Remember Me
Or use your Academic/Social account:


Or use your Academic/Social account:


You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.


Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message


Verify Password:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Shonola, Shaibu A.; Joy, Mike (2014)
Publisher: IATED
Languages: English
Types: Unknown
Subjects: LB2300, QA76
The demand for mobile learning has continued to increase due to recent advances in modern technologies. Mobile learning advocates in universities focus their attention mainly on course development, deployment and delivery on handheld devices but they pay little or no consideration to security and privacy of stakeholders’ data in the design of mobile learning systems. However, the use of mobile technologies for learning poses a threat to confidentiality, integrity and privacy of the data involved in learning delivery for both learners and lecturers. This paper discusses the security concerns of mobile learning from the lecturers’ perspective based on a study conducted in higher education institutions in Nigeria. While the challenges of adopting mobile learning in Nigerian universities are enormous, the study identifies the critical security challenges that educators are facing when using mobile devices for educational purposes. It further examines the damaging effects of mobile learning on educators if their privacy breached and provides recommendations for alleviating the security threats.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • [20] Yusuf, M., & Balogun, M. R. (2011). Student-teachers competence and attitude towards information and communication technology: A case study in a Nigeria university. Contemporary Educational Technology 21(1), pp. 18-36
    • [21] Okebukola, P. (2006). Principles and policies guiding current reforms in Nigerian universities. Journal of Higher Education in Africa 4(1), pp.25-36
    • [22] Leung, A., Sheng, Y., & Cruickshank, H (2007). The security challenges for mobile ubiquitous services. Information Security Technical Report. 12(2007) pp.162 -171.
    • [23] Boyinbode, O. K., & Akinyede, R. O. (2008). Mobile learning: An application of mobile and wireless technologies in Nigerian learning system. International Journal of computer science and network security. 8(11), pp.386-392.
    • [24] Zamzuri, Z. F., Manaf, M., Yunus, Y.,& Ahmad, A. (2013). Student Perception on Security Requirement of e-Learning Services. Procedia-Social and Behavioral Sciences. 90(2013), pp.923-930.
  • No related research data.
  • No similar publications.

Share - Bookmark

Cite this article