Warning: Declaration of Jetpack_IXR_Client::query() should be compatible with IXR_Client::query(...$args) in /hermes/bosnacweb06/bosnacweb06ar/b2421/ipg.danielboniface201579429/cedtechjournals/wp-content/plugins/jetpack/vendor/automattic/jetpack-connection/legacy/class-jetpack-ixr-client.php on line 54

Warning: Cannot modify header information - headers already sent by (output started at /hermes/bosnacweb06/bosnacweb06ar/b2421/ipg.danielboniface201579429/cedtechjournals/wp-content/plugins/jetpack/vendor/automattic/jetpack-connection/legacy/class-jetpack-ixr-client.php:122) in /hermes/bosnacweb06/bosnacweb06ar/b2421/ipg.danielboniface201579429/cedtechjournals/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /hermes/bosnacweb06/bosnacweb06ar/b2421/ipg.danielboniface201579429/cedtechjournals/wp-content/plugins/jetpack/vendor/automattic/jetpack-connection/legacy/class-jetpack-ixr-client.php:122) in /hermes/bosnacweb06/bosnacweb06ar/b2421/ipg.danielboniface201579429/cedtechjournals/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /hermes/bosnacweb06/bosnacweb06ar/b2421/ipg.danielboniface201579429/cedtechjournals/wp-content/plugins/jetpack/vendor/automattic/jetpack-connection/legacy/class-jetpack-ixr-client.php:122) in /hermes/bosnacweb06/bosnacweb06ar/b2421/ipg.danielboniface201579429/cedtechjournals/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /hermes/bosnacweb06/bosnacweb06ar/b2421/ipg.danielboniface201579429/cedtechjournals/wp-content/plugins/jetpack/vendor/automattic/jetpack-connection/legacy/class-jetpack-ixr-client.php:122) in /hermes/bosnacweb06/bosnacweb06ar/b2421/ipg.danielboniface201579429/cedtechjournals/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /hermes/bosnacweb06/bosnacweb06ar/b2421/ipg.danielboniface201579429/cedtechjournals/wp-content/plugins/jetpack/vendor/automattic/jetpack-connection/legacy/class-jetpack-ixr-client.php:122) in /hermes/bosnacweb06/bosnacweb06ar/b2421/ipg.danielboniface201579429/cedtechjournals/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /hermes/bosnacweb06/bosnacweb06ar/b2421/ipg.danielboniface201579429/cedtechjournals/wp-content/plugins/jetpack/vendor/automattic/jetpack-connection/legacy/class-jetpack-ixr-client.php:122) in /hermes/bosnacweb06/bosnacweb06ar/b2421/ipg.danielboniface201579429/cedtechjournals/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /hermes/bosnacweb06/bosnacweb06ar/b2421/ipg.danielboniface201579429/cedtechjournals/wp-content/plugins/jetpack/vendor/automattic/jetpack-connection/legacy/class-jetpack-ixr-client.php:122) in /hermes/bosnacweb06/bosnacweb06ar/b2421/ipg.danielboniface201579429/cedtechjournals/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /hermes/bosnacweb06/bosnacweb06ar/b2421/ipg.danielboniface201579429/cedtechjournals/wp-content/plugins/jetpack/vendor/automattic/jetpack-connection/legacy/class-jetpack-ixr-client.php:122) in /hermes/bosnacweb06/bosnacweb06ar/b2421/ipg.danielboniface201579429/cedtechjournals/wp-includes/rest-api/class-wp-rest-server.php on line 1893
{"id":2337,"date":"2025-02-26T18:25:34","date_gmt":"2025-02-26T18:25:34","guid":{"rendered":"https:\/\/cedtechjournals.org\/?p=2337"},"modified":"2025-02-26T18:25:37","modified_gmt":"2025-02-26T18:25:37","slug":"mobile-learning-security-challenges-preventive-measures-and-future-direction","status":"publish","type":"post","link":"https:\/\/cedtechjournals.org\/2025\/02\/26\/mobile-learning-security-challenges-preventive-measures-and-future-direction\/","title":{"rendered":"MOBILE LEARNING SECURITY: CHALLENGES, PREVENTIVE MEASURES AND FUTURE DIRECTION"},"content":{"rendered":"\n

*Adamu, M., Kolo, H., Isah, A.D., and Gonna I.S.<\/strong><\/p>\n\n\n\n

ABSTRACT<\/strong><\/p>\n\n\n\n

There exist few literature reviews on security issues in the use of mobile devices in educational institutions, but do not sufficiently address the security challenges of the mobile learning system. Motivated by this fact, the study attempts to review security challenges in mobile learning and classified them based on the security requirement and vulnerability issue of mobile learning, highlights preventive measures and points out the current research in the area of m-learning security. To achieve the stated research goal, the study applied a systematic literature review using the PRISMA technique to put forward the quality criteria that are based on the research goal, objectives, and knowledge relevant to the study of security challenges of a mobile learning system. The paper examined studies published in 2012-2022 containing the keywords \u201cmobile learning\u201d, \u201cmobile education\u201d \u201csecurity challenges\u201d and \u201csecurity trends\u201d. Related articles were obtained from various databases namely Google Search, IEEE, WILEY, Scopus, ACM Digital Library, Science Direct, and Springer. In total 116related articles were initially found. Upon executing careful selection criteria, 66\/39 articles were selected for final review.  The results from the review reveal the scarcity of appropriate literature on security challenges in mobile learning system and that these issues are a thing of concern, and needed to be looked into in this ever-growing world of technologies. However, most of the studies reviewed lack of a comprehensive framework to demonstrate the security challenges in mobile learning. Thus, the results from this paper provide additional knowledge to the users of mobile learning as a whole; students in their usage of mobile learning, and the research community on the current security challenges in the adoption of mobile learning system.<\/p>\n\n\n\n

