Security and privacy issues in mobile learning

The emergence of innovative uses of mobile and wireless devices in mobile learning (m-learning) go beyond the convenience of combining electronic learning applications with the mobility of portable devices. Technologies, protocols and policies that provide security and privacy in networked applications have to be augmented and adjusted to take into account the new uses and requirements of m-learning. This article reviews recent developments in m-learning with a focus on privacy and security issues. Developers of m-learning applications and organisations that deploy them have to understand the vulnerabilities and plan to address them early on in order to avoid potential exploitation efforts.

[1]  Neal Krawetz Introduction to Network Security (Networking Series) , 2006 .

[2]  Hossein Bidgoli Handbook of Information Security , 2005 .

[3]  Robin E. Garrett Product review of WebCT Vista , 2004 .

[4]  Deirdre Lillis,et al.  The application of e-learning and m-learning technology in the context of Life Long Learning in Irish Higher Education. , 2005 .

[5]  Jahanzeb Khan,et al.  Building Secure Wireless Networks with 802.11 , 2003 .

[6]  Nitin H. Vaidya,et al.  Efficient network camouflaging in wireless networks , 2005 .

[7]  Abhijeet Chavan,et al.  Open-source learning management with moodle , 2004 .

[8]  Steven Levy,et al.  The Perfect Thing: How the iPod Shuffles Commerce, Culture, and Coolness , 2006 .

[9]  Edgar R. Weippl Security in e-learning , 2005, ELERN.

[10]  Edgar Weippl Security considerations in m-learning: threats and countermeasures , 2007 .

[11]  S. Downes Places to Go: Facebook , 2007 .

[12]  Gregory D. Abowd,et al.  Classroom 2000: An Experiment with the Instrumentation of a Living Educational Environment , 1999, IBM Syst. J..

[13]  Christian Dalsgaard,et al.  Social software: E-learning beyond learning management systems , 2006 .

[14]  Andreas Holzinger,et al.  Student-Centered Teaching Meets New Media: Concept and Case Study , 2002, J. Educ. Technol. Soc..

[15]  Hermann A. Maurer Web-Based Knowledge Management , 1998, Computer.

[16]  Khalil El-Khatib,et al.  Privacy and Security in E-Learning , 2003, Int. J. Distance Educ. Technol..

[17]  Johann Gamper,et al.  Mobile ELDIT: Challenges in the Transition from an e-Learning to an m-Learning System , 2004 .

[18]  Frank Stajano,et al.  The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.

[19]  Michael Lynn,et al.  Hacking Exposed Wireless , 2007 .

[20]  R. Kozma Will media influence learning? Reframing the debate , 1994 .

[21]  Michael Gorman,et al.  Our Enduring Values: Librarianship in the 21st Century , 2000 .

[22]  Mike Sharples,et al.  The design of personal mobile technologies for lifelong learning , 2000, Comput. Educ..

[23]  Michael D. Smith,et al.  Computer security strength and risk: a quantitative approach , 2004 .

[24]  Andreas Holzinger,et al.  Pervasive E-Education supports LIfe Long Learning: Some Examples of X-Media Learning Objects , 2006 .

[25]  Roger C. Schank Goal-Based Scenarios: A Radical Look at Education , 1994 .

[26]  Phil Vahey,et al.  Handhelds Go to School: Lessons Learned , 2003, Computer.