Tanya Jane McGill

Tanya Jane McGill
  • Professor (Associate) at Murdoch University

About

181
Publications
85,499
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,761
Citations
Current institution
Murdoch University
Current position
  • Professor (Associate)
Additional affiliations
July 1990 - present
Murdoch University
Position
  • Associate Professor, Information Technology

Publications

Publications (181)
Article
Full-text available
This paper examines study efficiency and time distortion experienced by student users of YouTube. Using multi-group structural equation modelling on data from 792 Malaysian university students, the study identified links between YouTube use motivation, conscientiousness (a personality trait), time distortion, and perceived study efficiency. It also...
Article
The constant increase in users’ bandwidth needs, through a large variety of multimedia applications, creates the need for highly effective network traffic control. This need is imperative in wireless networks, where the available bandwidth is limited, but is very important for wired networks as well. In this work we focus on the problem of policing...
Article
As video has become the dominant type of traffic over wired and wireless networks, the efficient transmission of video streams is of paramount importance. Hence, especially for wireless networks, the optimum utilisation of the available bandwidth while preserving the users’ Quality of Service and Quality of Experience requirements is crucial. Towar...
Conference Paper
Full-text available
The internationalization of websites should lead to highly usable web pages with excellent user experience. As a result, the understanding and implementation of users' preferences for functionality, look, feel and aesthetics in website design has become a fundamental issue that needs to be adequately addressed. This research empirically demonstrate...
Article
Purpose Information technology users often fail to adopt necessary security and privacy measures, leading to increased risk of cybercrimes. There has been limited research on how demographic differences influence information security behaviour and understanding this could be important in identifying users who may be more likely to have poor informa...
Article
Modern web technologies provide a highly customizable and dynamic interaction medium, yet their potential to accommodate individual user preferences and needs is largely untapped. This research empirically demonstrates the significant interaction of user culture with website usability and satisfaction on a set of translated Australian and Chinese w...
Article
Email users are vulnerable to phishing threats and a greater understanding of how to protect them is needed. This research investigates how response costs and rewards influence users’ protective and maladaptive security behaviours in the domain of phishing by testing a model that extends Protection Motivation Theory to more explicitly consider the...
Article
Full-text available
Abstract Analysis of time series data has been a challenging research subject for decades. Email traffic has recently been modelled as a time series function using a Recurrent Neural Network (RNN) and RNNs were shown to provide higher prediction accuracy than previous probabilistic models from the literature. Given the exponential rise of email wor...
Article
Electronic health records (EHRs) are electronic versions of longitudinal individual health records that are easily accessible and can be shared among relevant stakeholders. Their use can contribute to improved health outcomes. This research aimed to identify the key factors influencing healthcare consumer adoption of EHRs by testing an EHR consumer...
Article
Full-text available
Though there is a tension between citizens' privacy concerns and their acceptance of government surveillance, there is little systematic research in this space and less still in a cross‐cultural context. We address the research gap by modeling the factors that drive public acceptance of government surveillance, and by exploring the influence of nat...
Article
Smart home devices form a significant part of the consumer IoT market yet they have potential security risks. Little is known about how security risk perceptions influence householders’ decisions to adopt smart home devices. In order to examine how perceptions of security risks influence intentions to use smart home devices, we test a new model of...
Chapter
Affective computing is the broad domain encompassing all of the hardware, software, and underlying theoretical models underpinning the development of affect sensitive computer systems. Such systems facilitate more intuitive, natural computer interfaces by enabling the communication of the user's emotional state. Despite rapid growth in recent years...
Article
Smart home devices form a significant part of the Internet of Things market and can provide benefits such as convenience and energy efficiency. They also have potential privacy and security risks as they collect information constantly. In order to examine how benefit and risk factors influence individuals’ intentions to adopt smart home devices, we...
Article
Purpose The purpose of this paper is to present brief YouTube life stories to learn about how extensive users experience YouTube use and manage (or fail to manage) their use. It also explores the consequences of different types of extensive use. Design/methodology/approach In this paper, a biographical approach was used. Nine students who used Y...
Article
Full-text available
This paper explores compulsive use of YouTube by university students and investigates how the uses and gratifications perspective and the personality perspective work together to explain compulsive use of the social medium. It compares the effects of motivation to use YouTube for information with motivation to use the platform for entertainment, an...
Article
Full-text available
Passwords are the most widely used method of authentication on the Internet, but users find compliance with password guidelines difficult and little is known about the long-term effects of attempts to improve compliance. The aim of this paper is to extend the work of fear appeals use in the IS security domain, to investigate longer term effects, id...
