Security Management for Mobile Learning Systems

Gorde:
Xehetasun bibliografikoak
Argitaratua izan da:The International Scientific Conference eLearning and Software for Education vol. 1 (2018), p. 42
Egile nagusia: Zamfiroiu, Alin
Argitaratua:
"Carol I" National Defence University
Gaiak:
Sarrera elektronikoa:Citation/Abstract
Full Text
Full Text - PDF
Etiketak: Etiketa erantsi
Etiketarik gabe, Izan zaitez lehena erregistro honi etiketa jartzen!

MARC

LEADER 00000nab a2200000uu 4500
001 2038222670
003 UK-CbPIL
024 7 |a 10.12753/2066-026X-18-005  |2 doi 
035 |a 2038222670 
045 2 |b d20180101  |b d20181231 
084 |a 185028  |2 nlm 
100 1 |a Zamfiroiu, Alin  |u University of Economic Studies, Bucharest, Romania National Institute of Research-Development in Informatics, Bucharest, Romania zamfiroiur@ici.ro 
245 1 |a Security Management for Mobile Learning Systems 
260 |b "Carol I" National Defence University  |c 2018 
513 |a Journal Article 
520 3 |a Nowadays, more and more systems become online. And the educational system, in turn, became online by terms like E-Learning or M-Learning. There is the possibility of learning by teleconferencing, there is the possibility of learning by using video tutorials or audio tutorials in which are presented the programming modes of the teachers or the trainers who make the tutorials. Every way of learning is specific to certain people, and each person acquires a certain way of learning according to their capabilities and according to their experience in programming or in the language in which they want to learn new things. Also cloud storage has become very important and more applications keep memory in centralized cloud-oriented servers. The problem with these systems is the security management. For M-Learning systems, the security should be managed both at the application level and at the communication level. Thus, the channel on which the information between the mobile application and the server where the data is stored and centralized are changed, should be secure. And the communication between the two entities must be accomplished without the risk that a third party intervenes on this channel and modifies the interchanged data between the two entities. Within this material are studied and analyzed the methods of increasing the security of mobile applications used in the educational environment. Increasing security is done by testing both the applications and the services provided by the server. For mobile applications made in the educational environment, WhiteBox testing and BlackBox testing are required. The material presents the WhiteBox and BlackBox test methods for mobile educational applications. 
653 |a International conferences 
653 |a Research 
653 |a Software 
653 |a Black boxes 
653 |a Applications programs 
653 |a Test procedures 
653 |a User satisfaction 
653 |a Mobile communications networks 
653 |a Mobile computing 
653 |a Teleconferencing 
653 |a Online tutorials 
653 |a Servers 
653 |a Influence 
653 |a Distance learning 
653 |a Quality 
653 |a Field representatives 
653 |a User interface 
653 |a On-line systems 
653 |a Cloud computing 
653 |a Information storage 
653 |a Teaching methods 
653 |a Online instruction 
653 |a Data storage 
653 |a Informatics 
653 |a Portable computers 
653 |a Education 
653 |a Computer memory 
653 |a Training 
653 |a Questionnaires 
653 |a Academic Achievement 
653 |a Programming Languages 
653 |a Electronic Learning 
653 |a Computer Software 
653 |a Educational Environment 
773 0 |t The International Scientific Conference eLearning and Software for Education  |g vol. 1 (2018), p. 42 
786 0 |d ProQuest  |t Education Database 
856 4 1 |3 Citation/Abstract  |u https://www.proquest.com/docview/2038222670/abstract/embedded/6A8EOT78XXH2IG52?source=fedsrch 
856 4 0 |3 Full Text  |u https://www.proquest.com/docview/2038222670/fulltext/embedded/6A8EOT78XXH2IG52?source=fedsrch 
856 4 0 |3 Full Text - PDF  |u https://www.proquest.com/docview/2038222670/fulltextPDF/embedded/6A8EOT78XXH2IG52?source=fedsrch