MOBILE LEARNING SECURITY: CHALLENGES, PREVENTIVE MEASURES AND FUTURE DIRECTION

*Adamu, M., Kolo, H., Isah, A.D., and Gonna I.S.

ABSTRACT

There exist few literature reviews on security issues in the use of mobile devices in educational institutions, but do not sufficiently address the security challenges of the mobile learning system. Motivated by this fact, the study attempts to review security challenges in mobile learning and classified them based on the security requirement and vulnerability issue of mobile learning, highlights preventive measures and points out the current research in the area of m-learning security. To achieve the stated research goal, the study applied a systematic literature review using the PRISMA technique to put forward the quality criteria that are based on the research goal, objectives, and knowledge relevant to the study of security challenges of a mobile learning system. The paper examined studies published in 2012-2022 containing the keywords “mobile learning”, “mobile education” “security challenges” and “security trends”. Related articles were obtained from various databases namely Google Search, IEEE, WILEY, Scopus, ACM Digital Library, Science Direct, and Springer. In total 116related articles were initially found. Upon executing careful selection criteria, 66/39 articles were selected for final review.  The results from the review reveal the scarcity of appropriate literature on security challenges in mobile learning system and that these issues are a thing of concern, and needed to be looked into in this ever-growing world of technologies. However, most of the studies reviewed lack of a comprehensive framework to demonstrate the security challenges in mobile learning. Thus, the results from this paper provide additional knowledge to the users of mobile learning as a whole; students in their usage of mobile learning, and the research community on the current security challenges in the adoption of mobile learning system.

Keywords: Mobile Learning, M-learning, Mobile Devices, and Security Challenges

Leave a Reply

Your email address will not be published. Required fields are marked *