Conference Paper
Full-text available
Mental models, informal representations of reality, provide an appealing explanation for the apparently non-rational security decisions of information technology users. Although users may be attempting to make secure decisions, the use of incomplete or incorrect information security mental models as a shortcut to decision making may lead to undesir...
Article
Full-text available
Personal computing users are vulnerable to information security threats, as they must independently make decisions about how to protect themselves, often with little understanding of technology or its implications. However, personal computing users are under-represented in security research studies, especially for mobile device use. The study descr...
Article
Information technology has been identified as a vital means for supporting construction project processes, but the level of adoption in the construction industry has been low relative to other sectors. Mobile Information and communications technology (mICT) allows people to access information from wherever they are, and as work in the construction...
Article
Full-text available
Home users are particularly vulnerable to information security threats as they must make decisions about how to protect themselves, often with little knowledge of the technology. Furthermore, information for home users tends to focus on the traditional PC and may downplay threats faced on mobile devices, transforming well-known and old risks into n...
Article
Transnational education (TNE) is an important facet of the international education learning and teaching landscape. Ensuring academics are positively engaged in TNE is a challenging but necessary issue for this form of educational provision if the risks inherent in TNE are to be successfully mitigated. This article explores job satisfaction for aca...
Conference Paper
[This Proceedings paper was revised and published in the journal Issues in Informing Science and Information Technology] Aim/Purpose : The aim of this project was to explore student perceptions of the value of both the creation of video content and exposure to other students’ work though peer assessment and inclusion of exemplars as unit materia Ba...
Article
Full-text available
Aim/Purpose: The aim of this project was to explore student perceptions of the value of both the creation of video content and exposure to other students’ work though peer assessment and inclusion of exemplars as unit material. Background: The research was in a first year information technology flipped-learning unit, where the assessment involved s...
Article
Asynchronous online discussion (AOD) is used in many tertiary education courses, and assessing it has been shown to enhance critical thinking outcomes. There has, however, been debate on what should be assessed and how the assessment should be implemented. The most common form of assessment involves grading the individual discussion contributions,...
Article
Full-text available
This paper details the design, development and evaluation of an affective tutoring system (ATS)—an e-learning system that detects and responds to the emotional states of the learner. Research into the development of ATS is an active and relatively new field, with many studies demonstrating promising results. However, there is often no practical way...
Chapter
Full-text available
This study used big five personality to test the relationship between students personality trait and habitual use of the Facebook. The data was collected in from 667 undergraduate students who use Facebook in University of Malaya, and the model was tested by structural equation modelling, through Amos. The results of the study shows no relationship...
Article
Full-text available
This research examined how managers in universities incorporate non-financial measures in their Learning Management Systems decision-making processes and particularly focused on the importance of the Human Capital perspective in LMS decision making processes. A mixed-methods approach to data collection was used involving both interviews and questio...
Article
Full-text available
Affective computing applications hold promise to revolutionize human-computer interaction by enabling more natural and intuitive interaction modalities. These may include the communication of vocal expressions, physiological signals or other non-verbal indicators of underlying affective state. Although the field has experienced substantial expansio...
Chapter
Full-text available
Affective computing facilitates more intuitive, natural computer interfaces by enabling the communication of the user's emotional state. Despite rapid growth in recent years, affective computing is still an under-explored field, which holds promise to be a valuable direction for future software development. Human-computer interaction has traditiona...
Conference Paper
Full-text available
As Australian universities' involvement in Transnational Education (TNE) continues to grow, little thought is given to the role of the academic. It is important that academics are engaged positively with TNE in order to mitigate some of the risks associated with TNE. A study of IT academics has shown that while they are less satisfied with TNE than...
Article
This paper introduces the field of affective computing, and the benefits that can be realized by enhancing e-learning applications with the ability to detect and respond to emotions experienced by the learner. Affective computing has potential benefits for all areas of computing where the computer replaces or mediates face to face communication. Th...
Article
Full-text available
The risks associated with online transactions influencing the use of e-services and e-government services include e-privacy concerns. This study has examined the impact of e-privacy risk concerns on the acceptance of e-government services in Oman using an integrated model. The model is based on Liu, Marchewka, Lu, and Yu's (2005) privacy-trust-beha...