Keywords<\/strong>: Mobile Learning, M-learning, Mobile Devices, and Security Challenges<\/em><\/p>\n\n\n\n

Full Article Pdf<\/a>Download<\/a><\/div>\n\n\n\n

<\/p>\n","protected":false},"excerpt":{"rendered":"

*Adamu, M., Kolo, H., Isah, A.D., and Gonna I.S. ABSTRACT There exist few literature reviews on security issues in the use of mobile devices in educational institutions, but do not sufficiently address the security challenges of the mobile learning system. Motivated by this fact, the study attempts to review securityRead More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[230],"tags":[],"class_list":["post-2337","post","type-post","status-publish","format-standard","hentry","category-international-journal-of-natural-applied-science-vol-4-no-2-2023"],"jetpack_featured_media_url":"","yoast_head":"\nMOBILE LEARNING SECURITY: CHALLENGES, PREVENTIVE MEASURES AND FUTURE DIRECTION - Centre for Educational Development and Technology<\/title>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"MOBILE LEARNING SECURITY: CHALLENGES, PREVENTIVE MEASURES AND FUTURE DIRECTION - Centre for Educational Development and Technology\" \/>\n<meta property=\"og:description\" content=\"*Adamu, M., Kolo, H., Isah, A.D., and Gonna I.S. ABSTRACT There exist few literature reviews on security issues in the use of mobile devices in educational institutions, but do not sufficiently address the security challenges of the mobile learning system. Motivated by this fact, the study attempts to review securityRead More\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cedtechjournals.org\/2025\/02\/26\/mobile-learning-security-challenges-preventive-measures-and-future-direction\/\" \/>\n<meta property=\"og:site_name\" content=\"Centre for Educational Development and Technology\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-26T18:25:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-26T18:25:37+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cedtechjournals.org\/#website\",\"url\":\"https:\/\/cedtechjournals.org\/\",\"name\":\"Centre for Educational Development and Technology\",\"description\":\"Centre for Educational Development and Technology\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/cedtechjournals.org\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cedtechjournals.org\/2025\/02\/26\/mobile-learning-security-challenges-preventive-measures-and-future-direction\/#webpage\",\"url\":\"https:\/\/cedtechjournals.org\/2025\/02\/26\/mobile-learning-security-challenges-preventive-measures-and-future-direction\/\",\"name\":\"MOBILE LEARNING SECURITY: CHALLENGES, PREVENTIVE MEASURES AND FUTURE DIRECTION - Centre for Educational Development and Technology\",\"isPartOf\":{\"@id\":\"https:\/\/cedtechjournals.org\/#website\"},\"datePublished\":\"2025-02-26T18:25:34+00:00\",\"dateModified\":\"2025-02-26T18:25:37+00:00\",\"author\":{\"@id\":\"https:\/\/cedtechjournals.org\/#\/schema\/person\/14a196f1f24cf523a73ba19d04870082\"},\"breadcrumb\":{\"@id\":\"https:\/\/cedtechjournals.org\/2025\/02\/26\/mobile-learning-security-challenges-preventive-measures-and-future-direction\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cedtechjournals.org\/2025\/02\/26\/mobile-learning-security-challenges-preventive-measures-and-future-direction\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cedtechjournals.org\/2025\/02\/26\/mobile-learning-security-challenges-preventive-measures-and-future-direction\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"item\":{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cedtechjournals.org\/\",\"url\":\"https:\/\/cedtechjournals.org\/\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"position\":2,\"item\":{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cedtechjournals.org\/2025\/02\/26\/mobile-learning-security-challenges-preventive-measures-and-future-direction\/\",\"url\":\"https:\/\/cedtechjournals.org\/2025\/02\/26\/mobile-learning-security-challenges-preventive-measures-and-future-direction\/\",\"name\":\"MOBILE LEARNING SECURITY: CHALLENGES, PREVENTIVE MEASURES AND FUTURE DIRECTION\"}}]},{\"@type\":[\"Person\"],\"@id\":\"https:\/\/cedtechjournals.org\/#\/schema\/person\/14a196f1f24cf523a73ba19d04870082\",\"name\":\"obed\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/cedtechjournals.org\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5c679829854544462513b9672ae6dd4a?s=96&d=mm&r=g\",\"caption\":\"obed\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"https:\/\/cedtechjournals.org\/wp-json\/wp\/v2\/posts\/2337","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cedtechjournals.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cedtechjournals.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cedtechjournals.org\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cedtechjournals.org\/wp-json\/wp\/v2\/comments?post=2337"}],"version-history":[{"count":1,"href":"https:\/\/cedtechjournals.org\/wp-json\/wp\/v2\/posts\/2337\/revisions"}],"predecessor-version":[{"id":2339,"href":"https:\/\/cedtechjournals.org\/wp-json\/wp\/v2\/posts\/2337\/revisions\/2339"}],"wp:attachment":[{"href":"https:\/\/cedtechjournals.org\/wp-json\/wp\/v2\/media?parent=2337"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cedtechjournals.org\/wp-json\/wp\/v2\/categories?post=2337"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cedtechjournals.org\/wp-json\/wp\/v2\/tags?post=2337"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}