Sunteți pe pagina 1din 10

Proceedings of the 39th Hawaii International Conference on System Sciences - 2006

Learning with Laptops:


Information Technology and the Transformation of an MBA Program

Abhijit Gopal, Deborah Compeau, Teresa Marcon, Fernando Olivera


Richard Ivey School of Business, University of Western Ontario
agopal@ivey.ca, dcompeau@ivey.ca, tmarcon@ivey.ca, folivera@ivey.ca

Laptop computers and wireless networks are becoming support rather than mediate a traditional learning
part of the landscape of many MBA programs, finding environment (i.e., one based primarily on face-to-face
their way into the innermost sanctum of academia: the classroom interaction). This domain has received
classroom. The consequences of introducing information relatively little empirical attention, though a number of
technologies in the educational environment, however, popular articles have been written on the subject,
are far from clear. Through the lens of Bourdieu’s theory including reports of the state of use of laptops in
of practice, we explore how a mandatory laptop program universities (The Laptop College 1999; The Mobile
was woven into the institutional fabric of an MBA Campus Matures 2000).
program and the means by which information Reports on the application of general-purpose
technologies altered student practices. We attend to how technologies in education convey a cautious view of the
IT was implicated in a struggle between the students and role and value of technologies on campus. Concerns about
the faculty for control of classroom use of laptops and the use of laptops in education stem in part from
networks. In revealing the variety of interests at stake and ideological considerations (e.g., Griere & Bryant, 1998)
the different logic deployed by students and faculty in this related to elitism and over-commercialization. Others
confrontation, we hope to open a space for the mutual question whether laptops achieve their fiscal goals of
recognition of opposing viewpoints and for the possibility shifting the costs of technology infrastructure to the
of joint ownership of the problem. student body (Biros, 1998). One particularly contentious
aspect of laptops on campus is its impact on the classroom
and the learning process. The appearance of the laptop,
The university campus has seen momentous coupled with connectivity, in the inner sanctum of
developments in computing over the last half century university education, the classroom, has led to strong
(Weiser, 1998). Students who once waited patiently for a reactions from at least some faculty members to its
little CPU time have given way to those who see access to distractive potential and the concomitant degradation of
IT as a basic facet of university infrastructure. the classroom experience (Schwartz, 2003).
Universities, increasingly reinventing their mandates in The experience at our own university with respect to
the context of a market logic (Noble, 1998; Taylor, 2000), this last issue led to the research reported in this paper.
see promise in the ‘laptop program’ as a differentiator, a Requiring incoming students to arrive in possession of
means to bolster or create an image (The Laptop College, laptops appeared in tune with the times and was readily
1999). Business schools in particular gravitate toward this accepted by students. But there was also growing disquiet
logic, and as students pay increasing premiums to obtain amongst our colleagues about the less than salubrious
business degrees, several schools have taken the plunge in impact of the laptops in the classroom. Other educational
an effort to set themselves apart. They see themselves, units faced similar issues (Bhave, 2002; Schwartz, 2003)
through these programs, as helping students develop while still others contemplated the plunge into mandatory
technological savvy, obtain instant access to business laptop programs (DeLoughry, 1995; Olsen 2001). And at
information, and prepare for the knowledge economy least one group of stakeholders – students – would carry
(The Laptop College, 1999; Rola, 2002). the effects of our actions some way into the future.
Technology in education has been examined by a Our research sought to examine the experiences of
number of researchers in information systems (e.g., Alavi our institution in order to learn about the impact and
1994; Piccoli et al 2001). Such research addresses implications of the laptop program in the environment of
opportunities for specific technologies to support the MBA program. Given our beliefs in the importance of
education in new and different ways and challenges the a holistic perspective (focusing on the program as a whole
use of technology mediated communication to replace and the weaving of technology into that program, rather
other forms of communication in a learning environment. than focusing narrowly on the technology) and a dynamic
Our research focuses on a somewhat different accounting of the situation, we undertook a qualitative,
application of technology in education – one in which a multi-stakeholder approach. This paper presents the
general-purpose technology (laptops) is introduced to results of our first phase of study. We focused first on

0-7695-2507-5/06/$20.00 (C) 2006 IEEE 1


Proceedings of the 39th Hawaii International Conference on System Sciences - 2006

