{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,30]],"date-time":"2025-08-30T16:33:25Z","timestamp":1756571605171,"version":"3.40.3"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030691424"},{"type":"electronic","value":"9783030691431"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-69143-1_40","type":"book-chapter","created":{"date-parts":[[2021,2,14]],"date-time":"2021-02-14T04:03:56Z","timestamp":1613275436000},"page":"520-534","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Privacy Preservation in Mobile-Based Learning Systems: Current Trends, Methodologies, Challenges, Opportunities and Future Direction"],"prefix":"10.1007","author":[{"given":"Muhammad Kudu","family":"Muhammad","sequence":"first","affiliation":[]},{"given":"Ishaq Oyebisi","family":"Oyefolahan","sequence":"additional","affiliation":[]},{"given":"Olayemi Mikail","family":"Olaniyi","sequence":"additional","affiliation":[]},{"given":"Ojeniyi Joseph","family":"Adebayo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,14]]},"reference":[{"issue":"2","key":"40_CR1","doi-asserted-by":"publisher","first-page":"995","DOI":"10.1007\/s10639-018-9816-1","volume":"24","author":"H Singh","year":"2018","unstructured":"Singh, H., Miah, S.J.: Design of a mobile-based learning management system for incorporating employment demands: case context of an Australian University. Educ. Inf. Technol. 24(2), 995\u20131014 (2018). https:\/\/doi.org\/10.1007\/s10639-018-9816-1","journal-title":"Educ. Inf. Technol."},{"issue":"14","key":"40_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/s19143052","volume":"19","author":"Y Wang","year":"2019","unstructured":"Wang, Y., Zheng, N., Xu, M., Qiao, T., Zhang, Q., Yan, F.: Hierarchical identifier: application to user privacy eavesdropping on mobile payment app. Sensors 19(14), 1\u20139 (2019). https:\/\/doi.org\/10.3390\/s19143052","journal-title":"Sensors"},{"issue":"3","key":"40_CR3","first-page":"401","volume":"14","author":"MT Ketthari","year":"2019","unstructured":"Ketthari, M.T., Rajendran, S.: Privacy preserving data mining using hiding maximum utility item first algorithm by means of grey wolf optimisation algorithm. Int. J. Bus. Intell. Data Min. 14(3), 401\u2013418 (2019)","journal-title":"Int. J. Bus. Intell. Data Min."},{"key":"40_CR4","doi-asserted-by":"crossref","unstructured":"Mohanrao, M., Karthik, S.: Privacy preserving for global data using ensemble approach. In: International Conference on Computer Vision and Machine Learning, vol. 1228, pp. 1\u20137 (2019). https:\/\/doi.org\/10.1088\/1742-6596\/1228\/1\/012046","DOI":"10.1088\/1742-6596\/1228\/1\/012046"},{"issue":"9","key":"40_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/info10090274","volume":"10","author":"K Nagaraj","year":"2019","unstructured":"Nagaraj, K., Sharvani, G.S., Sridhar, A.: Encrypting and preserving sensitive attributes in customer churn data using novel dragonfly based pseudonymizer approach. Information 10(9), 1\u201321 (2019)","journal-title":"Information"},{"key":"40_CR6","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1016\/j.compedu.2018.11.005","volume":"130","author":"NBA Normadhi","year":"2019","unstructured":"Normadhi, N.B.A., Shuib, L., Nasir, H.N., Bimba, A., Idris, N., Balakrishnan, V.: Identification of personal traits in adaptive learning environment: systematic literature review. Comput. Educ. 130, 168\u2013190 (2019). https:\/\/doi.org\/10.1016\/j.compedu.2018.11.005","journal-title":"Comput. Educ."