
Tanya Jane McGill- Professor (Associate) at Murdoch University
Tanya Jane McGill
- Professor (Associate) at Murdoch University
About
181
Publications
85,499
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,761
Citations
Introduction
Skills and Expertise
Current institution
Additional affiliations
July 1990 - present
Publications
Publications (181)
This paper examines study efficiency and time distortion experienced by student users of YouTube. Using multi-group structural equation modelling on data from 792 Malaysian university students, the study identified links between YouTube use motivation, conscientiousness (a personality trait), time distortion, and perceived study efficiency. It also...
The constant increase in users’ bandwidth needs, through a large variety of multimedia applications, creates the need for highly effective network traffic control. This need is imperative in wireless networks, where the available bandwidth is limited, but is very important for wired networks as well. In this work we focus on the problem of policing...
As video has become the dominant type of traffic over wired and wireless networks, the efficient transmission of video streams is of paramount importance. Hence, especially for wireless networks, the optimum utilisation of the available bandwidth while preserving the users’ Quality of Service and Quality of Experience requirements is crucial. Towar...
The internationalization of websites should lead to highly usable web pages with excellent user experience. As a result, the understanding and implementation of users' preferences for functionality, look, feel and aesthetics in website design has become a fundamental issue that needs to be adequately addressed. This research empirically demonstrate...
Purpose
Information technology users often fail to adopt necessary security and privacy measures, leading to increased risk of cybercrimes. There has been limited research on how demographic differences influence information security behaviour and understanding this could be important in identifying users who may be more likely to have poor informa...
Modern web technologies provide a highly customizable and dynamic interaction medium, yet their potential to accommodate individual user preferences and needs is largely untapped. This research empirically demonstrates the significant interaction of user culture with website usability and satisfaction on a set of translated Australian and Chinese w...
Email users are vulnerable to phishing threats and a greater understanding of how to protect them is needed. This research investigates how response costs and rewards influence users’ protective and maladaptive security behaviours in the domain of phishing by testing a model that extends Protection Motivation Theory to more explicitly consider the...
Abstract Analysis of time series data has been a challenging research subject for decades. Email traffic has recently been modelled as a time series function using a Recurrent Neural Network (RNN) and RNNs were shown to provide higher prediction accuracy than previous probabilistic models from the literature. Given the exponential rise of email wor...
Electronic health records (EHRs) are electronic versions of longitudinal individual health records that are easily accessible and can be shared among relevant stakeholders. Their use can contribute to improved health outcomes. This research aimed to identify the key factors influencing healthcare consumer adoption of EHRs by testing an EHR consumer...
Though there is a tension between citizens' privacy concerns and their acceptance of government surveillance, there is little systematic research in this space and less still in a cross‐cultural context. We address the research gap by modeling the factors that drive public acceptance of government surveillance, and by exploring the influence of nat...
Smart home devices form a significant part of the consumer IoT market yet they have potential security risks. Little is known about how security risk perceptions influence householders’ decisions to adopt smart home devices. In order to examine how perceptions of security risks influence intentions to use smart home devices, we test a new model of...
Affective computing is the broad domain encompassing all of the hardware, software, and underlying theoretical models underpinning the development of affect sensitive computer systems. Such systems facilitate more intuitive, natural computer interfaces by enabling the communication of the user's emotional state. Despite rapid growth in recent years...
Smart home devices form a significant part of the Internet of Things market and can provide benefits such as convenience and energy efficiency. They also have potential privacy and security risks as they collect information constantly. In order to examine how benefit and risk factors influence individuals’ intentions to adopt smart home devices, we...
Purpose
The purpose of this paper is to present brief YouTube life stories to learn about how extensive users experience YouTube use and manage (or fail to manage) their use. It also explores the consequences of different types of extensive use.
Design/methodology/approach
In this paper, a biographical approach was used. Nine students who used Y...
This paper explores compulsive use of YouTube by university students and investigates how the uses and gratifications perspective and the personality perspective work together to explain compulsive use of the social medium. It compares the effects of motivation to use YouTube for information with motivation to use the platform for entertainment, an...
Passwords are the most widely used method of authentication on the Internet, but users find compliance with password guidelines difficult and little is known about the long-term effects of attempts to improve compliance. The aim of this paper is to extend the work of fear appeals use in the IS security domain, to investigate longer term effects, id...
Mental models, informal representations of reality, provide an appealing explanation for the apparently non-rational security decisions of information technology users. Although users may be attempting to make secure decisions, the use of incomplete or incorrect information security mental models as a shortcut to decision making may lead to undesir...
Personal computing users are vulnerable to information security threats, as they must independently make decisions about how to protect themselves, often with little understanding of technology or its implications. However, personal computing users are under-represented in security research studies, especially for mobile device use. The study descr...
Information technology has been identified as a vital means for supporting construction project processes, but the level of adoption in the construction industry has been low relative to other sectors. Mobile Information and communications technology (mICT) allows people to access information from wherever they are, and as work in the construction...
Home users are particularly vulnerable to information security threats as they must make decisions about how to protect themselves, often with little knowledge of the technology. Furthermore, information for home users tends to focus on the traditional PC and may downplay threats faced on mobile devices, transforming well-known and old risks into n...
Transnational education (TNE) is an important facet of the international education learning and teaching landscape. Ensuring academics are positively engaged in TNE is a challenging but necessary issue for this form of educational provision if the risks inherent in TNE are to be successfully mitigated. This article explores job satisfaction for aca...
[This Proceedings paper was revised and published in the journal Issues in Informing Science and Information Technology] Aim/Purpose : The aim of this project was to explore student perceptions of the value of both the creation of video content and exposure to other students’ work though peer assessment and inclusion of exemplars as unit materia Ba...
Aim/Purpose: The aim of this project was to explore student perceptions of the value of both the creation of video content and exposure to other students’ work though peer assessment and inclusion of exemplars as unit material. Background: The research was in a first year information technology flipped-learning unit, where the assessment involved s...
Asynchronous online discussion (AOD) is used in many tertiary education courses, and assessing it has been shown to enhance critical thinking outcomes. There has, however, been debate on what should be assessed and how the assessment should be implemented. The most common form of assessment involves grading the individual discussion contributions,...
This paper details the design, development and evaluation of an affective tutoring system (ATS)—an e-learning system that detects and responds to the emotional states of the learner. Research into the development of ATS is an active and relatively new field, with many studies demonstrating promising results. However, there is often no practical way...
This study used big five personality to test the relationship between students personality trait and habitual use of the Facebook. The data was collected in from 667 undergraduate students who use Facebook in University of Malaya, and the model was tested by structural equation modelling, through Amos. The results of the study shows no relationship...
This research examined how managers in universities incorporate non-financial measures in their Learning Management Systems decision-making processes and particularly focused on the importance of the Human Capital perspective in LMS decision making processes. A mixed-methods approach to data collection was used involving both interviews and questio...
Affective computing applications hold promise to revolutionize human-computer interaction by enabling more natural and intuitive interaction modalities. These may include the communication of vocal expressions, physiological signals or other non-verbal indicators of underlying affective state. Although the field has experienced substantial expansio...
Affective computing facilitates more intuitive, natural computer interfaces by enabling the communication of the user's emotional state. Despite rapid growth in recent years, affective computing is still an under-explored field, which holds promise to be a valuable direction for future software development. Human-computer interaction has traditiona...
As Australian universities' involvement in Transnational Education (TNE) continues to grow, little thought is given to the role of the academic. It is important that academics are engaged positively with TNE in order to mitigate some of the risks associated with TNE. A study of IT academics has shown that while they are less satisfied with TNE than...
This paper introduces the field of affective computing, and the benefits that can be realized by enhancing e-learning applications with the ability to detect and respond to emotions experienced by the learner. Affective computing has potential benefits for all areas of computing where the computer replaces or mediates face to face communication. Th...
The risks associated with online transactions influencing the use of e-services and e-government services include e-privacy concerns. This study has examined the impact of e-privacy risk concerns on the acceptance of e-government services in Oman using an integrated model. The model is based on Liu, Marchewka, Lu, and Yu's (2005) privacy-trust-beha...
This paper systematically examines conditions associated with continuation of e-learning initiatives in universities. Conditions associated with institutional, developer, instructor, student and technology issues were identified from a review of the literature. Authors of 64 empirical papers describing e-learning initiatives (20 of which had not co...
