Research Article

Authorís Security in Electronic Learning Systems

by  Ali Naserasadi
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 21 - Issue 10
Published: May 2011
Authors: Ali Naserasadi
10.5120/2617-3458
PDF

Ali Naserasadi . Authorís Security in Electronic Learning Systems. International Journal of Computer Applications. 21, 10 (May 2011), 25-29. DOI=10.5120/2617-3458

                        @article{ 10.5120/2617-3458,
                        author  = { Ali Naserasadi },
                        title   = { Authorís Security in Electronic Learning Systems },
                        journal = { International Journal of Computer Applications },
                        year    = { 2011 },
                        volume  = { 21 },
                        number  = { 10 },
                        pages   = { 25-29 },
                        doi     = { 10.5120/2617-3458 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2011
                        %A Ali Naserasadi
                        %T Authorís Security in Electronic Learning Systems%T 
                        %J International Journal of Computer Applications
                        %V 21
                        %N 10
                        %P 25-29
                        %R 10.5120/2617-3458
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

One of the most effective parameters in Electronic Learning or E-Learning systems’ success is the security of these systems. But this feature is ignored in the most of cases. An E-Learning system has different user groups such as authors, teachers and students. Each of these groups has special and unique security requirements. In this paper, we distinguished security importance in E-Learning systems from authors’ point of view. We investigated security requirements and the manner of authors’ security risk analysis. Also, we suggested some approaches for educational content protection

References
  • E. R. Weippl, Security in E-Learning, Springer Science and Business Media inc., 2005, pp. 13-75.
  • F. Graf, ‚ÄúProviding security for e-learning‚Äù, Computers & Graphics, Volume 26, Issue 2, April 2002, pp. 355-365.
  • M. Warren and W. Hutchinson, ‚ÄúInformation security ‚Äì an e-learning problem‚Äù, Advances in web-based learning ‚Äì ICWL, Springer Berlin/Heidelberg, 2003, pp. 21-26.
  • E. Turban, D. Leidner and E. McLean, Information technology for management: transforming organizations in the digital economy, 5th edition, Virginia: J. Wiley and sons, 2005, pp. 448-490.
  • I. Smissen, ‚ÄúRequirements for online teaching and learning at Deakin university: A case study‚Äù, unpublished.
  • M. Bishop, Computer security: Art and science, Addison Wesley, 2002, pp. 1-25.
  • J. Greene and A. Stellman, Applied software project management, O‚ÄôReilly Media inc., 2006, pp. 81-95.
  • B. Schneier, beyond fear: Thinking sensibly about security in an uncertain world, New York: Springer-Verlag, 2003, pp. 59-73.
  • J. Greene and A. Stellman, Applied Software Project Management, O‚ÄôReilly, 2005.
  • Mahdi Jampour, Ali Naserasadi, Majid Estilayee and Maryam Ashourzadeh , ‚ÄúExtract and Classification of Iris Images by Fractal Dimension and Efficient Color of Iris‚Äù, International Journal of Computer Applications (IJCA) 18(1), March 2011, pp. 11-14, ISSN: 0975 ‚Äì 8887, Published by foundation of computer science.
  • -, An Introduction to Computer Security: The NIST Handbook, National Institute of Standard and Technology, 2001.
  • J. Seitz, Digital watermarking for digital media, Idea Group inc., 2005, pp. 30-52
  • D. Zhang, L. Zhou, R. O. Briggs and J. F. Nunamaker Jr., ‚ÄúInstructional Video in E-Learning: Assessing the Impact of Interactive Video on Learning Effectiveness‚Äù, Information and Mathematics (43), pp.15-27, 2006.
  • P. Craig, R. Honick and M. Burnett, Software piracy exposed, Syngress, 2005, pp. 19-63.
  • Ross J. Anderson and Ross Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems, 1st edition, Wiley, 2001, ISBN: 0471389226, Chapter 20.
  • G. S. Mouzakitis, ‚ÄúThe E-Learning: The Six Important wh‚Ķ?‚Äù , procedia Social and Behavioral Sciences (1), pp. 2595-2599. 2009.
  • G. Kambourakis, D. N. Kontoni, A. Rouskas, S. Gritzalis, ‚Äú A PKI approach for deploying modern secure distributed e-learning and m-learning environments‚Äù, Computers and Education (48), pp. 1-16, 2007.
  • S. Adibi, ‚ÄúA remote interactive non-repudiation multimedia based m-learning system‚Äù, Telematics and informatics (27), pp. 377-393, 2010.
  • G. Darab, Gh. A. Montazer, ‚ÄúAn eclectic model for assessing e-learning readiness in the Iranian universities‚Äù, Computers and educations (56), pp. 900-910, 2011.
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Electronic Learning Security Author Educational Content

Powered by PhDFocusTM