Processing, Please wait...

  • Home
  • About Us
  • Search:
  • Advanced Search

Growing Science » Management Science Letters » A framework for the formulation of security issues in the field of e-learning using Meta-Synthesis method

Journals

  • IJIEC (747)
  • MSL (2643)
  • DSL (668)
  • CCL (508)
  • USCM (1092)
  • ESM (413)
  • AC (562)
  • JPM (271)
  • IJDS (912)
  • JFS (91)
  • HE (32)
  • SCI (26)

MSL Volumes

    • Volume 1 (70)
      • Issue 1 (10)
      • Issue 2 (15)
      • Issue 3 (20)
      • Issue 4 (25)
    • Volume 2 (365)
      • Issue 1 (51)
      • Issue 2 (32)
      • Issue 3 (40)
      • Issue 4 (44)
      • Issue 5 (42)
      • Issue 6 (52)
      • Issue 7 (53)
      • Issue 8 (51)
    • Volume 3 (426)
      • Issue 1 (40)
      • Issue 2 (47)
      • Issue 3 (40)
      • Issue 4 (40)
      • Issue 5 (27)
      • Issue 6 (50)
      • Issue 7 (51)
      • Issue 8 (30)
      • Issue 9 (24)
      • Issue 10 (25)
      • Issue 11 (25)
      • Issue 12 (27)
    • Volume 4 (387)
      • Issue 1 (34)
      • Issue 2 (30)
      • Issue 3 (34)
      • Issue 4 (42)
      • Issue 5 (33)
      • Issue 6 (43)
      • Issue 7 (42)
      • Issue 8 (40)
      • Issue 9 (39)
      • Issue 10 (20)
      • Issue 11 (18)
      • Issue 12 (12)
    • Volume 5 (129)
      • Issue 1 (15)
      • Issue 2 (10)
      • Issue 3 (10)
      • Issue 4 (12)
      • Issue 5 (14)
      • Issue 6 (14)
      • Issue 7 (8)
      • Issue 8 (8)
      • Issue 9 (11)
      • Issue 10 (8)
      • Issue 11 (9)
      • Issue 12 (10)
    • Volume 6 (74)
      • Issue 1 (9)
      • Issue 2 (6)
      • Issue 3 (6)
      • Issue 4 (7)
      • Issue 5 (6)
      • Issue 6 (6)
      • Issue 7 (8)
      • Issue 8 (6)
      • Issue 9 (5)
      • Issue 10 (5)
      • Issue 11 (5)
      • Issue 12 (5)
    • Volume 7 (54)
      • Issue 1 (5)
      • Issue 2 (5)
      • Issue 3 (5)
      • Issue 4 (5)
      • Issue 5 (5)
      • Issue 6 (5)
      • Issue 7 (4)
      • Issue 8 (4)
      • Issue 9 (4)
      • Issue 10 (4)
      • Issue 11 (4)
      • Issue 12 (4)
    • Volume 8 (119)
      • Issue 1 (5)
      • Issue 2 (5)
      • Issue 3 (5)
      • Issue 4 (5)
      • Issue 5 (22)
      • Issue 6 (20)
      • Issue 7 (6)
      • Issue 8 (6)
      • Issue 9 (8)
      • Issue 10 (10)
      • Issue 11 (11)
      • Issue 12 (16)
    • Volume 9 (208)
      • Issue 1 (16)
      • Issue 2 (14)
      • Issue 3 (11)
      • Issue 4 (12)
      • Issue 5 (12)
      • Issue 6 (16)
      • Issue 7 (16)
      • Issue 8 (16)
      • Issue 9 (16)
      • Issue 10 (16)
      • Issue 11 (19)
      • Issue 12 (20)
      • Issue 13 (24)
    • Volume 10 (448)
      • Issue 1 (24)
      • Issue 2 (25)
      • Issue 3 (24)
      • Issue 4 (25)
      • Issue 5 (26)
      • Issue 6 (26)
      • Issue 7 (25)
      • Issue 8 (27)
      • Issue 9 (27)
      • Issue 10 (30)
      • Issue 11 (33)
      • Issue 12 (30)
      • Issue 13 (30)
      • Issue 14 (30)
      • Issue 15 (30)
      • Issue 16 (36)
    • Volume 11 (251)
      • Issue 1 (36)
      • Issue 2 (39)
      • Issue 3 (40)
      • Issue 4 (40)
      • Issue 5 (29)
      • Issue 6 (27)
      • Issue 7 (20)
      • Issue 8 (12)
      • Issue 9 (8)
    • Volume 12 (33)
      • Issue 1 (6)
      • Issue 2 (6)
      • Issue 3 (8)
      • Issue 4 (13)
    • Volume 13 (27)
      • Issue 1 (7)
      • Issue 2 (8)
      • Issue 3 (5)
      • Issue 4 (7)
    • Volume 14 (22)
      • Issue 1 (6)
      • Issue 2 (6)
      • Issue 3 (5)
      • Issue 4 (5)
    • Volume 15 (24)
      • Issue 1 (5)
      • Issue 2 (5)
      • Issue 3 (5)
      • Issue 4 (9)
    • Volume 16 (6)
      • Issue 1 (6)

