{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T10:20:46Z","timestamp":1768904446193,"version":"3.49.0"},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2012,11,30]],"date-time":"2012-11-30T00:00:00Z","timestamp":1354233600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Educ Inf Technol"],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1007\/s10639-012-9235-7","type":"journal-article","created":{"date-parts":[[2012,11,29]],"date-time":"2012-11-29T08:18:12Z","timestamp":1354177092000},"page":"441-450","source":"Crossref","is-referenced-by-count":26,"title":["Mobile phones in education: Challenges and opportunities for learning"],"prefix":"10.1007","volume":"19","author":[{"given":"Jared","family":"Keengwe","sequence":"first","affiliation":[]},{"given":"Gary","family":"Schnellert","sequence":"additional","affiliation":[]},{"given":"Denise","family":"Jonas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,11,30]]},"reference":[{"key":"9235_CR1","unstructured":"Andersen, E. (2009, August 31). Cell phones in schools: Toys or tools? Retrieved from http:\/\/journalstar.com\/lifestyles\/article_b851282e-941c-11de-b6d1-001cc4c002e0.html ."},{"key":"9235_CR2","unstructured":"Batista, E. (2003). She\u2019s gotta have it: Cell phone. Retrieved from http:\/\/www.wired.com\/print\/culture\/lifestyle\/news\/2003\/05\/58861 ."},{"key":"9235_CR3","unstructured":"Black, A. (2010). Gen Y: Who they are and how they learn. Educational Horizons, 88(2), 92\u2013101."},{"key":"9235_CR4","unstructured":"Bully Police USA (2011). North Dakota passes an A++ law. Retrieved from http:\/\/www.bullypolice.org\/nd_law.html ."},{"key":"9235_CR5","unstructured":"Cell Phone Safety (2011). Retrieved from http:\/\/www.cellphonesafety.org\/ ."},{"key":"9235_CR6","unstructured":"Coates, 1. (2007). Generational learning styles. River Falls, WI: LERN Books."},{"key":"9235_CR7","unstructured":"Cyberbullyalert.com (2008). Statistics thay may shock you! Retrieved from http:\/\/www.cyberbullyalert.com\/blog\/tag\/cell-phone\/ ."},{"key":"9235_CR8","unstructured":"Duranni, A. (2009). Sexting growing trend among teens. Retrieved from http:\/\/www.public.getlegal.com\/articles\/sexting ."},{"key":"9235_CR9","unstructured":"Faull, J. (2006). Teaching kids cell phone etiquette. Retrieved from http:\/\/www.parents.com ."},{"key":"9235_CR10","first-page":"221","volume-title":"21st century skills: Rethinking how students learn","author":"D Fisher","year":"2010","unstructured":"Fisher, D., & Frey, N. (2010). Preparing students for mastery of 21st century skills. In J. A. Bellanca & R. S. Brandt (Eds.), 21st century skills: Rethinking how students learn (pp. 221\u2013240). Bloomington, IN: Solution Tree."},{"key":"9235_CR11","unstructured":"HarrisInterative (2008). CTIA advocacy. Retrieved from http:\/\/www.files.ctia.org\/pdf\/HI_TeenMobileStudy_ResearchReport.pdf ."},{"key":"9235_CR12","unstructured":"Hartwell-Walker, M. (2010). Cyberbullying and teen suicide. Retrieved from http:\/\/www.psychcentral.com\/lib\/2010\/cyberbullying-and-teen-suicide\/ ."},{"key":"9235_CR13","unstructured":"Hinduja, S. P., & Patchin, P. J. (2011). Cyberbulling fact sheet. Retrieved from http:\/\/www.cyberbullying.us\/Cyberbullying_Identification_Prevention_Response_Fact_Sheet.pdf ."},{"key":"9235_CR14","unstructured":"Horrigan, J. B. (2008). Mobile access to data and information. Retrieved from http:\/\/www.pewinternet.org\/press-releases\/2008\/Mobile-Access-to-Data-and-Information ."},{"key":"9235_CR15","unstructured":"International Society for Technology in Education (2007). NETS standards for students 2007. Retrieved from http:\/\/www.iste.org\/standards\/nets-for-students\/nets-student-standards-2007.aspx ."