seconds and can virtually be entered into anywhere at anytime. The computer is no longer the sole way to access this daunting alternate universe called “cyberspace.” Today, common devices such as the cell phone, Ipod, Ipad, and e-reader are ubiquitous and can be used to gain entry to cyberspace. Portability, which is both a blessing and a curse, allows these devices to be used anywhere. When electronic devices are used at inappropriate times, such as while driving, they can be hazardous and pose
contested cyber domain delivers this powerful stimulant through the complex and interconnected physical, logical, and social layers. However, with complexity and dependency comes fragility. For the top brass, computer technology is both a blessing and a curse. Bombs are guided by GPS satellites, drones piloted remotely from across the world; fighter planes and warships are now huge data-processing centers; even the ordinary foot-soldier is being wired up. Yet growing connectivity over an insecure
New York Times 5 Feb. 1997: B4. Dowd, Ann Reilly. "Protect Your Privacy." Money Aug. 1997: 107-108, 112. Everett-Green, Robert. "Cyberspace." 1996 Encyclopedia Britannica Book of the Year. 1996. Goode, Stephen. "Are Privacy Rights Still Inalienable?" Insight Magazine on the News 19 Aug. 1996: 18-19. Houlder, Vanessa. "The Blessing and Curse of E-mail." World Press Review June 1997: 33-34. Long, Robert Emmet. Rights to Privacy. New York: H.W. Wilson Co., 1997. "Medical
Teaching and Learning in a Networked Composition Classroom In her essay “Technology and Literacy: A Story about the Perils of Not Paying Attention,” Cynthia L. Selfe notes that “technology is either boring or frightening to most humanists; many teachers of English composition feel it antithetical to their primary concerns and many believe it should not be allowed to take up valuable scholarly time or the attention that could be best put to use in teaching or the study of literacy” (Self 412).