How to cite this paper
Arabsorkhi, A., Khodabandeh, A & Tashakori, L. (2014). A framework for the formulation of security issues in the field of e-learning using Meta-Synthesis method.Management Science Letters , 4(9), 1899-1906.
Refrences
Arabsorkhi, A., & Yadegari, A., M. (2010).Identification and analysis of challenges and security strategies in e-learning. Information Sciences and Technology, 26(2), 441-464.
Arabsorkhi, A., Yadegari, A., M., & Kharat, M. (2009). Provide solutions and security requirements in e-learning. First International Conference on e-Learning.
Adams, A. & Blandford, A. (2003). Security and Online Learning: To Protect or Prohibit, Idea Group Inc.
Al Bouna, B. & Chbeir, R. (2006). Multimedia-based authorization and access control policy specification. Proceedings of the 3rd ACM workshop on secure web, 61-68.
Aljawarneh, S. (2011). A web engineering security methodology for e-learning systems. Network Security, 2011(3), 12-15.
Anderson, J.K. (2009). The work-role transition of expert clinician to novice academic educator. Journal of Nursing Education, 48 (4), 203-208.
Assefa, S. & Solms, V. (2009). An Information Security Reference Framework for e-Learning Management Systems (ISRFe-LMS). Proceedings of 9th WCCE.
Balasundaram, S.R. (2011). Securing tests in E-learning environment. In Proceedings of the 2011 International Conference on Communication. Computing & Security (ICCCS & apos; 11), 624-627.
Barlow, R. E. (2007). A study of security in learning management systems. Master & apos; s Essay.
Basha & Dhavachelvan, (2010).Web Service Based Secure E-Learning Management System – Ewe MS. Journal of Convergence Information Technology, 5 (7).
Bleimann, U. (2004). Atlantis university: a new pedagogical approach beyond e-learning. Campus-wide Information Systems, 21(5), 191-195.
Cardenas, R.G. & Sanchez, E.M. (2005). Security Challenges of Distributed e-Learning Systems. Fifth IEEE Int. Symp. And School on Advanced Distributed Systems (ISSADS), Springer, Berlin, 2005, no. 3563 in LNCS, pp. 538-544.
Webber, C. G., Lima, M. D. F. W., Casa, M. E., & Ribeiro, A. M. (2007). Towards Secure e-Learning Applications: a Multiagent Platform. Journal of Software, 2(1), 60-69.
Chen, J.L. (2011). The effects of education compatibility and technological expectancy on e-learning acceptance. Computers & Education, 57, 1501–1511.
Chin, K.L. & Kon, P.N. (2003). Key factors for a fully online e-learning mode: A Delphi study. Proceedings of the 20th Annual Conference of the Australasian Society for Computers in Learning in Tertiary Education.
Chuang, U.H, Chen, C.U., Wu, T.C. & Chao, H.C. (2012). Establish a Secure and Trustworthy ICT Environment for Educational Systems: A Case Study. Journal of Intelligent Manufacturing, 23(4), 965-975.
Defta L. (2011). Security Issues in E-learning Platforms. World Journal on Educational Technology, 3(3), 153-167.
Dong, Y., Li, M., Chen, M. & Zheng, S. (2002). Research on intellectual property right problems of peer-to-peer networks. Electronic Library, 20(2), 143 – 150.
Eibl, C. J. (2008). Risk Analysis towards Secure E-Learning. LYICT 2008, Proc. on CD-ROM, ISBN 978-3-901882-29-6.
Eibl, C. J. (2009). Privacy and Confidentiality in E-Learning Systems. Fourth International Conference on Internet and Web Applications and Services (ICIW 2009). IEEE Computer Society Press, ISBN 978-0-7695-3613-2.
El-Khatib, K., Korba, L., Xu, Y. & Yee, G. (2003). Privacy and Security in E-Learning. Journal of Distance Education, 1(4), 1-19.
Furnell, S. M., & Karweni, T. (2001). Security issues in online distance learning. VINE, 31(2), 28-35.
Furnell, S.M., & Karweni, T. (2001). Security issues in online distance learning. VINE, 31(2), 28 – 35.
Furnell, S.M., Onions, P.D., Knahl, M., Sanders, P.W., Bleimann, U., Gojny, U., & R?der, H.F. (1998). A security framework for online distance learning and training. Internet Research, 8(3), 236-242.
Gelbord, B. (2003). On the use of PKI technologies for secure and private e-Iearning environments. 4th International Conference Conference on Computer Systems and Technologies: e-Learning, 568-572.
Alwi, N. H. M., & Fan, I. S. (2010). E-learning and information security management. International Journal of Digital Society (IJDS), 1(2), 148-156.
Hamid, A. A. (2002).E-learning is it the “e” or the Learning that matters?. The Internet and Higher Education, 4, 311-316.
