Virtual Community Mentoring in Higher Education

Virtual Community Mentoring in Higher Education

Jamie S. Switzer (Colorado State University, USA)
DOI: 10.4018/978-1-60566-014-1.ch205
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

This article will focus on the characteristics of a technology- supported virtual community where university students can seek the guidance of professionals in the students’ field of study via a mediated mentoring program. Advances in information and communication technologies, particularly the Internet and interactive multimedia technologies, are creating new networking opportunities for students. Mentors and mentees can develop valuable relationships facilitated by multimedia technologies. This article will explore the characteristics of both community and mentoring within the framework of a technology-supported virtual community.
Chapter Preview
Top

Background

Connecting students and mentors can be difficult, particularly with regard to time and place. A student’s schedule may not be compatible with a mentor’s calendar, making a face-to-face meeting difficult. There could be a considerable geographic distance between a mentee and a mentor, making an in-person visit time-consuming and expensive. A mentoring program that utilizes interactive multimedia technologies, however, can overcome the challenges of time and distance to create and sustain a vibrant virtual learning community.

The whole idea of virtual community revolves around interacting and communicating in a mediated fashion. Because the Internet and other multimedia technologies are global, real-time, interactive, and readily accessible to many at a high bandwidth (Beale, 2000), virtual communities abound. Virtual communities offer people new ways to communicate and interact using multimedia technologies as individual members of virtual communities extend their selves via the computer network (Foster, 1997). As Song observes, “what we find in virtual communities is an understanding of community as communication taken to new extremes” (2002, p. 41).

As with traditional communities, virtual communities can be defined in terms of groups, relationships, common interests, and shared knowledge. The obvious difference is the fact that interaction among members of virtual communities is technology-mediated. Instead of talking face-to-face over the backyard fence, people are communicating and sharing information using interactive multimedia technologies. Their reason for coming together is mutual interest, not a common physical space. The setting is a network of digital information (Kollock, 1999) where, as Negroponte (1995) sees it, the world consists of bits, not atoms. Song states that, “Technically speaking, all virtual communities are essentially electronic and digital communication systems” (2002, p. 41).

“Virtual communities are not physical communities, but exist in the minds of those who inhabit them” (Roberts, Smith, & Pollock, 2002, p. 225). But virtual communities do not necessarily exist solely in cyberspace. While some communities are entirely virtual, some virtual community members do make the effort to meet in a physical space. Geography-bound interactions, however, are not integral to the functioning of a virtual community. In fact, as Ward claims, “the spirit of community or communion that is found among networks of people is far more important than having a sense of place” (1999, p. 98).

This spirit of community can extend beyond the general population and into the realm of education. Higher education can take advantage of the possibilities afforded by interacting using multimedia technologies and provide the opportunity to create new types of communal bonds and redefine the definition of community (Papastephanou, 2005). One approach is to create a virtual mentoring program.

Key Terms in this Chapter

WPA: Wi-Fi Protected Access (WPA): is a system to secure wireless networks, created to patch the security of the previous system, WEP. WPA implements part of the IEEE 802.11i standard. In addition to authentication and encryption, WPA also provides improved payload integrity.

PKI: Public Key Infrastructure (PKI) is a system of digital certificates, Certificate Authorities, and other registration authorities that verify and authenticate the validity of each party involved in an Internet transaction. PKIs are currently evolving, and there is no single PKI.

RADIUS: Remote Authentication Dial-in User Service (RADIUS) is an Authentication, Authorization, and Accounting (AAA) protocol.

Certificate Authority: A Certificate Authority (CA) is a trusted third party, whose purpose is to sign certificates for network entities, signifying that it has authenticated using secure means. Other network entities can check the signature to verify that a CA has authenticated the bearer of a certificate.

EAP: Extensible Authentication Protocol (EAP) is an authentication protocol used with 802.1X to pass authentication information messages between a suppliant and an authentication server.

WEP: Wired Equivalent Privacy (WEP) is a security protocol for wireless local area networks defined in the 802.11b standard. WEP is designed to provide the same level of security as that of a wired LAN. WEP is used at the two lowest layers of the OSI model.

BSS: A basic service set (BSS) is a WLAN architecture consisting of dedicated station computers and a dedicated wireless access point.

ESS: An extended service set (ESS) is a WLAN architecture consisting of dedicated station computers and many dedicated wireless access points.

IBSS: An independent basic service set (IBSS) is a WLAN architecture (also called ad-hoc) in which each network unit has both AP and station computer functionality.

Complete Chapter List

Search this Book:
Reset