VSU
Online, Offline, and Online, Offline, and Out of LineOut of Line
The interplay of emerging technologies, The interplay of emerging technologies, higher education, and student development higher education, and student development at Vermont State Universityat Vermont State University
A Presentation to the University Deans’ Council by:A Presentation to the University Deans’ Council by:
Jessica Belue, Director of Student LifeJessica Belue, Director of Student LifeJonathan Bove, Chief Information OfficerJonathan Bove, Chief Information OfficerErin K. Miller, Director of Judicial AffairsErin K. Miller, Director of Judicial AffairsGabriel Reif, Director of AdmissionsGabriel Reif, Director of Admissions
[A submission for the 2007 StudentAffairs.com Online Case Study Competition [A submission for the 2007 StudentAffairs.com Online Case Study Competition from the University of Vermont]from the University of Vermont]
VSU
In the past six months, at In the past six months, at VSU…VSU… Students with disabilities and low-income students have Students with disabilities and low-income students have
struggled with access to distance learning courses and struggled with access to distance learning courses and courses utilizing on-line forumscourses utilizing on-line forums
Faculty have begun to incorporate blogs in their classroom Faculty have begun to incorporate blogs in their classroom workwork
A student was found responsible for using her cellular phone A student was found responsible for using her cellular phone to receive answers to test questions during a final examto receive answers to test questions during a final exam
Institutional spam has decreased by 15% due to novel Institutional spam has decreased by 15% due to novel institutional policiesinstitutional policies
A laptop containing 90,000 detailed alumni/ae records was A laptop containing 90,000 detailed alumni/ae records was recently stolenrecently stolen
VSU
Session ObjectivesSession Objectives
Familiarize staff with “hot topics” in technologyFamiliarize staff with “hot topics” in technology Recognize and understand the numerous Recognize and understand the numerous
benefits and drawbacks of such technologiesbenefits and drawbacks of such technologies Utilize VSU and nationwide technological Utilize VSU and nationwide technological
mishaps and successes as case studies, mishaps and successes as case studies, assisting us in developing policy and practicesassisting us in developing policy and practices
Prepare staff to respond to technological Prepare staff to respond to technological issues within their functional areasissues within their functional areas
VSU
Technology and Our Technology and Our Mission Mission VSU’s institutional mission outlines that VSU’s institutional mission outlines that
we engage students and support them in we engage students and support them in their development their development
Students come to campus already Students come to campus already familiar with many emerging technologiesfamiliar with many emerging technologies
We must incorporate these technologies We must incorporate these technologies into our work so that we can meet into our work so that we can meet students where they are and provide students where they are and provide them with optimal support and them with optimal support and opportunities for developmentopportunities for development
VSU
““Hot Topics” We Will Hot Topics” We Will HighlightHighlight Institutional SpamInstitutional Spam Text Messaging and Other Cell Phone Text Messaging and Other Cell Phone
CapabilitiesCapabilities Information SecurityInformation Security BloggingBlogging The Digital DivideThe Digital Divide
VSU
Institutional SpamInstitutional Spam
VSU
Institutional Spam Is…Institutional Spam Is… The mass e-mailing of the campus The mass e-mailing of the campus
community (all faculty, staff, or community (all faculty, staff, or students)students)
Institutional spam is not…Institutional spam is not… E-mails sent over voluntary listservs E-mails sent over voluntary listservs E-mails sent to small campus groups (e.g. E-mails sent to small campus groups (e.g.
