Search results

21 – 30 of over 13000

Abstract

Details

Social Media, Mobile and Cloud Technology Use in Accounting: Value-Analyses in Developing Economies
Type: Book
ISBN: 978-1-83982-161-5

Abstract

Details

Learning and Teaching in Higher Education: Gulf Perspectives, vol. 10 no. 2
Type: Research Article
ISSN: 2077-5504

Book part
Publication date: 25 July 2014

Barbara White, Greg Williams and Rebecca England

Technology provision and Next Generation Learning Spaces (NGLS) should respond to the active learning needs of twenty-first century learners and privilege multiple ‘pictures of…

Abstract

Technology provision and Next Generation Learning Spaces (NGLS) should respond to the active learning needs of twenty-first century learners and privilege multiple ‘pictures of learning’ and associated knowledge work. In this sense it is important for NGLS to be pedagogically agnostic – agile enough to cater for a range of pedagogical approaches within the one physical space. In this chapter, the democratising and potentially disruptive power of new digital technologies to facilitate the privileging of these multiple pictures of learning is explored, recognising the significant rise in student ownership and academic use of mobile technologies. With their escalating ubiquity and their facilitation of active knowledge work, research around considerations for the implementation of mobile digital technologies is canvassed, highlighting a range of issues to be considered. This is part of the ‘hidden work’ of technology implementation. Without this hidden work, the potential of NGLS in facilitating and privileging active learning and multiple pictures of learning is diminished and the potential for reinforcing already powerful and potentially exclusionary modes of knowledge work increases. Finally to assist in articulating the hidden work of digitally enabled NGLS, a model is proposed to help understand how ease of use and confidence impacts on student and academic knowledge work.

Details

The Future of Learning and Teaching in Next Generation Learning Spaces
Type: Book
ISBN: 978-1-78350-986-7

Keywords

Article
Publication date: 29 June 2018

Paméla Baillette and Yves Barlette

The purpose of this paper is to present the benefits and potential dangers of “bring your own device” (BYOD)-related practices. The paper aims to highlight new risks stemming from…

1114

Abstract

Purpose

The purpose of this paper is to present the benefits and potential dangers of “bring your own device” (BYOD)-related practices. The paper aims to highlight new risks stemming from BYOD adoption and identifies different security paradoxes arising for entrepreneurs and their employees in the context of small- and medium-sized enterprises (SMEs).

Design/methodology/approach

A theoretical approach is proposed in this paper. As technology is an important driver of organizational change, technological innovations entail new work practices and in turn lead to a twofold “security paradox.”

Findings

This paper introduces the stakes and issues associated with BYOD-related mobile technologies. Evidence is provided that this phenomenon must be cautiously addressed to not only seize related benefits but also reduce related risks. Avenues for future research are offered to complement this work.

Practical implications

The main practical interest is to make entrepreneurs of SMEs and their employees aware of the BYOD phenomenon and its related risks and benefits.

Originality/value

From a theoretical perspective, very little work has been published in the field of management sciences about the benefits and dangers associated with the introduction of BYOD among entrepreneurs and employees in SMEs. Moreover, this study identifies a twofold “security paradox” related to information security that has never been studied in work settings.

Details

Journal of Organizational Change Management, vol. 31 no. 4
Type: Research Article
ISSN: 0953-4814

Keywords

Article
Publication date: 9 October 2017

Abubakar Garba Bello, David Murray and Jocelyn Armarego

This paper’s purpose is to provide a current best practice approach that can be used to identify and manage bring your own device (BYOD) security and privacy risks faced by…

1533

Abstract

Purpose

This paper’s purpose is to provide a current best practice approach that can be used to identify and manage bring your own device (BYOD) security and privacy risks faced by organisations that use mobile devices as part of their business strategy. While BYOD deployment can provide work flexibility, boost employees’ productivity and be cost cutting for organisations, there are also many information security and privacy issues, with some widely recognised, and others less understood. This paper focuses on BYOD adoption, and its associated risks and mitigation strategies, investigating how both information security and privacy can be effectively achieved in BYOD environments.

Design/methodology/approach

This research paper used a qualitative research methodology, applying the case study approach to understand both organisational and employee views, thoughts, opinions and actions in BYOD environments.

Findings

This paper identifies and understands BYOD risks, threats and influences, and determines effective controls and procedures for managing organisational and personal information resources in BYOD.

Research limitations/implications

The scope of this paper is limited to the inquiry and findings from organisations operating in Australia. This paper also suggests key implications that lie within the ability of organisations to adequately develop and deploy successful BYOD management and practices.

Originality/value

This paper expands previous research investigating BYOD practices, and also provides a current best practice approach that can be used by organisations to systematically investigate and understand how to manage security and privacy risks in BYOD environments.

Details

Information & Computer Security, vol. 25 no. 4
Type: Research Article
ISSN: 2056-4961

Keywords

Book part
Publication date: 26 November 2020

Tibor János Karlovitz

This chapter shows that nowadays, ordinary people also encounter huge amounts of information. What used to be part of privileged leaders can now be owned by anyone. What has been…

Abstract

This chapter shows that nowadays, ordinary people also encounter huge amounts of information. What used to be part of privileged leaders can now be owned by anyone. What has been gathered in the past by dedicated services is now available to almost anyone. The technical tools for access have become cheaper than ever. Infinite information is accessed through the Internet, and people share their explanations and analyses through social media. What used to be strictly confidential information of the secret services is nowadays part of everyday life. A new economy is being created. Professions and industries are disappearing and new ones are emerging as the concept of knowledge acquisition, information processing, “secret” as such is transformed. In the past, government agencies have mobilized through the media, and nowadays people reach out to one another and form crowds in Internet-based social media. “Anyone” can be an influencer, opinion-forming journalist, e.g., through his blog, a revolutionary or a politician. There are risks and dangers: dangerous teachings and thoughts to communities reach the masses through the same channel. The democratization of technology is a formidable challenge to existing political systems that are trying to limit, hinder, people’s suddenly enormous freedom.

Details

Managing Customer Experiences in an Omnichannel World: Melody of Online and Offline Environments in the Customer Journey
Type: Book
ISBN: 978-1-80043-389-2

Keywords

Article
Publication date: 29 March 2021

Ramaraj Palanisamy and Yang Wu

This study/ paper aims to empirically examine the user attitude on perceived security of enterprise systems (ES) mobility. Organizations are adopting mobile technologies for…

571

Abstract

Purpose

This study/ paper aims to empirically examine the user attitude on perceived security of enterprise systems (ES) mobility. Organizations are adopting mobile technologies for various business applications including ES to increase the flexibility and to gain sustainable competitive advantage. At the same time, end-users are exposed to security issues when using mobile technologies. The ES have seen breaches and malicious intrusions thereby more sophisticated recreational and commercial cybercrimes have been witnessed. ES have seen data breaches and malicious intrusions leading to more sophisticated cybercrimes. Considering the significance of security in ES mobility, the research questions in this study are: What are the security issues of ES mobility? What are the influences of users’ attitude towards those security issues? What is the impact of users’ attitude towards security issues on perceived security of ES mobility?

Design/methodology/approach

These questions are addressed by empirically testing a security model of mobile ES by collecting data from users of ES mobile systems. Hypotheses were evolved and tested by data collected through a survey questionnaire. The questionnaire survey was administered to 331 users from Chinese small and medium-sized enterprises (SME). The data was statistically analysed by tools such as correlation, factor analysis, regression and the study built a structural equation model (SEM) to examine the interactions between the variables.

Findings

The study results have identified the following security issues: users’ attitude towards mobile device security issues; users’ attitude towards wireless network security issues; users’ attitude towards cloud computing security issues; users’ attitude towards application-level security issues; users’ attitude towards data (access) level security issues; and users’ attitude towards enterprise-level security issues.

