Abstract
E-learning systems have made considerable progress within the last few years. Nonetheless, the issue of learner privacy has been practically ignored. Existing E-learning standards offer some provisions for privacy and the security of E-learning systems offers some privacy protection. Privacy preserving E-learning solutions fall short and still require further development. Additionally, the advent of E-learning 2.0 introduced a whole new set of challenges with regards to privacy preservation. In this chapter we introduce E-learning systems security and privacy preserving approaches, challenges they still face, as well as the challenges brought forth by E-learning 2.0.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Aïmeur, E., Hage, H., Mani Onana, F.S.: A Framework for Privacy-Preserving E-learning. In: Joint Itrust and PST conferences on Privacy, Trust Management and Security (IFIPTM 2007), Moncton (2007)
Aïmeur, E., Hage, H., Mani Onana, F.S.: Anonymous Credentials for Privacy-Preserving E-learning. In: The Montreal Conference on eTechnologies 2008, MCETECH 2008, Montreal (2008)
Anwar, M., Greer, J.: Role and Relationship-Based Identity Management for Private yet Accountable E-Learning. In: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, IFIPTM 2008, Trondheim (2008)
Anwar, M., Greer, J.: Implementing Role-and Relationship-based Identity Management in E-learning Environments. In: 14th International Conference on Artificial Intelligence in Education, AIED 2009, Brighton, pp. 608–610 (2009)
BBC, Hackers hit Twitter and Facebook. BBC News (2009a), http://news.bbc.co.uk/2/hi/8188201.stm (Retrieved)
BBC, US man ’stole 130m card numbers’ BBC News (2009b), http://news.bbc.co.uk/2/hi/americas/8206305.stm (Retrieved)
Blanchard, E., Roy, M., Lajoie, S., Frasson, C.: An evaluation of sociocultural data for predicting attitudinal tendencies. In: 14th International Conference on Artificial Intelligence in Education, AIED 2009, Brighton, pp. 399–406 (2009)
Brooks, C.A., Greer, J.E., Melis, E., Ullrich, C.: Combining ITS and eLearning Technologies: Opportunities and Challenges. In: Ikeda, M., Ashley, K.D., Chan, T.-W. (eds.) ITS 2006. LNCS, vol. 4053, pp. 278–287. Springer, Heidelberg (2006)
Brusilovsky, P., Farzan, R., Jae-wook, A.: Comprehensive personalized information access in an educational digital library. In: Proceedings of the 5th ACM/IEEE-CS Joint Conference on Digital Libraries, JCDL 2005 (2005)
Conati, C.: Probabilistic assessment of user’s emotions in educational games. Journal of Applied Artificial Intelligence 16(7-8), 555–575 (2002)
Conti, G.: Googling Security: How Much Does Google Know About You? Addison-Wesley Professional, Reading (2008)
Dolog, P., Henze, N., Nejdl, W., Sintek, M.: Personalization in Distributed eLearning Environments. In: 13th World Wide Web Conference, New York, pp. 170–179 (2004)
Franz, E., Wahrig, H., Boettcher, A., Borcea-Pfitzmann, K.: Access Control in a Privacy-Aware eLearning Environment. In: International Conference on Availability, Reliability and Security, ARES 2006, Vienna, pp. 879–886 (2006)
Hage, H., Aïmeur, E.: Harnessing learner’s collective intelligence: a Web2.0 approach to E-learning. In: Woolf, B.P., Aïmeur, E., Nkambou, R., Lajoie, S. (eds.) ITS 2008. LNCS, vol. 5091, pp. 438–447. Springer, Heidelberg (2008)
Hage, H., Aïmeur, E.: The impact of privacy on learners in the context of a web-based test. In: 14th International Conference on Artificial Intelligence in Education, AIED 2009, Brighton, pp. 65–72 (2009a)
