CFP last date
22 April 2024
Reseach Article

Authorís Security in Electronic Learning Systems

by Ali Naserasadi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 21 - Number 10
Year of Publication: 2011
Authors: Ali Naserasadi
10.5120/2617-3458

Ali Naserasadi . Authorís Security in Electronic Learning Systems. International Journal of Computer Applications. 21, 10 ( May 2011), 25-29. DOI=10.5120/2617-3458

@article{ 10.5120/2617-3458,
author = { Ali Naserasadi },
title = { Authorís Security in Electronic Learning Systems },
journal = { International Journal of Computer Applications },
issue_date = { May 2011 },
volume = { 21 },
number = { 10 },
month = { May },
year = { 2011 },
issn = { 0975-8887 },
pages = { 25-29 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume21/number10/2617-3458/ },
doi = { 10.5120/2617-3458 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:08:09.228449+05:30
%A Ali Naserasadi
%T Authorís Security in Electronic Learning Systems
%J International Journal of Computer Applications
%@ 0975-8887
%V 21
%N 10
%P 25-29
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

One of the most effective parameters in Electronic Learning or E-Learning systems’ success is the security of these systems. But this feature is ignored in the most of cases. An E-Learning system has different user groups such as authors, teachers and students. Each of these groups has special and unique security requirements. In this paper, we distinguished security importance in E-Learning systems from authors’ point of view. We investigated security requirements and the manner of authors’ security risk analysis. Also, we suggested some approaches for educational content protection

References
  1. E. R. Weippl, Security in E-Learning, Springer Science and Business Media inc., 2005, pp. 13-75.
  2. F. Graf, “Providing security for e-learning”, Computers & Graphics, Volume 26, Issue 2, April 2002, pp. 355-365.
  3. M. Warren and W. Hutchinson, “Information security – an e-learning problem”, Advances in web-based learning – ICWL, Springer Berlin/Heidelberg, 2003, pp. 21-26.
  4. E. Turban, D. Leidner and E. McLean, Information technology for management: transforming organizations in the digital economy, 5th edition, Virginia: J. Wiley and sons, 2005, pp. 448-490.
  5. I. Smissen, “Requirements for online teaching and learning at Deakin university: A case study”, unpublished.
  6. M. Bishop, Computer security: Art and science, Addison Wesley, 2002, pp. 1-25.
  7. J. Greene and A. Stellman, Applied software project management, O’Reilly Media inc., 2006, pp. 81-95.
  8. B. Schneier, beyond fear: Thinking sensibly about security in an uncertain world, New York: Springer-Verlag, 2003, pp. 59-73.
  9. J. Greene and A. Stellman, Applied Software Project Management, O’Reilly, 2005.
  10. Mahdi Jampour, Ali Naserasadi, Majid Estilayee and Maryam Ashourzadeh , “Extract and Classification of Iris Images by Fractal Dimension and Efficient Color of Iris”, International Journal of Computer Applications (IJCA) 18(1), March 2011, pp. 11-14, ISSN: 0975 – 8887, Published by foundation of computer science.
  11. -, An Introduction to Computer Security: The NIST Handbook, National Institute of Standard and Technology, 2001.
  12. J. Seitz, Digital watermarking for digital media, Idea Group inc., 2005, pp. 30-52
  13. D. Zhang, L. Zhou, R. O. Briggs and J. F. Nunamaker Jr., “Instructional Video in E-Learning: Assessing the Impact of Interactive Video on Learning Effectiveness”, Information and Mathematics (43), pp.15-27, 2006.
  14. P. Craig, R. Honick and M. Burnett, Software piracy exposed, Syngress, 2005, pp. 19-63.
  15. Ross J. Anderson and Ross Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems, 1st edition, Wiley, 2001, ISBN: 0471389226, Chapter 20.
  16. G. S. Mouzakitis, “The E-Learning: The Six Important wh…?” , procedia Social and Behavioral Sciences (1), pp. 2595-2599. 2009.
  17. G. Kambourakis, D. N. Kontoni, A. Rouskas, S. Gritzalis, “ A PKI approach for deploying modern secure distributed e-learning and m-learning environments”, Computers and Education (48), pp. 1-16, 2007.
  18. S. Adibi, “A remote interactive non-repudiation multimedia based m-learning system”, Telematics and informatics (27), pp. 377-393, 2010.
  19. G. Darab, Gh. A. Montazer, “An eclectic model for assessing e-learning readiness in the Iranian universities”, Computers and educations (56), pp. 900-910, 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Electronic Learning Security Author Educational Content