Abstract
The purpose of this paper is to investigate and define the information security threats in e-learning environment. A threat analysis has been conducted for each application in Managed Learning Environment (MLE) system used in e-learning. The threats analysis was conducted according to the approach adapted from Microsoft. This study produce a list of information security threats per application used in e-learning and a matrix of threats’ risk for e-learning. This study focused on vulnerabilities in application system and do not cover the vulnerabilities in host and network in e-learning. Thus, this study has revealed the information security threats specifically for applications in e-learning environment. The results of the threats analysis can be used as guidance to e-learning provider in implementing e-learning security strategy. The results can also be a guide for the e-learning users to increase their awareness on the potential threats in e-learning environment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Allen, E., Seaman, J.: Online Nation Five Years of Growth in Online Learning, vol. 1 (2007)
Barbeau, M.: WiMax/802.16 Threat Analysis, pp. 8–15 (2005)
Boella, G., van der Torre, L.: Security Policies for Sharing Knowledge in Virtual Communities. IEEE Transactions on Systems, Man, and Cybernetics Part A: Systems and Humans 36, 439–450 (2006)
Bruns, R., Dunkel, J., von Helden, J.: Secure Smart Card-Based Access to an e-Learning Portal. In: Proceedings of the 5th International Conference on Enterprise Information Systems (ICEIS), Angers, France (2003)
Conole, G., Smith, J., White, S.: A critique of the impact of policy and funding. In: Conole, G., Oliver, M. (eds.) Contemporary Perspectives in E-Learning Reserach Themes, Methods and Impact on Practice, pp. 38–54. Routledge, London (2007)
El-Khatib, K., Korba, L., Xu, Y., et al.: Privacy and Security in E-Learning. International Journal of Distance Education Technologies 1, 1–19 (2003)
Graf, F.: Providing Security for eLearning. Computers & Graphics 26, 355–365 (2002)
Gunasekaran, A., McNeil, R.D., Shaul, D.: E-Learning: Research and Applications. Industrial and Commercial Training 34, 44–53 (2002)
Jalal, A., Zeb, M.A., Peshawar, P.: Security Enhancement for e-Learning Portal. International Journal of Computer Science and Network Security 2, 236 (2008)
Kennedy, G.: E-Learning Intellectual Property Issues in E-Learning. Computer Law & Security Report 18, 91–98 (2002)
Lim, C.C., Jin, J.S.: A Study on Applying Software Security to Information Systems: E-Learning Portals. IJCSNS 6, 162 (2006)
Littman, M.K.: Guidelines for Network Security in the Learning Environment. Journal of Instruction Delivery Systems 10, 35–40 (1996)
Norman, S., Da Costa, M.: Overview of e-Learning Specifications and Standards. Open Learning Agency, and Eduspecs Technical Liaison Office (2003)
Patterson, D., Jung, G., Broadhead, G.: The UK e-Learning Market 2009, p. 17 (2009)
Raitman, R., Ngo, L., Augar, N.: Security in the Online E-Learning Environment. Advanced Learning Technologies. In: Fifth IEEE International Conference on Advanced Learning Technologies, ICALT 2005, pp. 702–706 (2005)
Ramim, M., Levy, Y.: Securing E-Learning Systems: A Case of Insider Cyber Attacks and Novice IT Management in a Small University. Journal of Cases on Information Technology 8, 24–34 (2006)
Samuels, R.: The Future Threat to Computers and Composition: Nontenured Instructors, Intellectual Property, and Distance Education. Computers and Composition 21, 63–71 (2004)
Saxena, R.: Security and Online Content Management: Balancing Access and Security. Breaking boundaries: integration and interoperability. In: 12th Biennial VALA Conference and Exhibition Victorian Association for Library Automation (2004)
Siponen, M., Willison, R.: Information Security Management Standards: Problems and Solutions. Information & Management 46, 267–270 (2009)
Yang, C., Lin, F.O., Lin, H.: Policy-Based Privacy and Security Management for Collaborative E-Education Systems. In: Proceedings of the 5th IASTED International Multi-Conference Computers and Advanced Technology in Education (CATE 2002), pp. 501–505 (2002)
Yong, J.: Digital Identity Design and Privacy Preservation for e-Learning. In: Shen, W., Yong, J., Yang, Y., Barthès, J.-P.A., Luo, J. (eds.) CSCWD 2007. LNCS, vol. 5236, pp. 858–863. Springer, Heidelberg (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Mohd Alwi, N.H., Fan, IS. (2010). Information Security Threats Analysis for E-Learning. In: Lytras, M.D., et al. Technology Enhanced Learning. Quality of Teaching and Educational Reform. TECH-EDUCATION 2010. Communications in Computer and Information Science, vol 73. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13166-0_41
Download citation
DOI: https://doi.org/10.1007/978-3-642-13166-0_41
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-13165-3
Online ISBN: 978-3-642-13166-0
eBook Packages: Computer ScienceComputer Science (R0)