{"title":"Ontology of e-Learning security","authors":"G. Akmayeva, C. Shoniregun","doi":"10.1109/I-SOCIETY16502.2010.6018837","DOIUrl":null,"url":null,"abstract":"The ubiquitous nature of e-Learning applications in dealing with huge and diverse population of users creates the gap for errors and malicious attacks. The ability to quickly estimate security risks is particularly crucial for automated assessment of e-learning. What type of measures is taken to keep the privacy and integrity of the information stored? And whether there are mechanisms that can prevent cheating when performing online examinations? In most cases, the e-Learning applications are designed and implemented to combine distinct services into a coherent whole in order to fulfil sophisticated tasks that cannot be fulfilled by a single service. Therefore, an awareness of threats and their countermeasures are essential, as e-Learning does not operate in a vacuum. This paper focuses on the ontology of E-Learning security.","PeriodicalId":407855,"journal":{"name":"2010 International Conference on Information Society","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on Information Society","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/I-SOCIETY16502.2010.6018837","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
The ubiquitous nature of e-Learning applications in dealing with huge and diverse population of users creates the gap for errors and malicious attacks. The ability to quickly estimate security risks is particularly crucial for automated assessment of e-learning. What type of measures is taken to keep the privacy and integrity of the information stored? And whether there are mechanisms that can prevent cheating when performing online examinations? In most cases, the e-Learning applications are designed and implemented to combine distinct services into a coherent whole in order to fulfil sophisticated tasks that cannot be fulfilled by a single service. Therefore, an awareness of threats and their countermeasures are essential, as e-Learning does not operate in a vacuum. This paper focuses on the ontology of E-Learning security.