Skip to main content

Information Security Threats Analysis for E-Learning

  • Conference paper
Technology Enhanced Learning. Quality of Teaching and Educational Reform (TECH-EDUCATION 2010)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 73))

Included in the following conference series:

Abstract

The purpose of this paper is to investigate and define the information security threats in e-learning environment. A threat analysis has been conducted for each application in Managed Learning Environment (MLE) system used in e-learning. The threats analysis was conducted according to the approach adapted from Microsoft. This study produce a list of information security threats per application used in e-learning and a matrix of threats’ risk for e-learning. This study focused on vulnerabilities in application system and do not cover the vulnerabilities in host and network in e-learning. Thus, this study has revealed the information security threats specifically for applications in e-learning environment. The results of the threats analysis can be used as guidance to e-learning provider in implementing e-learning security strategy. The results can also be a guide for the e-learning users to increase their awareness on the potential threats in e-learning environment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Allen, E., Seaman, J.: Online Nation Five Years of Growth in Online Learning, vol. 1 (2007)

    Google Scholar 

  2. Barbeau, M.: WiMax/802.16 Threat Analysis, pp. 8–15 (2005)

    Google Scholar 

  3. Boella, G., van der Torre, L.: Security Policies for Sharing Knowledge in Virtual Communities. IEEE Transactions on Systems, Man, and Cybernetics Part A: Systems and Humans 36, 439–450 (2006)

    Article  Google Scholar 

  4. Bruns, R., Dunkel, J., von Helden, J.: Secure Smart Card-Based Access to an e-Learning Portal. In: Proceedings of the 5th International Conference on Enterprise Information Systems (ICEIS), Angers, France (2003)

    Google Scholar 

  5. Conole, G., Smith, J., White, S.: A critique of the impact of policy and funding. In: Conole, G., Oliver, M. (eds.) Contemporary Perspectives in E-Learning Reserach Themes, Methods and Impact on Practice, pp. 38–54. Routledge, London (2007)

    Google Scholar 

  6. El-Khatib, K., Korba, L., Xu, Y., et al.: Privacy and Security in E-Learning. International Journal of Distance Education Technologies 1, 1–19 (2003)

    Article  Google Scholar 

  7. Graf, F.: Providing Security for eLearning. Computers & Graphics 26, 355–365 (2002)

    Article  Google Scholar 

  8. Gunasekaran, A., McNeil, R.D., Shaul, D.: E-Learning: Research and Applications. Industrial and Commercial Training 34, 44–53 (2002)

    Article  Google Scholar 

  9. Jalal, A., Zeb, M.A., Peshawar, P.: Security Enhancement for e-Learning Portal. International Journal of Computer Science and Network Security 2, 236 (2008)

    Google Scholar 

  10. Kennedy, G.: E-Learning Intellectual Property Issues in E-Learning. Computer Law & Security Report 18, 91–98 (2002)

    Article  Google Scholar 

  11. Lim, C.C., Jin, J.S.: A Study on Applying Software Security to Information Systems: E-Learning Portals. IJCSNS 6, 162 (2006)

    Google Scholar 

  12. Littman, M.K.: Guidelines for Network Security in the Learning Environment. Journal of Instruction Delivery Systems 10, 35–40 (1996)

    Google Scholar 

  13. Norman, S., Da Costa, M.: Overview of e-Learning Specifications and Standards. Open Learning Agency, and Eduspecs Technical Liaison Office (2003)

    Google Scholar 

  14. Patterson, D., Jung, G., Broadhead, G.: The UK e-Learning Market 2009, p. 17 (2009)

    Google Scholar 

  15. Raitman, R., Ngo, L., Augar, N.: Security in the Online E-Learning Environment. Advanced Learning Technologies. In: Fifth IEEE International Conference on Advanced Learning Technologies, ICALT 2005, pp. 702–706 (2005)

    Google Scholar 

  16. Ramim, M., Levy, Y.: Securing E-Learning Systems: A Case of Insider Cyber Attacks and Novice IT Management in a Small University. Journal of Cases on Information Technology 8, 24–34 (2006)

    Article  Google Scholar 

  17. Samuels, R.: The Future Threat to Computers and Composition: Nontenured Instructors, Intellectual Property, and Distance Education. Computers and Composition 21, 63–71 (2004)

    Article  Google Scholar 

  18. Saxena, R.: Security and Online Content Management: Balancing Access and Security. Breaking boundaries: integration and interoperability. In: 12th Biennial VALA Conference and Exhibition Victorian Association for Library Automation (2004)

    Google Scholar 

  19. Siponen, M., Willison, R.: Information Security Management Standards: Problems and Solutions. Information & Management 46, 267–270 (2009)

    Article  Google Scholar 

  20. Yang, C., Lin, F.O., Lin, H.: Policy-Based Privacy and Security Management for Collaborative E-Education Systems. In: Proceedings of the 5th IASTED International Multi-Conference Computers and Advanced Technology in Education (CATE 2002), pp. 501–505 (2002)

    Google Scholar 

  21. Yong, J.: Digital Identity Design and Privacy Preservation for e-Learning. In: Shen, W., Yong, J., Yang, Y., Barthès, J.-P.A., Luo, J. (eds.) CSCWD 2007. LNCS, vol. 5236, pp. 858–863. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Mohd Alwi, N.H., Fan, IS. (2010). Information Security Threats Analysis for E-Learning. In: Lytras, M.D., et al. Technology Enhanced Learning. Quality of Teaching and Educational Reform. TECH-EDUCATION 2010. Communications in Computer and Information Science, vol 73. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13166-0_41

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-13166-0_41

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-13165-3

  • Online ISBN: 978-3-642-13166-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics