The Arachnet Electronic Journal on Virtual Culture
__________________________________________________________________
ISSN 1068-5723 July 26, 1994 Volume 2 Issue 3
CUNNINGH V2N3
Guidelines for an introduction to networking: a review of the
literature
Sally Jo Cunningham
Dept. of Computer Science
University of Waikato
Hamilton, New Zealand
sallyjo@waikato.ac.nz
Abstract:
The Internet offers a wide variety of forums for exchanging
information, forming professional associations, gathering
information, and socializing. Its base of active users,
however, does not include an equal proportion of men and
women--despite the meteoric spread of Internet access
beyond its original, predominantly male domain. Studies
have noted that many women feel uncomfortable with
experimenting on a computer or "playing" with new
software. A formal course or training session may give these
women the support and guidance they need to explore the
capabilities of the Internet. This paper reviews the
literature in computer science education, scholarly virtual
communities, and bibliographic instruction to determine the
desirable characteristics of such a course. Research indicates
that an introduction to the Internet should: use software
that encourages exploration; stress practical applications of
the Internet in the students' interest areas; ensure equal
access to hardware and a non-sexist learning environment;
contain explicit instruction in Internet communication styles;
and provide support for collaborative work and peer group
formation.
1. Introduction
[1] The Internet and assorted commercial networks have
made available a number of resources for research and
professional support. The primary resources include:
--electronic mail (email): Email provides a fast, efficient, and
low-cost means for maintaining connections between pairs of
users.
--group communications: There are two common
mechanisms for supporting distribution of messages between
members of a formal or informally defined group: bulletin
boards such as the Usenet News, and email-based discussion
groups (also known as mailing lists and listservs).
--publicly available archives: A wide variety of text files,
programs, databases, images, videos, and sound files are
freely retrievable by ftp.
[2] Despite the tremendous growth of the Internet in recent
years, however, the population of Internet users has
continued to contain a larger proportion of men than women
(Cunningham, 1993). This gender gap has tremendous
implications for the educational and career opportunities of
women, particularly as the use of networked resources and
communication technology moves from its traditional
domain--engineering and the sciences--to enrich a wide
variety of fields, including the humanities and social
sciences.
[3] This paper is an attempt to ground instruction in using
the Internet for professional communication and resource
location by examining the characteristics needed to make
such a course accessible and attractive to female students, as
well as to males. The literature in three research areas was
examined: the extensive body of work on gender and
computer science education; research on scholarly
communities, particularly the ways that computer-mediated
communication is altering the traditional "invisible colleges";
and studies of gender and bibliographic instruction for online
information services. A number of other areas may also be
pertinent to course development: for example, human-
computer interaction, computer-mediated collaborative
work, and sociolinguistic discourse analysis. These additional
areas may offer insights to further refine the desired
structure of a course on effective Internet use.
2. Lessons from computer science education research
[4] As computing technology increasingly permeates
education and employment, researchers have documented a
widening gap between the experiences of men and women
with that technology . Studies in the US (Frenkel, 1990),
Western Europe (UNESCO, 1990), Canada (Industry, etc.,
1990), and Australia (Kay, 1986; Porter, 1983) are consistent
in reporting that at the tertiary level women account for
only one-quarter to one-third of computer science students,
and that in general these numbers are at best holding
steady, and at worst, declining. In most applications of
computing that have been studied--including for recreation,
education, and professional use--men predominate.
[5] Given these statistics, it is not surprising that the causes
for the poor representation of women in computing has been
extensively studied, and that a number of works address the
problem of tailoring computer science courses to make the
subject area more attractive to women. While no such
studies are specific to a course on Internet use, the following
recommendations have been gleaned from this literature:
* provide support for exploration and experimentation *
[6] In general, males are more assertive when using
computers: they are more comfortable using computers in
unstructured situations (Kiesler, 1985), more persistent in
attempting to learn new technology, and are more willing to
risk failure in experimenting with software (Cardman, 1990).
This low comfort level with computing and with
experimentation has serious implications for a course on
Internet use, since searching and experimentation with
located resources are an integral part of the curricula.
Course assignments can alleviate some of the discomfort
women feel with "playing" with software by making that
play part of the expectation; i.e., by crafting assignments that
involve all or most of the software's capabilities, or by
explicitly asking the students to experiment with the
software.
