Skip to main content
Log in

Security in online web learning assessment

Providing an effective trustworthiness approach to support e-learning teams

  • Published:
World Wide Web Aims and scope Submit manuscript

Abstract

This paper proposes a trustworthiness model for the design of secure learning assessment in on-line web collaborative learning groups. Although computer supported collaborative learning has been widely adopted in many educational institutions over the last decade, there exist still drawbacks which limit their potential in collaborative learning activities. Among these limitations, we investigate information security requirements in on-line assessment, (e-assessment), which can be developed in collaborative learning contexts. Despite information security enhancements have been developed in recent years, to the best of our knowledge, integrated and holistic security models have not been completely carried out yet. Even when security advanced methodologies and technologies are deployed in learning management systems, too many types of vulnerabilities still remain opened and unsolved. Therefore, new models such as trustworthiness approaches can overcome these lacks and support e-assessment requirements for e-Learning. To this end, a holistic security model is designed, implemented and evaluated in a real context of e-Learning. Implications of this study are remarked for secure assessment in on-line collaborative learning through effective trustworthiness approaches.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Bernthal, P.: A survey of trust in the workplace. Executive summary, HR Benchmark Group, Pittsburg, PA (1997)

  2. CSO Magazine, US Secret Service, Software Engineering Insistute CERT Program at Carnegie Mellon University, Deloitte: 2011 Cybersecurity Watch Survey. Tech. rep., CSO Magazine (2011)

  3. Dai, C., Lin, D., Bertino, E., Kantarcioglu, M.: An approach to evaluate data trustworthiness based on data provenance. In: W. Jonker, M. Petković (eds.) Secure Data Management, vol. 5159, pp. 82–98. Springer, Berlin Heidelberg (2008)

  4. Dark, M.J.: Information assurance and security ethics in complex systems: interdisciplinary perspectives. Information Science Reference, Hershey, PA (2011)

  5. Demott, J.D., Sotirov, A., Long, J.: Gray Hat Hacking, Third Edition Reviews. 3edn. McGraw-Hill Companies, New York (2011)

  6. Eibl, C.J.: Discussion of information security in e-learning. Ph.D. thesis, Universitat Siegen̈. Siegen, Germany (2010). http://dokumentix.ub.uni-siegen.de/opus/volltexte/2010/444/pdf/eibl.pdf

    Google Scholar 

  7. Ferencz, S.K., Goldsmith, C.W.: Privacy issues in a virtual learning environment. Cause/Effect, A practitioner’s journal about managing and using information resources on college and university campuses, vol. 21, pp. 5–11. Educause (1998). http://net.educause.edu/ir/library/html/cem/cem98/cem9812.html

  8. Levy, Y., Ramim, M.: A theoretical approach for biometrics authentication of e-exams. In: Chais Conference on Instructional Technologies Research. The Open University of Israel, Raanana, Israel (2006)

  9. Liu, Y., Wu, Y.: A survey on trust and trustworthy e-learning system. In: 2010 International Conference on Web Information Systems and Mining, pp. 118–122. IEEE (2010). doi:10.1109/WISM.2010.62 http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5662295

  10. Miguel, J., Caballé, S., Prieto, J.: Providing security to computer-supported collaborative learning systems: An overview. In: Fourth IEEE International Conference on Intelligent Networking and Collaborative Systems (INCOS 2012), pp. 97–104. IEEE Computer Society, Bucharest, Romania (2012), doi:10.1109/iNCoS.2012.60

  11. Miguel, J., Caballé, S., Prieto, J.: Security in learning management systems: Designing collaborative learning activities in secure information systems. eLearning Papers. European Comission: elearningeuropa.info. http://elearningeuropa.info/en/article/Security-in-Learning-Management-Systems∖%3A-Designing-Collaborative-Learning-Activities-in-Secure-Information-Systems?paper=116112 (2012)

  12. Miguel, J., Caballé, S., Prieto, J.: Information security in support for mobile collaborative learning. In: The 7th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS-2013), pp. 379–384. IEEE Computer Society, Taichung, Taiwan. 10.1109/CISIS.2013.69 (2013)

