SlideShare uma empresa Scribd logo
1 de 3
Baixar para ler offline
From the field
                             Security in Learning Management Systems:
                             Designing Collaborative Learning Activities in
                             Secure Information Systems
Authors                        The field of research on information technology applications in the design of computer
                               supported collaborative learning (CSCL) activities generates very complex scenarios
Jorge Miguel Moneo
                               which must be studied from different approaches. One approach is to consider infor-
jmmoneo@uoc.edu
                               mation security, but not only from a technological point of view.
Santi Caballé
scaballe@uoc.edu               In this paper we argue that current e-learning systems supporting on-line collaborative
Josep Prieto                   learning do not sufficiently meet essential security requirements, and this limitation
jprieto@uoc.edu                can have a strong influence in the collaborative learning processes. In order to alleviate
                               these problems we have proposed an approach based on Public Key Infrastructure (PKI)
Department of Computer         models that offer essential security properties and services in on-line collaborative
Science Multimedia, and
                               learning, such as availability, integrity, identification and authentication, access control,
Telecommunication
Open University of             confidentiality, non repudiation, time stamping, audit service and failure control.
Catalonia, Spain


                             1. Introduction
Tags
                             This paper proposes to emphasize information security issues when designing new e-leaning
learning management          systems by incorporating security as an essential non-functional requirement into each and
system, e-learning,          every collaborative learning process.
information technology,
information security,        Information technology supported learning frameworks are present in the Spanish university
collaborative learning       system, where fully distance universities and virtual campuses exist, students do not only
activities                   acquire knowledge and reinforce their educational skills and competences, but also learn to
                             learn. Essential to attainment of this ideal is high quality materials that are carefully designed
                             to be dynamic, intuitive and self-explanatory for students working within a distance educa-
                             tion environment (Sangrà 2002).

                             All the actors implicated in on-line learning management systems demand increasingly spe-
                             cific requirements related to information security, in order to ensure the learning and teach-
                             ing processes developed in this context and the information transmitted (Weippl 2005).
                             However, when designing e-learning systems and applications, security is not a main concern
                             and only conventional security methods and processes are considered in the requirements,
                             such as authentication and basic authorization.

                             In this paper we argue that traditional security approaches when applied to the design of
                             most advanced e-learning systems do not suffice to provide the necessary security require-
                             ments to guarantee that all supported learning processes are developed correctly and in a
                             reliable way. The real learning context of this work is the Open University of Catalonia and
                             the collaborative learning processes found as an essential part of the pedagogical model in
                             all the on-line courses.




       ing
  earn
                                                         eLearning Papers • ISSN: 1887-1542 • www.elearningpapers.eu
eL ers
                       28
                         u
                    ers.e
                gpap
      .elea
            rnin                                                                                         n.º 28 • April 2012
Pap
   www




