Abstract: In 2021, education using a mobile phone has become an immensely popular means of delivering and accessing learning content. Learners and instructors have become unbound from their desktop and laptop machines and now enjoy the portability and ubiquitous nature of mobile phones in their educational endeavors. Within the mobile learning platforms, there are five elements that are involved—the user, the mobile device, the wireless network, the learning management system, and the computer network(s) that host the wireless networks and/(or) the learning management
system. Each of these five areas are susceptible to security threats and therefore must be hardened to become more resilient to attacks. |
References: [1] Andress, J. (2014). The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice (2nd ed.). Syngress. [2] Brown, E. (2001). Speaking of computers. Mobile learning explorations at the Stanford learning lab, (55). [3] Chova, L. G., Martínez, A. L., Torres, I. C., Shonola, S. S., Joy, M. (2014). Security framework for mobile learning environments. In: ICERI 2014: Conference proceedings. [4] Friedman, J., Hoffman, D. V. (2008). Protecting data on mobile devices: A taxonomy of security threats to mobile computing and review of applicable defenses. Information Knowledge Systems Management, 7, 1590180. [5] Greenberg, A. (2019, August 9). Teen hacker finds bugs in school software that exposed millions ofrecords. Wired. https://www.wired.com/story/teen-hacker-school-software-blackboard-follett/ [6] Irimia, D., & Rãdulescu, R. (2019). Mobile device management in the context of byod. https://www.researchgate.net/publication/333263130 [7] Ismail, M. I. (2016). A review of the challenges and issues in mobile learning. International Journal of Enhanced Research in Educational Development (IJERED), 4 (2) 1-6. [8] ReportLinker. (2020, August 18). Global mobile learning industry. GlobeNewswire News Room. https://www.globenewswire.com/news-release/2020/08/18/2080347/0/en/Global-Mobile-Learning-Industry.html [9] Sletten, M. A. (2020). Security in a mobile learning environment (Doctoral dissertation). University of Illinois, Urbana-Champaign [10] Wi-Fi Alliance. (2021, January 1). How does Wi-Fi protected setup work? | Wi-Fi alliance. https://www.wi-fi.org/knowledge-center/faq/how-does-wi-fi-protected-setup-work [11] Wilson, M., Hash, J. (2003). Building an information technology security awareness and training program: Computer security (800-50). National Institute of Standards and Technology/Technology Administration/U.S. Department of Commerce. |