understanding the student1 perspective, recognizing that nonetheless durable. These dispositions incline them to
we could only make sense of this perspective in the take up particular positional identities and to pursue
context of numerous other perspectives. To do this, we individual and group interests in a struggle to acquire and
adopted a theoretical lens that helped us consider the hold on to different forms of capital (economic, cultural,
variety of interests at stake as well as understand the institutional, etc.; (see Figure 1)).
nuanced ways in which laptops had entered the practices Habitus is “a kind of practical sense for what is to be
of university life: Pierre Bourdieu’s theory of practice done in a given situation – what is called in sport a “feel”
(Bourdieu, 1977; 1990; 1998). The next section reviews for the game” (p. 25). The “generative” or basic habitus
key concepts from Bourdieu’s theory. We then turn to a (p. 8) is acquired in childhood and beyond and is the
description of the laptop program at our institution and to source of individual dispositions towards action in
our analysis of our qualitative data from the Bourdieun particular social contexts and forms the basis for the
perspective. utilization and reproduction of social structures. The
BOURDIEU: THEORIZING PRACTICE unquestioned acceptance and incorporation into the
We chose a Bourdieun perspective for several habitus of social conventions give rise to the common
reasons. First, we wanted an approach that would reflect a sense world or doxa (Bourdieu, 1977: 166). This
holistic view of the phenomenon, and would reflect the understanding of what is normal and natural forms the
constructed nature of institutions such as the MBA grounds for the enactment of symbolic violence, an “act of
program. Additionally, it became evident through the cognition and misrecognition” (Everett 2002: 66) through
interview process and subsequent discussions that we which less successful participants in the game are
needed an approach that would allow us to account for complicit in the maintenance of the conditions that
both the practices that constitute the day-to-day activities legitimate and perpetuate inequalities. That is to say,
of our students and the power struggles among various those things deemed normal and natural by those who
stakeholders that were generated by the introduction of hold greater volumes of capital act as standards against
laptops into the program. The centrality of practice and which the actions of those in the field, especially those
power in Bourdieu’s theorizing was thus an important who hold lower volumes of capital, are judged and
focus for our research. Finally, Bourdieu’s interest in the constrained.
educational field provided a useful starting point for A field is understood as a field of production (e.g.,
understanding the circumstances of our laptop program. the economic, artistic, or educational) and can be
characterized as restricted (specialized) or widespread
(generalized). In a field of restricted production, the
primary form of capital is cultural and consumers are
other producers of cultural goods within the field (e.g.,
academics who write for and are judged by other
academics). Widespread fields of production, on the other
hand, “are organized with a view to the production of
cultural goods destined for non-producers” (Everett 2002:
61) or the “public at large” (Bourdieu 1985, cited in
Everett 2002). These fields of production are rarely
completely independent: in education, a restricted field of
production, economic capital is de-emphasized in favor of
other forms of cultural or symbolic capital (e.g.
qualifications, repute) which are nevertheless tied to
Figure 1: Economic and cultural capital economic value. Symbolic capital, which is a combination
(adapted from Bourdieu 1998) of other types of capital, is “a transformed and thereby
disguised” (Bourdieu 1977: 183) form of capital that
Bourdieu’s theory of practice (1977; 1990; 1998) is gains its efficacy precisely through the misrecognition of
concerned with the symbolic ‘marketplace’, a social space its material bases. Educational qualifications are among
or field within which individuals and groups have the most commonly misrecognized and easily converted
dispositions (habitus) that are socially acquired but forms of capital. Acquired through economic means and
the demonstration of a particular kind of social
1 competence, the academic degree gives the recipient,
In what follows, our reference to ‘students’ is a reference to the
respondents. We do not intend to imply a generalizability to all the MBA
through an “act of ordination” (Bourdieu, 1998: 21), a
students but do not shy away from it either: our random sample of guarantee of technical competence that can be converted
students was, after all, implicitly intended to be representative. It is left into economic capital in other spheres of social life.
to the reader to assess whether a case might exist to generalize any of In the following sections, we elaborate on the
what we discuss to our student body or to any other group.

2
Proceedings of the 39th Hawaii International Conference on System Sciences - 2006

fundamental elements of the Bourdieun framework as Attendance at job interviews was one of the few reasons
applied to our research context. After briefly outlining the to miss class. However, in the tighter job market of the
background against which our study unfolded, we discuss recent past, missing class for job interviews had become
the restricted field of the MBA program and its an increasing problem.
relationship to the widespread economic field. We then The “Laptop Program”
turn to a description of students’ habitus and their Beginning in September 1998, new MBA students
technology-related practices with respect to were required to arrive in possession of a laptop
communication, file sharing, and classroom use. We then computer. There was no overt objection to the increase
return to the level of the field, by discussing the views of this represented in the already high price tag for the
the students as understood within this context. program; students could purchase whichever machine
BACKGROUND suited their fancy and budget. The school subsequently
Our institution was established in the 1920s at a put in place a wireless network, in spite of its bandwidth
mid-sized public university. The MBA program began in limitations in relation to wired environments, upon
1948 and had since its inception used a case-based consideration of its financial and logistical advantages.
method of learning. Graduating approximately 280 MBA According to the then head of IT support, “We
students per year, the school was highly placed in didn’t introduce laptops to revitalize our teaching because
international rankings. Classroom discussions were it didn’t need to be revitalized. Our case-study method is
central to the case learning process; 25-35% of a student’s time-tested … and we’re very, very happy with it… The
final grade was based on his or her contribution to the laptops … are for the 95% of a student's time that is spent
class discussion. Attendance at class was a necessary but outside the classroom” (quoted in The Laptop College,
not sufficient condition for performance in this aspect of 1999: 17). Interestingly, this statement suggests both a
the program. As a result, absenteeism without cause was recognition of the possibility of classroom use and the
rare. The program valued integration of material across sentiment that the faculty were not anticipating any real
courses; hence there was a fairly significant program, change in the classroom dynamic.
rather than course, orientation. Incoming students were As it happened, both laptops and wireless
assigned to a section (a group of 65-75 students) with connectivity found their way into the classroom. Within
which they took all their first year classes. Each section two years of the program’s initiation, faculty members
used its own classroom, and stayed in that room for the found themselves discussing means to control classroom
three class periods of the day. Assignments were given to use. The primary argument centered on the distractive
the students for two weeks at a time, thus allowing the potential of the technology in a case classroom that relied
schedule to float as needed to accommodate guest on student involvement.
speakers, changes to the material, and also faculty Chat, Email, Campus No
Access to → printer, external Internet access*
scheduling conflicts. Faculty met regularly to discuss the
file Internet sites
performance of the students in their section across courses Access type↓ sharing sites
and to address issues relating to the section generally. The Open x x x n/a
first year of the MBA program was considered “core” and Open Class x x n/a
no opportunities for students to challenge out of courses Limited Class x n/a
was provided. In the second year, students enrolled in Restricted Class x
electives of their choosing. The second year schedule was * Specific websites available, if faculty requires it.
more traditional, with fixed class times for each course Table 1: Proposed access
and different groupings of students in each class.
Students were assigned to learning teams in the first By the summer of 2002, the IT support group had
year. The purpose of the learning teams was to provide a devised a means of controlling network access during
small-group setting for initial discussion of students’ case classes. Four access levels were defined (Table 1). “Open
analyses, and to provide a forum for occasional project access” was intended for out-of-class use by students.
work. The learning team had been an established part of While IT support assumed that the default level for in-
the school’s culture for many years. In the first two weeks class use would be “Limited class access” allowing access
of school, students met with their learning teams on to the intranet, faculty members decided to set
campus and under the supervision of teaching faculty. “Restricted” or “No access” as the default. This setting
After this period, the organization of learning team had been designed for examinations, to ensure that
meetings was left to the students. students worked individually, but given recent frustration
On-campus recruiting took place for both summer with laptop use in the classroom, the faculty appeared to
jobs and full-time employment. Given the high costs of prefer a more restrictive approach. Individual faculty
the program and the values of the students, the recruiting members could override the default but there appeared to
process was emphasized in both first and second years. be broad recognition that such variation could fracture the

