Security in Online Learning Assessment Towards an Effective Trustworthiness Approach to Support E-Learning Teams

This paper proposes a trustworthiness model for the design of secure learning assessment in on-line collaborative learning groups. Although computer supported collaborative learning has been widely adopted in many educational institutions over the last decade, there exist still drawbacks which limit their potential in collaborative learning activities. Among these limitations, we investigate information security requirements in on-line assessment, (e-assessment), which can be developed in collaborative learning contexts. Despite information security enhancements have been developed in recent years, to the best of our knowledge, integrated and holistic security models have not been completely carried out yet. Even when security advanced methodologies and technologies are deployed in Learning Management Systems, too many types of vulnerabilities still remain opened and unsolved. Therefore, new models such as trustworthiness approaches can overcome these lacks and support e-assessment requirements for e-Learning. To this end, a trustworthiness model is designed in order to conduct the guidelines of a holistic security model for on-line collaborative learning through effective trustworthiness approaches. In addition, since users' trustworthiness analysis involves large amounts of ill-structured data, a parallel processing paradigm is proposed to build relevant information modeling trustworthiness levels for e-Learning.

[1]  Ryan West,et al.  The psychology of security , 2008, CACM.

[2]  Christian J. Eibl Discussion of information security in e-learning , 2010 .

[3]  Melissa Dark,et al.  Information Assurance and Security Ethics in Complex Systems: Interdisciplinary Perspectives , 2010 .

[4]  Bamshad Mobasher,et al.  Towards Trustworthy Recommender Systems : An Analysis of Attack Models and Algorithm Robustness , 2007 .

[5]  Yair Levy,et al.  A Theoretical Approach for Biometrics Authentication of e-Exams , 2007 .

[6]  Bruce Schneier,et al.  The psychology of security , 2007, CACM.

[7]  Hossein Bidgoli Key concepts, infrastructure, standards, and protocols , 2006 .

[8]  Fatos Xhafa,et al.  Distributed-based massive processing of activity logs for efficient user modeling in a Virtual Campus , 2013, Cluster Computing.

[9]  Susan K. Ferencz,et al.  Privacy Issues in a Virtual Learning Environment. , 1998 .

[10]  Yingchun Liu,et al.  A Survey on Trust and Trustworthy E-learning System , 2010, 2010 International Conference on Web Information Systems and Mining.

[11]  Santi Caballé,et al.  Information Security in Support for Mobile Collaborative Learning , 2013, 2013 Seventh International Conference on Complex, Intelligent, and Software Intensive Systems.

[12]  Zheng Wu,et al.  A Taxonomy of Network and Computer Attacks Based on Responses , 2011, 2011 International Conference of Information Technology, Computer Engineering and Management Sciences.

[13]  Fatos Xhafa,et al.  A parallel grid-based implementation for real-time processing of event log data of collaborative applications , 2010, Int. J. Web Grid Serv..

[14]  Santi Caballé,et al.  Providing Information Security to MOOC: Towards Effective Student Authentication , 2013, 2013 5th International Conference on Intelligent Networking and Collaborative Systems.

[15]  Santi Caballé,et al.  Providing Security to Computer-Supported Collaborative Learning: An Overview , 2012, 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems.

[16]  Indrajit Ray,et al.  A Vector Model of Trust for Developing Trustworthy Systems , 2004, ESORICS.

[17]  Edgar R. Weippl Security in e-learning , 2005, ELERN.

[18]  Elisa Bertino,et al.  An Approach to Evaluate Data Trustworthiness Based on Data Provenance , 2008, Secure Data Management.

[19]  Tom White,et al.  Hadoop: The Definitive Guide , 2009 .