Skip to main content

Global Triumph or Exploitation of Security and Privacy Concerns in E-Learning Systems

  • Conference paper
  • First Online:

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 630))

Abstract

This paper identifies the causes of privacy concerns which emerged when an educational institution launched an automated proctoring technology to examine E-Learners. In the modern era of information, privacy is an integral concern due to its fluid, dynamic and complex nature. In certain situations where it is very difficult to understand the privacy concerns, privacy is often misunderstood by the interactive systems designers. The qualitative data in this research was collected using content analysis approach from 120 online bloggers and useful insights were found; those that pertained to the privacy concerns for E-Learners. The findings revealed both practical and theoretical implications for both the institutions offering online courses and organization designing tools for proctoring.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Dharmawansa, A.D., Nakahira, K.T., Fukumura, Y.: Detecting eye blinking of a real-world student and introducing to the virtual e-learning environment. Procedia Comput. Sci. 22, 717–726 (2013)

    Article  Google Scholar 

  2. Alw, N., Fan, I.S.: E-learning and information security management. Int. J. Digital Soc. 1(2) (2010)

    Google Scholar 

  3. Besiki, S., Gasser, L., Twidale, M.B., Smith, L.C.: A framework for information quality assessment. J. Am. Soc. Inform. Sci. Technol. 58(12), 1720–1733 (2007)

    Article  Google Scholar 

  4. Buyukozkan, G., Ruan, D., Feyzioglu, O.: Evaluating e-learning web site quality in a fuzzy environment. Int. J. Intell. Syst. 22(5), 567–586 (2007)

    Article  Google Scholar 

  5. Chen, Y., He, W.: Security risks and protection in online learning: a survey. Int. Rev. Res. Open Distance Learn. (2013). http://www.irrodl.org/index.php/irrodl/article/view/1632/2712

  6. Craciunas, S., Elsek, I.: The standard model of an e-learning platform, chap. 2, Bucharest, Romania (2009)

    Google Scholar 

  7. Diaz, V., Golas, J., Gautsch, S.: Privacy Considerations in Cloud-Based Teaching and Learning Environments. EDUCAUSE (2010)

    Google Scholar 

  8. Dobre, I.: Critical study of the present e-learning systems, chap. 2, Academia Romana, Romania (2010)

    Google Scholar 

  9. Elo, S., Kynga, H.: The qualitative content analysis process. J. Adv. Nurs. 62, 107–115 (2007)

    Article  Google Scholar 

  10. Franzosi, R.: Content analysis: objective, systematic, and quantitative description of content. In: SAGE Benchmarks in Social Research Methods: Content Analysis, pp. 2–43 (2008)

    Google Scholar 

  11. Graneheim, U.H., Lundman, B.: Qualitative content analysis in nursing research: concepts, procedures and measures to achieve trustworthiness. Nurse Educ. Today 24, 105–112 (2004)

    Article  Google Scholar 

  12. Garber, L.: The challenges of securing the virtualized environment. Computer, 17–23 (2012). [5] Social Media and Data

    Google Scholar 

  13. Johnson, H.: Dialogue and the construction of knowledge in e-learning: exploring students’ perceptions of their learning while using blackboard’s asynchronous discussion board. Eur. J. Open, Distance E-Learn. ISSN 1027-5207 (2007)

    Google Scholar 

  14. Kondracki, N.L., Wellman, N.S., Amundson, D.R.: Content analysis: review of methods and their applications in nutrition education. J. Nutr. Educ. Behav. 34(4), 224–230 (2002)

    Article  Google Scholar 

  15. Kultan, J.: Issledovanije ispoľzovanija LMS Moodle v processe obučenija, pp. 295–300. Izdateľstvo Juniversum, Kazaň (2011)

    Google Scholar 

  16. Manadhata, P.K., Wing, J.M.: An attack surface metric. IEEE Trans. Softw. Eng. 37(3), 371–386 (2011)

    Article  Google Scholar 

  17. Meyer, J.P., Zhu, S.: Fair and equitable measurement of student learning in MOOCs: an introduction to item response theory, scale linking, and score equating. Res. Pract. Assess. 8(1), 26–39 (2013)

    Google Scholar 

  18. Moneo, J.M., Caballe, S., Prieot, J.: Security in learning management systems. eLearning Papers (2012). Catalonia, Spain

    Google Scholar 

  19. Neville, K., Heavin, C.: Using social media to support the learning needs of future IS security professionals. Electron. J. E-Learn. 11(1), 29–38 (2013)

    Google Scholar 

  20. Patel, A., Taghavi, M., Júnior, J.C., Latih, R., Zin, A.M.: Safety measures for social computing in wiki learning environment. Int. J. Inf. Secur. Priv. (IJISP) 6(2), 1–15 (2012)

    Article  Google Scholar 

  21. Pendegraft, N., Rounds, M., Stone, R.W.: Factors influencing college students’ use of computer security. Int. J. Inf. Secur. Priv. (IJISP) 4(3), 51–60 (2010)

    Article  Google Scholar 

  22. Sasikumar, M.: E-learning: opportunity and challenges (2013). http://www.cdacmumbai.in/design/corporate_site/override/pdf-doc/elearning.pdf

  23. Song, K., Lee, S.M., Nam, S.C.: Combined biometrics for e-learning security. ISA 2-13 ASTL 21, 247–251 (2013)

    Google Scholar 

  24. Srivastava, A., Sinha, S.: Information security through e-learning using VTE. Int. J. Electron. Comput. Sci. Eng. 2(18), 528–531 (2013)

    Google Scholar 

  25. Zuev, V.I.: E-learning security models. Manag. Inf. Syst. 7(2), 024–028 (2012)

    MathSciNet  Google Scholar 

  26. Wang, F., Ge, B., Zhang, L., Chen, Y., Xin, Y., Li, X.: A system framework of security management in enterprise systems. Syst. Res. Behav. Sci. 30, 287–299 (2013)

    Article  Google Scholar 

  27. Chen, Y., He, W.: Security risks and protection in online learning: a survey. Int. Rev. Res. Open Distance Learn. 14(5), 108–127 (2013)

    Google Scholar 

  28. Zuev, V.: E-learning security models. Management 7(2), 24–28 (2012)

    MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Asim Majeed .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Majeed, A., Baadel, S., Haq, A.U. (2016). Global Triumph or Exploitation of Security and Privacy Concerns in E-Learning Systems. In: Jahankhani, H., et al. Global Security, Safety and Sustainability - The Security Challenges of the Connected World. ICGS3 2017. Communications in Computer and Information Science, vol 630. Springer, Cham. https://doi.org/10.1007/978-3-319-51064-4_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-51064-4_28

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-51063-7

  • Online ISBN: 978-3-319-51064-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics