• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 7
  • 6
  • 2
  • 1
  • 1
  • Tagged with
  • 17
  • 17
  • 17
  • 17
  • 16
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Program för digitala prov : Och hur programmet möter kraven som ställs när det används i gymnasieskolan

Jackson, Marcus January 2018 (has links)
Under de senaste två årtionden har det blivit en drastisk ökning av privat ägda laptops. Detta har öppnat för nya möjligheter som bring your own device (BYOD) digitala prov i skolan. Men med detta blir nedlåsning av datorn inför digitalt prov ännu viktigare. Undersökningar har gjorts gällande elevernas uppfattning kring digitala provsystem samt deras åsikter om digitala prov i allmänhet. Andra arbeten har gjorts gällande hur digitala provsystem fungerar tekniskt men samtidigt finns det artiklar som visar hur viktig lärarnas åsikter är. Därför kommer detta arbete definiera kraven som de krav som lärare har för att undersöka deras perspektiv, inte på det digitala prov eller provsystem som andra arbeten utan på nedlåsningsprogrammet för datorn vilket bidrar med information i ett nytt perspektiv. Detta görs genom insamling av enkäter från lärarna på en gymnasieskola för att definiera krav. Dessa krav ställs sedan mot vanligt använda nedlåsningsprogram för att svara på hur de klarar av de krav som lärare har. Resultatet av detta visar att nedlåsningsprogrammen inte uppfyller alla krav som lärarna ställer. Dock vid undersökning av de krav som underkändes bedöms nedlåsningsprogrammen leva upp till en majoritet av lärarnas krav då anpassade lösningar och vikten av olika krav disskuteras. Detta ger ett positivt betyg för nedlåsningsprogrammen och ger uppmaning till lärare att gå över till digitala prov utan att oroa sig för nedlåsningen av datorerna.
12

BYOD como pol?tica de seguran?a em uma empresa: uma an?lise ? luz da PMT

Rodrigues, Ge?rgia Cristiane 11 September 2015 (has links)
Submitted by Automa??o e Estat?stica (sst@bczm.ufrn.br) on 2016-05-06T23:52:19Z No. of bitstreams: 1 GeorgiaCristianeRodrigues_DISSERT.pdf: 1144525 bytes, checksum: 66ce070fef2718c5900fbdb9e7231c3b (MD5) / Approved for entry into archive by Arlan Eloi Leite Silva (eloihistoriador@yahoo.com.br) on 2016-05-09T19:56:30Z (GMT) No. of bitstreams: 1 GeorgiaCristianeRodrigues_DISSERT.pdf: 1144525 bytes, checksum: 66ce070fef2718c5900fbdb9e7231c3b (MD5) / Made available in DSpace on 2016-05-09T19:56:30Z (GMT). No. of bitstreams: 1 GeorgiaCristianeRodrigues_DISSERT.pdf: 1144525 bytes, checksum: 66ce070fef2718c5900fbdb9e7231c3b (MD5) Previous issue date: 2015-09-11 / O avan?o da tecnologia m?vel, no que diz respeito ? disponibilidade de servi?os 3G/4G e da utiliza??o de Dispositivos como Smartphones e Tablets originou um novo fen?meno de comunica??o: BYOD (Bring Your Own Device), ? uma nova tend?ncia de neg?cios, onde os funcion?rios est?o utilizando seus pr?prios dispositivos para fins de trabalho. A r?pida expans?o de BYOD e as quest?es de seguran?a e privacidade de dados representam desafios significativos para as organiza??es. A resposta mais comum a essas preocupa??es ? a ado??o de pol?ticas corporativas que regem BYOD. Este estudo tem por objetivo analisar a inten??o dos funcion?rios em cumprir com a pol?tica de seguran?a da organiza??o no contexto de BYOD, quando os funcion?rios utilizam seus dispositivos pessoais para acessar recursos organizacionais para realizarem o trabalho, dentro ou fora do ambiente organizacional. Para tanto, foi utilizada a Teoria de Motiva??o a Prote??o (TMP) como embasamento te?rico. Em termos metodol?gicos, a presente pesquisa, ? do tipo descritiva e tamb?m explorat?ria com uma abordagem quantitativa. N?o aleat?ria ? o tipo de amostragem. Para coleta, foi aplicado um question?rio estruturado, tipo survey, com um conjunto de itens de medi??o para cada construto. A etapa de an?lise dos dados foi realizada por meio de utiliza??o de t?cnicas de estat?stica descritiva e an?lise multivariada, tais como a An?lise Fatorial Explorat?ria (AFE) e a Regress?o Linear M?ltipla (RLM). Do ponto de vista te?rico, os resultados demonstram que o modelo PMT fornece uma base te?rica s?lida para a investiga??o nesta ?rea. No entanto, os resultados tamb?m indicam que este modelo ? afetado por fatores contextuais, e que a escolha da amostra pode influenciar a import?ncia dos diferentes componentes do modelo. Portanto, o cuidado deve ser tomado na generaliza??o desses resultados para outros contextos e popula??es / The advancement of mobile technology, with regard to the availability of 3G / 4G and use of devices such as Smartphones and Tablets yielded a new communication phenomenon: BYOD (Bring Your Own Device), is a new business trend, where employees are using their own devices for work purposes. The rapid expansion of BYOD , data security and privacy issues pose significant challenges for organizations. The most common response to these concerns is the adoption of corporate policies governing BYOD. This study aims to analyze the intention of employees to comply with the organization's security policy in the context of BYOD, when employees use their personal devices to access organizational resources to develop work related tasks, inside or outside the organizational environment. Therefore, we will use the Motivation Theory Protection as theoretical basis. In terms of methodology, this research will be a descriptive and exploratory study with a quantitative approach. Nonrandom will be the type of sampling. For collection, a structured questionnaire, survey type, with a set of measurement items for each construct is applied. The data analysis step is performed by means of descriptive statistics, Exploratory Factor Analysis and Multiple Linear Regression. From a theoretical point of view, the results demonstrate that the PMT model provides a solid theoretical basis for research in this area. However, the results also suggest that this model is affected by contextual factors, and the selection of the sample may influence the importance of the different components of the model. Therefore, caution should be taken in generalizing these results to other settings and populations.
13