Keywords

Supply chain management(166)
Jordan(161)
Vietnam(149)
Customer satisfaction(120)
Performance(113)
Supply chain(110)
Service quality(98)
Competitive advantage(95)
Tehran Stock Exchange(94)
SMEs(87)
optimization(86)
Financial performance(83)
Trust(83)
TOPSIS(83)
Sustainability(81)
Job satisfaction(80)
Factor analysis(78)
Social media(78)
Knowledge Management(77)
Artificial intelligence(77)


» Show all keywords

Authors

Naser Azad(82)
Mohammad Reza Iravani(64)
Zeplin Jiwa Husada Tarigan(63)
Endri Endri(45)
Muhammad Alshurideh(42)
Hotlan Siagian(39)
Jumadil Saputra(36)
Dmaithan Almajali(36)
Muhammad Turki Alshurideh(35)
Barween Al Kurdi(32)
Ahmad Makui(32)
Basrowi Basrowi(31)
Hassan Ghodrati(31)
Mohammad Khodaei Valahzaghard(30)
Sautma Ronni Basana(29)
Shankar Chakraborty(29)
Ni Nyoman Kerti Yasa(29)
Sulieman Ibraheem Shelash Al-Hawary(28)
Prasadja Ricardianto(28)
Haitham M. Alzoubi(27)


» Show all authors

Countries

Iran(2183)
Indonesia(1290)
India(787)
Jordan(786)
Vietnam(504)
Saudi Arabia(453)
Malaysia(441)
United Arab Emirates(220)
China(206)
Thailand(153)
United States(111)
Turkey(106)
Ukraine(104)
Egypt(98)
Canada(92)
Peru(88)
Pakistan(85)
United Kingdom(80)
Morocco(79)
Nigeria(78)


» Show all countries

Management Science Letters

ISSN 1923-9343 (Online) - ISSN 1923-9335 (Print)
Quarterly Publication
Volume 4 Issue 9 pp. 1899-1906 , 2014

A framework for the formulation of security issues in the field of e-learning using Meta-Synthesis method Pages 1899-1906 Right click to download the paper Download PDF

Authors: Abouzar Arabsorkhi, Afshin Khodabandeh, Laleh Tashakori

Keywords: E-learning, Formulating requirements, Security issues

Abstract: Application development and e-learning services in the context of communication networks and information along with qualitative and quantitative improvements of activities and services can expand some of threats which emergence in the networks of this infrastructure of telecommunications. Consequently, this is an inevitable necessity attention to accuracy and efficiency payment issues and security concerns to managers and decision makers. Based on other researches and effective experiences in the field of e-learning security, this research attempts to define a logical structure to security contents in this field. We have presented a three-dimensional model for security issues and requirements of e-learning, based on the findings of research. Actuarial three-dimensional model are infrastructure-oriented viewpoint; service-oriented viewpoint and customer-oriented viewpoint. Each of these three dimensions in this model has described in the form of model with two fields: e-learning issues and security of e-learning issues.

How to cite this paper
Arabsorkhi, A., Khodabandeh, A & Tashakori, L. (2014). A framework for the formulation of security issues in the field of e-learning using Meta-Synthesis method.Management Science Letters , 4(9), 1899-1906.

Refrences
Arabsorkhi, A., & Yadegari, A., M. (2010).Identification and analysis of challenges and security strategies in e-learning. Information Sciences and Technology, 26(2), 441-464.

Arabsorkhi, A., Yadegari, A., M., & Kharat, M. (2009). Provide solutions and security requirements in e-learning. First International Conference on e-Learning.

Adams, A. & Blandford, A. (2003). Security and Online Learning: To Protect or Prohibit, Idea Group Inc.

Al Bouna, B. & Chbeir, R. (2006). Multimedia-based authorization and access control policy specification. Proceedings of the 3rd ACM workshop on secure web, 61-68.

Aljawarneh, S. (2011). A web engineering security methodology for e-learning systems. Network Security, 2011(3), 12-15.

Anderson, J.K. (2009). The work-role transition of expert clinician to novice academic educator. Journal of Nursing Education, 48 (4), 203-208.

Assefa, S. & Solms, V. (2009). An Information Security Reference Framework for e-Learning Management Systems (ISRFe-LMS). Proceedings of 9th WCCE.