                                                                                                                          1
From the field

2.	Background                                                          term that is used for a wide range of systems that organize and
                                                                       provide access to online learning services for students, teach-
Alan Bryden (2003), in his lecture “Open and Global Standards
                                                                       ers, and administrators. These services usually include access
for Achieving an Inclusive Information Society” concerning the
                                                                       control, provision of learning content, communication tools,
growth of the Information Society and its more equitable de-
                                                                       and organizations of user groups.
velopment, stated that the International Standards will greatly
help to guarantee security and to develop consumer confidence          The collaborative learning services are usually designed and im-
and protection, while respecting the legitimate interests of all       plemented according to the needs of the collaborative learn-
stakeholders.                                                          ing model, without much consideration of security issues. This
                                                                       limitation may lead to undesirable situations that can influence
As it could seem natural to follow these principles, international
                                                                       the learning process and management, such as a student falsi-
standards are still far from considering the essential role the se-
                                                                       fying course materials, presenting a convincing false identity to
curity issues have in the learning processes and in the technol-
                                                                       other users, listening to private communications, altering the
ogy tools and systems supporting these processes. For instance,
                                                                       time stamp of assignments, and a teacher accessing students’
The IMS Global Learning Consortium has a series of reference
                                                                       personal data.
specifications for e-learning but very few references regarding
privacy and data protection: “While the details of the security        Current technological solutions based on Public Key Infrastruc-
architecture being employed to support the learner information         ture (PKI) models are available to offer services which ensure
system is outside the scope of this specification it is important      the security properties and services so far. PKI, simply defined,
to provide mechanisms that can be used to support the imple-           is an infrastructure that allows the creation of a trusted method
mentation of any suitable architecture” (IMS 2001).                    for providing privacy, authentication, integrity, and non-repudi-
                                                                       ation in communications between two parties (Raina 2003).
El-Khatib (2003) examines privacy and security issues associ-
ated with e-learning, comparing how several learning standards         Grouping all the properties and security services needed, col-
consider the privacy security property. The conclusion in this         laborative learning activities will be trusted if essential proper-
paper is that current e-learning standards only treat privacy and      ties are reached, such as availability, integrity, identification and
security superficially, if at all.                                     authentication, access control, confidentiality, non repudiation,
                                                                       time stamping, audit service and failure control (Shirey 2007).
Although privacy could be an important issue, what about the
other ones? Is privacy service always really needed? For exam-         PKI underlying infrastructure has techniques such as digital
ple, as an LMS offers course materials we could prefer public          signature, digital certificates, certification authorities, and key
trusted materials to only private materials. Weippl (2005) states      stores, which form the system architecture to create security
that “the goal of security in e-learning is to protect authors’        services ensuring all the properties compiled so far. Further-
e-learning content from copyright infringements, to protect            more, PKI infrastructure adds specific services referred to in this
teachers from students who may undermine their evaluation              paper such as time stamping. This service is essential in the de-
system by cheating, and to protect students from being too             velopment of collaborative learning activities when we need to
closely monitored by their teachers when using the software”.          verify the date or time of a transaction between the users of the
                                                                       LMS or an activity step.
Since the above limitations and requirements are not met by
existing e-learning systems, new approaches are needed.
                                                                       4. Conclusions
3.	 Security in on-line collaborative                                  In this paper we have argued that current e-learning systems
    learning: a first approach                                         supporting on-line collaborative learning do not sufficiently
                                                                       meet essential security requirements and this limitation can
Due Collaborative learning involves interactions, material man-        have a strong influence in the collaborative learning processes.
agement, communication processes and generation of learning            In order to alleviate these problems we have proposed an ap-
results that should be supported in the LMS. Flate (2002) ex-          proach based on Public Key Infrastructure (PKI) models that
plains a LMS this way: Learning Management System is a broad           offer services which ensure essential security properties and



        ing
   earn
                                                                      eLearning Papers • ISSN: 1887-1542 • www.elearningpapers.eu
 eL ers
                          28
                            u
                       ers.e
                   gpap
         .elea
               rnin                                                                                                   n.º 28 • April 2012
 Pap
      www




                                                                                                                                       2
From the field

services in on-line collaborative learning, such as availability,
integrity, identification and authentication, access control, con-       References
fidentiality, non repudiation, time stamping, audit service and          Bryden, A., 2003. Open and Global Standards for Achieving an
failure control.                                                         Inclusive Information Society. In SIST Conference. Ljubljana,
                                                                         Slovenia. Available at: http://www.iso.org/iso/livelinkgetfile?llNod
Acknowledgements                                                         eId=21921&llVolId=-2000.

This work has been supported by the European Commission                  El-Khatib, K. et al., 2003. Privacy and Security in E-Learning.
under the Collaborative Project ALICE ”Adaptive Learning via             International Journal of Distance Education, 1(4).
Intuitive/Interactive, Collaborative and Emotional System”, VII
Framework Programme, Theme ICT-2009.4.2 (Technology-En-                  Flate, M., 2002. Online Education Systems: Discussion and
hanced Learning), Grant Agreement n. 257639.                             Definition of Terms. NKI Distance Education. Available at: http://
                                                                         www.porto.ucp.pt/open/curso/modulos/doc/Definition%20
                                                                         of%20Terms.pdf.

                                                                         IMS, 2001. Final Specification of IMS Learner Information Pack-
                                                                         age Information Model. Available at: http://www.imsglobal.org/
                                                                         profiles/lipinfo01.html.

                                                                         Raina, K., 2003. PKI security solutions for the Enterprise : solving
                                                                         HIPAA, E-Paper Act, and other compliance issues, Indianapolis,
                                                                         Ind: Wiley Pub.

                                                                         Sangrà, A., 2002. A New Learning Model for the Information
                                                                         and Knowledge Society: The case of the Universitat Oberta de
                                                                         Catalunya (UOC). International Review of Research in Open and
                                                                         Distance Learning. Available at: http://www.irrodl.org/index.php/
                                                                         irrodl/article/view/55/114.

                                                                         Shirey, R., 2007. RFC 4949: Internet Security Glossary,Version 2.
                                                                         Available at: http://tools.ietf.org/html/rfc4949.

                                                                         Weippl, E.R., 2005. Security in e-learning, New York, NY:
                                                                         Springer.




