<style>.woocommerce-product-gallery{ opacity: 1 !important; }</style>

How Quickly Mobile Learning Has Progressed In 5 Short Years

As the name implies, mobile learning can be simply described as teaching and learning on the go. From the first mobile learning workshop in Birmingham UK in 2002 to the 6th International Mobile Learning Conference in Melbourne Australia in 2007, mobile learning progressed from ideation to a tangible reality in only half a decade. Indeed, it has become easier for teachers and students to interact beyond the traditional walls of the classroom, thanks to the advent and influx of portable, handheld and mobile devices.

To gain a better understanding of notable advancements in mobile learning within these 5 years, it is important to reflect on the phases of its growth across the Mobile Leaning International Conferences.

At the mobile learning conference in London in 2003, the theme was ‘New Possibilities’. Then, it was more an issue of how feasible it would be to navigate on such small devices as mobile phones and the types of learning best suited for this.

A year later, at the conference in Rome, themed ‘The Potential is significant’, there was a positive shift in the application of mobile devices for different styles of learning.

The year 2005 ushered in mobile learning right into the hands of large groups and organizations. The theme of the conference ‘Learning is in your hands’ in Cape Town was very apt. The conference recorded practical demonstrations of mobile learning. The issue at hand was no longer an exploration into the feasibility of the mobile learning technology, but identifying the teacher-student requirements needed to support this technology.

Fast forward to 2006 and by this time, it was evident that mobile learning would break the barriers of location and time and span across multiple cultures and many generations. The theme of the conference in Canada was ‘Across cultures and generations’.

It was easier to dream of every child owning a laptop with the $100 laptop. Inculcating audio into the teaching material had materialized into a topic for discourse. The conference provided a new perception of the world as a global village. Mobile learning was fast becoming a reality!

By 2007, it was easy to see the reality of mobile learning.  The theme of the conference was ‘Making the Connections’.

Speakers’ comments and reactions were being instantly posted on social media. Delegates from all over the world were able to participate in the conference by asking questions.

10 years later, the just concluded 13th International Conference on Mobile Learning 2017 which held in Budapest, Hungary in April provided a forum for the presentation and discussion of research into the current and future trends of mobile learning. The adoption of Learning Analytics and Informatics were some of the issues up for discussion.  

The evolution of the mobile learning technology is not yet complete. As long as mobile technology continues to evolve, we can expect mobile learning to follow. When you integrate amazing technology with good teaching practice, the result is superior quality education without breaking the bank. This should be a reality for every teacher and student.

5 Scopes Of Conducting The Information Security Audit Towards Efficient IT Governance.

 

 

If you are reading this article, you are probably IT inclined and are already familiar with the term ‘Information Security Audit’. However, for the benefit of the non-IT savvy readers, ‘Information Security Audit’ is simply an examination or inspection of the security of the information technology systems.

This may include conducting an assessment into the safety of the IT systems, practices and operations, ensuring company-wide protection of information and data and testing the strength of the security measures. Information security audit provides a form of control in IT companies. It reveals the value derived from the company’s IT infrastructure. It helps to drive audit compliance and makes it easier for the company to align its IT policies with its services. 

There are 5 areas to consider when conducting an effective information security audit.

Systems and applications – This audit will entail a detailed inspection of the computers within the network. Carrying out an audit of the application security will ensure there is no breach within the IT systems.

Data centres – A data centre is where applications and related software data are processed. Data centres are very crucial to the infrastructure of any IT company because it is where information is processed. Conducting a periodic information security audit on these facilities will protect against risks of infringements.

Systems development – It is important for companies to ensure the security of their IT systems is not compromised especially during its development. There is need for them to guard against possible external and internal attacks.

 

A regular information security audit would also help guarantee an alignment between the systems being developed and the objectives of the company. Furthermore, it would serve as a guide regarding their system development standards of operations. 

Architecture of IT system – The architecture of the IT system is another very important area to consider if the company wants to carry out an effective audit. As it is the infrastructure that runs the entire IT software and programs, the enterprise wide architecture is a sensitive spot for security vulnerabilities.

Clients’ communication servers – IT companies that interface with clients from time to time have to invest in information security audit to protect their clients. By safeguarding their clients’ servers and other communication servers they can also increase the safety of their IT infrastructure.

Information security auditing is mandatory for any IT company to protect against security hazards. Audits should be conducted from time to time and not just once a year. Do not wait until the systems have been compromised to carry out an audit. Even after inviting an auditor to go over the IT security controls, it is the responsibility of a designated person or persons in the company to thoroughly evaluate the auditor’s report. Research the recommendations of the security audit, test to verify breaches and submit a risk analysis report.

:)