* use appropriate software *
[7] Software that is difficult to use discourages novice users
or users with a low comfort level for computers, and women
tend to fall into one or both of those groups (Collis, 1985;
Frenkel, 1990). Menu-driven software or point-and-click
interfaces may alleviate this problem, as they can be
mastered more quickly than software requiring the
memorization of commands and control-key sequences.
[8] Fortunately, a number of user-friendly Internet
resources have been made available in the past few years:
for example, Fetch for managing file transfer, Gopher and
Veronica for locating online resources, Nuntius for reading
the Usenet News, and Eudora for sending and receiving
electronic mail. These programs (and others like them)
have gone beyond the old-style command-line interface to
provide menus of options, multiple windows for interactions,
more easily readable displays of results, etc. Furthermore,
they intelligently handle the mechanics of Internet access
and file manipulation for the user: for example, Fetch can
automatically detect the type of compression used on
retrieved files, and will choose the appropriate
decompression tool for the user; Veronica allows users to
simply specify a search term, and the software then handles
the messy process of ftp-ing to search indexes, using them to
locate the desired online resources, and then ftp-ing the
located files; and Gopher lets the user browse Internet sites
without having to worry about IP addresses, domain names,
and connection protocols.
[9] (Note: these particular programs are publicly available at the
following sites: Fetch is at ftp.dartmouth.edu:/pub/mac;
Gopher available from boombox.micro.umn.edu:
/pub/gopher/Macintosh-TurboGopher; Veronica is accessed
through Gopher services; Nuntius is at
sumex-aim.stanford.edu/info-mac/comm/nuntius-113.hqx;
Eudora is at ftp.qualcomm.com/quest/mac/eudora. Other
network access software exists, and indeed more is being
released regularly.)
[10] On the other hand, care must be taken to ensure that
user-friendly software is as powerful as the alternatives;
Cardman (1990) reports that students choosing the menu-
driven online catalogue system at the University of Illinois
(Urbana-Champagne) are disadvantaged, as they cannot
perform subject searching as thoroughly as is possible on the
corresponding command-line interface catalogue.
* avoid gendered language and course materials *
[11] The association of computers with men and masculinity
is reflected in the jargon that has grown up around the field
(i.e., the "man-month") and in the popular media. For
example, Ware and Stuck (1985) report that in mass market
computer magazines, men appear in illustrations nearly
twice as often as women, and that women were most likely
to be portrayed as sex objects or clerical workers. Further,
men are featured overwhelmingly in active roles, and
women are shown in in passive or actively anti-computer
roles. Introductory computing texts often share this bias;
women are commonly depicted as handling low-level
input/output devices, while men are more likely to be shown
as supervisors, analysts, or "experts" of some type (EOC,
1983). Given the alienation that many women bring to a
computing course, stereotypic portrayals and sexist language
can hardly help the situation (Schau, 1984).
[12] The two commonly used metaphors for network use,
"surfing the Internet" and "cruising the information
highway", are potentially neuter but can also easily be
assigned macho overtones. Lectures and course materials
should avoid emphasizing the stereotypically masculine
aspects of these phrases.
* ensure equitable access to hardware *
[13] Female students tend to be less aggressive than males
in obtaining and retaining computer time; in a first-come
first-served computer lab, the male students are likely to
shoulder aside the female students (Frenkel, 1990). One
strategy to address this problem is to use sign-up sheets to
allocate computing resources, and to enforce time limits for
each work session. Another commonly reported problem is
that safety concerns make many female students reluctant to
use computing labs after dark. Solutions include installing
computers in dormitories, subsidizing home computer
purchases for students, and installing a generous number of
dial-up lines for university computers.
3. Building scholarly communities through electronic
communication
[14] "Invisible colleges" are informal scholarly communities
whose members may be widely scattered geographically.
These communities are united by exploration of a shared
problem domain, and form a power group that may influence
the distribution of prestige in a field and control the general
strategy of research in that area . In the past, their
communication with each other was marked by the exchange
of scholarly correspondence (including pre-prints and
reviews), telephone calls, gatherings at conferences, and
informal meetings between researchers sharing a particular
interest The mark of belonging in an invisible college is to
have personal contact with members of the college, generally
face-to-face (Price, 1961 and 1966).
