2015
DOI: 10.3991/ijim.v9i3.4475
|View full text |Cite
|
Sign up to set email alerts
|

Security of m-learning system: A collective responsibility

Abstract: Abstract-Innovation in learning technologies and services is driven by demands from Higher Educational Institutions (HEIs) in order to meet students' needs and make knowledge delivery easier. The technology could play a pivotal role in extending the possibilities for teaching, learning, and research in educational institutions. M-learning emerged from this innovation as a result of an unprecedented explosion in the number of mobile devices due to availability and affordability of mobile phones, smartphones and… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 8 publications
0
4
0
Order By: Relevance
“…e students would similarly need to obtain authentication and then access the mobile learning platform. Authentication is mandatory to protect the professor and student works, copyrights, privacy, and the identification of students [37]. Users are able to change their own password to log into the system.…”
Section: Implementation Of the Proposedmentioning
confidence: 99%
“…e students would similarly need to obtain authentication and then access the mobile learning platform. Authentication is mandatory to protect the professor and student works, copyrights, privacy, and the identification of students [37]. Users are able to change their own password to log into the system.…”
Section: Implementation Of the Proposedmentioning
confidence: 99%
“…The students similarly would need to obtain authentication and then access the mobile learning platform. Authentication is mandatory to protect the teacher and learner works, copyrights, privacy, and the identification of learners (Shonola and Joy 2015;Oyelere et al, 2016a). Subsequent to authentication is profile personalization to support teachers' and students' context awareness and learning.…”
Section: Fig 2 Summary Of the Mobileedu Dsr Processmentioning
confidence: 99%
“…There are several studies about mobile learning in Nigeria, but they are mainly theoretical and feasibility studies on mobile learning (Isiaka et al, 2011;Osang et al, 2013;Anohah et al, 2017;Oyelere et al, 2016b;Oyelere et al, 2016c;Shonola and Joy, 2015;Shonola et al, 2016). We are not aware of a similar study on the full implementation and evaluation of a mobile learning application for computing education in the Nigerian context.…”
Section: Introductionmentioning
confidence: 99%
“…Mobile users' carelessness, lack of education, and awareness have contributed to the increase of security threats faced and encountered (Bitton et al, 2018;Harris et al, 2013;Liang et al, 2019;Markelj & Bernik, 2013;Shonola & Joy, 2015). Chen and Li (2017) affirmed that individuals and IT users are highly susceptible to target from threats due to the lack of systemic security training to detect, prevent, or cope with privacy threats.…”
Section: Security Awareness and Training Programs Help Improve Visibility And User Educationmentioning
confidence: 99%