{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T13:42:20Z","timestamp":1743082940373,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319955216"},{"type":"electronic","value":"9783319955223"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-95522-3_23","type":"book-chapter","created":{"date-parts":[[2018,7,5]],"date-time":"2018-07-05T10:59:35Z","timestamp":1530788375000},"page":"275-286","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["The Impact of Mobile Device Use"],"prefix":"10.1007","author":[{"given":"D\u2019Arcy","family":"Becker","sequence":"first","affiliation":[]},{"given":"Aimee","family":"Pernsteiner","sequence":"additional","affiliation":[]},{"given":"Dawna","family":"Drum","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"23_CR1","doi-asserted-by":"publisher","first-page":"609","DOI":"10.2308\/iace-50029","volume":"6","author":"R Alford","year":"2011","unstructured":"Alford, R., DiMattia, T., Hill, N., Stevens, K.: A series of revenue recognition research cases using the codification. Issues Account. Educ. 6(3), 609\u2013650 (2011)","journal-title":"Issues Account. Educ."},{"key":"23_CR2","unstructured":"AICPA: Top Technology Initiatives. American Institute of Certified Public Accountants (2011). http:\/\/www.aicpa.org\/InterestAreas\/InformationTechnology\/Resources\/TopTechnologylnitiatives\/Pages\/2010TopTenInitiatives-Complete.aspx. Accessed 4 Jan 2012"},{"key":"23_CR3","unstructured":"Amato, N.: The top global risks for 2017. CGMA Magazine, 19 December 2016. www.cgma.org\/Magazine"},{"key":"23_CR4","unstructured":"Baker, P.: Ten smartphone security tips. CIO Update, 9 February 2011. http:\/\/www.cioupdate.com\/trends\/article.php\/3924241"},{"key":"23_CR5","unstructured":"Chen, B., Seilhamer, R., Bennett, L., Bauer, S.: Students\u2019 mobile learning practices in higher education: a multi-year study. EduCause Review (2015). http:\/\/er.educause.edu\/articles\/2015\/6\/students-mobile-learning-practices-in-higher-education-a-multiyear-study"},{"issue":"4","key":"23_CR6","first-page":"1","volume":"32","author":"G Cheng","year":"2016","unstructured":"Cheng, G., Guan, Y., Chau, J.: An empirical study towards understanding user acceptance of bring your own device (BYOD) in higher education. Australas. J. Educ. Technol. 32(4), 1\u201317 (2016)","journal-title":"Australas. J. Educ. Technol."},{"key":"23_CR7","unstructured":"Erlanger, L.: Smartphone security best practices. McAfee Blog Central, 4 November 2010. http:\/\/blogs.mcafee.com\/enterprise\/security-connected"},{"issue":"1","key":"23_CR8","first-page":"31","volume":"15","author":"M Healy","year":"2008","unstructured":"Healy, M., McCutcheon, M.: Engagement with active learning: reflections on the experience. Ir. Account. Rev. 15(1), 31\u201349 (2008)","journal-title":"Ir. Account. Rev."},{"issue":"2","key":"23_CR9","first-page":"22","volume":"53","author":"B Jones","year":"2012","unstructured":"Jones, B., Heinrichs, L.: Do business students practice smartphone security? J. Comput. Inf. Syst. 53(2), 22\u201330 (2012)","journal-title":"J. Comput. Inf. Syst."},{"issue":"6","key":"23_CR10","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/s11528-014-0806-x","volume":"58","author":"B Jones","year":"2014","unstructured":"Jones, B., Chin, A., Aiken, P.: Risky business: students and smartphones. Techtrends: Link. Res. Pract. Improv. Learn. 58(6), 73\u201383 (2014)","journal-title":"Techtrends: Link. Res. Pract. Improv. Learn."},{"issue":"1","key":"23_CR11","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1108\/IMCS-01-2013-0005","volume":"22","author":"E Kim","year":"2014","unstructured":"Kim, E.: Recommendations for information security awareness training for college students. Inf. Manag. Comput. Secur. 22(1), 115\u2013126 (2014)","journal-title":"Inf. Manag. Comput. Secur."},{"key":"23_CR12","first-page":"77","volume":"11","author":"W Miller","year":"2014","unstructured":"Miller, W., Becker, D., Pernsteiner, A.: The accounting ethics course reconsidered. Glob. Perspect. Account. Educ. 11, 77\u201398 (2014)","journal-title":"Glob. Perspect. Account. Educ."},{"issue":"2","key":"23_CR13","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/s10551-012-1291-9","volume":"113","author":"C O\u2019Leary","year":"2013","unstructured":"O\u2019Leary, C., Stewart, J.: The interaction of learning styles and teaching methodologies in accounting ethical instruction. J. Bus. Ethics 113(2), 225\u2013241 (2013)","journal-title":"J. Bus. Ethics"},{"issue":"1","key":"23_CR14","first-page":"41","volume":"24","author":"K Patten","year":"2013","unstructured":"Patten, K., Harris, M.: The need to address mobile device security in the higher education curriculum. J. Inf. Syst. Educ. 24(1), 41\u201352 (2013)","journal-title":"J. Inf. Syst. Educ."},{"key":"23_CR15","unstructured":"Rose, B.: Security: How to keep your handset safe. PC World, 10 January 2010. http:\/\/www.pcworld.com\/businesscenter\/article\/216420"},{"issue":"3","key":"23_CR16","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/s10676-013-9320-7","volume":"15","author":"B Roux","year":"2013","unstructured":"Roux, B., Falgoust, M.: Information ethics in the context of smart devices. Ethics Inf. Technol. 15(3), 183\u2013194 (2013)","journal-title":"Ethics Inf. Technol."},{"issue":"200","key":"23_CR17","doi-asserted-by":"publisher","first-page":"335","DOI":"10.15446\/dyna.v84n200.54161","volume":"84","author":"J S\u00e1nchez-Alzate","year":"2017","unstructured":"S\u00e1nchez-Alzate, J., S\u00e1nchez-Torres, J.: Analysis of social factors and their relationship with perceived risk for e-commerce purchases. Dyna 84(200), 335\u2013341 (2017)","journal-title":"Dyna"},{"issue":"2","key":"23_CR18","doi-asserted-by":"publisher","first-page":"399","DOI":"10.2308\/iace-50119","volume":"27","author":"S Thomas","year":"2012","unstructured":"Thomas, S.: Ethics and accounting education. Issues Account. Educ. 27(2), 399\u2013450 (2012)","journal-title":"Issues Account. Educ."},{"issue":"4","key":"23_CR19","first-page":"291","volume":"22","author":"H Xu","year":"2011","unstructured":"Xu, H., Rondeau, P., Mahenthiran, S.: Teaching case the challenge of implementing an ERP system in a small and medium enterprise - a teaching case of ERP project management. J. Inf. Syst. Educ. 22(4), 291\u2013296 (2011)","journal-title":"J. Inf. Syst. Educ."}],"container-title":["Communications in Computer and Information Science","Learning Technology for Education Challenges"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-95522-3_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,14]],"date-time":"2024-10-14T15:06:54Z","timestamp":1728918414000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-95522-3_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319955216","9783319955223"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-95522-3_23","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2018]]}}}