A study of e-learning security system and its impact on educators

被引:1
作者
Garg, Tanya [1 ]
Goyal, Ruchi [1 ]
Goyal, Dinesh [2 ]
机构
[1] JECRC Univ, Jaipur Sch Business, Jaipur, Rajasthan, India
[2] Poornima Inst Engn & Technol, Dept Comp Engn, Jaipur, Rajasthan, India
关键词
Security; E-learning; Teachers; Risks; Education;
D O I
10.47974/JDMSC-1775
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
E-Learning is the process of learning which includes interaction between teachers and learners, with comparison to traditional method of education. Plus, it is dependent on the web applications and internet technology. But, the environment of network is considered as a honey pot as it attracts many hackers; also, it is prone to many security risks like, malicious attacks, hackings, etc. Network security is one of the major concerns of the teachers, learners, instructors, etc., as they are not able to foresee risks and do not know the prevention as well. The aim of this study is to investigate the security issues associated with e-learning and effective countermeasures to prevent or mitigate these risks.
引用
收藏
页码:1489 / 1498
页数:10
相关论文
共 16 条
[1]  
Atanasov V, 2022, INT J INF TECHNOL SE, V14, P13
[2]  
Baby A., 2014, International Journal of Computer Science Issues (IJCSI), V11, P195
[3]  
Dai N. H. P., 2016, Journal of Emerging Research and Solutions in ICT, V1, P17, DOI DOI 10.20544/ERSICT.01.16.P02
[4]   Semantic and Agnostic Representation of Cloud Patterns for Cloud Interoperability and Portability [J].
Di Martino, Beniamino ;
Cretella, Giuseppina ;
Esposito, Antonio .
2013 IEEE FIFTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), VOL 2, 2013, :182-187
[5]   Advanced EHR system in homes-in-schools' automation using internet of things and machine learning [J].
Duodu, Nana Yaw ;
Patel, Warish .
JOURNAL OF INFORMATION & OPTIMIZATION SCIENCES, 2022, 43 (08) :1953-1962
[6]  
Garg Tanya, 2021, Proceedings of the Second International Conference on Information Management and Machine Intelligence (ICIMMI 2020). Lecture Notes in Networks and Systems (LNNS 166), P755, DOI 10.1007/978-981-15-9689-6_82
[7]  
Garg T., 2022, P 3 INT C INFORM MAN, P635
[8]  
Howard M, 2005, COMPUTER SECURITY IN THE 21ST CENTURY, P109, DOI 10.1007/0-387-24006-3_8
[9]   Application of Robotic Process Automation in education sector [J].
Khan, Sofia ;
Tailor, R. K. ;
Pareek, Ranu ;
Gujrati, Rashmi ;
Uygun, Hayri .
JOURNAL OF INFORMATION & OPTIMIZATION SCIENCES, 2022, 43 (07) :1815-1834
[10]  
Manadhata P., 2004, Measuring a system's attack surface