Portable devices of security and privacy preservation for e-learning

被引:0
|
作者
Yong, Jianming [1 ]
Li, Jiuyong [2 ]
Wang, Hua [3 ]
机构
[1] Univ So Queensland, Sch Informat System, Fac Business, Toowoomba, Qld 4350, Australia
[2] Univ South Australia, Sch Comput & Informat Sci, Adelaide, SA, Australia
[3] Univ Southern Queensland, Dept Math & Comput, Adelaide, SA, Australia
关键词
e-learning; security; privacy preservation; security and privacy architecture;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper systematically addresses the security and pricacy concerns for e-learning systems. An effective architecture of e-learning system is proposed for a thorough overview on security and privacy issues related to current e-learning systems. This paper further examines the relationship among security & privacy policy, available security & privacy technolongy, and the degree of e-learning privacy & security. This paper significantly contributes to the knowledge of e-learning security & privacy research communities and will generate more research interests in this regard.
引用
下载
收藏
页码:1029 / +
页数:2
相关论文
共 50 条
  • [31] Privacy in E-learning: How to Implement Anonymity
    Weippl, Edgar R.
    Tjoa, A. Min
    3RD ACS/IEEE INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, 2005, 2005,
  • [32] Impact of adoption of e-learning with portable electronic devices on myopia development and progression in primary schoolchildren
    Lam, Carly S. Y.
    Tang, Wing Chun
    INVESTIGATIVE OPHTHALMOLOGY & VISUAL SCIENCE, 2018, 59 (09)
  • [33] Privacy preservation and information security protection for patients' portable electronic health records
    Huang, Lu-Chou
    Chu, Huei-Chung
    Lien, Chung-Yueh
    Hsiao, Chia-Hung
    Kao, Tsair
    COMPUTERS IN BIOLOGY AND MEDICINE, 2009, 39 (09) : 743 - 750
  • [34] The role of mobile devices in e-learning -: First experiences with a Wireless E-Learning Environment
    Lehner, F
    Nösekabel, H
    IEEE INTERNATIONAL WORKSHOP ON WIRELESS AND MOBILE TECHNOLOGIES IN EDUCATION, PROCEEDINGS, 2002, : 103 - 106
  • [35] Adversarial learning techniques for security and privacy preservation: A comprehensive review
    Hathaliya, Jigna J.
    Tanwar, Sudeep
    Sharma, Priyanka
    SECURITY AND PRIVACY, 2022, 5 (03):
  • [36] E-Learning Software Security Tested for Security Vulnerabilities & Issues
    Violettas, George E.
    Theodorou, Tryfon L.
    Stephanides, George C.
    2013 FOURTH INTERNATIONAL CONFERENCE ON E-LEARNING "BEST PRACTICES IN MANAGEMENT, DESIGN AND DEVELOPMENT OF E-COURSES: STANDARDS OF EXCELLENCE AND CREATIVITY, 2013, : 233 - 240
  • [37] INFORMATION SECURITY ASPECTS OF E-LEARNING SYSTEMS
    Paulins, Nauris
    AICT2010 - APPLIED INFORMATION AND COMMUNICATION TECHNOLOGIES, PROCEEDINGS OF THE 4TH INTERNATIONAL SCIENTIFIC CONFERENCE, 2010, : 142 - 147
  • [38] CYBER SECURITY CONCERNS IN E-LEARNING EDUCATION
    Bandara, I.
    Ioras, F.
    Maher, K.
    ICERI2014: 7TH INTERNATIONAL CONFERENCE OF EDUCATION, RESEARCH AND INNOVATION, 2014, : 728 - 734
  • [39] Privacy in e-learning: anonymity, pseudonyms and authenticated usage
    Weippl, Edgar R.
    Tjoa, A. Min
    INTERACTIVE TECHNOLOGY AND SMART EDUCATION, 2005, 2 (04) : 247 - +
  • [40] Security challenges of distributed e-learning systems
    Cárdenas, RG
    Sánchez, EM
    ADVANCED DISTRIBUTED SYSTEMS, 2005, 3563 : 538 - 544