skip to main content
research-article

Strategies and Challenges to Facilitate Situated Learning in Virtual Worlds Post-Second Life

Authors Info & Claims
Published:01 March 2017Publication History
Skip Abstract Section

Abstract

Virtual worlds can establish a stimulating environment to support a situated learning approach in which students simulate a task within a safe environment. While in previous years Second Life played a major role in providing such a virtual environment, there are now more and more alternative—often OpenSim-based—solutions deployed within the educational community. By drawing parallels to social networks, we discuss two aspects: how to link individually hosted virtual worlds together in order to implement context for immersion and how to identify and avoid “fake” avatars so people behind these avatars can be held accountable for their actions.

References

  1. A. Bielenberg, L. Helm, A. Gentilucci, D. Stefanescu, and H. Zhang. 2012. The growth of diaspora - A decentralized online social network in the wild. In Proceedings of the 2012 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 13--18.Google ScholarGoogle Scholar
  2. D. Bowman and R. McMahan. 2007. Virtual reality: How much immersion is enough? IEEE Comput. 40, 7, 2007, 36--43. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. S. Buchegger, D. Schióberg, L. H. Yu, and A. Datta. 2009. Peerson: P2p social networking-early experiences and insights. In Proceedings of the 2nd ACM Workshop on Social Network Systems. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. D. Carr and M. Oliver. 2009. Second life, immersion and learning. In Social Computing and Virtual Communities. Chapman and Hall. Taylor & Francis, London, 250--219.Google ScholarGoogle Scholar
  5. A. Charles. 2012. Interactivity: New Media, Politics and Society. Peter Lang Ltd., 2012.Google ScholarGoogle ScholarCross RefCross Ref
  6. A. Christopulos and M. Conrad. 2012. Views of 2nd European Immersive Education Summit, Educators on Immersion in Virtual Worlds from Second Life to OpenSim. Paris, France.Google ScholarGoogle Scholar
  7. M. Conrad. 2011a. Teaching project management in second life. In Multi-User Virtual Environments for the Classroom: Practical Approaches to Teaching in Virtual Worlds, G. Vincenti and J. Braman (Eds.). IGI Global, 2011.Google ScholarGoogle Scholar
  8. M. Conrad. 2011b. Leaving the lindens: Teaching in virtual worlds of other providers. In Proceedings of Researching Learning in Immersive Virtual Environments (ReLIVE).Google ScholarGoogle Scholar
  9. M. Conrad, A. Charles, and J. Neale. 2011. What is my Avatar? -- Who is my avatar? The avatar as a device to achieve a goal: Perceptions and implications. In Reinventing Ourselves: Contemporary Concepts of Identity in Virtual Worlds, A. Peachy and M. Childs (Eds.). Springer, UK, 2011.Google ScholarGoogle Scholar
  10. M. Conrad, D. Pike, P. Sant, and C. Nwafor. 2009. Teaching large student cohorts in second life. In International Conference on Computer Supported Education 2009, J. Cordeiro, B. Shishkov, A. Verbraeck, and M. Helfert (Ed.). INSTICC Press, Lisbon, Portugal, 1, 11--18.Google ScholarGoogle Scholar
  11. A. Cox, P. Cairns, N. Berthouze, and C. Jennett. 2006. The use of eyetracking for measuring immersion. In Proceedings of the CogSci Workshop: What Have Eye Movements Told Us So Far and What Is Next?Google ScholarGoogle Scholar
  12. C. Dwyer, S. R. Hiltz, and K. Passerini. 2007.Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace. In Proceedings of the 13th Americas Conference on Information Systems, Colorado.Google ScholarGoogle Scholar
  13. Facebook. 2012. Disabled Fake Name. Retrieved May 11, 2012 from http://www.facebook.com/help/249092175207621.Google ScholarGoogle Scholar
  14. M. Fischer, T. J. Purtell, R. Chur, and M. S. Lam. 2010. Mr. Privacy: Open and federated social networking using email. In Tech Report, 2010.Google ScholarGoogle Scholar
  15. D. Gross. 2012. Survey: 1 in 4 users lie on Facebook. Retrieved May 11, 2012 from http://edition.cnn.com/2012/05/04/tech/social-media/facebook-lies-privacy/index.html.Google ScholarGoogle Scholar
