Conference on College Composition and Communication Logo

Top Intellectual Property Developments of 2014

 

Introduction to the 2014 Annual

by Clancy Ratliff

This issue marks ten years since the Intellectual Property Caucus and Intellectual Property Committee started publishing the CCCC-IP Annual. I’m proud to say that it has steadily grown since the first issue. While I do not have data about our readership, I can say that the number of articles has increased over time:

2005: three articles
2006: four articles
2007: six articles
2008: four articles
2009: nine articles
2010: nine articles
2011: six articles
2012: seven articles
2013: seven articles
2014 – this year’s issue: ten articles

We have also made progress as a field in our thinking about authorship, copyright, and intellectual property, particularly in the area of open access. At the March 2015 meeting of the CCCC-IP Caucus, Heather Joseph, Executive Director of SPARC (the Scholarly Publishing and Academic Resources Coalition), spoke to us about several developments in open access research and publishing. She mentioned the Creative Commons Attribution license (CC-BY) as the most progressive standard of open access, allowing not only copying and distribution of published research, but the uses now possible with new research methods enabled by software code, such as data visualization and topic modeling. For fully open access, as well as for accessibility (for example, creating audio recordings of the CCCC-IP Annual for people with particular disabilities) derivative works should be allowed. Since 2007, we have used the Creative Commons Attribution-Noncommercial Use-No Derivative Works license, which is really only one step up from fair use: readers simply had permission to copy and distribute the full CCCC-IP Annual. We have now decided, though, to adopt a CC-BY license.

The Caucus and the Committee continue to work to keep the CCCC membership informed about intellectual property issues that work in favor of, or against, the interests of students and teachers, and readers and writers more generally. We recently applied for and received status as a CCCC Standing Group, and at the 2014 CCCC, we presented a panel about the history of the Caucus and our accomplishments. Many, many articles, book chapters, books, and special issues of journals have come out of Caucus meetings, as well as campus-specific advocacy. However, we still have work to do on several fronts, both legal and pedagogical. One of particular interest to me is plagiarism detection services, which I want to re-frame, as we go into the second half of 2015, as automated plagiarism detection. The Caucus proposed a CCCC resolution about the use of plagiarism detection services, which was passed in 2013:

Whereas CCCC does not endorse PDSs;

Whereas plagiarism detection services can compromise academic integrity by potentially undermining students’ agency as writers, treating all students as always already plagiarists, creating a hostile learning environment, shifting the responsibility of identifying and interpreting source misuse from teachers to technology, and compelling students to agree to licensing agreements that threaten their privacy and rights to their own intellectual property;

Whereas plagiarism detection services potentially negatively change the role of the writing teacher; construct ill-conceived notions of originality and writing; disavow the complexities of writing in and with networked, digital technologies; and treat students as non-writers; and

Whereas composition teacher-scholars can intervene and combat the potential negative influences of PDSs by educating colleagues about the realities of plagiarism and the troubling outcomes of using PDSs; advocating actively against the adoption of such services; modeling and sharing ideas for productive writing pedagogy; and conducting research into alternative pedagogical strategies to address plagiarism, including honor codes and process pedagogy;

BE IT THEREFORE RESOLVED that the Conference on College Composition and Communication commends institutions who offer sound pedagogical alternatives to the use of PDSs and encourages institutions who use PDSs to implement practices that are in the best interest of their students, including notifying students at the beginning of the term that the service will be used; providing students a non-coercive and convenient opt-out process; and inviting students to submit drafts to the service before turning in final text.

While the above resolution represents what many of us agree to be the case about plagiarism detection services, of which Turnitin is the main PDS provider, there is also this grim but correct observation from Rebecca Moore Howard, posted on the Writing Program Administration listserv (emphasis in original):

Turnitin has become like abortion and the death penalty: A topic on which people are making decisions based on deeply held beliefs inaccessible to logos. I visit faculties at several campuses every year, and in each audience are instructors who cannot imagine teaching without Turnitin. I am in a post-debate state with such people, unwilling any longer to search for the common ground on which we will exchange principles and consider possibilities, at the end of which these folks will return to Mother Turnitin against all reason. I just tell folks why I don’t use it, and turn to another topic. No one has ever said to me, “You know, I thought about what you said, and I changed my practice.” No one.

IIn tandem with the discourse about Turnitin is the discourse about the Common Core State Standards Initiative and its assessments of writing, which according to some reports are set to use AES, or Automated Essay Scoring. Teachers and administrators in K-12 and higher education, as well as students and parents, have expressed serious concerns about this plan. I see an opportunity to re-frame plagiarism detection services in order to show what those of us studying intellectual property and composition have understood for years: that AES and PDS are basically the same – artificial reading that replaces quality instruction and contextualized feedback on student writing. Hence I propose automated plagiarism detection. Also, because I included image macros (known more commonly as memes, though these are only one kind of meme) in the introduction of last year’s CCCC-IP Annual, I will end with these two image macros I created for the occasion. Though facetious, they are yet a potent way to communicate a point.

    

Table of Contents
 1 Introduction to the 2014 CCCC-IP Annual
Clancy Ratliff
 5 Plagiarism and PTSD: The Case of Senator John Walsh’s Plagiarized Paper
Steven Engel, Kerry Howell, Jacklene Johnson, and Jessica McGinnis
 11 What We Can Learn from Two Plagiarism Accusations in 2014: Slavoj Žižek’s and Nic Pizzolatto’s Summer Scandals
Wendy Warren Austin
18 3D Printing and Patent Theft: New Challenges to the Creative Commons
Chet Breaux
 21 Keep on Keeping On: Georgia State Fair Use Case Faces a New Metric for Assessing Fair Use
Jeffrey R. Galin
30 Open Data, Environmental Conservation, and the Digital Humanities: Mapping the Mangroves
Amy D. Propen
 34 Another Piece in the Open-Access Puzzle: The California Taxpayer Access to Publicly Funded Research Act (AB609)
Karen Lunsford
 38 Will Taylor Swift and Spotify Ever Get Back Together?
Laurie Cubbison
 42 The Case of the Missing Copyright: Sherlock Holmes and the Acerbic Judge
Kim Dian Gainer
52 How the Law Can Cost Composition Instructors a Lot of Money, and What You Can Do About It: The EFF’s White Paper on Civil Penalties for Copyright Infringement
Mike Edwards
55 Review: The Internet’s Own Boy: The Story of Aaron Swartz (2014)
Traci A. Zimmerman
60 Contributors

 

Data Privacy Day 2010 Celebrated January 28

By Martine Courant Rife, Lansing Community College, martinerife@gmail.com

Thursday January 28 marked the official date of “Data Privacy Day 2010,” a day which provides an opportunity to reflect with students how composing and/or utilizing the affordances of networked spaces not only provides unprecedented access to information, but also challenges the preservation of privacy about individuals’ data – data that can range from shopping habits to bank account information.  According to http://dataprivacyday2010.org/ , “Data Privacy Day is an international celebration of the dignity of the individual expressed through personal information.” Institutions and organizations around the globe join in the celebration in order to acknowledge the importance of maintaining some privacy in our use of technologies such as mobile phones, social networking sites, blogs, online banking, and the internet in general. Libraries, educational institutions, and various businesses sponsored and/or were involved in the celebration. For example, The Center for Internet & Society at Stanford University held a roundtable on the topic of “Money and Privacy,” where experts discussed the connections between privacy and company finances.

According to http://dataprivacyday2010.org/about/ , Data Privacy Day 2010 is organized through Privacy.org, “a nonprofit think tank and research organization dedicated to facilitating the role of consumer privacy and data protection.” A wealth of information about Privacy.org is available on its website, http://theprivacyprojects.org/. The organization conducts academic research as well as outreach and collaboration in order to find the balance and complexities in between our need for information and our need for privacy.

For writing teachers, Data Privacy Day may give us reason to pause and take time to reflect on the ways in which we might protect, and teach students to protect, their/our identities, histories, associations, and purchases, in and through digitally enhanced spaces. Along this line, I offer a sample activity that I am having beginning level college students engage in this week, in an online writing class on “Authorship in the Digital Age.” This Learning Module is an activity that offers a way to both increase students’ awareness of digital privacy issues, while also encouraging students to practice critical reading, writing, research and evaluation skills, as well as collaboration skills if they choose to work in a team. Here is the assignment:

Learning Module: Privacy Statements on the Web

Goal: To help you see how some of the issues raised in our readings and lectures might apply in real-world contexts. To help you understand how others might use your data. To help you think of ideas in the event you were to craft a privacy statement for your own or others’ websites/spaces.

Teams: You may complete this assignment as a single person, or you can complete it in a team of up to three people. If you complete this as a team, please be sure to include all parties’ names in the final document. If completed as a team, just post a single document.

Overview: For this module, I want you to explore privacy statements. Privacy statements or privacy terms are usually short statements made by companies or organizations, outlining their policies and approaches to maintaining or protecting the privacy of their users. Here are a few examples:

[In this area the teacher posts links to several company privacy statements]

Task #1: Review the privacy statements provided above. Get a sense of what they contain.

Task #2: Select a privacy statement from a company that interests you, or you can also use one of the privacy statements linked above. NOTE: Privacy statements are often hidden in the webpage – often several links in from the homepage, and often linked at the bottom of the webpage.

Task #3: Based on what you know so far, evaluate the privacy statement that you have selected. Since you do have points of comparison provided above, you might consider:

  1. Is the privacy statement easy to read and navigate?
  2. Is it easy to locate from the company’s homepage? (I find these statements are often hidden, or linked in the lower right hand corner with very small fonts)
  3. Is the privacy statement helpful?
  4. Are there ambiguous statements in the privacy statement? Is there language that is unclear? Give examples.
  5. In your opinion, is the privacy statement well written? Why or why not?
  6. If you were going to recommend improvements, what would you suggest? Why?
  7. Based on your subjective opinion, and compared to what you know about privacy statements, do you find the privacy statement you are evaluating satisfactory? Why or why not?

Task #4: Write up your response and evaluation – try not to exceed 500 words, but provide at least 300 words. You can use any format, or set up your document any way you like as long as I can read it and it is any of these file formats: .doc/.docx/.rtf/.pdf. Be sure to attribute your source(s) – you can use MLA/APA or any other form of citation – all I’m looking for here is an effort to attribute – simple URLs are fine, for example.

Task #5: Upload your document as an attachment in this discussion board by the due date.

RUBRIC:

  1. Did the writer take a thoughtful approach to the assignment?
  2. Is the writing relatively free from errors?
  3. Is the writing well organized?
  4. Is the writing neat in its presentation?
  5. Did the writer follow the requirements of the assignment?
  6. Is the writer’s discussion interesting and original?

For teachers working in traditional brick and mortar classrooms, students could work on this exercise together if computers are available. For those in classrooms without computers, teachers could print off sample corporate/social networking site privacy statements before class and students could evaluate the print versions.

 

Intellectual Property Reports Main Page

Top Intellectual Property Developments of 2012

Introduction to the 2012 CCCC-IP Annual

This is the eighth volume of the CCCC Intellectual Property Annual, my sixth as editor. I’m excited about this year’s Annual: not only do the contributors offer their usual thoughtful analysis about developments in copyright law, such as Laurie Cubbison’s article about content industries’ use of bots to detect copyright infringement, Juliette Lapeyrouse-Cherry’s insightful application of patent law in a case of “seed piracy” to our notions of authorship and collaboration, and Jeffrey Galin’s article about the Georgia State University case’s implications for fair use and online coursepacks, but they also help us as teachers. James Porter’s article about MOOCs makes me proud to be the editor of an open-access publication and to help distribute this groundbreaking and timely work to a wide audience. Just read it.

The 2012 Annual also features two articles about plagiarism: I can easily imagine assigning Katie Kottemann’s essay about plagiarism and the Romney campaign in a pedagogy seminar or even a first-year writing class. Steven Engel and Chris Gerben’s analysis of the Harvard plagiarism scandal gives us a wonderfully clear explanation of the mixed messages students receive about authorship, collaboration, and plagiarism, which is helpful for any teacher as well.

The Annual ends with an essay by Cory Doctorow memorializing Aaron Swartz, a dynamic copyright activist who took his own life in early January of 2013. As you’ll read, he was embroiled in legal battles resulting from his efforts to make information free to all. His loss has been felt all over the world, prompting articles about him in Rolling Stone, Slate, Salon, The New Yorker, The Los Angeles Times, and other periodicals. We are republishing Doctorow’s post, which he originally wrote for Boing Boing and released into the public domain.

MIT Will Publish All Faculty Articles Free in Online Repository (2009 Decision)

Charlotte Brammer, Samford University

An important development in the open access arena occurred March 18, 2009, when MIT faculty voted unanimously to publish their scholarly articles free in an online repository.  The complete policy, including key definitions and FAQs, is available from the university’s library, http://info-libraries.mit.edu/scholarly/faculty-and-researchers/mit-faculty-open-access-policy/.

The policy states:

Each Faculty member grants to the Massachusetts Institute of Technology nonexclusive permission to make available his or her scholarly articles and to exercise the copyright in those articles for the purpose of open dissemination. In legal terms, each Faculty member grants to MIT a nonexclusive, irrevocable, paid-up, worldwide license to exercise any and all rights under copyright relating to each of his or her scholarly articles, in any medium, provided that the articles are not sold for a profit, and to authorize others to do the same. The policy will apply to all scholarly articles written while the person is a member of the Faculty except for any articles completed before the adoption of this policy and any articles for which the Faculty member entered into an incompatible licensing or assignment agreement before the adoption of this policy. The Provost or Provost’s designate will waive application of the policy for a particular article upon written notification by the author, who informs MIT of the reason. (MIT-Open Access Policy)

Similar to policies of other schools, MIT’s policy grants the school “nonexclusive” rights, meaning faculty “retain ownership and complete control of the copyright in [their] writings, subject only to this prior license. [Faculty authors] can exercise [their] copyrights in any way [they] see fit, including transferring them to a publisher ” (MIT-Open Access Policy). As noted in the Library Journal, this open access policy is but the latest attempt of MIT to increase knowledge sharing, much as the university has done with DSpace, which will be the locus for faculty publications, and the “OpenCourseWare (OCW) project, launched in 2001 with the goal of making all MIT course materials available, free of charge, to anyone on the web.”

MIT faculty “is committed to disseminating the fruits of its research and scholarship as widely as possible” (MIT-Open Access Policy).  Unlike open access policies of other institutions, namely Harvard’s Arts and Sciences and Law Schools, MIT’s policy involves all faculty at the university, making it the first to do so. Given the university’s position in key technical and scientific fields, this action is significant and may indeed add some peer pressure on other universities to follow suit.

Faculty members can choose to “opt out” of the open access process by submitting their name, publication title and source, as well as reason for opting out. According to the FAQ on MIT’s website, this option was preserved primarily for the protection of junior faculty members who may want (or need) to work with certain publishers that may view the open access policy unfavorably. What was not stated, but seems obvious, is simply that attempting to coerce faculty to comply with an open access policy would be counterproductive and counterintuitive. The idea is to share knowledge and to assist rather than harm faculty.  

Knowledge sharing is important for faculty and for institutions of higher education. Faculty are expected to produce knowledge and to publish. Indeed, the “publish or perish” paradigm continues to pervade colleges and universities, perhaps most extensively at R1 institutions. In addition to publishing, however, citations have become increasingly important in terms of earning and demonstrating prestige, yet citations can be limited when article distribution is limited to expensive subscriptions. MIT’s FAQs mention two important findings: (1) “Studies show a very large citation advantage for open access articles, ranging from 45% to over 500%,” and (2) “the 5 largest journal publishers now account for over half of total market revenues, and over the past 15 years, the price of scholarly journals has grown roughly three times as fast as the Consumer Price Index.” 

It is easy to see that open access publications that are indexed by broad search engines, such as the very popular Google Scholar, will have many more potential hits and thus readers than those articles that are not indexed by these search engines. Even though many journal publishers now index through these search engines as a marketing tool, potential readers have to pay for access, and thus they often search for other sources that are available via open access. Publishers, therefore, may cry foul as they see threats to profits. Yet, moves toward open access continue.

Scholarly publishing is changing, and open access policies, such as MIT’s, are both pushing for change and reacting against change that has already occurred. As scholarly publishing moves away from small, discipline-specific, professional groups to commercial publishing firms, scholars and universities are developing new ways to share knowledge broadly.

Works Cited

Albanese, Andrew. “Another First, As MIT Faculty Adopts “University-Wide” Open Access Policy. Library Journal. (25 Mar. 2009).

MIT Faculty Open Access Policy. http://info-libraries.mit.edu/scholarly/faculty-and-researchers/mit-faculty-open-access-policy/

Apple App Store Arbitrates the Cellular Wireless Public Sphere, For Now.

Dayna Goldstein, Georgia Southern University

Apple Inc, the producer of the line of wildly popular iProducts including the iPod, iPhone and iPad is impacting the perception of the public sphere through their mediation of copyright and intellectual property as it relates to their “walled garden” cellular wireless internet devices. Why should the members of CCCC care about the line of iProducts? Well for one, there is the over 200 combined occurrences of these products in the Chronicle of Higher Education in the last year.1  Their prevalence in the Chronicle confirms their intimacy with and saturation of academic life. More importantly, the invisible differences between the wired and wireless  cellular internets that they reify, compounded by Apples market dominance and reputation make these devices key arbitration points of digital culture and property. In short, the mediation of the internet on these devices is poised to have a substantive impact on how consumers assume the public sphere operates and what rights might eventually prevail on the growing cellular wireless web and beyond.

In order to understand how Apple became the arbiter of a whole class of software in 2009, it is important to understand how the experience of the device feels to the unaware user and the difference between the wired and cellular wireless internets. When a consumer uses an iProduct they may reach one of two internets at a time. They are each binary devices. They devices may be set on the wired internet. The “wired” internet includes wi-fi which is hooked to a wired router at some point by an individual consumer or business. In practical terms, this internet is the unmediated internet available by desktop, laptop or netbook. It is the internet we have at home and at work. The “wired” internet has been “open” for decades. Any user can download any software they want from the wired internet regardless of device. It would be unfathomable, for example, for any wired internet provider like Comcast, America Online, or Roadrunner to limit what you could and could not use on your computer. However, this is just what the so called “Walled Garden” approache of iProducts do. The Apple hardware and software on iProducts block the wired internet from downloading programs. Instead, the cellular “wireless” network, referring to the 3G&Edge networks controlled by AT&T, paired with the Apple hardware allows exclusively for the download of applications (“Apps”) from the Apple App Store. Wireless networks are federally unregulated and do not have to allow for competition in their model (Wireless Telecommunication Bureau). The company that owns the cellular wireless network has discretion over what data may pass.  The devices smooth transition from one internet to the other obscures the difference in rules and laws between the two spheres.  Apple boasts on their iPhone internet spec page that “whether you’re connecting via Wi-Fi, 3G, or EDGE iPhone always connects you to the fastest network available” (iPhone safari 3G) The important distinctions between the two types of networks remains obscured to the user in practice.

The App Store

The App Store is a division of the iTunes store. The iTunes store made history when on January 6, 2009; Apple announced that it had reached an agreement with major record labels to sell all music on the iTunes Store free of DRM restrictions (Cohen). The landmark agreement meant that the heretofore problematic Fairplay™ DRM system was removed from the iTunes music store. (Movies and television shows are still encrypted with Fairplay™.) This tremendous concession by the music industry was spurred on by the oncoming App store, which began January 10th, 2009 to coincide with the launch of the iPhone 3G the next day. The music industry was understandably displeased by this circumstance, but eventually conceded that the loss of market share assured by not going with Apple and their loyal constituency of iProduct users would be intolerable.

However, music is not software. Musicians have long belonged to a label to distribute their music. It is only recently that more musical artists are publishing and profiting independently from their music. By contrast, the software industry has had few, if any, successful model of software publishing. The distribution patterns in the software industry have developed as they have because there was nothing between the software developers and the clients. The Apple App store changes that model (Betteridge). This has left Apple as the heir apparent to a whole class of copyright and intellectual property decisions in 2009.

I will review two recent events in this piece. The first event is the story of Google Voice. It illustrates the closed nature of the new wireless internet model and recent nudges toward opening it. The Next Bus Information System/Muni story which follows illustrates the type of intellectual property issues that may occur in this closed, cellular wireless model and the relevance of these decisions for those of us who teach writing and communication in the public sphere.

Google Voice

Google Voice is a digital switching station for landlines and cell lines with a web friendly interface. With Google Voice users “can access [their] voicemail online, read automatic transcriptions of [their] voicemail, create personalized greetings based on who is calling, make cheap international calls, and more”, claims Google Voice about their service on their about page.  Google Voice, like many things from Google labs, has deep roots in Silicon Valley. In 2005 a company called Grand Central had started among industry insiders who had huge bandwidth at their disposal. They noted a rising cost in cell phone packages (before the phone itself became the object of decision instead of the plans) and wanted to develop inexpensive web-based call technology. Google bought Grand Central in July of 2007. In March, 2009, after some down time and quiet revamping, the service was much improved and rereleased under the name Google Voice (Malik).

By July, 2009 several apps using or extending the services of Google Voice including GV Dialer, GV Mobile, and Voice Dialer were already in the Apple App store. According to Sean Kovacks, Google had been working with the permission, approval and utmost courtesy of an Apple Senior Marketing Vice President, Phil Schiller (@seankovacks). On July 27th, the above mentioned Google Voice apps were pulled from the Apple App store and another Google Voice app supposedly rejected (Kinkaid). Spurred on by this decision, Google and many other activists quickly brought this matter to the FCC. Merely four days later, July 31st, 2009, the Wireless Telecommunications Bureau made an official inquiry into Apple Policy (Schlichting). The FCC asked six questions. The questions focused on the rejection of Google Voice, AT&T’s part in that decision, and the App Stores general inclusion and exclusions policies. The FCC also made a point of referencing an earlier charge to the closed, wireless model made by Skype (Ad Hoc Public Interest Spectrum Coalition) in the letter to Apple. Industry insiders read this move by the FCC as an attempt to open the App Store model to the same type of competition available on the wired internet. On Augusts 1st, 2009 Apple responded to the FCC largely claiming that they hadn’t made any decisions about Google Voice and that AT&T had no undue influence in the decisions to remove the Google Voice related applications (Apple Answers). To put it tactfully, Apple’s response letter to the FCC reads as a stall tactic and largely takes the position that they have no position.

In January of 2010, Wired Magazine announced that Google Voice released a web version of Goggle Voice that is accessible on any HTML5 platform, which includes the iPhone wired web interface (Buskirk). The article goes on to smartly suggest that because of the bookmarking feature, the cloud version is almost indistinguishable from the version intend to run on the native iPhone OS. Given this approach by Google it is conceivable that we may look back in a few years and see that this is where the tide turned away from the App Store model and to these cloud-based applications. It is equally conceivable, that given Apple’s generally benevolent dictator approach other companies will not feel the need to follow in the HTML5 path that Google Voice blazed. The question ahead is if the Apple App store should act as the moderator of copyright, app distribution, and modification in the future. The next story will discuss one such complicated situation where Apple was the arbiter in the closed, wireless cellular model of the App Store and its impact for rhet/comp scholars.

NextBusIS/Muni

The San Francisco Municipal Transits Agency (Called “Muni” for short by locals) puts sensors on its buses in order to capture real-time travel data. From this collected data Muni is able to offer real-time predictions of when a bus will arrive at its next stop. The predictions are made publicly available on their website. Several app store developers have included a feature that skims this data in their apps. One such developer, Steven Peterson, included this in his “Routsey” app along with other local routing data options such as BART schedules, train schedules, and trolley data. In July, 2009 Peterson was contacted by the COO of a company calling itself “NextBus Information Systems” (NBIS) claiming that the Roustsey app infringed upon their companies intellectual property rights. Alex Orloff, the COO, contended that NBIS (not affiliated with NextBus sensor products), owned the real time data and demanded a “straight revenue split” or a “data licensing agreement” from Peterson. Peterson, wary at the thought that a public, taxpayer -funded transportation system had sold off their data rights investigated NBIS and Orloff  (Batey & Baume).  After finding only the most tenuous connection, with NBIS as “the agent for the commercial use of predictive data,” Peterson told Orloff that he would not make a licensing agreement (Eskenazi). Orloff then sent a cease and desist letter to Peterson. Peterson disregarded Orloff’s letter and riled San Franciscans in support of their ownership of public transportation data.

Angered and fearful of attacks from impatient Muni users, Orloff wrote a letter to the Apple iPhone development team asking that Routsey be removed from the App store because it violated NBIS’s copyrights and section 3.2d of Apples own developers license (Batey, Muni Arrival), which states to the developer the following:

“to the best of Your knowledge and belief, Your Application and Licensed Application Information do not and will not violate, misappropriate, or infringe any Apple or third party copyrights, trademarks, rights of privacy and publicity, trade secrets, patents, or other proprietary or legal rights (e.g. musical composition or performance rights, video rights, photography or image rights, logo rights, third party data rights, etc. for content and materials that may be included in Your Application).”
(Apple iPhone Developers License)

Apple, being zealous in the face of possible DMCA charges promptly removed the application from the App Store. In the mean time, Orloff had become a nuisance with other apps that used the NextBus data including Muni Time and iCommute. He sent various communications demanding a variety of rights not limited to revenue sharing, ad space on the app and full shutdown or rework of the app. Peterson, of the Routsey application, refused to be trampled by Orloff and enlisted a corporate lawyer to talk to Apple about returning Routsey to the App Store. In a “joint discovery effort,” Apple was unable to turn up any legitimate evidence that NBIS held any copyright claim to the Muni data and the Routsey application was returned to the App Store in August of 2009 (Batey, Muni APP). Since then, Orloff’s requests to Apple have been repeatedly rebuked. As a result of this turmoil, Muni has made significant strides in making their data public and routinely asks of collaborating enterprises to make this data more public (Raines).

Implications

The implications from the Google Voice story are evident enough. The differences between the wired web and the cellular wireless web forces teachers and students to reconcile a different rhetoric of the public sphere for different locales of the web. The perceived integration of the two webs on the iProducts is something that should prompt discussion about the roles digital technologies can play in both the freeing and obscuring of discourses in the digital realm.

For watchers of intellectual property, the ongoing negotiation of public space between the FCC and closed cellular wireless networks continues to change the digital landscape and we don’t where this change will lead yet. At the moment, Apple is clearly in charge of their “Walled Garden.” Their privatization  of the AT&T cellular network and naturalization of the privatization has been enormously successful. However, the FCC is not a toothless bureaucracy because even Apple reacted promptly to complaints about possible DMCA violations. Apple pulls apps first and investigates next. This pull-first-research-later approach reveals a surprisingly cautions policy for such a closed model.

In order to justify the teaching of writing and rhetoric, teachers of composition assume that the public sphere must be amenable to a plurality of voices and opinions to function. In the public sphere, we expect that no individual or group will have the priority to censor out another. The openness of the wired web has been instrumental in identifying previously blocked paths among social networks and the contained  cellular wireless model may threaten that balance. Yet, as Ballentine has pointed out we must recognize that the discourses of corporations are complex and not simply bad on their face. No one could deny that the Apple App Store has by chosen to make applications available more often than not and done much to foster innovation.

The future of app publishing and what constraints there are on intellectual property issues, especially, who has the right to arbitrate them in the cellular wireless model will need to be sorted out in the future. This past year merely table set for these questions. It also gives scholars a catalyst to have an important discussion about what public spheres we pay professional attention to and which don’t fall under our purview. Our disciplinary sense of digital property and adaptability continue to be challenged by innovation such as the Apple App store. It will be a delight to see what impacts these technologies will eventually have on the discourses that circulate within the public sphere.

Works Cited

@seankovacks. Web log post. Twitter.com. 27 July 2009. Web. 28 February 2010.

Ad Hoc Public Interest Spectrum Coalition. “Comments of the Ad Hoc Public Interest Spectrum Coalition.” Petition to Confirm a Consumer’s Right to Use Internet Communications Software and Attach Devices to Wireless Networks Proceeding #11361. Federal Communications Commission. 30 April 2007. PDF file. 28 February 2010.

Apple Answers the FCC’s Questions. “Today Apple filed with the FCC the following answers to their questions.” Apple.com/Hotnews. Apple inc., 1 August 2009. Web. 28 February 2010.

Ballentine Brian D. “Writing in the Disciplines versus Corporate Workplaces: On the Importance of Conflicting Disciplinary Discourses in the Open Source Movement and the Value of Intellectual Property.” Across the Disciplines 6 (2010): n. pag. 19 Jan. 2009 Web 28 February 2010.

Batey, Eve. “Muni Arrival Data App Killer Fears Attacks From Enraged Data/Transit Fiends?” SF Appeal 26 June 2009. Web.

Batey, Eve. “Muni App Makers, Rejoice: MTA, Apple Disputes Private Company’s Claims To Own Arrival Data.” SF Appeal 19 August 2009. Web. 28 February 2010.

Batey, Eve and Matt Baume. “Does A Private Company Own Your Muni Arrival Times? SF Appeal 25 June 2009. Web 28 February 2010.

Betteridge, Ian. “Who’s the publisher in the App Store model?” Technovia. 12 June 2009.Blog. 28 February 2010.

Buskirk, Eliot Van. “Google Voice Web App Circumvents Apple’s Blockade.” Epicenter Blog. Wired Magazine., 26 Jan 2010. Web. 4 28 February 2010.

Cohen, Peter. “iTunes Store Goes DRM-free.” MacWorld, 6 Jan. 2009. Web. 28 February 2010.

Eskenazi, Joe. “Who Owns Muni’s Arrival and Departure Times? That Depends on Whom You Ask.” The Snitch. SFWeekly.com. 25 July 2009. Web. 28 February 2010.

iPhone safari 3G. “Safari.” Apple, Inc. 2010. Web. 28 February 2010.

Kinkaid, Mark. ” Apple Is Growing Rotten To The Core: Official Google Voice App Blocked From App Store.” Tech Crunch., 27 July 2009. Web. 28 February 2010.

Malik, Om. “GrandCentral Reborn as Google Voice, a Suite of VoIP Services.” GigaOm. 11 March 2009. Blog. 28 February 2010.

Raines, Cohen. “Muni Releases Nextbus GPS Arrival Data Stream for App Developers.” Transit Camp Bay Area. Google Group. 12 November 2009. Listserv. 28 February 2010.

Schlichting, James D. “Federal Communications Commission Communication #DA 09-1736.” Letter to Catherine A. Novelli, Apple Inc. 31 July 2009. PDF file. 28 February 2010.

Wireless Telecommunication Bureau. Federal Communications Commission. n.d.  Web. 28 February 2010.

*****

1 Date delimited site search performed on Feburary 24th, 2010 using the key words iPod, iPhone and iPad

J.D. Salinger and 60 Years Later: The Struggle between Copyright and the First Amendment

Kim D. Gainer, Radford University

Overview

J.D. Salinger died in January of 2010, but an intellectual property dispute centering on The Catcher in the Rye continues to wend its way through the federal court system. An unauthorized ‘sequel’ had been published in the United Kingdom in May of 2009 and was in the verge of being released in the United States when Salinger’s lawyers filed suit to stop its sale. A permanent injunction blocking publication in the United States was granted by the U.S. District Court for the Southern District of New York, but the author and publisher of the novel filed an appeal to the Second Circuit Court of Appeals. This appeal was supported in an amicus brief by four major news organizations: The New York Times, The Associated Press, the Gannett Company, and the Tribune Company. Oral arguments in the case were heard in September of 2009, but a decision has not yet been handed down.

