scholarly journals Security Issues in the Use of Mobile Educational Apps: A Review

Author(s):  
Emmanuel O.C. Mkpojiogu ◽  
Azham Hussain ◽  
Monday Onah Agbudu

<p>Although, there are several literatures pertaining to the security issues in the use of mobile apps, these literatures do not sufficiently address issues about the security challenges in the use of mobile educational app. Hence, this work attempts to review the available literatures with the aim of capturing the security issues in the use of mobile educational apps. To achieve the stated research goal, the study applied systematic literature review methodology. Sixty four (64) papers in the area of security issues in the use of mobile educational apps were downloaded. Out of these papers, twenty one (21) most relevant studies were selected for review in order to extract the appropriate information needed for the analysis. The results from the review reveals the scarcity of appropriate literatures on security issues in the use of mobile educational apps and that these issues are a thing of concern, and needed to be looked into in this ever growing world of technologies. However, most of the studies, taken single handedly reviewed lack of comprehensive framework to demonstrate the security challenges in the use of mobile educational apps. Thus, the results from this paper provide additional knowledge to the users of mobile apps as a whole; students in their usage of mobile educational apps and the research community on the current security challenges in the use of mobile educational apps.</p>

Author(s):  
Melva Ratchford ◽  
Omar El-Gayar ◽  
Cherie Noteboom ◽  
Yong Wang

2021 ◽  
pp. 088541222199424
Author(s):  
Mauro Francini ◽  
Lucia Chieffallo ◽  
Annunziata Palermo ◽  
Maria Francesca Viapiana

This work aims to reorganize theoretical and empirical research on smart mobility through the systematic literature review approach. The research goal is to reach an extended and shared definition of smart mobility using the cluster analysis. The article provides a summary of the state of the art that can have broader impacts in determining new angles for approaching research. In particular, the results will be a reference for future quantitative developments for the authors who are working on the construction of a territorial measurement model of the smartness degree, helping them in identifying performance indicators consistent with the definition proposed.


2021 ◽  
Vol 20 (2) ◽  
pp. 192-215
Author(s):  
Amarjeet Singh ◽  

Sharing economy is a system which functions successfully provided that technological and social subsystems complement each other forming an indivisibly combined cohesive structure. The premise of balancing social and technological aspects is proposed in the socio-technological theory. Social issues call for social innovation to fulfil the needs and requirements of the society as well as individual citizens. The goal of this paper is to fill the gap in the extant literature by proposing a comprehensive framework of sharing economy based on the socio-technological theory. This study carried out a systematic literature review of works on sharing economy and socio-technological theory in order to develop a conceptual framework. There were identified different social motives associated with each of the subsystems; interplay between them was established. This study contributes to the increasing research by presenting a holistic view of sharing economy through the theoretical lens of socio-technology keeping society as well as consumer needs and requirements at its focal point.


Kybernetes ◽  
2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Zhihao Yu ◽  
Liang Song ◽  
Linhua Jiang ◽  
Omid Khold Sharafi