},{"issue":"3","key":"9235_CR16","first-page":"20","volume":"38","author":"D Johnson","year":"2010","unstructured":"Johnson, D. (2010). Taming the chaos. Learning and Leading with Technology, 38(3), 20\u201323.","journal-title":"Learning and Leading with Technology"},{"key":"9235_CR17","unstructured":"Johnson, L. F., Levine, A., Smith, R. S., Haywood, K. (2010). Key emerging technologies for postsecondary education. The Education Digest, 34\u201338."},{"key":"9235_CR18","volume-title":"Connections: Social and cultural studies of the telephone in American life","author":"JE Kartz","year":"1999","unstructured":"Kartz, J. E. (1999). Connections: Social and cultural studies of the telephone in American life. New Brunswick, NJ: Transaction."},{"key":"9235_CR19","first-page":"305","volume-title":"A sense of place: The global and the local in mobile communication","author":"JE Katz","year":"2005","unstructured":"Katz, J. E. (2005). Mobile phones in educational settings. In K. Nyiri (Ed.), A sense of place: The global and the local in mobile communication (pp. 305\u2013317). Vienna: Passagen Verlag."},{"issue":"14406","key":"9235_CR20","first-page":"1","volume":"20","author":"M Kearney","year":"2012","unstructured":"Kearney, M., Schuck, S., Kevin Burden, K., & Aubusson, P. (2012). Viewing mobile learning from a pedagogical perspective. Research in Learning Technology, 20(14406), 1\u201317. doi: 10.3402\/rlt.v20i0\/14406 .","journal-title":"Research in Learning Technology"},{"key":"9235_CR21","unstructured":"Kemerer, F. (2011). Free speech and privacy dimensions of student misuse of their own electronic communications devices in elementary and secondary schools: A review of the issues and related law. Retrieved from http:\/\/www.sandiego.edu\/soles\/documents\/ECDKeyIssuesandReviewofLawforWebsite3-17-11.pdf ."},{"key":"9235_CR22","volume-title":"Toys to tools: Connecting student cell phones to education","author":"L Kolb","year":"2010","unstructured":"Kolb, L. (2010). Toys to tools: Connecting student cell phones to education. Eugene, OR: International Society for Technology in Education."},{"key":"9235_CR23","first-page":"243","volume-title":"21st century skills: Rethinking how students learn","author":"C Lemke","year":"2010","unstructured":"Lemke, C. (2010). Preparing students for mastery of 21st century skills. In J. A. Bellanca & R. S. Brandt (Eds.), 21st century skills: Rethinking how students learn (pp. 243\u2013269). Bloomington, IN: Solution Tree."},{"key":"9235_CR24","unstructured":"Lenart, A., Smith, A., Purcell, K., Zickurh, K. (2010). Teens and social media. Retrieved from http:\/\/www.pewinternet.org\/~\/media\/\/Files\/Reports\/2010\/PIP_Social_Media_and_Young_Adults_Report_Final_with_toplines.pdf ."},{"key":"9235_CR25","unstructured":"Lenhart, A. (2009). Teens and sexting. Retrieved from http:\/\/www.pewinternet.org\/Press-Releases\/2009\/Teens-and-Sexting.aspx ."},{"key":"9235_CR26","unstructured":"Lenhart, A. (2010). Cellphones and American adults. Retrieved from http:\/\/pewinternet.org\/~\/media\/\/Files\/Reports\/2010\/PIP_Adults_Cellphones_Report_201.pdf ."},{"key":"9235_CR27","unstructured":"McCann, K. (2008). Excessive mobile phone use affects sleep in teens. Retrieved from http:\/\/www.aasmnet.org ."},{"key":"9235_CR28","unstructured":"McGrory, K. (2010). Students today cheat by tweet (and texting, cell, internet\u2026). South Florida Sun\u2014Sentinel, B.2."},{"key":"9235_CR29","unstructured":"Millron, V., & Sandoe, K. (2008). The next generation cheating challenge. Innovate: Journal of On-line Education, 4(6). Retrieved from http:\/\/innovateonline.info\/pdf\/vol4_issue6\/The__Net_Generation_Cheating_Challenge.pdf ."