3
Proceedings of the 39th Hawaii International Conference on System Sciences - 2006

solidarity faculty would need to enforce the controls. by the entire group. Given our goal of understanding the
In September 2002, the network controls were put in experiences of the students from their perspectives and
place for all MBA students. A protest, emanating given the emergent nature of the coding, inter-rater
primarily from second-year students, ensued. reliability in the coding was not deemed an essential
Simultaneously, the network controls failed to operate concern (Alvesson 2003). Nonetheless, we met regularly
correctly, causing fairly serious accessibility problems to discuss our interpretations of the data and ensure a
(e.g., students could not access the add-drop system and commonality in our understanding of the interviews.
missed recruiting announcements). These problems 1997: laptops made compulsory
appeared to feed the groundswell of protest, which began
1998: wireless network introduced
to spread to the first-year cohort. Several meetings were
hastily convened and program management admitted that 1999-2000: faculty concern about
classroom use
the implementation had been flawed. The controls were
2000: 'cards out' policy in class
temporarily withdrawn and reintroduced after further
testing, this time only for the first-year class – those in the
Sep 2002 : network controls introduced
second year had successfully lobbied to be exempt. Research commences
Further technical problems arose, as did fresh protest. The Oct 2002 : network controls removed
controls were eventually dropped for the academic year. Sep 2003 : network controls reintroduced
Program management and IT staff apologized for the poor for first year, less restrictive for second y r
implementation and the resulting disruption.
RESEARCH APPROACH
Our project started in October 2002 with interviews
st st
of first-year students (Figure 2 provides a timeline of the Oct 02: 1 interviews with 1 yr (2004) students plus
nd
laptop program and our research). We intended to interviews with 2 yr (2003) students
nd
interview a wide range of stakeholders but the initial task Jan 03: 2 interviews with 2004 students
was to follow a single cohort through their two years at Mar 03: Classroom observation
rd
Oct 03: 3 interviews with 2004 students
the school. In view of the ethical conundrum posed by us
conducting interviews within the program in which we Figure 2: Time line related to study
taught, a doctoral student conducted all the interviews
with students not being taught by the authors. Twenty- RESULTS
three randomly selected students were interviewed twice While our aim is to examine the interweaving of this
in the first year and once in their second year. We also general purpose technology into the MBA program, it is
interviewed nine randomly selected second-year students first necessary to examine the nature of that program – a
so as to be able to compare first- and second-year restricted field in Bourdieu’s terms – as a basis for
perspectives during the first year of the project. Another grounding the discussion. Our approach is consistent with
first-year student volunteered to be interviewed after the the perspective that technologies cannot be examined in
second set of first-year interviews had been completed isolation, disengaged from their contexts (Orlikowski &
and was interviewed once. We interviewed 10 additional Iacono, 2001); they need to be understood in relation to
first-year students in the second year of our study to the context in which they are embedded and the multiple
provide further comparison between cohorts. All ways in which people put them to work to support their
interviews were semi-structured, with guidelines provided aims, goals, and desires. However, in what follows, we
for the kind of information sought but flexibility to move attempt also to place the restricted field in the context of
in the direction desired by the interviewee. To help the widespread field and move between the two levels to
corroborate what we learned through the interviews, make sense of what occurred.
observation of three classes within one first-year MBA The Restricted Field and the Widespread Field – The
section was also conducted by two doctoral students MBA in Context
following a semi-structured protocol designed to capture The field of business education reveals a struggle of
students’ use of their laptops during class discussions. logics that emanates both from the restricted academic
The entire research team conducted the data analysis. field and the widespread economic field. In positing that
Using theme-identification techniques from grounded laptops are crucial to business education because they
theory (Glaser & Strauss, 1967) and informed by the prepare students for the ‘real world’, the logic of the
vocabulary of Bourdieu’s theory of practice, each widespread field infiltrates a restricted field otherwise
individual searched a subset of the transcripts for themes. concerned with justifying innovation through a logic
As we began to develop a sense of what was going on, particular to education: how does it improve the learning
each individual examined a further set of transcripts, experience and should it replace time-tested teaching
using the refined theme-identification scheme developed techniques? Both positive and negative outcomes emerge

