E-Learning and Information Security Management

Many e-learning institutions are rushing into adopting ICT without carefully planning and understanding any related security concerns. Elearning is a new method of learning which ultimately depends on the Internet in its execution. The Internet has become the venue for a new set of illegal activities, and the e-learning environment is now exposed to such threats. In this paper, elearning context, definition, characteristics, development, growth, benefits and challenges are all elaborated upon. This paper discusses the security elements required to be implemented within elearning environments. In addition, the paper explains the situation and existing research relating to security in e-learning. Furthermore, information security management is suggested to contribute to preparing a secured e-learning environment.

[1]  Sidek H. A. Aziz,et al.  Design and development of learning management system at universiti Putra Malaysia: a case study of e-SPRINT , 2006, WWW '06.

[2]  Diane J. Hanson,et al.  E-Learning: Strategies for Delivering Knowledge in the Digital Age , 2003, J. Educ. Technol. Soc..

[3]  Steven Furnell,et al.  Security issues in Online Distance Learning , 2001 .

[4]  Denis Trèek,et al.  An integral framework for information systems security management , 2003, Comput. Secur..

[5]  John Eklund,et al.  E-learning: emerging issues and key trends: a discussion paper , 2003 .

[6]  S. Jajodia,et al.  Information Security: An Integrated Collection of Essays , 1994 .

[7]  Jianming Yong Digital Identity Design and Privacy Preservation for e-Learning , 2007, 2007 11th International Conference on Computer Supported Cooperative Work in Design.

[8]  I. E. Allen,et al.  Online Nation: Five Years of Growth in Online Learning. , 2007 .

[9]  Robin Mason,et al.  e-learning: The key concepts , 2006 .

[10]  Elmarie Kritzinger,et al.  E-learning: Incorporating Information Security Governance , 2006 .

[11]  Wanlei Zhou,et al.  Security in the online e-learning environment , 2005, Fifth IEEE International Conference on Advanced Learning Technologies (ICALT'05).

[12]  Frank Graf Providing security for eLearning , 2002, Comput. Graph..

[13]  George Whitson,et al.  Computer security: theory, process and management , 2003 .

[14]  Gráinne Conole,et al.  A critique of the impact of policy and funding , 2006 .