Search results
11 – 20 of over 13000Janak Adhikari, Chris Scogings, Anuradha Mathrani and Indu Sofat
The purpose of this paper is to seek answers to questions on how equity of information literacy and learning outcomes have evolved with the ongoing advances in technologies in…
Abstract
Purpose
The purpose of this paper is to seek answers to questions on how equity of information literacy and learning outcomes have evolved with the ongoing advances in technologies in teaching and learning across schools. The authors’ report on a five-year long bring your own device (BYOD) journey of one school, which was one of the earliest adopters of one-to-one learning devices in New Zealand.
Design/methodology/approach
Using a socio-cultural ecological lens for analysis, a longitudinal study has investigated aspects of how digital/information literacy, computer self-efficacy, and nature of technology usage are transforming school and classroom curriculum practices.
Findings
Findings of this study reveal a significant shift in social and academic boundaries between formal and informal learning spaces. One-to-one learning devices provide the link between school and home, as students take more ownership of their learning, and teachers become facilitators. Curricula changes and proper technological support systems introduced in the school structures have given agency to students resulting in greater acceptance of the BYOD policy and extensions to learning beyond formal classroom spaces. Digital divide amongst learners has evolved beyond equity in access and equity in capabilities to become more inclusive, thereby paving the way for equity in learning outcomes.
Research limitations/implications
This study has been conducted in a school which is located in a relatively high socio-economic region. To achieve a more holistic view, there is a need for further studies to be conducted in schools from low socio-economic communities.
Originality/value
This paper adds to the existing literature by sharing teacher reflections on their use of innovative pedagogies to bring changes to classroom curricular practice.
Details
Keywords
Brianna Bernadette Buljung and Karen Gale Cooper
This paper aims to describe the technology petting zoo developed and hosted by the National Defense University Library. It highlights the poster presentation given at the Special…
Abstract
Purpose
This paper aims to describe the technology petting zoo developed and hosted by the National Defense University Library. It highlights the poster presentation given at the Special Libraries Association Conference held in Chicago on July 17, 2012. The project was voted best poster by attendees to the session.
Design/methodology/approach
Faced with a bring‐your‐own‐device (BYOD) environment, NDU librarians implemented a technology petting zoo to inform patrons about the availability of the library's resources on personal computing devices. They overcame technology and security issues inherent in the NDU computing environment, and used the event to connect patrons directly with the library's downloadable electronic resources.
Findings
The event was successful, with more than 80 patrons in attendance. Through the experience, staff acquired knowledge and experience to better serve patrons with inquiries about online and downloadable materials. Patrons and library staff learned to use personal computers and devices to access library materials, especially downloadable ebooks, remotely.
Practical implications
The petting zoo model changed the way NDU staff and patrons interact with downloadable resources. Successfully hosting a zoo event is especially difficult in federal settings, but the NDU team established the means of supporting off‐site access while observing regulations.
Originality/value
This project has value for government libraries because it leverages the increasingly popular BYOD environment to connect patrons to important resources. The paper also has broad applications in the corporate sector because many corporate libraries are also working to facilitate increasing access to library resources within stringent security guidelines.
Details
Keywords
Anne Nortcliffe and Andrew Middleton
Research into the autonomous use of MP3 audio recorders by students in UK higher education demonstrated that students were innovative in their autonomous use of the devices. They…
Abstract
Research into the autonomous use of MP3 audio recorders by students in UK higher education demonstrated that students were innovative in their autonomous use of the devices. They used them to capture learning conversations from formal and informal situations to personalise and enhance their learning. However, today smartphones and other smart devices have replaced the necessity for students to carry multiple mobile devices including MP3 recorders. This chapter builds upon the earlier work and presents a small qualitative study into how students are autonomously using their smart devices to support their learning. The research explores the hypothesis that students are being innovative in the ways in which they are using their smart devices to support their formal and informal learning. The study involved five students who own smart devices who were invited to discuss their ownership of smartphone and tablet technologies and the ways they used them in their studies. The students first completed a short questionnaire and were then interviewed in small groups. The results agree with previous research into student use of smart devices and describe autonomous engagement facilitated by personally owned smart technologies. The study identifies continuous patterns of pervasive engagement by students and concludes that more thought should be given to disruptive innovation, digital literacy and employability.
