Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ ZENODOarrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
ZENODO
Part of book or chapter of book . 2024
License: CC BY
Data sources: ZENODO
ZENODO
Part of book or chapter of book . 2024
License: CC BY
Data sources: Datacite
ZENODO
Part of book or chapter of book . 2024
License: CC BY
Data sources: Datacite
versions View all 2 versions
addClaim

SECURITY OF DATA ACCESS IN E-LEARNING SYSTEMS: THREATS AND WAYS TO OVERCOME THEM

Authors: HAITAN, Olena;

SECURITY OF DATA ACCESS IN E-LEARNING SYSTEMS: THREATS AND WAYS TO OVERCOME THEM

Abstract

The widespread use of e-learning systems in both academic and non-academicorganizations made it necessary to improve both the overall security level and protection againstidentity spoofing and cheating. Security is a key issue, as it forms the basis of trust in the onlinelearning results. There are many risks associated with security, such as confidentiality loss, personaldata compromising, availability, forgery and destruction of materials and learning outcomes. Thepaper focus is on the vulnerabilities of learning systems and how to increase data security. The attacksrelevant to the learning systems are presented as well. The paper examines the authentication methodsin e-learning systems, main benefits and disadvantages of each method, highlights the associatedthreats, and provides recommendations for selecting a specific method. The paper considers thethreats of academic integrity violation and the technical methods used to protect against them. Thelegal framework for the collection and processing of personal data in learning platforms is analyzedfrom the perspective of Ukrainian and European Union legislation.

Related Organizations
Keywords

authentication, cheating, e-learning, identity-swap, proctoring, security, vulnerabilities

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
0
Average
Average
Average