Security in Online Learning Assessment Towards an Effective Trustworthiness Approach to Support e-Learning Teams

被引:12
作者
Miguel, Jorge [1 ]
Caballe, Santi [1 ]
Xhafa, Fatos [2 ]
Prieto, Josep [1 ]
机构
[1] Open Univ Catalonia, Dept Comp Sci Multimedia & Telecommun, Barcelona, Spain
[2] Tech Univ Catalonia, Dept Languages & Informat Syst, Barcelona, Spain
来源
2014 IEEE 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA) | 2014年
关键词
trustworthiness; e-assessment; information security; collaborative learning; parallel processing;
D O I
10.1109/AINA.2014.106
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes a trustworthiness model for the design of secure learning assessment in on-line collaborative learning groups. Although computer supported collaborative learning has been widely adopted in many educational institutions over the last decade, there exist still drawbacks which limit their potential in collaborative learning activities. Among these limitations, we investigate information security requirements in on-line assessment, (e-assessment), which can be developed in collaborative learning contexts. Despite information security enhancements have been developed in recent years, to the best of our knowledge, integrated and holistic security models have not been completely carried out yet. Even when security advanced methodologies and technologies are deployed in Learning Management Systems, too many types of vulnerabilities still remain opened and unsolved. Therefore, new models such as trustworthiness approaches can overcome these lacks and support e-assessment requirements for e-Learning. To this end, a trustworthiness model is designed in order to conduct the guidelines of a holistic security model for on-line collaborative learning through effective trustworthiness approaches. In addition, since users' trustworthiness analysis involves large amounts of ill-structured data, a parallel processing paradigm is proposed to build relevant information modeling trustworthiness levels for e-Learning.
引用
收藏
页码:123 / 130
页数:8
相关论文
共 21 条
[1]  
[Anonymous], 2012, Hadoop: The definitive guide
[2]  
[Anonymous], CSO MAGAZINE
[3]  
Bernthal P., 1997, SURVEY TRUST WORKPLA
[4]  
Caballe S., 2013, CLUSTER COMPUTING
[5]  
Dai CY, 2008, LECT NOTES COMPUT SC, V5159, P82
[6]  
Dark M.J., 2011, INFORM ASSURANCE SEC
[7]  
Demott J. D., 2011, GRAY HAT HACKING
[8]  
Eibl C.J., 2010, Discussion of information security in e-learning (Doctoral dissertation)
[9]  
Ferencz SK, 1998, CAUSE EFFECT PRACTIT, V21, P5
[10]  
Levy Y., 2006, CHAIS C INSTR TECHN