A Study of the Application of a Bring Your Own Device Strategy in an Elementary School

Scholz, Carol Louise 01 January 2016 (has links)
Numerous studies have been published on the efficacy of a Bring Your Own Device (BYOD) Acceptable Use Policy (AUP) at the U.S. secondary and postsecondary school levels to increase student access to technology. However, there is a lack of data on the efficacy of a BYOD AUP to increase elementary student technology access. The purpose of this descriptive case study was to determine if a BYOD AUP at the U.S. K-5 level would increase students' access to technology as necessitated by the implementation of the Common Core State Standards (CCSS). This study was grounded in social transmission and transformative theories. The phenomenon of a northwest suburban elementary school BYOD implementation was examined by documenting the perceptions, attitudes, beliefs, lived experiences, and practices of administrators and teachers. This study used interview and classroom observation of a purposive selection of 3 elementary educators, the principal, and superintendent. Coding of data according to key words lead to analysis according to nodes and themes. Triangulation of multiple data sources and member checking helped to establish the credibility of data. Study findings documented increased access to technology for elementary students, best practices and steps to implementation. Study recommendations for elementary educators and administrators considering BYOD include consensus building, AUP, technology infrastructure, communications, professional development, classroom management, and lesson design to inform the field on elementary BYOD. Study findings facilitate social change by providing BYOD implementation recommendations, increasing elementary student access to technology at a reduced cost to districts and schools.
14

Bezpečnosť a správa mobilných zariadení v podnikovom IT / Security and management of mobile devices in the enterprise IT

Rusiňák, Peter January 2011 (has links)
The diploma thesis deals with the management and security of mobile devices in the enterprise IT. The aim of the work is to familiarize the reader with the issue of enterprise mobility. As enterprise mobility covers a vast area and an important aspect of greatly efficient and secure use of any company's mobile devices is their mobile strategy, the work focuses on the process of creating a mobile security strategy and providing guidelines for its successful implementation. The integration of smart phones into a corporate infrastructure is a complex act. It is necessary to take into account the many safety demands and requirements for interoperability. The issue of mobile enterprise device management and security is very broad. Another part of the work describes various mobile platforms in terms of their suitability for use in the enterprise IT. Operating systems are analyzed in detail from several different points of view. The work provides insight into the market of operating systems and explains the basic security threats to which these systems are exposed and recommends ways of protection against unwanted effects. The final part of the thesis deals with design solutions management and security of mobile devices in the company. On the basis of the requirements set suggests a solution that encompasses deployment of Mobile Device Management device management and security proposes rules for the extension of security policy on mobile device management.
15

The New Normal: Lived Experiences of Teachers’ Educating Students in an Always-on and Connected Middle School Environment

Murray, Alexander R. 19 July 2016 (has links)
No description available.
16

Factors Affecting the Adoption of Bring Your Own Device by Teachers in Caymanian Public High Schools

Lawrence, Cleyo Lutice 01 January 2018 (has links)
At public high schools in Cayman, teachers need to improve their productivity and efficiency by using technologies that are simple and portable like their personal devices. Studies about bring your own device (BYOD) initiatives have revealed conflicting outcomes, and are lacking in the Caribbean and especially in Cayman. The purpose of this quantitative study was to determine the main factors related to teachers' willingness to adopt BYOD in public high schools in Cayman. The theoretical framework was the unified theory of acceptance and use of technology (UTAUT). This study employed a cross-sectional survey design using a modified UTAUT instrument, which captured quantitative data from 82 participants. The use of hierarchical multiple regression to analyze the data revealed that teachers' BYOD adoption could expand by increasing facilitating conditions, performance expectancy, effort expectancy, and decreasing perceived risk. This study reduces the gap in the literature about the unified theory of acceptance and use of technology and BYOD in the Caribbean and the Cayman Islands. It also provides evidence that perceived risk can increase its explanatory power of the unified theory of acceptance and use of technology. The study also contributes to a positive social change by revealing critical issues that administrators should address when devising BYOD policies and planning educational technology integration.
17

BYOD: The PreK-12 Technology Leader's Perspective

Zagray, Peter G. 31 May 2019 (has links)
No description available.

Page generated in 0.0685 seconds