Balasundaram, S.R. (2011). Securing tests in E-learning environment. In Proceedings of the 2011 International Conference on Communication. Computing & Security (ICCCS & apos; 11), 624-627.

Barlow, R. E. (2007). A study of security in learning management systems. Master & apos; s Essay.

Basha & Dhavachelvan, (2010).Web Service Based Secure E-Learning Management System – Ewe MS. Journal of Convergence Information Technology, 5 (7).

Bleimann, U. (2004). Atlantis university: a new pedagogical approach beyond e-learning. Campus-wide Information Systems, 21(5), 191-195.

Cardenas, R.G. & Sanchez, E.M. (2005). Security Challenges of Distributed e-Learning Systems. Fifth IEEE Int. Symp. And School on Advanced Distributed Systems (ISSADS), Springer, Berlin, 2005, no. 3563 in LNCS, pp. 538-544.

Webber, C. G., Lima, M. D. F. W., Casa, M. E., & Ribeiro, A. M. (2007). Towards Secure e-Learning Applications: a Multiagent Platform. Journal of Software, 2(1), 60-69.

Chen, J.L. (2011). The effects of education compatibility and technological expectancy on e-learning acceptance. Computers & Education, 57, 1501–1511.

Chin, K.L. & Kon, P.N. (2003). Key factors for a fully online e-learning mode: A Delphi study. Proceedings of the 20th Annual Conference of the Australasian Society for Computers in Learning in Tertiary Education.

Chuang, U.H, Chen, C.U., Wu, T.C. & Chao, H.C. (2012). Establish a Secure and Trustworthy ICT Environment for Educational Systems: A Case Study. Journal of Intelligent Manufacturing, 23(4), 965-975.

Defta L. (2011). Security Issues in E-learning Platforms. World Journal on Educational Technology, 3(3), 153-167.

Dong, Y., Li, M., Chen, M. & Zheng, S. (2002). Research on intellectual property right problems of peer-to-peer networks. Electronic Library, 20(2), 143 – 150.

Eibl, C. J. (2008). Risk Analysis towards Secure E-Learning. LYICT 2008, Proc. on CD-ROM, ISBN 978-3-901882-29-6.

Eibl, C. J. (2009). Privacy and Confidentiality in E-Learning Systems. Fourth International Conference on Internet and Web Applications and Services (ICIW 2009). IEEE Computer Society Press, ISBN 978-0-7695-3613-2.

El-Khatib, K., Korba, L., Xu, Y. & Yee, G. (2003). Privacy and Security in E-Learning. Journal of Distance Education, 1(4), 1-19.

Furnell, S. M., & Karweni, T. (2001). Security issues in online distance learning. VINE, 31(2), 28-35.

Furnell, S.M., & Karweni, T. (2001). Security issues in online distance learning. VINE, 31(2), 28 – 35.

Furnell, S.M., Onions, P.D., Knahl, M., Sanders, P.W., Bleimann, U., Gojny, U., & R?der, H.F. (1998). A security framework for online distance learning and training. Internet Research, 8(3), 236-242.

Gelbord, B. (2003). On the use of PKI technologies for secure and private e-Iearning environments. 4th International Conference Conference on Computer Systems and Technologies: e-Learning, 568-572.

Alwi, N. H. M., & Fan, I. S. (2010). E-learning and information security management. International Journal of Digital Society (IJDS), 1(2), 148-156.

Hamid, A. A. (2002).E-learning is it the “e” or the Learning that matters?. The Internet and Higher Education, 4, 311-316.

Hitchings, J. (1995). Deficiencies of the traditional approach to information security and the requirements for a new methodology. Proceedings of Computers & Security, 14, 377-383.

Jalal, A., Zeb, M.A. & Peshawar, P. (2008). Security enhancement for e-learning portal. International Journal of Computer Science and Network Security, 2(4), 236.

Jethro, O. O., Grace, A. M., & Thomas, A. K. (2012). E-Learning and its effects on teaching and learning in a global age. Indian Journal of Education and Information Management, 1(2), 73-78.

Kambourakis, G., Kontoni, D. P. N., Rouskas, A., & Gritzalis, S. (2007). A PKI approach for deploying modern secure distributed e-learning and m-learning environments. Computers & Education, 48(1), 1-16.

Kasse, P., & Balunywa, W. (2013). An assessment of e-learning utilization by a section of Ugandan universities: challenges, success factors and way forward. Conference Papers – International Conference on ICT for Africa.

Khodabandeh, A., Afshari, H., & Manian, A. (2010). Critical factors affecting e-learner’s satisfaction an empirical study. Presented at World Conference on Educational Multimedia, Hypermedia and Telecommunications, Chesapeake, VA.