Article
This paper systematically examines conditions associated with continuation of e-learning initiatives in universities. Conditions associated with institutional, developer, instructor, student and technology issues were identified from a review of the literature. Authors of 64 empirical papers describing e-learning initiatives (20 of which had not co...
Article
Stronger linkages between the ICT industry and universities have been called for by both the ICT industry and by universities. The study described in this paper explores the ways in which the ICT industry believes it can and should contribute to ICT education and research in universities. The results confirm how important relationships with univers...
Conference Paper
Full-text available
Passwords have long been the preferred method of user authentication, yet poor password practices cause security issues. The study described in this paper investigates how user perceptions of passwords and security threats affect intended compliance with guidelines and explores how these perceptions might be altered in order to improve compliance....
Article
Strengthening the teaching-research-industry-learning TRIL nexus in information, communications and technology ICT education has been proposed as a way of achieving improvements in student learning Koppi & Naghdy, 2009. The research described in this paper builds on previous work to provide a broader understanding of the potential outcomes associat...
Conference Paper
There is now a far greater level of heterogeneity in the university cohort in age, experience and cultural and socio-economic backgrounds than in the past. This means that assumptions about the equality of student knowledge and ability that may still exist could be causing difficulties for female and male students who are not school leavers or nati...
Article
This paper presents the functionality-based application confinement (FBAC) access control model. FBAC is an application-oriented access control model, intended to restrict processes to the behaviour that is authorised by end users, administrators, and processes, in order to limit the damage that can be caused by malicious code, due to software vuln...
Conference Paper
Certification has become a popular adjunct to traditional means of acquiring information and communication technology (ICT) knowledge and skills and many employers specify a preference for those holding certifications. Many ICT certifications include a requirement to recertify regularly, but little is known about the impacts of recertification requ...
Article
Under most widely-used security mechanisms the programs users run possess more authority than is strictly necessary, with each process typically capable of utilising all of the user's privileges. Consequently such security mechanisms often fail to protect against contemporary threats, such as previously unknown (‘zero-day’) malware and software vul...
Article
Full-text available
This paper documents the outcomes of a study that focused on identifying what motivates stu-dents to use mobile devices for learning and to engage in m-learning. An outcome of this study was to provide a better understanding of what educators should consider when adapting their course for mobile learners. The research included seven classes from th...
Article
Full-text available
TNE has become an important part of Australian universities’ IT learning and teaching landscape. This paper presents the preliminary results of an investigation into IT academic job satisfaction and TNE; in particular, how both the nature and frequency of the interaction the academic has with TNE students and teaching staff, and the level of contro...
Chapter
This chapter discusses the domain of affective computing and reviews the area of affective tutoring systems: e-learning applications that possess the ability to detect and appropriately respond to the affective state of the learner. A significant proportion of human communication is non-verbal or implicit, and the communication of affective state p...
Conference Paper
Full-text available
Affective computer interfaces improve human-computer interaction by enabling the communication of the user's emotional state. To this end, subtle non-verbal methods of communication provide a rich source of information which may provide valuable affective context to the human-computer interaction. Of particular note are physiological indicators of...
Article
The facilitation of critical thinking is one of the most frequently discussed potential benefits of the asynchronous online discussion environment, but many studies have reported that it does not occur to any great extent. This study investigated the effect of information provided to students on the facilitation of their critical thinking outcomes...
Article
Full-text available
The teaching-research nexus concept has been extensively examined in the higher education literature, and the importance of industry linkages in information and communications technology (ICT) education has also been widely discussed. However, to date there has been little recognition of the full extent of relationships between aspects of teaching,...
Article
A number of security mechanisms are available for improving the security of systems by restricting the actions of individual programs to activities that are authorised. However, configuring these systems to enforce end users' own security goals is often beyond their expertise. Little research has investigated the usability issues associated with ap...
Conference Paper
Student attrition is of particular concern in the field of ICT because the industry faces staffing shortfalls, generally and a noticeable lack of female employees. This paper explores the reasons students give for leaving their ICT courses and examines gender differences in them. An online survey of early leavers from four Australian universities w...
Article
Full-text available
Student attrition is an issue of particular concern in the field of ICT because the industry faces staffing shortfalls. The study described in this paper provides further understanding of the causes of attrition from ICT courses by exploring the reasons students give for leaving their ICT courses. An online survey of early leavers from four Austral...
Article
Full-text available
Protecting end users from security threats is an extremely difficult, but increasingly critical, problem. Traditional security models that focused on separating users from each other have proven ineffective in an environment of widespread software vulnerabilities and rampant malware. However, alternative approaches that provide more finely grained...
