Search results
1 – 10 of over 1000Esra Istek and Chinaza Solomon Ironsi
Given the persistent receptive skills challenges faced by language learners and the numerous merits of using technologically-enhanced learning in the form of mobile-assisted…
Abstract
Purpose
Given the persistent receptive skills challenges faced by language learners and the numerous merits of using technologically-enhanced learning in the form of mobile-assisted language learning in language teaching, this study decides to incorporate a context-analysis-practice-exploration lesson-planning framework with mobile learning to improve the receptive skills of learners. This step is necessary on the recommendation by scholarly research that while implementing technology, teacher training, digital literacy and expertise, incorporating good teaching practices and lesson planning frameworks may assist in yielding positive results.
Design/methodology/approach
This study decides to utilize a mixed-method research design through an experimental approach to elicit information from 90 EFL students concerning the effectiveness of incorporating the context-analysis-practice-exploration framework in a mobile-leaning mode instructional delivery to improve their reading and listening skills.
Findings
After collecting and analyzing data, the study found that while the participants perceived enhanced-mobile learning to make lessons enjoyable, integrating this framework and m-learning improved their reading skills. This study used notable findings to make pedagogical conclusions on the objective of this study.
Originality/value
This study contributes through empirical evidence on the effectiveness of incorporating mobile learning and a responsive lesson planning framework towards improving English as a foreign language learners' learning outcome. Besides, this study is the first to probe and unpack the effectiveness of a responsive lesson-planning framework in language education.
Details
Keywords
Ayodeji E. Oke and Seyi S. Stephen
In the effort to procure solutions to emerging challenges faced in the construction industry, construction stakeholders implemented the use of several technologies in construction…
Abstract
In the effort to procure solutions to emerging challenges faced in the construction industry, construction stakeholders implemented the use of several technologies in construction operations from the onset of project planning to completion. Cyber technology introduced into construction brought about the inclusion of wearable technology, mobile devices, apps, project management software, drones, 3D printers, robotics, etc. to enhance output as the industry tends towards that which is sustainable. This chapter identified benefits, barriers and other related cyber technology interactions within the scope of delivering projects that are of standard, budget and quality at the same time. The conclusion gave a summary of the whole chapter for further comprehension.
Details
Keywords
Sigi Goode and Amir Riaz
It is becoming easier for end-users to modify their information system, sometimes against the wishes of management or the original manufacturer. In the mobile device context…
Abstract
Purpose
It is becoming easier for end-users to modify their information system, sometimes against the wishes of management or the original manufacturer. In the mobile device context, “modding”, “jailbreaking” or “rooting” allows a mobile phone user to select operating software and network providers other than those mandated by the original provider. Prior studies have theorised that modders and non-modders possess different perspectives on the relationship between them and their device provider. However, these differences have not been empirically demonstrated in prior work. This paper aims to test theoretical pathways to explain the behavioural relationship effects of security within the modding context.
Design/methodology/approach
This study models four relationship conceptualisations from prior research. The study tests this model using a survey of 464 mobile device users to compare the user attitudes of modders and non-modders.
Findings
Modder and non-modder relationships differ. Both groups value security, but in different ways: modder relationships are governed by satisfaction and commitment, while non-modder relationships are governed more by trust.
Originality/value
To the best of the authors’ knowledge, this is the first study to empirically demonstrate the relationship differences between IS modifiers and non-modifiers. Most published work has focused on IS that are unmodified. Incorporating device modification may improve behavioural understanding of end-users.
Details
Keywords
Hao Chen and Yufei Yuan
Protection motivation theory (PMT) explains that the intention to cope with information security risks is based on informed threat and coping appraisals. However, people cannot…
Abstract
Purpose
Protection motivation theory (PMT) explains that the intention to cope with information security risks is based on informed threat and coping appraisals. However, people cannot always make appropriate assessments due to possible ignorance and cognitive biases. This study proposes a research model that introduces four antecedent factors from ignorance and bias perspectives into the PMT model and empirically tests this model with data from a survey of electronic waste (e-waste) handling.
Design/methodology/approach
The data collected from 356 Chinese samples are analyzed via structural equation modeling (SEM).
Findings
The results revealed that for threat appraisal, optimistic bias leads to a lower perception of risks. However, factual ignorance (lack of knowledge of risks) does not significantly affect the perceived threat. For coping appraisal, practical ignorance (lack of knowledge of coping with risks) leads to low response efficacy and self-efficacy and high perceptions of coping cost, but the illusion of control overestimates response efficacy and self-efficacy.
Originality/value
First, this study addresses a new type of information security problem in e-waste handling. Second, this study extends the PMT model by exploring the roles of ignorance and bias as antecedents. Finally, the authors reinvestigate the basic constructs of PMT to identify how rational threat and coping assessments affect user intentions to cope with data security risks.
Details
Keywords
Mohammed Abbas and Adnan Alghail
The mobile shadow information technology (IT) phenomenon is both completely misunderstood and negatively explored by those participating inside the organizational ecosystem. It…
Abstract
Purpose
The mobile shadow information technology (IT) phenomenon is both completely misunderstood and negatively explored by those participating inside the organizational ecosystem. It represents all internet-based software, any other solutions for communications or employees’ sharing without any formal authorization or approval from the IT department. Such behavior can lead to a security breach of the organization’s data privacy, as these risks could disseminate it without the organization fully knowing. Recent research identifies that shadow IT is rarely covered from the knowledge sharing and knowledge protection (KP) perspective. This paper aims to provide an insight on how mobile shadow IT as a phenomenon could impact KP of an organization as a whole.
