{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T00:39:58Z","timestamp":1769819998385,"version":"3.49.0"},"reference-count":67,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2016,7,1]],"date-time":"2016-07-01T00:00:00Z","timestamp":1467331200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Learning Technol."],"published-print":{"date-parts":[[2016,7,1]]},"DOI":"10.1109\/tlt.2016.2524570","type":"journal-article","created":{"date-parts":[[2016,2,3]],"date-time":"2016-02-03T19:09:36Z","timestamp":1454526576000},"page":"258-271","source":"Crossref","is-referenced-by-count":26,"title":["Designing a Secure Exam Management System (SEMS) for M-Learning Environments"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0783-2777","authenticated-orcid":false,"given":"Mustafa","family":"Kaiiali","sequence":"first","affiliation":[]},{"given":"Armagan","family":"Ozkaya","sequence":"additional","affiliation":[]},{"given":"Halis","family":"Altun","sequence":"additional","affiliation":[]},{"given":"Hatem","family":"Haddad","sequence":"additional","affiliation":[]},{"given":"Marc","family":"Alier","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"Open_handset_alliance","year":"0"},{"key":"ref38","article-title":"(2015). Android market share","year":"0"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.20533\/ijds.2040.2570.2010.0018"},{"key":"ref32","article-title":"Security issues specific to e-assessments","author":"marais","year":"0"},{"key":"ref31","article-title":"Securexam & Remote Proctor","year":"0"},{"key":"ref30","article-title":"Webassessor & kryterion online proctoring","year":"0"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/PDGC.2014.7030756"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/PCi.2012.76"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/EDUCON.2012.6201111"},{"key":"ref34","first-page":"22","article-title":"Dependable distributed testing&#x2014;Can the online proctor be reliably computerized?","author":"frank","year":"0","journal-title":"Proc Int Conf E-Bus"},{"key":"ref60","article-title":"(2014). Best practices for high density wireless network design in education and small\/medium businesses","year":"0"},{"key":"ref62","article-title":"Mini portable cellphone jammer J-260A","year":"0"},{"key":"ref61","article-title":"Handheld cellphone jammer TG-120B-PRO","year":"2015"},{"key":"ref63","article-title":"Wolfhound-PRO cell phone detector","year":"2015"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"108","DOI":"10.19173\/irrodl.v14i5.1632","article-title":"Security risks and protection in online learning&#x2014;A survey","volume":"14","author":"chen","year":"2013","journal-title":"Int Rev Res Open Distance Learn"},{"key":"ref64","article-title":"Wi-Fi and bluetooth jammer TG-120C-PRO","year":"2015","journal-title":"Tangreat Inc"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.20533\/ijds.2040.2570.2010.0019"},{"key":"ref65","article-title":"Airmagnet enterprise","year":"2015"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/2699343.2699353"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.sbspro.2014.01.711"},{"key":"ref67","article-title":"A field guide to learning management systems","author":"ellis","year":"2009","journal-title":"ASTD Learning Circuits"},{"key":"ref2","article-title":"Training industry report","year":"2014","journal-title":"Training Mag"},{"key":"ref1","article-title":"Think act&#x2014;Corporate learning goes digital","year":"2014","journal-title":"Roland Berger Strategy Consultants"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.2316\/Journal.208.2007.2.208-1084"},{"key":"ref22","article-title":"Modular object-oriented dynamic learning environment","year":"0"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1504\/IJMLO.2009.024428"},{"key":"ref24","article-title":"The oauth 1.0 protocol","author":"hammer-lahav","year":"2010","journal-title":"Internet Eng Task Force"},{"key":"ref23","article-title":"Moodbile project","year":"0"},{"key":"ref26","first-page":"4001","article-title":"Security & privacy challenges in e-learning 2.0","author":"weipple","year":"0","journal-title":"Proc of E-Learn"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICALT.2005.236"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2406111"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2398819"},{"key":"ref59","author":"firewall","year":"0"},{"key":"ref58","article-title":"IP tables for android","year":"0"},{"key":"ref57","article-title":"Shoulder surfing","year":"0"},{"key":"ref56","article-title":"TOTP: Time-based one-time password algorithm","author":"mraihi","year":"2011","journal-title":"Internet Eng Task Force"},{"key":"ref55","article-title":"StealthVPN","year":"0"},{"key":"ref54","article-title":"IMS global learning consortium","year":"0"},{"key":"ref53","first-page":"301","article-title":"Progressive authentication: Deciding when to authenticate on mobile phones","author":"riva","year":"0","journal-title":"Proc