You are here:

Security Privacy Challenges in E-Learning 2.0
PROCEEDINGS

, Secure Business Austria, Austria ; , Graz University of Technology, Austria

E-Learn: World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education, in Las Vegas, Nevada, USA ISBN 978-1-880094-66-2 Publisher: Association for the Advancement of Computing in Education (AACE), San Diego, CA

Abstract

E-Learning 2.0 uses Web 2.0 tools for e-learning. New services on the Internet can be swiftly integrated into existing applications; students can create MashUps, for instance, using a variety of services on the Internet. The main risk comes from the fact that students and teachers are not entirely aware that these services are not controlled by their school. The servers are located in a variety of countries, thus privacy laws also differ. In addition, as most Web applications are built as three-tier architectures, typical security weaknesses exist, such as invalid input, a lack of server-side checks, and excessive privileges.

Citation

Weippl, E.R. & Ebner, M. (2008). Security Privacy Challenges in E-Learning 2.0. In C. Bonk, M. Lee & T. Reynolds (Eds.), Proceedings of E-Learn 2008--World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education (pp. 4001-4007). Las Vegas, Nevada, USA: Association for the Advancement of Computing in Education (AACE). Retrieved November 15, 2019 from .

Keywords

References

View References & Citations Map

These references have been extracted automatically and may have some errors. Signed in users can suggest corrections to these mistakes.

Suggest Corrections to References

Cited By

View References & Citations Map

These links are based on references which have been extracted automatically and may have some errors. If you see a mistake, please contact info@learntechlib.org.