Search results

11 – 20 of over 13000
Article
Publication date: 7 August 2017

Janak Adhikari, Chris Scogings, Anuradha Mathrani and Indu Sofat

The purpose of this paper is to seek answers to questions on how equity of information literacy and learning outcomes have evolved with the ongoing advances in technologies in…

1890

Abstract

Purpose

The purpose of this paper is to seek answers to questions on how equity of information literacy and learning outcomes have evolved with the ongoing advances in technologies in teaching and learning across schools. The authors’ report on a five-year long bring your own device (BYOD) journey of one school, which was one of the earliest adopters of one-to-one learning devices in New Zealand.

Design/methodology/approach

Using a socio-cultural ecological lens for analysis, a longitudinal study has investigated aspects of how digital/information literacy, computer self-efficacy, and nature of technology usage are transforming school and classroom curriculum practices.

Findings

Findings of this study reveal a significant shift in social and academic boundaries between formal and informal learning spaces. One-to-one learning devices provide the link between school and home, as students take more ownership of their learning, and teachers become facilitators. Curricula changes and proper technological support systems introduced in the school structures have given agency to students resulting in greater acceptance of the BYOD policy and extensions to learning beyond formal classroom spaces. Digital divide amongst learners has evolved beyond equity in access and equity in capabilities to become more inclusive, thereby paving the way for equity in learning outcomes.

Research limitations/implications

This study has been conducted in a school which is located in a relatively high socio-economic region. To achieve a more holistic view, there is a need for further studies to be conducted in schools from low socio-economic communities.

Originality/value

This paper adds to the existing literature by sharing teacher reflections on their use of innovative pedagogies to bring changes to classroom curricular practice.

Details

The International Journal of Information and Learning Technology, vol. 34 no. 4
Type: Research Article
ISSN: 2056-4880

Keywords

Article
Publication date: 1 March 2013

Brianna Bernadette Buljung and Karen Gale Cooper

This paper aims to describe the technology petting zoo developed and hosted by the National Defense University Library. It highlights the poster presentation given at the Special…

Abstract

Purpose

This paper aims to describe the technology petting zoo developed and hosted by the National Defense University Library. It highlights the poster presentation given at the Special Libraries Association Conference held in Chicago on July 17, 2012. The project was voted best poster by attendees to the session.

Design/methodology/approach

Faced with a bringyourowndevice (BYOD) environment, NDU librarians implemented a technology petting zoo to inform patrons about the availability of the library's resources on personal computing devices. They overcame technology and security issues inherent in the NDU computing environment, and used the event to connect patrons directly with the library's downloadable electronic resources.

Findings

The event was successful, with more than 80 patrons in attendance. Through the experience, staff acquired knowledge and experience to better serve patrons with inquiries about online and downloadable materials. Patrons and library staff learned to use personal computers and devices to access library materials, especially downloadable ebooks, remotely.

Practical implications

The petting zoo model changed the way NDU staff and patrons interact with downloadable resources. Successfully hosting a zoo event is especially difficult in federal settings, but the NDU team established the means of supporting off‐site access while observing regulations.

Originality/value

This project has value for government libraries because it leverages the increasingly popular BYOD environment to connect patrons to important resources. The paper also has broad applications in the corporate sector because many corporate libraries are also working to facilitate increasing access to library resources within stringent security guidelines.

Details

Library Hi Tech News, vol. 30 no. 1
Type: Research Article
ISSN: 0741-9058

Keywords

Open Access

Abstract

Details

Learning and Teaching in Higher Education: Gulf Perspectives, vol. 10 no. 2
Type: Research Article
ISSN: 2077-5504

Book part
Publication date: 25 January 2013

Anne Nortcliffe and Andrew Middleton

Research into the autonomous use of MP3 audio recorders by students in UK higher education demonstrated that students were innovative in their autonomous use of the devices. They…

Abstract

Research into the autonomous use of MP3 audio recorders by students in UK higher education demonstrated that students were innovative in their autonomous use of the devices. They used them to capture learning conversations from formal and informal situations to personalise and enhance their learning. However, today smartphones and other smart devices have replaced the necessity for students to carry multiple mobile devices including MP3 recorders. This chapter builds upon the earlier work and presents a small qualitative study into how students are autonomously using their smart devices to support their learning. The research explores the hypothesis that students are being innovative in the ways in which they are using their smart devices to support their formal and informal learning. The study involved five students who own smart devices who were invited to discuss their ownership of smartphone and tablet technologies and the ways they used them in their studies. The students first completed a short questionnaire and were then interviewed in small groups. The results agree with previous research into student use of smart devices and describe autonomous engagement facilitated by personally owned smart technologies. The study identifies continuous patterns of pervasive engagement by students and concludes that more thought should be given to disruptive innovation, digital literacy and employability.