Usenix Security Symp"},{"key":"ref52","first-page":"22","article-title":"Iris liveness detection methods in mobile applications","author":"sequeira","year":"0","journal-title":"Proc Int Conf Comput Vision Theory Appl"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.19173\/irrodl.v6i2.284"},{"key":"ref11","first-page":"155","article-title":"The social and mobile learning experiences of students using mobile E-books","volume":"17","author":"kissinger","year":"2013","journal-title":"Asynchronous Learning Networks"},{"key":"ref40","article-title":"Fatih project","year":"0"},{"key":"ref12","first-page":"42","article-title":"Cloud computing through mobile-learning","volume":"1","author":"rao","year":"2010","journal-title":"Int J Adv Comput Sci Appl"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1504\/IJMLO.2013.051574"},{"key":"ref14","first-page":"24","article-title":"Extending moodle services to mobile devices: The moodbile project","author":"casany","year":"2012","journal-title":"Proc 6th Int Conf Mobile Ubiquitous Comput Syst Services Technol"},{"key":"ref15","article-title":"Literature review in mobile technologies and learning","author":"naismith","year":"2004"},{"key":"ref16","first-page":"1","article-title":"Towards a theory of mobile learning","author":"sharples","year":"2005","journal-title":"Proc mLearn Conf"},{"key":"ref17","first-page":"21","article-title":"Mobile learning in review: Opportunities and challenges for learners, teachers, and institutions","author":"cobcroft","year":"0","journal-title":"Proc Online Learn Teaching Conf"},{"key":"ref18","first-page":"40","article-title":"Factors that may contribute to the establishment of mobile learning in institutions&#x2014;Results from a survey","volume":"1","author":"zawacky-richter","year":"2007","journal-title":"Int J Interact Mob Technol"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1504\/IJKL.2010.034749"},{"key":"ref4","first-page":"961","article-title":"E-learning in turkey: Past, present and future","volume":"2","author":"yamamoto","year":"2010","journal-title":"E-Learning Practices"},{"key":"ref3","article-title":"PLATAFORMAS DE CAMPUS VIRTUAL CON HERRAMIENTAS DE SOFTWARE LIBRE: An&#x00E1;lisis comparativo de la situaci&#x00F3;n actual en las universidades espa&#x00F1;olas","author":"prendes","year":"2009","journal-title":"Informe del proyecto EA-2008-0257 de la Secretar&#x00ED;a de Estado de Universidades e Investigaci&#x00F3;n"},{"key":"ref6","article-title":"Learning management systems market by users&#x2014;Worldwide market forecasts and analysis 2013&#x2013;2018","year":"2013","journal-title":"Market"},{"key":"ref5","article-title":"Learning management systems: The good, the bad, the ugly and the truth","author":"wexler","year":"2008","journal-title":"The E-learning Guild Res 360 Rep on Learning Manage Syst"},{"key":"ref8","article-title":"Ericsson mobility report","year":"2014"},{"key":"ref49","article-title":"FaceRecognizer&#x2014;Face recognition with openCV","year":"0"},{"key":"ref7","article-title":"NMC horizon report: 2015 higher education edition","author":"johnson","year":"2015","journal-title":"The New Media Consortium"},{"key":"ref9","article-title":"Web 2.0, personal learning environments, and the future of learning management systems","volume":"2008","author":"sclater","year":"2008","journal-title":"The Res Bull"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ESTIMedia.2014.6962350"},{"key":"ref45","first-page":"495","article-title":"A secure mobile payment framework based on face authentication","author":"xu","year":"0","journal-title":"Proc Int MultiConf Eng Comput Scientists"},{"key":"ref48","first-page":"23","article-title":"A large-scale mobile facial recognition system using embedded GPUs","author":"el-mahdy","year":"0","journal-title":"Proc 22nd High Perform Comput Symp"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638132"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/S0969-4765(15)30037-0"},{"key":"ref41","article-title":"FunkyGate-IP NFC","year":"0","journal-title":"SpringCard Inc"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-43616-5_16"},{"key":"ref43","article-title":"MOBIO&#x2014;Mobile biometry, secured and trusted access to mobile services","year":"0","journal-title":"European Funded Project (FP7-2007-ICT-1)"}],"container-title":["IEEE Transactions on Learning Technologies"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4620076\/7569117\/07398032.pdf?arnumber=7398032","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:03:31Z","timestamp":1642003411000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7398032\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7,1]]},"references-count":67,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tlt.2016.2524570","relation":{},"ISSN":["1939-1382"],"issn-type":[{"value":"1939-1382","type":"print"}],"subject":[],"published":{"date-parts":[[2016,7,1]]}}}