Download e-book for iPad: Security in E-Learning by Edgar Weippl (auth.)

By Edgar Weippl (auth.)

Security in E-Learning is geared up in 3 components. First, the writer increases know-how that defense is a crucial factor within the context of schooling. the second one a part of the publication emphasizes that defense is especially an organizational and administration factor. The 3rd target highlights enhancing protection as an ongoing method. Security in E-Learning comprises technical basics (buzz words), examples and case reports masking every one of those 3 subject matters.

Considering the large charges of constructing and conserving classes, it's excellent that protection isn't really but thought of a tremendous factor by means of pros, professors and scholars. conventional safeguard study has been mostly pushed by way of army specifications to implement secrecy within the realm of e-learning. more often than not, the data contained in e-learning courses is greatly on hand. as a result, the asset isn't the details itself, however the hypermedia presentation used to show the information.

Security in E-Learning is designed for a qualified viewers composed of researchers and practitioners in and IT pros. This quantity is additionally compatible for top undergraduate-level and graduate-level scholars in machine science.

Show description

Read Online or Download Security in E-Learning PDF

Similar network security books

Read e-book online Juniper Networks Secure Access SSL VPN Configuration Guide PDF

Juniper Networks safe entry SSL VPN home equipment supply a whole variety of distant entry home equipment for the smallest businesses as much as the biggest carrier services. As a process administrator or safeguard expert, this entire configuration advisor will let you configure those home equipment to permit distant and cellular entry for workers.

Android Application Security: A Semantics and Context-Aware - download pdf or read online

This SpringerBrief explains the rising cyber threats that undermine Android software safeguard. It additional explores the chance to leverage the state-of-the-art semantics and context–aware innovations to guard opposed to such threats, together with zero-day Android malware, deep software program vulnerabilities, privateness breach and inadequate protection warnings in app descriptions.

Download e-book for iPad: Practical Information Security Management: A Complete Guide by Tony Campbell

Create applicable, security-focused enterprise propositions that give some thought to the stability among rate, probability, and usefulness, whereas beginning your trip to turn into a knowledge protection supervisor. masking a wealth of data that explains precisely how the works this day, this e-book makes a speciality of how one can arrange an efficient info safeguard perform, lease the appropriate humans, and strike the simplest stability among defense controls, expenditures, and hazards.

Extra info for Security in E-Learning

Example text

3 How to Improve Security in Teaching This section will address the question how courses, administrative work and exams can be made more secure. There is no straightforward answer to this question. Identifying the relevant risks to specific courses is best done by means of a risk analysis (Chapter 7). However, by obeying some basic rules one can minimize the most substantial risks. This section addresses instructor-led e-learning. Many aspects, however, can easily be applied to self-paced e-learning as well.

Does the policy identify who else receives the data? 9. Does the policy explain how often the data is distributed? 10. Does the policy define how permanent the data is? 11. Does the policy describe how to correct/update/delete data? 40 Edgar R. Weippl 12. Does the policy offer an opt-out feature? 13. Does the policy include special handling for children? 14. Does the policy include contact information? 3 Legal Foundations Faculty and students tend to neglect legal aspects because they are usually more interested in their field of studies — unless, of course, they are faculty in a school of law.

For instance, students may not want to share private notes they made and even if they do, they want to decide who should have access to these notes. Many e-learning system create log files that record the user name, date and time of each viewed page and the location (IP address) of the user. Although content authors and teacher may like these feedback and Security in E-Learning evaluation mechanisms, the fact that one is being observed while reading may be very disturbing. E-learning systems that provide self-study content are comparable to traditional college libraries and should therefore offer the same amount of privacy.

Download PDF sample

Rated 4.11 of 5 – based on 46 votes