Please use this identifier to cite or link to this item: http://hdl.handle.net/123456789/1423
DC FieldValueLanguage
dc.contributor.authorNik Zulkarnaen Khidziren_US
dc.contributor.authorSHEKH ABDULLAH AL-MUSA AHMEDen_US
dc.contributor.authorTan, Tse Guanen_US
dc.date.accessioned2021-05-02T23:31:09Z-
dc.date.available2021-05-02T23:31:09Z-
dc.date.issued2020-03-31-
dc.identifier.issn2289-4527-
dc.identifier.otherhttp://journal.umk.edu.my/teniat/article/view/291-
dc.identifier.urihttp://hdl.handle.net/123456789/1423-
dc.descriptionMyciteen_US
dc.description.abstractMobile security, or more specifically mobile device security, has become increasingly important in mobile computing for digital literacy. Digital literacy is the set of competencies required for full participation in knowledge of society. It includes knowledge, skills, and behaviors involving the effective use of digital devices such as smartphones, tablets, and laptops for purposes of communication, expression, collaboration and advocacy. Of particular concern is the security of higher learning institution is now stored on smartphones. Along with this expansion came a number of security issues to affect mobile devices. A chance to have a tiny and powerful device that is Internet linked allows communication from anywhere in the higher learning institution. In higher learning institution, those who have attached their personal smartphones to institutional network would have found out the easy way of doing so. Specifically, there have been a handful of cases where learners who attached their own personal devices to a higher learning institutional network. However, a system administrator sent out a remote command to the device and instructed it to store itself of all data to keep it from falling in the wrong hands. Hence in Android device having heard the term of rooting the device. Concisely, this refers to undertaking a process of gaining root access to a device. Typically, this involves running an application or script that grants root access to the user. Once access is granted, the user in the higher learning institution can do pretty much whatever the institution want on the system without restriction. However, one of the downsides of this process is that the device is now exposed to greater danger from external threats as well. Moreover, this article focuses on mobile device security issues in digital literacy in higher learning institution. It is about developing institutional learners to critical and creative abilities when it comes to mass media, popular culture and digital media. Since digital media is using smartphone for store information and article also referring how to maintain security of these smartphone data.en_US
dc.language.isoenen_US
dc.publisherPenerbit UMKen_US
dc.relation.ispartofInternational Journal of Creative Future and Heritage (TENIAT)en_US
dc.subjectEncryptionen_US
dc.subjectRemotenessen_US
dc.subjectDigital Affixing Signatureen_US
dc.subjectTrojan Horse Attacksen_US
dc.subjectMalwareen_US
dc.subjectSocial Engineering Attacksen_US
dc.subjectDigital Literacyen_US
dc.titleMobile Device Security Issues In Digital Literacy For Higher Learning Institutionen_US
dc.typeNationalen_US
dc.description.page119-129en_US
dc.description.researchareaCybersecurityen_US
dc.description.researchareaSocial Engineeringen_US
dc.description.researchareaMobile Technologyen_US
dc.volume8 (1)en_US
dc.description.typeArticleen_US
item.languageiso639-1en-
item.openairetypeNational-
item.grantfulltextopen-
item.fulltextWith Fulltext-
crisitem.author.deptUniversiti Malaysia Kelantan-
Appears in Collections:Journal Indexed MyCite - FTKW
Files in This Item:
File Description SizeFormat
TENIAT Vol.8, Issue No.1 119-129.pdfIndexing MyCite / Universiti Journal (UMK)307.44 kBAdobe PDFView/Open
Show simple item record

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.