Abstract
This paper identifies the causes of privacy concerns which emerged when an educational institution launched an automated proctoring technology to examine E-Learners. In the modern era of information, privacy is an integral concern due to its fluid, dynamic and complex nature. In certain situations where it is very difficult to understand the privacy concerns, privacy is often misunderstood by the interactive systems designers. The qualitative data in this research was collected using content analysis approach from 120 online bloggers and useful insights were found; those that pertained to the privacy concerns for E-Learners. The findings revealed both practical and theoretical implications for both the institutions offering online courses and organization designing tools for proctoring.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Dharmawansa, A.D., Nakahira, K.T., Fukumura, Y.: Detecting eye blinking of a real-world student and introducing to the virtual e-learning environment. Procedia Comput. Sci. 22, 717–726 (2013)
Alw, N., Fan, I.S.: E-learning and information security management. Int. J. Digital Soc. 1(2) (2010)
Besiki, S., Gasser, L., Twidale, M.B., Smith, L.C.: A framework for information quality assessment. J. Am. Soc. Inform. Sci. Technol. 58(12), 1720–1733 (2007)
Buyukozkan, G., Ruan, D., Feyzioglu, O.: Evaluating e-learning web site quality in a fuzzy environment. Int. J. Intell. Syst. 22(5), 567–586 (2007)
Chen, Y., He, W.: Security risks and protection in online learning: a survey. Int. Rev. Res. Open Distance Learn. (2013). http://www.irrodl.org/index.php/irrodl/article/view/1632/2712
Craciunas, S., Elsek, I.: The standard model of an e-learning platform, chap. 2, Bucharest, Romania (2009)
Diaz, V., Golas, J., Gautsch, S.: Privacy Considerations in Cloud-Based Teaching and Learning Environments. EDUCAUSE (2010)
Dobre, I.: Critical study of the present e-learning systems, chap. 2, Academia Romana, Romania (2010)
Elo, S., Kynga, H.: The qualitative content analysis process. J. Adv. Nurs. 62, 107–115 (2007)
Franzosi, R.: Content analysis: objective, systematic, and quantitative description of content. In: SAGE Benchmarks in Social Research Methods: Content Analysis, pp. 2–43 (2008)
Graneheim, U.H., Lundman, B.: Qualitative content analysis in nursing research: concepts, procedures and measures to achieve trustworthiness. Nurse Educ. Today 24, 105–112 (2004)
Garber, L.: The challenges of securing the virtualized environment. Computer, 17–23 (2012). [5] Social Media and Data
Johnson, H.: Dialogue and the construction of knowledge in e-learning: exploring students’ perceptions of their learning while using blackboard’s asynchronous discussion board. Eur. J. Open, Distance E-Learn. ISSN 1027-5207 (2007)
Kondracki, N.L., Wellman, N.S., Amundson, D.R.: Content analysis: review of methods and their applications in nutrition education. J. Nutr. Educ. Behav. 34(4), 224–230 (2002)
Kultan, J.: Issledovanije ispoľzovanija LMS Moodle v processe obučenija, pp. 295–300. Izdateľstvo Juniversum, Kazaň (2011)
Manadhata, P.K., Wing, J.M.: An attack surface metric. IEEE Trans. Softw. Eng. 37(3), 371–386 (2011)
Meyer, J.P., Zhu, S.: Fair and equitable measurement of student learning in MOOCs: an introduction to item response theory, scale linking, and score equating. Res. Pract. Assess. 8(1), 26–39 (2013)
Moneo, J.M., Caballe, S., Prieot, J.: Security in learning management systems. eLearning Papers (2012). Catalonia, Spain
Neville, K., Heavin, C.: Using social media to support the learning needs of future IS security professionals. Electron. J. E-Learn. 11(1), 29–38 (2013)
Patel, A., Taghavi, M., Júnior, J.C., Latih, R., Zin, A.M.: Safety measures for social computing in wiki learning environment. Int. J. Inf. Secur. Priv. (IJISP) 6(2), 1–15 (2012)
Pendegraft, N., Rounds, M., Stone, R.W.: Factors influencing college students’ use of computer security. Int. J. Inf. Secur. Priv. (IJISP) 4(3), 51–60 (2010)
Sasikumar, M.: E-learning: opportunity and challenges (2013). http://www.cdacmumbai.in/design/corporate_site/override/pdf-doc/elearning.pdf
Song, K., Lee, S.M., Nam, S.C.: Combined biometrics for e-learning security. ISA 2-13 ASTL 21, 247–251 (2013)
Srivastava, A., Sinha, S.: Information security through e-learning using VTE. Int. J. Electron. Comput. Sci. Eng. 2(18), 528–531 (2013)
Zuev, V.I.: E-learning security models. Manag. Inf. Syst. 7(2), 024–028 (2012)
Wang, F., Ge, B., Zhang, L., Chen, Y., Xin, Y., Li, X.: A system framework of security management in enterprise systems. Syst. Res. Behav. Sci. 30, 287–299 (2013)
Chen, Y., He, W.: Security risks and protection in online learning: a survey. Int. Rev. Res. Open Distance Learn. 14(5), 108–127 (2013)
Zuev, V.: E-learning security models. Management 7(2), 24–28 (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this paper
Cite this paper
Majeed, A., Baadel, S., Haq, A.U. (2016). Global Triumph or Exploitation of Security and Privacy Concerns in E-Learning Systems. In: Jahankhani, H., et al. Global Security, Safety and Sustainability - The Security Challenges of the Connected World. ICGS3 2017. Communications in Computer and Information Science, vol 630. Springer, Cham. https://doi.org/10.1007/978-3-319-51064-4_28
Download citation
DOI: https://doi.org/10.1007/978-3-319-51064-4_28
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-51063-7
Online ISBN: 978-3-319-51064-4
eBook Packages: Computer ScienceComputer Science (R0)