Background

Mr. Salinger’s interest in defending his intellectual property rights is well known and may in the past have discouraged what would arguably be fair use of his writings. An illustrative example is found at a web site largely targeted at secondary-level teachers of English. The owner of this website, a Catcher-enthusiast, has restricted his use of quotations from the novel for fear of legal repercussions. Describing a section of the site devoted to “intrinsic aspects” of The Catcher in the Rye, the owner writes,

This includes material basically concerning aspects of the novel itself—what scholars might call internal or intrinsic approach/criticism. Since everybody knows that Mr Salinger is not exactly keen on having people quote from CR, this section suffers from a certain handicap—there are so many things I would like to quote….
(Wahlbrinck)

This same site maintains a list of Salinger-related links. Of interest is the description of this one: “The Holden Server a CR site which explains why it does not exist any more [sic] (i.e. for legal reasons)—yet definitely worth visiting.” (This link is in fact broken, as is the link to the site described as follows:  “Salinger and copyright problems  Recommended  bananafish/Salinger.org subpage for anyone interested in Salinger’s insistence on his copyright in connexion [sic] with the internet.”)

The characterization of Salinger as a defender of his copyright prerogatives is something that he himself does not dispute, as he is described in his own court filings as “fiercely protective of his intellectual property” and as someone who “has never allowed any derivative works to be made using either The Catcher in the Rye or his Holden Caulfield character” (Complaint against ABP, Inc, John Doe, Windupbird Publishing Ltd, Nicotext A.B., 2; see also pp. 10-11)

The Current Case

Given the reclusive author’s reputation for maintaining tight control over the use of his writing, it is not surprising that Salinger should file suit to stop the publication of a book whose cover described it as a “sequel to one of our most beloved classics” (Complaint against ABP, 2). Written under the pseudonym J.D. California, the novel under dispute is entitled 60 Years Later: Coming through the Rye. As the title suggests, the book’s protagonist, Mr. C, is a septuagenarian.  He has fled from his nursing home, and a portion of the book is devoted to his experiences and thoughts as he wanders through New York City. The book also shows him confronting the character of J.D. Salinger, who continually attempts to kill off his creation in various fashions. The complaint asks that distribution of this novel in the U.S. be enjoined, arguing that this is an “unauthorized sequel” that “infringes Salinger’s copyright rights in both his novel and the character Holden Caulfield, who is the narrator and essence of that novel” (Complaint against ABP, 1). According to the brief,

The right to create a sequel to The Catcher in the Rye or to use the character of Holden Caulfield in any other work belongs to Salinger and Salinger alone, and he has decidedly chosen not to exercise that right.
(Complaint against ABP, 1)

Much of the brief is devoted to supporting the claim that the 60 Years Later is indeed a sequel and rejecting the notion that it is a parody. The brief points out that, in addition to the use of the word ‘sequel’ on the front jacket, the back cover featured this blurb: “Sixty years after his debut as the great American antihero, Mr. C is yanked back onto the page without a goddamn clue why” (Complaint against ABP, 13). The filing also adduces numerous parallels in language and incident.

The Defendants Respond

The author, now revealed as Fredrik Colting, co-owner of a small press, responded to the complaint by arguing that he wrote 60 Years Later “as a critical exploration of such themes as the relationship between J.D. Salinger, the famously reclusive author, and Holden Caulfield, his brash and ageless fictional creation” (Declaration of Fredrik Colting, 2). The character of Holden Caulfield, Colting stated, transcends the pages of the original book, and Salinger, like the character Colting bases on him, “has created a character that has become so culturally resonant that [Salinger] has lost control of him and cannot kill him off” (Declaration of Fredrik Colting, 3). Acknowledging that an early book cover and promotional materials refer to his novel as a ‘sequel’, Colting now characterizes “this description [a]s inaccurate” and reports that the U.S. edition will be free of such language (Declaration of Fredrik Colting, 8). His book, he writes,

is not designed to satisfy any interest the public might have in learning what happened next to Holden Caulfield or the other characters in Salinger’s book. Rather, it is intended to stand on its own as a critical examination of the character Holden Caulfield, the relationship between author and his creation, and the life of a particular author as he grows old but seems imprisoned by the literary character he created.
(Declaration of Fredrik Colting, 8)

In support of his claim that the book is not a sequel, Colting asserts that he neither copied nor appropriated the language of the book, beyond the use of certain catchphrases necessary to characterize Mr. C; that, beside the main character, only three characters from The Catcher in the Rye reappear in 60 Years Later; that the characters that do appear are reintroduced in order to further the critical exploration that is his stated goal; that he has created numerous characters independent of those created by Salinger; and that, “[e]ven more importantly, [his] book includes J.D. Salinger himself as the narrator/puppet master of the Mr. C character” (Declaration of Fredrik Colting, 10). As one reads 60 Years Later, he argues,

it becomes more and more clear that it is Salinger who is the most important character. His narrative starts and stops as he tries different ways to move the story forward. He even makes characters appear and disappear in front of Mr. C as the book progresses.
(Declaration of Fredrik Colting, 10).

In short, Mr. Colting is arguing that his is a transformative work, one that makes use of only that which is required for him to explore a premise that in large part centers upon Salinger himself. In additional filings this argument is explicitly supported by Robert Spoo, who had been asked to assist Colting’s attorneys in assessing the extent to which 60 Years Later had made “creative and transformative” use of The Catcher in the Rye (Declaration of Robert Spoo, 1) and by Martha Woodmansee, who describes 60 Years Later as a work of “meta-commentary” that

pursues critical reflection on J.D. Salinger and his masterpiece CR just as do the articles that literary scholars conventionally write and publish in literary journals, but[…]casts its commentary in an innovative “post-modern” form, specifically, that of a novel.
(Declaration of Martha Woodmansee, 3)

The Ruling of the Second District Court

In June of 2009 the Court issued a temporary restraining order to prevent the U.S. distribution of 60 Years Later, which was followed in July by the issuance of a preliminary injunction. Central to the ruling was Judge Deborah Batts’ examination of the question of whether 60 Years Later could be considered a parody or critique and therefore protected as fair use of material from Salinger’s copyrighted novel. With regard to Mr. Colting’s depiction of the septuagenarian version of Holden Caulfield, Judge Batts concluded that for most aspects of the character 60 Years Later was simply “rehashing one of the critical extant themes of Catcher” (Memorandum & Order, 16). In reaching the conclusion that in that regard 60 Years Later was neither parody nor a commentary, Judge Batts relied not only on the text of the novel but also the wording on the novel’s jacket and public statements by the Mr. Colting describing 60 Years Later as a tribute and a sequel. It was only after the suit was filed, the Judge pointed out, that Mr. Colting and his lawyers adopted the argument that the novel was commentary upon The Catcher in the Rye, and she dismisses their claims as “post hoc rationalizations employed through vague generalizations about the alleged naivete of the original” (Memorandum & Order, 11; see pp. 16-17, n. 2). As for the claim that the novel is transformative via its use of the character of Salinger, Judge Batts acknowledged that this was a “novel” element but stated that it “is at most, a tool with which to criticize and comment upon the author, J.D. Salinger, and his supposed idiosyncracies” (Memorandum & Order, 19). For Judge Batts, the gold standard for determining that a text is a parody that satisfies the standards for fair use is that the commentary or critique be focused on the original work itself.

Appeal to the Second Circuit

Judge Batts’ decision was immediately appealed to the Second Circuit Court of Appeals, and an amicus brief was filed on behalf of Mr. Colting by, collectively, the American Library Association, the Association of Research Libraries, the Association of College and Research Libraries, The Organization for Transformative Works and the Right to Write Fund (Falzone).  In addition, an amicus brief was filed by four major news organizations: The New York Times, the Gannett Company, the Tribune Company, and The Associated Press. At first glance the involvement of the Associated Press in the filing of the amicus brief may seem ironic, given that organization’s determined efforts to control the use of its own intellectual property, efforts that in 2008 led to a controversy in the blogosphere when the organization tried to enforce a policy that would have required the purchase of licenses for quotations of as few as five words (Doctorow). In fact, in the brief the Associated Press and its fellows are at pains to emphasize the importance they place upon the protection of copyright. They are in the business of publishing copyrighted material and depend upon copyright law to protect their interests, especially in these days when “digital technologies make it ever easier for third parties to seize and repurpose the fruits of their costly newsgathering efforts” (Brief for Amicus Curiae The New York Times Company, et al., 4). However, a second concern common to news organizations trumps other issues in the case and causes them to make common ground with the author of 60 Years Later. That would be the issue of prior restraint, the practice of banning publication rather than seeking remedies after publication. This the brief describes as “the most offensive and least tolerable prohibition on speech” (Brief for Amicus Curiae, 5). The brief documents numerous instances of the courts coming down on the side of authors and publishers in opposition to prior restraint and argues that “[t]he Supreme Court’s consistent rejection of prior restraint reflects the ‘chief purpose’ of the Constitution’s  free-speech clause: ‘to prevent previous restraints upon publication’” (Brief for Amicus Curiae, 7). The brief uses the fact that the courts have not countenanced prior restraint in the face of libel or defamation or even, in the case of the Pentagon Papers, in the face of claims of national security, in order to argue that the injunction on the publication of 60 Years Later is inappropriate:

[…]in this case, where the only harm appears to be to the pride of a reclusive author in not having his desires fulfilled barring commentary about his iconic book and character, without any actual financial harm, the lower court saw fit to ban publication of a new boo. Such a result defies common sense, and is not—and cannot be—the law.
(Brief for Amicus Curiae, 1-2).

In the view of The Associated Press and its companion news organizations, the prior restraint visited upon 60 Years Later represented a radical remedy of last resort not justified by the facts of the case. The novel was arguably transformative, and it was premature to apply prior restraint at the stage of a preliminary injunction. There was, the brief argued, no evidence that publication of the novel would cause irreparable injury to the plaintiff. Moreover, should the novel be published and later be found to have infringed upon Salinger’s copyright, there were other steps that the copyright holder could pursue, such as suing for monetary damages, that would not raise First Amendment issues. This line of reasoning, the brief argues, was neglected by the district court, which, “[d]espite the dangers inherent in prior restraint[…]completely subordinates free speech interests and simply presumed the new publication would cause irreparable harm” (Brief for Amicus Curiae, 31).

According to reports of the oral arguments before the court of appeals, the justices repeatedly asked whether the district court had thoroughly examined the issue of fair use before it blocked the publication of the novel (Shanahan). The justices seemed at least willing to entertain the notion that the nature of the novel should be more thoroughly explored before an indefinite ban is placed upon its distribution in the U.S.

Works Cited

Brief for Amicus Curiae The New York Times Company, The Associated Press, Gannett Co., Inc. and Tribune Company on behalf of Defendants-Appellants. Downloaded from Anthony Falzone, “Confusion over Copyright Injunctions and Other Restraints of Speech.” The Center for Internet and Society 3 August 2009. Web. 28 Feb. 2008.

Complaint against ABP, Inc, John Doe, Windupbird Publishing Ltd, Nicotext A.B. Salinger et al v. John Doe et al. Federal District Court Filings and Dockets. 1 June 2009. Web. 28 Feb. 2010.

Declaration of Fredrik Colting. Salinger et al v. John Doe et al. Federal District Court Filings and Dockets. 15 June 2009. Web. 28 Feb. 2010.

Declaration of Martha Woodmansee Salinger et al v. John Doe et al. Federal District Court Filings and Dockets. 15 June 2009. Web. 28 Feb. 2010.

Declaration of Robert Spoo Salinger et al v. John Doe et al. Federal District Court Filings and Dockets. 15 June 2009. Web. 28 Feb. 2010.

Doctorow, Cory. “Associated Press Expects You to Pay to License Five-Word Quotations (and Reserves the Right to Terminate Your License).” BoingBoing 17 June 2008. Web. 28 Feb. 2010.

Falzone, Anthony. “Confusion over Copyright Injunctions and Other Restraints of Speech.” The Center for Internet and Society 3 August 2009. Web. 28 Feb. 2008.

Memorandum & Order. Salinger et al v. John Doe et al. Federal District Court Filings and Dockets. 2 July 2009. Web. 28 Feb. 2010.

Shanahan, Ed. “Second Circuit Panel Wonders Whether Judge Acted Hastily in Barring Book Based on ‘Catcher in the Rye’.” IP Law & Business. 3 Sept. 2009. Web. 28 Feb. 2008.

Wahlbrinck, Bernd. “The Catcher in the Rye by J.D. Salinger and Related Matters.” Teaching English: Worksheets Tests & More. 1999-2010. Web. 28 Feb. 2010.

College Composition and Communication, Vol. 55, No. 4, June 2004

Click here to view the individual articles in this issue at http://www.ncte.org/cccc/ccc/issues/v55-4

Swiencicki, Jill. Rev. of Teaching Youth Media: A Critical Guide to Literacy, Video Production, and Social Change, by Steven Goodman. CCC. 55.4 (2004): 762-765.

Waddell, Craig. Rev. of The Rhetoric of Risk: Technical Documentation in Hazardous Environments, by Beverly Sauer. CCC. 55.4 (2004): 766-767.

Juzwik, Mary M. Rev. of The Rhetoric and Ideology of Genre: Strategies for Stability and Change, by Richard Coe, Lorelei Lingard, and Tatiana Teslenko, eds. CCC. 55.4 (2004): 767-770.

Mortensen, Peter. Rev. of The Extraordinary Work of Ordinary Writing: Annie Ray’s Diary by Jennifer Sinor. CCC. 55.4 (2004): 771-773.

Cooper, Marilyn M. Rev. of Arts of Living: Reinventing the Humanities for the Twenty-First Century by Kurt Spellmeyer. CCC. 55.4 (2004): 773-778.

Yancey, Kathleen Blake. “Postmodernism, Palimpsest, and Portfolios: Theoretical Issues in the Representation of Student Work.” CCC. 55.4 (2004): 738-761.

Abstract:

What we ask students to do is who we ask them to be. With this as a defining proposition, I make three claims: (1) print portfolios offer fundamentally different intellectual and affective opportunities than electronic portfolios do; (2) looking at some student portfolios in both media begins to tell us something about what intellectual work is possible within a portfolio; and (3) assuming that each portfolio is itself a composition, we need to consider which kind of portfolio-as-composition we want to invite from students, and why.

Keywords:

ccc55.4 Portfolios Print Students Representation Context Model Work Medium DigitalPortfolios Links Composition Space Information Curriculum

Works Cited:

Adams, Paul C., Steven Hoelscher, and Karen Till. “Place in Context: Rethinking Humanist Geographies.” Textures of Place. Ed. Paul C. Adams, Steven Hoelscher, and Karen Till. Minneapolis: U of Minnesota P, 2001. xiii-xxxiii.
Allen, Michael, Jane Frick, Jeff Sommers, and Kathleen Yancey. “Outside Review of Writing Portfolios: An On-Line Evaluation,” WPA: Writing Program Administration (Spring 1997): 64-88.
Apostle, Shawn. E-mail to author. 15 Sept. 2003.
Barton, Ben, and Marthalee Barton. “Ideology and the Map: Toward a Postmodern Visual Design Practice.” Professional Communication. Ed. Nancy Blyler and Charlotte Thralls. Newbury Park: Sage, 1993. 49-79.
Bass, Randy. Conversation with author. Summer Institute on Literature, Ocean Creek, SC, [ June 7] 1997.
Belanoff, Pat, and Marcia Dickson, eds. Portfolios: Process and Product. Portsmouth, NH: Boynton/Cook, 1991.
Bloom, Harold. The Anxiety of Influence: A Theory of Poetry. Oxford: Oxford UP, 1985.
Bolter, Jay David, and Richard Grusin. Remediation. Cambridge: MIT, 2000.
CCCC Guidelines for the Ethical Treatment of Students and Student Writing in Composition Studies. 2000. The National Council of Teachers of English. 23 Jan. 04 <http://legacy.ncte.org/groups/cccc/positions/107670.htm>.
Cambridge, Barbara, ed., Electronic Portfolios: Emerging Practices in Student, Faculty, and Institutional Learning . Washington, DC: American Association of Higher Education, 2001.
Davidson, Michael. “Palimtexts.” Postmodern Genres. 1992. Ed. Marjorie Perloff. Norman: U of Oklahoma P, 1995.
de Certeau, Michel. The Practice of Everyday Life. 1984. Berkeley: U of California P, 1988.
DeWitt, Scott, and Kip Strasma, eds. Contexts, Intertexts, and Hypertexts. Cresskill, NJ: Hampton P, 1999.
Dickens, Charles. David Copperfield. New York: Modern Library, 1950.
Freed, Richard. “Postmodern Practice: Perspective and Prospects.” Professional Communication . Ed. Nancy Blyler and Charlotte Thralls. Newbury Park, CA: Sage, 1993. 196-215.
Gardner, Howard. Frames of Mind: The Theory of Multiple Intelligences. New York: Basic Books, 1993.
Geertz, Clifford. Local Knowledge. New York: Basic Books, 1983.
Golson, Emily. “Cognition, Meaning, and Creativity: On Reading Student Hypertexts.” DeWitt and Strasma, 155-77.
Harris, Joseph. Interview quoted in “New Media Live,” Todd Taylor and Scott Halbritter. CCCC New York City, 2003.
Jacobi, Martin. “Delivery: A Definition and History.” Delivering College Composition: The Fifth Canon . Ed. Kathleen Blake Yancey, forthcoming, Heinemann 2004.
Lanham, Richard. The Electronic Word: Democracy, Technology, and the Arts. Chicago: U of Chicago P, 1993.
Leggett, B. J. “On Thirteen Ways of Looking at a Blackbird.” 2000. Modern American Poetry. English Department at University of Illinois at Champaign, compiled and prepared by Edward Brunner, John Timberman Newcomb, and Cary Nelson. 18 Dec. 2003 <http://www.english.uiuc.edu/maps/poets/s_z/stevens/blackbird.htm>.
May, Todd. Our Practices, Our Selves. University Park: Penn State UP, 2001.
McLuhan, Marshall. Understanding New Media. 1964. Cambridge: MIT P, 1999.
Piccello, Lizette. Conversation with author. Workshop, Virginia Beach, VA, 22 Jul. 2003.
Schon, Donald. The Reflective Practitioner. New York: Basic Books, 1983.
Schulman, Lee. “Course Anatomy: The Dissection and Transformation of Knowledge.” Address. AAHE Faculty Roles and Rewards Conference, Atlanta, GA. 21 Jan. 1996.
Selfe, Cynthia. ” Technology and Literacy: A Story about the Perils of Not Paying Attention .” CCC 50.3 (1999): 411-36.
Sellen, Abigail, and Richard Harper. The Myth of the Paperless Office. Cambridge: MIT P, 2001.
Stevens, Wallace. “Thirteen Ways of Looking at a Blackbird.” 2003. Representative Poetry Online , ed. Ian Lancashire. University of Toronto Libraries. 23 Jan. 2004 <http://eir.library.utoronto.ca/rpo/display/poem2018.html>.
Tinberg, Howard. “Starting Where Students Are, but Knowing (and Letting Them Know) Where We Want to Take Them,” TETYC 30.1 (2002): 5.
Truer, Paul, and Jill Jensen, “Electronic Portfolios Need Standards to Thrive.” Educause Quarterly 26.2 (2003): 34-41. Van Bruggen, Coosje. Frank O. Gehry Guggenheim Museum Bilbao . 1997. New York: Guggenheim Museum Publications, 1999.
Vielstimmig, Myka. “Not a Cosmic Convergence: Rhetorics, Poetics, Performance, and the Web.” Kairos 3.2 (1998). 29 Sept. 03. <http://english.ttu.edu/kairos/3.2/features/myka/cosmic4.htm>.
Wickliffe, Greg, and Kathleen Blake Yancey. “The Perils of Creating a Class Web-Site: It Was the Best of Times, It Was the . . . .” Computers and Composition 18.3 (2001): 177-86.
Yancey, Kathleen Blake. “Looking for Sources of Coherence in a Fragmented World: Notes toward a New Assessment Design.” Computers and Composition 21.1 (2004): 89-102.
—. Reflection in the Writing Classroom. Logan: Utah State UP, 1998.
Yancey, Kathleen Blake, and Irwin Weiser. Situating Portfolios. Logan: Utah State UP, 1997.

Micciche, Laura R. “Making a Case for Rhetorical Grammar.” CCC. 55.4 (2004): 716-737.

Abstract:

Rhetorical grammar analysis encourages students to view writing as a material social practice in which meaning is actively made, rather than passively relayed or effortlessly produced. The study of rhetorical grammar can demonstrate to students that language does purposeful, consequential work in the world: work that can be learned and applied.

Keywords:

ccc55.4 Grammar Students Language Writing Teaching Work GrammarInstruction RhetoricalGrammar Thinking Analysis Sentence Composition Discourse Skills Meaning

Works Cited

Ashton-Jones, Evelyn. “Collaboration, Conversation, and the Politics of Gender.” Feminine Principles and Women’s Experience in American Composition and Rhetoric . Ed. Louise Wetherbee Phelps and Janet Emig. Pittsburgh: U of Pittsburgh P, 1995. 5-26.
Baldwin, James. “If Black English Isn’t a Language, Then Tell Me, What Is?” Ten on Ten: Major Essayists on Recurring Themes. Ed. Robert Atwan. Boston: Bedford, 1992. 321-24.
Berlin, James A. “Rhetoric and Ideology in the Writing Class.” College English 50.5 (1988): 477-94.
Braddock, Richard, Richard Lloyd-Jones, and Lowell Schoer. Research in Written Composition . Champaign, IL: NCTE, 1963.
Brody, Miriam. Manly Writing: Gender, Rhetoric, and the Rise of Composition . Carbondale, IL: SIUP, 1993.
Bruss, Elizabeth W. Beautiful Theories: The Spectacle of Discourse in Contemporary Criticism . Baltimore: Johns Hopkins UP, 1982.
Bryant, Donald C. “Rhetoric: Its Functions and Its Scope.” Professing the New Rhetorics: A Sourcebook . Ed. Theresa Enos and Stuart C. Brown. Englewood Cliffs, NJ: Prentice Hall, 1994. 267-97.
Bullock, Richard, and John Trimbur, eds. The Politics of Writing Instruction: Postsecondary . Portsmouth, NH: Boynton/Cook, 1991.
“Bush’s Speech to U.N. on Iraq.” New York Times on the Web 12 Sept. 2002. 12 Sept. 2002 <http://www.nytimes.com/2002/09/12/politics/12AP-PTEX.html>.
Caughie, Pamela L. “Let It Pass: Changing the Subject, Once Again.” Feminism and Composition: In Other Words . Ed. Susan C. Jarratt and Lynn Worsham. New York: MLA, 1998. 111-31.
Claywell, Gina. “Reasserting Grammar’s Position in the Trivium in American College Composition.” Hunter and Wallace 43-53.
Connors, Robert J. “The Erasure of the Sentence.” College Composition and Communication 52.1 (2000): 96-128. Crowley, Sharon. Ancient Rhetorics for Contemporary Students . New York: Macmillan, 1994.
D’Angelo, Frank. “Imitation and Style.” The Writing Teacher’s Sourcebook. 2nd ed. Ed. Gary Tate and Edward P. J. Corbett. New York: Oxford UP, 1988. 199-207.
D’Eloia, Sarah. “The Uses: and Limits: of Grammar.” Journal of Basic Writing 1.3 (1977): 1-20.
Delpit, Lisa. Other People’s Children: Cultural Conflict in the Classroom. New York: The New P, 1995.
Devet, Bonnie. “Welcoming Grammar Back into the Writing Classroom.” Teaching English in the Two-Year College 30.1 (2002): 8-17.
Didion, Joan. “Why I Write.” Joan Didion: Essays and Conversations. Ed. Ellen G. Friedman. Princeton, NJ: Ontario Review P, 1984. 5-10.
Fitts, Karen, and Alan W. France, eds. Left Margins: Cultural Studies and Composition Pedagogy . Albany, NY: SUNY, 1995.
Foucault, Michel. Language, Counter- Memory, Practice. Ed. Donald F. Bouchard. Ithaca: Cornell UP, 1980.
Giroux, Henry A. Teachers as Intellectuals: Toward a Critical Pedagogy of Learning . Granby, MA: Bergin and Garvey, 1988.
Giroux, Henry A., and Peter McLaren, eds. Critical Pedagogy, the State, and Cultural Struggle . Albany, NY: SUNY, 1989.
Glenn, Cheryl. “When Grammar Was a Language Art.” Hunter and Wallace 9-29. Hartwell, Patrick. “Grammar, Grammars, and the Teaching of Grammar.” College English 47.2 (1985): 105-27.
Hillocks, George, Jr. Research on Written Composition: New Directions for Teaching . Urbana, IL: NCRE/ERIC, 1986.
hooks, bell. “Language.” Teaching to Transgress: Education as the Practice of Freedom . New York: Routledge, 1994. 167-75.
Hunter, Susan, and Ray Wallace, eds. The Place of Grammar in Writing Instruction: Past, Present, Future . Portsmouth, NH: Boynton/Cook, 1995.
Jarratt, Susan C., and Lynn Worsham, eds. Feminism and Composition Studies: In Other Words . New York: MLA, 1998.
Kolln, Martha. “Rhetorical Grammar: A Modification Lesson.” English Journal 85.7 (1996): 25-31.
—. Rhetorical Grammar: Grammatical Choices, Rhetorical Effects. 4th ed. New York: Longman, 2003.
Lakoff, Robin. Language and Woman’s Place. New York: Harper & Row, 1975. Lazere, David. “Back to Basics: A Force for Oppression or Liberation?” College English 54.1 (1992): 7-21.
Luke, Carmen, and Jennifer Gore, eds. Feminisms and Critical Pedagogies. New York: Routledge, 1992.
Meckel, Henry C. “Research on Teaching Composition and Literature.” Handbook of Educational Research . Ed. N. L. Gage. Chicago: Rand McNally, 1963. 966-1006.
Meyer, Charles F. “Functional Grammar and Discourse Studies.” Discourse Studies in Composition . Ed. Ellen Barton and Gail Stygall. Cresskill, NJ: Hampton P, 2002. 71-89.
Murphy, James J., ed. Quintilian on the Teaching of Speaking and Writing. Carbondale, IL: SIUP, 1987.
Noguchi, Rei R. Grammar and the Teaching of Writing: Limits and Possibilities . Urbana, IL: NCTE, 1991.
Olson, Gary A. “Encountering the Other: Postcolonial Theory and Composition Scholarship.” Ethical Issues in College Writing. Ed. Fredric G. Gale, Phillip Sipiora, and James L. Kinneavy. New York: Peter Lang, 1999. 91-105.
Olson, Jon. “A Question of Power: Why Fredrick Douglass Stole Grammar.” Hunter and Wallace 30-42.
Orwell, George. “Politics and the English Language.” Ten on Ten: Major Essayists on Recurring Themes . Ed. Robert Atwan. Boston: Bedford, 1992. 309-20.
Ratcliffe, Krista. Anglo-American Feminist Challenges to the Rhetorical Traditions: Virginia Woolf, Mary Daly, Adrienne Rich . Carbondale, IL: SIUP, 1996.
Schell, Eileen E. Gypsy Academics and Mother-Teachers: Gender, Contingent Labor, and Writing Instruction . Portsmouth, NH: Boynton/Cook, 1998.
Severino, Carol, Juan C. Guerra, and Johnnella E. Butler, eds. Writing in Multicultural Settings . New York: MLA, 1997.
Shaughnessy, Mina P. Errors and Expectations: A Guide for the Teacher of Basic Writing . New York: Oxford UP, 1977.
Shor, Ira. Empowering Education: Critical Teaching for Social Change. Chicago: U of Chicago P, 1992.
Sledd, James. “Grammar for Social Awareness in Time of Class Warfare.” English Journal 85.7 (1996): 59-63.
Sullivan, Patricia A., and Donna J. Qualley, eds. Pedagogy in the Age of Politics: Writing and Reading (in) the Academy . Urbana, IL: NCTE, 1994.
Sutton, Gary A. “Do We Need to Teach a Grammar Terminology?” English Journal 65.9 (1976): 37-40.
Tabbert, Russell. “Parsing the Question ‘Why Teach Grammar?'” English Journal 73.8 (1984): 38-42.
Trimbur, John. “Literacy and the Discourse of Crisis.” The Politics of Writing Instruction: Postsecondary . Ed. Richard Bullock and John Trimbur. Portsmouth, NH: Boynton/Cook, 1991. 277-95.
Weathers, Winston. “Teaching Style: A Possible Anatomy.” The Writing Teacher’s Sourcebook . 2nd ed. Ed. Gary Tate and Edward P. J. Corbett. New York: Oxford UP, 1988. 187-92.
Winchell, Donna A. “Teaching the Rhetoric of Grammar and Style.” Instructor’s Manual and Answer Key to Accompany The Writer’s Harbrace Handbook . Ed. Robert K. Miller, Suzanne S. Webb, and Winifred B. Horner. New York: Harcourt College Publishers, 2001. 16-58.
Zemliansky, Pavel. “Mechanical Correctness.” Composition Forum 10.2 (2000): 1-19.

Young, Vershawn Ashanti. “Your Average Nigga.” CCC. 55.4 (2004): 693-715.

Abstract:

“Your Average Nigga” contends that just as exaggerating the differences between black and white language leaves some black speakers, especially those from the ghetto, at an impasse, so exaggerating and reifying the differences between the races leaves blacks in the impossible position of either having to try to be white or forever struggling to prove they’re black enough. In this essay I recount how I negotiated my own black ghetto-to-middle class identity conflict as I facilitated classroom interactions with a black male student from the ghetto.

Keywords:

ccc55.4 Students School Ghetto Language Class Race StandardEnglish Identity Teachers AfricanAmerican English

Works Cited

Bonvillian, Nancy. Language, Culture, and Communication: The Meaning of Messages . Englewood Cliffs, NJ: Prentice Hall, 1993.
Campbell, Kermit. “‘Real Niggaz’s Don’t Die’: African American Students Speaking Themselves into Their Writing.” Writing in Multicultural Settings. Ed. Carol Severino, Juan C. Guerra, and Johnnella E. Butler. MLA, New York, 1997. 67-78.
—. “The Signifying Monkey Revisited: Vernacular Discourse and African American Personal Narratives.” Journal of Advanced Composition 14.2 (1994): 463-73.
Canagarajah, A. Suresh. ” Safe Houses in the Contact Zone: Coping Strategies of African-American Students in the Academy .” College Composition and Communication 48 (1997): 173-96.
Delpit, Lisa. Other People’s Children: Cultural Conflict in the Classroom. The Press, New York, 1995.
Fordham, Signithia. Blacked Out: Dilemmas of Race, Identity, and Success at Capital High. Chicago: U of Chicago P, 1996.
Fox, Thomas. “Repositioning the Profession: Teaching Writing to African American Students.” Journal of Advanced Composition 12.2 (1992): 291-303.
Gilyard, Keith. Race, Rhetoric, and Composition. Portsmouth, NH: Boynton/Cook, 1999.
—. Voices of the Self: A Study of Language Competence. Detroit, MI: Wayne State UP, 1991.
Hale-Benson, Janice E . Black Children: Their Roots, Culture, and Learning Styles . Rev. Ed. Baltimore: Johns Hopkins UP, 1986.
Harley, Kay, and Sally Cannon. “Failure: The Student’s or the Assessment’s?” Journal of Basic Writing 15.1 (1996): 70-87.
Harper, Phillip Brian. Are We Not Men? Masculine Anxiety and the Problem of African American Identity . New York: Oxford UP, 1996.
Holmes, David G. “Fighting Back by Writing Black: Beyond Racially Reductive Composition Theory.” Race, Rhetoric, and Composition. Ed. Keith Gilyard. Portsmouth, NH: Boynton/Cook, 1999. 53-66.
Kotlowitz, Alex. There Are No Children Here: A Story of Two Boys Growing Up in the Other America . New York: Anchor Books, 1992.
Lippi-Green, Rosina. English with an Accent: Language, Ideology, and Discrimination in the United States . New York: Routledge, 1997.
Smith, Erec, Jennifer Cohen, Paula Mathieu, James Sosnoski, Bridget Harris Tsemo, and Vershawn Ashanti Young. “CultureWise: Narrative as Research, Research as Narrative.” Works and Days 33/34, 35/36, vol. 17 and 18 (1999-2000): 425-43.
Smitherman, Geneva. Talkin and Testifyin: The Language of Black America. Detroit: Wayne State UP, 1977.
Wardhaugh, Ronald. An Introduction to Sociolinguistics. Cambridge: Basil Blackwell, 1986.
Young, Vershawn Ashanti. “Your Average Nigga: Language, Literacy, and the Rhetoric of Blackness.” Doctoral dissertation, University of Illinois at Chicago, 2003.

