
The widespread use of e-learning systems in both academic and non-academicorganizations made it necessary to improve both the overall security level and protection againstidentity spoofing and cheating. Security is a key issue, as it forms the basis of trust in the onlinelearning results. There are many risks associated with security, such as confidentiality loss, personaldata compromising, availability, forgery and destruction of materials and learning outcomes. Thepaper focus is on the vulnerabilities of learning systems and how to increase data security. The attacksrelevant to the learning systems are presented as well. The paper examines the authentication methodsin e-learning systems, main benefits and disadvantages of each method, highlights the associatedthreats, and provides recommendations for selecting a specific method. The paper considers thethreats of academic integrity violation and the technical methods used to protect against them. Thelegal framework for the collection and processing of personal data in learning platforms is analyzedfrom the perspective of Ukrainian and European Union legislation.
authentication, cheating, e-learning, identity-swap, proctoring, security, vulnerabilities
authentication, cheating, e-learning, identity-swap, proctoring, security, vulnerabilities
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
