial readings of human value. -
Free Remote Agile E-Book
Table of Contents 1. Welcome to a new kind of Agile 2. Establishing Ground Rules 3. Stop Dreading Meetings: The Webcam Revolution 4. The Virtual Office Setup 5. Case Study: Stack Exchange’s Hybrid Team 6. Building and Nurturing Your Remote Team 7. Best Email Practices 8. Case Study: RES Software’s Three Remote Offices 9. Agile Can Thrive With Remote Teams 10. Let Us Know How We Can Help! Welcome to a new kind of Agile The current charter of most distributed company leaders is to create an online workspace (...) supported by a set of tools and self- organizing behaviors.(...)With a strong vision, clear articulation of priorities, and strongly nurturing culture as part of your company DNA, you have a clear path to success on your distributed Agile team." - Amanda Ross, Director of Marketing & Agile Practices at Sococo It’s been called a framework, a philosophy, a methodology - research Agile and you’ll find that so many people define it with so many different words that you'd be forgiven for thinking it’s some sort of mystical practice involving tarot cards and looking at the stars. But it’s actually a major shift in the way people work, and it’s been happening for over a decade - whatever you choose to call it, if you are in the IT business, Agile is likely part of the way you work. If it’s not, the time to start is now. Companies and teams worldwide have used it to deliver better products in record time with maximum efficiency and minimum burnout. -
Online Qualitative Research in the Age of E-Commerce: Data Sources and Approaches [27 Paragraphs]
University of Rhode Island DigitalCommons@URI College of Business Administration Faculty College of Business Administration Publications 2004 Online Qualitative Research in the Age of E- Commerce: Data Sources and Approaches Nikhilesh Dholakia University of Rhode Island, [email protected] Dong Zhang University of Rhode Island, [email protected] Follow this and additional works at: https://digitalcommons.uri.edu/cba_facpubs Part of the E-Commerce Commons, and the Marketing Commons Terms of Use All rights reserved under copyright. Citation/Publisher Attribution Dholakia, Nikhilesh & Zhang, Dong (2004). Online Qualitative Research in the Age of E-Commerce: Data Sources and Approaches [27 paragraphs]. Forum Qualitative Sozialforschung / Forum: Qualitative Social Research, 5(2), Art. 29, http://nbn-resolving.de/ urn:nbn:de:0114-fqs0402299. This Article is brought to you for free and open access by the College of Business Administration at DigitalCommons@URI. It has been accepted for inclusion in College of Business Administration Faculty Publications by an authorized administrator of DigitalCommons@URI. For more information, please contact [email protected]. FORUM: QUALITATIVE Volume 5, No. 2, Art. 29 SOCIAL RESEARCH May 2004 SOZIALFORSCHUNG Online Qualitative Research in the Age of E-Commerce: Data Sources and Approaches Nikhilesh Dholakia & Dong Zhang Key words: Abstract: With the boom in E-commerce, practitioners and researchers are increasingly generating e-commerce, marketing and strategic insights by employing the Internet as an effective new tool for conducting netnography, well-established forms of qualitative research (TISCHLER 2004). The potential of Internet as a rich online qualitative data source and an attractive arena for qualitative research in e-commerce settings—in other words research, cyberspace as a "field," in the ethnographic sense—has not received adequate attention. -
Online Diaries: Reflections on Trust, Privacy, and Exhibitionism
View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Springer - Publisher Connector Ethics and Information Technology (2008) 10:57–69 Ó The Author(s) 2008 DOI 10.1007/s10676-008-9155-9 Online diaries: Reflections on trust, privacy, and exhibitionism Paul B. de Laat Faculty of Philosophy, University of Groningen, Oude Boteringestraat 52, 9712 GL Groningen, The Netherlands E-mail: [email protected] Abstract. Trust between transaction partners in cyberspace has come to be considered a distinct possibility. In this article the focus is on the conditions for its creation by way of assuming, not inferring trust. After a survey of its development over the years (in the writings of authors like Luhmann, Baier, Gambetta, and Pettit), this mechanism of trust is explored in a study of personal journal blogs. After a brief presentation of some technicalities of blogging and authors’ motives for writing their diaries, I try to answer the question, ‘Why do the overwhelming majority of web diarists dare to expose the intimate details of their lives to the world at large?’ It is argued that the mechanism of assuming trust is at play: authors simply assume that future visitors to their blog will be sympathetic readers, worthy of their intimacies. This assumption then may create a self-fulfilling cycle of mutual admiration. Thereupon, this phenomenon of blogging about one’s intimacies is linked to Calvert’s theory of ‘mediated voyeurism’ and Mathiesen’s notion of ‘synopticism’. It is to be interpreted as a form of ‘empowering exhibitionism’ that reaffirms subjectivity. -
Voip-Phone-Systems
