Ontology type: schema:ScholarlyArticle
2019-12-09
AUTHORS ABSTRACTCyberloafing is one of the phenomena that adversely affects the efficiency and productivity in learning and teaching activities in educational settings. Increased ICT (information and communication technology) access status in educational environments and personal mobile devices lead to a wide range of cyberloafing behaviors of learners. In this regard, the aim of this study was to investigate cyberloafing behaviors of high school students in terms of several variables, including gender, ICT usage, unauthorized access to school network, metacognitive awareness and smartphone addiction. In this study, the relational screening model from descriptive research methods was used. A total of 269 9th grade students, 123 of whom were male and 146 of whom were female, were recruited. Hierarchical linear multilevel regression analysis was employed in the data analysis. The findings indicate that four of the five models designed to investigate cyberloafing behaviors in educational settings were found to be statistically significant. In other words, four hypotheses were supported. It has been concluded that the unauthorized access to the school network of learners has a significant impact on the cyberloafing behaviors in educational contexts. Additionally, the smartphone addiction and metacognitive awareness levels of students, as well as daily social media usage time are fundamental predictors of the cyberloafing behaviors. More... »
PAGES2201-2219
http://scigraph.springernature.com/pub.10.1007/s10639-019-10042-0
DOIhttp://dx.doi.org/10.1007/s10639-019-10042-0
DIMENSIONShttps://app.dimensions.ai/details/publication/pub.1123243658
JSON-LD is the canonical representation for SciGraph data.
TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT
[
{
"@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json",
"about": [
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Information and Computing Sciences",
"type": "DefinedTerm"
},
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/13",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Education",
"type": "DefinedTerm"
},
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0806",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Information Systems",
"type": "DefinedTerm"
},
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/1302",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Curriculum and Pedagogy",
"type": "DefinedTerm"
},
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/1303",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Specialist Studies In Education",
"type": "DefinedTerm"
}
],
"author": [
{
"affiliation": {
"alternateName": "Ere\u011fli Faculty of Education, Department of Computer Education and Instructional Technology, Necmettin Erbakan University, Konya, Turkey",
"id": "http://www.grid.ac/institutes/grid.411124.3",
"name": [
"Ere\u011fli Faculty of Education, Department of Computer Education and Instructional Technology, Necmettin Erbakan University, Konya, Turkey"
],
"type": "Organization"
},
"familyName": "Saritepeci",
"givenName": "Mustafa",
"id": "sg:person.015603232575.22",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015603232575.22"
],
"type": "Person"
}
],
"citation": [
{
"id": "sg:pub.10.1007/s12528-018-9184-2",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1101847065",
"https://doi.org/10.1007/s12528-018-9184-2"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/s10758-017-9340-1",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1092591217",
"https://doi.org/10.1007/s10758-017-9340-1"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.3758/s13421-010-0035-2",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1015433985",
"https://doi.org/10.3758/s13421-010-0035-2"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/s11423-008-9086-5",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1018637467",
"https://doi.org/10.1007/s11423-008-9086-5"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/978-94-017-2243-8_2",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1029168527",
"https://doi.org/10.1007/978-94-017-2243-8_2"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/978-94-017-2243-8_4",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1042315378",
"https://doi.org/10.1007/978-94-017-2243-8_4"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/s10799-017-0280-1",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1091510948",
"https://doi.org/10.1007/s10799-017-0280-1"
],
"type": "CreativeWork"
}
],
"datePublished": "2019-12-09",
"datePublishedReg": "2019-12-09",
