Professional Documents
Culture Documents
Running Head: Webibliography: Cloud Computing in Education 1
Running Head: Webibliography: Cloud Computing in Education 1
Jason D. Lauer
Liberty University
CLOUD COMPUTING IN EDUCATION 2
Summary
Technology and the digital age is ever growing. Advancements in digital content have
led to larger file sizes and storage issues. To help battle the concerns of consumers, companies
have created cloud-based storage systems (Arpaci, 2016). These cloud-based storage systems
are designed to ease consumer concerns about storage limit, and ease of access (Arpaci, 2016).
In this research article, Arpaci (2016) looks to create a framework based on the Technology
Acceptance Model to measure the attitudes of students using cloud storage services.
The sample for research consisted of 262 undergraduate students selected using the
convenience sampling method (Arpaci, 2016). Students in the sampling ranged from the age of
17 to 32 (Arpaci, 2016). Of those aged students, 93.4% were in the 18-23 age range (Arpaci,
2016). Further breaking down the sample students, 59.2% were female, and 40.8% were
male(Arpaci, 2016).
The research design used in the study was based off of the Technology Acceptance Model
(TAM) (Arpaci, 2016). This form of model is widely accepted when determining the acceptance
of new technology (Arpaci, 2016). The study also utilized Fishbein and Ajzens Theory of
Reasoned Action (TRA) for theoretical basis (Arpaci, 2016). This theory basically has two
Results of the study demonstrated the participant's attitudes toward mobile cloud storage
services were affected by perceived usefulness, trust, and subjective norm as indicated by TRA
(Arpaci, 2016). The research conducted in the article further supported existing literature about
cloud services (Arpaci, 2016). Two major components in the success or failure of mobile could
storage services are enhanced security, and user privacy (Arpaci, 2016). Research implications
CLOUD COMPUTING IN EDUCATION 3
stated by Arpaci (2016) show the research model created for the study better explains the
variance of the dependent variable when compared to the TAM. The conducted research model
includes social variables and situation-specific factors in which the TAM does not.
Critique
This article dives deep into the understanding and reasoning behind students intentions
when using mobile cloud storage services. Although the research is thorough and well put
together, does it really cover the topic of the article? During the conclusion of the research does
Arpaci (2016) have all the answers they were looking for?
In the introduction Arpaci (2016) does a good job describing the various cloud computing
uses and the three different levels. This information is important to distinguish the results at the
end of the article. Personally, when thinking about cloud storage, the basics come to mind first.
Programs such as google drive, Microsoft one drive, icloud, all the big names. These are merely
one part of what is a bigger picture in the cloud computing system. The three important areas of
cloud computing consist of infrastructure of service, platform as service, and software of service
(Arpaci, 2016). Arpaci (2016) continues later in the introduction to get specific about mobile
cloud computing. In these paragraphs, the information is well portrayed to identify the many
uses of mobile cloud computing by the main players listed earlier such as Google Drive.
The research model and hypotheses conducted by Arpaci (2016) is very impressive. Out
of all the articles researched for this project, Arpaci was the most detailed. Arpaci (2016) created
Acceptance Model. This was a smart move for Arpaci to base this study off of a well-known,
respected model. Since the Technology Acceptance Model covers some of the basis of what
CLOUD COMPUTING IN EDUCATION 4
Arpaci is looking for in the study, the Technology Acceptance Model serves as a strong backbone
Further strengthening the validity of the study by Arpaci (2016), the research implications
are well put together. Arpaci (2016) starts off the research implications portion with strong
evidence supporting the study. The research model used for the study covered a greater amount
of information including dependent, and social variables (Arpaci, 2016). This bit of information
describes the validity of the study over the well-known Technology Acceptance Model,
Adding a very important part to the study, Arpaci (2016) includes the practical
implications of the findings of the research. This is a useful paragraph nicely summarizing the
findings of the study and clearing demonstration how they can be used in a practical manner.