Conference Paper
Full-text available
By managing the authority assigned to each applica- tion, rule-based application-oriented access controls can signifi- cantly mitigate the threats posed by malicious code due to soft- ware vulnerabilities or malware. However, these policies are typically complex and difficult to develop. Learning modes can ease specification; however, they still re...
Conference Paper
Full-text available
This paper presents a new policy language, known as functionality-based application confinement policy language (FBAC-PL). FBAC-PL takes a unique approach to expressing application-oriented access control policies. Policies for restrict- ing applications are defined in terms of the features applications provide, by means of parameterised and hierar...
Article
Full-text available
Recent research (Jonas-Dwyer & Sudweeks, 2007) indicated that when virtual microscopes were introduced to third year health science students as part of their histology and pathology laboratory work, no detrimental effects were found. To investigate the use of virtual microscopes further, an extended study was undertaken with both second and third y...
Article
The introduction of learning management systems (LMS) has changed the way in which instructors work. This paper uses Goodhue and Thompson's (1995) technology-to-performance chain (TPC) to explore the roles of task-technology fit (TTF) and level of LMS use in the performance impacts of LMS for instructors. A mixed method approach was used: an initia...
Chapter
The security of computer systems that store our data is a major issue facing the world. This research project investigated the roles of ease of use, facilitating conditions, intention to use passwords securely, experience and age on usage of passwords, using a model based on the Unified Theory of Acceptance and Use of Technology. Data was collected...
Article
Learning management systems (LMS) have been adopted by the majority of higher education institutions and research that explores the factors that influence the success of LMS is needed. This paper investigates the roles of student and instructor involvement in LMS success, using the DeLone and McLean (2003) model of information systems success as a...
Chapter
Full-text available
The security of computer systems that store our data is a major issue facing the world. This research project investigated the roles of ease of use, facilitating conditions, intention to use passwords securely, experience and age on usage of passwords, using a model based on the Unified Theory of Acceptance and Use of Technology. Data was collected...
Article
Asynchronous online discussion is used in a variety of ways, both in online learning environments and in traditional teaching environments where, increasingly frequently, a blended approach is adopted. However the anticipated benefits of this tool in improving student learning outcomes are still being debated. One of the many factors affecting the...
Article
The technology acceptance model (TAM) is a popular model for the prediction of information systems acceptance behaviors, defining a causal linkage between beliefs, attitudes, intentions, and the usage of information technologies. Since its inception, numerous studies have utilized the TAM, providing empirical support for the model in both tradition...
Article
Full-text available
This paper describes the development of a supplementary package for external students designed to address some of these problems
Article
Learning management systems (LMSs) are very widely used in higher education. However, much of the research on LMSs has had a technology focus or has been limited to studies of adoption. In order to take advantage of the potential associated with LMSs, research that addresses the role of LMSs in learning success is needed. Task–technology fit is one...
Article
Full-text available
The security of computer systems that store our data is a major issue facing the world. This research project investigated the roles of ease of use, facilitating conditions, intention to use passwords securely, experience and age on usage of passwords, using a model based on the Unified Theory of Acceptance and Use of technology. Data was collected...
Article
Given increasing adoption of agile software development methodologies it is essential that information technology students are exposed to them. This paper describes and evaluates an attempt to introduce agile programming into a core second year programming course. The initiative appeared to be associated with improvements in both drop out and pass...
Chapter
The technology acceptance model (TAM) is a popular model for the prediction of information systems acceptance behaviors, defining a causal linkage between beliefs, attitudes, intentions, and the usage of information technologies. Since its inception, numerous studies have utilized the TAM, providing empirical support for the model in both tradition...
Article
Full-text available
Information and communications technology (ICT) has increasingly influenced higher education. Computer-based packages and other learning objects provide a useful supplement to students studying conventionally by illustrating aspects of the curriculum. Other packages are directed at aspects of course administration such as automated assessment (for...
Article
Full-text available
The development of applications by end users has become an integral part of organizational information provision. It has been established that there are both benefits and risks associated with end-user development, particularly in the areas of spreadsheets and databases. Web development tools are enabling a new kind of end-user development. The fac...
Article
User participation and involvement have long been associated with system success. This paper reports on a study to investigate the role of involvement in user developed application success. The experimental study explored the chain of influences between involvement and the different forms of information systems success and clarified how these influ...