"description": "Cyberloafing is one of the phenomena that adversely affects the efficiency and productivity in learning and teaching activities in educational settings. Increased ICT (information and communication technology) access status in educational environments and personal mobile devices lead to a wide range of cyberloafing behaviors of learners. In this regard, the aim of this study was to investigate cyberloafing behaviors of high school students in terms of several variables, including gender, ICT usage, unauthorized access to school network, metacognitive awareness and smartphone addiction. In this study, the relational screening model from descriptive research methods was used. A total of 269 9th grade students, 123 of whom were male and 146 of whom were female, were recruited. Hierarchical linear multilevel regression analysis was employed in the data analysis. The findings indicate that four of the five models designed to investigate cyberloafing behaviors in educational settings were found to be statistically significant. In other words, four hypotheses were supported. It has been concluded that the unauthorized access to the school network of learners has a significant impact on the cyberloafing behaviors in educational contexts. Additionally, the smartphone addiction and metacognitive awareness levels of students, as well as daily social media usage time are fundamental predictors of the cyberloafing behaviors.",
"genre": "article",
"id": "sg:pub.10.1007/s10639-019-10042-0",
"inLanguage": "en",
"isAccessibleForFree": false,
"isPartOf": [
{
"id": "sg:journal.1136394",
"issn": [
"1360-2357",
"1573-7608"
],
"name": "Education and Information Technologies",
"publisher": "Springer Nature",
"type": "Periodical"
},
{
"issueNumber": "3",
"type": "PublicationIssue"
},
{
"type": "PublicationVolume",
"volumeNumber": "25"
}
],
"keywords": [
"high school students",
"school network",
"educational settings",
"school students",
"metacognitive awareness",
"metacognitive awareness level",
"behavior of learners",
"relational screening model",
"descriptive research method",
"media usage time",
"teaching activities",
"educational environment",
"educational context",
"grade students",
"linear multilevel regression analysis",
"multilevel regression analysis",
"ICT usage",
"smartphone addiction",
"cyberloafing behaviors",
"students",
"personal mobile devices",
"research methods",
"learners",
"awareness level",
"fundamental predictors",
"data analysis",
"mobile devices",
"awareness",
"learning",
"screening model",
"usage time",
"setting",
"access",
"context",
"access status",
"significant impact",
"gender",
"environment",
"findings",
"words",
"study",
"regard",
"regression analysis",
"impact",
"predictors",
"aim",
"usage",
"behavior",
"activity",
"analysis",
"wide range",
"model",
"terms",
"levels",
"variables",
"status",
"addiction",
"total",
"phenomenon",
"method",
"time",
"productivity",
"hypothesis",
"network",
"range",
"devices",
"efficiency",
"unauthorized access"
],
"name": "Predictors of cyberloafing among high school students: unauthorized access to school network, metacognitive awareness and smartphone addiction",
"pagination": "2201-2219",
"productId": [
{
"name": "dimensions_id",
"type": "PropertyValue",
"value": [
"pub.1123243658"
]
},
{
"name": "doi",
"type": "PropertyValue",
"value": [
"10.1007/s10639-019-10042-0"
]
}
],
"sameAs": [
"https://doi.org/10.1007/s10639-019-10042-0",
"https://app.dimensions.ai/details/publication/pub.1123243658"
],
"sdDataset": "articles",
"sdDatePublished": "2022-05-20T07:36",
"sdLicense": "https://scigraph.springernature.com/explorer/license/",
"sdPublisher": {
"name": "Springer Nature - SN SciGraph project",
"type": "Organization"
},
"sdSource": "s3://com-springernature-scigraph/baseset/20220519/entities/gbq_results/article/article_827.jsonl",
"type": "ScholarlyArticle",
"url": "https://doi.org/10.1007/s10639-019-10042-0"
}
]
Download the RDF metadata as: json-ld nt turtle xml License info
JSON-LD is a popular format for linked data which is fully compatible with JSON.
curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/s10639-019-10042-0'
N-Triples is a line-based linked data format ideal for batch operations.
curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/s10639-019-10042-0'
Turtle is a human-readable linked data format.
curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/s10639-019-10042-0'
RDF/XML is a standard XML format for linked data.
curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/s10639-019-10042-0'
This table displays all metadata directly associated to this object as RDF triples.
