Mobile devices in the lecture hall: Into it, indifferent, or intrusion?

被引:5
|
作者
Hall-Newton, Kathryn [1 ]
Rudkowski, Janice [2 ]
Lee, Seung Hwan [2 ]
Hogue, Jacqueline [2 ]
Ratnichkina, Polina [2 ,3 ]
机构
[1] Ryerson Univ, Ted Rogers Sch Management, Toronto, ON, Canada
[2] Ryerson Univ, Ted Rogers Sch Retail Management, 350 Victoria St, Toronto, ON M5B 2K3, Canada
[3] Ryerson Univ, Environm Appl Sci & Management, Toronto, ON, Canada
关键词
Mobile device; classroom management; technology; PHONES; TECHNOLOGY; EDUCATION; PERSPECTIVES; SMARTPHONES; BENEFITS; IMPACT; USAGE; IF;
D O I
10.1080/08832323.2018.1541853
中图分类号
G40 [教育学];
学科分类号
040101 ; 120403 ;
摘要
The authors explored undergraduate business students' feelings and thoughts about themselves, other students, and their professors when mobile devices are used in the lecture hall for nonacademic purposes. Specifically, they investigated mobile device use during class time, and whether students support it, are indifferent toward it, or consider it to be an intrusion. Using the critical incident technique, the authors thematically categorized students' thoughts and feelings regarding mobile device usage in the classroom for nonacademic purposes. The results uncovered unique perspectives presented by the students that carry implications for students, professors and administrators.
引用
收藏
页码:390 / 399
页数:10
相关论文
共 50 条
  • [11] Lecture Hall Partitions
    Mireille Bousquet-Mélou
    Kimmo Eriksson
    The Ramanujan Journal, 1997, 1 (1) : 101 - 111
  • [12] The Lecture Hall Parallelepiped
    Fu Liu
    Richard P. Stanley
    Annals of Combinatorics, 2014, 18 : 473 - 488
  • [13] Flow Anomaly Based Intrusion Detection System for Android Mobile Devices
    Radoglou-Grammatikis, Panagiotis I.
    Sarigiannidis, Panagiotis G.
    2017 6TH INTERNATIONAL CONFERENCE ON MODERN CIRCUITS AND SYSTEMS TECHNOLOGIES (MOCAST), 2017,
  • [14] Partial Federated Learning Based Network Intrusion System for Mobile Devices
    Kye, Hyoseon
    Kwon, Minhae
    PROCEEDINGS OF THE 2022 THE TWENTY-THIRD INTERNATIONAL SYMPOSIUM ON THEORY, ALGORITHMIC FOUNDATIONS, AND PROTOCOL DESIGN FOR MOBILE NETWORKS AND MOBILE COMPUTING, MOBIHOC 2022, 2022, : 283 - 284
  • [15] Intrusion detection via behavioural profiling on mobile and wireless networked devices
    Zincir, I
    Furnell, S
    Phippen, A
    EUROMEDIA '2005: 11TH ANNUAL EUROMEDIA CONFERENCE, 2005, : 67 - 71
  • [16] Towards an intrusion detection system for battery exhaustion attacks on mobile computing devices
    Nash, DC
    Martin, TL
    Ha, DS
    Hsiao, MS
    THIRD IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, WORKSHOPS, 2005, : 141 - 145
  • [17] An Autonomous Host-Based Intrusion Detection System for Android Mobile Devices
    José Ribeiro
    Firooz B. Saghezchi
    Georgios Mantas
    Jonathan Rodriguez
    Simon J. Shepherd
    Raed A. Abd-Alhameed
    Mobile Networks and Applications, 2020, 25 : 164 - 172
  • [18] An Autonomous Host-Based Intrusion Detection System for Android Mobile Devices
    Ribeiro, Jose
    Saghezchi, Firooz B.
    Mantas, Georgios
    Rodriguez, Jonathan
    Shepherd, Simon J.
    Abd-Alhameed, Raed A.
    MOBILE NETWORKS & APPLICATIONS, 2020, 25 (01): : 164 - 172
  • [19] Lecture Hall at the BAU in Munich
    不详
    STAHLBAU, 2017, 86 (03) : 216 - 216
  • [20] A refinement of the lecture hall theorem
    Bousquet-Mélou, M
    Eriksson, K
    JOURNAL OF COMBINATORIAL THEORY SERIES A, 1999, 86 (01) : 63 - 84