Skip to main content

Part of the book series: Studies in Computational Intelligence ((SCI,volume 308))

Abstract

E-learning systems have made considerable progress within the last few years. Nonetheless, the issue of learner privacy has been practically ignored. Existing E-learning standards offer some provisions for privacy and the security of E-learning systems offers some privacy protection. Privacy preserving E-learning solutions fall short and still require further development. Additionally, the advent of E-learning 2.0 introduced a whole new set of challenges with regards to privacy preservation. In this chapter we introduce E-learning systems security and privacy preserving approaches, challenges they still face, as well as the challenges brought forth by E-learning 2.0.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Aïmeur, E., Hage, H., Mani Onana, F.S.: A Framework for Privacy-Preserving E-learning. In: Joint Itrust and PST conferences on Privacy, Trust Management and Security (IFIPTM 2007), Moncton (2007)

    Google Scholar 

  • Aïmeur, E., Hage, H., Mani Onana, F.S.: Anonymous Credentials for Privacy-Preserving E-learning. In: The Montreal Conference on eTechnologies 2008, MCETECH 2008, Montreal (2008)

    Google Scholar 

  • Anwar, M., Greer, J.: Role and Relationship-Based Identity Management for Private yet Accountable E-Learning. In: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, IFIPTM 2008, Trondheim (2008)

    Google Scholar 

  • Anwar, M., Greer, J.: Implementing Role-and Relationship-based Identity Management in E-learning Environments. In: 14th International Conference on Artificial Intelligence in Education, AIED 2009, Brighton, pp. 608–610 (2009)

    Google Scholar 

  • BBC, Hackers hit Twitter and Facebook. BBC News (2009a), http://news.bbc.co.uk/2/hi/8188201.stm (Retrieved)

  • BBC, US man ’stole 130m card numbers’ BBC News (2009b), http://news.bbc.co.uk/2/hi/americas/8206305.stm (Retrieved)

  • Blanchard, E., Roy, M., Lajoie, S., Frasson, C.: An evaluation of sociocultural data for predicting attitudinal tendencies. In: 14th International Conference on Artificial Intelligence in Education, AIED 2009, Brighton, pp. 399–406 (2009)

    Google Scholar 

  • Brooks, C.A., Greer, J.E., Melis, E., Ullrich, C.: Combining ITS and eLearning Technologies: Opportunities and Challenges. In: Ikeda, M., Ashley, K.D., Chan, T.-W. (eds.) ITS 2006. LNCS, vol. 4053, pp. 278–287. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  • Brusilovsky, P., Farzan, R., Jae-wook, A.: Comprehensive personalized information access in an educational digital library. In: Proceedings of the 5th ACM/IEEE-CS Joint Conference on Digital Libraries, JCDL 2005 (2005)

    Google Scholar 

  • Conati, C.: Probabilistic assessment of user’s emotions in educational games. Journal of Applied Artificial Intelligence 16(7-8), 555–575 (2002)

    Article  Google Scholar 

  • Conti, G.: Googling Security: How Much Does Google Know About You? Addison-Wesley Professional, Reading (2008)

    Google Scholar 

  • Dolog, P., Henze, N., Nejdl, W., Sintek, M.: Personalization in Distributed eLearning Environments. In: 13th World Wide Web Conference, New York, pp. 170–179 (2004)

    Google Scholar 

  • Franz, E., Wahrig, H., Boettcher, A., Borcea-Pfitzmann, K.: Access Control in a Privacy-Aware eLearning Environment. In: International Conference on Availability, Reliability and Security, ARES 2006, Vienna, pp. 879–886 (2006)

    Google Scholar 

  • Hage, H., Aïmeur, E.: Harnessing learner’s collective intelligence: a Web2.0 approach to E-learning. In: Woolf, B.P., Aïmeur, E., Nkambou, R., Lajoie, S. (eds.) ITS 2008. LNCS, vol. 5091, pp. 438–447. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  • Hage, H., Aïmeur, E.: The impact of privacy on learners in the context of a web-based test. In: 14th International Conference on Artificial Intelligence in Education, AIED 2009, Brighton, pp. 65–72 (2009a)

