Warning: Declaration of Jetpack_IXR_Client::query() should be compatible with IXR_Client::query(...$args) in /hermes/bosnacweb06/bosnacweb06ar/b2421/ipg.danielboniface201579429/cedtechjournals/wp-content/plugins/jetpack/vendor/automattic/jetpack-connection/legacy/class-jetpack-ixr-client.php on line 54

Warning: Cannot modify header information - headers already sent by (output started at /hermes/bosnacweb06/bosnacweb06ar/b2421/ipg.danielboniface201579429/cedtechjournals/wp-content/plugins/jetpack/vendor/automattic/jetpack-connection/legacy/class-jetpack-ixr-client.php:122) in /hermes/bosnacweb06/bosnacweb06ar/b2421/ipg.danielboniface201579429/cedtechjournals/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /hermes/bosnacweb06/bosnacweb06ar/b2421/ipg.danielboniface201579429/cedtechjournals/wp-content/plugins/jetpack/vendor/automattic/jetpack-connection/legacy/class-jetpack-ixr-client.php:122) in /hermes/bosnacweb06/bosnacweb06ar/b2421/ipg.danielboniface201579429/cedtechjournals/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /hermes/bosnacweb06/bosnacweb06ar/b2421/ipg.danielboniface201579429/cedtechjournals/wp-content/plugins/jetpack/vendor/automattic/jetpack-connection/legacy/class-jetpack-ixr-client.php:122) in /hermes/bosnacweb06/bosnacweb06ar/b2421/ipg.danielboniface201579429/cedtechjournals/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /hermes/bosnacweb06/bosnacweb06ar/b2421/ipg.danielboniface201579429/cedtechjournals/wp-content/plugins/jetpack/vendor/automattic/jetpack-connection/legacy/class-jetpack-ixr-client.php:122) in /hermes/bosnacweb06/bosnacweb06ar/b2421/ipg.danielboniface201579429/cedtechjournals/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /hermes/bosnacweb06/bosnacweb06ar/b2421/ipg.danielboniface201579429/cedtechjournals/wp-content/plugins/jetpack/vendor/automattic/jetpack-connection/legacy/class-jetpack-ixr-client.php:122) in /hermes/bosnacweb06/bosnacweb06ar/b2421/ipg.danielboniface201579429/cedtechjournals/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /hermes/bosnacweb06/bosnacweb06ar/b2421/ipg.danielboniface201579429/cedtechjournals/wp-content/plugins/jetpack/vendor/automattic/jetpack-connection/legacy/class-jetpack-ixr-client.php:122) in /hermes/bosnacweb06/bosnacweb06ar/b2421/ipg.danielboniface201579429/cedtechjournals/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /hermes/bosnacweb06/bosnacweb06ar/b2421/ipg.danielboniface201579429/cedtechjournals/wp-content/plugins/jetpack/vendor/automattic/jetpack-connection/legacy/class-jetpack-ixr-client.php:122) in /hermes/bosnacweb06/bosnacweb06ar/b2421/ipg.danielboniface201579429/cedtechjournals/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /hermes/bosnacweb06/bosnacweb06ar/b2421/ipg.danielboniface201579429/cedtechjournals/wp-content/plugins/jetpack/vendor/automattic/jetpack-connection/legacy/class-jetpack-ixr-client.php:122) in /hermes/bosnacweb06/bosnacweb06ar/b2421/ipg.danielboniface201579429/cedtechjournals/wp-includes/rest-api/class-wp-rest-server.php on line 1893
{"id":2151,"date":"2024-05-03T11:06:57","date_gmt":"2024-05-03T11:06:57","guid":{"rendered":"https:\/\/cedtechjournals.org\/?p=2151"},"modified":"2024-05-03T11:07:00","modified_gmt":"2024-05-03T11:07:00","slug":"mobile-learning-system-attack-issues-control-measures-and-recommendation","status":"publish","type":"post","link":"https:\/\/cedtechjournals.org\/2024\/05\/03\/mobile-learning-system-attack-issues-control-measures-and-recommendation\/","title":{"rendered":"MOBILE LEARNING SYSTEM: ATTACK ISSUES, CONTROL MEASURES AND RECOMMENDATION"},"content":{"rendered":"\n

*Adamu, M., Oyefolahan, O. I., Ojerinde, O. A<\/p>\n\n\n\n

ABSTRACT<\/strong><\/p>\n\n\n\n

Despite the existence of some literature reviews on the security issues tied to mobile devices in education, they fall short of thoroughly exploring the security challenges inherent in mobile learning systems. This study sets out to bridge this gap by investigating the security challenges faced by mobile learning, organizing them according to the specific security needs and vulnerabilities inherent to mobile learning, and spotlighting preventive strategies along with recent findings in the realm of mobile learning security. To meet its research goals, the study employed a systematic literature review method guided by the PRISMA approach, establishing quality standards that reflect the study\u2019s aims, undertaken tasks, and the knowledge base relevant to the security challenges of mobile learning systems. This analysis encompasses studies published from 2012 to 2022, focusing on \u201cmobile learning,\u201d \u201cmobile education,\u201d \u201csecurity challenge,\u201d and \u201csecurity trend\u201d as key search terms. It sourced articles from a variety of databases, including Google Search, IEEE, WILEY, Scopus, ACM Digital Library, Science Direct, and Springer, initially identifying 116 relevant articles. Strict criteria were applied, narrowing down to 46 articles for detailed examination. The findings reveal a significant gap in the literature on security challenges within mobile learning systems, underscoring the urgent need to address these issues in the rapidly evolving tech landscape. Most existing studies lack a holistic framework for tackling security concerns in mobile learning. Consequently, this paper enriches the existing knowledge for users of mobile learning, students engaged in mobile learning, and the research community focused on the current security challenges posed by the advent of mobile learning.<\/p>\n\n\n\n

