Please use this identifier to cite or link to this item:
http://hdl.handle.net/123456789/1423
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Nik Zulkarnaen Khidzir | en_US |
dc.contributor.author | SHEKH ABDULLAH AL-MUSA AHMED | en_US |
dc.contributor.author | Tan, Tse Guan | en_US |
dc.date.accessioned | 2021-05-02T23:31:09Z | - |
dc.date.available | 2021-05-02T23:31:09Z | - |
dc.date.issued | 2020-03-31 | - |
dc.identifier.issn | 2289-4527 | - |
dc.identifier.other | http://journal.umk.edu.my/teniat/article/view/291 | - |
dc.identifier.uri | http://hdl.handle.net/123456789/1423 | - |
dc.description | Mycite | en_US |
dc.description.abstract | Mobile security, or more specifically mobile device security, has become increasingly important in mobile computing for digital literacy. Digital literacy is the set of competencies required for full participation in knowledge of society. It includes knowledge, skills, and behaviors involving the effective use of digital devices such as smartphones, tablets, and laptops for purposes of communication, expression, collaboration and advocacy. Of particular concern is the security of higher learning institution is now stored on smartphones. Along with this expansion came a number of security issues to affect mobile devices. A chance to have a tiny and powerful device that is Internet linked allows communication from anywhere in the higher learning institution. In higher learning institution, those who have attached their personal smartphones to institutional network would have found out the easy way of doing so. Specifically, there have been a handful of cases where learners who attached their own personal devices to a higher learning institutional network. However, a system administrator sent out a remote command to the device and instructed it to store itself of all data to keep it from falling in the wrong hands. Hence in Android device having heard the term of rooting the device. Concisely, this refers to undertaking a process of gaining root access to a device. Typically, this involves running an application or script that grants root access to the user. Once access is granted, the user in the higher learning institution can do pretty much whatever the institution want on the system without restriction. However, one of the downsides of this process is that the device is now exposed to greater danger from external threats as well. Moreover, this article focuses on mobile device security issues in digital literacy in higher learning institution. It is about developing institutional learners to critical and creative abilities when it comes to mass media, popular culture and digital media. Since digital media is using smartphone for store information and article also referring how to maintain security of these smartphone data. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Penerbit UMK | en_US |
dc.relation.ispartof | International Journal of Creative Future and Heritage (TENIAT) | en_US |
dc.subject | Encryption | en_US |
dc.subject | Remoteness | en_US |
dc.subject | Digital Affixing Signature | en_US |
dc.subject | Trojan Horse Attacks | en_US |
dc.subject | Malware | en_US |
dc.subject | Social Engineering Attacks | en_US |
dc.subject | Digital Literacy | en_US |
dc.title | Mobile Device Security Issues In Digital Literacy For Higher Learning Institution | en_US |
dc.type | National | en_US |
dc.description.page | 119-129 | en_US |
dc.description.researcharea | Cybersecurity | en_US |
dc.description.researcharea | Social Engineering | en_US |
dc.description.researcharea | Mobile Technology | en_US |
dc.volume | 8 (1) | en_US |
dc.description.type | Article | en_US |
item.languageiso639-1 | en | - |
item.openairetype | National | - |
item.grantfulltext | open | - |
item.fulltext | With Fulltext | - |
crisitem.author.dept | Universiti Malaysia Kelantan | - |
Appears in Collections: | Journal Indexed MyCite - FTKW |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
TENIAT Vol.8, Issue No.1 119-129.pdf | Indexing MyCite / Universiti Journal (UMK) | 307.44 kB | Adobe PDF | View/Open |
Google ScholarTM
Check
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.