Lambrinoudakis, C., Gritzalis, S., Dridi, F., & Pernul, G. (2003).Security requirements for e-government services: a methodological approach for developing a common PKI-based security policy. Computer Communications, 26, 1873-1883.

Lim, C.C. & Jin, J.S. (2006). A study on applying software security to information systems: e-learning portals. IJCSNS, 6(3B), 162.

May, M., & Sébastien, G. (2011). Privacy Concerns in E-learning: Is Using Tracking System a Thread?. International Journal of Information and Education Technology, 1(1), 1–8.

Mellado, D., Blanco, C., S?nchez, L. E. & Fern?ndez-Medina, E. (2010). A systematic review of security requirements engineering. Computer Standards & Interfaces, 32(4), 153-165.

Moore, J.L., Dickson-Deane, C., & Galyen, K. (2011). e-Learning, online learning, and distance learning environments: Are they the same?. The Internet and Higher Education, 14(2), 129–135.

Mutula, S. M. (2011). Ethics and trust in digital scholarship. Electronic Library, 29(2), 261-276.

Nickolova, M., & Nickolov, E. (2007). Threat Model for User Security in E-Learning Systems. International Journal of Information Technologies and Knowledge, 341-347.

Noorman, M. & Masrek, B. (2007). Measuring campus portal effectiveness and the contributing factors. Campus-Wide Information Systems, 24(5), 342-354.

Noorminshah, A.I. (2012).The impact of e-learning on students performance in tertiary institutions. International Journal of Computer Networks and Wireless Communications, 2 (2), 121-130.

Perakovic, D., & Remenar, V. (2010). Security audit and mechanism of protecting e-Learning system at the Faculty of Transport and Traffic Sciences, Fakultetprometnihznanosti, Vukeliceva, 4, 10000.

Ramim, M. & Levy, Y. (2006). Securing E-Learning Systems: A Case of Insider Cyber Attacks and Novice IT Management in a Small University. Journal of Cases on Information Technology, 8(4), 24-34.

Roffe, I. (2002). E-learning: engagement, enhancement and execution. Quality Assurance in Education, 10(1), 40-50.

Smith, A.D. & Rupp, W.T. (2004). Managerial implications of computer-based online/face-to-face business education: a case study. Online Information Review, 28(2), 100- 109.

Wong, D. (2007). A critical literature review on e-learning limitations. Journal for the Advancement of Science and Arts.

Weippl, E.R. (2005). In-depth tutorials: Security in e-learning. E-Learn Magazine, 3.
Wentling, T.L., Waight, C., Gallaher, J., La-Fleur, J., Wang, C., & Kanfer, A. (2000). E-learning-A review of literature. University of Illinois.

Yau, J.C.K.,Hui, L.C.K.,Cheung, B., & Yiu, S.M. (2003).eCX: a secure infrastructure for e-course delivery. Internet Research, 13(2), 116-125.

Yong, J. (2011). Security and privacy preservation for mobile e-learning via digital identity attributes. Journal of Universal Computer Science, 17 (2), 296-310.

Younis,A., Cater-Steel, A. & Soar, J. (2013). IT infrastructure services as a requirement for e-learning system success. Computers & Education, 69, 431-451.

Ziemba, E., & Olszak, C.M. (2012). Building a regional structure of an information society on the basis of e-administration. Issues in Informing Science and Information Technology, 7, 129-150.

Zimmer, L. (2006). Qualitative meta-synthesis: A question of dialoguing with texts. Journal of Advanced Nursing, 53(3), 311-318.

Zisis, D., Lekkas, D. & Spyrou, T. (2007).Security services in e-School and their role in the evaluation of educational processes. International Conference on Institutional Evaluation Techniques in Education, ICIETE07.

Zuev, V.I. (2012). E-learning Security Models. Management Information Systems, 7(2), 24-028.
  • 17
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: Management Science Letters | Year: 2014 | Volume: 4 | Issue: 9 | Views: 2447 | Reviews: 0

Related Articles:
  • Measuring the effects of electronic learning components using ANFIS method
  • A study to determine influential factors on data security
  • Investigating challenges and outlook for implementation of information tech ...
  • An empirical investigation to analysis the dimensions of cultural security: ...
  • A new method for improving security in MANETs AODV Protocol

Add Reviews

Name:*
E-Mail:
Review:
Bold Italic Underline Strike | Align left Center Align right | Insert smilies Insert link URLInsert protected URL Select color | Add Hidden Text Insert Quote Convert selected text from selection to Cyrillic (Russian) alphabet Insert spoiler
winkwinkedsmileam
belayfeelfellowlaughing
lollovenorecourse
requestsadtonguewassat
cryingwhatbullyangry
Security Code: *
Include security image CAPCHA.
Refresh Code

® 2010-2026 GrowingScience.Com