Stronger linkages between the ICT industry and universities have been called for by both the ICT industry and by universities. The study described in this paper explores the ways in which the ICT industry believes it can and should contribute to ICT education and research in universities. The results confirm how important relationships with univers...
Passwords have long been the preferred method of user authentication, yet poor password practices cause security issues. The study described in this paper investigates how user perceptions of passwords and security threats affect intended compliance with guidelines and explores how these perceptions might be altered in order to improve compliance....
Strengthening the teaching-research-industry-learning TRIL nexus in information, communications and technology ICT education has been proposed as a way of achieving improvements in student learning Koppi & Naghdy, 2009. The research described in this paper builds on previous work to provide a broader understanding of the potential outcomes associat...
There is now a far greater level of heterogeneity in the university cohort in age, experience and cultural and socio-economic backgrounds than in the past. This means that assumptions about the equality of student knowledge and ability that may still exist could be causing difficulties for female and male students who are not school leavers or nati...
This paper presents the functionality-based application confinement (FBAC) access control model. FBAC is an application-oriented access control model, intended to restrict processes to the behaviour that is authorised by end users, administrators, and processes, in order to limit the damage that can be caused by malicious code, due to software vuln...
Certification has become a popular adjunct to traditional means of acquiring information and communication technology (ICT) knowledge and skills and many employers specify a preference for those holding certifications. Many ICT certifications include a requirement to recertify regularly, but little is known about the impacts of recertification requ...
Under most widely-used security mechanisms the programs users run possess more authority than is strictly necessary, with each process typically capable of utilising all of the user's privileges. Consequently such security mechanisms often fail to protect against contemporary threats, such as previously unknown (‘zero-day’) malware and software vul...
This paper documents the outcomes of a study that focused on identifying what motivates stu-dents to use mobile devices for learning and to engage in m-learning. An outcome of this study was to provide a better understanding of what educators should consider when adapting their course for mobile learners. The research included seven classes from th...
TNE has become an important part of Australian universities’ IT learning and teaching landscape. This paper presents the preliminary results of an investigation into IT academic job satisfaction and TNE; in particular, how both the nature and frequency of the interaction the academic has with TNE students and teaching staff, and the level of contro...
This chapter discusses the domain of affective computing and reviews the area of affective tutoring systems: e-learning applications that possess the ability to detect and appropriately respond to the affective state of the learner. A significant proportion of human communication is non-verbal or implicit, and the communication of affective state p...
Affective computer interfaces improve human-computer interaction by enabling the communication of the user's emotional state. To this end, subtle non-verbal methods of communication provide a rich source of information which may provide valuable affective context to the human-computer interaction. Of particular note are physiological indicators of...
The facilitation of critical thinking is one of the most frequently discussed potential benefits of the asynchronous online discussion environment, but many studies have reported that it does not occur to any great extent. This study investigated the effect of information provided to students on the facilitation of their critical thinking outcomes...
The teaching-research nexus concept has been extensively examined in the higher education literature, and the importance of industry linkages in information and communications technology (ICT) education has also been widely discussed. However, to date there has been little recognition of the full extent of relationships between aspects of teaching,...
A number of security mechanisms are available for improving the security of systems by restricting the actions of individual programs to activities that are authorised. However, configuring these systems to enforce end users' own security goals is often beyond their expertise. Little research has investigated the usability issues associated with ap...
Student attrition is of particular concern in the field of ICT because the industry faces staffing shortfalls, generally and a noticeable lack of female employees. This paper explores the reasons students give for leaving their ICT courses and examines gender differences in them. An online survey of early leavers from four Australian universities w...
Student attrition is an issue of particular concern in the field of ICT because the industry faces staffing shortfalls. The study described in this paper provides further understanding of the causes of attrition from ICT courses by exploring the reasons students give for leaving their ICT courses. An online survey of early leavers from four Austral...
Protecting end users from security threats is an extremely difficult, but increasingly critical, problem. Traditional security models that focused on separating users from each other have proven ineffective in an environment of widespread software vulnerabilities and rampant malware. However, alternative approaches that provide more finely grained...
