Filters








709,197 Hits in 4.8 sec

Security Concerns and Remedy in a Cloud Based E-learning System [chapter]

Md. Anwar Hossain Masud, Md. Rafiqul Islam, Jemal Abawajy
2013 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
Cloud technology has numerous advantages over the existing traditional e-learning systems. However security is a major concern in cloud based e-learning.  ...  These will help to overcome the security threats in cloud based e-learning technology.  ...  Privacy and Security in E-Learning Security and privacy problems appear in e-learning because of operation mechanism and policy mechanism.  ... 
doi:10.1007/978-3-319-04283-1_22 fatcat:bqxylcz4jzdvnhizim4se6bdmm

Information System Security Risk Management E-Learning Using FMEA in University

2020 International Journal of Advanced Trends in Computer Science and Engineering  
In online learning, information system security risk management can use the FMEA platform to analyze data security and minimize risks that occur.  ...  In the process of learning system risk is a point that must be considered.  ...  Teaching and learning activities using the E-Learning system are something new for some universities, so they do not yet have an adequate E-Learning system.  ... 
doi:10.30534/ijatcse/2020/93952020 fatcat:w4vwbjnfpjewvbakvzu4k5rgte

Integrated E-Learning 2.0 for Knowledge Management System in Organization

Walid Qassim Qwaider
2014 International Journal for e-Learning Security  
The aim of this study was to explore the role of e-learning 2.0 in knowledge management.  ...  This paper integrates e-learning and knowledge management systems and technology to improve the organization and the arrest of the study also tries to investigate how to manage organizations, e-learning  ...  E-learning systems have been evolving with the World Wide Web as a whole, and to change the e-learning, a term coined by New Stephen.  ... 
doi:10.20533/ijels.2046.4568.2014.0044 fatcat:3jrxdktseva4fo47ud6mi4foau

Tracks Analysis in Learning Systems: A Prescriptive Approach

Sébastien Iksal
2011 International Journal for e-Learning Security  
Nowadays, numerous teachers are using Technology Enhanced Learning systems in various domains.  ...  The tracks analysis concerning students' actions logged by Technology Enhanced Learning systems can help teachers to improve their pedagogical scenarios making them more relevant to students.  ...  In order to facilitate the appropriation, the comprehension and the interpretation of results by instructional designers, who are the main actors of an e-learning system development process, we think they  ... 
doi:10.20533/ijels.2046.4568.2011.0001 fatcat:fador3o3jbeylazhelmebmgbma

Security Applications of Optical Face Recognition System: Access Control in E-Learning

Rieko Inaba, Eriko Watanabe, Kashiko Kodate
2003 Optical Review  
The educational system has gradually shifted from a face-to-face to an e-learning system, which has become prevalent in advanced countries with the advance of information technology, and connection of  ...  Against this background, an individual certification system is proposed particularly for access control in e-1earning, Under our proposed system, a compact optical correlator for facial recognition is  ...  Hiroshi Koizumi of Topcon Research Center for his support in fabricating the compact optical parallel correlator.  ... 
doi:10.1007/s10043-003-0255-9 fatcat:j2jlopybffdo3lezprnosqny24

Security Enhancement Using Cache Based Reauthentication in WiMAX Based E-Learning System

Chithra Rajagopal, Kalaavathi Bhuvaneshwaran
2015 The Scientific World Journal  
In E-Learning systems the users must be forced to perform reauthentication to overcome the session hijacking problem.  ...  The reauthentication of users introduces frequent delay in the data access which is crucial in delaying sensitive applications such as E-Learning.  ...  To improve the security in WiMAX based E-Learning system, the users of E-Learning systems are forced to perform reauthentication after a predetermined period of time.  ... 
doi:10.1155/2015/878327 pmid:26351658 pmcid:PMC4553329 fatcat:uhcshymapjgnfds7vbqbxf3jwu

Security Challenges of Distributed e-Learning Systems [chapter]

Roberto Gómez Cárdenas, Erika Mata Sánchez
2005 Lecture Notes in Computer Science  
The purpose of this paper is to give an in-depth understanding of most important security challenges that can be relevant for distributed e-learning systems.  ...  Because e-learning systems are open, distributed and interconnected, then security becomes an important challenge in order to insure that interested actors only have access to the right information at  ...  Major security challenges of distributed e-learning applications are described in section 4. Finally, we present some conclusions.  ... 
doi:10.1007/11533962_49 fatcat:sapm3rvuendbbhbgymqexcpwsi

A Novel Secure E-Contents System for Multi-Media Interchange Workflows in E-Learning Environments

Shadi R. Masadeh, Bilal Abul Huda, Nidal M. Turab
2013 International Journal of Computer Networks & Communications  
The main objective of this research is to build a novel multi-media security system (encrypting / decrypting system) that will enable E-learning to exchange more secured multi-media data/information.  ...  for all workers on this network to work in securely environment.  ...  In this paper we propose a novel multi-media security system (encrypting / decrypting system) that will enable E-learning to exchange more secured multi-media data/information.  ... 
doi:10.5121/ijcnc.2013.5510 fatcat:hfymcigjm5aj5bumogu4qdjjvi

