Affiliation:
1. Capitol Technology University, USA
Abstract
This chapter shows the value of grasping a mobile strategy deploying multiple layers of security. Data shows a void in leader understanding regarding safe m-learning, m-learning's safety cost requirements, and enduring sustainability in a cybernated world. Cybersecurity must be infused into processes encompassing m-learning strategy to include international and national insights in underdeveloped areas. Cybersecurity leaders must increase their overall abilities to guide the growth and operation of a cyber-secure mobile strategy. This chapter infuses cybersecurity into processes encompassing m-learning strategy by probing the insights for cybersecurity's influence on m-learning in this 21st century. Cybersecurity leaders and faculty members should amass knowledge to disambiguate obstacles that block secure m-learning realization. Further, procurement leaders should learn information to help them analyze the need to procure m-learning systems enfolded in long-term overall strategic plans applying cybersecurity while balancing economic value and essential controls.
Reference113 articles.
1. A comprehensive approach to cyber resilience.;C.Abraham;MIT Sloan Management Review,2021
2. African Virtual University (AVU). (2021). AVU at a glance. Author. https://avu.org/avuweb/en/avu-at-a-glance/
3. Predicting individuals’ vulnerability to social engineering in social networks
4. IRS tax identity theft and fraud resources: Certified public accountant.;S. B.Anders;The CPA Journal,2021