},{"key":"40_CR7","doi-asserted-by":"publisher","first-page":"731","DOI":"10.1016\/j.egypro.2019.02.186","volume":"160","author":"A Aldiab","year":"2019","unstructured":"Aldiab, A., Chowdhury, H., Kootsookos, A., Alam, F., Allhibi, H.: Utilization of learning management systems (LMSs) in higher utilization of learning management systems in higher education system: a case review for Saudi Arabia. Energy Procedia 160, 731\u2013737 (2019). https:\/\/doi.org\/10.1016\/j.egypro.2019.02.186","journal-title":"Energy Procedia"},{"key":"40_CR8","doi-asserted-by":"publisher","first-page":"496","DOI":"10.1016\/j.chb.2017.12.015","volume":"92","author":"L Juhanak","year":"2017","unstructured":"Juhanak, L., Zounek, J., Rohl\u00edkov, L.: Using process mining to analyze students\u2019 quiz-taking behavior patterns in a learning management system. Comput. Hum. Behav. J. 92, 496\u2013506 (2017). https:\/\/doi.org\/10.1016\/j.chb.2017.12.015","journal-title":"Comput. Hum. Behav. J."},{"issue":"7","key":"40_CR9","doi-asserted-by":"publisher","first-page":"453","DOI":"10.18178\/ijiet.2019.9.7.1246","volume":"9","author":"NI Sarker","year":"2019","unstructured":"Sarker, N.I., Wu, M., Cao, Q., Alam, G.M.M., Li, D.: Leveraging digital technology for better learning and education: a systematic literature review. Int. J. Inf. Educ. Technol. 9(7), 453\u2013461 (2019). https:\/\/doi.org\/10.18178\/ijiet.2019.9.7.1246","journal-title":"Int. J. Inf. Educ. Technol."},{"key":"40_CR10","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.tele.2018.01.015","volume":"37","author":"YA Ahmed","year":"2018","unstructured":"Ahmed, Y.A., Ahmad, M.N., Ahmad, N., Zakaria, N.H.: Social media for knowledge-sharing: a systematic literature review. Telematics Inform. 37, 72\u2013112 (2018). https:\/\/doi.org\/10.1016\/j.tele.2018.01.015","journal-title":"Telematics Inform."},{"key":"40_CR11","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1016\/j.future.2018.08.003","volume":"90","author":"M Cantabella","year":"2019","unstructured":"Cantabella, M., et al.: Analysis of student behavior in learning management systems through a big data framework. Future Gener. Comput. Syst. 90, 262\u2013272 (2019). https:\/\/doi.org\/10.1016\/j.future.2018.08.003","journal-title":"Future Gener. Comput. Syst."},{"key":"40_CR12","series-title":"Lecture Notes in Intelligent Transportation and Infrastructure","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/978-3-030-01560-2_2","volume-title":"Security in Smart Cities: Models, Applications, and Challenges","author":"A Ismail","year":"2019","unstructured":"Ismail, A., Shehab, A., El-Henawy, I.M.: Healthcare analysis in smart big data analytics: reviews, challenges and recommendations. In: Hassanien, A.E., Elhoseny, M., Ahmed, S.H., Singh, A.K. (eds.) Security in Smart Cities: Models, Applications, and Challenges. LNITI, pp. 27\u201345. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-01560-2_2"},{"issue":"4","key":"40_CR13","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1007\/s00766-018-0299-9","volume":"24","author":"AD Alharthi","year":"2018","unstructured":"Alharthi, A.D., Spichkova, M., Hamilton, M.: Sustainability requirements for eLearning systems: a systematic literature review and analysis. Requirements Eng. 24(4), 523\u2013543 (2018). https:\/\/doi.org\/10.1007\/s00766-018-0299-9","journal-title":"Requirements Eng."},{"key":"40_CR14","unstructured":"Antonius, H., Widjaja, E., Santoso, S.W., Petrus, S., Cahyadi, J.: The enhancement of learning management system in teaching learning process with the UTAUT2 and trust model. In: 2019 International Conference on Information Management and Technology, vol. 1, pp. 309\u2013313. IEEE (2019)"},{"issue":"5","key":"40_CR15","doi-asserted-by":"publisher","first-page":"2466","DOI":"10.1111\/bjet.12867","volume":"50","author":"A Garone","year":"2019","unstructured":"Garone, A., et al.: Clustering university teaching staff through UTAUT: implications for the acceptance of a new learning management system. Br. J. Educ. Technol. 50(5), 2466\u20132483 (2019). https:\/\/doi.org\/10.1111\/bjet.12867","journal-title":"Br. J. Educ. Technol."},{"key":"40_CR16","doi-asserted-by":"publisher","unstructured":"Kaur, A., Kaur, K.: Systematic literature review of mobile application development and testing effort estimation. J. King Saud Univ.