Aurelie Leclercq-Vandelannoitte
The purpose of this paper is to provide useful insights on “bring your own device” (BYOD) and IT consumerization, to help organizations understand how to address their…
Abstract
Purpose
The purpose of this paper is to provide useful insights on “bring your own device” (BYOD) and IT consumerization, to help organizations understand how to address their consequences. For young, tech-savvy workers, using their own devices at work represents a right, rather than a privilege, leading them to initiate a growing, yet under-researched, drive toward IT consumerization. Some companies already deploy BYOD programs, allowing employees to use personal devices for work-related activities, but other managers remain hesitant of the implications of such programs.
Design/methodology/approach
To provide an overview of this growing phenomenon, this paper presents an in-depth analysis of existing literature and identifies organizational changes induced by this reversed adoption logic. A case study of Volvo reveals how one organization has coped successfully with this phenomenon.
Findings
These analyses shed more light on the stakes involved in BYOD and IT consumerization, as well as the changes they imply for organizations and IT departments.
Practical implications
Both BYOD and IT consumerization have deep and broad consequences for organizations, some of which are very positive, as long as the trends are well-managed and carefully addressed.
Originality/value
This paper covers a topic that has attracted scant attention in prior academic research, despite widely acknowledged concerns about security and reliability in practitioner studies. By going beyond a classic discourse focused solely on the security threats of BYOD, this paper investigates both business challenges and implications associated with a reversed adoption logic.
Details
Keywords
Melina Seedoyal Doargajudhur and Peter Dell
Bring your own device (BYOD) refers to employees utilizing their personal mobile devices to perform work tasks. Drawing on the job demands-resources (JD-R) model and the…
Abstract
Purpose
Bring your own device (BYOD) refers to employees utilizing their personal mobile devices to perform work tasks. Drawing on the job demands-resources (JD-R) model and the task-technology fit (TTF) model, the purpose of this paper is to develop a model that explains how BYOD affects employee well-being (through job satisfaction), job performance self-assessment, and organizational commitment through perceived job autonomy, perceived workload and TTF.
Design/methodology/approach
Survey data from 400 full-time employees in different industry sectors in Mauritius were used to test a model containing 13 hypotheses using confirmatory factor analysis and structural equation modeling.
Findings
The SEM results support the hypothesized model. Findings indicate that BYOD indirectly affects job satisfaction, job performance and organizational commitment via job demands (perceived workload), job resources (perceived job autonomy) and TTF. Further, job resources influences job demands while TTF predicted job performance. Finally, job satisfaction and job performance self-assessment appear to be significant determinants of organizational commitment.
Practical implications
The findings are congruent with the JD-R and TTF models, and confirm that BYOD has an impact on job satisfaction, job performance self-assessment and organizational commitment. This could inform organizations’ policies and practices relating to BYOD, leading to improved employee well-being, performance and higher commitment.
Originality/value
The expanded model developed in this study explains how employee well-being, performance and organizational commitment are affected by BYOD, and is one of the first studies to investigate these relationships.
Details
Keywords
Aurélie Leclercq - Vandelannoitte
In reference to increasing consumerization, this article investigates how organizations react to employees’ adoption and use of personal devices at work, such as by incorporating…
Abstract
Purpose
In reference to increasing consumerization, this article investigates how organizations react to employees’ adoption and use of personal devices at work, such as by incorporating innovative, individual, IT-driven changes into their corporate practices. The paper aims to discuss these issues.
Design/methodology/approach
Four in-depth, longitudinal case studies, conducted between 2006 and 2010, feature 92 interviews and observations to ensure triangulation.
Findings
We identify three types of organizational reactions (induction, normalization, and regulation) that depend on specific dimensions and affect the nature of subsequent IT-based organizational change.
Research limitations/implications
Continued research into the consumerization of IT can explore how it affects organizations today and whether different effects might arise in other contexts and with different kinds of organizations.
Practical implications
Reversed IT adoption logics have deep consequences for organizations; companies could achieve great gains from them, if carefully considered and managed.
Originality/value
This article addresses a topic that has been analyzed only scarcely and rarely, namely, the consumerization of IT and the tactics organizations use to incorporate user-driven IT innovation. Although this article presents only a few cases, it constitutes an initial attempt to explore this research area theoretically and investigate the ways organizations can harness employees’ personal IT adoption logics to promote creative, IT-driven change in firms.
Details
Keywords
J Aruna Santhi and T Vijaya Saradhi
This paper tactics to implement the attack detection in medical Internet of things (IoT) devices using improved deep learning architecture for accomplishing the concept bring your…
Abstract
Purpose
This paper tactics to implement the attack detection in medical Internet of things (IoT) devices using improved deep learning architecture for accomplishing the concept bring your own device (BYOD). Here, a simulation-based hospital environment is modeled where many IoT devices or medical equipment are communicated with each other. The node or the device, which is creating the attack are recognized with the support of attribute collection. The dataset pertaining to the attack detection in medical IoT is gathered from each node that is considered as features. These features are subjected to a deep belief network (DBN), which is a part of deep learning algorithm. Despite the existing DBN, the number of hidden neurons of DBN is tuned or optimized correctly with the help of a hybrid meta-heuristic algorithm by merging grasshopper optimization algorithm (GOA) and spider monkey optimization (SMO) in order to enhance the accuracy of detection. The hybrid algorithm is termed as local leader phase-based GOA (LLP-GOA). The DBN is used to train the nodes by creating the data library with attack details, thus maintaining accurate detection during testing.
Design/methodology/approach
This paper has presented novel attack detection in medical IoT devices using improved deep learning architecture as BYOD. With this, this paper aims to show the high convergence and better performance in detecting attacks in the hospital network.
Findings
From the analysis, the overall performance analysis of the proposed LLP-GOA-based DBN in terms of accuracy was 0.25% better than particle swarm optimization (PSO)-DBN, 0.15% enhanced than grey wolf algorithm (GWO)-DBN, 0.26% enhanced than SMO-DBN and 0.43% enhanced than GOA-DBN. Similarly, the accuracy of the proposed LLP-GOA-DBN model was 13% better than support vector machine (SVM), 5.4% enhanced than k-nearest neighbor (KNN), 8.7% finer than neural network (NN) and 3.5% enhanced than DBN.
Originality/value
This paper adopts a hybrid algorithm termed as LLP-GOA for the accurate detection of attacks in medical IoT for improving the enhanced security in healthcare sector using the optimized deep learning. This is the first work which utilizes LLP-GOA algorithm for improving the performance of DBN for enhancing the security in the healthcare sector.
Details
Keywords
Alessandro Aldini, Jean-Marc Seigneur, Carlos Ballester Lafuente, Xavier Titi and Jonathan Guislain
The Bring-Your-Own-Device (BYOD) paradigm favors the use of personal and public devices and communication means in corporate environments, thus representing a challenge for the…
Abstract
Purpose
The Bring-Your-Own-Device (BYOD) paradigm favors the use of personal and public devices and communication means in corporate environments, thus representing a challenge for the traditional security and risk management systems. In this dynamic and heterogeneous setting, the purpose of this paper is to present a methodology called opportunity-enabled risk management (OPPRIM), which supports the decision-making process in access control to remote corporate assets.
Design/methodology/approach
OPPRIM relies on a logic-based risk policy model combining estimations of trust, threats and opportunities. Moreover, it is based on a mobile client – server architecture, where the OPPRIM application running on the user device interacts with the company IT security server to manage every access request to corporate assets.
Findings
As a mandatory requirement in the highly flexible BYOD setting, in the OPPRIM approach, mobile device security risks are identified automatically and dynamically depending on the specific environment in which the access request is issued and on the previous history of events.
Originality/value
The main novelty of the OPPRIM approach is the combined treatment of threats (resp., opportunities) and costs (resp., benefits) in a trust-based setting. The OPPRIM system is validated with respect to an economic perspective: cost-benefit sensitivity analysis is conducted through formal methods using the PRISM model checker and through agent-based simulations using the Anylogic framework.
Details