Abstract
This article introduces design criteria for e-learning systems based on implications from the disciplines of educational science, software engineering, and information security. Theoretical realization concepts to implement stated requirements are discussed. A conceptual implementation of a proxy server realized within this research project is also presented. This proxy server demonstrates the feasibility of stated concepts and enables outsourcing of security-related tasks to an automated process.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Åhlfeldt, R.-M., Spagnoletti, P., Sindre, G.: Improving the Information Security Model by using TFI. In: [16], pp. 73–85
Anderson, A.: Effective Management of Information Security and Privacy. Educause Quarterly Journal (1), 15–20 (2006)
Anderson, R.: Security Engineering – A Guide to Building Dependable Distributed Systems. Wiley Computer Publishing, New York (2001)
Eibl, C.J.: Information Security in E-Learning. In: Abbott, C., Lustigova, Z. (eds.) Information Technologies for Education and Training. Proc. of IFIP iTET, University of Prague, pp. 204–213 (2007)
Eibl, C.J., von Solms, S.H., Schubert, S.: Development and Application of a Proxy Server for Transparently, Digitally Signing E-Learning Content. In: [16], pp. 181–192 (2007)
Fielding, R., Gettys, J., Mogul, J., Frystyk, H., Masinter, L., Leach, P., Berners-Lee, T.: Hypertext Transfer Protocol. HTTP/1.1. Request for Comments (RFC) 2616 (1999)
Graf, F.: Lernspezifische Sicherheitsmechanismen in Lernumgebungen mit modularem Lernmaterial. Dissertation thesis (German), TU Darmstadt (2002)
Hamid, A.A.: e-Learning: Is it the “e” or the learning that matters? Internet and Higher Education 4(3), 311–316 (2002)
Hills, P.J.: Teaching and Learning as a Communication Process. Croom Helm, London (1979)
Koulountzos, V., Seroglou, F.: Designing a web-based learning environment. The case of ATLAS. In: Benzie, D., Iding, M. (eds.) Informatics, Mathematics and ICT: A golden triangle. Proceedings, Boston, USA, June 27-29 (2007) ISBN-13: 978-0-615-14623-2
Lave, J., Wenger, E.: Situated learning: Legitimate peripheral participation. Cambridge University Press, New York (1991)
McCarthy, M.P., Campbell, S.: Security Transformation: Digital Defense Strategies to Protect Your Company’s Reputation & Market Share. McGraw-Hill, New York (2001)
National Research Council (U.S.): Computers at Risk: Safe Computing in the Information Age. National Academy Press, Washington, DC (1991)
Schneier, B.: Applied Cryptography, 2nd edn. Wiley, New York (1996)
Stacey, E., Gerbic, P.: Teaching for blended learning. How is ICT impacting on distance and on campus education? In: Kumar, D., Turner, J. (eds.) Education for the 21st Century-Impact of ICT and Digital Resources: Proceedings of the IFIP 19th World Computer Congress, TC-3, Education, pp. 225–234. Springer, Boston (2006)
Venter, H., Eloff, M., Labuschagne, L., Eloff, J., von Solms, R.: New Approaches for Security, Privacy and Trust in Complex Environments. IFIP sec2007. Springer, New York (2007)
Voydock, V.L., Kent, S.T.: Security Mechanisms in High-Level Network Protocols. ACM Computing Surveys 15(2), 135–171 (1983)
Weippl, E.R.: Security in E-Learning. Springer, New York (2005)
Yasinsac, A., Manzano, Y.: Policies to Enhance Computer and Network Forensics. In: Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, United States Military Academy, West Point, NY, June 5-6 (2001)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Eibl, C.J., Schubert, S.E. (2008). Development of E-Learning Design Criteria with Secure Realization Concepts. In: Mittermeir, R.T., Sysło, M.M. (eds) Informatics Education - Supporting Computational Thinking. ISSEP 2008. Lecture Notes in Computer Science, vol 5090. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69924-8_30
Download citation
DOI: https://doi.org/10.1007/978-3-540-69924-8_30
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-69923-1
Online ISBN: 978-3-540-69924-8
eBook Packages: Computer ScienceComputer Science (R0)