Hitchings, J. (1995). Deficiencies of the traditional approach to information security and the requirements for a new methodology. Proceedings of Computers & Security, 14, 377-383.
Jalal, A., Zeb, M.A. & Peshawar, P. (2008). Security enhancement for e-learning portal. International Journal of Computer Science and Network Security, 2(4), 236.
Jethro, O. O., Grace, A. M., & Thomas, A. K. (2012). E-Learning and its effects on teaching and learning in a global age. Indian Journal of Education and Information Management, 1(2), 73-78.
Kambourakis, G., Kontoni, D. P. N., Rouskas, A., & Gritzalis, S. (2007). A PKI approach for deploying modern secure distributed e-learning and m-learning environments. Computers & Education, 48(1), 1-16.
Kasse, P., & Balunywa, W. (2013). An assessment of e-learning utilization by a section of Ugandan universities: challenges, success factors and way forward. Conference Papers – International Conference on ICT for Africa.
Khodabandeh, A., Afshari, H., & Manian, A. (2010). Critical factors affecting e-learner’s satisfaction an empirical study. Presented at World Conference on Educational Multimedia, Hypermedia and Telecommunications, Chesapeake, VA.
Lambrinoudakis, C., Gritzalis, S., Dridi, F., & Pernul, G. (2003).Security requirements for e-government services: a methodological approach for developing a common PKI-based security policy. Computer Communications, 26, 1873-1883.
Lim, C.C. & Jin, J.S. (2006). A study on applying software security to information systems: e-learning portals. IJCSNS, 6(3B), 162.
May, M., & Sébastien, G. (2011). Privacy Concerns in E-learning: Is Using Tracking System a Thread?. International Journal of Information and Education Technology, 1(1), 1–8.
Mellado, D., Blanco, C., S?nchez, L. E. & Fern?ndez-Medina, E. (2010). A systematic review of security requirements engineering. Computer Standards & Interfaces, 32(4), 153-165.
Moore, J.L., Dickson-Deane, C., & Galyen, K. (2011). e-Learning, online learning, and distance learning environments: Are they the same?. The Internet and Higher Education, 14(2), 129–135.
Mutula, S. M. (2011). Ethics and trust in digital scholarship. Electronic Library, 29(2), 261-276.
Nickolova, M., & Nickolov, E. (2007). Threat Model for User Security in E-Learning Systems. International Journal of Information Technologies and Knowledge, 341-347.
Noorman, M. & Masrek, B. (2007). Measuring campus portal effectiveness and the contributing factors. Campus-Wide Information Systems, 24(5), 342-354.
Noorminshah, A.I. (2012).The impact of e-learning on students performance in tertiary institutions. International Journal of Computer Networks and Wireless Communications, 2 (2), 121-130.
Perakovic, D., & Remenar, V. (2010). Security audit and mechanism of protecting e-Learning system at the Faculty of Transport and Traffic Sciences, Fakultetprometnihznanosti, Vukeliceva, 4, 10000.
Ramim, M. & Levy, Y. (2006). Securing E-Learning Systems: A Case of Insider Cyber Attacks and Novice IT Management in a Small University. Journal of Cases on Information Technology, 8(4), 24-34.
Roffe, I. (2002). E-learning: engagement, enhancement and execution. Quality Assurance in Education, 10(1), 40-50.
Smith, A.D. & Rupp, W.T. (2004). Managerial implications of computer-based online/face-to-face business education: a case study. Online Information Review, 28(2), 100- 109.
Wong, D. (2007). A critical literature review on e-learning limitations. Journal for the Advancement of Science and Arts.
Weippl, E.R. (2005). In-depth tutorials: Security in e-learning. E-Learn Magazine, 3.
Wentling, T.L., Waight, C., Gallaher, J., La-Fleur, J., Wang, C., & Kanfer, A. (2000). E-learning-A review of literature. University of Illinois.
Yau, J.C.K.,Hui, L.C.K.,Cheung, B., & Yiu, S.M. (2003).eCX: a secure infrastructure for e-course delivery. Internet Research, 13(2), 116-125.
Yong, J. (2011). Security and privacy preservation for mobile e-learning via digital identity attributes. Journal of Universal Computer Science, 17 (2), 296-310.
Younis,A., Cater-Steel, A. & Soar, J. (2013). IT infrastructure services as a requirement for e-learning system success. Computers & Education, 69, 431-451.
Ziemba, E., & Olszak, C.M. (2012). Building a regional structure of an information society on the basis of e-administration. Issues in Informing Science and Information Technology, 7, 129-150.
Zimmer, L. (2006). Qualitative meta-synthesis: A question of dialoguing with texts. Journal of Advanced Nursing, 53(3), 311-318.