   Edition and production
   Name of the publication: eLearning Papers                           Copyrights
   ISSN: 1887-1542
                                                                       The texts published in this journal, unless otherwise indicated, are subject
   Publisher: elearningeuropa.info
                                                                       to a Creative Commons Attribution-Noncommercial-NoDerivativeWorks
   Edited by: P.A.U. Education, S.L.                                   3.0 Unported licence. They may be copied, distributed and broadcast pro-
   Postal address: c/Muntaner 262, 3r, 08021 Barcelona (Spain)         vided that the author and the e-journal that publishes them, eLearning
   Phone: +34 933 670 400                                              Papers, are cited. Commercial use and derivative works are not permitted.
   Email: editorial@elearningeuropa.info                               The full licence can be consulted on http://creativecommons.org/licens-
   Internet: www.elearningpapers.eu                                    es/by-nc-nd/3.0/




        ing
   earn
                                                                     eLearning Papers • ISSN: 1887-1542 • www.elearningpapers.eu
 eL ers
                          28
                            u
                       ers.e
                   gpap
         .elea
               rnin                                                                                                           n.º 28 • April 2012
 Pap
      www




                                                                                                                                                  3

Mais conteúdo relacionado

Mais procurados

Advances in defense sector learning
Advances in defense sector learningAdvances in defense sector learning
Advances in defense sector learning
eXact learning
 
Unlocking digital literacy practices of EFL teachers
Unlocking digital literacy practices of EFL teachersUnlocking digital literacy practices of EFL teachers
Unlocking digital literacy practices of EFL teachers
EkoPurwanti1
 
The Influence of Information Technology Toward Interest in Utilization of The...
The Influence of Information Technology Toward Interest in Utilization of The...The Influence of Information Technology Toward Interest in Utilization of The...
The Influence of Information Technology Toward Interest in Utilization of The...
Journal of Education and Learning (EduLearn)
 
AGS Media Literacy Rubric
AGS Media Literacy RubricAGS Media Literacy Rubric
AGS Media Literacy Rubric
drterriholden
 

Mais procurados (20)

Mobile Learning Technologies
Mobile Learning Technologies Mobile Learning Technologies
Mobile Learning Technologies
 
Mobile Learning Technologies
Mobile Learning TechnologiesMobile Learning Technologies
Mobile Learning Technologies
 
E Learning In Modern Education System .
E Learning In Modern Education System .E Learning In Modern Education System .
E Learning In Modern Education System .
 
Advances in defense sector learning
Advances in defense sector learningAdvances in defense sector learning
Advances in defense sector learning
 
Unlocking digital literacy practices of EFL teachers
Unlocking digital literacy practices of EFL teachersUnlocking digital literacy practices of EFL teachers
Unlocking digital literacy practices of EFL teachers
 
Towards a Structured Information Security Awareness Programme
Towards a Structured Information Security Awareness ProgrammeTowards a Structured Information Security Awareness Programme
Towards a Structured Information Security Awareness Programme
 
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONS
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONSCAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONS
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONS
 
The Influence of Information Technology Toward Interest in Utilization of The...
The Influence of Information Technology Toward Interest in Utilization of The...The Influence of Information Technology Toward Interest in Utilization of The...
The Influence of Information Technology Toward Interest in Utilization of The...
 
Validating Measurements of Perceived Ease Comprehension and Ease of Navigatio...
Validating Measurements of Perceived Ease Comprehension and Ease of Navigatio...Validating Measurements of Perceived Ease Comprehension and Ease of Navigatio...
Validating Measurements of Perceived Ease Comprehension and Ease of Navigatio...
 
AN ADAPTIVE AND INTELLIGENT TUTOR BY EXPERT SYSTEMS FOR MOBILE DEVICES
AN ADAPTIVE AND INTELLIGENT TUTOR BY EXPERT SYSTEMS FOR MOBILE DEVICESAN ADAPTIVE AND INTELLIGENT TUTOR BY EXPERT SYSTEMS FOR MOBILE DEVICES
AN ADAPTIVE AND INTELLIGENT TUTOR BY EXPERT SYSTEMS FOR MOBILE DEVICES
 
June 2020: Top Read Articles in Advanced Computing
June 2020: Top Read Articles in Advanced ComputingJune 2020: Top Read Articles in Advanced Computing
June 2020: Top Read Articles in Advanced Computing
 
Report for research ethics
Report for research ethicsReport for research ethics
Report for research ethics
 
Open Education and Teaching Profession in 2030
Open Education and Teaching Profession in 2030Open Education and Teaching Profession in 2030
Open Education and Teaching Profession in 2030
 
Pid95
Pid95Pid95
Pid95
 
Information Communication Technology: Practices for Academia
Information Communication Technology: Practices for AcademiaInformation Communication Technology: Practices for Academia
Information Communication Technology: Practices for Academia
 
Vocational education digital_literacy
Vocational education digital_literacyVocational education digital_literacy
Vocational education digital_literacy
 
