首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   23篇
  免费   0篇
教育   11篇
科学研究   10篇
体育   1篇
信息传播   1篇
  2021年   1篇
  2019年   3篇
  2018年   1篇
  2016年   3篇
  2015年   1篇
  2014年   1篇
  2013年   2篇
  2012年   1篇
  2010年   1篇
  2008年   1篇
  2007年   1篇
  2006年   1篇
  2005年   2篇
  2004年   1篇
  2003年   1篇
  2001年   1篇
  1995年   1篇
排序方式: 共有23条查询结果,搜索用时 15 毫秒
1.
Induced by a literature review, this paper presents a framework of dimensions and indicators highlighting the underpinning aspects and values of social learning within teacher groups. Notions of social networks, communities of practice and learning teams were taken as the main perspectives to influence this social learning framework. The review exercise resulted in four dimensions: (1) practice, (2) domain and value creation, (3) collective identity and (4) organization. The indicators corresponding to these dimensions serve as the foundation for understanding social learning in practice. The framework of dimensions and indicators can be of assistance for researchers as well as teacher groups that aim to assess their views on social learning and analyse whether these views fit the learning goals of the group or that adjustments are required. In this way, learning processes within groups of teachers can be improved.  相似文献   
2.
Paul B. de Laat   《Research Policy》2005,34(10):1511-1532
Two property regimes for software development may be distinguished. Within corporations, on the one hand, a Private Regime obtains which excludes all outsiders from access to a firm's software assets. It is shown how the protective instruments of secrecy and both copyright and patent have been strengthened considerably during the last two decades. On the other, a Public Regime among hackers may be distinguished, initiated by individuals, organizations or firms, in which source code is freely exchanged. It is argued that copyright is put to novel use here: claiming their rights, authors write ‘open source licenses’ that allow public usage of the code, while at the same time regulating the inclusion of users. A ‘regulated commons’ is created. The analysis focuses successively on the most important open source licenses to emerge, the problem of possible incompatibility between them (especially as far as the dominant General Public License is concerned), and the fragmentation into several user communities that may result.  相似文献   
3.
Background: This paper discusses teachers’ perspectives on learning networks and their motives for participating in these networks. Although it is widely held that teachers’ learning may be developed through learning networks, not all teachers participate in such networks.

Purpose: The theme of reciprocity, central to studies in the area of learning in networks, is often approached from a rational exchange perspective. This study attempts to extend this approach with reference to the concept of symbolic interactionism. The study was guided by the following research question: What is the relationship between teachers’ perceptions of learning networks and their motives for participation or non-participation in these networks?

Design and methods: In order to address this research question, semi-structured interviews among 25 teachers in secondary education in the Netherlands were carried out. The semi-structured interviews consisted of three parts: background information, perspectives on learning networks and personal experiences with those networks. Data were analysed qualitatively and analyses consisted of within-case analysis, and cross-case analysis of interview fragments. Three themes were considered: (1) perspectives on learning networks, (2) motives for participation perceived as rational exchange, (3) motives for participation perceived as related to social order.

Findings: The findings are presented around these three themes. Each theme is discussed in relation to relevant aspects from the literature. Findings indicated that teachers perceived learning networks to be organised both within-school and outside school, and mostly focused around specific content knowledge. Reasons for participation or non-participation were related to rational costs and rewards (such as time, technology, self-efficacy); in symbolic motives (such as joy, sharing and mutual understanding), and also in a sense of meaning that resulted from networking activities.

