Difference between revisions of "Resource: Hacking the Academy"
From Lyndsey Twining
Line 15: | Line 15: | ||
==Table of Contents== | ==Table of Contents== | ||
− | ::Introductions | + | ::'''Introductions''' |
#Preface | #Preface | ||
− | #Why "Hacking"?<br/><br/>Hacking Scholarship<br/> | + | #Why "Hacking"?<br/><br/>'''Hacking Scholarship'''<br/> |
#Getting Yourself Out of the Business in Five Easy Steps | #Getting Yourself Out of the Business in Five Easy Steps | ||
#Burn the Boats/Books | #Burn the Boats/Books | ||
Line 28: | Line 28: | ||
#Voices: Sharing One's Research | #Voices: Sharing One's Research | ||
#Making Digital Scholarship Count | #Making Digital Scholarship Count | ||
− | #Theory, Method, and Digital Humanities<br/><br/>Hacking Teaching<br/> | + | #Theory, Method, and Digital Humanities<br/><br/>'''Hacking Teaching'''<br/> |
#Dear Students | #Dear Students | ||
#Lectures are Bullshit | #Lectures are Bullshit | ||
Line 39: | Line 39: | ||
#Voices: Learning Management Systems | #Voices: Learning Management Systems | ||
#Hacking the Dissertation | #Hacking the Dissertation | ||
− | #How to Read a Book in One Hour<br/><br/>Hacking Institutions<br/> | + | #How to Read a Book in One Hour<br/><br/>'''Hacking Institutions'''<br/> |
#The Absent Presence: A Conversation | #The Absent Presence: A Conversation | ||
#Uninvited Guests: Twitter at Invitation-Only Events | #Uninvited Guests: Twitter at Invitation-Only Events | ||
Line 49: | Line 49: | ||
#Interdisciplinary Centers and Spaces | #Interdisciplinary Centers and Spaces | ||
#Take an Elective | #Take an Elective | ||
− | #Voices: Interdisciplinarity<br/><br/>Cautions<br/> | + | #Voices: Interdisciplinarity<br/><br/>'''Cautions'''<br/> |
#An Open Letter to the Forces of Change | #An Open Letter to the Forces of Change | ||
#The Trouble with Digital Culture | #The Trouble with Digital Culture |
Latest revision as of 10:03, 23 April 2019
Hacking the Academy - New Approaches to Scholarship and Teaching from Digital Humanities | |
Title | Hacking the Academy - New Approaches to Scholarship and Teaching from Digital Humanities |
---|---|
Author/Editor | Cohen, Daniel J. & Tom Scheinfeldt (Eds.) |
Year | 2013 |
Publisher | University of Michigan Press |
Summary
There are five sections: Introductions, Hacking Scholarship, Hacking Teaching, Hacking Institutions, Cautions
Useful Content
Table of Contents
- Introductions
- Preface
- Why "Hacking"?
Hacking Scholarship - Getting Yourself Out of the Business in Five Easy Steps
- Burn the Boats/Books
- Reinventing the Academic Journal
- Reading and Writing
- Voices: Blogging
- The Crisis of Audience and the Open-Access Solution
- Open-Access Publishing
- Open Access and Scholarly Values: A Conversation
- Voices: Sharing One's Research
- Making Digital Scholarship Count
- Theory, Method, and Digital Humanities
Hacking Teaching - Dear Students
- Lectures are Bullshit
- From Knowledge to Knowledge-able
- Voices: Classroom Engagement
- Digital Literacy and the Undergraduate Curriculum
- What's Wrong with Writing Essays: A Conversation
- Assessment versus Innovation
- A Personal Cyberinfrastructure
- Voices: Learning Management Systems
- Hacking the Dissertation
- How to Read a Book in One Hour
Hacking Institutions - The Absent Presence: A Conversation
- Uninvited Guests: Twitter at Invitation-Only Events
- Unconferences
- Voices: Twitter at Conferences
- The Entropic Library
- The Wrong Business for Libraries
- Reimaginging Academic Archives
- Interdisciplinary Centers and Spaces
- Take an Elective
- Voices: Interdisciplinarity
Cautions - An Open Letter to the Forces of Change
- The Trouble with Digital Culture
Review
- The section on Hacking Teaching looks super interesting!