Hawisher, Gail E., Cynthia L. Selfe, Brittney Moraski, and Melissa Pearson. “Becoming Literate in the Information Age: Cultural Ecologies and the Literacies of Technology.” CCC. 55.4 (2004): 642-692.

Abstract:

In this article, we discuss the literacy narratives of coauthors Melissa Pearson and Brittney Moraski, who came to computers almost a generation apart. Our goal is to demonstrate the importance of situating literacies of technology: and literacies more generally: within specific cultural, material, educational, and familial contexts that influence, and are influenced by, their acquisition and development.

Keywords:

ccc55.4 Ecology CulturalEcology Literacy Computers DigitalLiteracy Access Technology Practice Students Web Online

Works Cited

Blair, Kristine, and Pamela Takayoshi, eds. Feminist Cyberscapes: Mapping Gendered Academic Spaces. Stamford: Ablex, 1999.
Brandt, Deborah. “Accumulating Literacy: Writing and Learning to Write in the Twentieth Century.” College English 57.6 (1995): 649-68.
—. Literacy in American Lives. New York: Cambridge UP, 2001.
—. “Literacy Learning and Economic Change.” Harvard Educational Review 69.4 (1999): 373-94.
—.Sponsors of Literacy.” College Composition and Communication 49.2 (1998): 165-85.
Brettell, Caroline, ed. When They Read What We Write: The Politics of Ethnography. Westport: Bergin and Garvey, 1996.
Bruce, Bertram C., ed. Literacy in the Information Age: Inquiries into Meaning Making with New Technologies. Newark, DE: International Reading Association, 2003.
Bruce, Bertram, and Maureen P. Hogan. “The Disappearance of Technology: Toward an Ecological Model of Literacy.” Handbook of Literacy and Technology: Transformations in a Post-Typographic World. Ed. David Reinking, Michael C. McKenna, Linda D. Labbo, Ronald D. Kieffer. Mahwah, NJ: Lawrence Erlbaum, 1998. 269-81.
Casey, James, Randy Ross, and Marcia Warren. Native Networking: Telecommunications and Information Technology in Indian Country . April 1999 . Benton Foundation, Washington, DC. 1 Aug. 2003 <http://www.benton.org/publibrary/native/indexnew.html>.
Cassell, Justine, and Henry Jenkins, eds. From Barbie to Mortal Combat. Cambridge: MIT P, 1998.
Castells, Manuel. End of the Millennium. Malden: Blackwell, 1998. Vol. 3 of The Information Age: Economy, Society, and Culture. 3 vols. 1996-1998.
—. The Power of Identity. Malden: Blackwell, 1997. Vol. 2 of The Information Age: Economy, Society, and Culture . 3 vols. 1996-1998.
—. The Rise of the Network Society. Malden: Blackwell, 1996. Vol. 1 of The Information Age: Economy, Society, and Culture. 3 vols. 1996-1998.
Coley, Richard J., J. Crandler, and P. Engle. Computers and Classrooms: The Status of Technology in U.S. Schools . Princeton, NJ: Educational Testing Service, 1997.
Cooper, Marilyn M., and Cynthia L. Selfe. “Computer Conferences and Learning: Authority, Resistance, and Internally Persuasive Discourse.” College English 52.8 (1990): 847-69.
Cope, Bill, and Mary Kalantzis, eds. Multiliteracies: Literacy Learning and the Design of Social Futures . New York: Routledge, 2000.
Deibert, Ronald J. Parchment, Printing, and Hypermedia: Communication in World Order Transformation . New York: Columbia UP, 1997.
DeVoss, Dànielle Nicole, Joseph Johansen, Cynthia L. Selfe, John C. Williams, Jr. “Under the Radar of Composition Programs: Glimpsing the Future through Case Studies of Electronic Literacy.” Ed. Lynn Z. Bloom, Donald A. Daiker, and Edward M. White. Composition Studies in the New Millennium: Rereading the Past, Rewriting the Future . Carbondale: SIU P, 2003.
“Digital Divide Basics Fact Sheet” 2003. Digital Divide Network. Benton Foundation, Washington, DC. 1 Aug. 2003 <http://www.digitaldividenetwork.org/content/stories/index.cfm?key=168>.
Faigley, Lester. Fragments of Rationality: Postmodernity and the Subject of Composition . Pittsburgh: U of Pittsburgh P, 1992.
Feenberg, Andrew. Questioning Technology. New York: Routledge, 1999.
Freeman, Laura. “Job Creation and the Emerging Home Computer Market.” Monthly Labor Review 119.8 (1996): 46-56.
Gee, James Paul. Social Linguistics and Literacies: Ideology in Discourses. London: Falmer Press, 1990.
—. What Video Games Have to Teach Us about Learning and Literacy. New York: Palgrave Macmillan, 2003.
George, Diana. ” From Analysis to Design: Visual Communication in the Teaching of Writing .” College Composition and Communication 54.1 (2002): 11-39.
George, Diana, and Diane Shoos. “Dropping Bread Crumbs in the Intertextual Forest: Critical Literacy in a Postmodern Age.” Passions, Pedagogies and Twenty-First Century Technologies . Ed. Gail E. Hawisher and Cynthia L. Selfe. Logan: Utah State UP, 1999. 115-26.
Giddens, Anthony. Central Problems in Social Theory: Action, Structure, and Contradiction in Social Analysis . Berkeley: U of California P, 1979.
Goodman, William. “The Role of Computers in Reshaping the Work Force.” Monthly Labor Review 119.8 (1996): 37-45.
Graff, Harvey J. The Legacies of Literacy: Continuities and Contradictions in Western Culture and Society . Bloomington: Indiana UP, 1987.
Hawisher, Gail E. “Accessing the Virtual Worlds of Cyberspace.” Journal of Electronic Publishing 6 (2000). 22 July 2003 <http://www.press.umich.edu/jep/06-01/hawisher.html>.
—. “Research and Recommendations for Computers and Composition.” Ed. Gail E. Hawisher and Cynthia L. Selfe. Critical Perspectives on Computers and Composition Instruction. New York: Teachers College P, 1989. 44-69.
Hawisher, Gail E., and Cynthia L. Selfe. “Collaborative Configurations: Researching the Literacies of Technology.” Kairos 7 (2002). 22 July 2003 <http://english.ttu.edu/kairos/7.3/binder2.html?coverweb/hawisher/index.htm>.
—. “Teaching Writing at a Distance: What’s Gender Got To Do With It?” Teaching Writing with Computers: An Introduction. Ed. Pamela Takayoshi and Brian Huot. New York: Houghton Mifflin, 2003. 128-49.
Hawisher, Gail E., and Patricia Sullivan. “Women on the Networks: Searching for E-Spaces of Their Own. Ed. Susan Jarratt and Lynn Worsham. Feminism and Composition Studies: In Other Words . New York: MLA, 1998. 172-97.
—. “How Many Online?” September 2002. NUA. 31 July 2003 <http://www.nua.ie/surveys/how_many_online/>.
hooks, bell. Talking Back: Thinking Feminist, Thinking Black. Boston: South End P, 1989.
Jaffe, Alexandra. “Involvement, Detachment, and Representation on Corsica.” When They Read What We Write: The Politics of Ethnography. Ed. Caroline Brettell. Westport: Bergin and Garvey, 1996. 51-66.
Jessup, Emily. “Feminism and Computers in Composition Instruction.” Evolving Perspectives on Computers and Composition Studies: Questions for the 1990s . Ed. Gail E. Hawisher and Cynthia L. Selfe. Urbana: NCTE, 1991. 336-55.
Johnston, William B., and Arnold H. Packer. Workforce 2000: Work and Workers for the Twenty-First Century . Indianapolis, IN: Hudson Institute, 1987.
Judy, Richard W., and Carol D’Amico. Workforce 2020: Work and Workers in the Twenty-First Century. Indianapolis, IN: Hudson Institute, 1997.
Katzenstein, Mary Fainsod, and Judith Reppy, eds. Beyond Zero Tolerance: Discrimination in Military Culture. New York: Rowman and Littlefield, 1999.
Kramarae, Cheris. The Third Shift: Women Learning Online. Washington, DC: AAUW Educational Foundation, 2001.
Kress, Gunther. “‘English’ at the Crossroads: Rethinking Curricula of Communication in the Context of the Turn to the Visual.” Passions, Pedagogies, and Twenty-First Century Technologies . Ed. Gail E Hawisher and Cynthia L. Selfe. Logan: Utah State UP, 1999. 66-88.
—. Literacy in the New Media Age. London: Routledge, 2003.
Kress, Gunther, and Theo Van Leeuwen. Multimodal Discourse: The Modes and Media of Contemporary Communication . London: Edward Arnold Ltd., 2001.
Kurzweil, Raymond. The Age of Intelligent Machines. Cambridge: MIT P, 1990.
Lemke, Jay L. Textual Politics: Discourse and Social Dynamics. London: Taylor and Francis, 1995.
Luke, Carmen. “Cyber-Schooling and Technological Change: Multiliteracies for New Times.” Multiliteracies: Literacy Learning and the Design of Social Futures . Ed. Bill Cope and Mary Kalantzis. New York: Routledge, 2000. 69-91.
McConnell, Sheila. “The Role of Computers in Reshaping the Work Force.” Monthly Labor Review 119.8 (1996): 3-10.
Meares, Carol Ann, and John F. Sargent. The Digital Workforce: Building Infotech Skills at the Speed of Innovation . Washington, DC: U.S. Department of Commerce and the Office of Technology Policy, 1999.
Merrifield, Juliet, Mary Beth Bingham, David Hemphill, and Kathleen P. deMarrais Bennett, eds. Life at the Margins: Literacy, Language, and Technology in Everyday Life . New York: Teachers College P, 1997.
Michigan. Department of Education. Michigan’s State Technology Plan, 1992- 1997 . Lansing: Office of Educational Technology, 1992.
Moris, Francisco A. “Semiconductors: The Building Blocks of the Information Revolution.” Monthly Labor Review 119.8 (1996): 6-17.
Myers, Miles. Changing Our Minds: Negotiating English and Literacy. Urbana: NCTE, 1996.
Newburger, Eric. “9-in-10 School-Age Children Have Computer Access.” 6 Sept. 2001. U.S. Department of Commerce News, Economics and Statistics Administration, Bureau of the Census, Washington, DC. 28 July 2003 <http://www.census.gov/Press-Release/www/2001/cb01-147.html>.
The 1900s: American News and Lifestyle Headlines from 1900-1999 . . . plus a Century of Sound (1999-2000). Archer Audio Archives. 27 July 2003 <http://archer2000.tripod.com/index.html>.
Norris, Pippa. Digital Divide: Civic Engagement, Information Poverty, and the Internet Worldwide . New York: Cambridge UP, 2001.
Paquet, Cheri. “Report Counts 147 Million Global Net Users.” 12 February 1999. CNN.com. 31 July 2003 <http://www.cnn.com/TECH/computing/9902/12/globalnet.idg/>.
Pastore, Michael. “Older Americans Lack Confidence in Computing Skills.” The Big Picture: Demographics. 3 April 2000. Cyberatlas. 1 Aug. 2003. <http://cyberatlas.internet.com/big_picture/demographics/article/0,,5901_333251,00.html>.
Pew Internet Project. “The Gray Gap.” 21 Sept. 2000. Who’s Not Online. Pew Internet and American Life Project, Washington, DC. 1 Aug. 2003 <http://www.pewinternet.org/reports/reports.asp?Report=21&Section=ReportLevel1&Field=Level1ID&ID=56>.
—. Tracking Online Life: How Women Use the Internet to Cultivate Relationships with Family and Friends . 10 May 2000. Pew Internet and American Life Project, Washinton, DC. 1 Aug. 2003 <http://www.pewinternet.org/reports/toc.asp?Report=11>.
—. Wired Seniors: A Fervent Few Inspired by Family Ties. 9 September 2001. Pew Internet and American Life Project, Washington, DC. 1 Aug. 2003 <http://www.pewinternet.org/reports/toc.asp?Report=40>.
Prior, Paul A. Writing/Disciplinarity: A Sociohistoric Account of Literate Activity in the Academy . Mahwah, NJ: Lawrence Erlbaum, 1998.
Romano, Susan. The Egalitarianism Narrative: Whose Story? Which Yardstick? Computers and Composition 10.3 (1993): 5-28.
Schoen, Donald. The Reflexive Practitioner. New York: Basic Books, 1983.
Selfe, Cynthia. Technology and Literacy in the Twenty-First Century: The Importance of Paying Attention . Carbondale: SIU P, 1999.
Selfe, Cynthia L., and Gail E. Hawisher. “A Historical Look at Electronic Literacy.” Journal of Business and Technical Communication 16.3 (2002): 231-77.
—. Literate Lives in the Information Age: Narratives of Literacy from the United States . Mahwah, NJ: Lawrence Erlbaum, 2004.
Selfe, Cynthia, Gail E. Hawisher, Patricia Ericsson. “Stasis and Change: The Role of Independent Composition Programs and the Dynamic Nature of Literacy.” A Field of Dreams: Independent Writing Programs and the Future of Composition Studies . Ed. Peggy O’Neill, Angelo Crow, Larry Burton. Logan: Utah State UP, 2002. 268-77.
Spanning the Digital Divide: Understanding and Tackling the Issues. 2001.Bridges.org, South Africa. 29 July 2003 <http://www.bridges.org/spanning>.
Spillers, Hortense J. “Who Cuts the Border: Some Readings on ‘America.'” Ed. Hortense Spillers. Comparative American Identities: Race, Sex, and Nationality in the Modern Text . New York: Routledge, 1991. 1-25.
Street, Brian V. Social Literacies: Critical Approaches to Literacy in Development, Ethnography, and Education . New York: Longman, 1995.
Sullivan, Patricia, and Jennie Dautermann, eds. Electronic Literacies in the Workplace: Technologies of Writing . Urbana, IL: NCTE, 1996.
“Survey Shows Widespread Enthusiasm for High Technology.” February 2000. NPR Online . 2 Feb. 2003 <http://www.npr.org/programs/specials/poll/technology/>.
Takayoshi, Pamela. “Building New Networks from the Old: Women’s Experiences with Electronic Communications.” Computers and Composition 11.1 (1994): 21-35.
Treese, Win. The Internet Index (no. 22). 22 May 1998. 31 July 2003 <http://www.treese.org/intindex/>.
Tyner, Kathleen. Literacy in a Digital World: Teaching and Learning in the Age of Information . Mahwah, NJ: Lawrence Erlbaum, 1998.
United Nations. Human Development Research Organization. Human Development Report 2001: Making New Technologies Work for Human Development . 2001. United Nations Development Program, New York: Oxford UP. 1 Aug. 2003 <http://hdr.undp.org/reports/global/2001/en/>.
United States. Department of Commerce. Falling through the Net: Defining the Digital Divide . July 1999. National Telecommunication and Information Administration, Washington, DC. 27 July 2003 <http://www.ntia.doc.gov/ntiahome/digitaldivide/>.
—. Falling through the Net: A Survey of the “Have Nots” in Rural and Urban America . July 1995. National Telecommunications and Information Administration, Washington, DC. 27 July 2003 <http://www.ntia.doc.gov/ntiahome/digitaldivide/>.
—. Falling through the Net: Toward Digital Inclusion: A Report on Americans’ Access to Technology Tools . October 2000. Economic and Statistics Administration, and National Telecommunication and Information Administration, Washington, DC. 27 July 2003 <http://www.ntia.doc.gov/ntiahome/digitaldivide/>.
—. Falling through the Net II: New Data on the Digital Divide. July 1998. National Telecommunication and Information Administration, Washington, DC. 1 Aug. 2003 <http://www.ntia.doc.gov/ntiahome/net2/>.
—. A Nation Online: How Americans Are Expanding Their Use of the Internet. Feb. 2002. National Telecommunications and Information Administration and Economics and Statistics Administration, Washington, DC. 27 July 2003 <http://www.ntia.doc.gov/ntiahome/dn/index.html>.
—. Department of Education. The Condition of Education 1997. 1997. National Center for Educational Statistics 97-388, Washington, DC. 1 Aug. 2003 <http://nces.ed.gov/pubsearch/pubsinfo.asp?pubid=97388>.
—. Department of Labor. Futurework: Trends and Challenges for Work in the 21st Century . Washington, DC: Dept. of Labor, 1999.
Warnke, Jacqueline. “Computer Manufacturing: Change and Competition,” Monthly Labor Review 119.8 (1996): 18-29.
White, Stephen. A Brief History of Computing: Complete Timeline. 1996-2004. 27 July 2003 <http://www.ox.compsoc.net/~swhite/timeline.html>.
Wysocki, Anne Frances, and Johndan Johnson-Eilola. “Blinded by the Letter: Why Are We Using Literacy as a Metaphor for Everything Else?” Passions, Pedagogies, and Twenty-First Century Technologies. Ed. Gail E. Hawisher and Cynthia L. Selfe. Logan: Utah State UP, 1999. 349-68.
Yagelski, Robert. Literacy Matters: Writing and Reading the Social Self. New York: Teachers College P, 2000.
Zakon, Robert H. Hobbes’ Internet Timeline, v7.0. 1 April 2002. Zakon Group LLC. 27 July 2003 <http://www.zakon.org/robert/internet/timeline/>.

