NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 3 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Mazlina Abdul Majid; Husnul Ajra; Mohammad Adam Ibrahim Fakhreldin; Md. Shohidul Islam; Khalid Adam Ismail Hammad – International Society for Technology, Education, and Science, 2023
One of the most persuasive technologies in developing universities' smart campus applications is the Internet of Things (IoT) technique. Deploying thousands of readily available devices connected to IoT systems by ignoring device vulnerabilities and threat strategies in smart campus infrastructure is exacerbating security challenges. Moreover,…
Descriptors: Educational Technology, Technology Uses in Education, Computer Security, Technological Literacy
Mahalingam, Sheila; Abdollah, Faizal Mohd; Sahib, Shahrin – International Association for Development of the Information Society, 2014
The paper focus on learner centric attributes in a m-learning environment encounters the security measurements. In order to build up a systematic threat and countermeasure for protecting the learners as well as providing awareness and satisfaction in utilizing the mobile learning system, a security model need to be overhauled. The brief literature…
Descriptors: Electronic Learning, Computer Security, Reliability, Trust (Psychology)
Mahalingam, Sheila; Abdollah, Faizal Mohd; Sahib, Shahrin – International Association for Development of the Information Society, 2014
M-Learning has a potential to improve efficiency in the education sector and has a tendency to grow advance and transform the learning environment in the future. Yet there are challenges in many areas faced when introducing and implementing m-learning. The learner centered attribute in mobile learning implies deployment in untrustworthy learning…
Descriptors: Foreign Countries, Electronic Learning, Higher Education, Computer Security