Introduction
As mobile devices grow increasingly in popularity within the student community, novel educational activities and tools, as well as learning approaches, can be developed to get benefit from this prevalence of mobile devices (e.g., mobility and closeness to students’ daily lives). Particularly, information security education should reflect the current trend in computing platforms away from the desktop and toward mobile devices.
Nowadays, the need to use a practice- and application-oriented approach in information security education is paramount (Chen and Lin 2007). Hands-on learning through lab exercises plays a key role in information security education. In fact, a security education curriculum that does not give the students the opportunity to experiment in practice with security techniques cannot prepare them to be able to protect efficiently the...
References
Andrus J, Nieh J (2012) Teaching operating systems using android. In: Proceedings of the 43rd ACM technical symposium on computer science education (SIGCSE 2012), pp 613–618, Raleigh, NC, USA, February 29 – March 03, 2012
Bhattacharya P, Yang L, Guo M, Qian K, Yang M (2014) Learning mobile security with Labware. IEEE Secur Priv 12(1):69–72
Caltagirone S, Ortman P, Melton S, Manz D, King K, Oman P (2006) Design and implementation of a multi-use attack-defend computer security lab. In: Proceedings of the 39th annual Hawaii international conference on system sciences – HICSS, USA, 2006
Chen L-C, Lin C (2007) Combining theory with practice in information security education. In: Proceedings of the 11th colloquium for information systems security education, pp 28–35, Boston, 4–7 June 2007
Du W, Jayaraman K, Gaubatz N (2010) Enhancing security education with hands-on laboratory exercises. In: Proceedings of the fifth annual symposium on information assurance (ASIA ’10), June 16–17, 2010, Albany
EDUCAUSE (2014) The future of mobile computing, 04/2011. http://net.educause.edu/ir/library/pdf/ESPNT1b.pdf. Accessed Nov 2014
Guo M, Bhattacharya P, Yang M, Qian K, Yang L (2013) Learning mobile security with android security Labware. In: Proceedings of the 44th ACM technical symposium on computer science education (SIGCSE 2013), pp 675–680, Denver, CO, USA, March 06 – 09, 2013
Hill JM, Carver CA Jr, Humphries JW, Pooch UW (2001) Using an isolated network laboratory to teach advanced networks and security. In: Proceedings of the 32nd SIGCSE technical symposium on computer science education. ACM Press, Charlotte, pp 36–40
Ibrahim W, Atif Y, Shuaib K, Sampson D (2015) A web-based course assessment tool with direct mapping to student outcomes. J Educ Technol Soc 18(2):46–59
Levine A, Kossuth J (2011) The future of mobile computing. Mobile computing spotlight series, Part of the mobile computing 5-day EDUCAUSE Sprint, Apr 25, 2011, Louisville, USA
Loveland S (2011) Human computer interaction that reaches beyond desktop applications. In: Proceedings of the 42nd ACM technical symposium computer science education (SIGCSE 11), pp 595–600, Dallas, 9–12 March 2011
Northcutt S, Zeltser L, Winters S, Kent K, Ritchey RW (2005) Inside network perimeter security, 2nd edn. Sams Publishing, Indianapolis
Sanderson DB (2009) Revising an assessment plan to conform to the new ABET-CAC guidelines. In: Proceedings of the 40th ACM technical symposium on computer science education (SIGCSE’09), pp 352–356, Chattanooga
Trabelsi Z (2011) Hands-on lab exercises implementation of DoS and MiM attacks using ARP cache poisoning. In: Proceedings of the information security curriculum development conference, pp 74–83. Kennesaw, GA, USA, September 30 – October 01, 2011
Trabelsi Z, Alketbi L (2013) Using network Packet Generators and Snort Rules for teaching Denial of service attacks. In: Proceedings of the 18th ACM conference on innovation and technology in computer science education, ITiCSE’13, pp 285–290. Canterbury, United Kingdom, July 01–03, 2013
Trabelsi Z, Mustafa U (2014) A web-based firewall simulator tool for information security education. In: Proceedings of the 16th Australasian computing education conference (ACE2014). CRPIT, vol 148, pp 83–90. Auckland
Trabelsi Z, Hayawi K, Al Braiki A, Mathew S (2013) Network attacks and defenses: a hands-on approach. CRC Press, Boca Raton
Vigna G (2003a) Teaching network security through live exercises, In: Irvine CE, Armstrong HL (eds) World conference on information security education, volume 253 of IFIP conference proceedings, pp 3–18. Kluwer, 2003, Monterey California, USA, June 26–28, 2003
Vigna G (2003b) Teaching hands-on network security: testbeds and live exercises. J Inf Warfare 2(3):8–24, 2003
Whitman ME, Mattord HJ, Green AW (2014) Hands-on information security lab manual, 4th edn. Cengage Learning, Singapore
Yuan D, Zhong J (2008) A lab implementation of SYN flood attack and defense. In: Proceedings of the 9th ACM SIGITE conference on information technology education (SIGITE’08), Cincinnati, Ohio, USA, pp 57–58
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Section Editor information
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this entry
Cite this entry
Trabelsi, Z. (2020). Android-Based Mobile Apps for Hands-on Education. In: Tatnall, A. (eds) Encyclopedia of Education and Information Technologies. Springer, Cham. https://doi.org/10.1007/978-3-319-60013-0_243-1
Download citation
DOI: https://doi.org/10.1007/978-3-319-60013-0_243-1
Received:
Accepted:
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-60013-0
Online ISBN: 978-3-319-60013-0
eBook Packages: Living Reference Computer SciencesReference Module Computer Science and Engineering