Hage, H., Aïmeur, E.: The impact of privacy on learners in the context of a web-based test. In: 14th International Conference on Artificial Intelligence in Education, AIED 2009, Brighton (2009b)
IMS, IMS Global Learning Consortium, http://www.imsproject.org/ (Retrieved, September 2007)
Jerman-Blazic, B., Klobucar, T.: Privacy provision in e-learning standardized systems: status and improvements. Computer Standards & Interfaces 27(6), 561–578 (2005)
Lee, J.: Cyberattack rocks South Korea. GlobalPost (2009), http://www.globalpost.com/dispatch/south-korea/090710/cyberattacks (Retrieved)
Lenhart, A., Madden, M., Macgill, A.R., Smith, A.: Teens and Social Media (2007), http://www.pewinternet.org/PPF/r/230/report_display.aspU (Retrieved, January 2008)
LTSC Learning Technologies Standardization Committee (LTSC), http://www.ieeeltsc.org/ (Retrieved, September 2007)
Mao, Y., Vassileva, J., Grassmann, W.: A System Dynamics Approach to Study Virtual Communities. In: 40th Annual Hawaii International Conference on System Sciences, HICSS 2007, Waikoloa, Hawaii, p. 178a (2007)
Mccombs, B.L., Vakili, D.: A Learner-Centered Framework for E-Learning. Teachers College Record 107(8), 1582–1600 (2005)
Messmer, E.: DDoS attacks, network hacks rampant in oil and gas industry, other infrastructure sectors Network World (2010), http://www.networkworld.com/news/2010/012710-ddos-oil-gas.html (Retrieved)
O’Dell, J.: RockYou Hacker: 30% of Sites Store Plain Text Passwords The New York Times (2009), http://www.nytimes.com/external/readwriteweb/2009/12/16/16readwriteweb-rockyou-hacker-30-of-sites-store-plain-text-13200.html (Retrieved)
Raitman, R., Augar, N., Zhou, W.: Employing Wikis for Online Collaboration in the E-Learning Environment: Case Study. In: 3rd International Conference on Information Technology and Applications (ICITA 2005), Sydney, pp. 142–146 (2005)
Shim, J.P., Shropshire, J., Park, S., Harris, H., Campbell, N.: Podcasting for e-learning, communication, and delivery. Industrial Management & Data Systems 107(4), 587–600 (2007)
van Harmelen, M.: Personal Learning Environments. In: 6th International Conference on Advanced Learning Technologies (ICALT 2006), Kerkrade, pp. 815–816 (2006)
Vassileva, J.: Harnessing P2P Power in the Classroom. In: Lester, J.C., Vicari, R.M., Paraguaçu, F. (eds.) ITS 2004. LNCS, vol. 3220, pp. 305–314. Springer, Heidelberg (2004)
Webilus (2008), http://webilus.com/toutes-les-images (Retrieved, January 2008)
Westin, A.: Privacy and Freedom. Atheneum, New York (1967)
Woolf, B.P.: Building Intelligent Interactive Tutors, Student-Centered Strategies for Revolutionizing E-Learning. Elsevier & Morgan Kaufmann (2008)
Yee, G., Korba, L.: The Negotiation of Privacy Policies in Distance Education. In: IRMA International Conference, Philadelphia (2003)
Zeller, W., Felten, E.W.: Cross-Site Request Forgeries: Exploitation and Prevention (2008)
Zins, J.E., Bloodworth, M.R., Weissberg, R.P., Walberg, H.J.: The Scientific Base Linking Social and Emotional Learning to School Success. Journal of Educational and Psychological Consultation 17(2), 191–210 (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Aïmeur, E., Hage, H. (2010). Preserving Learners’ Privacy. In: Nkambou, R., Bourdeau, J., Mizoguchi, R. (eds) Advances in Intelligent Tutoring Systems. Studies in Computational Intelligence, vol 308. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14363-2_23
Download citation
DOI: https://doi.org/10.1007/978-3-642-14363-2_23
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-14362-5
Online ISBN: 978-3-642-14363-2
eBook Packages: EngineeringEngineering (R0)