Research limitations/implications

The study results are based on a sample of users from Chinese SMEs. The findings may lack generalizability. Therefore, researchers are encouraged to examine the model in a different context. The issues requiring further investigation are the role of gender and type of device on perceived security of ES mobile systems.

Practical implications

The results show that the key security issues are related to a mobile device, wireless network, cloud computing, applications, data and enterprise. By understanding these issues and the best practices, organizations can maintain a high level of security of their mobile ES.

Social implications

Apart from understanding the best practices and the key issues, the authors suggest management and end-users to work collaboratively to achieve a high level of security of the mobile ES.

Originality/value

This is an empirical study conducted from the users’ perspective for validating the set of research hypotheses related to key security issues on the perceived security of mobile ES.

Details

Information & Computer Security, vol. 29 no. 1
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 2 March 2015

Karlene Cousins and Daniel Robey

The purpose of this paper is to explore the role that mobile technologies play in mobile workers’ efforts to manage the boundaries between work and non-work domains. Previous…

9208

Abstract

Purpose

The purpose of this paper is to explore the role that mobile technologies play in mobile workers’ efforts to manage the boundaries between work and non-work domains. Previous theories of work-life boundary management frame boundary management strategies as a range between the segmentation and integration of work-life domains, but fail to provide a satisfactory account of technology’s role.

Design/methodology/approach

The authors apply the concept of affordances, defined as the relationship between users’ abilities and features of mobile technology, in two field studies of a total of 25 mobile workers who used a variety of mobile devices and services.

Findings

The results demonstrate that the material features of mobile technologies offer five specific affordances that mobile workers use in managing work-life boundaries: mobility, connectedness, interoperability, identifiability and personalization. These affordances persist in their influence across time, despite their connection to different technology features.

Originality/value

The author found that mobile workers’ boundary management strategies do not fit comfortably along a linear segmentation-integration continuum. Rather, mobile workers establish a variety of personalized boundary management practices to match their particular situations. The authors speculate that mobile technology has core material properties that endure over time. The authors surmise that these material properties provide opportunities for users to interact with them in a manner to make the five affordances possible. Therefore, in the future, actors interacting with mobile devices to manage their work-life boundaries may experience affordances similar to those the authors observed because of the presence of the core material properties.

Details

Information Technology & People, vol. 28 no. 1
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 4 April 2016

Adetoun A. Oyelude

This is the first edition of the column for 2016.

219

Abstract

Purpose

This is the first edition of the column for 2016.

Design/methodology/approach

The vignettes from the Internet this year will be mainly from blogs.

Findings

This edition covers issues germane mainly to libraries, technology use and maintenance of digital devices used.

Research limitations/implications

Executives in the IT industry may be looking at three major issues in 2016.

Practical implications

More often than not, internal vulnerabilities exceed external security threats.

Social implications

Businesses must define and set the standards of what good and bad security practices look like.

Originality/value

IT teams should restrict the extent that outside devices can connect and roam around on proprietary corporate networks and also work to ensure that employees are educated on the company’s security policy.

Details

Library Hi Tech News, vol. 33 no. 2
Type: Research Article
ISSN: 0741-9058

Keywords

Book part
Publication date: 24 September 2018

William G. Staples

School districts across the United States have adopted web-based student information systems (SIS) that offer parents, students, teachers and administrators immediate access to a…

Abstract

School districts across the United States have adopted web-based student information systems (SIS) that offer parents, students, teachers and administrators immediate access to a variety of data points on each individual. In this chapter, I offer findings from in-depth interviews with school stakeholders that demonstrates how some students, typically ‘high performers’, are drawn into ‘pushed self-tracking’ (Lupton, 2016) of their academic achievement metrics, obsessively monitoring their grades and other quantified measures through digital devices, comparing their performance to other students and often generating a variety of affective states for themselves. I suggest that an SIS functions as a neoliberal technology of childhood government with these students internalising and displaying the self-governing capacities of ‘enterprise’ and ‘autonomy’ (Rose, 1996). These capacities are a product of and reinforce the metric culture of the school.

21 – 30 of over 13000