By managing the authority assigned to each applica- tion, rule-based application-oriented access controls can signifi- cantly mitigate the threats posed by malicious code due to soft- ware vulnerabilities or malware. However, these policies are typically complex and difficult to develop. Learning modes can ease specification; however, they still re...
This paper presents a new policy language, known as functionality-based application confinement policy language (FBAC-PL). FBAC-PL takes a unique approach to expressing application-oriented access control policies. Policies for restrict- ing applications are defined in terms of the features applications provide, by means of parameterised and hierar...
Recent research (Jonas-Dwyer & Sudweeks, 2007) indicated that when virtual microscopes were introduced to third year health science students as part of their histology and pathology laboratory work, no detrimental effects were found. To investigate the use of virtual microscopes further, an extended study was undertaken with both second and third y...
The introduction of learning management systems (LMS) has changed the way in which instructors work. This paper uses Goodhue and Thompson's (1995) technology-to-performance chain (TPC) to explore the roles of task-technology fit (TTF) and level of LMS use in the performance impacts of LMS for instructors. A mixed method approach was used: an initia...
The security of computer systems that store our data is a major issue facing the world. This research project investigated the roles of ease of use, facilitating conditions, intention to use passwords securely, experience and age on usage of passwords, using a model based on the Unified Theory of Acceptance and Use of Technology. Data was collected...
Learning management systems (LMS) have been adopted by the majority of higher education institutions and research that explores
the factors that influence the success of LMS is needed. This paper investigates the roles of student and instructor involvement
in LMS success, using the DeLone and McLean (2003) model of information systems success as a...
The security of computer systems that store our data is a major issue facing the world. This research project investigated the roles of ease of use, facilitating conditions, intention to use passwords securely, experience and age on usage of passwords, using a model based on the Unified Theory of Acceptance and Use of Technology. Data was collected...
Asynchronous online discussion is used in a variety of ways, both in online learning environments and in traditional teaching environments where, increasingly frequently, a blended approach is adopted. However the anticipated benefits of this tool in improving student learning outcomes are still being debated. One of the many factors affecting the...
The technology acceptance model (TAM) is a popular model for the prediction of information systems acceptance behaviors, defining a causal linkage between beliefs, attitudes, intentions, and the usage of information technologies. Since its inception, numerous studies have utilized the TAM, providing empirical support for the model in both tradition...
This paper describes the development of a supplementary package for external students designed to address some of these problems
Learning management systems (LMSs) are very widely used in higher education. However, much of the research on LMSs has had a technology focus or has been limited to studies of adoption. In order to take advantage of the potential associated with LMSs, research that addresses the role of LMSs in learning success is needed. Task–technology fit is one...
The security of computer systems that store our data is a major issue facing the world. This research project investigated the roles of ease of use, facilitating conditions, intention to use passwords securely, experience and age on usage of passwords, using a model based on the Unified Theory of Acceptance and Use of technology. Data was collected...
Given increasing adoption of agile software development methodologies it is essential that information technology students are exposed to them. This paper describes and evaluates an attempt to introduce agile programming into a core second year programming course. The initiative appeared to be associated with improvements in both drop out and pass...
The technology acceptance model (TAM) is a popular model for the prediction of information systems acceptance behaviors, defining a causal linkage between beliefs, attitudes, intentions, and the usage of information technologies. Since its inception, numerous studies have utilized the TAM, providing empirical support for the model in both tradition...
Information and communications technology (ICT) has increasingly influenced higher education. Computer-based packages and other learning objects provide a useful supplement to students studying conventionally by illustrating aspects of the curriculum. Other packages are directed at aspects of course administration such as automated assessment (for...
The development of applications by end users has become an integral part of organizational information provision. It has been established that there are both benefits and risks associated with end-user development, particularly in the areas of spreadsheets and databases. Web development tools are enabling a new kind of end-user development. The fac...
User participation and involvement have long been associated with system success. This paper reports on a study to investigate the role of involvement in user developed application success. The experimental study explored the chain of influences between involvement and the different forms of information systems success and clarified how these influ...
