Abstract: The use of information technology in education have
changed not only the learners learning style but also the way they
taught, where nowadays learners are connected with diversity of
information sources with means of knowledge available everywhere.
The advantage of network wireless technologies and mobility
technologies used in the education and learning processes lead to
mobile learning as a new model of learning technology. Currently,
most of mobile learning applications are developed for the formal
education and learning environment. Despite the long history and
large amount of research on mobile learning and instruction design
model still there is a need of well-defined process in designing
mobile learning applications. Based on this situation, this paper
emphasizes on identifying instruction design phase’s considerations
and influencing factors in developing mobile learning application.
This set of instruction design steps includes analysis, design,
development, implementation, evaluation and continuous has been
built from a literature study, with focus on standards for learning,
mobile application software quality and guidelines. The effort is part
of an Omani-funded research project investigating the development,
adoption and dissemination of mobile learning in Oman.
Abstract: Mobile applications are verified to check the correctness or evaluated to check the performance with respect to specific security properties such as Availability, Integrity and Confidentiality. Where they are made available to the end users of the mobile application is achievable only to a limited degree using software engineering static verification techniques. The more sensitive the information, such as credit card data, personal medical information or personal emails being processed by mobile application, the more important it is to ensure the confidentiality of this information. Monitoring untrusted mobile application during execution in an environment where sensitive information is present is difficult and unnerving. The paper addresses the issue of monitoring and controlling the flow of confidential information during untrusted mobile application execution. The approach concentrates on providing a dynamic and usable information security solution by interacting with the mobile users during the runtime of mobile application in response to information flow events.