AGS Media Literacy Rubric
AGS Media Literacy RubricAGS Media Literacy Rubric
AGS Media Literacy Rubric
 
Top 10 Read Article in Computer Science & Information Technology: September 2021
Top 10 Read Article in Computer Science & Information Technology: September 2021Top 10 Read Article in Computer Science & Information Technology: September 2021
Top 10 Read Article in Computer Science & Information Technology: September 2021
 
Matrix of ict skills for learning
Matrix of ict skills for learningMatrix of ict skills for learning
Matrix of ict skills for learning
 
USING BLOCKCHAIN TECHNOLOGY FOR E-LEARNING. V.A. TOLBATOV & others
USING BLOCKCHAIN TECHNOLOGY FOR E-LEARNING. V.A. TOLBATOV & othersUSING BLOCKCHAIN TECHNOLOGY FOR E-LEARNING. V.A. TOLBATOV & others
USING BLOCKCHAIN TECHNOLOGY FOR E-LEARNING. V.A. TOLBATOV & others
 

Semelhante a Security in Learning Management Systems: Designing Collaborative Learning Activities in Secure Information Systems

A Survey on E-Learning System with Data Mining
A Survey on E-Learning System with Data MiningA Survey on E-Learning System with Data Mining
A Survey on E-Learning System with Data Mining
IIRindia
 
Issues on Management and Governance of Data Security In HEIs
Issues on Management and Governance of Data Security In HEIsIssues on Management and Governance of Data Security In HEIs
Issues on Management and Governance of Data Security In HEIs
ijtsrd
 
Assessing The Tangible And Intangible Impacts Of The Convergence Of E-Learnin...
Assessing The Tangible And Intangible Impacts Of The Convergence Of E-Learnin...Assessing The Tangible And Intangible Impacts Of The Convergence Of E-Learnin...
Assessing The Tangible And Intangible Impacts Of The Convergence Of E-Learnin...
ijistjournal
 
Assessing The Tangible And Intangible Impacts Of The Convergence Of E-Learnin...
Assessing The Tangible And Intangible Impacts Of The Convergence Of E-Learnin...Assessing The Tangible And Intangible Impacts Of The Convergence Of E-Learnin...
Assessing The Tangible And Intangible Impacts Of The Convergence Of E-Learnin...
ijistjournal
 
MULTILEVEL ANALYSIS OF STUDENT’S FEEDBACKUSING MOODLE LOGS IN VIRTUAL CLOUD E...
MULTILEVEL ANALYSIS OF STUDENT’S FEEDBACKUSING MOODLE LOGS IN VIRTUAL CLOUD E...MULTILEVEL ANALYSIS OF STUDENT’S FEEDBACKUSING MOODLE LOGS IN VIRTUAL CLOUD E...
MULTILEVEL ANALYSIS OF STUDENT’S FEEDBACKUSING MOODLE LOGS IN VIRTUAL CLOUD E...
AIRCC Publishing Corporation
 

Semelhante a Security in Learning Management Systems: Designing Collaborative Learning Activities in Secure Information Systems (20)

A Survey on E-Learning System with Data Mining
A Survey on E-Learning System with Data MiningA Survey on E-Learning System with Data Mining
A Survey on E-Learning System with Data Mining
 
Issues on Management and Governance of Data Security In HEIs
Issues on Management and Governance of Data Security In HEIsIssues on Management and Governance of Data Security In HEIs
Issues on Management and Governance of Data Security In HEIs
 
Recent Trends in E-Learning and Technologies
Recent Trends in E-Learning and Technologies Recent Trends in E-Learning and Technologies
Recent Trends in E-Learning and Technologies
 
Deep Learning: The Impact on Future eLearning
Deep Learning: The Impact on Future eLearningDeep Learning: The Impact on Future eLearning
Deep Learning: The Impact on Future eLearning
 
Assessing The Tangible And Intangible Impacts Of The Convergence Of E-Learnin...
Assessing The Tangible And Intangible Impacts Of The Convergence Of E-Learnin...Assessing The Tangible And Intangible Impacts Of The Convergence Of E-Learnin...
Assessing The Tangible And Intangible Impacts Of The Convergence Of E-Learnin...
 
Assessing The Tangible And Intangible Impacts Of The Convergence Of E-Learnin...
Assessing The Tangible And Intangible Impacts Of The Convergence Of E-Learnin...Assessing The Tangible And Intangible Impacts Of The Convergence Of E-Learnin...
Assessing The Tangible And Intangible Impacts Of The Convergence Of E-Learnin...
 
