Research Article
BibTex RIS Cite

A Perceptional Analysis of BYOD (Bring Your Own Device) for Educational or Workplace Implementations in a South Korean Case

Year 2019, Volume: 6 Issue: 2, 51 - 64, 01.12.2019
https://doi.org/10.17275/per.19.12.6.2

Abstract

As
the communication and information technologies (especially mobile devices) have
become a central part of our daily lives, people have started bringing their
own devices to schools, universities, companies and other types of organization.
With the difficulty of stopping people from carrying these devices, Bring Your
Own Device (BYOD) represents a paradigm shift, presenting new ways for
organizations to function and offering several advantages to businesses,
notably a reduction in hardware costs. Although BYOD (allowing people to bring
their technological devices to schools or workplaces) sounds simple in words,
BYOD implementations come with their own challenges (security related problems
at first). This study aims to analyze the perceptions of a group of South
Korean undergraduate and master students (n=110 in total) about BYOD
implementations in schools and in workplace separately. The study instrument
had three sections; (i) basic demographics (age, gender and currently attending
education level), (ii) 12 survey items on a Likert scale for BYOD perception at
school questions, and (iii) 12 survey items on a Likert scale for BYOD
perception at workplace questions. After the analyses of demographics, separate
independent sample t-tests were applied in order to check if each set of 12
items for BYOD at school and at workplace significantly differ for gender and
education level variables. While no significant difference was revealed based
on gender variable, education level demonstrated differences on certain items.
At the end, the 12 items for BYOD at school and BYOD at workplace were compared
by applying paired samples t-tests to the dataset where significant differences
were also observed for some items. The general results showed that participants
supported BYOD in schools more than BYOD at workplace. Besides, master students
showed more trust than undergraduate students on cyber-security both at school
and at workplace.

