A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | AA | AB | |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1 | Author | Title | Journal / Source | Publication Date | Purpose / Main Idea | Findings | Technology-Related Challenge(s) Addressed | Proposed Solution(s) | Limitations | |||||||||||||||||||
2 | Source #1 | Derick Kiger/ Dani Herro | Bring Your Own Device: Parental Guidance (PG) Suggested | TechTrends: Linking Research and Practice to Improve Learning, v59 n5 p51-61 | Sep 2015 | This study addresses the research gap surrounding parental support and guidance of BYOD initiatives. | 1. Most students had access to a variety of tech at home (High-speed internet, wireless network, smartphone, tablet or laptop) 2. Most parents permitted BYOD (56.2%) 3. High school students brought smartphones, laptops, and iPods....Elemtary favored Kindles/e-Readers 4. Parents viewed BYOD benefits as improved accessibility but concerned about device equity, security, distractions and appropriate use 5. Parents sugggested making school-owned devices available to students that do not have devices | 1. Relying on home-to-school tech access 2. Parent perceptions matter 3. Supporting a variety of devices 4. Planning with parents | 1. Schools may benefit by suggesting parents cinsider minimum specifications or particular devices to adequately support educational applications 2. Schools can benefit by shaping positive perceptions towards the overall school environment and find ways to include parents as partners to increase tech education access 3. Professional development cognizant of context is necessary 4. Understanding and adressing parental concerns may also serve to increase resources as well as support teaching digital citizenship. | Predictors of a parent's BYOD decision were limited to variables collected via the school district's annual parent survey. Study was conducted in a school system that serves students with sufficient personal technology. | ||||||||||||||||||
3 | Source #2 | Jennifer Imazeki | Bring-Your-Own-Device: Turning Cell Phones into Forces for Good | Journal of Economic Education, v45 n3 p240-250 | 2014 | BYOD systems allow students to use devices they already own to submit responses via text message or through a web browser. | 1. BYOD preferred over clickers 2. Course design matters 3. Instructor experience matters | BYOD systems carry potential cost in terms of distraction | Instructors should plan for potential problems and be prepared to switch gears | Authors school participants did not incur any aditional expense with BYOD (licensing) | ||||||||||||||||||
4 | Source #3 | Campbell, W. Gardner; Fitch, Megan; German, Robert F., Jr.; Hulvey, Dale; McIntosh, Keith; McPherson, Michael R.; O'Keefe, John | The Wild-Card Character of "Bring Your Own:" A Panel Discussion | EDUCAUSE Review, v48 n2 p10-12, 14, 16, 18, 20, 22, 24, 26, 28 | Mar-Apr 2013 | This is a panel discussion among 7 key stakeholders as to what BYOD/BYO* looks like to them. | Each panelist approaches the phenomenon from a different perspective, which in the end showed that it all depends on your point of view. | 1. BYOD is not a passing fad 2. Institutions and their IT should embrace BYOD 3. Security is a concern with BYOD | IT acceptance and involvement in the impementation and growth of BYOD | Conclusions drawn vary somewhat, as might be expected whenthe endpoint of a technology trend is not apparent. | ||||||||||||||||||
5 | Source #4 | Cochrane, Thomas; Antonczak, Laurent; Keegan, Helen; Narayan, Vickel | Riding the Wave of BYOD: Developing a Framework for Creative Pedagogies | Research in Learning Technology, v22 | 2014 | To overview the development of a framework for creative pedagogies that harness the unique affordances of BYOD. | There are few well developed theoretical frameworks for supporting creative padagogies via BYOD | lecturers are using new tech within established teaching paradigms that are predominantly teacher-directed and focus upon content delivery | develop a framework that couples mobile devices, social media and GPS to provide a rich platform for creative student-directed learning experiences. | Space limited the inclusion of only two examples of how the authors are implementing a framework for creative pedagogies within wider contexts. | ||||||||||||||||||
6 | Source #5 | Janssen, Kitty Catharina; Phillipson, Sivanes | Are We Ready for BYOD? An Analysis of the Implementation and Communication of BYOD Programs in Victorian Schools | Australian Educational Computing, v30 n2 | 2015 | This paper explores the extent of 1-to-1 learning and BYOD model implementation in Victorian secondary schools and identifies the type of information provided to parents and the school community via school websites. | The study indicated that the majority of schools that offer BYOD programs provide no or limited information about those programs on their websites. This exposes a clear area of concern with key stakeholders. | 1. lack of advice to parents on cybersafety and monitoring devices 2. lack of equity provisions (info on loaner devices) | Recommend future studies to investigate the situation surrounding these challenges. Government should provide clearer directives in terms of communication via school websites | no archival of planning documents over time to see growth and implementation of BYOD to date | ||||||||||||||||||
7 | Source #6 | Jones, Beth H.; Chin, Amita Goyal; Aiken, Peter | Risky Business: Students and Smartphones | TechTrends: Linking Research and Practice to Improve Learning, v58 n6 p73-83 | Nov 2014 | This paper investigates the smartphone security practices of undergraduate college students. | Many smartphone users did employ some security measures, but a high percentage of them were ignoring potential risk. | smartphone users ignoring potential security risk | Increased education, training, and awareness | 1. validity and reliability of the instrument were not formally established. 2. not all variables that affect students' risky behavior were encompassed in the survey | ||||||||||||||||||
8 | Source #7 | Patten, Karen P.; Harris, Mark A. | The Need to Address Mobile Device Security in the Higher Education IT Curriculum | Journal of Information Systems Education, v24 n1 p41-52 | Spr 2013 | This paper reviews mobile device security concerns and develops recommendations for education that are in line with ABET accreditation standards. | There is an increasing need for mobile business and its related mobile device security concerns. | mobile device security concerns | 1. develop a mobile device policy 2. implement a Mobile Device Management (MDM) system 3. Integrate mobile device security into the IT curriculum | none listed | ||||||||||||||||||
9 | Source #8 | Raths, David | Collaborative Technologies: Crossing the Device Divide | T.H.E. Journal, v40 n5 p9-13 | May 2013 | With the help of browser-based software, students in BYOD districts can be on the same page even if they have different devices. | DIstricts can use apps and software to foster collaboration in a BYOD environment. "We've had teachers do that, and the kids end up using a variety of platforms for their project - PowerPoint, Keynote, Prezi, and others. The kids enjoy the flexibility and come up with some amazing stuff!" | access for all students | focus on the use of device-neutral platforms | none listed | ||||||||||||||||||
10 | Source #9 | Wash, Pamela D.; Bradley, Gary; Beck, Judy | Remote Classroom Observations with Preservice Teachers | SRATE Journal, v24 n1 p58-65 | Fall-Win 2014 | This article provides researchdata of a pilot study conducted with middle level and secondary education preservice teachers regarding the effectiveness of remote classroom observations. | Teachers preferred remote tech for their clinical observations (100%) | Faculty are stretched too thin to conduct f2f classroom observations | Use of Web 2.0 tools such as Skype and Facetime | Three of five school districts that served as host schools for the 46 clinical students in this study had Internet access bans on Skype and Facetime through the use of their Wi-Fi filters. This limited participation. | ||||||||||||||||||
11 | Source #10 | Raths, David | Are You Ready for BYOD? | T.H.E. Journal, v39 n4 p28-32 | May 2012 | Advice from the trenches on how to prepare your wireless network for the BYOD movement. | Key things to condiser before starting BYOD | Are you going to outsource the function, seek consulting help, or make it a do-it-yourself project. | Take into account 1. capacity vs. coverage 2. directory services and device registration 3. Role-based access control 4. application-level filtering | none listed | ||||||||||||||||||
12 | ||||||||||||||||||||||||||||
13 | ||||||||||||||||||||||||||||
14 | ||||||||||||||||||||||||||||
15 | ||||||||||||||||||||||||||||
16 | ||||||||||||||||||||||||||||
17 | ||||||||||||||||||||||||||||
18 | ||||||||||||||||||||||||||||
19 | ||||||||||||||||||||||||||||
20 | ||||||||||||||||||||||||||||
21 | ||||||||||||||||||||||||||||
22 | ||||||||||||||||||||||||||||
23 | ||||||||||||||||||||||||||||
24 | ||||||||||||||||||||||||||||
25 | ||||||||||||||||||||||||||||
26 | ||||||||||||||||||||||||||||
27 | ||||||||||||||||||||||||||||
28 | ||||||||||||||||||||||||||||
29 | ||||||||||||||||||||||||||||
30 | ||||||||||||||||||||||||||||
31 | ||||||||||||||||||||||||||||
32 | ||||||||||||||||||||||||||||
33 | ||||||||||||||||||||||||||||
34 | ||||||||||||||||||||||||||||
35 | ||||||||||||||||||||||||||||
36 | ||||||||||||||||||||||||||||
37 | ||||||||||||||||||||||||||||
38 | ||||||||||||||||||||||||||||
39 | ||||||||||||||||||||||||||||
40 | ||||||||||||||||||||||||||||
41 | ||||||||||||||||||||||||||||
42 | ||||||||||||||||||||||||||||
43 | ||||||||||||||||||||||||||||
44 | ||||||||||||||||||||||||||||
45 | ||||||||||||||||||||||||||||
46 | ||||||||||||||||||||||||||||
47 | ||||||||||||||||||||||||||||
48 | ||||||||||||||||||||||||||||
49 | ||||||||||||||||||||||||||||
50 | ||||||||||||||||||||||||||||
51 | ||||||||||||||||||||||||||||
52 | ||||||||||||||||||||||||||||
53 | ||||||||||||||||||||||||||||
54 | ||||||||||||||||||||||||||||
55 | ||||||||||||||||||||||||||||
56 | ||||||||||||||||||||||||||||
57 | ||||||||||||||||||||||||||||
58 | ||||||||||||||||||||||||||||
59 | ||||||||||||||||||||||||||||
60 | ||||||||||||||||||||||||||||
61 | ||||||||||||||||||||||||||||
62 | ||||||||||||||||||||||||||||
63 | ||||||||||||||||||||||||||||
64 | ||||||||||||||||||||||||||||
65 | ||||||||||||||||||||||||||||
66 | ||||||||||||||||||||||||||||
67 | ||||||||||||||||||||||||||||
68 | ||||||||||||||||||||||||||||
69 | ||||||||||||||||||||||||||||
70 | ||||||||||||||||||||||||||||
71 | ||||||||||||||||||||||||||||
72 | ||||||||||||||||||||||||||||
73 | ||||||||||||||||||||||||||||
74 | ||||||||||||||||||||||||||||
75 | ||||||||||||||||||||||||||||
76 | ||||||||||||||||||||||||||||
77 | ||||||||||||||||||||||||||||
78 | ||||||||||||||||||||||||||||
79 | ||||||||||||||||||||||||||||
80 | ||||||||||||||||||||||||||||
81 | ||||||||||||||||||||||||||||
82 | ||||||||||||||||||||||||||||
83 | ||||||||||||||||||||||||||||
84 | ||||||||||||||||||||||||||||
85 | ||||||||||||||||||||||||||||
86 | ||||||||||||||||||||||||||||
87 | ||||||||||||||||||||||||||||
88 | ||||||||||||||||||||||||||||
89 | ||||||||||||||||||||||||||||
90 | ||||||||||||||||||||||||||||
91 | ||||||||||||||||||||||||||||
92 | ||||||||||||||||||||||||||||
93 | ||||||||||||||||||||||||||||
94 | ||||||||||||||||||||||||||||
95 | ||||||||||||||||||||||||||||
96 | ||||||||||||||||||||||||||||
97 | ||||||||||||||||||||||||||||
98 | ||||||||||||||||||||||||||||
99 | ||||||||||||||||||||||||||||
100 |