K017157582
K017157582K017157582
K017157582
 
Effectiveness of Information Communication Technologies for Education System
Effectiveness of Information Communication Technologies for Education SystemEffectiveness of Information Communication Technologies for Education System
Effectiveness of Information Communication Technologies for Education System
 
Effectiveness of Information Communication Technologies for Education System
Effectiveness of Information Communication Technologies for Education SystemEffectiveness of Information Communication Technologies for Education System
Effectiveness of Information Communication Technologies for Education System
 
Secured cloud support for global software
Secured cloud support for global softwareSecured cloud support for global software
Secured cloud support for global software
 
MULTILEVEL ANALYSIS OF STUDENT’S FEEDBACKUSING MOODLE LOGS IN VIRTUAL CLOUD E...
MULTILEVEL ANALYSIS OF STUDENT’S FEEDBACKUSING MOODLE LOGS IN VIRTUAL CLOUD E...MULTILEVEL ANALYSIS OF STUDENT’S FEEDBACKUSING MOODLE LOGS IN VIRTUAL CLOUD E...
MULTILEVEL ANALYSIS OF STUDENT’S FEEDBACKUSING MOODLE LOGS IN VIRTUAL CLOUD E...
 
Multilevel Analysis of Student's Feedback Using Moodle Logs in Virtual Cloud ...
Multilevel Analysis of Student's Feedback Using Moodle Logs in Virtual Cloud ...Multilevel Analysis of Student's Feedback Using Moodle Logs in Virtual Cloud ...
Multilevel Analysis of Student's Feedback Using Moodle Logs in Virtual Cloud ...
 
Big data integration for transition from e-learning to smart learning framework
Big data integration for transition from e-learning to smart learning framework Big data integration for transition from e-learning to smart learning framework
Big data integration for transition from e-learning to smart learning framework
 
144 presentation iee_tel2021
144 presentation iee_tel2021144 presentation iee_tel2021
144 presentation iee_tel2021
 
E-learning Online Education App
E-learning Online Education AppE-learning Online Education App
E-learning Online Education App
 
A Proposal of National Higher Education Student Information System Infrastruc...
A Proposal of National Higher Education Student Information System Infrastruc...A Proposal of National Higher Education Student Information System Infrastruc...
A Proposal of National Higher Education Student Information System Infrastruc...
 
A Multimedia Data Mining Framework for Monitoring E-Examination Environment
A Multimedia Data Mining Framework for Monitoring E-Examination EnvironmentA Multimedia Data Mining Framework for Monitoring E-Examination Environment
A Multimedia Data Mining Framework for Monitoring E-Examination Environment
 
The effect of computer literacy on university of maiduguri students’ attitude...
The effect of computer literacy on university of maiduguri students’ attitude...The effect of computer literacy on university of maiduguri students’ attitude...
The effect of computer literacy on university of maiduguri students’ attitude...
 
Blockchain and machine learning in education: a literature review
Blockchain and machine learning in education: a literature reviewBlockchain and machine learning in education: a literature review
Blockchain and machine learning in education: a literature review
 
CLOUD BASED E-LEARNING PORTAL
CLOUD BASED E-LEARNING PORTALCLOUD BASED E-LEARNING PORTAL
CLOUD BASED E-LEARNING PORTAL
 

Mais de eLearning Papers

Standing at the Crossroads: Mobile Learning and Cloud Computing at Estonian S...
Standing at the Crossroads: Mobile Learning and Cloud Computing at Estonian S...Standing at the Crossroads: Mobile Learning and Cloud Computing at Estonian S...
Standing at the Crossroads: Mobile Learning and Cloud Computing at Estonian S...
eLearning Papers
 
GGULIVRR: Touching Mobile and Contextual Learning
GGULIVRR: Touching Mobile and Contextual LearningGGULIVRR: Touching Mobile and Contextual Learning
GGULIVRR: Touching Mobile and Contextual Learning
eLearning Papers
 
Reaching Out with OER: The New Role of Public-Facing Open Scholar
Reaching Out with OER: The New Role of Public-Facing Open ScholarReaching Out with OER: The New Role of Public-Facing Open Scholar
Reaching Out with OER: The New Role of Public-Facing Open Scholar
eLearning Papers
 
Leveraging Trust to Support Online Learning Creativity – A Case Study
Leveraging Trust to Support Online Learning Creativity – A Case StudyLeveraging Trust to Support Online Learning Creativity – A Case Study
Leveraging Trust to Support Online Learning Creativity – A Case Study
eLearning Papers
 
Innovating Teaching and Learning Practices: Key Elements for Developing Crea...
Innovating Teaching and Learning Practices:  Key Elements for Developing Crea...Innovating Teaching and Learning Practices:  Key Elements for Developing Crea...
Innovating Teaching and Learning Practices: Key Elements for Developing Crea...
eLearning Papers
 

Mais de eLearning Papers (20)

OER in the Mobile Era: Content Repositories’ Features for Mobile Devices and ...
OER in the Mobile Era: Content Repositories’ Features for Mobile Devices and ...OER in the Mobile Era: Content Repositories’ Features for Mobile Devices and ...
OER in the Mobile Era: Content Repositories’ Features for Mobile Devices and ...
 
