Security in E-Learning

Edgar R. Weippl, Vienna University of Technology, Austria

Introduction

E-Learning

Security

Organization of This Chapter

Security Risk Analysis

Scope and Importance

Standard Method

Case Study: Tutorial and E-learning Module

From Requirements to Designing and Implementing Solutions

General Discussion

Secrecy of Uploaded Data (Preventing Unauthorized Views)

Privacy of Usage (Tracing Users)

Case Study: Moodle

Outlook: Security in M-learning

In-Class Teaching

Notification Services

Registration Service

Field Data

Solutions for Authentication

Conclusion

Glossary

Cross References

References

INTRODUCTION

This brief introductory section begins by defining the term e-learning. I then provide a brief overview of security issues relevant to understanding the subsequent sections. The last subsection explains how the rest of this chapter is organized.

E-Learning

E-learning has been a buzzword for quite some time and is recently gaining even more importance. In this chapter, the term e-learning encompasses both Web-based distance education and Web-sites supplementing in-class teaching. Such course sites typically offer downloads of additional reading, online forums, journals, quizzes, and so on. The chapter does not explicitly cover non-Web-based forms of e-learning such as computer-based training (CBT) on CD-ROMs.

Research in e-learning is multidisciplinary, combining very different research areas. Some publications focus on the teaching process and pedagogical issues; ...

Get Handbook of Information Security, Volume 1, Key Concepts, Infrastructure, Standards, and Protocols now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.