Details

Increasing Student Engagement and Retention Using Mobile Applications: Smartphones, Skype and Texting Technologies
Type: Book
ISBN: 978-1-78190-509-8

Article
Publication date: 21 September 2015

Aurelie Leclercq-Vandelannoitte

The purpose of this paper is to provide useful insights on “bring your own device” (BYOD) and IT consumerization, to help organizations understand how to address their…

2237

Abstract

Purpose

The purpose of this paper is to provide useful insights on “bring your own device” (BYOD) and IT consumerization, to help organizations understand how to address their consequences. For young, tech-savvy workers, using their own devices at work represents a right, rather than a privilege, leading them to initiate a growing, yet under-researched, drive toward IT consumerization. Some companies already deploy BYOD programs, allowing employees to use personal devices for work-related activities, but other managers remain hesitant of the implications of such programs.

Design/methodology/approach

To provide an overview of this growing phenomenon, this paper presents an in-depth analysis of existing literature and identifies organizational changes induced by this reversed adoption logic. A case study of Volvo reveals how one organization has coped successfully with this phenomenon.

Findings

These analyses shed more light on the stakes involved in BYOD and IT consumerization, as well as the changes they imply for organizations and IT departments.

Practical implications

Both BYOD and IT consumerization have deep and broad consequences for organizations, some of which are very positive, as long as the trends are well-managed and carefully addressed.

Originality/value

This paper covers a topic that has attracted scant attention in prior academic research, despite widely acknowledged concerns about security and reliability in practitioner studies. By going beyond a classic discourse focused solely on the security threats of BYOD, this paper investigates both business challenges and implications associated with a reversed adoption logic.

Details

Journal of Business Strategy, vol. 36 no. 5
Type: Research Article
ISSN: 0275-6668

Keywords

Article
Publication date: 12 July 2018

Melina Seedoyal Doargajudhur and Peter Dell

Bring your own device (BYOD) refers to employees utilizing their personal mobile devices to perform work tasks. Drawing on the job demands-resources (JD-R) model and the…

1769

Abstract

Purpose

Bring your own device (BYOD) refers to employees utilizing their personal mobile devices to perform work tasks. Drawing on the job demands-resources (JD-R) model and the task-technology fit (TTF) model, the purpose of this paper is to develop a model that explains how BYOD affects employee well-being (through job satisfaction), job performance self-assessment, and organizational commitment through perceived job autonomy, perceived workload and TTF.

Design/methodology/approach

Survey data from 400 full-time employees in different industry sectors in Mauritius were used to test a model containing 13 hypotheses using confirmatory factor analysis and structural equation modeling.

Findings

The SEM results support the hypothesized model. Findings indicate that BYOD indirectly affects job satisfaction, job performance and organizational commitment via job demands (perceived workload), job resources (perceived job autonomy) and TTF. Further, job resources influences job demands while TTF predicted job performance. Finally, job satisfaction and job performance self-assessment appear to be significant determinants of organizational commitment.

Practical implications

The findings are congruent with the JD-R and TTF models, and confirm that BYOD has an impact on job satisfaction, job performance self-assessment and organizational commitment. This could inform organizations’ policies and practices relating to BYOD, leading to improved employee well-being, performance and higher commitment.

Originality/value

The expanded model developed in this study explains how employee well-being, performance and organizational commitment are affected by BYOD, and is one of the first studies to investigate these relationships.

Details

Information Technology & People, vol. 32 no. 2
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 2 March 2015

Aurélie Leclercq - Vandelannoitte

In reference to increasing consumerization, this article investigates how organizations react to employees’ adoption and use of personal devices at work, such as by incorporating…

2875

Abstract

Purpose

In reference to increasing consumerization, this article investigates how organizations react to employees’ adoption and use of personal devices at work, such as by incorporating innovative, individual, IT-driven changes into their corporate practices. The paper aims to discuss these issues.

Design/methodology/approach

Four in-depth, longitudinal case studies, conducted between 2006 and 2010, feature 92 interviews and observations to ensure triangulation.

Findings

We identify three types of organizational reactions (induction, normalization, and regulation) that depend on specific dimensions and affect the nature of subsequent IT-based organizational change.

Research limitations/implications

Continued research into the consumerization of IT can explore how it affects organizations today and whether different effects might arise in other contexts and with different kinds of organizations.

