Redirigiendo al acceso original de articulo en 20 segundos...
ARTÍCULO
TITULO

Security of m-learning system: A collective responsibility

Shaibu Adekunle Shonola    
Mike S Joy    

Resumen

Innovation in learning technologies and services is driven by demands from Higher Educational Institutions (HEIs) in order to meet their students? needs and make knowledge delivery easier. The technology could play a pivotal role in extending the possibilities for teaching, learning, and research in educational institutions. M-learning emerged from this innovation as a result of an unprecedented explosion in the number of mobile devices due to availability and affordability of mobile phones, smartphones and tablets among students. Competition in the mobile device industry is also encouraging developers to be innovative, constantly striving to introduce new features. Consequently, newer sources of risks are being introduced in the mobile computing paradigm at manufacturing level. Similarly, many m-learning promoters and developers focus on developing and delivering learning content and infrastructure for m-learning system without adequate consideration for security of stakeholders? data, whereas the use of these mobile technologies for learning poses a serious threat to confidentiality, integrity and privacy of those involved in teaching and learning, yet traditional security threats are also evolving. Against this backdrop, the stakeholders in education sector (i.e. education providers, educators, m-learning promoters and developers) should begin to consider the security implications of these devices in modern teaching and learning environments. The purpose of this paper is to identify the m-learning security issues that stakeholders may face, how they are being affected by the security threats, who among is stakeholders are affected or most affected by security issues in m-learning using three Nigeria universities as case studies and what are the responsibilities of the stakeholders in ensuring risk free m-learning.

 Artículos similares

       
 
I-Hsien Liu, Meng-Huan Lee, Hsiao-Ching Huang and Jung-Shian Li    
New mobile network technologies, particularly 5G, have spurred a growth in smart healthcare networks. They enable real-time monitoring, personalized treatments, and more. However, these transformative capabilities have also uncovered potential vulnerabil... ver más
Revista: Applied Sciences

 
Olusola Adeniyi, Ali Safaa Sadiq, Prashant Pillai, Mohammed Adam Taheir and Omprakash Kaiwartya    
The widespread use of technology has made communication technology an indispensable part of daily life. However, the present cloud infrastructure is insufficient to meet the industry?s growing demands, and multi-access edge computing (MEC) has emerged as... ver más
Revista: Computers

 
Parvez Faruki, Rati Bhan, Vinesh Jain, Sajal Bhatia, Nour El Madhoun and Rajendra Pamula    
Android platform security is an active area of research where malware detection techniques continuously evolve to identify novel malware and improve the timely and accurate detection of existing malware. Adversaries are constantly in charge of employing ... ver más
Revista: Information

 
Poh Soon JosephNg, Pin Sen BrandonChan and Koo Yuen Phan    
Security remains a top priority for those users in the hotel, even with the advent of innovative technological advances. This is because many tragic incidents, such as theft and crime, have occurred with unrestricted access. This paper proposes an intell... ver más

 
Hongli Zhang and Ying Li    
Computation-intensive vehicle tasks sharply increase with the rapid growth of intelligent vehicles. The technology of Mobile Edge Computing (MEC) has the possibility of assisting vehicles with computation offloading. To solve the problem of computation r... ver más
Revista: Information