Ansätze zur Entwicklung datenschutzkonformer E-Learning-Plattformen
暂无分享,去创建一个
[1] V. Welch,et al. Attributes , Anonymity , and Access : Shibboleth and Globus Integration to Facilitate Grid Collaboration , 2005 .
[2] Rapporto e Linee-Guida. The Use of Unique Identifiers in the Deployment of Internet Protocol Version 6 (IPv6) International Working Group on Data Protection in Telecommunications , 2009 .
[3] Johann Bizer. Sieben Goldene Regeln des Datenschutzes , 2007, Datenschutz und Datensicherheit - DuD.
[4] T. Koschmann,et al. CSCL 2 : carrying forward the conversation , 2003 .
[5] Jan Hansen,et al. Datenschutz beim E-Learning - Zum Verhältnis von Kontrolle und Vertrauen in der Informationsgesellschaft , 2008, DeLFI.
[6] Andrew Clement. Working in (and on) the Electronic Fischbowl? Privacy Aspects of Multi-Media Communications , 1993, NetWORKing.
[7] Elke Franz,et al. Access control in a privacy-aware eLearning environment , 2006, First International Conference on Availability, Reliability and Security (ARES'06).
[8] Chyng-Yang Jang,et al. Virtual team awareness and groupware support: an evaluation of the TeamSCOPE system , 2002, Int. J. Hum. Comput. Stud..
[9] Abigail Sellen,et al. Design for Privacy in Ubiquitous Computing Environments , 1993, ECSCW.
[10] Martin Meints. Protokollierung bei Identitätsmanagementsystemen , 2006, Datenschutz und Datensicherheit - DuD.
[11] Paul Dourish,et al. Awareness and coordination in shared workspaces , 1992, CSCW '92.
[12] David Chaum,et al. Security without identification: transaction systems to make big brother obsolete , 1985, CACM.
[13] Christian J. Eibl. Vertraulichkeit persönlicher Daten in Lern-Management-Systemen , 2008, DeLFI.