References

  • Armando, A., Costa, G., & Merlo, A. (2013, March). Bring your own device, securely. Proceedings of the 28th annual ACM Symposium on Applied Computing, Coimbra, Portugal.
  • Beckett, P. (2014). BYOD-popular and problematic. Network Security, 2014(9), 7-9.
  • Blaschke, L.M. (2018). Self-determined learning (Heutagogy) and digital media creating integrated educational environments for developing lifelong learning skills, in Kergel D., Heidkamp B., Telléus P., Rachwal T., Nowakowski S. (Eds.). The Digital Turn in Higher Education, Springer, Wiesbaden, VS, pp. 129-140.
  • Bring your own Device (BYOD) for Learning (2017). PDST (Promoting and supporting the integration of ICT in education) Technology in Education. Retrieved from https://www.pdsttechnologyineducation.ie/en/Technology/Advice-Sheets/Bring-your-own-Device-BYOD-for-Learning.pdf
  • BSI Group (2015). Bring Your Own Device (BYOD) - An information security and eDiscovery analysis: A Whitepaper. Retrieved from https://www.bsigroup.com/globalassets/localfiles/en-us/whitepapers/byod-info-sec-and-edisco-analysis.pdf
  • Cardoza, Y., & Tunks, J. (2014). The bring your own technology initiative: An examination of teachers' adoption. Computers in the Schools, 31, 293–315.
  • Cheng, G., Guan, Y., & Chau, J. (2016). An empirical study towards understanding user acceptance of bring your own device (BYOD) in higher education. Australasian Journal of Educational Technology, 32(4), 1-17.
  • Clifford, M. (2012). Bring your own device (BYOD): 10 reasons why it’s a good idea. Retrieved from http://www.opencolleges.edu.au/informed/trends/bring-your-own-device-byod-10-reasons-why-its-agood-idea/
  • Dhingra, M. (2016). Legal Issues in Secure Implementation of Bring Your Own Device (BYOD). Procedia Computer Science, 78, 179-184.
  • Downer, K. & Bhattacharya, M. (2015). BYOD Security: A New Business Challenge. Proceedings of the 5th International Symposium on Cloud and Service Computing (SC2 2015), IEEE CS Press. doi: 10.1109/SmartCity.2015.221
  • Falloon, G. (2015). What’s the difference? Learning collaboratively using iPads in conventional classrooms. Computers & Education, 84, 62-77.
  • Fraenkel, J. R., & Wallen, N. E. (2000) How to Design and Evaluate Research in Education. (4th ed.). McGraw-Hill, New York.
  • Garba, A. B., Armarego, J. & Murray, D. (2015). Bring your own device organisational information security and privacy. Journal of Engineering and Applied Sciences, 10(3), 1279-1287.
  • Harris, M. A., Patten, K., & Regan, E. (2013). The Need for BYOD Mobile Device Security Awareness and Training. Paper presented at Proceedings of the Nineteenth Americas Conference on Information Systems, Chicago, Illinois, United States, August 15-17, 2013. Retrieved from https://pdfs.semanticscholar.org/3c49/f54f096685f285357edd76dc6316f04a275e.pdf
  • Hershatter, A., & Epstein, M. (2010). Millennials and the world of work: An organization and management perspective. Journal of Business and Psychology, 25(2), 211–223.
  • Hopkins, N., Sylvester, A., & Tate, M. (2013). Motivations for BYOD: An investigation of the contents of a 21st century school bag. Paper presented at the 21st European Conference on Information Systems, Utrecht, Netherlands. Retrieved from http://aisel.aisnet.org/ecis2013_cr/183
  • Johnson, B. & Christensen, L. (2004). Educational Research: Quantitative, Qualitative and Mixed Approaches. (2nd ed.). Pearson Publication: Boston.
  • Johnson, G. M. (2011). Internet activities and developmental predictors: Gender differences among digital natives. Journal of Interactive Online Learning, 10(2), 64-76.
  • Katsikas, S. K. (2000) Health care management and information systems security: Awareness, training or education? International Journal of Medical Informatics, 60, 129–135.
  • Kong, S. C., & Song, Y. (2015). An experience of personalized learning hub initiative embedding BYOD for reflective engagement in higher education. Computers & Education, 88, 227-240.
  • KOSIS [국가통계포털]. Korean Statistical Information Service. Retrieved from http://kosis.kr/statHtml/statHtml.do?orgId=115&tblId=TX_115_2009_H4479&vw_cd=MT_ZTITLE&list_id=115_11528_002_006&seqNo=&lang_mode=ko&language=kor&obj_var_id=&itm_id=&conn_path=MT_ZTITLE
  • Lim, K. & Meier, E. B. (2011). Different but similar: Computer use patterns between young Korean males and females. Educational Technology Research and Development, 59(4), 575-592.
  • McLean, K. J. (2016). The Implementation of Bring Your Own Device (BYOD) in Primary [Elementary] Schools. Frontiers in psychology, 7, 1739. doi:10.3389/fpsyg.2016.01739
  • Putri, F. F. & Hovav, A. (2014). Employees´ compliance with BYOD security policy: Insights from reactance, organizational justice, and protection motivation theory. Proceedings of the European Conference on Information Systems (ECIS) 2014, Tel Aviv, Israel, June 9-11, 2014. Retrieved from http://aisel.aisnet.org/ecis2014/proceedings/track16/2
  • Rackley, R., & Viruru, R. (2014). Preparing teachers for the BYOD classroom. In M. Searson & M. Ochoa (Eds.), Proceedings of Society for Information Technology & Teacher Education International Conference 2014 (pp. 2608-2613). Chesapeake, VA: Association for the Advancement of Computing in Education.
  • Song, Y. (2014). “Bring Your Own Device (BYOD)” for seamless science inquiry in a primary school. Computers & Education, 74, 50–60.
  • Taneja, A., Fiore, V., & Fischer, B. (2015). Cyber-slacking in the classroom: Potential for digital distraction in the new age. Computers & Education, 82, 141-151.
  • Ubene, O.-I. E., Agim, U. R., & Umo-Odiong, A. (2018). The impact of Bring Your Own Device (BYOD) on information technology (IT) security and infrastructure in the Nigerian insurance sector. American Journal of Engineering Research (AJER), 7(5), 237-246.
  • Weeger, A., Wang, X., Gewald, H., Raisinghani, M., Sanchez, O., Grant, G., & Pittayachawan, S. (2018). Determinants of Intention to Participate in Corporate BYOD-Programs: The Case of Digital Natives. Information Systems Frontiers, 1-17.
Year 2019, Volume: 6 Issue: 2, 51 - 64, 01.12.2019
https://doi.org/10.17275/per.19.12.6.2