Zisis, D., Lekkas, D. & Spyrou, T. (2007).Security services in e-School and their role in the evaluation of educational processes. International Conference on Institutional Evaluation Techniques in Education, ICIETE07.
Zuev, V.I. (2012). E-learning Security Models. Management Information Systems, 7(2), 24-028.
Arabsorkhi, A., Yadegari, A., M., & Kharat, M. (2009). Provide solutions and security requirements in e-learning. First International Conference on e-Learning.
Adams, A. & Blandford, A. (2003). Security and Online Learning: To Protect or Prohibit, Idea Group Inc.
Al Bouna, B. & Chbeir, R. (2006). Multimedia-based authorization and access control policy specification. Proceedings of the 3rd ACM workshop on secure web, 61-68.
Aljawarneh, S. (2011). A web engineering security methodology for e-learning systems. Network Security, 2011(3), 12-15.
Anderson, J.K. (2009). The work-role transition of expert clinician to novice academic educator. Journal of Nursing Education, 48 (4), 203-208.
Assefa, S. & Solms, V. (2009). An Information Security Reference Framework for e-Learning Management Systems (ISRFe-LMS). Proceedings of 9th WCCE.
Balasundaram, S.R. (2011). Securing tests in E-learning environment. In Proceedings of the 2011 International Conference on Communication. Computing & Security (ICCCS & apos; 11), 624-627.
Barlow, R. E. (2007). A study of security in learning management systems. Master & apos; s Essay.
Basha & Dhavachelvan, (2010).Web Service Based Secure E-Learning Management System – Ewe MS. Journal of Convergence Information Technology, 5 (7).
Bleimann, U. (2004). Atlantis university: a new pedagogical approach beyond e-learning. Campus-wide Information Systems, 21(5), 191-195.
Cardenas, R.G. & Sanchez, E.M. (2005). Security Challenges of Distributed e-Learning Systems. Fifth IEEE Int. Symp. And School on Advanced Distributed Systems (ISSADS), Springer, Berlin, 2005, no. 3563 in LNCS, pp. 538-544.
Webber, C. G., Lima, M. D. F. W., Casa, M. E., & Ribeiro, A. M. (2007). Towards Secure e-Learning Applications: a Multiagent Platform. Journal of Software, 2(1), 60-69.
Chen, J.L. (2011). The effects of education compatibility and technological expectancy on e-learning acceptance. Computers & Education, 57, 1501–1511.
Chin, K.L. & Kon, P.N. (2003). Key factors for a fully online e-learning mode: A Delphi study. Proceedings of the 20th Annual Conference of the Australasian Society for Computers in Learning in Tertiary Education.
Chuang, U.H, Chen, C.U., Wu, T.C. & Chao, H.C. (2012). Establish a Secure and Trustworthy ICT Environment for Educational Systems: A Case Study. Journal of Intelligent Manufacturing, 23(4), 965-975.
Defta L. (2011). Security Issues in E-learning Platforms. World Journal on Educational Technology, 3(3), 153-167.
Dong, Y., Li, M., Chen, M. & Zheng, S. (2002). Research on intellectual property right problems of peer-to-peer networks. Electronic Library, 20(2), 143 – 150.
Eibl, C. J. (2008). Risk Analysis towards Secure E-Learning. LYICT 2008, Proc. on CD-ROM, ISBN 978-3-901882-29-6.
Eibl, C. J. (2009). Privacy and Confidentiality in E-Learning Systems. Fourth International Conference on Internet and Web Applications and Services (ICIW 2009). IEEE Computer Society Press, ISBN 978-0-7695-3613-2.
El-Khatib, K., Korba, L., Xu, Y. & Yee, G. (2003). Privacy and Security in E-Learning. Journal of Distance Education, 1(4), 1-19.
Furnell, S. M., & Karweni, T. (2001). Security issues in online distance learning. VINE, 31(2), 28-35.
Furnell, S.M., & Karweni, T. (2001). Security issues in online distance learning. VINE, 31(2), 28 – 35.
Furnell, S.M., Onions, P.D., Knahl, M., Sanders, P.W., Bleimann, U., Gojny, U., & R?der, H.F. (1998). A security framework for online distance learning and training. Internet Research, 8(3), 236-242.
Gelbord, B. (2003). On the use of PKI technologies for secure and private e-Iearning environments. 4th International Conference Conference on Computer Systems and Technologies: e-Learning, 568-572.
Alwi, N. H. M., & Fan, I. S. (2010). E-learning and information security management. International Journal of Digital Society (IJDS), 1(2), 148-156.
Hamid, A. A. (2002).E-learning is it the “e” or the Learning that matters?. The Internet and Higher Education, 4, 311-316.
Hitchings, J. (1995). Deficiencies of the traditional approach to information security and the requirements for a new methodology. Proceedings of Computers & Security, 14, 377-383.