biology majors, a student organization, a biology majors, a student organization, a faculty committee)faculty committee)
VSU
Why Institutional Spam is Why Institutional Spam is
Important to UnderstandImportant to Understand Many parties demand access to campus-Many parties demand access to campus-
wide e-mail privilegeswide e-mail privileges Institutional spam filtering enhances Institutional spam filtering enhances
productivity of all campus constituentsproductivity of all campus constituents Lack of policies and procedures can Lack of policies and procedures can
result in confusionresult in confusion
VSU
VSU Policies for VSU Policies for Institutional SpamInstitutional Spam Administrative approval requiredAdministrative approval required Submission one working day before the Submission one working day before the
message is to be sent (unless it is an message is to be sent (unless it is an emergency e-mail)emergency e-mail)
Accordance with the mission of our Accordance with the mission of our institutioninstitution
Compliance with federal and state lawsCompliance with federal and state laws
VSU
VSU Procedures for VSU Procedures for Institutional SpamInstitutional Spam The IT office monitors mass e-mailsThe IT office monitors mass e-mails Requests for mass e-mails can be made on Requests for mass e-mails can be made on
the Webthe Web The following officers may approve mass e-The following officers may approve mass e-
mails:mails: President: mailings to entire university President: mailings to entire university Provost: mailings to all facultyProvost: mailings to all faculty Vice President for Finance: mailings to staffVice President for Finance: mailings to staff Deans: mailings to faculty and/or students of collegeDeans: mailings to faculty and/or students of college Vice President for Student Affairs: mailings to student bodyVice President for Student Affairs: mailings to student body
VSU
Benefits ofBenefits ofInstitutional Spam Institutional Spam PoliciesPolicies
Help us avoid viruses and network overloadHelp us avoid viruses and network overload Streamline campus procedures to ensure Streamline campus procedures to ensure
consistency, clarity, and understanding consistency, clarity, and understanding Avoid e-mail inundation; ensure campus Avoid e-mail inundation; ensure campus
constituents read necessary e-mailsconstituents read necessary e-mails Prevent third-parties from sending campus-Prevent third-parties from sending campus-
wide e-mails wide e-mails Ensure messages to large audiences are in Ensure messages to large audiences are in
accordance with the mission of the universityaccordance with the mission of the university
VSU
Drawbacks of Drawbacks of Institutional Spam Institutional Spam PoliciesPolicies
Change in technology will require that we Change in technology will require that we continually reevaluate our policies and continually reevaluate our policies and proceduresprocedures
Some university offices who want control may Some university offices who want control may not have immediate control (e.g. registrar)not have immediate control (e.g. registrar)
Collaboration among involved parties can be Collaboration among involved parties can be difficult. IT will be the gathering pointdifficult. IT will be the gathering point
University assumes responsibility for what University assumes responsibility for what messages are or are not deliveredmessages are or are not delivered
VSU
Text Messaging Text Messaging and Other Cellular and Other Cellular Phone CapabilitiesPhone Capabilities
VSU
Text Messaging Is…Text Messaging Is…
Sending short messages to a [cellular Sending short messages to a [cellular phone], pager, PDA or other handheld phone], pager, PDA or other handheld device. Text messaging implies sending device. Text messaging implies sending short messages generally no more than a short messages generally no more than a couple of hundred characters in length. couple of hundred characters in length.
(P.C. Magazine’s pcmag.com, http://www.pcmag.com/)(P.C. Magazine’s pcmag.com, http://www.pcmag.com/)
VSU
Why Text Messaging is Why Text Messaging is Important to UnderstandImportant to Understand
Text messaging is one of the many features available Text messaging is one of the many features available on today’s cellular phoneson today’s cellular phones
80% of first-year students at colleges nationwide have 80% of first-year students at colleges nationwide have cell phones (Student Monitor, cell phones (Student Monitor, www.studentmonitor.com)www.studentmonitor.com)
Additional capabilities:Additional capabilities: Record and view videosRecord and view videos Capture and view photosCapture and view photos Download and listen to musicDownload and listen to music Record and listen to audio notesRecord and listen to audio notes Locate one’s position and download maps (GPS)Locate one’s position and download maps (GPS) Watch TV shows/moviesWatch TV shows/movies
VSU
““Texting” & the College Texting” & the College Campus: Issues to ConsiderCampus: Issues to Consider
Academic IntegrityAcademic Integrity SafetySafety Marketing & CommunicationMarketing & Communication
VSU
Text Messaging: Text Messaging: Academic IntegrityAcademic Integrity Drawbacks:Drawbacks:
December 2002: Cheating scheme uncovered during final-December 2002: Cheating scheme uncovered during final-exam week at the University of Maryand, College Park. A exam week at the University of Maryand, College Park. A dozen students were caught (Wired News, dozen students were caught (Wired News, http://www.wired.com)http://www.wired.com)