4
Proceedings of the 39th Hawaii International Conference on System Sciences - 2006

from this ‘colonization’ (Bourdieu 1977) of the restricted question that comes your way about it – whether or not
field by the widespread field. On the one hand, it you’ve done so much work – that…would impress a
introduces accountability (itself a category perfected prospective employer. You’re not going to get that far in
within the economic field) to the educational domain. On the classroom discussion.”
the other, the diffuse logic of, “Because this is how things In light of these differences, it is interesting to note
are done in the real world,” escapes unexamined. that the students’ habitus became more homogenous with
Habitus respect to the technology, as dispositions around the
Coming into the program, there was the expected technological ensemble evolved during the study (the
variation in habitus amongst students. Many arrived with laptop technology was, for the respondents, invisible as
a strong sense of the primacy of the educational field as technology and seamless with an entire ensemble of
they had encountered it in previous educational technologies that we, as academics, analytically separate:
experience: the learning process and the power position of wireless networks, the Internet, cellular telephones, etc.;
the professoriate were givens in the system; the learning we refer to this ensemble in this paper as ‘technology’,
from the professors was a crucial means to accumulate the consistent with student parlance). In early interviews,
necessary embodied capital, the knowledgeable persona there was a sense of agreement around the importance of
they sought. Others appeared preoccupied not as much technology but not a strong sense of dependence on it.
with being knowledgeable as with obtaining a degree; Later interviews with first- and second-year students saw
there was not as marked a concern with the content of stronger sentiments expressed about technology
what was obtained along the way. dependence. Laptops appeared to weave themselves very
Commenting on the appropriateness of surfing the quickly into the fabric of students’ lives, with many
Internet during classes, for example, some students placed noting that their computers were “always on”. The
responsibility on the professoriate. As one student noted, technology helped alter modes of practice: one first-year
“while some people might surf the Internet during class, student observed that, “having a laptop has definitely
… most of us are paying attention to class. And I think it become something normal, which I think a lot of people
is really an issue for the professors that most of the would find odd, just because I don’t think it is normal for
classroom is not paying attention… it just like reflects on students to have laptops with them all the time, but I think
the ability of the professor to… keep the class… it’s a really good indication of what it’s going to be like
concentrating on the topic... … if it is not interesting, if when you’re in business and you have to have
the professor is not able to maintain that level of attention, information with you all the time.” It is interesting to
then people are going to start surfing the Net.” Such note, however, that the meanings of terms such as
opinions were commonplace though not uniformly shared “always on” varied across individuals. While this
by all, as evident in the following statement offered by a translated for some students into checking e-mail thrice a
different student: “I don’t think the professor is up there day, others used it to convey far more frequent use. Thus,
to be entertaining. You know, he’s there to help stimulate while the individuals’ sensemaking about the role of the
discussion. He obviously adds something to the technology was similar, their overt behaviors remained
discussion and stuff but he’s not up there to battle with somewhat more differentiated.
other mediums, and I think that really students should Technology Practices
respect professors and pay attention. I think … somebody The technology was so entrenched in the habitus by
made a comment …that … if the students aren’t engaged the second semester (for first-year students) that it had
with what [the professor is] saying then that reflects on become intrinsic to communication on a very wide scale.
[his/her] teaching whereas I don’t know that that’s a fair As one international student noted, “We use the laptop
evaluation because the professor could be saying computer during class … and I use e-mail to contact my
something really fascinating but because you’re distracted friends and family around the world.” It was also seen as
… by whatever else is going on, everybody is MSNing, crucial to the summer or more general job search with
you’re not going to hear that, and so I think… I’m there to which most students were preoccupied. With competition
hear the professor and I think the students aren’t gaining for positions more intense than during other years,
anything at all.” Similarly, students’ expectations about students appeared to appreciate the ability to respond
what they hoped to gain from the professors were instantly to messages: “We are looking for jobs, so we
heterogeneous, with some taking a pragmatic view of the need to instantly reply to people.”
value of the program in the context of their ultimate aim Three areas related to work were seen as facilitated
to obtain suitable employment. As one student noted, “a by the technology: case preparation, work in learning
lot of people, you know, did four hours worth of teams, and information sharing. One respondent saw the
homework on a case when 45 minutes between you and I laptop as an important link between case preparation
would probably be sufficient because as long as you have outside class and case discussion in the classroom: “I
an understanding of it and can… intelligently answer a bring my computer with me because I have done my