Conclusions: We conclude that, in addition to social exchange motives, the data suggest that symbolic aspects of communication and interaction play an important role in considerations for participation in learning networks. This may be described in terms of four ‘types’ of networking teachers: the Community focused networking teacher, the Locally focused networking teacher, the Not-yet-networking teacher, and the Non-networking teacher. It is hoped that these exploratory findings could be helpful in supporting the development of learning networks for all teachers.  相似文献   
4.
5.
Trust between transaction partners in cyberspace has come to be considered a distinct possibility. In this article the focus is on the conditions for its creation by way of assuming, not inferring trust. After a survey of its development over the years (in the writings of authors like Luhmann, Baier, Gambetta, and Pettit), this mechanism of trust is explored in a study of personal journal blogs. After a brief presentation of some technicalities of blogging and authors’ motives for writing their diaries, I try to answer the question, ‘Why do the overwhelming majority of web diarists dare to expose the intimate details of their lives to the world at large?’ It is argued that the mechanism of assuming trust is at play: authors simply assume that future visitors to their blog will be sympathetic readers, worthy of their intimacies. This assumption then may create a self-fulfilling cycle of mutual admiration. Thereupon, this phenomenon of blogging about one’s intimacies is linked to Calvert’s theory of ‘mediated voyeurism’ and Mathiesen’s notion of ‘synopticism’. It is to be interpreted as a form of ‘empowering exhibitionism’ that reaffirms subjectivity. Various types of ‘synopticon’ are distinguished, each drawing the line between public and private differently. In the most ‘radical’ synopticon blogging proceeds in total transparency and the concept of privacy is declared obsolete; the societal gaze of surveillance is proudly returned and nullified. Finally it is shown that, in practice, these conceptions of blogging are put to a severe test, while authors often have to cope with known people from ‘real life’ complaining, and with ‘trolling’ strangers.  相似文献   
6.
This study performed an analysis of the push-off forces of elite-short-track speed skaters using a new designed instrumented short-track speed skate with the aim to improve short-track skating performance. Four different skating strokes were distinguished for short-track speed skaters at speed. The strokes differed in stroke time, force level in both normal and lateral directions, and the centre of pressure (COP) on the blade. Within the homogeneous group of male elite speed skaters (N = 6), diversity of execution of the force patterns in the four phases of skating was evident, while skating at the same velocities. The male participants (N = 6) with a better personal record (PR) kept the COP more to the rear of their blades while hanging into the curve (r = 0.82, p < 0.05), leaving the curve (r = 0.86, p < 0.05), and entering the straight (r = 0.76, p < 0.10). Furthermore, the male skaters with a better PR showed a trend of a lower lateral peak force while entering the curve (r = 0.74, p < 0.10). Females showed a trend towards applying higher body weight normalised lateral forces than the males, while skating at imposed lower velocities.  相似文献   
7.
Open-content communities that focus on co-creation without requirements for entry have to face the issue of institutional trust in contributors. This research investigates the various ways in which these communities manage this issue. It is shown that communities of open-source software—continue to—rely mainly on hierarchy (reserving write-access for higher echelons), which substitutes (the need for) trust. Encyclopedic communities, though, largely avoid this solution. In the particular case of Wikipedia, which is confronted with persistent vandalism, another arrangement has been pioneered instead. Trust (i.e. full write-access) is ‘backgrounded’ by means of a permanent mobilization of Wikipedians to monitor incoming edits. Computational approaches have been developed for the purpose, yielding both sophisticated monitoring tools that are used by human patrollers, and bots that operate autonomously. Measures of reputation are also under investigation within Wikipedia; their incorporation in monitoring efforts, as an indicator of the trustworthiness of editors, is envisaged. These collective monitoring efforts are interpreted as focusing on avoiding possible damage being inflicted on Wikipedian spaces, thereby being allowed to keep the discretionary powers of editing intact for all users. Further, the essential differences between backgrounding and substituting trust are elaborated. Finally it is argued that the Wikipedian monitoring of new edits, especially by its heavy reliance on computational tools, raises a number of moral questions that need to be answered urgently.  相似文献   
8.
The open source software movement has become a threat to corporate software development. In response, companies started to develop products and services related to open source software. Subsequently, they also tried to come to terms with the processes that are characteristic of open source software development. This article examines the efforts made by companies to use open source principles and practices for corporate purposes. The study shows that over time the open source-inspired networks developed by these companies gradually come to resemble classical corporate networks.  相似文献   
9.
In communities of user-generated content, systems for the management of content and/or their contributors are usually accepted without much protest. Not so, however, in the case of Wikipedia, in which the proposal to introduce a system of review for new edits (in order to counter vandalism) led to heated discussions. This debate is analysed, and arguments of both supporters and opponents (of English, German and French tongue) are extracted from Wikipedian archives. In order to better understand this division of the minds, an analogy is drawn with theories of bureaucracy as developed for real-life organizations. From these it transpires that bureaucratic rules may be perceived as springing from either a control logic or an enabling logic. In Wikipedia, then, both perceptions were at work, depending on the underlying views of participants. Wikipedians either rejected the proposed scheme (because it is antithetical to their conception of Wikipedia as a community) or endorsed it (because it is consonant with their conception of Wikipedia as an organization with clearly defined boundaries). Are other open-content communities susceptible to the same kind of ??essential contestation???  相似文献   
10.
The open source software movement has become a threat to corporate software development. In response, companies started to develop products and services related to open source software. Subsequently, they also tried to come to terms with the processes that are characteristic of open source software development. This article examines the efforts made by companies to use open source principles and practices for corporate purposes. The study shows that over time the open source-inspired networks developed by these companies gradually come to resemble classical corporate networks.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号