-
1
-
-
0033358681
-
Classroom 2000: an experiment with the instrumentation of a living educational environment
-
Abowd, G.D. (1999) ‘Classroom 2000: an experiment with the instrumentation of a living educational environment’, IBM Systems Journal, Vol. 38, pp.508–529.
-
(1999)
IBM Systems Journal
, vol.38
, pp. 508-529
-
-
Abowd, G.D.1
-
2
-
-
84952966132
-
-
accessed on 1 March, 2008
-
Apple (2008) iPod Touch. Available at: www.apple.com/ipodtouch/, accessed on 1 March, 2008.
-
(2008)
iPod Touch
-
-
Apple1
-
6
-
-
51949111031
-
Open-source learning management with moodle
-
Chavan, A. and Pavri, S. (2004) ‘Open-source learning management with moodle’, Linux Journal, Vol. 128, p.2.
-
(2004)
Linux Journal
, vol.128
, pp. 2
-
-
Chavan, A.1
Pavri, S.2
-
8
-
-
84952973450
-
From cameras to camtesia: streaming media without the stress
-
W. Miller and R. Pellen (Eds) Binghampton, NY: Haworth Press
-
Cox, C. (2004) ‘From cameras to camtesia: streaming media without the stress’, in W. Miller and R. Pellen (Eds), Internet Reference Support for Distance Learners. Binghampton, NY: Haworth Press.
-
(2004)
Internet Reference Support for Distance Learners
-
-
Cox, C.1
-
9
-
-
46749150841
-
Social software: e-learning beyond learning management systems
-
No. II (retrieved June 30, 2008)
-
Dalsgaard, C. (2006) ‘Social software: e-learning beyond learning management systems’, European Journal of Open, Distance and E-Learning, No. II. Available at: http://www.eurodl.org/materials/contrib/2006/Christian_Dalsgaard.htm (retrieved June 30, 2008).
-
(2006)
European Journal of Open, Distance and E-Learning
-
-
Dalsgaard, C.1
-
10
-
-
79954481696
-
Places to go: facebook
-
(retrieved June 30, 2008)
-
Downes, S. (2007) ‘Places to go: facebook’, Innovate, Vol. 4, No. 1. Available at: http://iit-iti.nrc-cnrc.gc.ca/iit-publications-iti/docs/NRC-50350.pdf (retrieved June 30, 2008).
-
(2007)
Innovate
, vol.4
, Issue.1
-
-
Downes, S.1
-
12
-
-
84952973436
-
-
accessed on 1 March, 2008
-
ELearners Glossary (2008) Available at: www.elearners.com/resources/glossary.asp, accessed on 1 March, 2008.
-
(2008)
-
-
ELearners Glossary1
-
13
-
-
85001818197
-
Privacy and security in e-learning
-
El-Khatib, K., Korba, L., Xu, Y. and Yee, G. (2003) ‘Privacy and security in e-learning’, Int. J. Distance Education Technologies, Vol. 1, No. 4, pp.11–30.
-
(2003)
Int. J. Distance Education Technologies
, vol.1
, Issue.4
, pp. 11-30
-
-
El-Khatib, K.1
Korba, L.2
Xu, Y.3
Yee, G.4
-
16
-
-
84952968804
-
New security protocol for m-learning
-
Biarritz, France
-
He, L., He, L. and Ian Rogers, I. (2005) ‘New security protocol for m-learning’, IADATe-2005 International Conference on Education, Biarritz, France.
-
(2005)
IADATe-2005 International Conference on Education
-
-
He, L.1
He, L.2
Ian Rogers, I.3
-
17
-
-
84952958842
-
-
Paper presented in the Proceedings of the 10th IACEE World Conference on Continuing Engineering Education (WCCEE), Vienna, Austria
-
Holzinger, A., Nischelwitzer, A.K. and Kickmeier-Rust, M.D. (2006) ‘Pervasive e-education supports life long learning: some examples of x-media learning objects (XLO)’, Paper presented in the Proceedings of the 10th IACEE World Conference on Continuing Engineering Education (WCCEE), Vienna, Austria.
-
(2006)
Pervasive e-education supports life long learning: some examples of x-media learning objects (XLO)
-
-
Holzinger, A.1
Nischelwitzer, A.K.2
Kickmeier-Rust, M.D.3
-
18
-
-
84952971389
-
-
accessed on 24 June, 2008
-
iPod History (2008) Available at: www.ipodhistory.com, accessed on 24 June, 2008.
-
(2008)
-
-
iPod History1
-
26
-
-
85008581749
-
Web-based knowledge management
-
Maurer, H. (1998) ‘Web-based knowledge management’, IEEE Computer, Vol. 31, pp.122–123.
-
(1998)
IEEE Computer
, vol.31
, pp. 122-123
-
-
Maurer, H.1
-
28
-
-
84952967699
-
-
in P. Kommers and G. Richards (Eds), Paper presented in the Proceedings of the World Conference on Educational Multimedia, Hypermedia and Telecommunications, Chesapeake, VA
-
O Shea, C., Lillis, D., O Shea, S. and Collins, P. (2005) ‘The application of e-learning and m-learning technology in the context of life long learning in Irish higher education’, in P. Kommers and G. Richards (Eds), Paper presented in the Proceedings of the World Conference on Educational Multimedia, Hypermedia and Telecommunications, Chesapeake, VA, pp.568–572.