Abstract

References

  • Armando, A., Costa, G., & Merlo, A. (2013, March). Bring your own device, securely. Proceedings of the 28th annual ACM Symposium on Applied Computing, Coimbra, Portugal.
  • Beckett, P. (2014). BYOD-popular and problematic. Network Security, 2014(9), 7-9.
  • Blaschke, L.M. (2018). Self-determined learning (Heutagogy) and digital media creating integrated educational environments for developing lifelong learning skills, in Kergel D., Heidkamp B., Telléus P., Rachwal T., Nowakowski S. (Eds.). The Digital Turn in Higher Education, Springer, Wiesbaden, VS, pp. 129-140.
  • Bring your own Device (BYOD) for Learning (2017). PDST (Promoting and supporting the integration of ICT in education) Technology in Education. Retrieved from https://www.pdsttechnologyineducation.ie/en/Technology/Advice-Sheets/Bring-your-own-Device-BYOD-for-Learning.pdf
  • BSI Group (2015). Bring Your Own Device (BYOD) - An information security and eDiscovery analysis: A Whitepaper. Retrieved from https://www.bsigroup.com/globalassets/localfiles/en-us/whitepapers/byod-info-sec-and-edisco-analysis.pdf
  • Cardoza, Y., & Tunks, J. (2014). The bring your own technology initiative: An examination of teachers' adoption. Computers in the Schools, 31, 293–315.
  • Cheng, G., Guan, Y., & Chau, J. (2016). An empirical study towards understanding user acceptance of bring your own device (BYOD) in higher education. Australasian Journal of Educational Technology, 32(4), 1-17.
  • Clifford, M. (2012). Bring your own device (BYOD): 10 reasons why it’s a good idea. Retrieved from http://www.opencolleges.edu.au/informed/trends/bring-your-own-device-byod-10-reasons-why-its-agood-idea/
  • Dhingra, M. (2016). Legal Issues in Secure Implementation of Bring Your Own Device (BYOD). Procedia Computer Science, 78, 179-184.
  • Downer, K. & Bhattacharya, M. (2015). BYOD Security: A New Business Challenge. Proceedings of the 5th International Symposium on Cloud and Service Computing (SC2 2015), IEEE CS Press. doi: 10.1109/SmartCity.2015.221
  • Falloon, G. (2015). What’s the difference? Learning collaboratively using iPads in conventional classrooms. Computers & Education, 84, 62-77.
  • Fraenkel, J. R., & Wallen, N. E. (2000) How to Design and Evaluate Research in Education. (4th ed.). McGraw-Hill, New York.
  • Garba, A. B., Armarego, J. & Murray, D. (2015). Bring your own device organisational information security and privacy. Journal of Engineering and Applied Sciences, 10(3), 1279-1287.
  • Harris, M. A., Patten, K., & Regan, E. (2013). The Need for BYOD Mobile Device Security Awareness and Training. Paper presented at Proceedings of the Nineteenth Americas Conference on Information Systems, Chicago, Illinois, United States, August 15-17, 2013. Retrieved from https://pdfs.semanticscholar.org/3c49/f54f096685f285357edd76dc6316f04a275e.pdf
  • Hershatter, A., & Epstein, M. (2010). Millennials and the world of work: An organization and management perspective. Journal of Business and Psychology, 25(2), 211–223.
  • Hopkins, N., Sylvester, A., & Tate, M. (2013). Motivations for BYOD: An investigation of the contents of a 21st century school bag. Paper presented at the 21st European Conference on Information Systems, Utrecht, Netherlands. Retrieved from http://aisel.aisnet.org/ecis2013_cr/183
  • Johnson, B. & Christensen, L. (2004). Educational Research: Quantitative, Qualitative and Mixed Approaches. (2nd ed.). Pearson Publication: Boston.
  • Johnson, G. M. (2011). Internet activities and developmental predictors: Gender differences among digital natives. Journal of Interactive Online Learning, 10(2), 64-76.
  • Katsikas, S. K. (2000) Health care management and information systems security: Awareness, training or education? International Journal of Medical Informatics, 60, 129–135.
  • Kong, S. C., & Song, Y. (2015). An experience of personalized learning hub initiative embedding BYOD for reflective engagement in higher education. Computers & Education, 88, 227-240.
  • KOSIS [국가통계포털]. Korean Statistical Information Service. Retrieved from http://kosis.kr/statHtml/statHtml.do?orgId=115&tblId=TX_115_2009_H4479&vw_cd=MT_ZTITLE&list_id=115_11528_002_006&seqNo=&lang_mode=ko&language=kor&obj_var_id=&itm_id=&conn_path=MT_ZTITLE
  • Lim, K. & Meier, E. B. (2011). Different but similar: Computer use patterns between young Korean males and females. Educational Technology Research and Development, 59(4), 575-592.
  • McLean, K. J. (2016). The Implementation of Bring Your Own Device (BYOD) in Primary [Elementary] Schools. Frontiers in psychology, 7, 1739. doi:10.3389/fpsyg.2016.01739
  • Putri, F. F. & Hovav, A. (2014). Employees´ compliance with BYOD security policy: Insights from reactance, organizational justice, and protection motivation theory. Proceedings of the European Conference on Information Systems (ECIS) 2014, Tel Aviv, Israel, June 9-11, 2014. Retrieved from http://aisel.aisnet.org/ecis2014/proceedings/track16/2
  • Rackley, R., & Viruru, R. (2014). Preparing teachers for the BYOD classroom. In M. Searson & M. Ochoa (Eds.), Proceedings of Society for Information Technology & Teacher Education International Conference 2014 (pp. 2608-2613). Chesapeake, VA: Association for the Advancement of Computing in Education.
  • Song, Y. (2014). “Bring Your Own Device (BYOD)” for seamless science inquiry in a primary school. Computers & Education, 74, 50–60.
  • Taneja, A., Fiore, V., & Fischer, B. (2015). Cyber-slacking in the classroom: Potential for digital distraction in the new age. Computers & Education, 82, 141-151.
  • Ubene, O.-I. E., Agim, U. R., & Umo-Odiong, A. (2018). The impact of Bring Your Own Device (BYOD) on information technology (IT) security and infrastructure in the Nigerian insurance sector. American Journal of Engineering Research (AJER), 7(5), 237-246.
  • Weeger, A., Wang, X., Gewald, H., Raisinghani, M., Sanchez, O., Grant, G., & Pittayachawan, S. (2018). Determinants of Intention to Participate in Corporate BYOD-Programs: The Case of Digital Natives. Information Systems Frontiers, 1-17.
There are 29 citations in total.

Details

Primary Language English
Subjects Other Fields of Education
Journal Section Research Articles
Authors

Jin Hwa Lee 0000-0001-6205-0634

Hasan Tinmaz 0000-0003-4310-0848

Publication Date December 1, 2019
Acceptance Date September 24, 2019
Published in Issue Year 2019 Volume: 6 Issue: 2

Cite

APA Lee, J. H., & Tinmaz, H. (2019). A Perceptional Analysis of BYOD (Bring Your Own Device) for Educational or Workplace Implementations in a South Korean Case. Participatory Educational Research, 6(2), 51-64. https://doi.org/10.17275/per.19.12.6.2