publication . Conference object . 2010

Information Security in eLearning: A Discussion of Empirical Data on Information Security and eLearning

Alwi, Najwa Hayaati Mohd; Fan, Ip-Shing;
Open Access
  • Published: 13 Jul 2010
  • Country: United Kingdom
Abstract
ELearning systems are increasingly used by educational institutions to support their academic activities. A simple use of an eLearning system is to make materials and notes available to students at anytime and anywhere; more sophisticated uses of eLearning support the interaction and assessment processes. Depending on how eLearning systems are used, information security issues such as intellectual property protection, personal data protection and continuity of service can become significant for educational institutions. However, use of the Internet also creates exposure to information security threats, which may be classified into interruption, interception, fab...
Subjects
ACM Computing Classification System: ComputingMilieux_COMPUTERSANDEDUCATION
free text keywords: eLearning, challenges, information security management, threats
Related Organizations
Download from
Cranfield CERES
Conference object . 2010

Adams, A. and Blandford, A. (2003), "Security and Online Learning: to Protect or Prohibit", in Ghaoui, C. (ed.) Usability Evaluation of Online Learning Programs, Information Science Publishing, London, pp. 331-359. [OpenAIRE]

Allen, E. and Seaman, J. (2007), Online Nation Five Years of Growth in Online Learning, 1, Sloan Consortium, United States.

Alwi, N. H. M. and Fan, I. (2009), "Information Security Management in ELearning", Internet Technology and Secured Transactions, 2009. ICITST 2009.International Conference for Internet Technology and Secured Transactions, 9-12 November, London, IEEE Xplore, London UK, .

Chin, P. (2004), Using C&IT to support teaching, RoutledgeFalmer, London.

El-Khatib, K., Korba, L., Xu, Y. and and Yee, G. (2003), "Privacy and security in ELearning.", International Journal of Distance Education Technologies, vol. 1, no. 4, pp. 1-19.

Hamid, A. A. (2002), "eLearning Is it the ā€œeā€ or the learning that matters?", The Internet and Higher Education, vol. 4, no. 3-4, pp. 311-316.

Jain, K. K. and Ngoh, L. B. (2003), "Motivating Factors in eLearning -a Case study of UNITAR", Student Affairs Online, [Online], vol. 4, no. 1, pp. 21 June 2008 available at: http://www.studentaffairs.com/ejournal/Winter_2003/eLearning.html.

Khan, B. H. (2004), "People, process and product continuum in eLearning: The eLearning P3 model", Educational Technology, vol. 44, no. 5, pp. 33-40.

Kritzinger, E. and von Solms, S. H. (2006), "ELearning: Incorporating Information Security Governance", Issues in Informing Science and Information Technology, vol. 3. [OpenAIRE]

Lim, C. C. and Jin, J. S. (2006), "A Study on Applying Software Security to Information Systems: ELearning Portals", IJCSNS, vol. 6, no. 3B, pp. 162.

Norman, S. and Da Costa, M. (2003), "Overview of eLearning Specifications and Standards", Open Learning Agency, and Eduspecs Technical Liaison Office, .

Raitman, R., Ngo, L. and Augar, N. (2005), "Security in the Online ELearning Environment", Advanced Learning Technologies, 2005.ICALT 2005.Fifth IEEE International Conference on Advanced Learning Technologies, , pp. 702-706.

Yang, C., Lin, F. O. and Lin, H. (2002), "Policy-based Privacy and Security Management for Collaborative Eeducation Systems.", Proceedings of the 5th IASTED International Multi-Conference Computers and Advanced Technology in Education (CATE 2002), , pp. 501-505.

Powered by OpenAIRE Open Research Graph
Any information missing or wrong?Report an Issue