Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleMarch 2024
Comparing the Security of Three Proctoring Regimens for Bring-Your-Own-Device Exams
SIGCSE 2024: Proceedings of the 55th ACM Technical Symposium on Computer Science Education V. 1Pages 429–435https://doi.org/10.1145/3626252.3630809We compare the exam security of three proctoring regimens of Bring-Your-Own-Device, synchronous, computer-based exams in a computer science class: online un-proctored, online proctored via Zoom, and in-person proctored. We performed two randomized ...
- abstractNovember 2018
Interweaving Physical Artifacts with Visualization on Digital Media in Museums
ISS '18 Companion: Proceedings of the 2018 ACM Companion International Conference on Interactive Surfaces and SpacesPages 1–6https://doi.org/10.1145/3280295.3280297Museums and libraries store a huge number of data related to their exhibition objects. Often, these data cannot be presented in exhibitions because of limited space or limited time during guided tours. Interweaving these physical artifacts with data ...
- research-articleMarch 2018
A Multi-Enterprise Containerization Approach with an Interoperable Position-Based System
CODASPY '18: Proceedings of the Eighth ACM Conference on Data and Application Security and PrivacyPages 256–266https://doi.org/10.1145/3176258.3176311In this paper, we present our position-based, Multi-EnterpRise Containerization (MERC) architecture for BYOD security. The MERC architecture leverages positional data to grant context-aware capabilities to container-based systems. We grant enterprises ...
- research-articleOctober 2017
First Year's Efforts and Operational Results of BYOD Action in TUAT with New Style Virtual Computer Classroom
SIGUCCS '17: Proceedings of the 2017 ACM SIGUCCS Annual ConferencePages 115–118https://doi.org/10.1145/3123458.3123493In April of 2016, Tokyo University of Agriculture and Technology (TUAT) transitioned from an educational computer system to Bring Your Own Device (BYOD). In response, a brand-new computer system for the classroom, called TUAT Virtual Computer Classroom (...
- research-articleOctober 2017
New Educational ICT Environment with Cloud in Kyushu University
SIGUCCS '17: Proceedings of the 2017 ACM SIGUCCS Annual ConferencePages 105–108https://doi.org/10.1145/3123458.3123490We reported the status of the educational ICT (Information and Communication Technology) environment in Kyushu University in SIGUCCS 2009. At that time, we provided the host computer and many iMacs as terminals for students. We have been using BYOD in ...
- research-articleAugust 2017
Experiences in Secure Integration of Byod
ICICM '17: Proceedings of the 7th International Conference on Information Communication and ManagementPages 127–132https://doi.org/10.1145/3134383.3134394Bring Your Own Device (BYOD) is an important new model for allowing people to choose the best way to work, including full mobility and productivity on their choice of device. This trend makes Enterprise Mobility Management (EMM) possible to increase ...
- posterJune 2017
E-Assessment and Bring Your Own Device
ITiCSE '17: Proceedings of the 2017 ACM Conference on Innovation and Technology in Computer Science EducationPage 373https://doi.org/10.1145/3059009.3072994Following the trend of digitalization in university education, lectures and accompanying exercises and tutorials incorporate more and more digital components. These digital components spread from the usage of computers and tablets in tutorials to ...
- research-articleJune 2016
An Application Restriction System for Bring-Your-Own-Device Scenarios
SACMAT '16: Proceedings of the 21st ACM on Symposium on Access Control Models and TechnologiesPages 25–36https://doi.org/10.1145/2914642.2914645Different containerization techniques have been developed to ensure the separation of enterprise content and personal data on an end-user's device. Although the enterprise manages the environment in which work-related activities are conducted, referred ...
- abstractNovember 2015
Supporting the Meeting Journey: Understanding and Designing Collaborative Device Ecologies
ITS '15: Proceedings of the 2015 International Conference on Interactive Tabletops & SurfacesPages 463–468https://doi.org/10.1145/2817721.2820988The combination of personal and mobile technologies (Bring Your Own Device) with technology-augmented spaces designed for collaboration offers new design challenges for the HCI community. This paper is a summary of a doctoral work-in-progress aiming to ...
- extended-abstractJuly 2015
Design principles for collaborative device ecologies
British HCI '15: Proceedings of the 2015 British HCI ConferencePages 255–256https://doi.org/10.1145/2783446.2783598This paper describes the ongoing investigation of interaction design issues related to collaborative activities in device ecologies, mixing Bring Your Own Device (BYOD) and smart meeting room technologies.
- posterNovember 2014
The Latest Activity to Realize the Ideal ICT Environment in Kyushu University
SIGUCCS '14: Proceedings of the 42nd annual ACM SIGUCCS conference on User servicesPages 97–100https://doi.org/10.1145/2661172.2661200In this paper, we describe the latest activities to realize the ideal ICT (Information and Communication Technology) environment in Kyushu University. III (Information Infrastructure Initiative) is responsible for introducing, maintaining, and improving ...
- posterNovember 2014
Portable Cloud Computing System: A System which Makes Everywhere an ICT Enhanced Classroom
SIGUCCS '14: Proceedings of the 42nd annual ACM SIGUCCS conference on User servicesPages 85–88https://doi.org/10.1145/2661172.2661198A "Portable Cloud Computing System (Portable Cloud)" is discussed. This system is a portable system that can turn any room into an ICT-enhanced classroom or an ICT-enhanced meeting-room. The Portable Cloud is a carrying case, which contains Wi-Fi access ...
- posterNovember 2013
POSTER: Preserving privacy and accountability for personal devices
CCS '13: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications securityPages 1359–1362https://doi.org/10.1145/2508859.2512500Using personal mobile devices for work gave rise to a trend called "bring your own device", or BYOD. BYOD brings a productivity boost for employees, but also headaches for employers: on the one hand, the business has a legitimate interest in monitoring ...