Security Privacy Challenges in E-Learning 2.0
Edgar R. Weippl, Secure Business Austria, Austria ; Martin Ebner, Graz University of Technology, Austria
E-Learn: World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education, in Las Vegas, Nevada, USA ISBN 978-1-880094-66-2 Publisher: Association for the Advancement of Computing in Education (AACE), San Diego, CA
E-Learning 2.0 uses Web 2.0 tools for e-learning. New services on the Internet can be swiftly integrated into existing applications; students can create MashUps, for instance, using a variety of services on the Internet. The main risk comes from the fact that students and teachers are not entirely aware that these services are not controlled by their school. The servers are located in a variety of countries, thus privacy laws also differ. In addition, as most Web applications are built as three-tier architectures, typical security weaknesses exist, such as invalid input, a lack of server-side checks, and excessive privileges.
Weippl, E.R. & Ebner, M. (2008). Security Privacy Challenges in E-Learning 2.0. In C. Bonk, M. Lee & T. Reynolds (Eds.), Proceedings of E-Learn 2008--World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education (pp. 4001-4007). Las Vegas, Nevada, USA: Association for the Advancement of Computing in Education (AACE).
© 2008 Association for the Advancement of Computing in Education (AACE)
ReferencesView References & Citations Map
These references have been extracted automatically and may have some errors. Signed in users can suggest corrections to these mistakes.Suggest Corrections to References
Cited ByView References & Citations Map
Ali Alkazimi, Florida Atlantic University, United States
Society for Information Technology & Teacher Education International Conference 2018 (Mar 26, 2018) pp. 87–93
Yong Chen & Wu He, Old Dominion University
The International Review of Research in Open and Distributed Learning Vol. 14, No. 5 (Oct 31, 2013)
These links are based on references which have been extracted automatically and may have some errors. If you see a mistake, please contact firstname.lastname@example.org.