The human cognitive system possesses a finite processing capacity, which is split into channels for various modalities, and learning can be inhibited if any of the cognitive channels is overloaded. However, although the amount of e-learning materials is increasing steadily, the design of instructional material has been largely based on intuition ra...
Virtual learning environments (VLEs) are widespread in higher education today, typically used to deliver instructional materials and facilitate communication within a course. This study aimed to investigate the task–technology fit of VLEs for their two main groups of users: instructors and students, using the VLE WebCT. Task–technology fit, user sa...
Virtual project teams introduce new challenges for project managers tasked with the job of delivering project success. One such challenge is the development and maintenance of trust within the virtual environment. The paper explores the role that trust plays in virtual project teams and investigates how trust influences project outcomes. A model of...
Certification has become a popular adjunct to traditional means of acquiring information technology skills and employers increasingly specify a preference for those holding certifications. This paper reports on a study designed to investigate student perceptions of both the benefits and risks of certification and its importance in obtaining employm...
Lectures are the traditional method of content delivery in undergraduate information technology degrees, yet concerns have been raised about their effectiveness. This chapter addresses the role of lectures within information technology degree programs from a student perspective; it examines the factors that influence lecture attendance, and student...
The development of applications by end users has become an integral part of organizational information provision. It has been established that there are both benefits and risks associated with end-user development, particularly in the areas of spreadsheets and databases. Web development tools are enabling a new kind of end user development. The fac...
The ETIPS software is a Web-based learning environment that delivers cases that allow educators to practice instructional decision making. Here I recount its development but mainly emphasize the two key concepts that were central to our design process. The first was the Conceptual Assessment Framework, an evidentiary reasoning and design perspectiv...
Lectures are the traditional method of content delivery in undergraduate information technology degrees, yet concerns have been raised about their effectiveness. This paper addresses the role of lectures within information technology degree programs from a student perspective; it examines the factors that influence lecture attendance and student pe...
Certification has become a popular adjunct to traditional means of acquiring information technology skills and employers increasingly specify a preference for those holding certifications. This paper reports on a study designed to investigate student perceptions of both the benefits and risks of certification and its importance in obtaining employm...
The information technology industry is subject to rapid change. There have been concerns expressed in the literature about the ability of information technology professionals to keep up to date with developments, and it is likely that it is even more difficult for students to do so. New graduates require marketable skills in order to gain good empl...
Certification has become a popular adjunct to traditional means of acquiring information technology skills and employers increasingly specify a preference for those holding certifications. This article reports on a study designed to investigate student perceptions of both the benefits and risks of certification and its importance in obtaining emplo...
Lectures are the traditional method of content delivery in undergraduate information technology degrees, yet concerns have been raised about their effectiveness. This chapter addresses the role of lectures within information technology degree programs from a student perspective; it examines the factors that influence lecture attendance, and student...
The development of applications by end users has become an integral part of organizational information provision. It has been established that there are both benefits and risks associated with end-user development, particularly in the areas of spreadsheets and databases. Web development tools are enabling a new kind of end-user development. The fac...
The way in which instructors work has changed markedly since the introduction of learning management systems (LMS). This paper uses Goodhue and Thompson’s (1995) technology-to-performance chain (TPC) as a starting point to explore the roles of task-technology fit (TTF) and level of LMS use in the performance impacts of LMS for instructors. A mixed...
Lectures are the traditional method of content delivery in undergraduate information technology degrees, yet concerns have been raised about their effectiveness. This paper addresses the role of lectures within information technology degree programs from a student perspective; it examines the factors that influence lecture attendance and student pe...
Certification has become a popular adjunct to traditional means of acquiring information technology skills and employers increasingly specify a preference for those holding certifications. This article reports on a study designed to investigate student perceptions of both the benefits and risks of certification and its importance in obtaining emplo...
The technology acceptance model (TAM) is a popular model for the prediction of information systems acceptance behaviors, defining a causal linkage between beliefs, attitudes, intentions, and the usage of information technologies. Since its inception, numerous studies have utilized the TAM, providing empirical support for the model in both tradition...
The development of applications by end users has become an integral part of organizational information provision. It has been established that there are both benefits and risks associated with end-user development, particularly in the areas of spreadsheets and databases. Web development tools are enabling a new kind of end user development. The fac...