Openly accessible

Security in the online e-learning environment

Raitman, Ruth, Ngo, Leanne, Augar, Naomi and Zhou, Wanlei 2005, Security in the online e-learning environment, in 5th IEEE International Conference on Advanced Learning Technologies : ICALT 2005 : proceedings : 5-8 July, 2005, Kaohsiung, Taiwan, IEEE Computer Society, Los Alamitos, Calif., pp. 702-706.

Attached Files
Name Description MIMEType Size Downloads
zhou-securityonlinelearning-2005.pdf Published version application/pdf 147.67KB 529

Title Security in the online e-learning environment
Author(s) Raitman, Ruth
Ngo, Leanne
Augar, Naomi
Zhou, Wanlei
Conference name IEEE International Conference on Advanced Learning Technologies (5th : 2005 : Kao-hsiung shih, Taiwan)
Conference location Kaohsiung, Taiwan
Conference dates 5-8 July 2005
Title of proceedings 5th IEEE International Conference on Advanced Learning Technologies : ICALT 2005 : proceedings : 5-8 July, 2005, Kaohsiung, Taiwan
Editor(s) Goodyear, P.
Sampson, D. G.
Yang, D. J.
Kinshuk,
Okamoto, T.
Hartley, R.
Chen, N.
Publication date 2005
Conference series International Conference on Advanced Learning Technologies
Start page 702
End page 706
Publisher IEEE Computer Society
Place of publication Los Alamitos, Calif.
Keyword(s) internet
aeb sites
computer aided instruction
distance learning
groupware
security of data
social aspects of automation
Summary This paper addresses the role of security in the collaborative e-learning environment, and in particular, the social aspects of security and the importance of identity. It represents a case study, completed in Nov 2004, which was conducted to test the sense of security that students experienced whilst using the wiki platform as a means of online collaboration in the tertiary education environment. Wikis, fully editable Web sites, are easily accessible, require no software and allow its contributors (in this case students) to feel a sense of responsibility and ownership. A comparison between two wiki studies will be made whereby one group employed user login and the other maintained anonymity throughout the course of the study. The results consider the democratic participation and evolution of the work requirements over time, which in fact ascertains the nonvalidity of administrative identification.
Notes This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
ISBN 0769523382
9780769523385
Language eng
Field of Research 080303 Computer System Security
HERDC Research category E1 Full written paper - refereed
Copyright notice ©2005 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.
Persistent URL http://hdl.handle.net/10536/DRO/DU:30005739

Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.

Versions
Version Filter Type
Access Statistics: 437 Abstract Views, 585 File Downloads  -  Detailed Statistics
Created: Mon, 07 Jul 2008, 09:53:33 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.