Advertisement

© 2005

Security in E-Learning

  • Discusses typical threats to e-learning projects and introduces how these issues have been and should be addressed. This knowledge is essential to conduct a security risk analysis effectively, because participants need to be aware of common threats, protection mechanisms and effort/cost issues

  • Based on the security risk analysis, appropriate preventive measures are thoroughly discussed

Book
  • 7.8k Downloads

Part of the Advances in Information Security book series (ADIS, volume 16)

Table of contents

  1. Front Matter
    Pages I-XVIII
  2. Quick Start

    1. Pages 3-11
    2. Pages 13-19
    3. Pages 21-34
    4. Pages 35-48
    5. Pages 49-53
  3. In-Depth

  4. Additional Resources

  5. Back Matter
    Pages 173-185

About this book

Introduction

Security in E-Learning is organized in three parts. First, the author raises awareness that security is an important issue in the context of education. The second part of the book emphasizes that security is mainly an organizational and management issue. The third goal highlights improving security as an ongoing process. Security in E-Learning includes technical fundamentals (buzz words), examples and case studies covering each of these three topics.

Considering the enormous costs of creating and maintaining courses, it is surprising that security is not yet considered an important issue by professionals, professors and students. Traditional security research has been largely driven by military requirements to enforce secrecy in the realm of e-learning. In most cases, the knowledge contained in e-learning programs is widely available. Therefore, the asset is not the information itself, but the hypermedia presentation used to convey the information.

Security in E-Learning is designed for a professional audience composed of researchers and practitioners in industry and IT professionals. This volume is also suitable for upper undergraduate-level and graduate-level students in computer science.

Keywords

Access access control authentication computer science cryptography design object oriented design privacy security

Authors and affiliations

  1. 1.Vienna University of Technology - IFSViennaAustria

Bibliographic information

Industry Sectors
Biotechnology
IT & Software
Telecommunications
Aerospace
Engineering
Finance, Business & Banking
Electronics

Reviews

"In this nice, compact, and concentrated work, the reader is taught almost all of the notions of information systems security. Weippl adapts the presentation of the book's material for people involved in e-learning. He also touches on many subjects -- there are, fore example, tutorials on risk analysis and cryptography. ...

No person involved in e-learning should miss this book."

C.S. Chassapis, Computing Reviews, Jan. 2006