  13. Miguel, J., Caballé, S., Prieto, J.: Providing information security to MOOC: Towards effective student authentication. In: 5-th International Conference on Intelligent Networking and Collaborative Systems (INCoS-2013), pp. 289–292. IEEE Computer Society, Xian, China. doi:10.1109/INCoS.2013.52 (2013)

  14. Miguel, J., Caballé, S., Xhafa, F., Prieto, J.: A massive data processing approach for effective trustworthiness in online learning groups. Concurrency and Computation, Practice and Experience (2014)

    Google Scholar 

  15. Miguel, J., Caballé, S., Xhafa, F., Prieto, J.: Security in Online assessments: towards an effective trustworthiness approach to support e-learning teams. In: 28th International Conference on Advanced Information Networking and Applications (AINA 2014), pp. 123–130. IEEE Computer Society, Victoria, Canada 2014. doi;10.1109/AINA.2014.106 Best paper of AINA (2014)

  16. Miguel, J., Caballé, S., Xhafa, F., Prieto, J., Barolli, L.: A collective intelligence approach for building student’s trustworthiness profile in online learning. In: Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC-2014). GUANGZHOU, P.R. China (2014)

  17. Miguel, J., Caballé, S., Xhafa, F., Prieto, J., Barolli, L.: A methodological approach to modelling trustworthiness in online collaborative learning. In: Fourth International Workshop on Adaptive Learning via Interactive, Collaborative and Emotional Approaches (ALICE 2014). Salerno, Italy (2014)

  18. Miguel, J., Caballé, S., Xhafa, F., Prieto, J., Barolli, L.: Predicting trustworthiness behavior to enhance security in on-line assessment. In: 6th International Conference on Intelligent Networking and Collaborative Systems (INCoS-2014). Salerno, Italy (2014)

  19. Miguel, J., Caballé, S., Xhafa, F., Prieto, J., Barolli, L.: Towards a normalized trustworthiness approach to enhance security in on-line assessment. In: Eighth International Conference on Complex, Intelligent and Software Intensive Systems (CISIS 2014), pp. 147–154. IEEE Computer Society, Birmingham (2014), doi:10.1109/CISIS.2014.22

  20. Mobasher, B., Burke, R., Bhaumik, R., Williams, C.: Toward trustworthy recommender systems: An analysis of attack models and algorithm robustness. ACM Trans. Internet Technol. (2007). doi:10.1145/1278366.1278372

  21. Ray, I., Chakraborty, S.: A vector model of trust for developing trustworthy systems. In: D. Hutchison, T. Kanade, J. Kittler, J.M. Kleinberg, F. Mattern, J.C. Mitchell, M. Naor, O. Nierstrasz, C. Pandu Rangan, B. Steffen, M. Sudan, D. Terzopoulos, D. Tygar, M.Y. Vardi, G. Weikum, P.Samarati, P. Ryan, D. Gollmann, R. Molva (eds.) Computer Security - ESORICS 2004, vol. 3193, pp. 260–275. Springer Berlin Heidelberg, Berlin, Heidelberg (2004)

  22. Schneier, B.: The psychology of security. In: Proceedings of the Cryptology in Africa 1st International Conference on Progress in Cryptology, AFRICACRYPT’08, pp 50–79. Springer-Verlag, Berlin, Heidelberg (2008)

  23. Weippl, E.R.: Security in e-learning. In: H. Bidgoli (ed.) Handbook of information security Vol. 1, Key concepts, infrastructure, standards and protocols., vol. 1, Wiley, Hoboken (2006)

  24. Wu, Z., Ou, Y., Liu, Y.: A taxonomy of network and computer attacks based on responses. In: International Conference on Information Technology, Computer Engineering and Management Sciences (ICM), vol. 1, pp. 26 –29 (2011)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jorge Miguel.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Miguel, J., Caballé, S., Xhafa, F. et al. Security in online web learning assessment. World Wide Web 18, 1655–1676 (2015). https://doi.org/10.1007/s11280-014-0320-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11280-014-0320-2

Keywords

Navigation