Ending this much-needed paragraph is a bit of advice for universities, or even any other
educational institution to be sure and have policy guidelines in place when students are using
Reference
Arpaci, I. (2016). Understanding and predicting students intention to use mobile cloud storage
services. Computers in Human Behavior, 58, 150157.
http://doi.org/10.1016/j.chb.2015.12.067
Summary
Security is a major concern with the world of technology. Many adults who are not
familiar with the technology, or did not grow up with it, are afraid to use it. These adults most
likely are scared to use technology because of the possibilities of items not being secure. The
same goes for educational systems such as universities and public or private schools, they are
fearful of security and try and hold tight to the technology implementation in their give spaces
CLOUD COMPUTING IN EDUCATION 5
(Brown, Green, & Robinson, 2010). The purpose of this book is to initiate conversations about
security and what specific measures teachers need to take insure security when implementing
manner. Brown, Green, & Robinson (2010) break the chapters down into nine specific areas of
focus. Chapter 2 starts things off with the discussion of inappropriate content. An alarming rate
of students between the ages of nine and nineteen have seen inappropriate content on the internet
(Brown, Green, & Robinson, 2010). Chapters three further discuss such topics as predators, and
instances when young people can be in danger (Brown, Green, & Robinson, 2010). The fourth
chapter of the book rounds up the portions focused mainly on children in which it discusses
missuses of mobile communication and devices for cyberbullying (Brown, Green, & Robinson,
2010).
The final chapters of five through nine put the focus on the school systems or universities
(Brown, Green, & Robinson, 2010). The book goes on to discuss the uses of the network,
copyright infringement, data and identity theft and professional responsibility (Brown, Green, &
Robinson, 2010). While it appears the first four chapters focus on mainly the students, the final
five chapters dig a little deeper into some of the responsibilities of the adults and teachers
Critique
Although this book is somewhat dated with being published back in 2010, it still has
some relevant information. All the threats mentioned in the book are still very many threats here
in 2017. With the advancements in technology come new security threats. With the
CLOUD COMPUTING IN EDUCATION 6
advancements in security individuals which want to do harm are coming up with new ways to do
so. It is a never-ending cycle in which the good has a difficult time keeping on top of the bad.
Focusing on chapter two, the threat of inappropriate content, Brown, Green, & Robinson
do a good job describing the various forms of inappropriate content. First thought of
inappropriate content is most likely pornography. While this is a major part of the inappropriate
content discussed in the book, there are also graphic pictures and guides to build harmful devices
(Brown et al., 2010). Within many of the chapters, the book is useful in describing the realities
of some of these threats (Brown et al., 2010). The media of the world, television, the internet,
etc. will hype up certain situations to try and gain more interest from the audience (Brown et al.,
2010). This book does a good job of making sure the topics discussed are seen in truthful
realities. The book is not just another source of media outlet, but truthfully breaks down the
Although it is the responsibility of the educator to monitor the students, the districts sometimes
monitor the teachers. Brown et al., (2010) makes a very interesting point in stating they do not
advocate for surveillance of teachers and staff. They feel this does not display professionalism
and trust of the teachers and staff of the specific district (Brown et al., 2010). This is a
fascinating point showing how serious it is to treat your teachers and staff in a professional
manner, not only when it comes to privacy and trust on the provided network, but should be
As stated earlier, this book is a fantastic resource for years to come. The threats
discussed in this book are going to be threats for years to come. The methods for fighting these
threats may change to some degree, but the basics will remain the same. Districts need to trust
CLOUD COMPUTING IN EDUCATION 7
their teachers and treat them as professionals, and teachers need to monitor students whenever
they can.
Reference
Brown, A.H., Green, T.D., and Robinson, L.K. (2010). Security vs. access. Oregon: ISTE.
