Enhancing the Privacy of e-Learning Systems with Alias and Anonymity

  • Jianming Yong
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5236)


The privacy of e-learning systems has become a big concern. This paper proposes a new approach, which can effectively protect the privacy of elearning users. We propose to use the alias and anonymity to implement the privacy preservation for e-learning systems. Through the approach, a unique alias represents the real e-learning user to communicate with each other or e-learning users use the anonymity to hide their information. This approach can be very simple and efficient to be implemented in the e-learning system by well designed meta-formats of digital identities of four types of e-learning users. The anonymity can be adopted by all e-learning users to keep their privacy.


Digital Identity Privacy Preservation e-Learning 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Zhang, D., Zhao, J.L., Zhou, L., Nunamaker Jr., J.F.: Can E-learning replace classroom learning? The communications of the ACM 47(5), 75–79 (2004)CrossRefGoogle Scholar
  2. 2.
    Bhargav-Spantzel, A., Squicciarini, A.C., Bertino, E.: Establishing and protecting digital identity in federation systems. In: DIM 2005, Fairfax, Virginia, USA, pp. 11–19 (2005)Google Scholar
  3. 3.
    Bhargav-Spantzel, A., Squicciarini, A.C., Bertino, E.: Privacy Preserving mutli-factor authentication with biometrics. In: DIM 2006, Alexandria, Virginia, USA, pp. 63–71 (2006)Google Scholar
  4. 4.
    Borcea-Pfitzmann, K., Franz, E., Pfitzmann, A.: Usable presentation of secure pseudonyms. In: DIM 2005, Fairfax, Virginia, USA, pp. 70–76 (2005)Google Scholar
  5. 5.
    Isshiki, T., Mori, K., Sako, K.: Using group signatures for identity management and its implementation. In: DIM 2006, Alexandria, Virginia, USA, pp. 73–78 (2006)Google Scholar
  6. 6.
    Candebat, T., Dune, C.R., Gray, D.T.: Pseudonym management using mediated identity-based cryptography. In: DIM 2005, Fairfax, Virginia, USA, pp. 1–10 (2005)Google Scholar
  7. 7.
    Berghel, H.: Identity theft, social security numbers, and the web. The Communications of the ACM 43(2), 17–21 (2000)CrossRefGoogle Scholar
  8. 8.
    Yong, J.: Internet-Based E-Learning Workflow Process. In: Shen, W.-m., Chao, K.-M., Lin, Z., Barthès, J.-P.A., James, A. (eds.) CSCWD 2005. LNCS, vol. 3865, pp. 516–524. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  9. 9.
    Yong, J., Yan, J., Huang, X.: WFMS-based Data Integration for e-learning. In: Proceedings of the 10th International Conference on Computer Supported Cooperative Design, Nanjing, China, pp. 1361–1367 (2006)Google Scholar
  10. 10.
    Iahad, N., Dafoulas, G.A., Kalaizakis, E., Macaulay, L.A.: Evaluation of online assessment: The role of feedback in learner-centered e-learning. In: The 37th Hawaii International Conference on System Science. IEEE, Los Alamitos (2004)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Jianming Yong
    • 1
  1. 1.School of Information Systems, Faculty of BusinessUniversity of Southern QueenslandToowoombaAustralia

Personalised recommendations