Architecture of Combined e-Learning Environment and Investigation of Secure Access and Privacy Protection

Author(s):  
Radi Romansky ◽  
Irina Noninska

The contemporary digital world based on network communications, globalization and information sharing outlines new important targets in the area of privacy and personal data protection which reflect to applied principles of secure access to proposed information structures. In this reason the aim of secure access to all resources of an e-learning environment is very important and adequate technological and organizational measures for authentication, authorization and protection of personal data must be applied. Strong security procedures should be proposed to protect user's profiles, designed after successful registration and all personal information collected by educational processes. The goal of this article is to present an idea to combine traditional e-learning technologies with new opportunities that give mobile applications, cloud services and social computing. These technologies can endanger data security since they make possible remote access to resources, sharing information between participants by network communications. In order to avoid data vulnerabilities users must be identified and authenticated before, i.e. to be allowed to access information resources otherwise integrity and confidentiality of e-learning system could be destroyed. In order to propose solution basic principles of information security and privacy protection in e-learning processes are discussed in this article. As a result, an organizational scheme of a system for information security and privacy is proposed. Based on these principles a graph formalization of access to the system resources is made and architecture for combined (heterogenic) e-learning architecture with secure access to the resources is designed. Analytical investigation based on designed Markov chain has been carried out and several statistical assessments delivered by Develve software are discussed.

Author(s):  
Radi Petrov Romansky ◽  
Irina Stancheva Noninska

The contemporary digital world based on network communications, globalization and information sharing outlines new important targets in the area of privacy and personal data protection which reflect to applied principles of secure access to proposed information structures. In this reason the aim of secure access to all resources of an e-learning environment is very important and adequate technological and organizational measures for authentication, authorization and protection of personal data must be applied. Strong security procedures should be proposed to protect user's profiles, designed after successful registration and all personal information collected by educational processes. The goal of this article is to present an idea to combine traditional e-learning technologies with new opportunities that give mobile applications, cloud services and social computing. These technologies can endanger data security since they make possible remote access to resources, sharing information between participants by network communications. In order to avoid data vulnerabilities users must be identified and authenticated before, i.e. to be allowed to access information resources otherwise integrity and confidentiality of e-learning system could be destroyed. In order to propose solution basic principles of information security and privacy protection in e-learning processes are discussed in this article. As a result, an organizational scheme of a system for information security and privacy is proposed. Based on these principles a graph formalization of access to the system resources is made and architecture for combined (heterogenic) e-learning architecture with secure access to the resources is designed. Analytical investigation based on designed Markov chain has been carried out and several statistical assessments delivered by Develve software are discussed.


Author(s):  
Radi Petrov Romansky ◽  
Irina Stancheva Noninska

Globalization in the contemporary information society outlines new important challenges in privacy and personal data protection that apply to user security in cyberspace. This is also the case e-learning environments, which use new network technologies, such as remote access, distributed processing, information sharing, cloud services, social computing, etc. Strong security procedures based on authentication, authorization, and data protection should be proposed to protect system resources, user profiles, personal information, educational materials, and other specific information. The chapter presents the opportunities and challenges of some digital technologies that could increase the effectiveness of e-learning processes by developing a combined e-learning environment. A functional architecture with two sub-systems (front office and back office) and different information resources (public, internal, external) is discussed. Investigation by using formalization and modelling is made and assessments are presented.


2018 ◽  
Vol 8 (3) ◽  
pp. 120 ◽  
Author(s):  
Kiyoshi Nagata ◽  
Yutaka Kigawa ◽  
Tomoko Aoki

In Japanese higher educational institutions as in universities, many studies and practices on e-learning have been reported, but the state of trial and errors are still continuing. Thus, we propose the construction of an e-learning system incorporating not only with learner's consciousness but also with their learning style. Our proposing system is consistent of three individual parts and one integration phase. The first part is composed of tools, methods, and facilities used to provide the e-learning environment. The second part is composed of theoretical or practical works on learning styles. The third part is composed of learner’s consciousness factors on information security which we have studied so far. In the integration phase, the components of e-learning discussed in the first part are evaluated from learning style related psychological aspects. In the paper, we propose a trial version of e-learning system which includes several types of content with proper links to information security factors and to learning styles.


2010 ◽  
Vol 171-172 ◽  
pp. 523-526
Author(s):  
Fu Lei Zhang

The Chinese government is pursuing e-learning policies which makes job-training with a knowledge-based society. To explain more fully the important role of the e-learning environment, this article undertakes some typical examples of the governments' job-training under e-learning environment. The main problems in servants' job-training in China are the low quantity in the servants' training, short of restriction, the uniform manner in the training and less fairness and availability of opportunities for educational training. In order to develop the e-learning system, the civil servant's job training policies are provided and the measures of the effective e-learning system are designed.


