Security Management for Mobile Learning Systems
Gorde:
| Argitaratua izan da: | The International Scientific Conference eLearning and Software for Education vol. 1 (2018), p. 42 |
|---|---|
| Egile nagusia: | |
| Argitaratua: |
"Carol I" National Defence University
|
| Gaiak: | |
| Sarrera elektronikoa: | Citation/Abstract Full Text Full Text - PDF |
| Etiketak: |
Etiketarik gabe, Izan zaitez lehena erregistro honi etiketa jartzen!
|
MARC
| LEADER | 00000nab a2200000uu 4500 | ||
|---|---|---|---|
| 001 | 2038222670 | ||
| 003 | UK-CbPIL | ||
| 024 | 7 | |a 10.12753/2066-026X-18-005 |2 doi | |
| 035 | |a 2038222670 | ||
| 045 | 2 | |b d20180101 |b d20181231 | |
| 084 | |a 185028 |2 nlm | ||
| 100 | 1 | |a Zamfiroiu, Alin |u University of Economic Studies, Bucharest, Romania National Institute of Research-Development in Informatics, Bucharest, Romania zamfiroiur@ici.ro | |
| 245 | 1 | |a Security Management for Mobile Learning Systems | |
| 260 | |b "Carol I" National Defence University |c 2018 | ||
| 513 | |a Journal Article | ||
| 520 | 3 | |a Nowadays, more and more systems become online. And the educational system, in turn, became online by terms like E-Learning or M-Learning. There is the possibility of learning by teleconferencing, there is the possibility of learning by using video tutorials or audio tutorials in which are presented the programming modes of the teachers or the trainers who make the tutorials. Every way of learning is specific to certain people, and each person acquires a certain way of learning according to their capabilities and according to their experience in programming or in the language in which they want to learn new things. Also cloud storage has become very important and more applications keep memory in centralized cloud-oriented servers. The problem with these systems is the security management. For M-Learning systems, the security should be managed both at the application level and at the communication level. Thus, the channel on which the information between the mobile application and the server where the data is stored and centralized are changed, should be secure. And the communication between the two entities must be accomplished without the risk that a third party intervenes on this channel and modifies the interchanged data between the two entities. Within this material are studied and analyzed the methods of increasing the security of mobile applications used in the educational environment. Increasing security is done by testing both the applications and the services provided by the server. For mobile applications made in the educational environment, WhiteBox testing and BlackBox testing are required. The material presents the WhiteBox and BlackBox test methods for mobile educational applications. | |
| 653 | |a International conferences | ||
| 653 | |a Research | ||
| 653 | |a Software | ||
| 653 | |a Black boxes | ||
| 653 | |a Applications programs | ||
| 653 | |a Test procedures | ||
| 653 | |a User satisfaction | ||
| 653 | |a Mobile communications networks | ||
| 653 | |a Mobile computing | ||
| 653 | |a Teleconferencing | ||
| 653 | |a Online tutorials | ||
| 653 | |a Servers | ||
| 653 | |a Influence | ||
| 653 | |a Distance learning | ||
| 653 | |a Quality | ||
| 653 | |a Field representatives | ||
| 653 | |a User interface | ||
| 653 | |a On-line systems | ||
| 653 | |a Cloud computing | ||
| 653 | |a Information storage | ||
| 653 | |a Teaching methods | ||
| 653 | |a Online instruction | ||
| 653 | |a Data storage | ||
| 653 | |a Informatics | ||
| 653 | |a Portable computers | ||
| 653 | |a Education | ||
| 653 | |a Computer memory | ||
| 653 | |a Training | ||
| 653 | |a Questionnaires | ||
| 653 | |a Academic Achievement | ||
| 653 | |a Programming Languages | ||
| 653 | |a Electronic Learning | ||
| 653 | |a Computer Software | ||
| 653 | |a Educational Environment | ||
| 773 | 0 | |t The International Scientific Conference eLearning and Software for Education |g vol. 1 (2018), p. 42 | |
| 786 | 0 | |d ProQuest |t Education Database | |
| 856 | 4 | 1 | |3 Citation/Abstract |u https://www.proquest.com/docview/2038222670/abstract/embedded/6A8EOT78XXH2IG52?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text |u https://www.proquest.com/docview/2038222670/fulltext/embedded/6A8EOT78XXH2IG52?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text - PDF |u https://www.proquest.com/docview/2038222670/fulltextPDF/embedded/6A8EOT78XXH2IG52?source=fedsrch |