Mobile phones and schools; the development of a taxonomy of risk
PROCEEDINGS
Ruth Wood, Kingston University, United Kingdom ; Shirley Atkinson, Christopher Johnson, Andrew Phippen, University of Plymouth, United Kingdom
E-Learn: World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education, in Quebec City, Canada ISBN 978-1-880094-63-1 Publisher: Association for the Advancement of Computing in Education (AACE), San Diego, CA
Abstract
Whilst developing technologies such as mobile communication devices are presenting education with opportunities to generate flexible and portable solutions to teaching and learning it is clear that there are other, less desirable, outcomes occurring. With the convergence of technologies, the most recent mobile phones offer a variety of opportunities to receive, capture and transfer data. With such potential, the incidents involving the transfer of sensitive data and digital intrusion through mobile phones have been documented within the media. In order to examine the current and emergent risks mobile technologies may present towards privacy, the following paper employs the use of a taxonomy designed specifically for this purpose. Finally, the implications for educational establishments, mobile phone manufacturers and policy development in light of such risk analysis will be considered and discussed.
Citation
Wood, R., Atkinson, S., Johnson, C. & Phippen, A. (2007). Mobile phones and schools; the development of a taxonomy of risk. In T. Bastiaens & S. Carliner (Eds.), Proceedings of E-Learn 2007--World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education (pp. 6911-6919). Quebec City, Canada: Association for the Advancement of Computing in Education (AACE). Retrieved August 7, 2024 from https://www.learntechlib.org/primary/p/26880/.
© 2007 Association for the Advancement of Computing in Education (AACE)
References
View References & Citations Map- Anderson P and Blackwood A (2004) Mobile and PDA technologies and their future use in education, JISC Technology and Standards Watch, (online) retrieved December 2006 Available from www.jisc.ac.uk/uploaded_documents/jisctsw_05_04.doc Atkinson S, Jagodzinski P, Johnson C, Phippen AD, (2006), Personal Privacy: Exploitation or Control through Technology, Proceedings of the Sixth International Network Conference (INC2006), Plymouth, UK, 11-14 July, pp269-276
- Halifax and Bank of Scotland (2006) Children In London Are 2006's Pocket Money Winners (online) retrieved December 2006 http://www.hbosplc.com/media/pressreleases/articles/halifax/2006-04-1501.asp?fs=/media/press_releases.asp
- Prensky M (2005) What Can You Learn from a Cell Phone? Almost Anything! Innovate 1 (5).retrieved December 2006 http://www.elearningsource.info/elearning/What%2520Can%2520You%2520Learn%2520from%2520a%2520Cell%2520Phone.pdf
- Savill-Smith C (2002) The M-Learning Project and its Investigation into Young Adults’ use of Mobile Phones, Paper presented at the Annual Conference of the British Educational Research Association, University of Exeter, 12-14 September 2002 (online) (accessed 14 December 2005, cited 14 December 2006) Available from http://www.leeds.ac.uk/educol/documents/00002199.htm
These references have been extracted automatically and may have some errors. Signed in users can suggest corrections to these mistakes.
Suggest Corrections to References