Author(s):  
Ravish G K ◽  
Thippeswamy K

In the current situation of the pandemic, global organizations are turning to online functionality to ensure survival and sustainability. The future, even though uncertain, holds great promise for the education system being online. Cloud services for education are the center of this research work as they require security and privacy. The sensitive information about the users and the institutions need to be protected from all interested third parties. since the data delivery on any of the online systems is always time sensitive, the have to be fast. In previous works some of the algorithms were explored and statistical inference based decision was presented. In this work a machine learning system is designed to make that decision based on data type and time requirements.


Author(s):  
Lorna Uden

Recently the e-learning community has begun to view the e-learning environment as a self-sustaining ecosystem that provides learners with the tools and surroundings they need to achieve their learning. An e-learning ecosystem is a community where organisms interact with one another and with their physical environment. Every organism has a role to fulfil and there must be a harmonious balance between all aspects of the ecosystem in order for the organisms to flourish and evolve. An e-learning system can be considered as a service system—the application of competences for the benefit of another. What exactly are the characteristics of an e-learning ecosystem and how can e-learning professionals create such an ecosystem that provide values for the different elements of the e-learning ecosystem? This chapter shows the concepts of service ecosystems that can be used to design an effective e-learning ecosystem that will provide value to the different stakeholders involved.


Author(s):  
Simon Schwingel ◽  
Gottfried Vossen ◽  
Peter Westerkamp

E-learning environments and their system functionalities resemble one another to a large extent. Recent standardization efforts in e-learning concentrate on the reuse of learning material only, but not on the reuse of application or system functionalities. The LearnServe system, under development at the University of Muenster, builds on the assumption that a typical learning system is a collection of activities or processes that interact with learners and suitably chosen content, the latter in the form of learning objects. This enables us to divide the main functionality of an e-learning system into a number of stand-alone applications or services. The realization of these applications based on the emerging technical paradigm of Web services then renders a wide reuse of functionality possible, thereby giving learners a higher flexibility of choosing content and functionalities to be included in their learning environment. In such a scenario, it must be possible to maintain user identity and data across service and server boundaries. This chapter presents an architecture for implementing user authentication and the manipulation of user data across several Web services. In particular, it demonstrates how to exploit the SPML and SAML standards so that cross-domain single sign-on can be offered to the users of a service-based learning environment. The chapter also discusses how this is being integrated into LearnServe.


2013 ◽  
Vol 4 (2) ◽  
pp. 9-18
Author(s):  
Mohd Faiz Hilmi ◽  
Shahrier Pawanchik ◽  
Yanti Mustapha ◽  
Hafizi Muhamad Ali

The advancement of information technology has changed the education landscape. The process of teaching is no longer the same. Information technology has made e-learning possible and available on a large scale. The main component of an e-learning is a learning management system (LMS). LMS has been widely used and are accessible through the Internet. By connected and accessed to the Internet, LMS are exposed to various threats. Proper understanding of these threats combined with strategy and best practices countermeasures will ensure a safe learning environment. Therefore this study will look into the information security aspect of LMS. There are two main purpose of this study. First, this study provides a review of information security in e-learning environments and explains the important of information security. Confidentiality, integrity and availability are considered to be the primary pillars of information security. In addition to these pillars, the International Information Systems Security Certification Consortium introduced a common body of knowledge (CBK) comprised of ten domains relating to specific information security topics. These domains are the foundation of security practices for those involved in information security. In this article, each of these is explained within an e-learning context. It is recommended that institutions employing e-learning adhere to these domains. By applying the principles and practices associated with each domain, e-learning institutions should be able to provide an e-learning system with high confidentiality, integrity and availability. The second purpose of this study is to understand student perception of an information security perspective of an e-learning management system. To achieve this purpose, a survey was conducted targeted at undergraduate students in a distance learning program. 497 students responded to a survey questionnaires. Apart from demographics information, the survey asked the respondent to rate six statements related to how they perceived security of the learning management system which they are currently using. All six statements are rated using a five point Likert scale anchored at 1 (Not at all) to 5 (Very much). Frequencies analysis was conducted to show the profile of the respondent. Overall, respondent has strong positive perceptions towards security of their LMS. This study provides an overall picture of information security elements of a learning management system. It can serve as an introduction which help LMS administrator to understand the issues and possibilities related to the safety of LMS.


Author(s):  
Lilyana Nacheva-Skopalik ◽  
Steve Green

Access to education is one of the main human rights. Everyone should have access to education and be capable of benefiting from it. However there are a number who are excluded, not because of a lack of ability but simply because they have a disability or specific need which current education systems do not address. A learning system in which content, tools and interfaces can be personalised and adapted to the individual needs and preferences of a variety of learners, including those with disabilities, becomes inclusive. Assessment is an integral part of an e-learning environment and therefore it has to provide not only inclusive e-learning content but also inclusive e-assessment. The proposed research investigates an intelligent adaptable e-learning system for assessing students' level of skill, knowledge and understanding regardless of their disabilities or accessibility needs. It is based on an innovative use of world's first open source adaptable widget design and authoring toolkit (WIDGaT) as the prototyping environment.


Sign in / Sign up

Export Citation Format

Share Document