The design of personal mobile technologies for lifelong learning
Computers & Education - VIRTUALITY IN EDUCATION selected contributions from the CAL 99 symposium
Web-Based Knowledge Management
Computer
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
Building Secure Wireless Networks with 802.11
Building Secure Wireless Networks with 802.11
A policy-based security framework for Web-enabled applications
ISICT '03 Proceedings of the 1st international symposium on Information and communication technologies
Computer security strength and risk: a quantitative approach
Computer security strength and risk: a quantitative approach
Open-source learning management with moodle
Linux Journal
Hacking Exposed Wireless
Handbook of Information Security
Handbook of Information Security
Efficient network camouflaging in wireless networks
Efficient network camouflaging in wireless networks
Introduction to Network Security (Networking Series)
Introduction to Network Security (Networking Series)
The Perfect Thing: How the iPod Shuffles Commerce, Culture, and Coolness
The Perfect Thing: How the iPod Shuffles Commerce, Culture, and Coolness
Security considerations in m-learning: threats and countermeasures
Advanced Technology for Learning
Adoption of mobile technology in a problem-based learning approach to medical education
International Journal of Mobile Learning and Organisation
Hi-index | 0.00 |
The emergence of innovative uses of mobile and wireless devices in mobile learning (m-learning) go beyond the convenience of combining electronic learning applications with the mobility of portable devices. Technologies, protocols and policies that provide security and privacy in networked applications have to be augmented and adjusted to take into account the new uses and requirements of m-learning. This article reviews recent developments in m-learning with a focus on privacy and security issues. Developers of m-learning applications and organisations that deploy them have to understand the vulnerabilities and plan to address them early on in order to avoid potential exploitation efforts.