In 2005, a 9% increase in cheating was reported over the In 2005, a 9% increase in cheating was reported over the previous year due to mobile phone use (Curtis, 2005)previous year due to mobile phone use (Curtis, 2005)
In the United Kingdom, the number one cited cheating In the United Kingdom, the number one cited cheating offense is inappropriate use of mobile phones (Curtis, 2005)offense is inappropriate use of mobile phones (Curtis, 2005)
Examples of inappropriate use may include taking pictures Examples of inappropriate use may include taking pictures of exams with camera phones, or storing notes or formulas of exams with camera phones, or storing notes or formulas in phonesin phones
VSU
Text Messaging: SafetyText Messaging: Safety Drawbacks:Drawbacks:
A New York Post survey found that 30% of teens A New York Post survey found that 30% of teens age 13-18 have engaged in unhealthy stalking age 13-18 have engaged in unhealthy stalking behavior via text messaging (Delfiner, 2007)behavior via text messaging (Delfiner, 2007)
Text messaging enables the exponential increase of Text messaging enables the exponential increase of students involved in large-scale campus incidents students involved in large-scale campus incidents via instantaneous communication via instantaneous communication
BenefitsBenefits Text messaging allows individuals to remain Text messaging allows individuals to remain
connected to others at all times, even when aloneconnected to others at all times, even when alone
VSU
Text Messaging: Text Messaging: Marketing & CommunicationMarketing & Communication
Benefits:Benefits: Baruch College - CUNY has started a service that Baruch College - CUNY has started a service that
allows people to access class information easily allows people to access class information easily through text messages (e.g., homework through text messages (e.g., homework assignments, computer lab availability, course assignments, computer lab availability, course surveys)surveys)
University of Maryland Student Government (2005) University of Maryland Student Government (2005) sponsored Mobile Campus, a text messaging sponsored Mobile Campus, a text messaging service that allows students to receive campus service that allows students to receive campus updates from student organization leaders, faculty, updates from student organization leaders, faculty, and administration. (Carnevale, 2005)and administration. (Carnevale, 2005)
VSU
Information Information SecuritySecurity
VSU
Information Security is…Information Security is… The protection and management of crucial dataThe protection and management of crucial data One can repeatedly read in the One can repeatedly read in the Chronicle of Higher Chronicle of Higher
EducationEducation of security incidents where data was lost or of security incidents where data was lost or stolenstolen
Colleges are repositories of personal information, and Colleges are repositories of personal information, and this makes them prime targets of identity thievesthis makes them prime targets of identity thieves Students, as a group, are less likely to keep diligent track of Students, as a group, are less likely to keep diligent track of
their online bank accountstheir online bank accounts Alumni/ae, as a group, are more likely to be considered rich Alumni/ae, as a group, are more likely to be considered rich
targets because of the assumption that they have money to targets because of the assumption that they have money to give away give away
VSU
Why Information Security is Why Information Security is Important to UnderstandImportant to Understand
As our campus stores more and more As our campus stores more and more personal information electronically, our personal information electronically, our data becomes a higher profile target for data becomes a higher profile target for hacking, phishing (fake e-mailing), and hacking, phishing (fake e-mailing), and information thievesinformation thieves
You may not think you’re a target, but that You may not think you’re a target, but that most likely makes you more of onemost likely makes you more of one
VSU
Steps to Heightening Our Steps to Heightening Our Information SecurityInformation Security
Educate our staffEducate our staff IT is launching a set of digital self-defense sessions IT is launching a set of digital self-defense sessions
open to all staffopen to all staff Keep secret information secretKeep secret information secret
Switch to systems that use alternate identifiers, not Switch to systems that use alternate identifiers, not social security numberssocial security numbers
Know each type of attack and how to defend Know each type of attack and how to defend against itagainst it Hacking, viruses, and malicious softwareHacking, viruses, and malicious software Phishing: use of a fake e-mail or website as a lurePhishing: use of a fake e-mail or website as a lure Physical theftPhysical theft
VSU
Benefits of Heightened Benefits of Heightened Information SecurityInformation Security Secure information and well-managed Secure information and well-managed
data prevent a loss of faith in the data prevent a loss of faith in the universityuniversity
Every precaution we take individually Every precaution we take individually improves the overall security of the entire improves the overall security of the entire campuscampus
Awareness of the issue makes us more Awareness of the issue makes us more secure and savvy users secure and savvy users
VSU
The Not-So-Distant The Not-So-Distant Future of Information Future of Information SecuritySecurity There is no single solution that protects There is no single solution that protects