The Affectibility Concept in Systems for Learning Contexts

Elaine C. S. Hayashi, M. Cecília C. Baranauskas
2011 International Journal for e-Learning Security  
systems.  ...  In this paper, a literature review -and its critical analysis about existing frameworks and models -organizes the state of the art about emotional quality towards the design of learning and educational  ...  Other approaches and methods need to be tried International Journal for e-Learning Security (IJeLS), Volume 1, Issue 1, March 2011 Copyright © 2011, Infonomics Society Copyright © 2011, Infonomics  ... 
doi:10.20533/ijels.2046.4568.2011.0002 fatcat:axvkxfyyfjcrdifpiq4u7y5fdu

An agent-based framework for providing security in a cloud-based E-learning system

Adil Mahmoud Mohamed Mahmoud, College of Science and Arts (Sajir), Shaqra University, Shaqra, Saudi Arabia
2020 International Journal of Advanced and Applied Sciences  
This system monitors the data flow between the user, the E-learning platform, and the cloud-based systems focus on various security and privacy concerns that the E-healthcare environment is facing.  ...  Though, various researches have been done in the past for improving the security and privacy of this cloud-based Learning method, and complete accuracy is not achieved.  ...  In general, cloud-based E-learning is defined as the distance study of various subjects in cloud-based systems remotely and securely.  ... 
doi:10.21833/ijaas.2020.07.003 fatcat:jr3wtzh4fzh2loy6e2eio6yzne

Reducing Teachers' Cognitive Overload with a Recommender System in the Workplace

Arnoldo Rodríguez
2011 International Journal for e-Learning Security  
The assistant adapts learning support and problemsolving support according to teachers' characteristics, while they are authoring learning sessions to teach decision-making in Network Design.  ...  techniques, complex tasks or unknown environments in the workplace.  ...  We need to test a network E' with a cost attribute which is "Very costly" and a reliability attribute which is "Very High". In this case, the example E' must fit in class b to be accepted.  ... 
doi:10.20533/ijels.2046.4568.2011.0006 fatcat:yxgr2qtklfgx3lgdqdw442tb64

Data Security Analysis Using Unsupervised Learning and Explanations [chapter]

G. Corral, E. Armengol, A. Fornells, E. Golobardes
2007 Advances in Soft Computing  
Vulnerability assessment is an effective security mechanism to identify vulnerabilities in systems or networks before they are exploited.  ...  The proposed improvement consists in extracting a symbolic explanation for each cluster to help security analysts to understand the clustering solution using network security lexicon.  ...  These solutions have been combined in Consensus, an integrated computer-aided system to automate network security tests [3, 7] , and this new system is called Analia.  ... 
doi:10.1007/978-3-540-74972-1_16 dblp:series/asc/CorralAFG08 fatcat:325tks6izba6thlnxhoxtajeti

Blockchain Framework for Securing E-Learning System

Millicent N. Ubaka-Okoye
2020 International Journal of Advanced Trends in Computer Science and Engineering  
Blockchain has the potential that could provide a system with massive openness, online secure database that e-learning platforms needed.  ...  This paper recommends a blockchain framework that secures the e-learning platform.  ...  BLOCKCHAIN-BASED E-LEARNING SYSTEM The blockchain-based e-learning framework is showed in Figure 3 . The "E" represents the e-learning node with its unique node number.  ... 
doi:10.30534/ijatcse/2020/68932020 fatcat:jafi54dk4rfotdcdv5c2lwut64

Development of an e-Learning Recommender System Using Discrete Choice Models and Bayesian Theory: A Pilot Case in the Shipping Industry [chapter]

Amalia Polydoropoulou, Maria A.
2012 Security Enhanced Applications for Information Systems  
Security Enhanced Applications for Information Systems 36 This chapter presents an innovative methodology for the development of a training advisor for e-learning environments.  ...  The techniques used offer the advantage of a comparatively detailed, userfocused e-learning attributes modelling framework (advanced choice theory) and a competent system learning capability (Bayesian  ...  In specific, our e-learning recommender framework is based on advanced choice models and Bayesian techniques and is considered as an intelligent system that can be tested and reused in different e-learning  ... 
doi:10.5772/37429 fatcat:42fijuc5azbxznspzbt34vinma

Investigation of security awareness on e-learning system among lecturers and students in Higher Education Institution

Hasmanizam Abdul Majid, Mazlina Abdul Majid, Mohd Izham Ibrahim, Wan Nurul Safawati Wan Manan, Muhammed Ramiza Ramli
2015 2015 International Conference on Computer, Communications, and Control Technology (I4CT)  
Security of an e-learning system is very impor tant so that the infor mation contained in the system is not compromised.  ...  T he success and failure of any e-learning system fall on how secur e t he system is.  ...  The use of an e-learning system called iTa'leem (Innovative Teaching and Learning Environment System) has significantly improve the quality of teaching and learning at the university.  ... 
doi:10.1109/i4ct.2015.7219569 fatcat:ihkrxe7cjbconpn4pj6hy56ft4
« Previous Showing results 1 — 15 out of 709,197 results