Teaching mobile computing and mobile security

被引:0
|
作者
Yuan, Xiaohong [1 ]
Williams, Kenneth [1 ]
Bryant, Kelvin [1 ]
Xu, Jinsheng [1 ]
Esterline, Albert [1 ]
McCrickard, Scott [2 ]
Liu, Anyi [3 ]
Hardnett, Charles [4 ]
Mohanarajah, Selvarajah [5 ]
Lineberry, Litany H. [6 ]
Rutledge, Rachel [7 ]
机构
[1] North Carolina Agr & Tech State Univ, Dept Comp Sci, Greensboro, NC 27401 USA
[2] Virginia Tech, Dept Comp Sci, Blacksburg, VA USA
[3] Indiana Univ Purdue Univ, Dept Comp Sci, Ft Wayne, IN USA
[4] Gwirinett Tech Coll, Dept Comp Sci, Alpharetta, GA USA
[5] Claflin Univ Orangeburg, Dept Comp Sci, Orangeburg, NY USA
[6] Voorhees Coll, Dept Comp Sci, Denmark, SC USA
[7] Charleston Cty Sch Dist, Dept Comp Sci, Charleston, SC USA
基金
美国国家科学基金会;
关键词
!text type='Java']Java[!/text; Android; Education; Course;
D O I
暂无
中图分类号
G40 [教育学];
学科分类号
040101 ; 120403 ;
摘要
Due to the popularity of mobile devices, it is important to teach mobile computing and security to students in colleges and universities. This paper describes eight course modules on mobile computing and security we developed that could be integrated into a computer science curriculum. These course modules were presented at a faculty workshop. Workshop evaluation includes a survey questionnaire and reflective narratives from participants. The workshop evaluation results are discussed in this paper. The course modules can be adopted by instructors teaching mobile application development, cyber security or other related courses.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Survey on Mobile Computing Security
    Gangula, Arunkumar
    Ansari, Saad
    Gondhalekar, Mayur
    [J]. UKSIM-AMSS SEVENTH EUROPEAN MODELLING SYMPOSIUM ON COMPUTER MODELLING AND SIMULATION (EMS 2013), 2013, : 536 - 542
  • [2] Security in mobile computing environments
    Veijalainen, J
    Visa, A
    [J]. MOBILE NETWORKS & APPLICATIONS, 2003, 8 (02): : 111 - 112
  • [3] Biometric security for mobile computing
    Hu, Jiankun
    Bhagavatula, Vijayakumar
    Bennamoun, Mohammed
    Toh, Kar-Ann
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (05) : 483 - 486
  • [4] Mobile Security and Trusted Computing
    Mitchell, Chris
    [J]. IT-INFORMATION TECHNOLOGY, 2006, 48 (06): : 321 - 326
  • [5] Teaching Android Mobile Security
    Lalande, Jean-Francois
    Tong, Valerie Viet Triem
    Graux, Pierre
    Hiet, Guillaume
    Mazurczyk, Wojciech
    Chaoui, Habiba
    Berthome, Pascal
    [J]. SIGCSE '19: PROCEEDINGS OF THE 50TH ACM TECHNICAL SYMPOSIUM ON COMPUTER SCIENCE EDUCATION, 2019, : 232 - 238
  • [6] Promoting Mobile Computing and Security Learning Using Mobile Devices
    You, Wanqing
    Qian, Kai
    Lo, Dan Chia-Tien
    Bhattacharya, Prabir
    Chen, Wei
    Rogers, Tamara
    Chern, Johng-Chern
    Yao, Junfeng
    [J]. 2015 5th IEEE Integrated STEM Education Conference (ISEC), 2015, : 205 - 209
  • [7] Mobile cloud computing: Architecture and Security
    Wang, Suzhen
    Du, Zhijuan
    [J]. MECHATRONICS AND INDUSTRIAL INFORMATICS, PTS 1-4, 2013, 321-324 : 2274 - 2281
  • [8] Mobile Cloud Computing: Security Analysis
    Gamlo, Amina H.
    Zhang, Ning
    Bamasag, Omaimah
    [J]. 2017 5TH IEEE INTERNATIONAL CONFERENCE ON MOBILE CLOUD COMPUTING, SERVICES, AND ENGINEERING (MOBILECLOUD), 2017, : 191 - 198
  • [9] A framework for resource security in mobile computing
    Yu, WJ
    Mok, AK
    [J]. PARALLEL AND DISTRIBUTED COMPUTING SYSTEMS, 2002, : 312 - 317
  • [10] Security and Privacy in Mobile Cloud Computing
    Suo, Hui
    Liu, Zhuohua
    Wan, Jiafu
    Zhou, Keliang
    [J]. 2013 9TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2013, : 655 - 659