Practical implications

Reversed IT adoption logics have deep consequences for organizations; companies could achieve great gains from them, if carefully considered and managed.

Originality/value

This article addresses a topic that has been analyzed only scarcely and rarely, namely, the consumerization of IT and the tactics organizations use to incorporate user-driven IT innovation. Although this article presents only a few cases, it constitutes an initial attempt to explore this research area theoretically and investigate the ways organizations can harness employees’ personal IT adoption logics to promote creative, IT-driven change in firms.

Details

Information Technology & People, vol. 28 no. 1
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 30 April 2021

J Aruna Santhi and T Vijaya Saradhi

This paper tactics to implement the attack detection in medical Internet of things (IoT) devices using improved deep learning architecture for accomplishing the concept bring your

Abstract

Purpose

This paper tactics to implement the attack detection in medical Internet of things (IoT) devices using improved deep learning architecture for accomplishing the concept bring your own device (BYOD). Here, a simulation-based hospital environment is modeled where many IoT devices or medical equipment are communicated with each other. The node or the device, which is creating the attack are recognized with the support of attribute collection. The dataset pertaining to the attack detection in medical IoT is gathered from each node that is considered as features. These features are subjected to a deep belief network (DBN), which is a part of deep learning algorithm. Despite the existing DBN, the number of hidden neurons of DBN is tuned or optimized correctly with the help of a hybrid meta-heuristic algorithm by merging grasshopper optimization algorithm (GOA) and spider monkey optimization (SMO) in order to enhance the accuracy of detection. The hybrid algorithm is termed as local leader phase-based GOA (LLP-GOA). The DBN is used to train the nodes by creating the data library with attack details, thus maintaining accurate detection during testing.

Design/methodology/approach

This paper has presented novel attack detection in medical IoT devices using improved deep learning architecture as BYOD. With this, this paper aims to show the high convergence and better performance in detecting attacks in the hospital network.

Findings

From the analysis, the overall performance analysis of the proposed LLP-GOA-based DBN in terms of accuracy was 0.25% better than particle swarm optimization (PSO)-DBN, 0.15% enhanced than grey wolf algorithm (GWO)-DBN, 0.26% enhanced than SMO-DBN and 0.43% enhanced than GOA-DBN. Similarly, the accuracy of the proposed LLP-GOA-DBN model was 13% better than support vector machine (SVM), 5.4% enhanced than k-nearest neighbor (KNN), 8.7% finer than neural network (NN) and 3.5% enhanced than DBN.

Originality/value

This paper adopts a hybrid algorithm termed as LLP-GOA for the accurate detection of attacks in medical IoT for improving the enhanced security in healthcare sector using the optimized deep learning. This is the first work which utilizes LLP-GOA algorithm for improving the performance of DBN for enhancing the security in the healthcare sector.

Article
Publication date: 13 March 2017

Alessandro Aldini, Jean-Marc Seigneur, Carlos Ballester Lafuente, Xavier Titi and Jonathan Guislain

The Bring-Your-Own-Device (BYOD) paradigm favors the use of personal and public devices and communication means in corporate environments, thus representing a challenge for the…

Abstract

Purpose

The Bring-Your-Own-Device (BYOD) paradigm favors the use of personal and public devices and communication means in corporate environments, thus representing a challenge for the traditional security and risk management systems. In this dynamic and heterogeneous setting, the purpose of this paper is to present a methodology called opportunity-enabled risk management (OPPRIM), which supports the decision-making process in access control to remote corporate assets.

Design/methodology/approach

OPPRIM relies on a logic-based risk policy model combining estimations of trust, threats and opportunities. Moreover, it is based on a mobile client – server architecture, where the OPPRIM application running on the user device interacts with the company IT security server to manage every access request to corporate assets.

Findings

As a mandatory requirement in the highly flexible BYOD setting, in the OPPRIM approach, mobile device security risks are identified automatically and dynamically depending on the specific environment in which the access request is issued and on the previous history of events.

Originality/value

The main novelty of the OPPRIM approach is the combined treatment of threats (resp., opportunities) and costs (resp., benefits) in a trust-based setting. The OPPRIM system is validated with respect to an economic perspective: cost-benefit sensitivity analysis is conducted through formal methods using the PRISM model checker and through agent-based simulations using the Anylogic framework.

Details

Information & Computer Security, vol. 25 no. 1
Type: Research Article
ISSN: 2056-4961

Keywords

Abstract

Details

Social Media, Mobile and Cloud Technology Use in Accounting: Value-Analyses in Developing Economies
Type: Book
ISBN: 978-1-83982-161-5

11 – 20 of over 13000