Home| Contact Us| New Journals| Browse Journals| Journal Prices| For Authors|

Print ISSN: 2349-8161
Online ISSN: 2349-817X


  About ISEJ
  Home
Aims & Scope
Editorial Board
Current Issue
Next Issue
Previous Issue
Self-archiving policy
Alert Services
Be a Reviewer
Publisher
Paper Submission
Contact us
 
  For Authors
  Guidelines for Contributors
Online Submission
Statement of Ethics and Responsibilities
Review Policies
Transfer of Copyright
Archiving Policy
Call for Papers
 
 
RELATED JOURNALS
Journal of Digital Information Management (JDIM)
Journal of Multimedia Processing and Technologies (JMPT)
International Journal of Web Application (IJWA)

 

 
Information Security Education Journal (ISEJ)
 

Security Considerations in a Mobile Learning Environment
Michael Sletten
Department of Education Policy, Organization and Leadership, University of Illinois, Urbana-Champaign 1, 310 South Sixth Street Champaign IL 61820 & USA
Abstract: In 2021, education using a mobile phone has become an immensely popular means of delivering and accessing learning content. Learners and instructors have become unbound from their desktop and laptop machines and now enjoy the portability and ubiquitous nature of mobile phones in their educational endeavors. Within the mobile learning platforms, there are five elements that are involved—the user, the mobile device, the wireless network, the learning management system, and the computer network(s) that host the wireless networks and/(or) the learning management system. Each of these five areas are susceptible to security threats and therefore must be hardened to become more resilient to attacks.
Keywords: Mobile Security, Mobile Learning, Network Security Security Considerations in a Mobile Learning Environment
DOI:https://doi.org/10.6025/isej/2020/7/2/58-63
Full_Text   PDF 231 KB   Download:   57  times
References:

[1] Andress, J. (2014). The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice (2nd ed.). Syngress.
[2] Brown, E. (2001). Speaking of computers. Mobile learning explorations at the Stanford learning lab, (55).
[3] Chova, L. G., Martínez, A. L., Torres, I. C., Shonola, S. S., Joy, M. (2014). Security framework for mobile learning environments. In: ICERI 2014: Conference proceedings.
[4] Friedman, J., Hoffman, D. V. (2008). Protecting data on mobile devices: A taxonomy of security threats to mobile computing and review of applicable defenses. Information Knowledge Systems Management, 7, 1590180.
[5] Greenberg, A. (2019, August 9). Teen hacker finds bugs in school software that exposed millions ofrecords. Wired. https://www.wired.com/story/teen-hacker-school-software-blackboard-follett/
[6] Irimia, D., & Rãdulescu, R. (2019). Mobile device management in the context of byod. https://www.researchgate.net/publication/333263130
[7] Ismail, M. I. (2016). A review of the challenges and issues in mobile learning. International Journal of Enhanced Research in Educational Development (IJERED), 4 (2) 1-6.
[8] ReportLinker. (2020, August 18). Global mobile learning industry. GlobeNewswire News Room. https://www.globenewswire.com/news-release/2020/08/18/2080347/0/en/Global-Mobile-Learning-Industry.html
[9] Sletten, M. A. (2020). Security in a mobile learning environment (Doctoral dissertation). University of Illinois, Urbana-Champaign
[10] Wi-Fi Alliance. (2021, January 1). How does Wi-Fi protected setup work? | Wi-Fi alliance. https://www.wi-fi.org/knowledge-center/faq/how-does-wi-fi-protected-setup-work
[11] Wilson, M., Hash, J. (2003). Building an information technology security awareness and training program: Computer security (800-50). National Institute of Standards and Technology/Technology Administration/U.S. Department of Commerce.


Copyright 2013 socio.org.uk