Toward assessing the impact of mobile security issues in pedagogical delivery: A mobile learning case study

The hackers' incentive to attack mobile devices is growing along with people's increasing reliance on mobile technology usage. Mobile applications, text messaging and wireless networks open devices up to attack. Despite security risks mobile technologies have been reported to be instrumental in reshaping tertiary education in developing countries. While mobile security threats are a concern and mobile technologies' potential to boost productivity in Higher education increases, little has been done to assess the impact of mobile security risks against utilization of hand-held technologies for learning. This paper argues that mobile security risks have a significant impact on mobile learning adoption. Drawing on the Unified Theory of Acceptance and Use of Technology (UTAUT) factors that promote Mobile Instant Messaging (MIM) for learning adoption will be examined by exploring the pedagogical application of WhatsApp mobile software. Stratified random sampling was employed to select 20 interviewees. Findings of this study suggest that mobile security threats negatively affect intentions to use WhatsApp strategy for learning, hence extending the UTAUT.

[1]  Harold Tipton,et al.  Security Management Practices , 2000 .

[2]  Jon Friedman,et al.  Protecting data on mobile devices: A taxonomy of security threats to mobile computing and review of applicable defenses , 2008, Inf. Knowl. Syst. Manag..

[3]  Radha Damodaram SECURITY MEASURES OF RANDVUL KEYBOARD , 2010 .

[4]  Viswanath Venkatesh,et al.  Designing E-Government Services: Key Service Attributes and Citizens’ Preference Structures , 2012 .

[5]  Fred D. Davis,et al.  A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies , 2000, Management Science.

[6]  Samuel T. C. Thompson Helping the Hacker? Library Information, Security, and Social Engineering , 2006 .

[7]  Peter A. Todd,et al.  Understanding Information Technology Usage: A Test of Competing Models , 1995, Inf. Syst. Res..

[8]  I. Seidman Interviewing as qualitative research : a guide for researchersin education and the social sciences , 1991 .

[9]  Sarah Henderson,et al.  iPad in Education: A Case Study of iPad Adoption and Use in a Primary School , 2012, 2012 45th Hawaii International Conference on System Sciences.

[10]  Fred D. Davis Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..

[11]  Fred D. Davis,et al.  User Acceptance of Computer Technology: A Comparison of Two Theoretical Models , 1989 .

[12]  Gordon B. Davis,et al.  User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..

[13]  Christopher Hadnagy,et al.  Social Engineering: The Art of Human Hacking , 2010 .