Download presentation
Presentation is loading. Please wait.
1
Importance of Mobile learning and privacy of users
ABDUL RAZAQUE University of Bridgeport
2
Agenda of Speech Connection of people around world
Big Picture of E-Learning Why Need of Mobile learning? Types of mobile learning Journey of learning General Mobile learning Layered concept Privacy of m-learning Conclusion Resources for Mobile learning References
3
What we think…? “Technology can become the “wings” that will allow the educational world to fly farther and faster than ever before –if we will allow it.” Jenny Arledge.
4
How people are connected around the world
5
The subsets of flexible learning
BIG PICTURE OF M-LERANING The subsets of flexible learning Flexible Learning Distance Learning E-learning Online Learning M-learning Paper-based Contact Learning (residential/face-to-face) (Brown, 2004)
6
Why Need of Mobile learning?
Mobile learning in education involves with joint intellectual efforts initiated by students or teachers.
7
Types of mobile learning
Individual Mobile Learning Peer-to-Peer or Peer-to-Instructor Mobile Learning Group Sharing Mobile Learning
8
Individual Mobile Learning
Original course work: usually in some combination of text, audio, and video components. May include reading e-books, listening to lectures, watching demonstrations, reviewing assignments. Skill practice: writing drafts of papers, recording oral practicing of everything from vocabulary practices to speeches. Research: using Internet access to find source content. Content capture: taking notes, recording audio/video contents.
9
Peer-to-Instructor Mobile Learning
Posting questions or work products on shared websites, sending files to peers or instructors. Sending s, texts to peers or instructors to get fast answers to questions, checking on assignments, setting up meetings.
10
Group Sharing Mobile Learning/ Mobile Collaborative learning
Using social networking sites/shared websites to collaborate with others anywhere in the world.
11
Mobile learning Scenario
12
Journey of learning
13
General Mobile learning Layered concept
14
Core E-Learning System (Security and privacy on Layer 1)
15
Relationships between Layer 1 and Layer 2-5
16
Intra E-Learning System (Security and privacy on Layer 2)
17
Extra E-Learning System (Security and privacy on Layer 3)
It supports external partners, it needs a careful approach and robust facility to implement security and privacy policies here. Normally we need a robust firewall system to protect the internal system. A sound privacy technology is also needed to protect the privacy of e-learning systems.
18
E-Learning System extension( Security and privacy on Layer 4)
E-learning system extension is formed by public network infrastructures, like the Internet, PSTN, etc. As Layer 4 is operated by the common carriers, e-learning systems do not have much more influence in the regard of security and privacy. Educational institutes normally have a contract with the service provider. In the contract, the service providers supply The security and privacy promises based on the relevant international law and conventions. Thus there is no need for any further discussion on security and privacy here. I will talk about Rogue DHCP server.
19
Rogue Server One of the major threats for privacy of data is intervention of rogue DHCP server. Malware and Trojan install the rogue DHCP server and pollutes the network.
20
Attack of DHCP Rogue server
21
DHCP Rogue temporary solution
GUI tool [Mickro Tik ] Subhash Badri Time-tested DHCP Sentry Dhcploc.exe OR DHCP-probe
22
Portable devices (Security and privacy on Layer 5)
As Layer 5 provides the universal connection for portable device users to access e-learning systems, it is very import to understand the issues on security and privacy. The security in this layer focuses on access control which is decided by the security policy of layer 1. It needs a light-weighted access control technique for these portable devices, due to the limitation of computing capacity and storage.
23
Layer-5: Procedure for accessing control of portable devices
24
Conclusion of Speech This speech covers mobile learning and type of mobile learning. A generalized architecture of e-learning systems is prescribed to illustrate security and privacy issues. We thoroughly discussed the security and privacy for e-learning systems from layer 1 to layer 5, especially layer 1 and layer 5. Speech does not try to address too much technical details for m-learning systems on the security and privacy. Instead the speech focuses on the analysis of the influences from policy and available technology.
25
Resources for Mobile learning
University Leaders: ACU, CTU, Open University, International Academy of Design and Technology. Wireless Mobile Communication Laboratory University of Bridgeport: wimcl.com [Abdul Razaque & Khaled Elleithy] Experts: Judy Brown & David Metcalf (UCF) Organizations: LearningTown (mobile learning group) The eLearning Guild International Association of Mobile Learning mLearning Conferences: conference Blog: handheldlearning
26
Books & Journals for Mobile learning
Instructional Design for M-Learning – David Metcalf Mobile Learning: A Handbook for Educators and Trainers – Kukulska & Traxler Mobile Learning: Transforming the Delivery of Education and Training (eBook of studies from AU Press) – Editor: Mohamed Ally Mobile Learning: on-line journal
27
References [1]. Abdul Razaque , Khaled Elleithy, Nyembo salama, " Fostering of innovative usability testing to develop mobile application for mobile collaborative learning (MCL) ",IPCC-2011, October September, 2011 Cincinnati, USA.. [2].Gene Chipman, Allison Druin, Dianner Beer, Jerry Alan Fails, Mona Leigh Guha and Sanate Simms, "A case study of Tangible Flags: A collaborative technology to enhance field trips", University of Maryland, Human computer International Lab college, MD, USA. [3]. Jooung-Souck Sung, "Application Protocol Design for Collaborative Learning", International Journal of u-and e-service, science and technology Vol.2, No.4, December, 2009. [4].Levent Gorgu, Gregory M.P. O'Hare, Michael J.O'Grady,"Towards Mobile Collaborative Exergaming",IEEE second international conference on Advances in Human-oriented and personalized mechanisms, Technologies, and services, 2009,pp [5]. Xiaoyong Su, B.S.Prabhu, Chi-Cheng Chu, Rajit Gadh, "midleware for multimedia mobile collaborative system", IEEE third annual wireless telecommunications symposium (WTS, 2004), May 14-15, 2004, Calpoly pomona, Clofornia, USA. [6].Abdul Razaque, Khaled Elleithy, Nyembo salama, "Architectured based Prototypes for Mobile Collaborative Learning to improve Pedagogical activities" Interactive collaborative learning (ICL), IEEE, September 21 – 23, 2011, in Piešťany, Slovakia. [7]. Valadimir Zanev, Rodney Clark,"Wirelss Course Management System", 43rd ACM Southeast Conference, March 18-20, 2005, Kennesaw,GA,USA, pp [8].Lahner F,Nosekabel H, " The Role of Mobile Devices in E-Learning First Experiences with a wirelss E-Learning Envrronment, Proceedings of the IEEE International Workshop on wirelss and mobile technologies in Educatio, August 29-30, 2002, Vaxjo, Sweeden. [9]. Mildard Marcelo, Perez Juan, Hope Ulrich, C-Notes,"Designing a Mobile and Wirelss Application to support Collaborative Knowledge Building, Proceedings of IEEE International Workshop on Wirelss and Mobile Technologies in Education, August 29-30,2002, Vaxjo, Sweden. [10]. Allison Druin, Benjamin B.Benderson, Alex Quinn,"Designing intergenerational mobile storytelling" IDC 2009-Workshops, 3-5 June, 2009, Como, Italy. [11].Sergio Martin, Ivica Boticki, George Jacobs, Manuel Castro and Juan Peire," Work in Progress - Support for Mobile Collaborative Learning Applications, 40th ASEE/IEEE Frontiers in Education Conference, 2010, Washington, DC.
28
Thank you very much
Similar presentations
© 2025 SlidePlayer.com Inc.
All rights reserved.