against all threatsagainst all threats A layered defense is the best approach: A layered defense is the best approach:
one solution for each threatone solution for each threat Campus constituents must realize the Campus constituents must realize the
need for and be educated to use each need for and be educated to use each new layer of defense as it is added or new layer of defense as it is added or updatedupdated
VSU
BloggingBlogging
VSU
A Blog Is…A Blog Is… A weblog or online journal commonly A weblog or online journal commonly
used to express personal, political, or used to express personal, political, or scholarly opinionscholarly opinion
Blogs are becoming increasing popular Blogs are becoming increasing popular among college students, faculty, and among college students, faculty, and admissions officeadmissions office
VSU
Blogging Example:Blogging Example:
VSU
Why Blogging is Why Blogging is Important to UnderstandImportant to Understand
Blogs have become infused in the work of the campusBlogs have become infused in the work of the campus Diverse users and uses on campusDiverse users and uses on campus
StudentsStudents Using blogs to communicate and networkUsing blogs to communicate and network
FacultyFaculty Utilizing blogs for scholarly debate and publishingUtilizing blogs for scholarly debate and publishing Integrating blog use into student assignmentsIntegrating blog use into student assignments
College admissions officesCollege admissions offices Current students posting blogs to reveal student life on campusCurrent students posting blogs to reveal student life on campus Prospective and current students communicating through blogsProspective and current students communicating through blogs
VSU
Diverse Users and Uses Diverse Users and Uses of Blogs: Studentsof Blogs: Students
Sites like Xanga, Angelfire, Blogspot enable Sites like Xanga, Angelfire, Blogspot enable students to create blogsstudents to create blogs Blogs are personal or shared, private or publicBlogs are personal or shared, private or public Students comment on one another’s blogsStudents comment on one another’s blogs Blog topics include anything and everythingBlog topics include anything and everything
Students use blogging as a way to journal and Students use blogging as a way to journal and connect to their peersconnect to their peers
Social networking websites like Facebook and Social networking websites like Facebook and MySpace have blog-like features called “Walls”MySpace have blog-like features called “Walls”
VSU
Blogs and Students: Blogs and Students: Social NetworkingSocial Networking
BenefitsBenefits Facilitates communication between students, leading to the Facilitates communication between students, leading to the
important development of mature interpersonal relationships important development of mature interpersonal relationships (Chickering & Reisser, 1993)(Chickering & Reisser, 1993)
Creates venue for open expression, dialogue, and Creates venue for open expression, dialogue, and “developmental friction”“developmental friction”
DrawbacksDrawbacks Potential distraction from more educational endeavorsPotential distraction from more educational endeavors Public blogs can be read by anyone; poses safety threatPublic blogs can be read by anyone; poses safety threat Students unaware of what speech is and is not protected Students unaware of what speech is and is not protected
under First Amendmentunder First Amendment
VSU
Diverse Users and Uses Diverse Users and Uses of Blogs: Facultyof Blogs: Faculty Professors use the “blogosphere” as Professors use the “blogosphere” as
venue to post scholarly blogs, debate venue to post scholarly blogs, debate and exchange ideasand exchange ideas
Faculty incorporate blogs into Faculty incorporate blogs into coursework for studentscoursework for students
VSU
Blogs and Faculty:Blogs and Faculty:Scholarly BlogsScholarly Blogs BenefitsBenefits
Serve as instantaneous publishing opportunitiesServe as instantaneous publishing opportunities Create connection between professors and wide public Create connection between professors and wide public
audienceaudience Expedite academic discourse that could take years through Expedite academic discourse that could take years through
other mediaother media Provide faculty a venue to establish reputation in disciplineProvide faculty a venue to establish reputation in discipline
DrawbacksDrawbacks Blogs viewed by many as superfluous and inappropriate for Blogs viewed by many as superfluous and inappropriate for
academic workacademic work Content can have negative impact on non-tenured faculty Content can have negative impact on non-tenured faculty
or individuals seeking employmentor individuals seeking employment
VSU
Blogs and Faculty: Blogs and Faculty: Incorporating Blogs Incorporating Blogs into Courseworkinto Coursework BenefitsBenefits
Familiar medium available to many studentsFamiliar medium available to many students Introverted students comfortable with asynchronous nature of Introverted students comfortable with asynchronous nature of
blogs and become invested in education, thereby improving their blogs and become invested in education, thereby improving their experiences (Astin, 1984)experiences (Astin, 1984)
Professors have easy access to submitted workProfessors have easy access to submitted work Convenient forum for student interaction and out-of-class Convenient forum for student interaction and out-of-class
discussiondiscussion DrawbacksDrawbacks