Hosted or Premise-Based, Voice over IP systems are opportunities businesses should explore. Offers Big Advantages What is VoIP? Internet technology is affecting virtually every aspect of how businesses operate today. Perhaps First it is important to understand that there is VoIP none is impacted more than telecom. New Voice service and there are VoIP phone systems. Voice over IP (VoIP) capabilities are enabling companies over IP service, Voice over Interdinet Protocol and to communicate more effectively, economically and VoIP all refer to phone service delivered over the reliably. They are also providing the opportunity for Internet or a private IP network. Voice and unprecedented business flexibility and mobility. multimedia sessions can be transmitted by Both premise-based VoIP and hosted systems are digitization of the analog voice signal, encoding, dramatically improving how small and medium-size creating data packets and transmission as Internet businesses serve their customers, enable their Protocol (IP) packets over a packet-switched employees and achieve greater levels of success. network. The bandwidth efficiency and low costs that can be achieved with VoIP technology are an Premise-based Voice over IP phone systems can attractive incentive for many businesses to migrate provide large businesses with real cost savings and from traditional TDM to VoIP telephone service. other potential benefits of situating the equipment Today, the majority of new phone lines being within their facilities. Hosted (cloud-based) VOIP installed are VoIP. can offer other businesses a variety of advantages, from scalability, reliability and minimal capital A Voice over IP phone system is the equipment and investment to functionality, productivity and a software a business uses. -
How the Autofictional Blog Transforms Arabic Literature*
When Writers Activate Readers How the autofictional blog transforms Arabic literature* TERESA PEPE (University of Oslo) Abstract The adoption of Internet technology in Egypt has led to the emergence a new literary genre, the ‘autofic- tional blog’. This paper explores how this genre relates to the Arabic understanding of literature, using as examples a number of Egyptian autofictional blogs written between 2005 and 2011. The article shows that the autofictional blog transforms ʾadab into an interactive game to be played among authors and readers, away from the gatekeepers of the literary institutions, such as literary critics and publishers. In this game the author adopts a hybrid genre and mixed styles of Arabic and challenges the readers to take an active role in discovering the identity hidden behind the screen and making their way into the text. The readers, in return, feel entitled to change and contribute to the text in a variety of ways. Key words: autofictional blog; ʾadab; modern Arabic literature; Egypt The adoption of the Internet has favoured the proliferation of new forms of autobiographi- cal writing and literary creativity all over the world. Blogs1 in particular are used by Inter- net users worldwide to record and share their writing. The popularity of the blogging phenomenon and the original features of blog texts have also attracted the interest of international scholars. More specifically, a particular kind of blog defined as the “personal blog”, which consists of “a blog written by an individual and focusing on his or her personal life” (WALKER 2005), has spurred a significant debate. Most academics agree that the personal blog should be considered a form of diary (LEJEUNE 2000, MCNEILL 2003), thus inserting it in the category of (auto-)biographical writing. -
Borderless Networks Architecture: Connect Anyone, Anywhere, on Any Device
White Paper Borderless Networks Architecture: Connect Anyone, Anywhere, on Any Device What You Will Learn The business of government extends beyond physical walls, and so should government networks. IT teams need a new network architecture to securely deliver voice, video, and data services to employees and citizens anywhere, on any device. This white paper, intended for government network architects, provides a high-level overview of the Cisco® Borderless Networks architecture, focusing on how it supports top government priorities: ● Increasing operational efficiency, to minimize total cost of ownership and increase agility ● Allowing secure access by different government users and citizens while guarding against network damage and unauthorized information disclosure ● Empowering a mobile workforce to access government services from the field, with performance comparable to the experience at headquarters ● Enabling collaboration within and between government agencies and with citizens, from anywhere and with any device ● Supporting virtual desktops that employees can access from anywhere The Disappearance of Traditional Network Borders Until recently, very clear borders surrounded government networks. The network extended only as far as the building walls; provided access only to government employees on office PCs or phones; and delivered voice, video, or data, not a combination of services. Changes in workforce behavior, citizen expectations, and technology have impelled government to break down the traditional borders: ● The world has become the workplace: Employees increasingly work in the field, at home, in the car, and in airports. ● Citizens expect self-service applications: Citizens want the convenience of online tax filing, business license applications, and eligibility determination. Shifting citizen interactions to online channels when feasible also reduces government costs. -
