Encyclopedia of Education and Information Technologies

Living Edition
| Editors: Arthur Tatnall

Android-Based Mobile Apps for Hands-on Education

  • Zouheir TrabelsiEmail author
Living reference work entry
DOI: https://doi.org/10.1007/978-3-319-60013-0_243-1

Synonyms

Introduction

As mobile devices grow increasingly in popularity within the student community, novel educational activities and tools, as well as learning approaches, can be developed to get benefit from this prevalence of mobile devices (e.g., mobility and closeness to students’ daily lives). Particularly, information security education should reflect the current trend in computing platforms away from the desktop and toward mobile devices.

Nowadays, the need to use a practice- and application-oriented approach in information security education is paramount (Chen and Lin 2007). Hands-on learning through lab exercises plays a key role in information security education. In fact, a security education curriculum that does not give the students the opportunity to experiment in practice with security techniques cannot prepare them to be able to protect efficiently the...

This is a preview of subscription content, log in to check access.

References

  1. Andrus J, Nieh J (2012) Teaching operating systems using android. In: Proceedings of the 43rd ACM technical symposium on computer science education (SIGCSE 2012), pp 613–618, Raleigh, NC, USA, February 29 – March 03, 2012Google Scholar
  2. Bhattacharya P, Yang L, Guo M, Qian K, Yang M (2014) Learning mobile security with Labware. IEEE Secur Priv 12(1):69–72CrossRefGoogle Scholar
  3. Caltagirone S, Ortman P, Melton S, Manz D, King K, Oman P (2006) Design and implementation of a multi-use attack-defend computer security lab. In: Proceedings of the 39th annual Hawaii international conference on system sciences – HICSS, USA, 2006Google Scholar
  4. Chen L-C, Lin C (2007) Combining theory with practice in information security education. In: Proceedings of the 11th colloquium for information systems security education, pp 28–35, Boston, 4–7 June 2007Google Scholar
  5. Du W, Jayaraman K, Gaubatz N (2010) Enhancing security education with hands-on laboratory exercises. In: Proceedings of the fifth annual symposium on information assurance (ASIA ’10), June 16–17, 2010, AlbanyGoogle Scholar
  6. EDUCAUSE (2014) The future of mobile computing, 04/2011. http://net.educause.edu/ir/library/pdf/ESPNT1b.pdf. Accessed Nov 2014
  7. Guo M, Bhattacharya P, Yang M, Qian K, Yang L (2013) Learning mobile security with android security Labware. In: Proceedings of the 44th ACM technical symposium on computer science education (SIGCSE 2013), pp 675–680, Denver, CO, USA, March 06 – 09, 2013Google Scholar
  8. Hill JM, Carver CA Jr, Humphries JW, Pooch UW (2001) Using an isolated network laboratory to teach advanced networks and security. In: Proceedings of the 32nd SIGCSE technical symposium on computer science education. ACM Press, Charlotte, pp 36–40CrossRefGoogle Scholar
  9. Ibrahim W, Atif Y, Shuaib K, Sampson D (2015) A web-based course assessment tool with direct mapping to student outcomes. J Educ Technol Soc 18(2):46–59Google Scholar
  10. Levine A, Kossuth J (2011) The future of mobile computing. Mobile computing spotlight series, Part of the mobile computing 5-day EDUCAUSE Sprint, Apr 25, 2011, Louisville, USAGoogle Scholar
  11. Loveland S (2011) Human computer interaction that reaches beyond desktop applications. In: Proceedings of the 42nd ACM technical symposium computer science education (SIGCSE 11), pp 595–600, Dallas, 9–12 March 2011Google Scholar
  12. Northcutt S, Zeltser L, Winters S, Kent K, Ritchey RW (2005) Inside network perimeter security, 2nd edn. Sams Publishing, IndianapolisGoogle Scholar
  13. Sanderson DB (2009) Revising an assessment plan to conform to the new ABET-CAC guidelines. In: Proceedings of the 40th ACM technical symposium on computer science education (SIGCSE’09), pp 352–356, ChattanoogaGoogle Scholar
  14. Trabelsi Z (2011) Hands-on lab exercises implementation of DoS and MiM attacks using ARP cache poisoning. In: Proceedings of the information security curriculum development conference, pp 74–83. Kennesaw, GA, USA, September 30 – October 01, 2011Google Scholar
  15. Trabelsi Z, Alketbi L (2013) Using network Packet Generators and Snort Rules for teaching Denial of service attacks. In: Proceedings of the 18th ACM conference on innovation and technology in computer science education, ITiCSE’13, pp 285–290. Canterbury, United Kingdom, July 01–03, 2013Google Scholar
  16. Trabelsi Z, Mustafa U (2014) A web-based firewall simulator tool for information security education. In: Proceedings of the 16th Australasian computing education conference (ACE2014). CRPIT, vol 148, pp 83–90. AucklandGoogle Scholar
  17. Trabelsi Z, Hayawi K, Al Braiki A, Mathew S (2013) Network attacks and defenses: a hands-on approach. CRC Press, Boca RatonGoogle Scholar
  18. Vigna G (2003a) Teaching network security through live exercises, In: Irvine CE, Armstrong HL (eds) World conference on information security education, volume 253 of IFIP conference proceedings, pp 3–18. Kluwer, 2003, Monterey California, USA, June 26–28, 2003CrossRefGoogle Scholar
  19. Vigna G (2003b) Teaching hands-on network security: testbeds and live exercises. J Inf Warfare 2(3):8–24, 2003MathSciNetGoogle Scholar
  20. Whitman ME, Mattord HJ, Green AW (2014) Hands-on information security lab manual, 4th edn. Cengage Learning, SingaporeGoogle Scholar
  21. Yuan D, Zhong J (2008) A lab implementation of SYN flood attack and defense. In: Proceedings of the 9th ACM SIGITE conference on information technology education (SIGITE’08), Cincinnati, Ohio, USA, pp 57–58Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.ISS DepartmentCollege of Information Technology, UAE UniversityAl AinUAE

Section editors and affiliations

  • Bill Davey
    • 1
  1. 1.RMIT UniversityMelbourneAustralia