Access to and fluency with blogs is not universal among college Access to and fluency with blogs is not universal among college studentsstudents
Blogs do not help writers interact (Krause, 2005)Blogs do not help writers interact (Krause, 2005) Blogs not conducive for editing process (Krause, 2005)Blogs not conducive for editing process (Krause, 2005)
VSU
Diverse Users and Uses Diverse Users and Uses of Blogs: Admissions of Blogs: Admissions OfficesOffices Admissions offices recruit current Admissions offices recruit current
students to post blogs that reflect life on students to post blogs that reflect life on campus, targeting prospective studentscampus, targeting prospective students
Prospective and current students Prospective and current students communicate through blogscommunicate through blogs
VSU
Blogs and College Blogs and College Admissions: RecruitmentAdmissions: Recruitment BenefitsBenefits
Accessible and comfortable arena for Accessible and comfortable arena for many college-goersmany college-goers
Cost-effective recruitment toolCost-effective recruitment tool Forum for open exchange regarding all Forum for open exchange regarding all
aspects of student experienceaspects of student experience DrawbacksDrawbacks
Administrators lose control of often Administrators lose control of often uncensored message being conveyed to uncensored message being conveyed to prospective studentsprospective students
VSU
The Not-So-Distant The Not-So-Distant Future of BloggingFuture of Blogging Enhanced role of blogs in instructionEnhanced role of blogs in instruction Increases in e-recruitmentIncreases in e-recruitment Expanded definition of “blog”Expanded definition of “blog”
Audio blogsAudio blogs Photo blogsPhoto blogs Video blogsVideo blogs
VSU
The Digital DivideThe Digital Divide
VSU
The Digital Divide Is…The Digital Divide Is… Harvard University Political Scientist Pippa Harvard University Political Scientist Pippa
Norris (2001) describes three main Norris (2001) describes three main components of the digital divide:components of the digital divide: The global divide between the countries with The global divide between the countries with
commonplace Internet access and those without commonplace Internet access and those without The social divide in each country of those with The social divide in each country of those with
access and those without itaccess and those without it The democratic divide between those who use The democratic divide between those who use
technology to participate in public life and those technology to participate in public life and those who do notwho do not
VSU
The Digital Divide Is…The Digital Divide Is…
Michael Bugeja adds a fourth component, Michael Bugeja adds a fourth component, an “interpersonal dividean “interpersonal divide”” that “concerns the that “concerns the social gap that develops when individuals social gap that develops when individuals misperceive reality because of media misperceive reality because of media overconsumption and misinterpret others overconsumption and misinterpret others because of technology overuse.” because of technology overuse.” (2005, p. 6)(2005, p. 6)
VSU
Why Digital Divide Is Why Digital Divide Is Important to UnderstandImportant to Understand Students without computers lack Students without computers lack
convenient access to a growing number convenient access to a growing number of of blended coursesblended courses (featuring an online (featuring an online component) and online university component) and online university systems (registration, finances, etc.) systems (registration, finances, etc.)
Without access to social networking Web Without access to social networking Web sites and cellular phones, students may sites and cellular phones, students may have difficulty generating social capital have difficulty generating social capital and connecting to their peersand connecting to their peers
VSU
Implications for A Implications for A Socially Just Educational Socially Just Educational ClimateClimate Emerging educational technologies enhance Emerging educational technologies enhance
learning opportunities for many students, while learning opportunities for many students, while widening the gap for traditionally widening the gap for traditionally underrepresented groups:underrepresented groups:
Van Dusen elaborates:Van Dusen elaborates:There is a more ominous consequence of these There is a more ominous consequence of these new education opportunities. [They present] a new new education opportunities. [They present] a new set of barriers for the traditionally underrepresented set of barriers for the traditionally underrepresented in higher education because computers are less in higher education because computers are less likely to be in the schools and homes of low-income likely to be in the schools and homes of low-income familiesfamilies (2000, p. 11). (2000, p. 11).
VSU
Potential Barriers to Potential Barriers to AccessAccess Age Age IncomeIncome GenderGender Lack of computer and Lack of computer and
technology trainingtechnology training
Household typeHousehold type Physical disabilitiesPhysical disabilities Learning disabilitiesLearning disabilities Geography and access Geography and access
to the internetto the internet
These barriers not only impact student success in These barriers not only impact student success in traditional learning environments but also limit the traditional learning environments but also limit the
access of these groups to the online classroom and access of these groups to the online classroom and its associated virtual communities. its associated virtual communities.