Popken, Randall. “Edwin Hopkins and the Costly Labor of Composition Teaching.” CCC. 55.4 (2004): 618-641.

Abstract:

Using a “historical case study” of Edwin M. Hopkins, this article explores what Bruce Horner calls the “material social conditions” of teaching writing early in the twentieth century. It shows how Hopkins’s own attitude and response to the demands of being a writing teacher serve as a backdrop for understanding his local and national crusade to improve labor conditions for faculty.

Keywords:

ccc55.4 EHopkins Faculty Composition Teaching Labor Writing Students Work History

Works Cited

Adams, James. Copey of Harvard: A Biography of Charles Townsend Copeland. Boston: Houghton Mifflin, 1960.
Adams, Katherine. Progressive Politics and the Training of America’s Persuaders . Mahwah, NJ: Lawrence Erlbaum, 1999.
Annual Catalogue of the University of Kansas. Lawrence: University of Kansas, 1890-91; 1901-02; 1906-07; 1913-14; 1917-18; 1920-21; 1925-26.
Berlin, James. Rhetoric and Reality. Carbondale: Southern Illinois UP, 1985.
“Big Colleges Like KU Man’s Report.” Daily Kansan, 7 Jan. 1914. Hopkins Scrapbook, Hopkins Archives. Spencer Research Library, Univ. of Kansas, Lawrence.
Blanshard, Frances. Frank Aydelotte at Swarthmore. Middleton, CT: Wesleyan UP, 1974.
Bohan, P. T. Letter to Olin Templin. 12 Sept. 1919. Correspondence with Chancellor Frank Strong. Series 2/9/5. Spencer Research Library, Univ. of Kansas, Lawrence.
Brereton, John C., ed. The Origins of Composition Studies in the American College, 1875-1925: A Documentary History. Pittsburgh: U of Pittsburgh P, 1994.
—. Traditions of Inquiry. New York: Oxford UP, 1985.
Briggs, Le Baron. To College Teachers of English Composition. Boston: Houghton Mifflin, 1928.
Brown, Rollo. Dean Briggs. New York: Harper and Brothers, 1926.
Campbell, JoAnn. Toward a Feminist Rhetoric: The Writing of Gertrude Buck. Pittsburgh: U of Pittsburgh P, 1996.
Connors, Robert. Composition-Rhetoric: Backgrounds, Theory, and Pedagogy. Pittsburgh: U of Pittsburgh P, 1997.
—. “Overwork/Underpay: Labor and Status of Composition Teachers Since 1880.” Rhetoric Review 91 (1990): 108-26.
—. “Rhetoric in the Modern University: The Creation of an Underclass.” The Politics of Writing Instruction: Postsecondary. Ed. Richard Bullock and John Trimbur. Portsmouth, NH: Boynton/ Cook, 1991. 55-84.
Cooper, Lane. “Teaching of Written Composition.” Education 30 (March 1910): 421-30.
Cotton, H.A. “The Etiology and Treatment of the So-Called Functional Psychoses.” American Psychiatry 79 (1922): 157-67.
Crowley, Sharon. Composition in the University: Historical and Polemical Essays . Pittsburgh: U of Pittsburgh P, 1998.
“E. M. Hopkins.” Miscellaneous Folder, Hopkins Archives. Spencer Research Library, University of Kansas, Lawrence.
Fearing, Bertie. “When It’s One Down and 124 Themes to Go: It’s Time to Establish a Realistic Teaching Load for English Teachers.” ADE Bulletin (1980): 26-32.
Genung, John. “The Study of Rhetoric in the College Course.” Brereton, Origins 133-57.
Griffin, Clifford. The University of Kansas: A History. Lawrence: U of Kansas P, 1974.
Hart, Sophie Chantal. “English in the College.” The School Review 10.5 (1902): 364-73.
Holt, Mara, and Lea Anderson. “The Way We Work Now.” Profession 1998. New York: MLA, 1998. 131-42.
Hook, J. N. A Long Way Together: A Personal View of NCTE’s First Sixty-Seven Years . Urbana: NCTE, 1979.
Hopkins, Edwin. “Abstract of Committee on Elementary School English.” National Education Association 107 (1923): 82-87.
. “Can Good Composition Teaching be Done under Present Conditions? English Journal 1(1912): 1-8.
—. [Chapel service notes]: 11-13 Nov. 1895. Miscellaneous Folder. Hopkins Archives. Spencer Research Library, Univ. of Kansas, Lawrence.
—. “Cost and Labor of English Teaching.” English Education Association (1915): 114-19.
—. “English in Grammar Schools.” Address to the NCTE, 15 Dec. 1913. Hopkins Scrapbook. Hopkins Archives. Spencer Research Library, University of Kansas, Lawrence.
—. “The Forthcoming Report of the Committee on English Composition Teaching.” English Journal 1 (1912): 568.
—. “Forty Years of College English: History and Prophesy.” English Journal 20 (April 1931): 320-30.
—. General Statement. Hopkins Scrapbook. Hopkins Archives. Spencer Research Library, University of Kansas, Lawrence.
—. Handbook on the Teaching of English. Chicago: Scott, Foresman, 1904.
—. “The Labor and Cost of Composition Teaching: The Present Conditions.” Proceedings of the NEA 50 (1912): 747-51.
—. The Labor and Cost of the Teaching of English in Colleges and Secondary Schools with Especial Reference to English Composition. Chicago: NCTE, 1923.
—. Letter to Ernest Lindley. 16 August 1920. Series 2/9/5. Correspondence of Chancellor Ernest Lindley. Spencer Research Library, University of Kansas, Lawrence.
—. Letter to Frank Strong. September 1902 -1919. Series 2/9/5. Correspondence of Chancellor Frank Strong. Spencer Research Library, University of Kansas, Lawrence.
—. Letter to Olin Templin. 28 October 1909. Series 2/9/5. Correspondence with Chancellor Frank Strong. Spencer Research Library, University of Kansas, Lawrence.
—. Letter to Wilbur Mason. 5 January 1920. Series 2/9/5. Correspondence with Chancellor Frank Strong. Spencer Research Library, University of Kansas.
—. “The Need of Improvement in the Conditions Surrounding the Teaching of Composition.” College English 1 (1912): 41-42.
—. Personal Journal. Ms. Hopkins Archives. Spencer Research Library, University of Kansas, Lawrence.
—. “Should English Teachers Teach?” Education 42 (1921): 12-18.
—. “Wanted: A Bureau of Definition.” English Journal 6 (March 1917): 131-45.
Horner, Bruce. Terms of Work for Composition: A Materialist Critique. Albany: State U of New York P, 2000. 10 June 2003 <http://www.netlibrary.com/ebook/>.
Hunt, Theodore. “The Study of English in American Colleges.” Educational Review 7 (1896): 140-50.
Kitzhaber, Albert. Rhetoric in American Colleges, 18501900. Dallas: Southern Methodist UP, 1990.
Lindley, Ernest. Letter to C. G. Dunlap. 7 August 1920. Series 2/9/5. Correspondence with Chancellor Ernest Lindley. Spencer Research Library, University of Kansas, Lawrence.
Maher, Jane. Mina P. Shaughnessy: Her Life and Work. Urbana: NCTE, 1997.
Malamud, William. “The History of Psychiatric Therapies.” One Hundred Years of American Psychiatry . Ed. J. K. Hall, Gregory Zilbourg, and Henry Bunker. New York: Columbia UP, 1944. 273-323.
McCosh, James. The Scottish Philosophy. New York: Carter, 1874.
O’Dell, De Forest. The History of Journalism Education in the United States . New York: Columbia Teachers College, 1935.
Paine, Charles. The Resistant Writer: Rhetoric as Immunity, 1850 to the Present. Albany: SUNY P, 1999.
Phelps, William L. “English Composition.” Brereton, Origins 287-90.
“Position Statement of TYCA: Southwest.” TYCA Southwest Newsletter 27.4 (2001): 3, 8.
“Proceedings of the First Annual Meeting [of the National Council of Teachers of English].” College English 1 (1912): 30-39.
“A Recognition.” Lawrence Gazette, 13 Nov. 1913. Hopkins Scrapbook. Hopkins Archives. Spencer Research Library, University of Kansas, Lawrence.
Rudolph, Frederick. The American College and University: A History. New York: Knopf, 1962.
Russell, David. Writing in the Academic Disciplines. Carbondale: Southern Illinois UP, 1991.
Scott, Fred Newton. “English at the University of Michigan.” English in American Universities. Ed. William Morton Payne. Boston: D.C. Heath, 1895. 116-23.
Self, Robert. Barrett Wendell. Boston: Twayne, 1975.
“So All May Use English.” Kansas City Star, 9 Nov. 1913. Hopkins Scrapbook. Hopkins Archives. Spencer Research Library, University of Kansas, Lawrence.
Stewart, Donald, and Patricia Stewart. The Life and Legacy of Fred Newton Scott . Pittsburgh: U of Pittsburgh P, 1997.
Strong, Frank. Letter to C. M. Barger. 27 April 1905. Series 2/9/5. Correspondence with Chancellor Frank Strong. Spencer Research Library, University of Kansas, Lawrence.
—. Letter to Edwin Hopkins. 21 September 1909. Series 2/9/5. Correspondence with Chancellor Frank Strong. Spencer Research Library, University of Kansas, Lawrence.
Tawney, R. H. Religion and the Rise of Capitalism: A Historical Study. London: John Murray, 1926.
Taylor, Warner. “A National Survey of Conditions in Freshman English.” Brereton, Origins 354-62.
Varnum, Robin. Fencing with Words: A History of Writing Instruction at Amherst College during the Era of Theodore Baird, 19381966. Urbana: NCTE, 1996.
Veysey, Laurence. The Emergence of the American University. Chicago: U of Chicago P, 1965.

"Walled Gardens": How Copyright Law Can Impede Educators’ Use of Digital Learning Materials

Clancy Ratliff, Assistant Professor of Rhetoric and Composition, Department of English, East Carolina University

OVERVIEW

In August of 2006, law professors William W. Fisher and William McGeveran of the Berkman Center for Internet and Society, Harvard Law School, published “The Digital Learning Challenge: Obstacles to Educational Uses of Copyrighted Material in the Digital Age,” a white paper based on their research and two all-day workshops in which librarians, teachers, lawyers, and scholars gathered to discuss their encounters with copyright law. Their collective efforts and the publication of this white paper constitute one of the top intellectual property developments of 2006 because they have revealed and clarified four central problems related to the intersections among digital media, education, and copyright law:

  • Unclear or inadequate copyright law relating to crucial provisions such as fair use and educational use;
  • Extensive adoption of ‘digital rights management’ technology to lock up content;
  • Practical difficulties obtaining rights to use content when licenses are necessary;
  • Undue caution by gatekeepers such as publishers or educational administrators.

To illustrate these problems, Fisher and McGeveran present four case studies of digital educational endeavors that were delayed or jeopardized by copyright law. These include: 1.) a proposal to create a network for social studies teachers to share teaching materials; 2.) the use of movie scenes on DVD in film studies courses; 3.) the Database for Recorded American Music (DRAM), a repository of obscure music; and 4.) the conflict that arises when public broadcasters, who are allowed to use some third-party content in their programs, make programming available on the Web. In this review of Fisher and McGeveran’s white paper, I make connections between their case studies and situations faced in rhetoric and composition pedagogy, and I explain what composition scholars can do to help protect teachers’ rights to use third-party content for noncommercial, educational purposes.

Copyright: Common Ground Shared Among Rhetoric and Composition, Film Studies, Music, and K-12 History

Material from the first three case studies is particularly relevant for rhetoric and composition scholars who do work with digital media, and I focus on those three cases in my review. The first case is a proposed project by George Mason University’s Center for History and New Media called the History Teacher Network. The network, modeled on social software, was to be designed as a place where K-12 teachers can upload and share the learning materials they create, such as PowerPoint presentations or online modules. From the perspective of copyright law, the problem was that some of the learning materials may feature copyrighted third-party content: photographs, music, or video clips. That George Mason University would risk secondary liability for hosting these materials and enabling their distribution constituted an insurmountable obstacle, and the Center for History and New Media “has been forced to curtail its plans for a resource exchange component of the network because of the risk of secondary liability for copyright infringement” (Fisher and McGeveran 20). In rhetoric and composition studies, scholars have proposed similar networks for sharing teaching materials. In April of 2006, I attended a meeting in Los Angeles for Next/Text, a project of the Institute for the Future of the Book. The meeting was devoted to discussion of what rhetoric and writing textbooks could become if their authors used digital technologies creatively and innovatively. We imagined just such a network, composed of materials from teachers; textbooks could be curated by users’ creating various collections and arrangements of these materials. They could be tagged with categories of the users’ choosing, and they could be linked through a system similar to Amazon.com’s recommendations based on users’ tastes. We hadn’t gotten so far as to propose potential hosting sites for the network (though futureofthebook.org, the Institute’s domain, would have been an intuitive first choice), but a network of teaching materials in rhetoric and composition studies would almost certainly face the same secondary liability issues that thwarted the History Teacher Network. 