-
(2005)
The application of e-learning and m-learning technology in the context of life long learning in Irish higher education
, pp. 568-572
-
-
O Shea, C.1
Lillis, D.2
O Shea, S.3
Collins, P.4
-
30
-
-
5644254719
-
Learning from laptops
-
Rockman, S. (2003) ‘Learning from laptops’, Threshold Magazine, Vol. 1, pp.24–28.
-
(2003)
Threshold Magazine
, vol.1
, pp. 24-28
-
-
Rockman, S.1
-
31
-
-
0000078870
-
Television is ‘easy’ and print is ‘tough’
-
Salomon, G. (1984) ‘Television is ‘easy’ and print is ‘tough’’, Journal of Educational Psychology, Vol. 76, pp.647–658.
-
(1984)
Journal of Educational Psychology
, vol.76
, pp. 647-658
-
-
Salomon, G.1
-
32
-
-
0038363291
-
Goal-based scenarios: a radical look at education
-
Schank, R.C. (1993) ‘Goal-based scenarios: a radical look at education’, The Journal of the Learning Sciences, Vol. 3, pp.429–453.
-
(1993)
The Journal of the Learning Sciences
, vol.3
, pp. 429-453
-
-
Schank, R.C.1
-
34
-
-
0037667389
-
The design of personal mobile technologies for lifelong learning
-
Sharples, M. (2000) ‘The design of personal mobile technologies for lifelong learning’, Computers and Education, Vol. 34, pp.177–193.
-
(2000)
Computers and Education
, vol.34
, pp. 177-193
-
-
Sharples, M.1
-
35
-
-
84952965341
-
-
Paper presented in the Proceedings of the International Workshop on Research Challenges in Security and Privacy in Mobile and Wireless Networks (WSPWN 06)
-
Spiewak, D. and Engel, T. (2006) ‘An overview of models applying trust as a component of security services in manets’, Paper presented in the Proceedings of the International Workshop on Research Challenges in Security and Privacy in Mobile and Wireless Networks (WSPWN 06).
-
(2006)
An overview of models applying trust as a component of security services in manets
-
-
Spiewak, D.1
Engel, T.2
-
37
-
-
0141605917
-
Handhelds go to school: lessons learned
-
Tatar, D., Roschelle, J., Vahey, P. and Penuel, W.R. (2003) ‘Handhelds go to school: lessons learned’, Computer, Vol. 36, pp.30–37.
-
(2003)
Computer
, vol.36
, pp. 30-37
-
-
Tatar, D.1
Roschelle, J.2
Vahey, P.3
Penuel, W.R.4
-
38
-
-
84952966936
-
-
accessed on 24, June 2008
-
TechSmiths (2008) Available at: www.techsmith.com/camtasia/history.asp#100, accessed on 24, June 2008.
-
(2008)
-
-
TechSmiths1
-
39
-
-
84952964959
-
The iPod iDea: wired for scholarship
-
Todd, J. (2005) ‘The iPod iDea: wired for scholarship’, Duke Magazine, Vol. 91, pp.2–3.
-
(2005)
Duke Magazine
, vol.91
, pp. 2-3
-
-
Todd, J.1
-
40
-
-
84858760408
-
-
Technical Report # DIT-04–009, University Trento, Italy
-
Trifonova, A., Knapp, J., Ronchetti, M. and Gamper, J. (2004) ‘Mobile ELDIT: challenges in the transition from an e-learning to an m-learning system’, Technical Report # DIT-04–009, University Trento, Italy.
-
(2004)
Mobile ELDIT: challenges in the transition from an e-learning to an m-learning system
-
-
Trifonova, A.1
Knapp, J.2
Ronchetti, M.3
Gamper, J.4
-
41
-
-
84952956949
-
Market for K-12 course-management systems expands
-
12 February
-
Trotter, A. (2008) ‘Market for K-12 course-management systems expands’, Education Week, 12 February.
-
(2008)
Education Week
-
-
Trotter, A.1
-
42
-
-
84952971298
-
-
Paper presented in the Proceedings of the 1st International Symposium on Information and Communication Technologies, Dublin, Ireland
-
Ventuneac, M., Coffey, T. and Salomie, I. (2003) ‘A policy -based security framework for web-enabled applications’, Paper presented in the Proceedings of the 1st International Symposium on Information and Communication Technologies, Dublin, Ireland, pp.487–492.
-
(2003)
A policy -based security framework for web-enabled applications
, pp. 487-492
-
-
Ventuneac, M.1
Coffey, T.2
Salomie, I.3
-
44
-
-
84875483484
-
Security considerations in m-learning; threats and countermeasures
-
Weippl, E.R. (2007) ‘Security considerations in m-learning; threats and countermeasures’, Advanced Technology for Learning, Vol. 4, pp.99–105.
-
(2007)
Advanced Technology for Learning
, vol.4
, pp. 99-105
-
-
Weippl, E.R.1
|