SECURITY CONSIDERATIONS IN M-LEARNING: THREATS AND COUNTERMEASURES

E.R. Weippl

References

  1. [1] K.J. Soo Hoo, How much is enough? A risk-managementapproach to computer security, Working Paper, Consortiumfor Research on Information Security and Policy (CRISP),http://iis-db.stanford.edu/pubs/11900/soohoo.pdf, June 2000.
  2. [2] T. Neubauer, C. Stummer, & E.R. Weippl, Workshop-basedmultiobjective security safeguard selection; IEEE; 2006, Proc. of the 1st Int. Conf. on Availability, Reliability and Security ARES 2006, IEEE CS, 2006.
  3. [3] S. Rockman, Learning from Laptops, Threshold (www.ciconline.org) 2003, 24–28.
  4. [4] S. Rockman, Learning from laptops, Threshold Magazine,24–28. www.ciconline.org; http://www.b-g.k12.ky.us/Tech/Laptops.pdf, 2003.
  5. [5] M. Sharples, D. Corlett, & O. Westmancott, The design and implementation of a mobile learning resource, Personal and Ubiquitous Computing, 6(3), 2002, 220–234. doi:10.1007/s007790200021
  6. [6] A. Trifonova, J. Knapp, & M. Ronchetti, E-learning versus M-learning: Experiences, a prototype and first experimental results, Proc. ED-Media 2005, June 27–July 2, 2005, Montreal, Canada, 2005, 4751–4758.
  7. [7] T. Goh & D. Kinshuk, Getting ready for mobile learning—adaptation perspective, Journal of Educational Multimediaand Hypermedia, 15(2), 2006, 175–198.
  8. [8] E. Weippl, Improving security in mobile E-learning, Proc. ED-MEDIA, Lugano, Switzerland, 2004, AACE, 209–216.
  9. [9] L. Neal, Predictions for 2006: E-learning experts map the road ahead, eLearn Magazine, ACM, 2006.
  10. [10] E. R. Weippl, Security in E-learning. (New York: Springer, 2005), ISBN 0-387-24341-0.
  11. [11] L. Walker, S. Rockman, & M. Chessler, A more complexpicture: Laptop use and impact in the context of changing home and school access, Research Studies on Microsoft’s Anytime Anywhere Learning Program, 2000.
  12. [12] G.D. Abowd, C.G. Atkeson, J. Brotherton, T. Enqvist, P. Gulley, & J. LeMon, Investigating the capture, integration and access problem of ubiquitous computing in an educational setting, Proc. SIGCHI Conf. on Human Factors in Computing Systems, Los Angeles, CA, 1998, 440–447. http://doi.acm.org/10.1145/274644.274704 (ACM Press/Addison-Wesley Publishing Co., 1998).
  13. [13] A. Holzinger, A. Nischelwitzer, & M. Meisenberger, Mobile phones as a challenge for m-learning: Examples for mobile interactive learning objects (MILOs), Proc. of the 3rd Int. Conf. on Pervasive Computing and Communications Workshops (PerCom 2005 Workshops), IEEE, 2005.
  14. [14] J. Attewell, Mobile technologies and learning: A technology update and m-learning project summary, Technology Enhanced Learning Research Centre, ISBN 1-84572-140-3.
  15. [15] C.O. Shea, D. Lillis, S.O. Shea, & P. Collins, The application of e-learning and m-learning technology in the context of life long learning in Irish higher education, in P. Kommers & G. Richards (Eds.), Proc. of ED-MEDIA 2005 (Chesapeake, VA: AACE, 2005), 568–572.
  16. [16] A. Avizienis, J. Laprie, B. Randell, & C. Landwehr, Basic concepts and taxonomy of dependable and secure computing, IEEE Trans. of Dependable and Secure Computing, 1, 2004, 11–33. doi:10.1109/TDSC.2004.2
  17. [17] K. Ghosh & T. Swaminatha, Software security and privacy risks in mobile e-commerce, ACM Communications, 44(2), 2001, 51–57. doi:10.1145/359205.359227
  18. [18] R.E. Mahan, Security in wireless networks, Sans Institute. http://rr.sans.org/wireless/wireless_net3.php (last visited August 1, 2003).
  19. [19] C. Eckert, Mobile devices in ebusiness — new opportunities and new risks in Proc. Fachtagung Sicherheit in Informations systemen (SIS), Zurich, Switzerland, 2000.
  20. [20] N. Borisov, I. Goldberg, & N. Wagner, Intercepting mobile communications: The insecurity of 802.11. http://www.isaac.cs.berkely.edu/isaac/mobicom.pdf (last visited August 1, 2003).
  21. [21] H. Berghel, Wireless infidelity I: War driving, Communications of the ACM, 47, 2004, 21–26.
  22. [22] M. Howard & S. Lipner, The security development lifecycle (Microsoft Press, 2006).
  23. [23] J. Clark & W. Davis, A human capital perspective on criminal careers, Journal of Applied Business Research, 11, 1995, 58–64.
  24. [24] O. Jorns, S. Bessler, & R. Pailer, An efficient mechanism to ensure location privacy in telecom service applications, NetCon 2004, Mallorca, Spain, November 2004.
  25. [25] O. Jorns & S. Bessler, PRIVES: A privacy enhanced location based scheme, Workshop Proc. 6th Int. Conf. on Human Computer Interaction with Mobile Devices and Services, Glasgow, Scotland, September 13–16, 2004.
  26. [26] O. Jorns, O. Jung, J. Groß, & S. Bessler, A privacy enhancement mechanism for location based service architectures using transaction pseudonyms, 2nd Int. Conf. on Trust, Privacy, and Security in Digital Business, Copenhagen, Denmark (TrustBus’ 05), August 22–26, 2005.
  27. [27] S. Bessler & O. Jorns, A privacy enhanced service architecture for mobile users, IEEE Int. Workshop on Pervasive Computing and Communication Security, Kauai Island, Hawaii, USA, 2005.
  28. [28] D. Chadwick, M.S. Olivier, P. Samarati, E. Sharpston, B. Thuraishingham, E. Gudes, & S. Shenoi (Eds.), Privacy and civil liberties research directions in database and application security (Cambridge, UK: Kluwer, 2003), 331–346.
  29. [29] RFC 2239, Security Mechanism Agreement for the SessionInitiation Protocol (SIP), 2003. http://www.ietf.org/rfc/rfc3329.txt
  30. [30] T. Berson, Skype Security Evaluation, http://www.skype.com/security/files/2005-031%20security%20evaluation.pdf
  31. [31] B. Ford, P. Srisuresh, & D. Kegel, Peer-to-Peer Communication Across Network Address Translators, UseNix 2005, http://www.usenix.org/publications/library/proceedings/usenix05/tech/general/full_papers/ford/ford_html/
  32. [32] K. Borcea, H. Donker, E. Franz, A. Pfitzmann, & H. Wahrig, Privacy-aware eLearning: Why and how proceedings of EDMEDIA 2005, 2005, 1466–1473.
  33. [33] M. Bishop, Computer security: Art and science (Boston, MA: Addison-Wesley-Longman, 2002).

Important Links:

Go Back