5
Proceedings of the 39th Hawaii International Conference on System Sciences - 2006

preparation in my laptop, I have the important case facts, constitution as efficient certainly helped respondents
the issues, details in my Excel file, so I bring it up, I just promote the usefulness of the technology.
open it and we discuss the case, and if anyone says File Sharing
something I consider important, I write it down.” Exam A case learning environment calls for extensive
writing was also raised as an important and beneficial use daily preparation and there is a temptation for students to
of the technology. Only a handful of students wrote access class notes from peers. The ease of information
exams on paper; one student stated that he would buy a sharing gave rise to an entire culture around the
laptop just for the privilege of writing exams using it – phenomenon, and, despite the ethical issues raised by
even if the school did not require this of students. such sharing, failure to share was often viewed negatively
The following sections describe in more detail by peers. As one respondent observed, “I don’t know
practices related to communication in teams and file anyone who doesn’t participate in the note sharing. So to
sharing. We then discuss the technology practices that say, you know, I did this case and I worked really hard on
evolved in the classroom and proved to be sources of it, don’t share it with anyone else, I think is very petty and
contention between students and faculty. is hypocritical.” The same respondent acknowledged the
Communication in Teams ethical dimension: “I understand it’s something not quite
Electronic mail and instant messaging were widely ethical, really. I think there’s something unethical about
used , whether for work or otherwise: “Like if I’m having doing it. It’s kind of saying, you know, there’s someone
a party, I would probably put an announcement out over who’s always getting a free ride. Often it’s me, you know,
e-mail, and then mention it to them in person.” Many so I’m just as guilty as everyone else.”
respondents appeared also to have become immersed in a Another respondent pointed to information sharing
culture of instant messaging, such as one respondent with respect to exams: “The structure basically isn’t
(among many) who kept both applications ready for use: subjective; we have to have certain structure. And you
“They’re always open and minimized so if someone is learn that from second year [students]. They tell you this
trying to get a hold on me on instant messenger … they is the structure for this exam. A lot of people have pre-
can. … [And] if my computer is on during the day and I written exams where they just change bits and pieces of it
actually go out somewhere I just say that I’m away. But e- here and there. They have pre-done worksheets, they just
mail’s always open as well, I’m always constantly plug in numbers.”
monitoring it because we get emails instead of hard mail This is not to say, however, that ethics were cast
from school, from other people.” aside entirely. There was a distinct ethos that evolved
The second semester saw a decline in face-to-face among the students in this regard, a shared understanding
interaction in learning teams. There was admittedly a of what was considered acceptable (cf. Callahan, 2004).
simultaneous decline in learning team activity in general, On the one hand, there was the matter of taking credit
but those who did utilize them as well as those who inappropriately: “We had a girl in our group who by all
formed informal groups relied increasingly on appearances had done a fantastic job on the case – it was a
technology-mediated communication. One respondent got decision tree for management science and everything was
together face-to-face with his informal team only “fifty beautifully laid out and I was stunned at how good it was.
percent of the time. Because that’s not always the most And so I kept saying to her … ‘I can’t believe what a
efficient way to do things, right? … If we don’t need to fantastic job you did on that.’ And she took full credit for
[meet], we can get on MSN or one of the messenger it. And then in class the next day I saw that there were
services and just say, ‘What do you think? What do you one, two, three, four people who had exactly the same
think? What do you think? Great. That’s what I thought. thing. Exactly the same thing and I thought, ‘I don’t know
Perfect. See you tomorrow.’” Another noted its about that.’ I’m not so sure I’m happy about that.
efficiency: “You don’t have to meet all the time. You Especially since she accepted [the credit].” On the other
don’t have to waste time traveling somewhere and meet, hand, there was the matter of the extent to which the
unloading your bag …We can do a four-way instant sharing was systematized. According to the same
message. Message for 15 minutes, get all the key points respondent, “I think at a point where it becomes
done – it saves everyone 45 minutes.” Efficiency was systematic – where everyone posts their notes – I think at
cited as especially important both for its currency in the that point you have really crossed the line in terms of
business world and the severe time crunch the what’s ethical and what’s not.”
respondents said they faced in relation to the program Classroom Usage
workload. There was a strong sense that the technology While the impact of the technology cannot be
increased individual efficiency. It is interesting to note segmented into that which is inside and outside the
here that this sense might well have been a misrecognition classroom – there is a real seamlessness between these
(Bourdieu, 1998), that the amount of time spent online spaces we have constructed, with the outside, if anything,
actually compromised overall efficiency, but its encompassing what goes on inside the classroom – we

6
Proceedings of the 39th Hawaii International Conference on System Sciences - 2006

have, for two reasons, made use of this segmentation. Messenger … If I’m really interested in this class, in this
First, as noted above, a strong position was put forward course, I’ll just close it and work on [the class].” Another
by school administration that the laptops were not respondent was more active: “In class, … Messenger use
intended for classroom use. This separation isolates the is huge. I am almost always logged in to Messenger.
classroom as a specific site to examine. Second, the Again, you know, I’m perhaps not the most academically
crucial issue of classroom use and its negative inclined person … it’s a way to stay awake while not
consequences needs consideration in its own right really participating in the class.” Contact for this person
Observation in the first-year classroom showed that was “almost exclusively with people in class.” A fourth
most students actively engaged in class discussion, using respondent spoke of transgressing the boundaries of the
their laptops to take notes and occasionally check email or classroom: “I just happened to be joking around with a
other applications. A few students appeared to disengage friend in another section in class the other day, during
frequently from class discussion and engage class time, … he was complaining that he had to start
simultaneously with applications on their laptops. Open participating more. And we were both doing the same
applications were email, instant messaging, Internet case … and they must have been about 10 minutes
browsers, and Microsoft Word or Excel. Given the behind. So I was, like, ‘Put your hand up and say this,’
interactive nature of the case classroom, students vied for and so he did. And he went perfect.” Clearly, the
attention in order to contribute to the discussion. It respondent had been listening sufficiently to have picked
appeared on occasion that students unable to get into the up the point that was subsequently passed on to help
discussion in spite of raising their hands turned their someone else garner symbolic capital in class.
attention in some frustration to their laptops and browsers. Several respondents noted that they did not use their
These patterns of use and behavior were consistent laptops in class for online connectivity – it should be
with students’ interview responses though perhaps we noted, however, that this response was most prevalent
observed less ‘illegitimate’ use in the classroom than we amongst first-year students participating in their first
might have expected based on students’ accounts interview. One second year international student,
(students may have curtailed ‘illegitimate’ use of the however, was categorical in denouncing online access in
technology in response to our presence in the classroom). class and the popular claim that these people were able to
The ‘legitimate’ uses that respondents mentioned were ‘multitask’: “People who think they can do three things at
note-taking, locating information on the Web, spreadsheet the same time maybe do things worse. I think they are
calculations, and downloading files from the intranet. In being stopped from doing some things.” Several second
addition, many respondents noted their use of email and year students also noted that the quality of the class
messaging applications. For one respondent, occasional e- discussion was better when the network restrictions were
mail use was without harm: “A lot of times you’re in class on. They also noted, however, that if people wanted to
– and not that you’re not paying attention, but something disengage they would find ways to do so, irrespective of
comes up and you’re not focused – and, ‘I forgot to do network restrictions (for example, by downloading entire
this, I forgot to send this e-mail to somebody to follow up newspapers beforehand, playing solitaire, etc.).
on something.’ With, I guess, … recruiting. Like you can Accessing the Internet in class was justified in many
do that in class without having to step down and … then ways. Other than the range of what were posed as
come back in and interrupt and all that stuff.” Others legitimate uses (accessing facts relevant to class
justified e-mail use in the context of the job hunt. The discussion, etc.), boredom was frequently cited, placing
school’s career placement service posted jobs for which the responsibility in some manner on the course or the
students could apply, but given the short supply of professor. Interruptions in class were raised by one
available summer positions for first-year students, respondent as a signal to go online: “We’re business
competition was keen and the ‘first-mover advantage’ students, we should know what the market’s doing these
was seen as crucial, making the ‘always on’ condition for days, we should know what the headlines are, and you
e-mail important. know there’s always two or three minutes when the
Instant messaging was not similarly justified but its teacher’s fumbling around for notes or whatever, you can
reported use was widespread – partly by those who always see ‘how’s the Dow doing today’.”
engaged in the practice and partly by those who watched ANALYSIS
others engage in it. Interestingly, there were those who We have so far described the students’ habitus and
had it switched on but found it distracting if someone technology-related practices, focusing in particular on
attempted to contact them: “If someone comes up during communication within teams, file sharing, and classroom
class I just tell them I’m in class, because it distracts you use. We now turn to a critical interpretation of these
from the case discussions.” Similarly for another practices within the theoretical framework of Bourdieu’s
respondent, “It depends on the situation. In a class, theory of practice. We focus on the taken-for-granted
usually – well, sometimes – I close down my MSN nature of laptops in the business program, as well as on