Designing and Developing Mobile Learning Applications in International Studen...
Designing and Developing Mobile Learning Applications in International Studen...Designing and Developing Mobile Learning Applications in International Studen...
Designing and Developing Mobile Learning Applications in International Studen...
 
From E-learning to M-learning
From E-learning to M-learningFrom E-learning to M-learning
From E-learning to M-learning
 
Standing at the Crossroads: Mobile Learning and Cloud Computing at Estonian S...
Standing at the Crossroads: Mobile Learning and Cloud Computing at Estonian S...Standing at the Crossroads: Mobile Learning and Cloud Computing at Estonian S...
Standing at the Crossroads: Mobile Learning and Cloud Computing at Estonian S...
 
M-portfolios: Using Mobile Technology to Document Learning in Student Teacher...
M-portfolios: Using Mobile Technology to Document Learning in Student Teacher...M-portfolios: Using Mobile Technology to Document Learning in Student Teacher...
M-portfolios: Using Mobile Technology to Document Learning in Student Teacher...
 
GGULIVRR: Touching Mobile and Contextual Learning
GGULIVRR: Touching Mobile and Contextual LearningGGULIVRR: Touching Mobile and Contextual Learning
GGULIVRR: Touching Mobile and Contextual Learning
 
Reaching Out with OER: The New Role of Public-Facing Open Scholar
Reaching Out with OER: The New Role of Public-Facing Open ScholarReaching Out with OER: The New Role of Public-Facing Open Scholar
Reaching Out with OER: The New Role of Public-Facing Open Scholar
 
Managing Training Concepts in Multicultural Business Environments
Managing Training Concepts in Multicultural Business EnvironmentsManaging Training Concepts in Multicultural Business Environments
Managing Training Concepts in Multicultural Business Environments
 
Reflective Learning at Work – MIRROR Model, Apps and Serious Games
Reflective Learning at Work – MIRROR Model, Apps and Serious GamesReflective Learning at Work – MIRROR Model, Apps and Serious Games
Reflective Learning at Work – MIRROR Model, Apps and Serious Games
 
SKILL2E: Online Reflection for Intercultural Competence Gain
SKILL2E: Online Reflection for Intercultural Competence GainSKILL2E: Online Reflection for Intercultural Competence Gain
SKILL2E: Online Reflection for Intercultural Competence Gain
 
Experience Networking in the TVET System to Improve Occupational Competencies
Experience Networking in the TVET System to Improve Occupational CompetenciesExperience Networking in the TVET System to Improve Occupational Competencies
Experience Networking in the TVET System to Improve Occupational Competencies
 
Leveraging Trust to Support Online Learning Creativity – A Case Study
Leveraging Trust to Support Online Learning Creativity – A Case StudyLeveraging Trust to Support Online Learning Creativity – A Case Study
Leveraging Trust to Support Online Learning Creativity – A Case Study
 
Innovating Teaching and Learning Practices: Key Elements for Developing Crea...
Innovating Teaching and Learning Practices:  Key Elements for Developing Crea...Innovating Teaching and Learning Practices:  Key Elements for Developing Crea...
Innovating Teaching and Learning Practices: Key Elements for Developing Crea...
 
Website – A Partnership between Parents, Students and Schools
Website – A Partnership between Parents, Students and SchoolsWebsite – A Partnership between Parents, Students and Schools
Website – A Partnership between Parents, Students and Schools
 
Academic Staff Development in the Area of Technology Enhanced Learning in UK ...
Academic Staff Development in the Area of Technology Enhanced Learning in UK ...Academic Staff Development in the Area of Technology Enhanced Learning in UK ...
Academic Staff Development in the Area of Technology Enhanced Learning in UK ...
 
The Ageing Brain: Neuroplasticity and Lifelong Learning
The Ageing Brain: Neuroplasticity and Lifelong LearningThe Ageing Brain: Neuroplasticity and Lifelong Learning
The Ageing Brain: Neuroplasticity and Lifelong Learning
 
Checklist for a Didactically Sound Design of eLearning Content
Checklist for a Didactically Sound Design of eLearning ContentChecklist for a Didactically Sound Design of eLearning Content
Checklist for a Didactically Sound Design of eLearning Content
 
The International Student and the Challenges of Lifelong Learning
The International Student and the Challenges of Lifelong LearningThe International Student and the Challenges of Lifelong Learning
The International Student and the Challenges of Lifelong Learning
 