166 TRIPLES
22 PREDICATES
103 URIs
85 LITERALS
6 BLANK NODES
Subject | Predicate | Object | |
---|---|---|---|
1 | sg:pub.10.1007/s10639-019-10042-0 | schema:about | anzsrc-for:08 |
2 | ″ | ″ | anzsrc-for:0806 |
3 | ″ | ″ | anzsrc-for:13 |
4 | ″ | ″ | anzsrc-for:1302 |
5 | ″ | ″ | anzsrc-for:1303 |
6 | ″ | schema:author | Nb2d5719baf60466784de0bc2decef8b6 |
7 | ″ | schema:citation | sg:pub.10.1007/978-94-017-2243-8_2 |
8 | ″ | ″ | sg:pub.10.1007/978-94-017-2243-8_4 |
9 | ″ | ″ | sg:pub.10.1007/s10758-017-9340-1 |
10 | ″ | ″ | sg:pub.10.1007/s10799-017-0280-1 |
11 | ″ | ″ | sg:pub.10.1007/s11423-008-9086-5 |
12 | ″ | ″ | sg:pub.10.1007/s12528-018-9184-2 |
13 | ″ | ″ | sg:pub.10.3758/s13421-010-0035-2 |
14 | ″ | schema:datePublished | 2019-12-09 |
15 | ″ | schema:datePublishedReg | 2019-12-09 |
16 | ″ | schema:description | Cyberloafing is one of the phenomena that adversely affects the efficiency and productivity in learning and teaching activities in educational settings. Increased ICT (information and communication technology) access status in educational environments and personal mobile devices lead to a wide range of cyberloafing behaviors of learners. In this regard, the aim of this study was to investigate cyberloafing behaviors of high school students in terms of several variables, including gender, ICT usage, unauthorized access to school network, metacognitive awareness and smartphone addiction. In this study, the relational screening model from descriptive research methods was used. A total of 269 9th grade students, 123 of whom were male and 146 of whom were female, were recruited. Hierarchical linear multilevel regression analysis was employed in the data analysis. The findings indicate that four of the five models designed to investigate cyberloafing behaviors in educational settings were found to be statistically significant. In other words, four hypotheses were supported. It has been concluded that the unauthorized access to the school network of learners has a significant impact on the cyberloafing behaviors in educational contexts. Additionally, the smartphone addiction and metacognitive awareness levels of students, as well as daily social media usage time are fundamental predictors of the cyberloafing behaviors. |
17 | ″ | schema:genre | article |
18 | ″ | schema:inLanguage | en |
19 | ″ | schema:isAccessibleForFree | false |
20 | ″ | schema:isPartOf | N84bc03816514466184a8d797e7127578 |
21 | ″ | ″ | Ne2cec112cdea4304b3be91be00e709e5 |
22 | ″ | ″ | sg:journal.1136394 |
23 | ″ | schema:keywords | ICT usage |
24 | ″ | ″ | access |
25 | ″ | ″ | access status |
26 | ″ | ″ | activity |
27 | ″ | ″ | addiction |
28 | ″ | ″ | aim |
29 | ″ | ″ | analysis |
30 | ″ | ″ | awareness |
31 | ″ | ″ | awareness level |
32 | ″ | ″ | behavior |
33 | ″ | ″ | behavior of learners |
34 | ″ | ″ | context |
35 | ″ | ″ | cyberloafing behaviors |
36 | ″ | ″ | data analysis |
37 | ″ | ″ | descriptive research method |
38 | ″ | ″ | devices |
39 | ″ | ″ | educational context |
40 | ″ | ″ | educational environment |
41 | ″ | ″ | educational settings |
42 | ″ | ″ | efficiency |
43 | ″ | ″ | environment |