7
Proceedings of the 39th Hawaii International Conference on System Sciences - 2006

the contested role of laptops in the classroom. ahead.” Another student expressed this position even
Unquestioned Nature of Laptops more strongly. “You need to treat us as young
Laptops and networks take on doxic significance professionals and not as students and people you push
(fuelled in part by commercial and other agendas), around. Professors and faculty of the school. Because we
something that is beyond questioning. Even the questions are young professionals, that’s what we’re going to be,
raised in the literature about the wisdom of laptop we’re going to be tomorrow’s business leaders, right?”
programs – can all students afford them? what merits Another respondent added an evaluation of
consideration when putting these in place? – bypass the professorial responsibility: “The only time it gets abused
central question about the use to which they will be put. really is in the class [where] you know a professor’s not
Two particular consequences arise from the doing his or her job that well and letting everyone put
unquestioned introduction of technology in the MBA their two cents in … you know, I didn’t pay to listen to
program. First, the technology arrives in a general everyone give me their opinion on a certain thing. … I
purpose guise with no particular plans for its deployment know that in 15 minutes I’m going to not really be that
(Carolina Uses Wireless, 2001) except to improve the interested because of the way the class pattern goes.
student experience at the broadest level. Second, students They’ll have someone present their materials for 25
accept the increase in an already high price tag with little minutes when two would have done … They take the case
objection. One second year international student stated: “I method too far. So in those instances I feel like I can
think to the students it is absolutely necessary to have police myself.” In this instance, the rules of the game are
access to a laptop computer because we have to know applied to both sides and the sense that if the professor
what’s going on in the world, you know, in the business has the right (the symbolic capital) to evaluate what is
world,” revealing the doxa of the IT imperative, an right or wrong, then so does the student.
intrinsic component of the habitus of the players in the The logic of the economic field is invoked in these
field. Comments like this were frequent in the interviews. two examples in a seamless way: it is seen as natural that
The sense of absolute necessity, not just helpfulness, is paying customers have the right to decide what is
reflected in many student statements about the laptops. appropriate and what is not. It is perhaps an unintended
Yet no explanation of how their use of the laptop would consequence of the advantage business schools have
ensure they “know what’s going on in the real world” is taken of the rise in demand for business education by
given. It seems to go beyond keeping up with the business increasing fees; by deploying the logic of the economic
news – there is a sense that everyone in the business field in doing this, they appear to have compromised their
world uses their computers all the time (including in ability to enforce rules in the classroom that are premised
meetings). But the logic is simply not articulated. on the long-standing logic of the educational field. Worth
The Contest over Laptops in Class noting too is the rights issue that is implicitly invoked.
In view of the less than universal use of laptops to The logic of the educational field, which gave the
go online during class and the active disapproval by some professoriate the privilege to enforce controls, was now
of such activity in class, we might expect a significant seen as symbolic violence, recognizable through the lens
number of respondents to have supported the institution of of the widespread field as a violation of rights.
network controls. Such was indeed the case – but largely The parrying of responsibility also involved a
among first-year students in their first interviews. critique in terms of unmet expectations. A second-year
Reactions to the controls at this time ranged from mild respondent noted how she was initially impressed with the
disapproval to mild approval with several people neutral. idea of the wireless network, “But once I got here I started
During subsequent interviews, there was far greater to use it and then I also talked to other classmates about
agreement that the controls were inappropriate, even how they feel about the system, and they give me
among those who claimed not to use the Internet in class. impressions like the capacity to use technology in the
This response can be understood from within the class is a lot more than what we are using right now.”
Bourdieun frame as reflecting the logics of argumentation Another second-year student related the technology
amongst the different classes of stakeholders. As we saw opportunity to the lack of currency in the class material:
in the student interviews, the most frequently encountered “I think that one way to enhance education is to leverage
reasoning was that the students were responsible adults today’s platform to add to the students’ learning
and paying customers: “Frankly I wouldn’t use it in class, experience and talk about things that are relevant.” These
the Internet … Whether I think not having access is right observations point back to the manner in which the laptop
or wrong, I think it’s wrong. I think we should have program was introduced as a general-purpose technology,
access, and the reason being is that … we’re paying a lot a concession to the technological imperative that allows
of money here and if we decide not to use our time for the logic that the technology needed to be introduced
effectively in class and surf the net, then, well, we’re even if no specific uses had been contemplated.
adults, and if that’s what we feel like doing, then go DISCUSSION AND CONCLUSIONS

