Ethical issues in Computer-Assisted Language Learning: Perceptions of teachers and learners
暂无分享,去创建一个
[1] Edgar R. Weippl. Security in e-learning , 2005, ELERN.
[2] Chien Chou,et al. Using a two-tier test to assess students' understanding and alternative conceptions of cyber copyright laws , 2007, Br. J. Educ. Technol..
[3] J. Phelps,et al. Privacy Concerns and Consumer Willingness to Provide Personal Information , 2000 .
[4] Robert A. Schultz. Contemporary Issues in Ethics and Information Technology , 2005 .
[5] A Min Tjoa,et al. Privacy in E-learning: How to implement anonymity , 2005, The 3rd ACS/IEEE International Conference onComputer Systems and Applications, 2005..
[6] Mark Warschauer,et al. Network-Based Language Teaching: Concepts and Practice , 2000 .
[7] H. Nissenbaum. Protecting Privacy in an Information Age: The Problem of Privacy in Public , 1998, The Ethics of Information Technologies.
[8] Tamara Dinev,et al. Internet privacy concerns and beliefs about government surveillance - An empirical investigation , 2008, J. Strateg. Inf. Syst..
[9] Claudia Fernández,et al. CALL Dimensions: Options and Issues in Computer-Assisted Language Learning by LEVY, MIKE, & GLENN STOCKWELL , 2007 .
[10] Tasuku Igarashi,et al. No mobile, no life: Self-perception and text-message dependency among Japanese high school students , 2008, Comput. Hum. Behav..
[11] Tomaz Klobucar,et al. Privacy provision in e-learning standardized systems: status and improvements , 2005, Comput. Stand. Interfaces.
[12] Neil Heffernan,et al. Copyright and multimedia classroom material: a study from Japan , 2008 .
[13] Mark Warschauer,et al. Network-based Language Teaching: On-line learning in second language classrooms: An ethnographic study , 2000 .
[14] Eve M. Caudill,et al. Consumer Online Privacy: Legal and Ethical Issues , 2000 .
[15] K. Mccrohan. Information Technology, Privacy, and the Public Good , 1989 .
[16] Mike Levy,et al. Learning Italian via mobile SMS , 2005 .
[17] Lothar Fritsch,et al. Personal Rights Management - Taming Camera-Phones for Individual Privacy Enforcement , 2006, Privacy Enhancing Technologies.
[18] N. Ben Fairweather,et al. The ethical attitudes of information systems professionals: outcomes of an initial survey , 2002, Telematics Informatics.
[19] Philip G. Zimbardo,et al. Shyness: What it is What to Do About it , 1977 .
[20] S. Margulis. Privacy as a Social Issue and Behavioral Concept , 2003 .
[21] Khalil El-Khatib,et al. Privacy and Security in E-Learning , 2003, Int. J. Distance Educ. Technol..
[22] Mike Levy,et al. Computer-Assisted Language Learning: Context and Conceptualization , 1997 .
[23] C C Bennett. What price privacy? , 1967, The American psychologist.
[24] Lucas D. Introna. Privacy and the computer: why we need privacy in the information society , 1997 .
[25] Paul F. Syverson,et al. What Price Privacy? - and why identity theft is about neither identity nor theft , 2004, Economics of Information Security.
[26] Ömer Uysal,et al. Influence of gender, program of study and PC experience on unethical computer using behaviors of Turkish undergraduate students , 2008, Comput. Educ..
[27] R. Laufer,et al. Privacy as a Concept and a Social Issue: A Multidimensional Developmental Theory , 1977 .
[28] David H. Jonassen,et al. What are Cognitive Tools , 1992 .
[29] Jeffrey Rosen,et al. The Unwanted Gaze: The Destruction of Privacy in America , 2000 .
[30] R. Thiede. Network-based Language Teaching Concepts and Practice , 2005 .
[31] 天野 隆弘. Act on the protection of personal information and medical education , 2007 .
[32] C. Tu. The relationship between social presence and online privacy , 2002, Internet High. Educ..
[33] Mark Warschauer,et al. NETWORK-BASED LANGUAGE TEACHING , 2008 .
[34] Bruce A. Reinig,et al. Managing user perceptions of email privacy , 1995, CACM.