Design/methodology/approach
This is an exploratory study based on a qualitative approach. The authors conducted interviews with 11 IT users to answer the main research question. The interview guidelines were divided into three parts: types of mobile shadow IT and occurrence; KP nature in the workplace; and mobile shadow IT impact on KP.
Findings
The research findings identified that most interviewees use mobile shadow IT without any notice or permission from their IT departments. This sharing also negatively impacts the KP in the organization. The most common mobile shadow IT applications are the clouded type like Dropbox, Google Drive and WhatsApp. Interviewees are using mobile shadow IT mainly because organizations do not provide suitable tools to communicate efficiently. The authors concluded that mobile shadow IT harms KP with no security and privacy on what is being shared because this process is unmonitored by the organization.
Practical implications
For adequate knowledge and data protection, IT departments need to take more actions and efforts. This study can help IT decision-makers cope with the technology changes while understanding mobile shadow IT impacts. This study also offers insight regarding types of applications that can be used as an alternative tool for employees rather than using unauthorized applications. This research shows that medium-sized organizations are free to use these applications, which can cause damage to organizations.
Originality/value
This research is arguably among the first to explore the interviewees’ perspectives on how mobile shadow IT impacts KP. This paper also provides theoretical and practical insights by identifying the three primary constructs and how mobile shadow IT usage can affect KP.
Details
Keywords
Zhiqin Lu, Peng Li, Qinghai Li and Heng Zhang
This paper according to the logic of the “digital access divide--digital capability divide--digital outcome divide” aims to systematically discuss the impact of the digital divide…
Abstract
Purpose
This paper according to the logic of the “digital access divide--digital capability divide--digital outcome divide” aims to systematically discuss the impact of the digital divide on individual happiness in China, accounting for the variations that exist across different groups, as well as the corresponding mechanisms.
Design/methodology/approach
This paper presents cross-sectional analyses of the relationship between the digital divide and individual happiness in China. The analyses are based on data from the Chinese General Social Survey 2017, which academic institutions run on the Chinese Mainland. This database contains information on respondents' Internet access, skills and consequences of use, which can measure the digital divide of Chinese individuals at three levels.
Findings
First, individual happiness declined when they experienced the digital access divide in China. For the digital capability divide, the lower the usage skills, the more individual happiness declined. When analyzing the digital outcome divide, the greater the negative consequences, the more individual happiness declined. Second, the impacts of digital access, capability and outcome divide vary according to age, gender, education degrees, hukou, region and sub-dimensions. Third, the digital access and capability divide reduce individuals' happiness by lowering their self-rated social and economic status, whereas the digital outcome divide reduce individual happiness by lowering their fairness perception and social trust.
Originality/value
The authors believe that this is the first study to examine the impact and its variations among different groups of the three-level digital divide on individual happiness, as well as its mechanisms.
Details
Keywords
Leading up to and now living amid the Covid-19 pandemic, teachers are faced with strong incentives, even pressure to adopt and use digital technologies. Previous research has…
Abstract
Leading up to and now living amid the Covid-19 pandemic, teachers are faced with strong incentives, even pressure to adopt and use digital technologies. Previous research has focused on teaching with digital technologies as a matter of believing in their importance and receiving specific preparation for integration strategies. Further, teaching with technologies must appear “seamless” during instruction to not distract from what is regarded to be the more important subject matter knowledge. In this chapter, I review and problematize digital instruction focused on convincing teachers to integrate strategies that use digital technologies in a “seamless” way and then propose an alternative view emphasizing posthumanist, relational views of integrating digital technologies.
Details
Keywords
Shekhar Ashok Pawar and Hemant Palivela
Purpose: Small and medium enterprises (SMEs) are the most significant contributors to maximum employment generation, the gross domestic product (GDP) of many countries, and the…
Abstract
Purpose: Small and medium enterprises (SMEs) are the most significant contributors to maximum employment generation, the gross domestic product (GDP) of many countries, and the overall global economy. It is also evident that cyber threats are becoming a big challenge for SMEs, which is directly impacting global economy.
Methodology: Existing research inputs were accessed to understand current cyber threats for SMEs and their cybersecurity posture. Additionally, this research has collected the latest insights by taking direct inputs from SMEs and conducting a well-designed research survey. It has provided a few direct inputs to designing solutions for the SME segment. For analysis and recommendations, cybersecurity best practices and core cybersecurity concepts are considered at the centre of the solution.
Findings: Implementing existing cybersecurity standards or frameworks is not easy for SMEs, as they generally have limited resources and different priorities for their business when it comes to the implementation of any cybersecurity controls. Currently, many cybersecurity standards are not able to support the implementation of business domain-specific controls.
Practical implications: Along with the research findings shared in this chapter, as a resolution to the problems faced by SMEs, the authors will propose a new framework as a solution. This framework is designed using core concepts of cybersecurity such as confidentiality, integrity, and availability (CIA triad) as well as defence in depth (DiD) mechanisms in each layer of organisation. The authors will also share a high-level idea about how reliable artificial intelligence-based software can help identify recommended controls for particular SMEs.
Details