8
Proceedings of the 39th Hawaii International Conference on System Sciences - 2006

For faculty, the logic that the laptops were taking even rejected – by those who must use it. To be sure, each
away from the classroom experience was drawn from a situation will differ markedly, but vocabularies such as
long-standing tradition. The classroom method was time- the one we use might allow us to look a little more deeply
tested and was inviolable within the educational field. But at the implementation process and even reflexively signal
they had already set in motion, as in many business an honest attempt to incorporate the voice of the ‘other’.
schools, the colonization of that field by the logic of the There are certainly limitations to our work to date,
widespread economic field. That is the logic the students or points of disconnection between what we would like to
often chose to invoke in challenging the control the say we know now and the credibility of the bases we have
faculty sought to exercise. We might conclude from this to make these statements. On the theoretical level, we
that the rules of the game are changing; our own choices acknowledge that every theory obscures even as it
as faculty are taking away options we once had without reveals. While Bourdieu’s theory of practice helps us
question; the sanctity of the classroom is being shown up assemble our explanations in terms of classes and fields,
as merely another social construction (cf. Berger & we have perhaps missed the opportunity to undertake a
Luckmann, 1966). But let us press on first. more fine-grained analysis of, for example, the alliances
We also see that this struggle over logic occurs that are effected in the mobilization of positions as well as
against the backdrop of a student habitus that has evolved the wider networks that are implicated. On the level of
as it accommodates the technological ensemble that we method, our qualitative approach precludes our
have put in place. Given its initial lack of specificity and accounting for a larger number of voices through larger
the consequent freedom of appropriation (DeSanctis & sample sizes. And at the practical level, we realize that we
Poole, 1994), the technology rapidly became an asked respondents to create accounts for us from a
inextricable part of students’ lives in ways unanticipated position of power which undoubtedly shaped what they
by faculty. Classroom use, even if unplanned, flowed told us. In all these cases, though, we recognized the
seamlessly from its use in everyday life and became the issues and attempted to account for them. We leave it to
norm. Controlling such use in the manner attempted, we readers to incorporate these issues into their evolving
might surmise, might have been doomed from the start. understanding of the situation we have sought to analyze.
Our technology lens also reveals the power relations These limitations notwithstanding, we believe that
that undergird business education. While students arrived understanding the laptop program from a Bourdieun
with dispositions that ‘honored’ the traditions of the perspective demands that we understand that different
educational field, as they had known it earlier, and might stakeholders represent different classes; that is there are
have been quite happy to accept limits on classroom use, differences between professor and student that predictably
they chose instead to staunchly defend such use as a right. lead to different reactions (Bourdieu, 1998, p.5). This is a
Its violation seemed to them a diminution of their difference, at least in part, in the balance of economic
symbolic capital and their eventual ‘victory’, helped along versus cultural capital, and can explain some of the
by the network problems, further bolstered their capital at conflicts observed (e.g., importance of recruiting for the
the expense of that of the school and its faculty. Such students versus class for the faculty).
struggles have surely always existed but have not been Moreover, we would argue that the problem of the
theoretically recognized as such. Of particular interest to laptops has been understood in one way by the institution
us as researchers in this instance might be the manner in (loosely, that students are not paying attention because
which technology was used in this struggle over capital. they are distracted by this tool) but the student perspective
There are no real prescriptions that arise from our suggests that it is something else. Our research suggests
analysis. We take the position advanced by Doolin and that the results one observes, when examining the
Lowe (2002) that “to reveal is to critique”. We see, rather, introduction of laptops into the MBA program, can be
a few opportunities. For one, given that students considered as a reflection of the conflict between the
acknowledge the disruptive potential of the technology in desires (conscious or not) of the institution to maintain a
the classroom, even if they choose to defend the right to particular social order (the roles of individuals in the
use it, an opening exists. While there will always be classroom, the value and legitimacy of certain activities,
struggles within the business school as currently and the primacy of the classroom over other activities
constituted, the opportunity exists to take joint ownership such as career management) and the expectations of the
of the problem. Such a move might be facilitated by students. These expectations are formed by (i) their
theoretical vocabularies such as the one we have used habitus and their translation of this habitus into the
which allow for the recognition of power relations and environment of the business school, (ii) the translation of
political interests. There is also the opportunity for the the field of business into the educational field, which is
researcher to extend this thinking to other areas of IT use promoted by the newer marketing orientation of business
and to the occasionally peremptory manner in which schools, including the increases in tuition fees, and (iii)
technology is implemented and subsequently reinvented – the language of progress that is implied by the move to