Fostering Older People’s Digital Inclusion to Promote Active Ageing
Fostering Older People’s Digital Inclusion to Promote Active AgeingFostering Older People’s Digital Inclusion to Promote Active Ageing
Fostering Older People’s Digital Inclusion to Promote Active Ageing
 
eLearning and Social Networking in Mentoring Processes to Support Active Ageing
eLearning and Social Networking in Mentoring Processes to Support Active AgeingeLearning and Social Networking in Mentoring Processes to Support Active Ageing
eLearning and Social Networking in Mentoring Processes to Support Active Ageing
 

Último

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Último (20)

Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 

Security in Learning Management Systems: Designing Collaborative Learning Activities in Secure Information Systems

  • 1. From the field Security in Learning Management Systems: Designing Collaborative Learning Activities in Secure Information Systems Authors The field of research on information technology applications in the design of computer supported collaborative learning (CSCL) activities generates very complex scenarios Jorge Miguel Moneo which must be studied from different approaches. One approach is to consider infor- jmmoneo@uoc.edu mation security, but not only from a technological point of view. Santi Caballé scaballe@uoc.edu In this paper we argue that current e-learning systems supporting on-line collaborative Josep Prieto learning do not sufficiently meet essential security requirements, and this limitation jprieto@uoc.edu can have a strong influence in the collaborative learning processes. In order to alleviate these problems we have proposed an approach based on Public Key Infrastructure (PKI) Department of Computer models that offer essential security properties and services in on-line collaborative Science Multimedia, and learning, such as availability, integrity, identification and authentication, access control, Telecommunication Open University of confidentiality, non repudiation, time stamping, audit service and failure control. Catalonia, Spain 1. Introduction Tags This paper proposes to emphasize information security issues when designing new e-leaning learning management systems by incorporating security as an essential non-functional requirement into each and system, e-learning, every collaborative learning process. information technology, information security, Information technology supported learning frameworks are present in the Spanish university collaborative learning system, where fully distance universities and virtual campuses exist, students do not only activities acquire knowledge and reinforce their educational skills and competences, but also learn to learn. Essential to attainment of this ideal is high quality materials that are carefully designed to be dynamic, intuitive and self-explanatory for students working within a distance educa- tion environment (Sangrà 2002). All the actors implicated in on-line learning management systems demand increasingly spe- cific requirements related to information security, in order to ensure the learning and teach- ing processes developed in this context and the information transmitted (Weippl 2005). However, when designing e-learning systems and applications, security is not a main concern and only conventional security methods and processes are considered in the requirements, such as authentication and basic authorization. In this paper we argue that traditional security approaches when applied to the design of most advanced e-learning systems do not suffice to provide the necessary security require- ments to guarantee that all supported learning processes are developed correctly and in a reliable way. The real learning context of this work is the Open University of Catalonia and the collaborative learning processes found as an essential part of the pedagogical model in all the on-line courses. ing earn eLearning Papers • ISSN: 1887-1542 • www.elearningpapers.eu eL ers 28 u ers.e gpap .elea rnin n.º 28 • April 2012 Pap www 1
  • 2. From the field 2. Background term that is used for a wide range of systems that organize and provide access to online learning services for students, teach- Alan Bryden (2003), in his lecture “Open and Global Standards ers, and administrators. These services usually include access for Achieving an Inclusive Information Society” concerning the control, provision of learning content, communication tools, growth of the Information Society and its more equitable de- and organizations of user groups. velopment, stated that the International Standards will greatly help to guarantee security and to develop consumer confidence The collaborative learning services are usually designed and im- and protection, while respecting the legitimate interests of all plemented according to the needs of the collaborative learn- stakeholders. ing model, without much consideration of security issues. This limitation may lead to undesirable situations that can influence As it could seem natural to follow these principles, international the learning process and management, such as a student falsi- standards are still far from considering the essential role the se- fying course materials, presenting a convincing false identity to curity issues have in the learning processes and in the technol- other users, listening to private communications, altering the ogy tools and systems supporting these processes. For instance, time stamp of assignments, and a teacher accessing students’ The IMS Global Learning Consortium has a series of reference personal data. specifications for e-learning but very few references regarding privacy and data protection: “While the details of the security Current technological solutions based on Public Key Infrastruc- architecture being employed to support the learner information ture (PKI) models are