Purpose Security is the most important issue in Internet of Things (IoT)-based smart cities and blockchain (BC). So, the present paper aims to detect and organize the literature regarding security in the IoT-based smart cities and BC context. It also proposes an agenda for future research. Therefore, the authors did a statistical review of security in IoT and BC in smart cities. The present investigation aims to determine the principal challenges and disturbances in IoT because of the BC adoption, the central BC applications in IoT-based smart cities and the BC future in IoT-based smart cities. Design/methodology/approach IoT) has a notable influence on modernizing and transforming the society and industry for knowledge digitizing. Therefore, it may be perceived and operated in real time. The IoT is undergoing exponential development in industry and investigation. Still, it contains some security and privacy susceptibilities. Naturally, the research community pays attention to the security and privacy of the IoT. Also, the academic community has put a significant focus on BC as a new security project. In the present paper, the significant mechanisms and investigations in BC ground have been checked out systematically because of the significance of security in the IoT and BC in smart cities. Electronic databases were used to search for keywords. Totally, based on different filters, 131 papers have been gained, and 17 related articles have been obtained and analyzed. The security mechanisms of BC in IoT-based smart cities have been ranked into three main categories as follows, smart health care, smart home and smart agriculture. Findings The findings showed that BC’s distinctive technical aspects might impressively find a solution for privacy and security problems encountering the IoT-based smart cities development. They also supply distributed storage, transparency, trust and other IoT support to form a valid, impressive and secure distributed IoT network and provide a beneficial guarantee for IoT-based smart city users’ security and privacy. Research limitations/implications The present investigation aims to be comprehensive, but some restrictions were also observed. Owing to the use of some filters for selecting the original papers, some complete works may be excluded. Besides, inspecting the total investigations on the security topic in BC and the IoT-based smart cities is infeasible. Albeit, the authors attempt to introduce a complete inspection of the security challenges in BC and the IoT-based smart cities. BC includes significant progress and innovation in the IoT-based smart cities’ security domain as new technology. Still, it contains some deficiencies as well. Investigators actively encounter the challenges and bring up persistent innovation and inspection of related technologies in the vision of the issues available in diverse application scenarios. Practical implications The use of BC technology in finding a solution for the security issues of the IoT-based smart cities is a research hotspot. There is numerable literature with data and theoretical support despite the suggestion of numerous relevant opinions. Therefore, this paper offers insights into how findings may guide practitioners and researchers in developing appropriate security systems dependent upon the features of IoT-based smart city systems and BC. This paper may also stimulate further investigation on the challenge of security in BC and IoT-based smart cities. The outcomes will be of great value for scholars and may supply sights into future investigation grounds in the present field. Originality/value As the authors state according to their knowledge, it is the first work using security challenges on BC and IoT-based smart cities. The literature review shows that few papers discuss how solving security issues in the IoT-based smart cities can benefit from the BC. The investigation suggests a literature review on the topic, recommending some thoughts on using security tools in the IoT-based smart cities. The present investigation helps organizations plan to integrate IoT and BC to detect the areas to focus. It also assists in better resource planning for the successful execution of smart technologies in their supply chains.


2015 ◽  
Vol 77 (33) ◽  
Author(s):  
Noorrezam Yusop ◽  
Massila Kamalrudin ◽  
Safiah Sidek

Security requirements are important to increase the confidence of mobile users to perform many online transactions, such as banking, booking and payment via mobile devices.  Objective: This study aims to identify the attributes of security requirements for mobile applications (mobile apps) and the existing tools, techniques and approaches used in security requirements. The gaps and limitations for each approach are also discussed. Method: We conducted a systematic literature review to identify and analyse related literatures on validation of security requirements for mobile apps. We identified 68 studies that provide relevant information on security requirements for mobile apps. Result:  There were two main findings: (1) the attributes of security requirements that are relevant for mobile apps are authentication, confidentiality, authorization, access control   and integrity; (2) Mobile security testing methods for validating security requirements of mobile apps were also identified. Finally, the gaps and limitation of each approach requirements in relation to mobile apps were also discussed. Conclusions: The main challenge of security requirements is to identify the most appropriate security attributes and security testing technique to validate security requirements for mobile apps. As such, requirements engineers should consider the challenges posed by security requirements such as testing when validating and developing security requirements for mobile apps testing technique. Further, correct security requirements for security attributes of security requirements need to be considered at the early stage of development of the mobile apps development.  


2014 ◽  
Vol 46 (4) ◽  
pp. S187
Author(s):  
Kristen DiFilippo ◽  
K. Chapman-Novakofski ◽  
J. Andrade ◽  
W.H. Huang

2015 ◽  
Vol 21 (5) ◽  
pp. 243-253 ◽  
Author(s):  
Kristen N DiFilippo ◽  
Wen-Hao Huang ◽  
Juan E Andrade ◽  
Karen M Chapman-Novakofski

Sign in / Sign up

Export Citation Format

Share Document