9
Proceedings of the 39th Hawaii International Conference on System Sciences - 2006

push forward a technological agenda such as a laptop Maintenance.” Communications of the ACM 41:1 (1998):
program. These broad forces create a particular view of 43-44.
the phenomenon for the students that is quite different Bourdieu, P. Outline of a Theory of Practice. Translated by
from how it is viewed by some other stakeholders. Richard Nice. Cambridge, England: Cambridge
University Press, 1977.
To resolve “the problem” of the laptops requires a
Bourdieu, P. “In Other Words. Essays Towards a Reflexive
willingness to confront the pervasive changes that this Sociology.” Cambridge, UK: Polity Press, 1990.
struggle reflects. We cannot move forward without Bourdieu, P. Practical Reason. On the Theory of Action.
addressing the deeper conflicts or tensions that exist. Stanford, California: Stanford University Press, 1998.
From a faculty viewpoint, we hear things like “students Callahan, D., The Cheating Culture: Why More Americans Are
have always found ways to disengage” or “we've been Doing Wrong to Get Ahead, Orlando: Harcourt, Inc.
doing this successfully for umpteen years”, both of which (2004).
suggest that there is nothing new in the environment that Campbell, A.B. and R.P. Pargas. “Laptops in the Classroom.”
would require a more fundamental change; that there is an SIGCSE’03, Reno, Nevada, Feb 19-23, (2003): 98-102.
“Carolina Uses Wireless Technology to Transform Learning.”
unquestionable logical or natural ordering to how we do
T.H.E. Journal (2001): 66-67.
everything at the school. Thus, while students talk about DeSanctis, G., and M.S. Poole. “Capturing the Complexity in
the importance of technology to their lives and the Advanced Technology Use: Adaptive Structuration
importance of their recruiting activities, faculty often Theory.” Organization Science 5, no. 2 (1994): 121-145.
dismiss these statements as “missing the point”, given our Doolin, B., and A. Lowe. “To Reveal Is to Critique: Actor-
view of the current social order as “natural”. Network Theory and Critical Information Systems
The solutions put forward thus far ignore the fact Research.” Journal of Information Technology 17 (2002):
that different groups are, in fact, promoting different 69-78.
social structures based on different values. Until we Everett, J.. “Organizational Research and the Praxeology of
Pierre Bourdieu.” Organizational Research Methods 5:1
confront the deeper tensions, recognize that students, the (2002): 56-80.
faculty and the environment have changed, and that Frand, J. “The Information Age Mindset: Changes in Students
technology itself represents a force for changing the social and Implications for Higher Education.” EDUCAUSE
order, we may continue to replay this struggle, perhaps Review 35:5 (2000): 15-24.
even to the detriment of education. Glaser, B., and A.L. Strauss. The Discovery of Grounded
Studies like The Mobile Campus Matures (2000) and Theory: Strategies for Qualitative Research. Chicago:
others (e.g. Campbell and Pargas, 2003) imply that as we Aldine, 1967.
learn more about the effects of information technologies, Grier, S. L., and L.W. Bryant. “The Case for Desktops.”
all we need to do is make appropriate adjustments – Communications of the ACM 41:1 (1998): 70-71.
Hughes, T. P., “Through a Glass, Darkly: Anticipating the
faculty training, classroom regulation, better organization, Future of Technology-Enabled Education,” EDUCAUSE
etc. – in order to achieve the desired end state of Review, July-August (2001).
ubiquitous computing on campus. History, however, Noble, D. F. “Digital Diploma Mills: The Automation of Higher
suggests that such end states are elusive, that Education.” FirstMonday. Peer-Reviewed Journal on the
technological development is built on emergent agendas Internet 3:1 (1998): www.firstmonday.org. Accessed June
and interests, the very reason why predictions concerning 15, 2005.
technology have been less than perfect (Hughes, 2001). Olsen, F.. “Colleges Differ on Costs and Benefits of Ubiquitous
Moreover, dynamism rather than stasis characterizes Computing.” The Chronicle of Higher Education 47:20
institutions, technologies, and social practices; rather than (2001): A45.
Orlikowski, W., and Iacono, S., “Desperately Seeking ‘IT’ in IT
attend to how we might achieve certain technological Research,” Information Systems Research, 12:2 (2001).
ends, we might instead pay more attention to the Piccoli, G., Ahmad, R, and Ives, B., “Web-based Virtual
dynamics that characterize our socio-technical settings. Learning Environments,” MIS Quarterly, 25:4 (2001).
REFERENCES Rola, M.. “Canada's New U Builds IT into the Lesson Plan.”
Alavi, M., “Computer-mediated Collaborative Learning,” MIS ITBusiness.ca, October 17 2002.
Quarterly, 18:2 (1994), 159-174. Schwartz, J.. “Professors Vie with Web for Class's Attention.”
Alvesson, M., “Beyond neopositivists, romantics, and localists: The New York Times, January 2, 2003
A reflexive approach to interviews in organizational Taylor, M.C. “Useful Devils.” EDUCAUSE Review July/August
research,” Academy of Management Review, 28:1 (2003). (2000).
Berger, P. L., and Luckmann, T., The Social Construction of The Laptop College. Learning Technologies Report, 1999, 1: 1-
Reality: A Treatise its the Sociology of Knowledge, New 59.
York: Anchor Books (1966). The Mobile Campus Matures. Learning Technologies Report,
Bhave, M. “Classrooms with Wi-Fi. A Challenge for Teacher 2000.
Control and a Revolution in Learning.” T.H.E. Journal Weiser, M.. “The Future of Ubiquitous Computing on Campus.”
30:4 (2002): 17-23. Communications of the ACM 41:1 (1998): 41-42.
Biros. “Changes in Computer Purchase, Distribution, and

10

S-ar putea să vă placă și