Enterprise Content Management System for IT Training

Information Technology IT training is undergoing rapid changes around the world, creating inter-institutional partnerships between IT training centers as well as software and hardware vendors to promote new products and training to users. Online training has resulted in an increasing enrolment of a wider spectrum of learners with more diverse technical skills and needs that must be served. Enterprise content management ECM enables IT training centers to deliver education beyond company walls, supporting a range of tools to improve information dissemination, communication, and creating collaborative virtual classrooms. In this article, the authors propose a learning platform with both Web 2.0 and mobile interfaces that supports IT training for nourishing busy workers with the latest IT technology knowledge and skills. Alerts are used as a mechanism to facilitate communications among students, instructors, and administrators. It also reminds students to keep track on their learning progress. The content flow management such as content editing, content approval, use of content, perform training exercise, practical tests, and examination as well as external access control for the Web portal can be easily controlled through the e-platform. Besides, the authors also demonstrated how to systematically specify document classifications and tagging of training materials by using the modular design of an integrated IT Training Enterprise Content Management System ITTECMS together with ontologies from the Semantic Web. Watermarking technology will be deployed for further protection of the training materials, both online and offline. It also allows the flexibility to create match-making of training content according to user interests. Not only users can retrieve matched contents effectively, vendors can also obtain multi-dimensional analysis of user problems and comments to form a comprehensive knowledgebase and achieve cross-sale of education products to target customers.

[1]  Peretz Shoval,et al.  Evaluation of an ontology-content based filtering method for a personalized newspaper , 2008, RecSys '08.

[2]  Jothy Rosenberg,et al.  Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption , 2004 .

[3]  H. Leino‐Kilpi,et al.  Privacy: a review of the literature. , 2001, International journal of nursing studies.

[4]  Dickson K. W. Chiu,et al.  How Ontologies can Help in an E-Marketplace , 2005, ECIS.

[5]  David S. Linthicum,et al.  Next Generation Application Integration: From Simple Information to Web Services , 2003 .

[6]  Nader Nada,et al.  ONTOLOGY -ORIENTED INFERENCE -BASED LEARNING CONTENT MANAGEMENT SYSTEM , 2012 .

[7]  Rosa Maria Vicari,et al.  Towards an Adaptive Web Training Environment Based on Cognitive Style of Learning: An Empirical Approach , 2002, AH.

[8]  Elisa Bertino,et al.  Protection and administration of XML data sources , 2002, Data Knowl. Eng..

[9]  Dickson K. W. Chiu,et al.  Engineering Financial Enterprise Content Management Services : Integration and Control , 2010, Int. J. Syst. Serv. Oriented Eng..

[10]  C. Powers Privacy Promises, Access Control, and Privacy Management , 2002 .

[11]  Alex A. Freitas,et al.  A survey of hierarchical classification across different application domains , 2010, Data Mining and Knowledge Discovery.

[12]  Shing-Chi Cheung,et al.  A three-tier view-based methodology for M-services adaptation , 2003, IEEE Trans. Syst. Man Cybern. Part A.

[13]  S. Fischer-Hübner IT-Security and Privacy: Design and Use of Privacy-Enhancing Security Mechanisms , 2001 .

[14]  Dickson K. W. Chiu,et al.  Web Interface-Driven Cooperative Exception Handling in Adome Workflow Management System , 2001, Inf. Syst..

[15]  Lerina Aversano,et al.  Integrating document and workflow management tools using XML and web technologies: a case study , 2002, Proceedings of the Sixth European Conference on Software Maintenance and Reengineering.

[16]  Fumihiko Kitayama,et al.  Design of a framework for dynamic content adaptation to Web-enabled terminals and enterprise applications , 1999, Proceedings Sixth Asia Pacific Software Engineering Conference (ASPEC'99) (Cat. No.PR00509).

[17]  Dickson K. W. Chiu,et al.  Metadata Design of a Content Management System for Music Virtual Learning Environment , 2015, Int. J. Syst. Serv. Oriented Eng..

[18]  Dickson K. W. Chiu,et al.  On the making of service recommendations: An action theory based on utility, reputation, and risk attitude , 2009, Expert Syst. Appl..

[19]  Neha Jain,et al.  Specifying privacy policies with P3P and EPAL: lessons learned , 2004, WPES '04.

[20]  Dickson K. W. Chiu,et al.  Privacy and Access Control Issues in Financial Enterprise Content Management , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.

[21]  Wolfgang Gentzsch,et al.  Grid Computing: A New Technology for the Advanced Web , 2001, IWCC.

[22]  Dickson K. W. Chiu,et al.  A Meta Modeling Approach to Workflow Management Systems Supporting Exception Handling , 1999, Inf. Syst..

[23]  John Garmany,et al.  Oracle Replication: Snapshot, Multi-master & Materialized Views Scripts (Oracle In-Focus) , 2003 .

[24]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[25]  Robert J. Shimonski,et al.  Building DMZs for Enterprise Networks , 2003 .

[26]  Pauline Ratnasingam The importance of technology trust in Web services security , 2002, Inf. Manag. Comput. Secur..

[27]  F. Schoeman Philosophical Dimensions of Privacy: An Anthology , 1984 .

[28]  David Carlson,et al.  Modeling XML Applications with UML: Practical e-Business Applications , 2001 .

[29]  Amrit Tiwana,et al.  The Essential Guide to Knowledge Management: E-Business and CRM Applications , 2000 .

[30]  Shing-Chi Cheung,et al.  The Use of Digital Watermarking for Intelligence Multimedia Document Distribution , 2008, J. Theor. Appl. Electron. Commer. Res..

[31]  Raymond K. Wong,et al.  End-to-end privacy control in service outsourcing of human intensive processes: A multi-layered Web service integration approach , 2007, Inf. Syst. Frontiers.

[32]  Ian A. Coutts,et al.  Support for system evolution through separating business and technology issues in a banking system , 2000, Proceedings 2000 International Conference on Software Maintenance.

[33]  Daphne Koller,et al.  Hierarchically Classifying Documents Using Very Few Words , 1997, ICML.

[34]  Minhong Wang,et al.  Towards Ubiquitous Communication Support for Distance Education with Alert Management , 2008, J. Educ. Technol. Soc..

[35]  Ramaswamy Chandramouli,et al.  The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..

[36]  Dickson K. W. Chiu,et al.  Alert Driven Communications Management for Children Music Learning Based on Suzuki Method , 2015, Int. J. Syst. Serv. Oriented Eng..

[37]  Xin Wang,et al.  XrML -- eXtensible rights Markup Language , 2002, XMLSEC '02.