44 | ″ | ″ | findings |
45 | ″ | ″ | fundamental predictors |
46 | ″ | ″ | gender |
47 | ″ | ″ | grade students |
48 | ″ | ″ | high school students |
49 | ″ | ″ | hypothesis |
50 | ″ | ″ | impact |
51 | ″ | ″ | learners |
52 | ″ | ″ | learning |
53 | ″ | ″ | levels |
54 | ″ | ″ | linear multilevel regression analysis |
55 | ″ | ″ | media usage time |
56 | ″ | ″ | metacognitive awareness |
57 | ″ | ″ | metacognitive awareness level |
58 | ″ | ″ | method |
59 | ″ | ″ | mobile devices |
60 | ″ | ″ | model |
61 | ″ | ″ | multilevel regression analysis |
62 | ″ | ″ | network |
63 | ″ | ″ | personal mobile devices |
64 | ″ | ″ | phenomenon |
65 | ″ | ″ | predictors |
66 | ″ | ″ | productivity |
67 | ″ | ″ | range |
68 | ″ | ″ | regard |
69 | ″ | ″ | regression analysis |
70 | ″ | ″ | relational screening model |
71 | ″ | ″ | research methods |
72 | ″ | ″ | school network |
73 | ″ | ″ | school students |
74 | ″ | ″ | screening model |
75 | ″ | ″ | setting |
76 | ″ | ″ | significant impact |
77 | ″ | ″ | smartphone addiction |
78 | ″ | ″ | status |
79 | ″ | ″ | students |
80 | ″ | ″ | study |
81 | ″ | ″ | teaching activities |
82 | ″ | ″ | terms |
83 | ″ | ″ | time |
84 | ″ | ″ | total |
85 | ″ | ″ | unauthorized access |
86 | ″ | ″ | usage |
87 | ″ | ″ | usage time |
88 | ″ | ″ | variables |
89 | ″ | ″ | wide range |
90 | ″ | ″ | words |
91 | ″ | schema:name | Predictors of cyberloafing among high school students: unauthorized access to school network, metacognitive awareness and smartphone addiction |
92 | ″ | schema:pagination | 2201-2219 |
93 | ″ | schema:productId | N075bd0cbb40541dd827d96c8f6591ece |
94 | ″ | ″ | N5d498f9cde2a4ec995a74b99eefc2349 |
95 | ″ | schema:sameAs | https://app.dimensions.ai/details/publication/pub.1123243658 |
96 | ″ | ″ | https://doi.org/10.1007/s10639-019-10042-0 |
97 | ″ | schema:sdDatePublished | 2022-05-20T07:36 |
98 | ″ | schema:sdLicense | https://scigraph.springernature.com/explorer/license/ |
99 | ″ | schema:sdPublisher | Na469febb3c7b40aeaa163f688721db27 |
100 | ″ | schema:url | https://doi.org/10.1007/s10639-019-10042-0 |
101 | ″ | sgo:license | sg:explorer/license/ |
102 | ″ | sgo:sdDataset | articles |
103 | ″ | rdf:type | schema:ScholarlyArticle |
104 | N075bd0cbb40541dd827d96c8f6591ece | schema:name | dimensions_id |
105 | ″ | schema:value | pub.1123243658 |
106 | ″ | rdf:type | schema:PropertyValue |
107 | N5d498f9cde2a4ec995a74b99eefc2349 | schema:name | doi |
108 | ″ | schema:value | 10.1007/s10639-019-10042-0 |
109 | ″ | rdf:type | schema:PropertyValue |
110 | N84bc03816514466184a8d797e7127578 | schema:volumeNumber | 25 |
111 | ″ | rdf:type | schema:PublicationVolume |
112 | Na469febb3c7b40aeaa163f688721db27 | schema:name | Springer Nature - SN SciGraph project |
113 | ″ | rdf:type | schema:Organization |
114 | Nb2d5719baf60466784de0bc2decef8b6 | rdf:first | sg:person.015603232575.22 |
115 | ″ | rdf:rest | rdf:nil |
116 | Ne2cec112cdea4304b3be91be00e709e5 | schema:issueNumber | 3 |
117 | ″ | rdf:type | schema:PublicationIssue |
118 | anzsrc-for:08 | schema:inDefinedTermSet | anzsrc-for: |
119 | ″ | schema:name | Information and Computing Sciences |