Keywords:<\/strong> Mobile Learning, M-learning, Mobile Devices, and Security Challenges<\/em><\/p>\n\n\n\n

Full Article pdf<\/a>Download<\/a><\/div>\n\n\n\n

<\/p>\n","protected":false},"excerpt":{"rendered":"

*Adamu, M., Oyefolahan, O. I., Ojerinde, O. A ABSTRACT Despite the existence of some literature reviews on the security issues tied to mobile devices in education, they fall short of thoroughly exploring the security challenges inherent in mobile learning systems. This study sets out to bridge this gap by investigatingRead More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[207],"tags":[],"class_list":["post-2151","post","type-post","status-publish","format-standard","hentry","category-international-journal-of-natural-applied-science-vol-5-number-12024"],"jetpack_featured_media_url":"","yoast_head":"\nMOBILE LEARNING SYSTEM: ATTACK ISSUES, CONTROL MEASURES AND RECOMMENDATION - Centre for Educational Development and Technology<\/title>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"MOBILE LEARNING SYSTEM: ATTACK ISSUES, CONTROL MEASURES AND RECOMMENDATION - Centre for Educational Development and Technology\" \/>\n<meta property=\"og:description\" content=\"*Adamu, M., Oyefolahan, O. I., Ojerinde, O. A ABSTRACT Despite the existence of some literature reviews on the security issues tied to mobile devices in education, they fall short of thoroughly exploring the security challenges inherent in mobile learning systems. This study sets out to bridge this gap by investigatingRead More\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cedtechjournals.org\/2024\/05\/03\/mobile-learning-system-attack-issues-control-measures-and-recommendation\/\" \/>\n<meta property=\"og:site_name\" content=\"Centre for Educational Development and Technology\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-03T11:06:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-03T11:07:00+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cedtechjournals.org\/#website\",\"url\":\"https:\/\/cedtechjournals.org\/\",\"name\":\"Centre for Educational Development and Technology\",\"description\":\"Centre for Educational Development and Technology\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/cedtechjournals.org\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cedtechjournals.org\/2024\/05\/03\/mobile-learning-system-attack-issues-control-measures-and-recommendation\/#webpage\",\"url\":\"https:\/\/cedtechjournals.org\/2024\/05\/03\/mobile-learning-system-attack-issues-control-measures-and-recommendation\/\",\"name\":\"MOBILE LEARNING SYSTEM: ATTACK ISSUES, CONTROL MEASURES AND RECOMMENDATION - Centre for Educational Development and Technology\",\"isPartOf\":{\"@id\":\"https:\/\/cedtechjournals.org\/#website\"},\"datePublished\":\"2024-05-03T11:06:57+00:00\",\"dateModified\":\"2024-05-03T11:07:00+00:00\",\"author\":{\"@id\":\"https:\/\/cedtechjournals.org\/#\/schema\/person\/14a196f1f24cf523a73ba19d04870082\"},\"breadcrumb\":{\"@id\":\"https:\/\/cedtechjournals.org\/2024\/05\/03\/mobile-learning-system-attack-issues-control-measures-and-recommendation\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cedtechjournals.org\/2024\/05\/03\/mobile-learning-system-attack-issues-control-measures-and-recommendation\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cedtechjournals.org\/2024\/05\/03\/mobile-learning-system-attack-issues-control-measures-and-recommendation\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"item\":{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cedtechjournals.org\/\",\"url\":\"https:\/\/cedtechjournals.org\/\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"position\":2,\"item\":{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cedtechjournals.org\/2024\/05\/03\/mobile-learning-system-attack-issues-control-measures-and-recommendation\/\",\"url\":\"https:\/\/cedtechjournals.org\/2024\/05\/03\/mobile-learning-system-attack-issues-control-measures-and-recommendation\/\",\"name\":\"MOBILE LEARNING SYSTEM: ATTACK ISSUES, CONTROL MEASURES AND RECOMMENDATION\"}}]},{\"@type\":[\"Person\"],\"@id\":\"https:\/\/cedtechjournals.org\/#\/schema\/person\/14a196f1f24cf523a73ba19d04870082\",\"name\":\"obed\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/cedtechjournals.org\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5c679829854544462513b9672ae6dd4a?s=96&d=mm&r=g\",\"caption\":\"obed\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"https:\/\/cedtechjournals.org\/wp-json\/wp\/v2\/posts\/2151","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cedtechjournals.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cedtechjournals.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cedtechjournals.org\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cedtechjournals.org\/wp-json\/wp\/v2\/comments?post=2151"}],"version-history":[{"count":1,"href":"https:\/\/cedtechjournals.org\/wp-json\/wp\/v2\/posts\/2151\/revisions"}],"predecessor-version":[{"id":2153,"href":"https:\/\/cedtechjournals.org\/wp-json\/wp\/v2\/posts\/2151\/revisions\/2153"}],"wp:attachment":[{"href":"https:\/\/cedtechjournals.org\/wp-json\/wp\/v2\/media?parent=2151"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cedtechjournals.org\/wp-json\/wp\/v2\/categories?post=2151"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cedtechjournals.org\/wp-json\/wp\/v2\/tags?post=2151"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}