[15] The composition and communication patterns of the
invisible colleges are being dramatically changed by the
increasing use of electronic communication in the form of
email, bulletin boards, and discussion lists. There is evidence
that as electronic communication is introduced into an
invisible college, the composition of the college tends to shift
to include more former non-members who are "on the net",
and to delete former members who can only be reached by
postal ("snail") mail or the telephone (Lincoln, 1992). These
electronic communities have greatly increased the pace of
academic research and the extent of inter-institutional
collaboration (Wilson, 1992).
[16] At the same time, the computer-mediated colleges are
marked by a more democratic communication pattern.
These computer-based communities are less hierarchical and
rigid than the old invisible colleges, and can both develop
and disappear more quickly. Junior scholars have much
greater direct access to senior researchers, as email exchange
between the two groups is much more common and accepted
than telephone contact has been in the past. Discussion lists
and bulletin boards also permit junior researchers to acquire
a scholarly identity and reputation more quickly than was
possible when the primary medium of written exchange was
journal pre-prints and technical reports. The shorter
messages and more rapid, "conversational" exchange of the
bulletin board or discussion list may give junior researchers
an opportunity to participate in the development of their
discipline (Lincoln, 1992).
[17] Given the increasing importance of these electronic
communities to building a professional career, it is important
that students be made aware of both the opportunities and
problems that electronic communication poses:
* give instruction in online interaction styles *
[18] Internet communication is governed by "netiquette"--
the expected manners to be observed by users. Novice users
feel more comfortable in their initial attempts to use email
or post if they understand these expectations. For example,
the excessive use of capital letters makes a message difficult
to read, and may be misinterpreted as "shouting". Similarly,
messages containing sarcasm, irony, or self-deprecating
humor are easily misinterpreted, given the lack of
facial/body cues and vocal intonation. To avoid
unintentional rudeness, special symbols called "smileys" or
"emoticons" are used to signal the appropriate emotional
content.
[19] On a more subtle level, the user's personal pattern of
discourse can have a significant impact on his/her
participation in computer-mediated communication. Not
surprisingly, gendered communication styles identified in
face-to-face conversations are carried over into written,
computer-aided conversations. Herring (1992) distinguishes
two common discourse patterns: adversarial, adopted rarely
by women, and attenuated/personal, commonly used by
women. The adversarial style is "characterized by strong
assertions, imperatives, exclusive use of [first person plural]
pronouns, and an overall tendency to promote oneself while
belittling one's conversational 'adversary'". In contrast, the
attenuated/personal style "combines features of attenuation-
-hedges, qualification, apologies--with an emphasis on
personal aspects of the communication" (Herring, 1992, p. 7).
Not surprisingly, adversarial (predominantly male)
conversants dominated the discussion studied by Herring.
[20] Herring notes that women are much less likely to
contribute to adversarial exchanges, and that this aversion
inhibits their ability to participate in activities that might
benefit them professionally (the most vocal contributors to
the discussion she studied were later invited to collaborate
on a book). It is problematic, to say the least, that the
alternative to avoidance appears to be adoption of the
(masculine) adversarial conversational style.
[21] Students should be made aware of these styles, of how
communication style can affect the audience's reception of a
message, and the professional implications of adopting one or
the other. To avoid disadvantaging students using the
attenuated/personal style, students should be introduced
first to those portions of the Internet that are least
adversarial. For example, moderated discussion groups tend
to "flame" less than the unmoderated, and BITNET groups
tend to enforce a greater degree of civility (Hardy, 1993).
* provide support for collaborative work *
[22] There is some evidence that female students prefer
collaborative learning environments, where cooperative
group interactions are encouraged and a sense of connection
between learners is fostered (Hawkins, 1985; Lewis, 1987;
Kleifgen, 1989). A teaching strategy that capitalizes on this
preference while avoiding some of the problems discussed
above in introducing students to existing "electronic colleges"
is to structure assignments around building an open, non-
adversarial discussion group specific to the course.. This
option is explored by Fey (1992), in the context of a
computer conference for collaborative writing. She reports
that male students as well as female felt themselves
advantaged by the feelings of connection between the class
members, and by the opportunity to explore ideas without
fear of non-constructive criticism or ridicule. Students also
felt that participation in discussion was more democratic
than it would have been in a physical classroom, with
everyone contributing rather than having the discussion
dominated by a few people.