Jalal, A., Zeb, M.A. & Peshawar, P. (2008). Security enhancement for e-learning portal. International Journal of Computer Science and Network Security, 2(4), 236.
Jethro, O. O., Grace, A. M., & Thomas, A. K. (2012). E-Learning and its effects on teaching and learning in a global age. Indian Journal of Education and Information Management, 1(2), 73-78.
Kambourakis, G., Kontoni, D. P. N., Rouskas, A., & Gritzalis, S. (2007). A PKI approach for deploying modern secure distributed e-learning and m-learning environments. Computers & Education, 48(1), 1-16.
Kasse, P., & Balunywa, W. (2013). An assessment of e-learning utilization by a section of Ugandan universities: challenges, success factors and way forward. Conference Papers – International Conference on ICT for Africa.
Khodabandeh, A., Afshari, H., & Manian, A. (2010). Critical factors affecting e-learner’s satisfaction an empirical study. Presented at World Conference on Educational Multimedia, Hypermedia and Telecommunications, Chesapeake, VA.
Lambrinoudakis, C., Gritzalis, S., Dridi, F., & Pernul, G. (2003).Security requirements for e-government services: a methodological approach for developing a common PKI-based security policy. Computer Communications, 26, 1873-1883.
Lim, C.C. & Jin, J.S. (2006). A study on applying software security to information systems: e-learning portals. IJCSNS, 6(3B), 162.
May, M., & Sébastien, G. (2011). Privacy Concerns in E-learning: Is Using Tracking System a Thread?. International Journal of Information and Education Technology, 1(1), 1–8.
Mellado, D., Blanco, C., S?nchez, L. E. & Fern?ndez-Medina, E. (2010). A systematic review of security requirements engineering. Computer Standards & Interfaces, 32(4), 153-165.
Moore, J.L., Dickson-Deane, C., & Galyen, K. (2011). e-Learning, online learning, and distance learning environments: Are they the same?. The Internet and Higher Education, 14(2), 129–135.
Mutula, S. M. (2011). Ethics and trust in digital scholarship. Electronic Library, 29(2), 261-276.
Nickolova, M., & Nickolov, E. (2007). Threat Model for User Security in E-Learning Systems. International Journal of Information Technologies and Knowledge, 341-347.
Noorman, M. & Masrek, B. (2007). Measuring campus portal effectiveness and the contributing factors. Campus-Wide Information Systems, 24(5), 342-354.
Noorminshah, A.I. (2012).The impact of e-learning on students performance in tertiary institutions. International Journal of Computer Networks and Wireless Communications, 2 (2), 121-130.
Perakovic, D., & Remenar, V. (2010). Security audit and mechanism of protecting e-Learning system at the Faculty of Transport and Traffic Sciences, Fakultetprometnihznanosti, Vukeliceva, 4, 10000.
Ramim, M. & Levy, Y. (2006). Securing E-Learning Systems: A Case of Insider Cyber Attacks and Novice IT Management in a Small University. Journal of Cases on Information Technology, 8(4), 24-34.
Roffe, I. (2002). E-learning: engagement, enhancement and execution. Quality Assurance in Education, 10(1), 40-50.
Smith, A.D. & Rupp, W.T. (2004). Managerial implications of computer-based online/face-to-face business education: a case study. Online Information Review, 28(2), 100- 109.
Wong, D. (2007). A critical literature review on e-learning limitations. Journal for the Advancement of Science and Arts.
Weippl, E.R. (2005). In-depth tutorials: Security in e-learning. E-Learn Magazine, 3.
Wentling, T.L., Waight, C., Gallaher, J., La-Fleur, J., Wang, C., & Kanfer, A. (2000). E-learning-A review of literature. University of Illinois.
Yau, J.C.K.,Hui, L.C.K.,Cheung, B., & Yiu, S.M. (2003).eCX: a secure infrastructure for e-course delivery. Internet Research, 13(2), 116-125.
Yong, J. (2011). Security and privacy preservation for mobile e-learning via digital identity attributes. Journal of Universal Computer Science, 17 (2), 296-310.
Younis,A., Cater-Steel, A. & Soar, J. (2013). IT infrastructure services as a requirement for e-learning system success. Computers & Education, 69, 431-451.
Ziemba, E., & Olszak, C.M. (2012). Building a regional structure of an information society on the basis of e-administration. Issues in Informing Science and Information Technology, 7, 129-150.
Zimmer, L. (2006). Qualitative meta-synthesis: A question of dialoguing with texts. Journal of Advanced Nursing, 53(3), 311-318.
Zisis, D., Lekkas, D. & Spyrou, T. (2007).Security services in e-School and their role in the evaluation of educational processes. International Conference on Institutional Evaluation Techniques in Education, ICIETE07.
Zuev, V.I. (2012). E-learning Security Models. Management Information Systems, 7(2), 24-028.