ISBN 9781564842640. (K-12)
Summary
Maker spaces are becoming a major part of the educational setting. Many libraries are
being transformed into media spaces in which some are including maker spaces. Maker spaces
are areas in which students can create knowledge and content (Moorefield-Lang, 2015). The
purpose of this paper further discusses maker spaces and the movement to make them mobile
(Moorefield-Lang, 2015). Six different librarians and educators were interviewed to describe
their maker spaces and how the ability for them to be mobile has been useful in their educational
setting (Moorefield-Lang, 2015). Findings during the course of the interviews were
demonstrating the usefulness of a mobile maker space to reach more students (Moorefield-Lang,
2015). Students who do not have access to the maker spaces located in a specific brick and
motor location, now have access to maker spaces via these mobile setups (Moorefield-Lang,
2015). The implications of this study demonstrate the lack of research in the field of maker
Critique
Working closely with a librarian, it has been seen the importance libraries still hold in the
educational setting. Libraries still have a great value, the materials in which they can provide are
just changing. One clear question of this article is the concrete evidence of the usefulness of
mobile maker spaces. The maker space being able to move from one location to another does
demonstrate some usefulness in the ability to reach other students. The main concern and focus
CLOUD COMPUTING IN EDUCATION 8
in many schools today is test scores. Are these maker spaces helping students learn the material
they need?
Maybe the purpose of the article is not to demonstrate student learning is happening due
to maker spaces, but to demonstrate there are alternative methods to teaching certain content.
Moorefield-Lang (2015) does do a good job providing numerous resources as far as different
locations through the world with mobile maker spaces. These various maker spaces seem to be
having a positive impact on students and schools in general. Even if direct learning is not
happening with the maker spaces, the thought of showing students pieces such as a 3D printer,
and coding may impact them in a way test scores can not.
STEM (Science, Technology, Engineering, and Math) are a big push these days.
Although this article may not answer all the questions about the validity of maker spaces, it
demonstrates the drive in the school system to incorporate STEM principals whenever possible.
With the lack of interest in STEM and many jobs which are becoming available, the maker space
movement and especially the mobile maker space may have a more positive impact than we
know. Therefore the information shared by Moorefield-Lang (2015) is useful in its own right.
References
the school one to one initiative, you will most likely see two major companies, Apple or Google.
When one to one initiatives first began Apple was one of the first to be introduced in schools.
Many schools thought the introduction of the iPad was going to be the technology everyone
CLOUD COMPUTING IN EDUCATION 9
needed. As good as IPads are for certain situations, it was being found the cost of purchasing,
repairing, or replacing was not worth the initial investment. Google most likely saw this
situation from a long distance and knew they could do it better. Google later on down the line
introduced the Chromebook. Chromebooks come preinstalled with all the Google applications
which need to be used. The introduction of the Chromebook into schools brought about Google
apps for education (GAFE). While these applications were to be widely used in the educational
setting, schools were not always aware of the privacy settings associated with Google.
This is where Lindh and Nolin (2016) come in. They conducted a study to analysis the
surveillance and privacy when implementing Google apps for education (Lindh & Nolin, 2016).
Approximately 30 Swedish school within an educational organization were used for the sample
(Lindh & Nolin, 2016). The research design created used a rhetorical analysis of Googles policy
documents during an interview with the Swedish educational organization (Lindh & Nolin,
2016). The results of the study demonstrated the Swedish organization felt GAFE was useful but
they failed to understand the privacy issues associated with using the programs (Lindh & Nolin,
2016). Implications of the study demonstrate due to the lack of concern for privacy issues during
the use of GAFE, the students of the Swedish organization were forced to use a product which
Critique
Privacy issue with programs has always been an issue in the world. With Google being
such a big company, many people have wondered what Google does with all the information
they are ultimately collecting. Any user of the Google play store, and android applications will
understand the advancements they have made in privacy situations with apps. Android devices,
CLOUD COMPUTING IN EDUCATION 10
in particular, will ask what permissions the application will be allowed to have on your device
Lindh and Nolin (2016) do a fantastic job diving into the many layers which make up
Google and their privacy issues. Google is smart, and they do a good job of covering up as much
of the fine print as possible to make it look like your data is secure (Lindh & Nolin, 2016).