In their second case study, Fisher and McGeveran explain the pedagogical and legal dilemma faced by film studies teachers. In order to illustrate and teach techniques such as jump cutting, mise en scene, wipes, and split screen, they must be able to show scenes from films. A teacher may, for example, want to create a montage of scenes from eight to ten films to show the evolution of special effects over time. If she wants to do that, or if she wants to make a scene or two available to students for a homework assignment, she must circumvent copy protection technology on the DVDs she uses. Otherwise, she and the students must waste class time sitting through “forced watching,” as Fisher and McGeveran  put it – previews, advertisements, and copyright warnings. Such circumvention constitutes a violation of DRM, or Digital Rights Management, even though the teacher’s use of the content falls under fair use.

The result is what Fisher and McGeveran call an “uneasy equilibrium” in the violation of the Digital Millennium Copyright Act. Rhetoric and composition teachers may face the same dilemma as more rhetoricians – Joyce Irene Middleton’s work is one example – study film as rhetorical text, or when composition teachers wish to use film clips to illustrate issues of representation, including race and sexuality. In order to settle the dilemma for film teachers, Fisher and McGeveran argue that “[t]here should be no penalty under the DMCA when DRM systems are circumvented purely to enable uses of content that are educational, legally permitted, and noncommercial – perhaps with a proviso that reasonable efforts are made to avoid subsequent leakage of the content” (97). While their suggestion would relieve film teachers’ concerns about copyright law, it still does not address another major problem with copyright law: its labyrinthine complexity. Scholars such as law professor Jessica Litman have argued that copyright law should be easier for the general public to understand, which would cohere with copyright law’s ostensible concern for the public interest and help the public to respect it and take it seriously.

The third case study Fisher and McGeveran present is an effort by NewYork University and New World Records, a nonprofit record company, to create DRAM, or the Database for Recorded American Music. The database is devoted to obscure music and “underrecognized composers” (31), so the administrators of DRAM prioritized good financial compensation for the artists. Despite New World Records’ and NYU’s commitment to fair compensation, as well as the nonprofit educational nature of the use of the music, the rights clearance process proved to consume a prohibitive amount of money and time. Fisher and McGeveran report, “All told, rights clearance for DRAM consumed several years and enormous amounts of staff effort and expense. The small scale and nonprofit status of the initiative often made rightsholders or their intermediaries less interested in responding to those efforts” (34). The content industries had little to gain from DRAM, it seems. At least one project in rhetoric similar to DRAM exists: AmericanRhetoric.com, a repository of audio, video, and text transcripts of famous speeches. While much of the content on AmericanRhetoric.com consists of presidential and senatorial speeches, which are considered government documents and therefore are public domain, the site does feature some copyrighted content. The site has a fair use statement, an excerpt of which reads:

AmericanRhetoric.com contains copyrighted materials (html/pdf/flash text, audio, video, digital images), the use of which in many cases has not been specifically authorized by the copyright owner(s). These materials include all of the artifacts in the “Movie Speeches” site area as well as various artifacts in the “Top 100 Speeches” and “Speech Bank” site areas. […]

The site is making such material available in the effort to advance understanding of political, social, and religious issues as they relate to the study and practice of rhetoric and public address deemed relevant to the public interest and the promotion of civic discourse.

AmericanRhetoric.com believes that the nature and use of the artifacts on this site not in the public domain or not the property of the owner of this site constitutes “fair use” of any such material as provided for in section 107 of the U.S. Copyright Act. The material on this site is intended primarily for research and educational purposes, has been previously published, and is distributed without profit.

I do not know whether Michael E. Eidenmuller, the owner of AmericanRhetoric.com, has received cease-and-desist letters for his inclusion of copyrighted content, but I am speculating that the resource he has created has gone unchallenged due mainly to the fact that he maintains it individually and does not seem to have the endorsement of his institution, the University of Texas at Tyler. He features ads on the site, presumably to help cover hosting costs and domain name registration.

The Classroom Use Exception, the TEACH Act, and Digital Media

Each of these three cases has implications for projects proposed or already underway by scholars in rhetoric and composition. From their case studies, Fisher and McGeveran articulate several “obstacles to digital learning” (42). They explain the classroom use exception to fair use, which gives teachers additional freedom beyond fair use to make use of third-party content in classrooms for educational purposes. We’ve all, for example, probably heard about a loophole in copyright law that permits the photocopying of an article if the teacher is struck with inspiration to use it right before the class meeting. This understanding is correct; a spontaneity exception does exist, but the use of third-party content for digital materials — blogs, wikis, web-based class projects   is more legally fraught, even if the digital materials were only available to the students enrolled in the course.

The classroom use exception is intended for face-to-face teaching that takes place within the walls of classrooms, not necessarily for hybrid courses, online courses, or homework assignments for a face-to-face course. The TEACH Act of 2001 addressed the incompatibility of the classroom use exception by no longer requiring students to be in the same location to use third-party content distributed by teachers. However, the act stipulated that the content must be integral to the course objectives, and that only accredited, nonprofit institutions were covered. Fisher and McGeveran critique the boundaries of the freedoms (47):

This bias excludes, for example, an adult education class offered by a nonprofit but unaccredited institution; asynchronous instruction and discussion that occurs outside of class sessions at preset uniform times; and even access to material by students in other related classes at the same institution.

Also, Fisher and McGeveran suggest, it would seem that DRM and the DMCA would supersede the TEACH Act, which says that teachers have to make sure the content isn’t available after the class session, thereby preventing it from being disseminated, which is not architecturally possible to do in online environments. Fisher and McGeveran conclude that as far as the TEACH Act is concerned:

Congress might well need to start from scratch. In particular, the across-the-board exclusion of asynchronous teaching and learning sacrifices one of the principal benefits of digital technology. Likewise, the limited conceptualization of education as tied closely to highly traditional academic institutions limits the statute’s effectiveness in the decentralized digital environment (96).

I agree that education ought not be bound up with institutions, and their observation certainly acknowledges some of the educational efforts online, such as academic weblogs and wikis created by individuals or groups not affiliated with one particular university.

Libraries and Rights Clearance

The white paper also takes up the copyright issues associated with libraries and archives. Fisher and McGeveran identify statutory and actual damages as problems faced by libraries. It costs nearly one million dollars to defend a copyright case, and that cost may only cover the statutory damages (the pre-established charges that come in to play when calculating exact damages proves difficult).  Actual damages, if awarded, could be even higher. Additionally, the copyright holder might seek a trial by jury – which may result in more money being awarded in damages – instead of a hearing before a judge. The prohibitive cost of copyright infringement lawsuits has several consequences for libraries and universities, not to mention the collections of archives online that function as libraries but are not recognized as such: Educators often ask for licenses, or permission to use content, even when it is not legally necessary because their use would be protected under fair use. Because universities do not want to risk lawsuits (a risk aversion that Fisher and McGeveran feel may be unwarranted by actual lawsuit occurrence), they are “overly cautious” (85). They sink time and labor into a cumbersome rights clearance process to find that content industries don’t have any incentive to provide differential licensing of content for the benefit of educational institutions, teachers, and most important of all, students. They use closed content management systems for courseware, such as Blackboard and WebCT, instead of open access courseware. They institute and abide by university photocopying policies that are more stringent than the 1976 Guidelines for Classroom Copying. In other words, the law is actually more lenient than the universities.

The rights clearance process is made even more difficult by digital technology. For the Copyright Clearance Center and other intermediaries, there are strikingly different processes for comparable actions, like making thirty copies of a print article for classroom use as opposed to  making a digital copy available on an intranet site for 30 days (80). Permission costs, or royalties, can be costly, as anyone who has created a course pack for a composition course knows, but most rightsholders still do not see education as an important market or source of revenue. Thus, they don’t offer discounts, or reduced royalty fees, especially for digital content. Fisher and McGeveran argue that “many rightsholders are unsure about digital distribution formats, and their uncertainty translates into higher fees” (84). In the end, Fisher and McGeveran recommend a broadening of the definition of libraries and archives, so that “untraditional noncommercial entities and ‘virtual’ collections available online” may also be protected by the libraries and archives exceptions to copyright law. They also argue that the libraries and archives exceptions could be revised, particularly in light of digital technology, to address the “number of copies” limitation (94).” Fisher and McGeveran suggest two other measures to make the rights clearance process less arduous. First, they recommend the creation of a technological tool that would help to figure out whether or not permission to use the work is necessary. If it turned out that permission was needed, the software would search for licenses the institution has already secured and currently uses, such as blanket licenses and library consortia agreements, and it would search for similar material that was already cleared – Creative Commons licensed material, for example. Second, they recommend that universities and K-12 teachers get together and come up with a list of best practices – for figuring out whether something is fair use or not, for licensing negotiations, and deployment of DRM systems – all of these with specific illustrative cases that model the best practices.

Conclusion: How You Can Contribute to the Open Access Effort

Fisher and McGeveran conclude their white paper with several suggestions for what scholars can do to help bring about copyright reform, some of which connect to the work that the CCCC Intellectual Property Caucus is doing. Scholars in our field can contribute to open access by doing research about it. Fisher and McGeveran point to several areas for future research, and I have highlighted three that may be of particular interest to scholars in rhetoric and composition:

  • Documenting how often educational users of content in fact are threatened with copyright infringement suits, and how often such suits are filed (the dearth of judicially decided cases in this area suggests that these numbers may turn out to be surprisingly low).
  • Analyzing  how frequently rightsholders decline permission for educational uses of content and the typical reasons for such refusal.
  • Updating empirical data concerning policies and guidelines adopted by universities and school districts concerning educational use of content.

These projects would make excellent master’s theses and dissertations for rhetoric researchers interested in legal discourse. Fisher and McGeveran also offer a series of recommendations for what kinds of action we can take to help the open access movement, and I end with these (quotations from pages 107-108 of the white paper are in italics):

1. The “some rights reserved” licensing schemes promoted by Creative Commons and Science Commons, which can be easily customized at their web sites.

Rhetoric and composition studies scholars are already using Creative Commons licenses on their weblogs, and several journals, including Kairos, Lore, The Writing Instructor, and Computers and Composition Online, allow authors to use Creative Commons licenses. Scholar and Feminist Online, while not a rhetoric journal, also allows Creative Commons licensing. Admittedly, these are all online journals and, as the common argument goes, they have nothing to lose by making this an option for authors. However, Parlor Press, which publishes print monographs, also has allowed for Creative Commons licensing. The move to license more scholarship under a some-rights-reserved model is still new, and it needs leadership within the discipline. Specifically, junior faculty and graduate students may be especially loath to ask publishers to give copyright back to them after a period of a few years, or to give them permission to archive a copy of the article or book on their personal web sites, or to use a Creative Commons license for the work. Junior scholars are in a position of vulnerability with publishers, which is why it is particularly important for senior colleagues in rhetoric and composition (as well as other fields) to publish their work in open-access journals that allow Creative Commons licenses and to state openly that access and copyright reform efforts led them to choose to publish in these journals.

Also, scholars can use the Author’s Addendum, published by the Scholarly Publishing and Academic Resources Coalition of the Association of Research Libraries, during copyright negotiations with publishers. The addendum is available at http://www.arl.org/sparc/author/addendum.html.

2. The Free Software Foundation’s GNU Free Documentation License, intended for use in “textbooks and teaching materials for all topics” and used as the license for Wikipedia entries;

In rhetoric and composition studies, Matt Barton’s open-access textbook comes to mind. He and students at St. Cloud State University co-wrote a rhetoric and composition textbook and published it at Wikibooks, and they continue to update it. The textbook is licensed under a GNU Free Documentation License. I would like to see more projects such as this one.

3. Numerous open access journals, such as those sponsored by the Public Library of Science (PLoS) (a list can be found at the Directory of Open Access Journals);

Open access journals in rhetoric and composition include Kairos, Enculturation, The Writing Instructor, Lore, Composition Forum, Across the Disciplines, and more. Support these journals by submitting work to them, reading them, linking to the articles on your weblogs, and citing their articles in your own work if applicable.

4. Efforts by universities, including the University of California and Harvard, to require their faculty to make copies of their scholarly articles available in open access repositories, and to provide the faculty technical assistance in doing so;

The University of Kansas has also joined the open access project with KU ScholarWorks, which “makes important research available to a wider audience and helps assure its long-term preservation” (online). The university passed a Resolution on Access to Scholarly Information in early 2005, and they strongly encourage faculty to keep copies of their publications in the repository.

5. Increased self-archiving by professors and other educators on personal or institutional web sites;
 
Several rhetoric and composition scholars already archive their publications on their personal sites; especially impressive examples are archives by Carolyn Miller, Charles Bazerman, and Michael Day. I would add that journal publisher Elsevier (whose general policies I am not endorsing) now allows authors to make and distribute copies of articles published in their journal for classroom use and for research colleagues. They also allow authors to post preprint copies of articles on their personal web sites, and they allow authors to post revised copies of articles on personal web sites as long as they are accompanied by a link to Elsevier’s web site. Authors have these rights automatically without having to ask Elsevier for them.

6. Multiple initiatives to make curricular materials, syllabi, and other educational content accessible to the general public, including Connexions, LionShare, MIT OpenCourseware, and the Berkman Center’s own H2O project; 
 
These initiatives are best carried out at the university level rather than the level of the discipline. However, rhetoric and composition scholars can contribute to this effort by serving on faculty senate and other university-level committees to set policy related to open access teaching materials.

7. Increased discussion of legal mandates for open access to research funded by government grants – effectively including most major biomedical research in the United States and Europe.

I would add that the Petition for Public Access to Publicly Funded Research in the United States, which would require open-access publication of all articles or books funded by the U.S. Federal Government, would help to create an archive of research available to the public. Over 24,000 people have signed the petition, available at http://publicaccesstoresearch.org.

RELEVANT SOURCES

“Author Rights: Using the SPARC Author Addendum to Secure Your Rights as the Author of a Journal Article.” 27 Apr. 2007 <http://www.arl.org/sparc/author/addendum.html>.

“Authors – Elsevier.” 27 Apr. 2007 <http://www.elsevier.com/wps/find/authorsview.authors/copyright#whatrights>.

Bazerman, Charles. “Charles Bazerman | UCSB | Homepage.” 27 Apr. 2007 <http://education.ucsb.edu/~bazerman/>.

Day, Michael. “Michael Day: Selected Webbed Publications.” 27 Apr. 2007   <http://www3.niu.edu/~tb0mxd1/pubs.html>.

Eidenmuller, Michael E. “American Rhetoric: Copyright Information.” 27 Apr. 2007 <http://americanrhetoric.com/copyrightinformation.htm>.

Fisher, William W., and William McGeveran. “The Digital Learning Challenge: Obstacles to Educational Uses of Copyrighted Material in the Digital Age.” 27 Apr. 2007 <http://cyber.law.harvard.edu/home/uploads/823/BerkmanWhitePaper_08-10-2006.pdf>.

“KU ScholarWorks: Home.” 27 Apr. 2007 <https://kuscholarworks.ku.edu/dspace/>.

Miller, Carolyn R. “Carolyn R. Miller: Publications.” 27 Apr. 2007 <http://www4.ncsu.edu/~crm/publications.htm>

“Petition for Public Access to Publicly Funded Research in the United States.” 27 Apr. 2007   <http://www.publicaccesstoresearch.org/>.

Reyman, Jessica. “Copyright, Distance Education, and the TEACH Act: Implications for Teaching Writing.” CCC 58:1 (2006): 30-45.

“Rhetoric and Composition – Wikibooks, Collection of Open-Content Textbooks.” 27 Apr. 2007  <http://en.wikibooks.org/wiki/Rhetoric_and_Composition>.