  16. J. Herrington and R. Oliver. 2000. An instructional design framework for authentic learning environments. Educ. Technol. Res. Dev. 48, 3, 23--48.Google ScholarGoogle ScholarCross RefCross Ref
  17. H. Jaakkola, P. Linna, J. Henno, and J. Makela. 2011. (Social) networking is coming—are we ready? 2011 Proceedings of the 34th International Convention (MIPRO'11), 1133--1139.Google ScholarGoogle Scholar
  18. A. Kanamgotov, A. Christopoulos, M. Conrad, and S. Prakoonwit. 2012. Immersion in Virtual Worlds—but not Second Life! In Proceedings of the IEEE Cyberworlds Conference. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. B. Krishnamurthy and C. Wills. 2009. On the leakage of personally identifiable information via online social networks. In Proceedings of the 2nd ACM SIGCOMM Workshop on Online Social Networks, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. G. Kontaxis, I. Polakis, S. Ioannidis, and E. P. Markatos. 2011. Detecting social network profile cloning. In Proceedings of the 3rd International Workshop on Security and Social Networking.Google ScholarGoogle Scholar
  21. D. Lee, M. Lim, and S. Han. 2002. ATLAS: A scalable network framework for distributed virtual environments. In Proceedings of the 4th International Conference on Collaborative Virtual Environments. ACM, New York, NY, 47--54. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. S. McCloud. 1994. Understanding Comics. HarperCollins.Google ScholarGoogle Scholar
  23. Medical News Today. 2008. ‘Facebook Generation’ Faces Identity Crisis. Retrieved November 27, 2011 from http://www.medicalnewstoday.com/releases/113878.php.Google ScholarGoogle Scholar
  24. E. Moore, T. T. Utschig, K. A. Haas, B. Klein, P. D. Yoder, Y. Ying Zhang, and M. H. Hayes. 2008. Tablet PC technology for the enhancement of synchronous distributed education. IEEE Trans. Learn. Technol. 1, 2 (Apr.-Jun.), 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. G. O'Donovan. 2012. The Girl Who Became Three Boys. Retrieved August 30, 2012 from http://www.telegraph.co.uk/culture/tvandradio/tv-and-radio-reviews/9459791/The-Girl-Who-Became-Three-Boys-Channel-4-review.html.Google ScholarGoogle Scholar
  26. A. Orita and H. Hada. 2009. Is that really you?: An approach to assure identity without revealing real name online. In Proceedings of the 5th ACM Workshop on Digital Identity Management. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. R. Pausch, D. Proffitt, and G. Williams. 1997. Quantifying Immersion in virtual reality. Proceedings of the 24th Annual Conference on Computer Graphics and Interactive Techniques (SIGGRAPH'97). Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. PMI. 2008. A Guide to the Project Management Body of Knowledge (PMBOK® Guide). Project Management Institute.Google ScholarGoogle Scholar
  29. S. Seong, J. Seo, M. Nasielski, D. Sngupta, S. Hangal, S. K. Teh, R. Chu, B. Dodson, and M. S. Lam. 2010. PrPl: A decentralized social networking infrastructure. In Proceedings of the 1st ACM Workshop on Mobile Cloud Computing & Services: Social Networks and Beyond ACM, New York, NY. 8, 1--8, 8 Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Yahoo Finance. 2012. Number of Active Users at Facebook Over the Years. Retrieve May 11, 2012 from http://finance.yahoo.com/news/number-active-users-facebook-over-years-214600186--finance.html.Google ScholarGoogle Scholar
  31. C. A. Yeunug, I. Liccard, K. Lu, O. Senevirante, and T. Berners-Lee. 2009. Decentralization: The future of online social networking. In Proceedingso f the W3C Workshop.Google ScholarGoogle Scholar

Index Terms

  1. Strategies and Challenges to Facilitate Situated Learning in Virtual Worlds Post-Second Life

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image Computers in Entertainment
        Computers in Entertainment   Volume 15, Issue 1
        Theoretical and Practical Computer Applications in Entertainment
        Spring 2017
        92 pages
        EISSN:1544-3574
        DOI:10.1145/3026723
        Issue’s Table of Contents

        Copyright © 2017 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 1 March 2017
        • Accepted: 1 October 2016
        • Revised: 1 February 2013
        • Received: 1 December 2012

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format .

      View HTML Format