-Comput. Inf. Sci. (2018). https:\/\/doi.org\/10.1016\/j.jksuci.2018.11.002","DOI":"10.1016\/j.jksuci.2018.11.002"},{"key":"40_CR17","doi-asserted-by":"publisher","unstructured":"Karle, T., Vora, D.: PRIVACY preservation in big data using anonymization techniques. In: 2017 International Conference on Data Management, Analytics and Innovation, pp. 340\u2013343 (2017). https:\/\/doi.org\/https:\/\/doi.org\/10.1109\/ICDMAI.2017.8073538","DOI":"10.1109\/ICDMAI.2017.8073538"},{"issue":"43","key":"40_CR18","first-page":"437","volume":"9","author":"B Bashari","year":"2016","unstructured":"Bashari, B., Akbarzadeh, N., Ataei, P., Khakbiz, Y.: Security and privacy challenges in big data era. Int. J. Control Theory Appl. 9(43), 437\u2013448 (2016)","journal-title":"Int. J. Control Theory Appl."},{"issue":"2","key":"40_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4172\/2472-1654.100131","volume":"3","author":"QK Fatt","year":"2018","unstructured":"Fatt, Q.K., Ramadas, A.: The usefulness and challenges of big data in healthcare. J. Healthc. Commun. 3(2), 1\u20134 (2018). https:\/\/doi.org\/10.4172\/2472-1654.100131","journal-title":"J. Healthc. Commun."},{"key":"40_CR20","unstructured":"Simo, H.: Big data: opportunities and privacy challenges, pp. 1\u201321 (2018)"},{"issue":"3","key":"40_CR21","first-page":"3042","volume":"5","author":"M Kaushik","year":"2014","unstructured":"Kaushik, M., Jain, A.: Challenges to big data security and privacy. Int. J. Comput. Sci. Inf. Technol. 5(3), 3042\u20133043 (2014)","journal-title":"Int. J. Comput. Sci. Inf. Technol."},{"key":"40_CR22","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1016\/j.jnca.2017.02.001","volume":"84","author":"M Baqer","year":"2017","unstructured":"Baqer, M., Azad, A.K., Vasilakos, A.: Security and privacy challenges in mobile cloud computing: survey and way ahead. J. Netw. Comput. Appl. 84, 38\u201354 (2017). https:\/\/doi.org\/10.1016\/j.jnca.2017.02.001","journal-title":"J. Netw. Comput. Appl."},{"issue":"2","key":"40_CR23","first-page":"13","volume":"20","author":"JT Avella","year":"2016","unstructured":"Avella, J.T., Kebritchi, M., Nunn, S.G., Kanai, T.: Learning analytics methods, benefits, and challenges in higher education: a systematic literature review. Online Learn. 20(2), 13\u201329 (2016)","journal-title":"Online Learn."},{"issue":"3","key":"40_CR24","first-page":"67","volume":"6","author":"G Kambourakis","year":"2013","unstructured":"Kambourakis, G.: Security and privacy in m-learning and beyond: challenges and state-of-the-art. Int. J. U- and E-Serv. Sci. Technol. 6(3), 67\u201384 (2013)","journal-title":"Int. J. U- and E-Serv. Sci. Technol."},{"key":"40_CR25","first-page":"1","volume":"114","author":"ME Gursoy","year":"2018","unstructured":"Gursoy, M.E., Inan, A., Nergiz, M.E., Saygin, Y.: Privacy-preserving learning analytics: challenges and techniques. IEEE Trans. Learn. Technol. 114, 1\u20134 (2018)","journal-title":"IEEE Trans. Learn. Technol."},{"key":"40_CR26","doi-asserted-by":"publisher","unstructured":"Manogaran, G., Thota, C., Lopez, D.: HCI Challenges and Privacy Preservation in Big Data Security. The Advances in Human and Social Aspects of Technology (AHSAT) Book Series, pp. 1\u201323 (2018). https:\/\/doi.org\/https:\/\/doi.org\/10.4018\/978-1-5225-2863-0.ch001","DOI":"10.4018\/978-1-5225-2863-0.ch001"},{"key":"40_CR27","series-title":"Intelligent Systems Reference Library","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/978-3-030-13743-4_10","volume-title":"Machine Learning Paradigms","author":"K Kabassi","year":"2020","unstructured":"Kabassi, K., Alepis, E.: Learning analytics in distance and mobile learning for designing personalised software. In: Virvou, M., Alepis, E., Tsihrintzis, G.A., Jain, L.C. (eds.) Machine Learning Paradigms. ISRL, vol. 158, pp. 185\u2013203. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-13743-4_10"},{"key":"40_CR28","unstructured":"Niknam, S., Dhillon, H.S., Reed, J.H.: Federated learning for wireless communications: motivation, opportunities and challenges, pp. 1\u20136 (2019). arXiv:1908.06847v3"},{"key":"40_CR29","doi-asserted-by":"publisher","first-page":"1202","DOI":"10.1080\/10410236.2018.1471336","volume":"34","author":"P Esmaeilzadeh","year":"2018","unstructured":"Esmaeilzadeh, P.: The effects of public concern for information privacy on the adoption of health information exchanges (HIEs) by healthcare entities. Health Commun. 34, 1202\u20131211 (2018). https:\/\/doi.org\/10.1080\/10410236.2018.1471336","journal-title":"Health Commun."},{"key":"40_CR30","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/978-3-319-55783-0_2","volume-title":"Privacy and Identity Management","author":"V Torra","year":"2016","unstructured":"Torra, V., Navarro-Arribas, G.: Big data privacy and anonymization. In: Lehmann, A., Whitehouse, D., Fischer-H\u00fcbner, S., Fritsch, L., Raab, C. (eds.) Privacy and Identity Management, vol. 498, pp. 15\u201326. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-55783-0_2"},{"key":"40_CR31","unstructured":"Merceron, A.: Educational data mining\/learning analytics: methods, tasks and current trends. In: 2015 Proceedings of DeLFI Workshops, pp. 101\u2013109 (2015)"},{"issue":"8","key":"40_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/s18082440","volume":"18","author":"Y Wang","year":"2018","unstructured":"Wang, Y., Tian, Z., Zhang, H., Su, S., Shi, W.: A privacy preserving scheme for nearest neighbor query. Sensor 18(8), 1\u20134 (2018). https:\/\/doi.org\/10.3390\/s18082440","journal-title":"Sensor"},{"issue":"11","key":"40_CR33","first-page":"151","volume":"12","author":"A Hadioui","year":"2017","unstructured":"Hadioui, A., Faddouli, N.E., Touimi, Y.B., Bennani, S.: Machine learning based on big data extraction of massive educational knowledge. IJET 12(11), 151\u2013167 (2017)","journal-title":"IJET"},{"key":"40_CR34","doi-asserted-by":"publisher","first-page":"633","DOI":"10.1016\/j.patcog.2018.04.012","volume":"81","author":"R Plamondon","year":"2018","unstructured":"Plamondon, R., Pirlo, G., Anquetil, \u00c9., R\u00e9mi, C., Teulings, H.-L., Nakagawa, M.: Personal digital bodyguards for e-security, e-learning and e-health: a prospective survey. Pattern Recogn. 81, 633\u2013659 (2018). https:\/\/doi.org\/10.1016\/j.patcog.2018.04.012","journal-title":"Pattern Recogn."},{"issue":"1","key":"40_CR35","first-page":"34","volume":"1","author":"AO Omolade","year":"2017","unstructured":"Omolade, A.O.: Predictors of use of mobile applications by university students in Oyo State, Nigeria. J. Inf. Sci. Syst. Technol. 1(1), 34\u201348 (2017)","journal-title":"J. Inf. Sci. Syst. Technol."}],"container-title":["Communications in Computer and Information Science","Information and Communication Technology and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-69143-1_40","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,24]],"date-time":"2021-04-24T11:06:28Z","timestamp":1619262388000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-69143-1_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030691424","9783030691431"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-69143-1_40","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"14 February 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICTA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information and Communication Technology and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Minna","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nigeria","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 November 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 November 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icta12020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ictafutminna.com.ng\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"166","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"55","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Due to the COVID-19 pandemic the conference was held online.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}