120 | ″ | rdf:type | schema:DefinedTerm |
121 | anzsrc-for:0806 | schema:inDefinedTermSet | anzsrc-for: |
122 | ″ | schema:name | Information Systems |
123 | ″ | rdf:type | schema:DefinedTerm |
124 | anzsrc-for:13 | schema:inDefinedTermSet | anzsrc-for: |
125 | ″ | schema:name | Education |
126 | ″ | rdf:type | schema:DefinedTerm |
127 | anzsrc-for:1302 | schema:inDefinedTermSet | anzsrc-for: |
128 | ″ | schema:name | Curriculum and Pedagogy |
129 | ″ | rdf:type | schema:DefinedTerm |
130 | anzsrc-for:1303 | schema:inDefinedTermSet | anzsrc-for: |
131 | ″ | schema:name | Specialist Studies In Education |
132 | ″ | rdf:type | schema:DefinedTerm |
133 | sg:journal.1136394 | schema:issn | 1360-2357 |
134 | ″ | ″ | 1573-7608 |
135 | ″ | schema:name | Education and Information Technologies |
136 | ″ | schema:publisher | Springer Nature |
137 | ″ | rdf:type | schema:Periodical |
138 | sg:person.015603232575.22 | schema:affiliation | grid-institutes:grid.411124.3 |
139 | ″ | schema:familyName | Saritepeci |
140 | ″ | schema:givenName | Mustafa |
141 | ″ | schema:sameAs | https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015603232575.22 |
142 | ″ | rdf:type | schema:Person |
143 | sg:pub.10.1007/978-94-017-2243-8_2 | schema:sameAs | https://app.dimensions.ai/details/publication/pub.1029168527 |
144 | ″ | ″ | https://doi.org/10.1007/978-94-017-2243-8_2 |
145 | ″ | rdf:type | schema:CreativeWork |
146 | sg:pub.10.1007/978-94-017-2243-8_4 | schema:sameAs | https://app.dimensions.ai/details/publication/pub.1042315378 |
147 | ″ | ″ | https://doi.org/10.1007/978-94-017-2243-8_4 |
148 | ″ | rdf:type | schema:CreativeWork |
149 | sg:pub.10.1007/s10758-017-9340-1 | schema:sameAs | https://app.dimensions.ai/details/publication/pub.1092591217 |
150 | ″ | ″ | https://doi.org/10.1007/s10758-017-9340-1 |
151 | ″ | rdf:type | schema:CreativeWork |
152 | sg:pub.10.1007/s10799-017-0280-1 | schema:sameAs | https://app.dimensions.ai/details/publication/pub.1091510948 |
153 | ″ | ″ | https://doi.org/10.1007/s10799-017-0280-1 |
154 | ″ | rdf:type | schema:CreativeWork |
155 | sg:pub.10.1007/s11423-008-9086-5 | schema:sameAs | https://app.dimensions.ai/details/publication/pub.1018637467 |
156 | ″ | ″ | https://doi.org/10.1007/s11423-008-9086-5 |
157 | ″ | rdf:type | schema:CreativeWork |
158 | sg:pub.10.1007/s12528-018-9184-2 | schema:sameAs | https://app.dimensions.ai/details/publication/pub.1101847065 |
159 | ″ | ″ | https://doi.org/10.1007/s12528-018-9184-2 |
160 | ″ | rdf:type | schema:CreativeWork |
161 | sg:pub.10.3758/s13421-010-0035-2 | schema:sameAs | https://app.dimensions.ai/details/publication/pub.1015433985 |
162 | ″ | ″ | https://doi.org/10.3758/s13421-010-0035-2 |
163 | ″ | rdf:type | schema:CreativeWork |
164 | grid-institutes:grid.411124.3 | schema:alternateName | Ereğli Faculty of Education, Department of Computer Education and Instructional Technology, Necmettin Erbakan University, Konya, Turkey |
165 | ″ | schema:name | Ereğli Faculty of Education, Department of Computer Education and Instructional Technology, Necmettin Erbakan University, Konya, Turkey |
166 | ″ | rdf:type | schema:Organization |