Social Media 101 Guide
SOCIAL MEDIA 101 GUIDE Version 1.4 May 1st, 2019 SOCIAL MEDIA 101 GUIDE WHAT IS SOCIAL MEDIA? Have you ever wondered how you can connect with people at any time, no matter where they live? Social media gives you the power to do just that! You already know most of the tools we’re talking about. Facebook Posts and videos about your favorite celeb, tweets about a hot news topic, or memes that make a funny picture come to life, these are all types of social media tools. Social media tools can be used on your computer, smartphone, tablet or TV. It’s a great way to stay close to family, friends, and social groups that share that same interests you have. HOW DO PEOPLE USE SOCIAL MEDIA? Now you know what social media is, let’s see how people can use it! 1. How can I communicate with other people? Social media allows the user to have a two-way conversation with friends, families, groups, and a larger audience. 2. How can I connect to other people? Social media gives people a tool to foster a connection to others who share similar viewpoints, hobbies, and interests. 3. Why should I use social media? Social media helps people engage in the world–locally, nationally, and globally to create a connection, educate, seek information and news, and build awareness. NOTES: 1 THE MAJOR SOCIAL MEDIA SITES Facebook (facebook.com) What is it? Facebook or FB is a social networking tool that helps you communicate with friends, family, and coworkers. What can I do here? FB is a place where you can communicate with other people through posts/status updates and pictures. -
Blogging for Engines
BLOGGING FOR ENGINES Blogs under the Influence of Software-Engine Relations Name: Anne Helmond Student number: 0449458 E-mail: [email protected] Blog: http://www.annehelmond.nl Date: January 28, 2008 Supervisor: Geert Lovink Secondary reader: Richard Rogers Institution: University of Amsterdam Department: Media Studies (New Media) Keywords Blog Software, Blog Engines, Blogosphere, Software Studies, WordPress Summary This thesis proposes to add the study of software-engine relations to the emerging field of software studies, which may open up a new avenue in the field by accounting for the increasing entanglement of the engines with software thus further shaping the field. The increasingly symbiotic relationship between the blogger, blog software and blog engines needs to be addressed in order to be able to describe a current account of blogging. The daily blogging routine shows that it is undesirable to exclude the engines from research on the phenomenon of blogs. The practice of blogging cannot be isolated from the software blogs are created with and the engines that index blogs and construct a searchable blogosphere. The software-engine relations should be studied together as they are co-constructed. In order to describe the software-engine relations the most prevailing standalone blog software, WordPress, has been used for a period of over seventeen months. By looking into the underlying standards and protocols of the canonical features of the blog it becomes clear how the blog software disperses and syndicates the blog and connects it to the engines. Blog standards have also enable the engines to construct a blogosphere in which the bloggers are subject to a software-engine regime. -
The 411 on Social Media, Networking and Texting
The 411 on Social Media, Networking and Texting get frustrated when my niece and nephew site has several security settings that may hide or are tappity tap tapping away in their own not hide each user’s information. worlds,” says Johnnie, a relative caregiver and foster parent. “I feel left out, until I remember For example, in the Spring of 2010, Facebook Ithat I really wasn’t so different when I was that changed its default settings to make it much easier age. We didn’t have cell phones and computers, for people to see other people’s information, but but we still had our own worlds and, above all, a lot of people weren’t aware of the change that we wanted our privacy.” took place. It’s crucial to know how to set and check account settings. What Exactly Is Social Media, Anyhow? Social media is any form of communication Blogs are basically online journaling websites. A between people and the internet. It’s a large list of blog is similar to Facebook and MySpace, but is online activities that include: more focused. Think of a Talking (using Voice Over blog as an online diary or an Internet Protocol or extended holiday newsletter. VOIP) There are privacy settings for Sharing media files like blogs so you can control who pictures and videos can view them. Blogs can display pictures, text, videos Social networking and links to other sites. Video gaming Web logs or “blogs” MMOGs (Video Gaming) stands for Massively While many of us are familiar Multiplayer Online Game.