},{"key":"9235_CR30","unstructured":"Montano, A. (2010). Should children be allowed to have cell phones in school? Retrieved from http:\/\/www.associatedcontent.com ."},{"key":"9235_CR31","unstructured":"National Safety Council (2010). National Safety Council warns drivres on the dagenrs of cell phone use while driving. Retrieved from http:\/\/www.nsc.org\/Pages\/NSCWarnsDriversontheDangersofCellPhoneUseWhileDrivingDuringNationalSafetyMonth.aspx ."},{"issue":"1","key":"9235_CR32","doi-asserted-by":"crossref","first-page":"41","DOI":"10.21061\/jots.v33i1.a.6","volume":"33","author":"JS Obringer","year":"2007","unstructured":"Obringer, J. S., & Coffey, K. (2007). Cell phones in American high schools: a national survey. Journal of Technology Studies, 33(1), 41\u201347.","journal-title":"Journal of Technology Studies"},{"key":"9235_CR33","doi-asserted-by":"crossref","unstructured":"O\u2019Dwyer, L., Russell, M. & Bebell, D. (2004). Identifying teacher, school and district characteristics associated with elementary teachers\u2019 use of technology: A multilevel perspective. Education Policy Analysis Archives, 12(48).","DOI":"10.14507\/epaa.v12n48.2004"},{"key":"9235_CR34","unstructured":"Parker, D. (2007). Cell phones are allowing citizens to monitor\/record behavior of law enforcement personnel. Retrieved from http:\/\/www.wirelessgalaxy.com\/researchcenter\/camera-cell-phones-are-allowing-citizens-to-monitor-record-behavior-of-law-enforcement-personnel.asp ."},{"key":"9235_CR35","unstructured":"Parmar, N. (2010). New ways to track your kids. Retrieved from http:\/\/www.smartmoney.com\/spending\/technology\/New-Ways-to-Track-Your-Kids\/ ."},{"key":"9235_CR36","volume-title":"Dealing with cell phones in school\u2014legally","author":"PBP Executive Reports","year":"2009","unstructured":"PBP Executive Reports. (2009). Dealing with cell phones in school\u2014legally. Malvern, PA: Center for Education and Employment Law."},{"key":"9235_CR37","unstructured":"Project Tomorrow (2010). Creating our future: Students speak up about their vision of 21st century learning. Retrieved from http:\/\/www.tomorrow.org\/speakup\/pdfs\/SUNationalFindings2009.pdf ."},{"key":"9235_CR38","unstructured":"Project Tomorrow (2011). The new 3 e\u2019s of education enabled, engaged, empowerd: How today\u2019s students are leveraging emerging technologies for learning. Retrieved from http:\/\/www.tomorrow.org\/speakup\/pdfs\/SU10_3EofEducation(Students).pdf ."},{"key":"9235_CR39","volume-title":"The millennials: Connecting to America\u2019s largest generation","author":"TS Rainer","year":"2010","unstructured":"Rainer, T. S., & Rainer, J. W. (2010). The millennials: Connecting to America\u2019s largest generation. Nashville, TN: B and H Publishing Group."},{"key":"9235_CR40","unstructured":"Reardon, M. (2008). Mobile carriers\u2019 see opportunity in teen market. Retrieved from http:\/\/www.reviews.cnet.com\/8301-12261_7-10038783-51.html?tag=contentMain;contentBody ."},{"key":"9235_CR41","volume-title":"Recruiting and retaining teachers","author":"RW Rebore","year":"2010","unstructured":"Rebore, R. W., & Walmsley, A. L. (2010). Recruiting and retaining teachers. Thousand Oaks, CA: Corwin."},{"key":"9235_CR42","unstructured":"Richmond, E. (2010). Cyberbullying: How to make it stop. Scholastic Administrator, pp. 38\u201342."},{"key":"9235_CR43","volume-title":"Generation M2: Media in the lives of 8- to 18-year-olds","author":"MV Rideout","year":"2010","unstructured":"Rideout, M. V., Foehr, P. U., & Roberts, P. D. (2010). Generation M2: Media in the lives of 8- to 18-year-olds. Menlo Parks, CA: The Kaiser Family Foundation."