BYOD strategy and implementation: Creating a ...

2 downloads 481 Views 1MB Size Report
students to 'own or have access to' a laptop. Abilene Christian University (in the USA) has provided each student with an iPhone or iPod Touch since 2009.
Steve Bowman Deputy Librarian, University of Chichester

BYOD Strategy and Implementation Strategy

Implementation

 Definitions

 Function

 Context

 Form

 Contentions

 Conclusions

BYOD/BYOT/BYOB?  BYOD  Bring Your Own Device (BYOD) is a policy of bringing personally owned mobile devices to [school, college, Uni] and using those devices to access [institutional] resources, as well as personal applications and data.  BYOT/BYOB  The terms Bring Your Own Technology (BYOT) or Bring Your Own Behaviour (BYOB) are also used, because they express a broader phenomenon, which not only covers the hardware device(s), but also the software used on the device. (Wikipedia, 2012)

BYOD Context  In general, society has become increasingly… engaged

in using information, and perhaps even technology dependent, and this trend continues to grow  Students are no exception, [and] they are the new

leaders in the use of IT for school, work, and leisure. Digital Disconnects in Teacher Education, Kathy Smart

BYOD Context  The 2011 ECAR Study found that;  87% owned a laptop

 70% a usb drive  62% an ipod  55% a smartphone

 55% a digital camera and webcam ECAR National Study of Undergraduate Students and Information Technology, (Dahlstrom, 2011)

BYOD Context  Some institutions (such as Ravensbourne in the UK) have

done away with ‘traditional technology’, and require all students to ‘own or have access to’ a laptop.  Abilene Christian University (in the USA) has provided

each student with an iPhone or iPod Touch since 2009.  Other HEIs require that the students’ provide (and are

responsible for) their own devices. NMC Horizon report: 2012 Higher Education (Johnson, L., Adams, S., and Cummins, M.,2012).

BYOD Contentions  Despite the rapid growth of mobile device usage,

standard devices (e.g. laptops) and basic software applications (e.g. MS Office) still dominate student’s toolboxes.  Even where…students’ demonstrate ‘extreme mobility’

traits, [they] continue to choose standard technology and tools for productivity and sourcing information Student Mobile Computing Practices – Lessons learned from Qatar, (Dahlstrom, 2012)

BYOD Contentions  Recent research with the Student Unions of two English

Universities found that the introduction of student fees led to an expectation that all students would have access to a desktop PC as and when it was needed.  Students stated that they did not wish to read small

screens, or carry laptops around the campus. (Bowman, 2011)

BYOD Contentions  “BYOD is a bad policy that constrains student

creativity, limits learning opportunities, and will lead to less support for public education in the future” (Stager, 2012 )

 “Allowing students to use their personal devices in the

classroom is imperative in a world full of ever-changing technology. Tech[nical staff], students, and teachers all get to discover together how a new tool works to meet educational goals.” (LaMaster, 2012)

BYOD Implementation  Before you start!  Are you going to outsource the function?  Capacity vs Coverage – if a room has just one access point,

it could become overloaded.  Directory Services and Device Registration – for wireless authentication.  Role-based access control – allows different functionality for staff and students.

BYOD Form  The use of mobile devices requires an increased need

for wireless access infrastructure – students frequently use 2-3 devices at a time, each wanting a wireless connection. Multiple Devices and Platforms: Institutional Strategies, (CNI, 2012)

BYOD Form  Most consultants recommend placing BYOD traffic on a

dedicated virtual network, enabling “one [network] for [institutional] equipment, and one for personal electronic devices.”

(Raths, 2012)

BYOD Form  [You] may also need to factor in common carrier-

provided 3G/4G services and strategies that will ‘roam’ devices onto wireless networks when available to reduce load on the [home] network. Multiple Devices and Platforms: Institutional Strategies, (CNI, 2012)

BYOD Function (Technology)  Authentication and security across multiple devices brings

new and complex challenges.  ‘Enterprise software’ that can manage the operating

systems on all phones and tablets is not yet [widely] available. (Dunn, 2012)

BYOD Function (Technology)  We may be moving away from interoperability because

of the popularity of platform-specific Apps and proprietary platforms….  ….leading towards platform specific requirements for

specific activities [in the classroom]. Multiple Devices and Platforms: Institutional Strategies, (CNI, 2012)

BYOD Function (Pedagogy)  Technology Integration (TI) is the process by which

technologies are used as tools to support teaching and learning.

 [TI] is complex…involving understanding teachers’

motivations, perceptions, and beliefs about the [learning] process and technology.

 …it is usually the factors that are personal and ingrained…

that play an influential role in the integration of technology in instruction.

(Keengwe, 2009)

Conclusions  BYOD/B/T is not going to go away, at least as an idea.

 Implementation varies depending on the strategy

decided upon.  There are a range of technical, pedagogical and social

factors that need to be considered.

 Thanks for Listening!

 Any Questions?  Contact: [email protected]

Links Avema, What is “Mobile Device Management”? http://www.avema.com/mobile_device_management_blog/mobile-device-management-2/what-is-thedefinition-of-mobile-device-management, 2011 Bowman, S. BYOD, we don’t think so! http://www.m-libraries.org/bowman 2011 CNI, Multiple Devices and Platforms: Institutional Strategies, http://www.cni.org/executive-roundtablereports/multiple-devices-and-platforms-institutional-strategies/ 2012 Dahlstrom, E, ECAR National Study of Undergraduate Students and Information Technology. http://net.educause.edu/ir/library/pdf/ERS1208/ERS1208.pdf Dahlstrom, E, Student Mobile Computing Practices – Lessons learned from Qatar, http://www.educause.edu/library/resources/student-mobile-computing-practices-2012-lessons-learnedqatar

Dunn. B. (2012). The impact of B.Y.O.D. bring your own device. http://consulting.berrydunn.com/sites/default/files/press_releases/BYOD%20in%20Higher%20Educatio n.pdf

Links Hill, R. 'Mobile Digital Devices', Teacher Librarian, 39, 1, pp. 22-26, Professional Development Collection, EBSCOhost, viewed 29 November 2012. Johnson, L., Adams, S., and Cummins, M., NMC Horizon report: 2012 Higher Education, http://www.nmc.org/publications/horizon-report-2012-higher-ed-edition Keegwe, J., Technology Integration: mobile devices (ipods), constructivist pedagogy, and student learning. AACEJ (2009) 17 (4), 333-346 http://www.editlib.org/p/29411/article_29411.pdf LaMaster,J. and Stager, G. Point/counterpoint: Should students use their own devices in the classroom? Learning & Leading with Technology. Feb2012, Vol. 39 Issue 5, p6. http://www.iste.org/learn/publications/learning-leading/issues/february-2012/point-counterpointshould-students-use-their-own-devices-in-the-classroomNelson, D. BYOD: An Opportunity Schools Cannot Afford to Miss. http://www.internetatschools.com/Articles/Editorial/Features/BYOD-An-Opportunity-Schools-CannotAfford-to-Miss-85929.aspx 2012

Raths, D. Are you ready for BOYD? THE Journal, May 2012, Vol 39, Issue 4, p28-32, 5p Smart, K. Digital Disconnects in Teacher Education, http://www.nssa.us/journals/pdf/NSS_Proceedings_2012_Las_Vegas_2.pdf#page=203