Sources


Information References

  1. Aerschot, Lina Van. Rodousakis, Niki. (December 2008). The Link Between Socio-Economic Background and Internet Use. Innovation:The European Journal of Social Sciences. Vol. 21. Issue 4, p317-351. Retrieved from ERIC database.
  2. Aidman, Amy. (October 2000). Children's Online Privacy. Educational Leadership, v58 n2 p46-47. Retrieved from ERIC database.
  3. Cooper, J. (2006). The Digital Divide: The Special Case of Gender. Journal of Computer Assisted Learning, 22(5), 320-334. Retrieved from ERIC database.
  4. Fairlie, R. & Joint Center for Poverty Research,I. (2002). Race and the Digital Divide. JCPR Working Paper. Retrieved from ERIC database.
  5. Hauck, R. (2009). Stratospheric Transparency: Perspectives on Internet Privacy. Forum on Public Policy Online, 2009. Retrieved from ERIC database.
  6. Hinson, J & Daniel, C. (2001). Connecting Across Many Divides: Digital, Racial, and Socio-Economic. Retrieved from ERIC database.
  7. Kieth, S. & Martin, M. (2005). Cyber-Bullying: Creating a Culture of Respect in a Cyber World. Reclaiming Children and Youth: The Journal of Strength-based Interventions, 13(4), 224. Retrieved from ERIC database.
  8. Measuing Fair Use: The Four Factors. (n.d.). Stanford University Libraries. 2007. Retrieved from http://fairuse.stanford.edu/Copyright_and_Fair_Use_Overview/chapter9/9-b.html
  9. Pechman, E., National Center for Education Statistics (ED), W., & And, O. (1994). Education Data Confidentiality: Two Studies. Issues in Education Data Confidentiality and Access and Compilation of Statutes, Laws, and Regulations Related to the Confidentiality of Education Data. Retrieved from ERIC database.
  10. Tarman, B. (2003). The Digital Divide in Education. Online Submission, Retrieved from ERIC database.

Image References


http://www.google.com/imgres?imgurl=http://www.auburnwa.gov/Assets/Administration/AuburnWA/Images/Twitter%2Blogo.jpg&imgrefurl=http://www.auburnwa.gov/&usg=__zyipja7aYE2UqIVCGTI40ikE_Ic=&h=256&w=256&sz=59&hl=en&start=0&zoom=1&tbnid=DsqBAhl-uLAvBM:&tbnh=149&tbnw=149&prev=/images%3Fq%3Dtwitter%2Blogo%26um%3D1%26hl%3Den%26biw%3D1003%26bih%3D596%26tbs%3Disch:1&um=1&itbs=1&iact=hc&vpx=300&vpy=235&dur=562&hovh=204&hovw=204&tx=107&ty=112&ei=MQQJTebVNc2r8Abr8tkX&oei=MQQJTebVNc2r8Abr8tkX&esq=1&page=1&ndsp=12&ved=1t:429,r:4,s:0



http://www.google.com/imgres?imgurl=http://www.softdistrict.com/wp-content/uploads/2010/01/antivirus-software-3.jpg&imgrefurl=http://www.softdistrict.com/antivirus-software/&usg=__lKS3u8_bqybFQX6VNfwO_eUcZpg=&h=251&w=250&sz=14&hl=en&start=0&zoom=1&tbnid=WLDfV4GFPLo72M:&tbnh=154&tbnw=153&prev=/images%3Fq%3Danti%2Bvirus%2Bsoftware%26um%3D1%26hl%3Den%26sa%3DN%26biw%3D1003%26bih%3D579%26tbs%3Disch:1&um=1&itbs=1&iact=hc&vpx=457&vpy=222&dur=93&hovh=200&hovw=200&tx=127&ty=66&ei=9SAJTc_mLsj24AbjkKXTDw&oei=9SAJTc_mLsj24AbjkKXTDw&esq=1&page=1&ndsp=10&ved=1t:429,r:2,s:0


http://www.google.com/imgres?imgurl=http://gguillotin.perso.worldonline.fr/Image2.gif&imgrefurl=http://gguillotin.perso.worldonline.fr/digital_divide.htm&usg=__23xH_3moEVdIeIY4h8fivPme83Q=&h=263&w=354&sz=5&hl=en&start=0&zoom=1&tbnid=B3eK4JQugAmYsM:&tbnh=155&tbnw=209&prev=/images%3Fq%3Ddigital%2Bdivide%26um%3D1%26hl%3Den%26sa%3DN%26biw%3D1259%26bih%3D848%26tbs%3Disch:1&um=1&itbs=1&iact=rc&dur=359&ei=PVkJTdrLJoGKlwf3wtC9Aw&oei=PVkJTdrLJoGKlwf3wtC9Aw&esq=1&page=1&ndsp=23&ved=1t:429,r:7,s:0&tx=123&ty=69


http://www.google.com/imgres?imgurl=http://ccevideo.files.wordpress.com/2008/01/ict10copyright.gif&imgrefurl=http://ccevideo.wordpress.com/2008/01/&usg=__dqRVECAQfu91_6jOjgJIRficX8A=&h=350&w=350&sz=15&hl=en&start=66&zoom=1&tbnid=EZv4nfNfDSYWfM:&tbnh=171&tbnw=169&prev=/images%3Fq%3Dcopyright%26um%3D1%26hl%3Den%26sa%3DN%26biw%3D1259%26bih%3D848%26tbs%3Disch:1&um=1&itbs=1&iact=rc&dur=234&ei=f14JTZyDCoOclgevoJyxAQ&oei=7l0JTba2KoKdlgfL79i3Aw&esq=3&page=4&ndsp=22&ved=1t:429,r:4,s:66&tx=88&ty=114