* encourage students to join inter-institutional peer groups *
[23] Women are still a minority in some of the groups that
have Internet access. Enabling inter-institutional contact
between these women can help them feel less isolated in
their fields and give them a sense of community they may
be lacking. As an example, one successful group for women
in computer science, SYSTERS, has provided a forum for
women-centered discussion, networking, and mentoring
since 1987. The members of SYSTERS report that the
discussion group prevents them from feeling that they are
alone in experiencing the problems they face (Frenkel,
1990). A wide variety of peer groups are available on the
Net, including groups centered along gender and cultural
lines, by profession, and by personal interest.
4. From bibliographic instruction to online resources
[24] The under-representation of women in computing has
been linked to pre-existing attitudes toward science and
mathematics--subjects with which computing is often
associated. That girls are socialized to avoid mathematics
and science, and to have less positive attitudes toward these
subjects than boys, has been extensively documented (see,
for example, Collis, 1987; Eddowes, 1983; Erickson, 1984;
Crowley, 1988). The perceived similarity of computing to
these subjects is reinforced by the introduction of computing
studies in the context of science and math in the secondary
schools (often taught by science or math teachers), and by
the fact that computing departments in tertiary institutions
have frequently grown out of mathematics departments.
This association with predominantly masculine fields may
compound computer anxiety in female students (Crowley,
1988). This situation is particularly ironic given that the
professional use of computers often has little relation to
either science or mathematics (Hawkins, 1985).
[25] Countering this trend is evidence that when *tool* uses
of computers are emphasized, student attitudes toward
computing do not show the same gender differences Online
information searching seems to have the potential to be
particularly effective in this regard. While no studies exist
specifically examining Internet searching, there is a body of
related work studying the effects of gender on achievement
and attitudes in other types of information gathering.
[26] Early work with consumer reactions to teletext (Elton,
1982) showed that female customers used home teletext
systems as often as males, though females spent less time
than males on public systems. Studies of online library
catalogs indicate that students using the catalogs associate
their activity more with research and information processing
than with computing, and the female students experience a
reduction in their computer anxiety levels. In addition, both
sexes showed a reduction in gender role association with
computers (Eastman, 1987; Jacobson, 1991). Libraries
appear to offer a "friendly" atmosphere to females (as
opposed to the "library anxiety" often noted in males), and
female students are more likely to use computers located in
the library than those in other locations (Jacobson, 1991;
Clark, 1989). On the other hand, the negativity female
students associate with computers may spill over into
computer-mediated activities such as online searching of
library resources (Jacobson, 1991)
[27] In the workplace, studies of library staff suggest that
computer anxiety is controlled by positive impetus to
computer use, such as the awareness that computers are
playing an important role in libraries (Sievert, 1988;
Dakshinamurti, 1985). The strongest evidence for this point
is a study of the adoption of online patent searching software
in the US Patent and Trademarks Office (Vernon-
Gerrstenfeld, 1989). Female patent examiners were much
more likely to voluntarily adopt the new computerized
system than male examiners, proportionally more women
than men encouraged other examiners to use the system,
and the women spent more time online than the men.
[28] Studies of the differential effects of gender on use of
online bibliographic systems provide the following
recommendations for instruction in Internet searching:
* provide an immediate introduction to applications *
[29] A conclusion common to the literature on gender and
computer use is that at all ages, males are more likely to
adopt computers than females for most activities, from
education to career to recreational use (see, for example,
Lockheed, 1985; Clarke, 1989; and Firkin, 1985). However,
there is also evidence that when the *application* of
computing to a discipline is stressed, rather than
programming, that females will adopt computers at least as
quickly as males, if not sooner. Studies indicate that women
prefer to use computers as a means to an end, a tool, rather
than as a toy (Rock, 1985; Form, 1983; Hawkins, 1985;
Sanders, 1986; Frenkel, 1990). These results indicate that an
introductory course on the Internet should immediately
expose students to resources that are useful in their
coursework or career.
[30] Where initially the resources available over the
Internet were concentrated in computing, engineering, and
the "hard" sciences, now a wide range of information types--
data, text, images, video, and sound--are now included in
online sources covering the humanities and social sciences as
well. Case studies of information location and use in the
liberal arts are coming into existence, as they have been in
the sciences (see, for example, Atkinson (1990): women's
studies; Christensen (1991): music history; Cherry (1991):
legal studies). And, of course, information on topic-specific
Internet resources is available on the Internet itself: for
example, Gopher Jewels (at gopher://cwis.usc.edu/11/
Other_Gophers_and_Information_Resources/
Gophers_by_Subject//Gopher_Jewels) provides a catalog of
gopher sites by the types of information to be found in them;
and the Kovacs directory provides subject-structured
information on scholarly listservs, ejournals, discussion
groups, etc. (at gopher://gopher.kent.edu/Local Internet
Resources/Directory of Scholarly E-Conferences).
* use an appropriate level of technical detail *
[31] An introductory corse on computer-mediated
communication and online resources should concentrate
primarily on *using* the Internet, and only secondarily on
the low-level details of how computer networks are
constructed. As discussed above, a concentration on aspects
of the Internet that are immediately useful in a student's
work, and prospectively useful for a career, should prove
more attractive to female students than a lengthy discussion
of hand-shaking protocols, TCP/IP, and operating system
support mechanisms. While this point should be dictated by
common sense, it is commonly missed by introductory texts
on computer applications (see, for example, Capron 1992).
5. Conclusions
[32] This paper examines literature in the fields of computer
science education, bibliographic instruction, and scholarly
virtual communities for their implications for an
introductory course in Internet use . While a number of
analogies can be drawn from these fields, the lack of directly
applicable research points up the fact that most studies of
Internet use and electronic communities are preliminary and
conjectural, and tend to be descriptive rather than
qualitative. Many aspects of large-scale computer-aided
communication have yet to be adequately explored, and
more cases need to be examined before further
generalization is possible.
[33] The literature in computer science education suggests
that formal instruction in Internet use could encourage
greater participation in the field by women. Activities
supported by tool software, such as sending mail or
searching for information, do not share in the sex
stereotyping associated with other uses of computers such as
programming or game playing (Lockheed, 1985).
Furthermore, girls enroled in courses that stress applications
of computing such as word processing, research applications,
or information systems were more interested in taking
future computer courses than girls whose initial contacts
with "serious" computing was primarily programming
(Lockheed, 1983; Clarke, 1989). Formal instruction in the
use of online resources and communication provides an
additional forum for extending the use of computers beyond
their stereotypic applications in science and mathematics.
Since the biggest predictor to taking more computing courses
is the student's attitude toward computers, the best way to
increase participation in the field by women is to let them
discover their competence (Clarke, 1989)--a competence that
studies in gender and online library resources suggest that
female students will discover.
[34] Finally, the ability to effectively communicate via email,
bulletin boards, and discussion lists is becoming increasingly
important as the traditional "invisible colleges" are being
subsumed by electronic communities. Failure to participate
fully in these media could imply relegation to secondary
status in a field, as computing technology reconfigures the
communication patterns within a field. These issues suggest
that further quantitative studies are needed to evaluate this
technology's impact on work lives and career patterns, and
to explore its empowering or disempowering effects on
professionals in general and women in particular.
Bibliography:
Atkinson, S.D., and Hudson, J., eds. (1990): Women online:
Research in Women's Studies using online databases. New
York: The Haworth Press.
Capron, H.L. (1993): Computers : tools for an information
age. Benjamin/Cummings Pub. Co.
Cardman, Elizabeth R. (1990): "The gender gap in computer
use: Implications for bibliographic instruction", Research
Strategies 8(3), pp. 116-128.
Cherry, A.M. (1991): "A measure of CALR (computer-
assisted legal research) use by first-year law students
following mandatory training", Law Library Journal 83, pp.
73-84.
Christensen, B., and Hoekstra, G. (1991): "Being here, being
there: Understanding early music through historical
research and analysis", Research Strategy 9, pp. 106-110.
Clark, B.M., Anderson, N., Balachandran, M., Griffiths, S.,
McCandless, P., Wilson, L., and Bingham, K.H. (1989): "Gender
gap in the use of library technologies: Evidence, implications,
and intervention", Proceedings of the Fifth National
Conference of the Association of College and Research
Libraries, pp. 116-118.
Clarke, V. A, and Chambers, S. M. (1989): "Gender-based
factors in computing enrollments and achievement: Evidence
from a study of tertiary students", Journal of Educational
Computing Research 5(4), pp. 409-429.
Collis, B. (1985): "Psychosocial implications of sex differences
in attitudes toward computers: Results of a survey",
International Journal of Women's Studies 8 (May-June), pp.
207-213.
Collis, B. (1987): "Sex differences in the association between
secondary school students' attitudes toward mathematics
and toward computers", Journal for Research in Mathematics
Education 18, pp. 394-402.
Crowley, M. (1988): Women and minorities in science and
engineering. Washington, D.C.: National Science Foundation.
Cunningham, S. (1993): "Students in Cyberspace: Problems
and Pitfalls for Women in Computer Science Studies",
Proceedings of the Women's Suffrage Centennial Science
Conference , Wellington, New Zealand.
Dakshinamurti, G. (1985): "Automation's effect on library
personnel", Canadian Library Journal 42(6), pp. 343-351.
Eastman, Susan T., and Krendl, Kathy (1987): "Computers
and gender: Differential effects of electronic search on
students' achievement and attitudes", Journal of Research
and Development in Education 20(3), pp. 41-48.
Eddowes, M. (1983): Humble Pi: The mathematics education
of girls. York: Longman for School Councils.
Elton, M., and Carey, J (1982): "Computerizing information:
Consumer reactions to teletext", Journal of Communications
33, pp. 162-173.
Equal Opportunities Commission (1985): Information
Technology in Schools. Manchester: EOC.
Erickson, G.L., and Erickson, L.J. (1984): "Females and science
achievement: Evidence, explanations, and implications",
Science Education 8, pp. 162-173.
Fey, M.H. (1992): "Building community through computer
conferencing and feminist collaboration", presented at the
Computers and Writing Conference, Indianapolis, Indiana,
May, 1992.
Firkin, J., Davidson, M., and Johnson, L. (1985): Computer
culture in the classroom. Melbourne: Victorian Institute of
Secondary Education.
Form, W., and McMillen, D. (1983): "Women, men, and
machines", Work and Occupations 10, pp. 147-148.
Frenkel, Karen (1990): "Women and computing",
Communications of the ACM 33(11), pp. 34-46
Hardy, H.E. (1993): The History of the Net. Master's thesis,
Grand Valley state University, Allendale, MI. Available by
anonymous ftp from umcc.umich.edu
/pub/seraphim/doc/nethist8.txt.
Hawkins, J. (1985): "Computers and girls: Rethinking the
issues", Sex Roles 13, pp. 165-179.
Industry, Science and Technology Canada (1991): Women in
Science and Engineering, Vol. I: Universities. Ottawa:
Minister of Supply and Services.
Jacobson, F.F. (1991): "Gender differences in attitudes
toward using computers in libraries: An exploratory study",
LISR 13, pp. 267-279.
Kay, J, Collings, P., Lublin, J., Pointer, G., Prosser, M., Bishop,
R., and Watson, K. (1986): "Investigation of the status of
women at early stages of professionally accredited tertiary
computer science and data processing programmes", Dept of
Computer Science, University of Sydney.
Kiesler, S., Sproull, L., and Eccles, J.S. (1985): "Pool halls,
chips, and war games: Women in the culture of computing,"
Psychology of Women Quarterly 9, pp. 451-462.
Kleifgen, J.A. (1989): "Computers and opportunities for
literacy development", ERIC/CUE Digest No. 54 (available
from ERIC Clearinghouse on Urban Education, Teachers
College, Box 40, Columbia Univ., New York, NY 10027).
Lewis, L.H. (1987): "Females and computers: Fostering
involvement", in Women, Work, and Technology:
Transformation, ed. B.D. Wright et al. Ann Arbor, MI:
University of Michigan Press.
Lincoln, Y.S. (1992): "Virtual community and invisible
colleges: Alterations in faculty scholarly networks and
professional self-image", presented at the Annual Meeting of
the Association for the Study of Higher Education
(Minneapolis, MN).
Lockheed, M.E., Nielsen, A., and Stone, M.K. (1983): "Sex
differences in microcomputer literacy", presented at the
National Educational Computer Conference, Baltimore, MD.
Lockheed, M. (1985): "Women, girls, and computer: A first
look at the evidence", Sex Roles 13, pp. 115-121.
Porter, A.L., and Pirie, I. (1983): "In the words of the
students: A study of attrition in a first year tertiary
computing course", Proceedings of the 4th Australian
Computer Education Conference, Melbourne.
Price, D.J. De Solla (1961): Science Since Babylon. New
Haven, CT: Yale University Press.
Price, D.J. De Solla and Beaver, B. De (1966): "Collaboration in
an invisible college", American Psychologist 21(11), pp.
1011-1017.
Rock, D., Eckstrom, R., Goertz, M., Pollack, J., and Hilton, T.
(1985): A study of excellence in high school education:
Longitudinal Study, 1980-1982. Quoted in Vernon-
Gerstenfeld, 1989.
Sanders, J.S., and Stone, A. (1986): The neuter computer:
Computers for boys and girls. New York: Neal-Schuman.
Schau, C.G., and Scott, K.P. (1984): "Impact of gender
characteristics of instructional materials: An integration of
the research literature", Journal of Educational Psychology 76
(April), pp. 183-193.
Sievert, M.E., Albritton R.L., Roper, P., and Clayton, N. (1988):
"Investigating computer anxiety in an academic library",
Information Technology and Libraries 7, pp. 243-252.
UNESCO (1990): Statistical Yearbook, 1990. Paris: UNESCO.
Vernon-Gerstenfeld, Susan (1989): "Serendipity? Are there
differences in the adoption of computers? A case study", Sex
Roles 21(3/4), pp. 161-173.
Ware, M.C., and Stuck, M.F. (1985): "Sex-role messages vis-a-
vis microcomputer use: A look at the pictures," Sex Roles 13
(3/4), pp. 205-214.
Wilson, D.L. (1992): "Huge computer network quickens pace
of academic exchange and collaboration", Chronicle of Higher
Education 39(6), pp. A17-A19.
_____
Articles and Sections of this issue of the _Electronic Journal on Virtual
Culture_ may be retrieved via anonymous ftp to byrd.mu.wvnet.edu
or via e-mail message addressed to LISTSERV@KENTVM
or LISTSERV@KENTVM.KENT.EDU (instructions below)
or GOPHER gopher.cic.net
Papers may be submitted at anytime by email or send/file to:
Ermel Stepp - Editor-in-Chief, _Electronic Journal on Virtual Culture_
M034050@MARSHALL.WVNET.EDU
_________________________________
*Copyright Declaration*
Copyright of articles published by Electronic Journal on Virtual Culture
is held by the author of a given article. If an article is re-published
elsewhere it must include a statement that it was originally published
by Electronic Journal on Virtual Culture. The EJVC Editors reserve the
right to maintain permanent archival copies of all submissions and
to provide print copies to appropriate indexing services for
for indexing and microforming.
_________________________________
_________________________________
_THE ELECTRONIC JOURNAL ON VIRTUAL CULTURE_
ISSN 1068-5327
Ermel Stepp, Marshall University, Editor-in-Chief
M034050@Marshall.wvnet.edu
Diane (Di) Kovacs, Kent State University, Co-Editor
DKOVACS@Kentvm.Kent.edu
____________________________
GOPHER Instructions
____________________________
GOPHER to gopher.cic.net 70
____________________________
Anonymous FTP Instructions
____________________________
ftp byrd.mu.wvnet.edu
login anonymous
password: users' electronic address
cd /pub/ejvc
type EJVC.INDEX.FTP
get filename (where filename = exact name of file in INDEX)
quit
LISTSERV Retrieval Instructions
_______________________________
Send e-mail addressed to LISTSERV@KENTVM (Bitnet) or
LISTSERV@KENTVM.KENT.EDU
Leave the subject line empty. The message must read:
GET EJVCV2N3 CONTENTS
Use this file to identify particular articles or sections then send e-mail
to LISTSERV@KENTVM or LISTSERV@KENTVM.KENT.EDU with the command:
GET
where is the name of the article or section (e.g., author
name) and is the V#N# of that issue of EJVC