Clarity in an Online Course as an Extension of Onsite Practice

Submitted by Jessie Borgman, Western Michigan University, Lake Michigan College

This example addresses OWI Principle 4: “Appropriate onsite composition theories, pedagogies, and strategies should be migrated and adapted to the online instructional environment.”  More specifically, the practices suggested below relate to items 4.1 and 4.6 from the position statement: “When migrating from onsite modalities to the online environment, teachers should break their assignments, exercises, and activities into smaller units to increase opportunities for interaction between teacher and student” (4.1) and “Teachers should incorporate redundancy (e.g., reminders and repeated information) in the course’s organization. Such repetition acts like oral reminders in class” (4.6). I try to highlight here the ways in which my online practice is not just effective in and of itself, but how it derives in many ways from my onsite teaching practice.

Explanation of effective practice

The effective practice that I use in my online writing classrooms involves course clarity, in particular, easy course navigation. Clarity and ease of navigation are an extension of my face-to-face instruction, thus the connection to OWI Principle 4 regarding the migration of onsite pedagogies to the online environment.

I use elements from my face-to-face courses that were successful and re-think them to work in the online setting. In my face-to-face courses, I was a very organized instructor. On the first day of class, I handed out all of the course documents (syllabus, calendar, assignments, points breakdown) and students would have a clear picture of what they needed to do and when to do it, maximizing their chances for success in the course.

I spent the entire first class explaining all of the assignments and going over the due dates for the writing assignments. I would also discuss the course policies outlined in the syllabus. Many of these practices migrated from my face-to-face courses into my online courses. 

How to implement this practice

I have always felt that my ability to present my face-to-face writing courses early on to students from what I’d call the global perspective–i.e. how the course works as a whole–has been one of my strengths as an onsite teacher.  Laying out the guiding organizational principles for the course, in addition to delineating clear expectations early on, has helped my face-to-face students to see how smaller assignments scaffold major assignments and ultimately to stay on track in the course.  I have thus been very conscious of how to migrate these aspects of my teaching to the online environment.  I strive to create clarity and easy course navigation in my online writing courses in the following ways:

Visual Layout: I make sure that the visual layout  of each page is intuitive and does not include too many options; I keep it simple. Students can be easily overwhelmed in an online course, so I do everything that I can to simplify navigation. I do not include too many areas of the class, so students are not diverted from the major course modules. I also clearly label each area in the course menu.  In my community college courses, I use the labels “Home,” “Announcements,” “Modules,” and “Grades.”  In my four-year college courses, I use a course introduction and 3 modules. In my experience, four to five course menu items work well. The limited number of menu items keep relevant information accessible without overwhelming students with too many menu options (screenshots 1a and 1b).

Screenshot 1a – Clearly Labelled Areas of the Course

Screenshot 1b – Course Menu Items

Making Information Available from Beginning of the Term: I prefer to make all of the information for the course available at the start of the term, including due dates for assignments and points values, just as I did in my face-to-face teaching.  This practice helps to establish clear expectations early on, which is as important in the online environment as it is face-to-face, perhaps even more so.  Further, making expectations and due dates explicit early helps students feel prepared, and thus, I believe, more confident.  Finally, setting due dates for the entire semester allows students to  manage time effectively.  In the online setting, we do not have regular physical meetings to keep students  on track so I am not able to use face-to-face classroom time to ensure students  have completed coursework to that date.  Giving students materials early enables them to better schedule  their time while taking a course online (screenshot 2).

Screenshot 2 – Due Dates, Assignments, Point Values Visible at the Start of Term


Content Clarity:  I aim for clarity in online course materials (syllabus, calendar, assignments) by using basic formatting techniques, like chunking text.  I used these techniques to produce handouts that I would use for my face-to-face classes, but online, I was not just providing documents to students.  Instead, they were getting content in the LMS itself; therefore, I made the conscious choice to use features of the LMS editor to present information as clearly as possible (screenshot 3).

Screenshot 3 – Chunked Text in a Course Syllabus


Welcome Video: To replicate what I do in a face-to-face class on the first day to welcome students and orient them to the course, I use a welcome video in my online courses.  The video walks students through the course (where things are, what to click on) in order to  give them  a  tour  of  the layout. Here is a link to one of the welcome videos from one of my community college courses.

Color Coding: I color code the course calendar based on the activity the students are being asked to complete. I use orange for tasks like working on rough or final drafts of the writing assignments or researching for a paper.  I use green for reading assignments.  Pink indicates a discussion assignment.  Color coding is another way in which I can use the LMS to help students “see” aspects of the online class to replace the onsite practice of discussing individual assignments face-to-face and walking students through what happens when.  I want online students to feel as comfortable as face-to-face students do in terms of knowing exactly what is being asked of them (screenshots 4 and 5).

Screenshot 4 – Color-coded Course Calendar

Screenshot 5 – Color-coded Course Calendar


Organize Around Major Assignment Modules: In designing face-to-face classes, I organized a term around major essay assignments.  Students could identify how what we were doing in any individual class was related to a major assignment. Each activity would align vertically so that students would understand the connection between minor assignments and the larger course projects (helping to reduce the feeling that smaller projects were “mere busy-work”). Instead, my course design helps them to see how a discrete activity (like learning to use a database, for example) connects to the major assessment/assignment we are working towards.  I try to design and present my online classes using the same basic principle: organizing course modules around major assignments (screenshot 6).

Screenshot 6 – Use of Modules to Delineate Materials for Each Writing Assignment


Using a Blog Throughout a Research Writing Course

Submitted by Danica Hubbard, Professor of English, College of DuPage

This example addresses OWI Principle 3: “Appropriate composition teaching/learning strategies should be developed for the unique features of the online instructional environment.” The blog is a platform for ongoing conversation and reflection related to individual student research projects throughout a course. This in-practice example has been used in a community college setting in an online, primarily asynchronous, first-year composition course being delivered through Blackboard 9.1.

Explanation of effective practice

My practice involves having students in our first-year research writing course each start a blog in our course management system (Blackboard) early in the term to introduce themselves. Students are then required to revisit and update their blog as a way of collecting research material and reflecting on that material as the course unfolds. In addition to keeping their own research blog, students are required to view and comment on other student blogs. My use of the blog tool in this way helps students to keep research material organized, allows them to reflect on the research process as it unfolds, and helps to foster a sense of community in the online environment.   

In my experience, the blog tool is a good way for online students to collect, organize and reflect on research material. The blog commenting feature also makes it possible for students to read and respond to each other so that they can share research successes and frustrations. As such, blogs seem ideally suited to the online environment. They provide a kind of portfolio tool for students who could never otherwise deliver a physical portfolio to me as an instructor. Nor could they feasibly share a physical portfolio with others in the class. The blog tool allows them to do just this.

Since we use the blog on an ongoing basis throughout the course, I make it easily accessible from the main course menu in the course management system. This screenshot shows my online writing course menu in Blackboard. The link to student blogs is highly visible, rather than buried deeper in the course architecture (in a folder or individual unit in our course, for example).


Figure 1 – Link to Blogs in Course Menu

Early in the course, students are required to do an introductory post.  The assignment asks a series of five questions about their interests. The relatively informal questions tend to invite candid responses and students often discover shared interests with others in the class. The first blog post assignment also asks students to post a picture of themselves or an avatar image (a picture representing who they are in this class). The blog tool allows students to insert video or audio clips about their interests and include links to favorite websites. We are not necessarily focused on research just yet, but that will follow in subsequent blog assignments.

Below is a series of screenshots showing the “Introduce Yourself” blog entry assignment. Below the assignment instructions you can see a student’s introductory post and then an instructor comment.


Figure 2 – First Blog Post Assignment


Figure 3 – Student “Introduce Yourself” Blog Entry


Figure 4 – Instructor Comment

After the initial introductory post, assignments that require students to return to their blogs become much more focused on each student’s developing research project.

These blog assignments recur throughout our course, affording students the opportunity to update their research progress and to check in with one another to discuss research-related discoveries and frustrations. I will ask questions like these: Did your initial search yield too many general sources? Were you able to secure an interview with a professional in your field of research interest? Was the academic journal language difficult to understand?

Here is a screenshot of a typical assignment that asks students to return to their blog.


Figure 5 – Assignment Directing Students to Use Their Blog

This assignment occurs relatively early in the course, a couple of units after the “Introduce Yourself” assignment. It moves us beyond that introductory post and begins to focus students on questions about research and sources. These questions help me to uncover what students’ past experience with research is and what some of their biases might be.

This assignment, like others in the course, includes the invitation to students to read what classmates have written and respond: “What do you think? Why?” Again, the blog tool is well-suited to this kind of discussion-oriented approach to keeping a research portfolio. A more private research journal, for example, would only be viewable by an individual student and the instructor. It might organize entries effectively, but would not allow me to have students engage in dialog with each other about their research.

The following tips can help instructors to encourage active student blogging:

  1. Establish a rubric or sample blog for students to view.
  2. Assign points or credit for each blog response or a series of blog responses.
  3. Award “best blog comments” at the end of the semester.
  4. Utilize multiple venues to promote the research blogs such as the Announcement, Discussion Board and all class e-mail.  
  5. Emphasize brevity and simplicity — blogs should be informal and authentic. 
  6. Share graphics and links about the importance of student blogging.
  7. Emphasize digital citizenship — sharing and helping one another locate obscure source material, reviewing citations or changing research topic directions strengthens the class community.

The blog tool as I use it helps students to see how their writing and research progress and helps them to reflect on hurdles they face, like finding a topic. The fact that the blogs are open for viewing and commenting to each student means that research challenges can be shared. Sometimes students will share what they think is a useful research source, for example. In other cases, the commenting feature of the blog simply allows students to support one another and express shared experience.

Below is a screenshot that shows some back and forth dialog between students who have used the  “Comment” feature of the blog. The comments are not particularly long, nor are they written in a formal academic tone. On the contrary, they are friendly and supportive.

In an initial blog post, a student has mentioned the challenge of a research project seeming overwhelming, especially in the early stages. What follows is the commenting pictured below. One student comments that she also finds that research can sometimes feel “overwhelming” and suggests that taking frequent breaks can help make getting through material a bit easier. A student then responds with a quick “Thanks” and offers a suggestion for using a search engine effectively. This is followed by a comment in response, a final “Thanks” and the student indicates she may try the search advice provided by the earlier commenter.


Figure 6 – Blog Comments

The research advice is not necessarily profound. And there is no mechanism in the course to require the final commenter to actually try out the search advice provided by the earlier commenter. But this is not really the point. The idea is more to get students talking to each other, exchanging ideas, and building that sense of community that comes from sharing successes and challenges. Using the blog tool  enhances our sense of community in the online environment.

Here is a final series of screenshots that show a student post and then comments from classmates. At this point in the course, students are still refining their topics, paying particular attention to narrowing their research from broad topics down to manageable theses. They are also actively evaluating sources, differentiating fact from opinion, and considering what sources might be applicable to their topics. (One requirement for the research assignment is that students must use video/film of some kind, which is what this post begins with.)


Figure 7 – Blog Post About Ongoing Research


Figure 8 – Blog Post Comment


Figure 9 – Blog Post Comment

Here the commenter notes that finding specifically focused research material can be challenging–a challenge seemingly shared by others in the course. The student suggests using “specific keywords” when searching. Perhaps more valuable than this specific piece of research advice, however, is that via the blog tool and its commenting feature, students see that their individual research challenges are shared by others.

Challenge this practice addresses

The blog tool as I use it allows students to organize research material and reflect on it throughout our composition course. The blog acts in the way a physical research portfolio might but offers us the digital equivalent, ideal for use in the entirely online setting.

More than just acting as a digital portfolio, though, the blog tool as I use it facilitates discussion among online students: discussion that becomes more focused on each student’s developing research project as our course unfolds. I find the Introduction blog a great starting point to open the lines of communication and get the class “buzzing.” Communicating online can be difficult because students may feel vulnerable, experience writer’s block or believe they do not have common experiences to share. However, the blog reinforces my commitment to encouraging group interaction. Students contribute constructively to the group and share some of their personal experience – this forms an important bond of trust. Once the discussion begins, students often reveal their research-related hurdles and successes as they progress from assignment to assignment in the course. In other words, in addition to the blog allowing a student to develop a nicely organized research portfolio, it also affords the opportunity for students to become part of a community–not necessarily an easy thing to do in the entirely online environment.

The practice of establishing and maintaining an Introduction Blog is within the theoretical framework of the Community of Inquiry (CoI). The CoI Model presents a process of creating a deep and meaningful (collaborative-constructivist) learning experience through the development of three interdependent elements:  social, cognitive and teaching presence. Social presence is “the ability of participants to identify with the community, communicate purposefully in a trusting environment, and develop inter-personal relationships by way of projecting their individual personalities” (Swan, 2009). Teaching presence is “the design, facilitation and direction of cognitive and social processes for the purpose of realizing personally meaningful outcomes. Cognitive presence is the extent to which learners are able to construct and confirm reflection and discourse” (Anderson, Rourke, Garrison & Archer, 2001).

Anderson, T. Rourke, L., Garrison, D.  R., & Archer, W. (2001). Assessing teaching presence in a computer conferencing context. Journal of Asynchronous Learning Networks, 5(2), 1-17.  Retrieved September 6, 2011 from  http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.95.9117&rep=rep1&type=pdf

Anderson, T. (2007).  Social and cognitive presence in virtual learning environments. [PowerPoint slides]. Retrieved September 6, 2011 from http://www.slideshare.net/terrya/social-and-cognitive-presence-in-virtual-learning-environments

Garrison, D. R., Anderson, T., & Archer, W. (2000). Critical inquiry in a text-based environment: Computer conferencing in higher education. The Internet and Higher Education, 2(2-3), 87-105.

Garrison, R. Anderson, T., & Archer, W. (2003). A theory of critical inquiry in online distance education. In M.G. Moore & W.G. Anderson (Eds.), Handbook of Distance Education, 113-127. Mahwah, NJ: Erlbaum.
http://communitiesofinquiry.com/model

Garrison, D. R., & Anderson, T. (2003). E-learning in the 21st century: A framework for research and practice. London: Routledge/Falmer.

Swan, K., Garrison, D. R. & Richardson, J. C. (2009). A constructivist approach to online learning: the Community of Inquiry framework. In Payne, C. R. (Ed.) Information Technology and Constructivism in Higher Education: Progressive Learning Frameworks. Hershey, PA: IGI Global, 43-57.

How to implement this practice

How to Create a Blog



Creating and Editing a Blog Entry



When creating a blog, start by asking interesting open-ended questions that allow for feedback and reflection.

To begin a new blog:

  1. Click on the tab “Create Blog Entry.”  Each blog entry will be time stamped and dated for ease in archiving. 
  2. Use the “Blog Instructions” tab to insert instructions for students including a possible due date, expectations and examples.  You can start the thread to establish the conversation or encourage students to begin the thread. 
  3. Manage the posts by using the “delete” and “availability” tabs in Blackboard.  You can change the Blog settings at any time. 
  4. Provide comments to your students and encourage feedback amongst your students.  Students can view each post by default or you can change the privacy or group settings.  You can also categorize the blog posts in order for students to easily find the posts they are most interested in. 
  5. Insert links within blog posts for reference to related websites or references.  You may also provide a picture library to store photos or images of interest.

Blackboard 9.1 includes a blog tool as do most learning management systems. No additional tools, accounts, or applications are required.  There are, however, many stand-alone blogging tools available, most of them free but requiring account creation and sign-up. Some of these blog tools include Google’s Blogger or open source software WordPress.

Renew Your Membership

Join CCCC today!
Learn more about the SWR book series.
Connect with CCCC
CCCC on Facebook
CCCC on LinkedIn
CCCC on Twitter
CCCC on Tumblr
OWI Principles Statement
Join the OWI discussion

Copyright

Copyright © 1998 - 2025 National Council of Teachers of English. All rights reserved in all media.

1111 W. Kenyon Road, Urbana, Illinois 61801-1096 Phone: 217-328-3870 or 877-369-6283

Looking for information? Browse our FAQs, tour our sitemap and store sitemap, or contact NCTE

Read our Privacy Policy Statement and Links Policy. Use of this site signifies your agreement to the Terms of Use