    Google Scholar 

  • Hage, H., Aïmeur, E.: The impact of privacy on learners in the context of a web-based test. In: 14th International Conference on Artificial Intelligence in Education, AIED 2009, Brighton (2009b)

    Google Scholar 

  • IMS, IMS Global Learning Consortium, http://www.imsproject.org/ (Retrieved, September 2007)

  • Jerman-Blazic, B., Klobucar, T.: Privacy provision in e-learning standardized systems: status and improvements. Computer Standards & Interfaces 27(6), 561–578 (2005)

    Article  Google Scholar 

  • Lee, J.: Cyberattack rocks South Korea. GlobalPost (2009), http://www.globalpost.com/dispatch/south-korea/090710/cyberattacks (Retrieved)

  • Lenhart, A., Madden, M., Macgill, A.R., Smith, A.: Teens and Social Media (2007), http://www.pewinternet.org/PPF/r/230/report_display.aspU (Retrieved, January 2008)

  • LTSC Learning Technologies Standardization Committee (LTSC), http://www.ieeeltsc.org/ (Retrieved, September 2007)

  • Mao, Y., Vassileva, J., Grassmann, W.: A System Dynamics Approach to Study Virtual Communities. In: 40th Annual Hawaii International Conference on System Sciences, HICSS 2007, Waikoloa, Hawaii, p. 178a (2007)

    Google Scholar 

  • Mccombs, B.L., Vakili, D.: A Learner-Centered Framework for E-Learning. Teachers College Record 107(8), 1582–1600 (2005)

    Article  Google Scholar 

  • Messmer, E.: DDoS attacks, network hacks rampant in oil and gas industry, other infrastructure sectors Network World (2010), http://www.networkworld.com/news/2010/012710-ddos-oil-gas.html (Retrieved)

  • O’Dell, J.: RockYou Hacker: 30% of Sites Store Plain Text Passwords The New York Times (2009), http://www.nytimes.com/external/readwriteweb/2009/12/16/16readwriteweb-rockyou-hacker-30-of-sites-store-plain-text-13200.html (Retrieved)

  • Raitman, R., Augar, N., Zhou, W.: Employing Wikis for Online Collaboration in the E-Learning Environment: Case Study. In: 3rd International Conference on Information Technology and Applications (ICITA 2005), Sydney, pp. 142–146 (2005)

    Google Scholar 

  • Shim, J.P., Shropshire, J., Park, S., Harris, H., Campbell, N.: Podcasting for e-learning, communication, and delivery. Industrial Management & Data Systems 107(4), 587–600 (2007)

    Article  Google Scholar 

  • van Harmelen, M.: Personal Learning Environments. In: 6th International Conference on Advanced Learning Technologies (ICALT 2006), Kerkrade, pp. 815–816 (2006)

    Google Scholar 

  • Vassileva, J.: Harnessing P2P Power in the Classroom. In: Lester, J.C., Vicari, R.M., Paraguaçu, F. (eds.) ITS 2004. LNCS, vol. 3220, pp. 305–314. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  • Webilus (2008), http://webilus.com/toutes-les-images (Retrieved, January 2008)

  • Westin, A.: Privacy and Freedom. Atheneum, New York (1967)

    Google Scholar 

  • Woolf, B.P.: Building Intelligent Interactive Tutors, Student-Centered Strategies for Revolutionizing E-Learning. Elsevier & Morgan Kaufmann (2008)

    Google Scholar 

  • Yee, G., Korba, L.: The Negotiation of Privacy Policies in Distance Education. In: IRMA International Conference, Philadelphia (2003)

    Google Scholar 

  • Zeller, W., Felten, E.W.: Cross-Site Request Forgeries: Exploitation and Prevention (2008)

    Google Scholar 

  • Zins, J.E., Bloodworth, M.R., Weissberg, R.P., Walberg, H.J.: The Scientific Base Linking Social and Emotional Learning to School Success. Journal of Educational and Psychological Consultation 17(2), 191–210 (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Aïmeur, E., Hage, H. (2010). Preserving Learners’ Privacy. In: Nkambou, R., Bourdeau, J., Mizoguchi, R. (eds) Advances in Intelligent Tutoring Systems. Studies in Computational Intelligence, vol 308. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14363-2_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-14363-2_23

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-14362-5

  • Online ISBN: 978-3-642-14363-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics