Access Rights – The Keys to Cooperative Work/Learning

Author(s):  
Thorsten Hampel
2016 ◽  
Vol 45 (2) ◽  
pp. 28-48 ◽  
Author(s):  
Isaac Dery

Women’s access to and control over productive resources, including land, has increasingly been recognized in global discussions as a key factor in reducing poverty, ensuring food security and promoting gender equality. Indeed, this argument has been widely accepted by both feminists and development theorists since the 1980s. Based on qualitative research with 50 purposively selected men and women, this study explored the complexity of women’s access to and control over land within a specific relationship of contestations, negotiations, and manipulations with men. Data were analyzed using thematic analysis. While theoretically, participants showed that women’s [secure] access to and control over land has beneficial consequences to women themselves, households and the community at large, in principle, women's access and control status was premised in the traditional framework which largely deprives women, equal access and/or control over the land. The study indicates that even though land is the most revered resource and indeed, the dominant source of income for the rural poor, especially women, gender-erected discrimination and exclusion lie at the heart of many rural women in gaining access to land. This study argues that women's weak access rights and control over land continue to perpetuate the feminization of gender inequality–while men were reported to possess primary access and control over land as the heads of households, women were argued to have secondary rights due to their ‘stranger statuses’ in their husbands’ families. Overall, the degree of access to land among women was reported to be situated within two broad contexts–marriage and inheritance.


2018 ◽  
Vol 28 (4) ◽  
pp. 1361-1365
Author(s):  
Ilhan Istikbal Ibryam ◽  
Byulent Mustafa Mustafa ◽  
Atti Rashtid Mustafa

With the introduction of Information Technology in educational process we need more often to use electronic evaluation. The examples of test variants in the secondary school are often prepared with the help of word processing editors as WordPad that has good opportunities for elementary text formatting. Another part of the teachers often use Microsoft Word when preparing their tests. It is true that Microsoft Word has much more editing and formatting instruments than WordPad. For access to electronic educational resources suggested by the school teachers two or more computer networks are built (teachers' and learners'). Using these networks and their access rights, each user, learner or teacher, has the opportunity to add files and directories into the school database (DB). Learners can add files with the exercises they have done during their classes. Teachers suggest through the database the electronic lessons they have developed. At the end of each unit each teacher prepares an electronic test. In it there are described the evaluation criteria depending on the number of points the student has gathered through correct responses. In most cases we notice that in the teachers' network files with the responses of the tests are added later on. Not always the means for defence offered by the system administrators at the school can guarantee the safety of our files and more exactly the manipulation of the answers of the electronic forms of check up. Aiming at more effective defence of the text files, this article views an algorithm created by us for cryptographic defence of text files and it's application in secondary school. The effective use of cryptographic information defence minimises the opportunity to decipher the coded information aiming at its misuse by the learners. Providing safe defence against unsanctioned access in computer communication is a complex and extensive task which is solved by means of a set of measures of organisation and programme-technical character. The defence of the process of submitting data requires utmost attention because it concerns the most vulnerable and accessible for violation points in the communication systems.


Author(s):  
Charlotte P. Lee ◽  
Kjeld Schmidt

The study of computing infrastructures has grown significantly due to the rapid proliferation and ubiquity of large-scale IT-based installations. At the same time, recognition has also grown of the usefulness of such studies as a means for understanding computing infrastructures as material complements of practical action. Subsequently the concept of “infrastructure” (or “information infrastructures,” “cyberinfrastructures,” and “infrastructuring”) has gained increasing importance in the area of Computer-Supported Cooperative Work (CSCW) as well as in neighboring areas such as Information Systems research (IS) and Science and Technology Studies (STS). However, as such studies have unfolded, the very concept of “infrastructure” is being applied in different discourses, for different purposes, in myriad different senses. Consequently, the concept of “infrastructure” has become increasingly muddled and needs clarification. The chapter presents a critical investigation of the vicissitudes of the concept of “infrastructure” over the last 35 years.


Author(s):  
Kjeld Schmidt

The emergence of practice-centered computing (e.g., Computer-Supported Cooperative Work, or CSCW) raises the crucial question: How can we conceptualize the practices into which the prospective technology is to be integrated? How can we, reasonably, say of two observed activities or events that they are, or are not, instances of the same type? These are crucial questions. This chapter therefore attempts to clarify the concepts of “practice” and “technique.” First, since our ordinary concepts of “practice” and “technique” developed as part of the evolution of modern technology, as tools for practitioners’ and scholars’ reflections on the role of technical knowledge in work, the chapter outlines the major turning points in the evolution of these concepts, from Aristotle (via the scholastics), to enlightenment thinkers such as Diderot and Kant, and finally to Marx and Marxism. The chapter thereafter moves on to analyze the concepts as we use them today in ordinary discourse.


Author(s):  
James Meffan

This chapter discusses the history of multicultural and transnational novels in New Zealand. A novel set in New Zealand will have to deal with questions about cultural access rights on the one hand and cultural coverage on the other. The term ‘transnational novel’ gains its relevance from questions about cultural and national identity, questions that have particularly exercised nations formed from colonial history. The chapter considers novels that demonstrate and respond to perceived deficiencies in wider discourses of cultural and national identity by way of comparison between New Zealand and somewhere else. These include Amelia Batistich's Another Mountain, Another Song (1981), Albert Wendt's Sons for the Return Home (1973) and Black Rainbow (1992), James McNeish's Penelope's Island (1990), Stephanie Johnson's The Heart's Wild Surf (2003), and Lloyd Jones's Mister Pip (2006).


Author(s):  
Thomas Ludwig ◽  
Oliver Stickel ◽  
Peter Tolmie ◽  
Malte Sellmer

Abstract10 years ago, Castellani et al. (Journal of Computer Supported Cooperative Work, vol. 18, no. 2–3, 2009, pp. 199–227, 2009) showed that using just an audio channel for remote troubleshooting can lead to a range of problems and already envisioned a future in which augmented reality (AR) could solve many of these issues. In the meantime, AR technologies have found their way into our everyday lives and using such technologies to support remote collaboration has been widely studied within the fields of Human-Computer Interaction and Computer-Supported Cooperative Work. In this paper, we contribute to this body of research by reporting on an extensive empirical study within a Fab Lab of troubleshooting and expertise sharing and the potential relevance of articulation work to their realization. Based on the findings of this study, we derived design challenges that led to an AR-based concept, implemented as a HoloLens application, called shARe-it. This application is designed to support remote troubleshooting and expertise sharing through different communication channels and AR-based interaction modalities. Early testing of the application revealed that novel interaction modalities such as AR-based markers and drawings play only a minor role in remote collaboration due to various limiting factors. Instead, the transmission of a shared view and especially arriving at a shared understanding of the situation as a prerequisite for articulation work continue to be the decisive factors in remote troubleshooting.


2021 ◽  
Vol 5 (CSCW1) ◽  
pp. 1-26
Author(s):  
Mariacristina Sciannamblo ◽  
Marisa Leavitt Cohn ◽  
Peter Lyle ◽  
Maurizio Teli
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document