(Van Dusen, 2000, Novak & Hoffman, 1998 )(Van Dusen, 2000, Novak & Hoffman, 1998 )
VSU
Bridging the Divide: Bridging the Divide: Suggestions for VSUSuggestions for VSU
Ensure faculty awareness of the implications of Ensure faculty awareness of the implications of limited technological access for their studentslimited technological access for their students
Extend hours for campus computer labsExtend hours for campus computer labs Offer sections featuring both blended and Offer sections featuring both blended and
traditional instructional methods for all required traditional instructional methods for all required university coursesuniversity courses
Include optional training on Web-based Include optional training on Web-based university systems during New & Transfer university systems during New & Transfer Student OrientationStudent Orientation
VSU
Next StepsNext Steps
VSU
What Can You Do?What Can You Do? Contact us to present to your departmentContact us to present to your department Attend workshops sponsored by the IT Attend workshops sponsored by the IT
departmentdepartment Stay up-to-date on emerging trends: Stay up-to-date on emerging trends:
Talk to studentsTalk to students Consult literatureConsult literature Experiment with new technologiesExperiment with new technologies
VSU
Works CitedWorks Cited Astin, A. W. (1984). Student involvement: A developmental theory for higher education. Astin, A. W. (1984). Student involvement: A developmental theory for higher education. Journal Journal
of College Student Personnel, 25, of College Student Personnel, 25, 297-308.297-308. Bugeja, M. (2005). Bugeja, M. (2005). Interpersonal divide: The search for community in a technological age. Interpersonal divide: The search for community in a technological age. New New
York: Oxford University Press.York: Oxford University Press. Carnevale, D. (2006, October 6). E-mail is for old people. The Chronicle of Higher Education Carnevale, D. (2006, October 6). E-mail is for old people. The Chronicle of Higher Education
[Online version]. Retrieved February 17, 2007 from http://chronicle.com/[Online version]. Retrieved February 17, 2007 from http://chronicle.com/ Chickering, A. W., & Reisser, L. (1993). Chickering, A. W., & Reisser, L. (1993). Education and identity Education and identity (2nd ed.). San Francisco: (2nd ed.). San Francisco:
Jossey-Bass.Jossey-Bass. Curtis, P. (2005, April 15). Pupils use mobile phones to cheat on exams. The Guardian Curtis, P. (2005, April 15). Pupils use mobile phones to cheat on exams. The Guardian
Unlimited. Retrieved February 15, 2007 from http://education.guardian.co.uk/Unlimited. Retrieved February 15, 2007 from http://education.guardian.co.uk/ Delfiner, R. (2007, February 9). Tech stalking: Teen epidemic. Delfiner, R. (2007, February 9). Tech stalking: Teen epidemic. The New York Post. The New York Post. Retrieved Retrieved
February 15, 2007 from http://www.nypost.comFebruary 15, 2007 from http://www.nypost.com Krause, S. D. (2005, June 24). Blogs as a tool for teaching. Krause, S. D. (2005, June 24). Blogs as a tool for teaching. The Chronicle of Higher Education.The Chronicle of Higher Education. Norris, P. (2001). Norris, P. (2001). Digital divide. Digital divide. Cambridge, England: Cambridge University Press. Cambridge, England: Cambridge University Press. Novak, T. P. & Hoffman, D.L. (1998). Novak, T. P. & Hoffman, D.L. (1998). Bridging the digital divide: The impact of race on Bridging the digital divide: The impact of race on
computer access and internet use.computer access and internet use. Retrieved November 17, 2005 from Retrieved November 17, 2005 from http://elab.vanderbilt.edu/research_papers.htmhttp://elab.vanderbilt.edu/research_papers.htm
Student Monitor. Retrieved February 16, 2007 from http://www.studentmonitor.com/Student Monitor. Retrieved February 16, 2007 from http://www.studentmonitor.com/ Text Messaging (Definition). P.C. Magazine Online. Retrieved February 16, 2007 from Text Messaging (Definition). P.C. Magazine Online. Retrieved February 16, 2007 from
http://www.pcmag.com/http://www.pcmag.com/ Van Dusen, G.C. (2000). Digital dilemma: Issues of access, cost, and quality in media Van Dusen, G.C. (2000). Digital dilemma: Issues of access, cost, and quality in media
enhanced and distance education. enhanced and distance education. ASHE-ERIC Higher Education Report 27ASHE-ERIC Higher Education Report 27(5). Retrieved (5). Retrieved November 2, 2005, from ERICNovember 2, 2005, from ERIC
Wired News. Wired News. Students Called on SMS CheatingStudents Called on SMS Cheating . Retrieved February 16, 2007, from . Retrieved February 16, 2007, from http://www.wired.com/news/school/0,1383,57484,00.htmlhttp://www.wired.com/news/school/0,1383,57484,00.html