Security and privacy issues in mobile learning
暂无分享,去创建一个
[1] Neal Krawetz. Introduction to Network Security (Networking Series) , 2006 .
[2] Hossein Bidgoli. Handbook of Information Security , 2005 .
[3] Robin E. Garrett. Product review of WebCT Vista , 2004 .
[4] Deirdre Lillis,et al. The application of e-learning and m-learning technology in the context of Life Long Learning in Irish Higher Education. , 2005 .
[5] Jahanzeb Khan,et al. Building Secure Wireless Networks with 802.11 , 2003 .
[6] Nitin H. Vaidya,et al. Efficient network camouflaging in wireless networks , 2005 .
[7] Abhijeet Chavan,et al. Open-source learning management with moodle , 2004 .
[8] Steven Levy,et al. The Perfect Thing: How the iPod Shuffles Commerce, Culture, and Coolness , 2006 .
[9] Edgar R. Weippl. Security in e-learning , 2005, ELERN.
[10] Edgar Weippl. Security considerations in m-learning: threats and countermeasures , 2007 .
[11] S. Downes. Places to Go: Facebook , 2007 .
[12] Gregory D. Abowd,et al. Classroom 2000: An Experiment with the Instrumentation of a Living Educational Environment , 1999, IBM Syst. J..
[13] Christian Dalsgaard,et al. Social software: E-learning beyond learning management systems , 2006 .
[14] Andreas Holzinger,et al. Student-Centered Teaching Meets New Media: Concept and Case Study , 2002, J. Educ. Technol. Soc..
[15] Hermann A. Maurer. Web-Based Knowledge Management , 1998, Computer.
[16] Khalil El-Khatib,et al. Privacy and Security in E-Learning , 2003, Int. J. Distance Educ. Technol..
[17] Johann Gamper,et al. Mobile ELDIT: Challenges in the Transition from an e-Learning to an m-Learning System , 2004 .
[18] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[19] Michael Lynn,et al. Hacking Exposed Wireless , 2007 .
[20] R. Kozma. Will media influence learning? Reframing the debate , 1994 .
[21] Michael Gorman,et al. Our Enduring Values: Librarianship in the 21st Century , 2000 .
[22] Mike Sharples,et al. The design of personal mobile technologies for lifelong learning , 2000, Comput. Educ..
[23] Michael D. Smith,et al. Computer security strength and risk: a quantitative approach , 2004 .
[24] Andreas Holzinger,et al. Pervasive E-Education supports LIfe Long Learning: Some Examples of X-Media Learning Objects , 2006 .
[25] Roger C. Schank. Goal-Based Scenarios: A Radical Look at Education , 1994 .
[26] Phil Vahey,et al. Handhelds Go to School: Lessons Learned , 2003, Computer.