Article
Full-text available
The human cognitive system possesses a finite processing capacity, which is split into channels for various modalities, and learning can be inhibited if any of the cognitive channels is overloaded. However, although the amount of e-learning materials is increasing steadily, the design of instructional material has been largely based on intuition ra...
Article
Virtual learning environments (VLEs) are widespread in higher education today, typically used to deliver instructional materials and facilitate communication within a course. This study aimed to investigate the task–technology fit of VLEs for their two main groups of users: instructors and students, using the VLE WebCT. Task–technology fit, user sa...
Article
Full-text available
Virtual project teams introduce new challenges for project managers tasked with the job of delivering project success. One such challenge is the development and maintenance of trust within the virtual environment. The paper explores the role that trust plays in virtual project teams and investigates how trust influences project outcomes. A model of...
Chapter
Certification has become a popular adjunct to traditional means of acquiring information technology skills and employers increasingly specify a preference for those holding certifications. This paper reports on a study designed to investigate student perceptions of both the benefits and risks of certification and its importance in obtaining employm...
Chapter
Lectures are the traditional method of content delivery in undergraduate information technology degrees, yet concerns have been raised about their effectiveness. This chapter addresses the role of lectures within information technology degree programs from a student perspective; it examines the factors that influence lecture attendance, and student...
Chapter
The development of applications by end users has become an integral part of organizational information provision. It has been established that there are both benefits and risks associated with end-user development, particularly in the areas of spreadsheets and databases. Web development tools are enabling a new kind of end user development. The fac...
Chapter
The ETIPS software is a Web-based learning environment that delivers cases that allow educators to practice instructional decision making. Here I recount its development but mainly emphasize the two key concepts that were central to our design process. The first was the Conceptual Assessment Framework, an evidentiary reasoning and design perspectiv...
Chapter
Lectures are the traditional method of content delivery in undergraduate information technology degrees, yet concerns have been raised about their effectiveness. This paper addresses the role of lectures within information technology degree programs from a student perspective; it examines the factors that influence lecture attendance and student pe...
Chapter
Certification has become a popular adjunct to traditional means of acquiring information technology skills and employers increasingly specify a preference for those holding certifications. This paper reports on a study designed to investigate student perceptions of both the benefits and risks of certification and its importance in obtaining employm...
Chapter
The information technology industry is subject to rapid change. There have been concerns expressed in the literature about the ability of information technology professionals to keep up to date with developments, and it is likely that it is even more difficult for students to do so. New graduates require marketable skills in order to gain good empl...
Chapter
Certification has become a popular adjunct to traditional means of acquiring information technology skills and employers increasingly specify a preference for those holding certifications. This article reports on a study designed to investigate student perceptions of both the benefits and risks of certification and its importance in obtaining emplo...
Chapter
Lectures are the traditional method of content delivery in undergraduate information technology degrees, yet concerns have been raised about their effectiveness. This chapter addresses the role of lectures within information technology degree programs from a student perspective; it examines the factors that influence lecture attendance, and student...
Chapter
The development of applications by end users has become an integral part of organizational information provision. It has been established that there are both benefits and risks associated with end-user development, particularly in the areas of spreadsheets and databases. Web development tools are enabling a new kind of end-user development. The fac...
Article
The way in which instructors work has changed markedly since the introduction of learning management systems (LMS). This paper uses Goodhue and Thompson’s (1995) technology-to-performance chain (TPC) as a starting point to explore the roles of task-technology fit (TTF) and level of LMS use in the performance impacts of LMS for instructors. A mixed...
Article
Lectures are the traditional method of content delivery in undergraduate information technology degrees, yet concerns have been raised about their effectiveness. This paper addresses the role of lectures within information technology degree programs from a student perspective; it examines the factors that influence lecture attendance and student pe...
Article
Certification has become a popular adjunct to traditional means of acquiring information technology skills and employers increasingly specify a preference for those holding certifications. This article reports on a study designed to investigate student perceptions of both the benefits and risks of certification and its importance in obtaining emplo...
Article
Full-text available
The technology acceptance model (TAM) is a popular model for the prediction of information systems acceptance behaviors, defining a causal linkage between beliefs, attitudes, intentions, and the usage of information technologies. Since its inception, numerous studies have utilized the TAM, providing empirical support for the model in both tradition...
Chapter
The development of applications by end users has become an integral part of organizational information provision. It has been established that there are both benefits and risks associated with end-user development, particularly in the areas of spreadsheets and databases. Web development tools are enabling a new kind of end user development. The fac...

Network

Cited By