When discussing Google apps for education, in particular, it is portrayed by Google the data of
the school system will be theirs and theirs alone (Lindh & Nolin, 2016). The article does a good
job of describing what Google is actually saying about the data which is stored on any given
device using GAFE (Lindh & Nolin, 2016). The article goes on to explain the data within the
documents created is kept secure and not shared, but basically, the process of creating the
document is recorded and make into an algorithm used by Google to make a profit off of (Lindh
As stated earlier, Lindh and Nolin (2016) do a good job in this article in breaking down
all the various pieces of Google as a company. Within this breakdown, they clearly and
concisely demonstrate how Google is a business and will use whatever means they can to get the
information they ultimately make money on (Lindh & Nolin, 2016). With the inclusion of the
Swedish educational system, it would have been more helpful if the article could have included
more instances of educational setting using GAFE and their thoughts on the various privacy
Reference
Lindh, M., & Nolin, J. (2016). Information We Collect: Surveillance and Privacy in the
Implementation of Google Apps for Education. European Educational Research Journal,
15(6),
CLOUD COMPUTING IN EDUCATION 11
644663. http://doi.org/10.1177/1474904116654917
Summary
Google is a big part of the educational system. The introduction of Chromebooks and
Google apps for education has improved the technology integration of many school systems
throughout the world. A big part of the Google suite utilized by many is Google Drive. The
introduction of Google drive initially was just for a cloud-based area to store files. Drive was a
separate application for a long while when it was introduced. The same was said for Googles
office suite consisting of Docs, Slides, and Sheets. They were all individual application which
did not have many ties to each other when first introduced. Somewhere along the line, Google
decided to incorporate all of the office suite pieces into Google Drive. This allowed the creation
With the continued growth and changes to Google Drive, Rowe, Bozalek, and Frantz
(2013) did a study to demonstrate the usefulness of Google Drive in facilitating a blended
approach to authentic learning. In 2012 at the University of Western Cape, located in South
Africa the study was conducted in a physiotherapy department (Rowe, Bozalek & Frantz, 2013).
The study was initiated due to final-year students not demonstrating reasoning and critical
thinking during their final exams (Rowe, Bozalek & Frantz, 2013). This data spark the
university to change the model of teaching which was being conducted (Rowe, Bozalek &
Frantz, 2013). The classes changed from a traditional lecture style class to case-based learning
with the integration of technology for communication (Rowe, Bozalek & Frantz, 2013). Google
drive was a major player in this revamping due to its ability for students to collaborate with each
other and shared documents in a meaningful way (Rowe, Bozalek & Frantz, 2013). Basic results
CLOUD COMPUTING IN EDUCATION 12
from the study demonstrated the students were happy with how the class changed, and the role
they now had in collaborating with each other (Rowe, Bozalek & Frantz, 2013).
Critique
This article is one of the more difficult articles to agree with. The information seems to
be legitimate and well put together, but the focus just being on Google drive is hard to
understand. All the pieces which make of Google drive are important in the collaboration
process. As stated earlier, Google docs, sheets, and slides are all key components to the
effectiveness of Google Drive. Without the inclusion and breakdown of these important pieces it
is difficult to believe the information being shared by Rowe, Bozalek and Frantz (2013).
The data collection piece of the study does not seem very strong. The study created a
couple focus groups to discuss the creation of meaningful sharing. This does not seem like a
very valid setup to collect data. Hopefully future research on this topic will include some more
The last section which is not very strong is the results of the study. This is merely a small
paragraph stating the responses gained from the study were in support of the themes during the
content (Rowe, Bozalek & Frantz, 2013). Yes, self learning is great, but this article lacks the
concrete data proving student learning is occuring with the use of Google Drive.
The move in education towards student driven assignments is great. Google drive and all
the Google applications are a big player in the movement due to their ability to collaborate so
easily. This article could have done a better job deomstrating all the various tools in the Google
suite which can be used to grown student learning and create a sense of collaboration.
References
Rowe, M., Bozalek, V., & Frantz, J. (2013). Using Google Drive to facilitate a blended approach
CLOUD COMPUTING IN EDUCATION 13