Educating on Mobile Computing and Security Practices

Authors

  • Yusfrizal Yusfrizal Politeknik Gihon
  • Heri Gunawan Gihon Polytechnic
  • Yahya Tanjung Potensi Utama University

DOI:

https://doi.org/10.61306/jitcse.v1i3.153

Keywords:

mobile computing, security, mobile application

Abstract

With the increasing popularity of mobile devices, it has become essential to educate college and university students about mobile computing and security. This paper introduces eight course modules on mobile computing and security that we designed to integrate seamlessly into a computer science curriculum. These modules were showcased during a faculty workshop, where feedback was gathered through survey questionnaires and participants' reflective narratives. The evaluation results from the workshop are analyzed and discussed in this paper. These modules are adaptable for educators teaching mobile application development, cyber security, or other related subjects.

References

Bryson, J. R., & Andres, L. (2020). Covid-19 and rapid adoption and improvisation of online teaching: curating resources for extensive versus intensive online learning experiences. Journal of Geography in Higher Education, 44(4), 608–623.

Damaraju, A. (2021). Mobile Cybersecurity Threats and Countermeasures: A Modern Approach. International Journal of Advanced Engineering Technologies and Innovations, 1(3), 17–34.

Dejene, W. (2019). The practice of modularized curriculum in higher education institution: Active learning and continuous assessment in focus. Cogent Education, 6(1), Research-Article.

Education, I. (2021). Susan H. Rodger Professor of the Practice.

Fu, J., Wang, Y., Zhou, Y., & Wang, X. (2022). How resource utilization influences UI responsiveness of Android software. Information and Software Technology, 141, 106728.

Hajare, R., Hodage, R., Wangwad, O., Mali, Y., & Bagwan, F. (2021). Data security in cloud. International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), 8(3), 240–245.

Joshi, B., & Joshi, B. (2019). jQuery. Beginning Database Programming Using ASP. NET Core 3: With MVC, Razor Pages, Web API, JQuery, Angular, SQL Server, and NoSQL, 227–278.

Lalande, J.-F., Viet Triem Tong, V., Graux, P., Hiet, G., Mazurczyk, W., Chaoui, H., & Berthomé, P. (2019). Teaching android mobile security. Proceedings of the 50th ACM Technical Symposium on Computer Science Education, 232–238.

Masoodi, M., Moonsamy, V., & van den Broek, F. (2020). Cryptographic (in) security in android apps.

Oh, S. W., Kim, K.-K., Kim, S. S., Park, S. K., & Park, S. (2022). Effect of an integrative mobile health intervention in patients with hypertension and diabetes: crossover study. JMIR MHealth and UHealth, 10(1), e27192.

Parast, F. K., Sindhav, C., Nikam, S., Yekta, H. I., Kent, K. B., & Hakak, S. (2022). Cloud computing security: A survey of service-based models. Computers & Security, 114, 102580.

Ratchford, M., El-Gayar, O., Noteboom, C., & Wang, Y. (2022). BYOD security issues: A systematic literature review. Information Security Journal: A Global Perspective, 31(3), 253–273.

Reddy, J. K., & Singaravelu, G. (2021). Augmented reality (AR) in education-A New Prospect. The Strad, 8(6).

Tabrizchi, H., & Kuchaki Rafsanjani, M. (2020). A survey on security challenges in cloud computing: issues, threats, and solutions. The Journal of Supercomputing, 76(12), 9493–9532.

Tahirkheli, A. I., Shiraz, M., Hayat, B., Idrees, M., Sajid, A., Ullah, R., Ayub, N., & Kim, K.-I. (2021). A survey on modern cloud computing security over smart city networks: Threats, vulnerabilities, consequences, countermeasures, and challenges. Electronics, 10(15), 1811.

Thomas, C. G., & Devi, J. (2021). A study and overview of the mobile app development industry. International Journal of Applied Engineering and Management Letters (IJAEML), 5(1), 115–130.

Xu, Y., Zhou, M., Gao, Q., Zhang, S., & Wu, Z. (2024). SWAT4J: Generating System Call Allowlist for Java Container Attack Surface Reduction. 2024 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), 929–939.

Yasin, H. N. S. (2021). Graphical User Interface Test Case Generation for Android Apps Using Q-Learning. University of Malaya (Malaysia).

Downloads

Published

2024-10-30

How to Cite

Yusfrizal, Y., Gunawan, H., & Tanjung, Y. (2024). Educating on Mobile Computing and Security Practices. Journal of Information Technology, Computer Science and Electrical Engineering, 1(3), 537–543. https://doi.org/10.61306/jitcse.v1i3.153