Towards Privacy-Aware eLearning

  • Katrin Borcea
  • Hilko Donker
  • Elke Franz
  • Andreas Pfitzmann
  • Hagen Wahrig
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3856)

Abstract

Acting in the digital world, such as browsing the Internet, always causes generation of data. However, the average user is not aware that his actions leave traces which might cause privacy risks. Within this paper, we discuss the need for privacy-enhancing application design considering eLearning as example. eLearning is an application area that comprises many use cases which are common in the digital world. Since an eLearning application aims at assisting users, they cannot act in full anonymity. We discuss a possible solution which uses privacy-enhancing identity management (PIM) in order to provide as much anonymity as possible while still enabling assistance.

References

  1. 1.
    Bock, P.: Wachstumsmarkt E-Learning — Anforderungen, Akteure und Perspektiven im deutschen Markt (08/2001), Berlecon Research (2001)Google Scholar
  2. 2.
    Borcea, K., Franz, E., Pfitzmann, A.: Metaphorical representation of pseudonyms. (to be published)Google Scholar
  3. 3.
    Borcea, K., Neumann, O., Wahrig, H.: Adapting an internet based learning environment to a hybrid approach. In: Proceedings ED-MEDIA (2000)Google Scholar
  4. 4.
    Camenisch, J.L., Lysyanskaya, A.: An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 93–118. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  5. 5.
    Clauß, S., Köhntopp, M.: Identity management and its support of multilateral security. Computer Networks 37, 205–219 (2001)CrossRefGoogle Scholar
  6. 6.
    Clauß, S., Pfitzmann, A., Hansen, M., Herreweghen, E.V.: Privacy-enhancing identity management. The IPTS Report 67, pp. 8–16 (September 2002), http://www.jrc.es/pages/iptsreport/vol67/english/IPT2E676.html
  7. 7.
    Hansen, M.: Nutzeranonymität und Identitätsmanagement — auch für E-Learning? In: Grimm, R. (ed.) E-Learning: Beherrschbarkeit und Sicherheit, pp. 51–62 (2003)Google Scholar
  8. 8.
    Kawalek, J.: Acceptance factors for video teaching. In: Workshop on Computer Aided Teaching, Tele-Teaching /Mediafication, Towards a Platform for Teleteaching Teleservices (1993)Google Scholar
  9. 9.
    Pfitzmann, A.: Multilateral security: Enabling technologies and their evaluation. In: Wilhelm, R. (ed.) Informatics: 10 Years Back, 10 Years Ahead. LNCS, vol. 2000, pp. 50–62. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  10. 10.
    Pfitzmann, A., Hansen, M.: Anonymity, unobservability, pseudonymity, and identity management — a proposal for terminology. Draft status (September 2004), http://dud.inf.tudresden.de/literatur/Anon-Terminology_v0.21.pdf
  11. 11.

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Katrin Borcea
    • 1
  • Hilko Donker
    • 1
  • Elke Franz
    • 1
  • Andreas Pfitzmann
    • 1
  • Hagen Wahrig
    • 1
  1. 1.Dresden University of TechnologyDresdenGermany

Personalised recommendations