available to offer services which ensure system is outside the scope of this specification it is important the security properties and services so far. PKI, simply defined, to provide mechanisms that can be used to support the imple- is an infrastructure that allows the creation of a trusted method mentation of any suitable architecture” (IMS 2001). for providing privacy, authentication, integrity, and non-repudi- ation in communications between two parties (Raina 2003). El-Khatib (2003) examines privacy and security issues associ- ated with e-learning, comparing how several learning standards Grouping all the properties and security services needed, col- consider the privacy security property. The conclusion in this laborative learning activities will be trusted if essential proper- paper is that current e-learning standards only treat privacy and ties are reached, such as availability, integrity, identification and security superficially, if at all. authentication, access control, confidentiality, non repudiation, time stamping, audit service and failure control (Shirey 2007). Although privacy could be an important issue, what about the other ones? Is privacy service always really needed? For exam- PKI underlying infrastructure has techniques such as digital ple, as an LMS offers course materials we could prefer public signature, digital certificates, certification authorities, and key trusted materials to only private materials. Weippl (2005) states stores, which form the system architecture to create security that “the goal of security in e-learning is to protect authors’ services ensuring all the properties compiled so far. Further- e-learning content from copyright infringements, to protect more, PKI infrastructure adds specific services referred to in this teachers from students who may undermine their evaluation paper such as time stamping. This service is essential in the de- system by cheating, and to protect students from being too velopment of collaborative learning activities when we need to closely monitored by their teachers when using the software”. verify the date or time of a transaction between the users of the LMS or an activity step. Since the above limitations and requirements are not met by existing e-learning systems, new approaches are needed. 4. Conclusions 3. Security in on-line collaborative In this paper we have argued that current e-learning systems learning: a first approach supporting on-line collaborative learning do not sufficiently meet essential security requirements and this limitation can Due Collaborative learning involves interactions, material man- have a strong influence in the collaborative learning processes. agement, communication processes and generation of learning In order to alleviate these problems we have proposed an ap- results that should be supported in the LMS. Flate (2002) ex- proach based on Public Key Infrastructure (PKI) models that plains a LMS this way: Learning Management System is a broad offer services which ensure essential security properties and ing earn eLearning Papers • ISSN: 1887-1542 • www.elearningpapers.eu eL ers 28 u ers.e gpap .elea rnin n.º 28 • April 2012 Pap www 2
  • 3. From the field services in on-line collaborative learning, such as availability, integrity, identification and authentication, access control, con- References fidentiality, non repudiation, time stamping, audit service and Bryden, A., 2003. Open and Global Standards for Achieving an failure control. Inclusive Information Society. In SIST Conference. Ljubljana, Slovenia. Available at: http://www.iso.org/iso/livelinkgetfile?llNod Acknowledgements eId=21921&llVolId=-2000. This work has been supported by the European Commission El-Khatib, K. et al., 2003. Privacy and Security in E-Learning. under the Collaborative Project ALICE ”Adaptive Learning via International Journal of Distance Education, 1(4). Intuitive/Interactive, Collaborative and Emotional System”, VII Framework Programme, Theme ICT-2009.4.2 (Technology-En- Flate, M., 2002. Online Education Systems: Discussion and hanced Learning), Grant Agreement n. 257639. Definition of Terms. NKI Distance Education. Available at: http:// www.porto.ucp.pt/open/curso/modulos/doc/Definition%20 of%20Terms.pdf. IMS, 2001. Final Specification of IMS Learner Information Pack- age Information Model. Available at: http://www.imsglobal.org/ profiles/lipinfo01.html. Raina, K., 2003. PKI security solutions for the Enterprise : solving HIPAA, E-Paper Act, and other compliance issues, Indianapolis, Ind: Wiley Pub. Sangrà, A., 2002. A New Learning Model for the Information and Knowledge Society: The case of the Universitat Oberta de Catalunya (UOC). International Review of Research in Open and Distance Learning. Available at: http://www.irrodl.org/index.php/ irrodl/article/view/55/114. Shirey, R., 2007. RFC 4949: Internet Security Glossary,Version 2. Available at: http://tools.ietf.org/html/rfc4949. Weippl, E.R., 2005. Security in e-learning, New York, NY: Springer. Edition and production Name of the publication: eLearning Papers Copyrights ISSN: 1887-1542 The texts published in this journal, unless otherwise indicated, are subject Publisher: elearningeuropa.info to a Creative Commons Attribution-Noncommercial-NoDerivativeWorks Edited by: P.A.U. Education, S.L. 3.0 Unported licence. They may be copied, distributed and broadcast pro- Postal address: c/Muntaner 262, 3r, 08021 Barcelona (Spain) vided that the author and the e-journal that publishes them, eLearning Phone: +34 933 670 400 Papers, are cited. Commercial use and derivative works are not permitted. Email: editorial@elearningeuropa.info The full licence can be consulted on http://creativecommons.org/licens- Internet: www.elearningpapers.eu es/by-nc-nd/3.0/ ing earn eLearning Papers • ISSN: 1887-1542 • www.elearningpapers.eu eL ers 28 u ers.e gpap .elea rnin n.º 28 • April 2012 Pap www 3