},{"key":"9235_CR44","unstructured":"Rosen, L. D. (2011). Teaching the iGeneration. Educational Leadership, 10\u201315."},{"key":"9235_CR45","unstructured":"Rudnesky, F. (2006). Raise the bar for everyone with technology integration. Retrieved from http:\/\/www.nassp.org\/Portals\/0\/Content\/53400.pdf ."},{"key":"9235_CR46","volume-title":"The evoluation of American educational technology","author":"P Saettler","year":"2004","unstructured":"Saettler, P. (2004). The evoluation of American educational technology. Sacramento, CA: Information Age Publishing."},{"key":"9235_CR47","unstructured":"National School Safety and Security Services (2007). Cell phones and text messaging in schools. Retrieved from http:\/\/www.schoolsecurity.org\/trends\/cell_phones.html ."},{"key":"9235_CR48","doi-asserted-by":"crossref","first-page":"221","DOI":"10.4135\/9781848607859.n10","volume-title":"The Sage handbook of e-learning research","author":"M Sharples","year":"2007","unstructured":"Sharples, M., Taylor, J., & Vavoula, G. (2007). A theory of learning for the mobile age. In R. Andrews & C. Haythornthwaite (Eds.), The Sage handbook of e-learning research (pp. 221\u2013247). London, UK: Sage Publications."},{"key":"9235_CR49","unstructured":"Shoemaker-Galloway, J. (2007). Social networking defined: Facebook, MySpace, Bebo and other community websites. Retrieved from http:\/\/www.suite101.com\/content\/social-networkingwhat-is-it-a22280?template=article_print.cfm ."},{"key":"9235_CR50","volume-title":"21st century skills: Learning for life in our times","author":"B Trilling","year":"2009","unstructured":"Trilling, B., & Fadel, C. (2009). 21st century skills: Learning for life in our times. San Francisco, CA: Jossey-Bass."},{"key":"9235_CR51","unstructured":"Trim, D. (2009). Teen cell phone use. Retrieved from http:\/\/www.insidetheschool.com\/teen-cell-phone-use ."},{"key":"9235_CR52","unstructured":"Trim, D. (2010). What should teaches do about sexting? Retrieved from http:\/\/www.insidetheschool.com\/articles\/what-should-teachers-do-about-sexting ."},{"key":"9235_CR53","volume-title":"Not everyone gets a trophy: How to manage generation Y","author":"B Tulgan","year":"2009","unstructured":"Tulgan, B. (2009). Not everyone gets a trophy: How to manage generation Y. San Francisco, CA: Jossey-Bass."},{"key":"9235_CR54","unstructured":"Ullman, E. (2011). School CIO: Follow the leader. Retrieved from http:\/\/www.techlearning.com\/PrintableArticle.aspzx?id=38512 ."},{"key":"9235_CR55","unstructured":"Vennochi, J. (2007, September 20). Reading, writing, and cheating. The Boston Globe. Retrieved from http:\/\/www.boston.com\/news\/education\/k_12\/articles\/2007\/09\/20\/reading_writing_and_cheating ."},{"key":"9235_CR56","unstructured":"Woempner, C. (2007). Teaching the next generation. Retrieved from http:\/\/www.mcrel.org\/futureofschooling\/PDF\/4005PI_GenerationsApril2007.pdf#search=\u201cgenera ."}],"container-title":["Education and Information Technologies"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10639-012-9235-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10639-012-9235-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10639-012-9235-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T16:08:21Z","timestamp":1559232501000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10639-012-9235-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,11,30]]},"references-count":56,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2014,6]]}},"alternative-id":["9235"],"URL":"https:\/\/doi.org\/10.1007\/s10639-012-9235-7","relation":{},"ISSN":["1360-2357","1573-7608"],"issn-type":[{"value":"1360-2357","type":"print"},{"value":"1573-7608","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,11,30]]}}}