Skip to main content

Advertisement

Log in

Politic of security, privacy and transparency in human learning systems

  • Published:
Education and Information Technologies Aims and scope Submit manuscript

Abstract

The preservation of confidentiality has become a major issue for the majority of applications that process personal information, the sensitivity of this information requires creators to set rules for the sharing and use of access control policies. A great deal of research has already been conducted in educational environments. However, one aspect that has not received much attention is the important role of Information Security, especially in newer education environments such as the e-learning environment. In this article we seek to propose a policy of security in such a way to affect views of profiles for each user to control the information accessed by this user.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  • Alotaiby, F. T., & Chen, J. X. (2004). A model for team-based access control (TMAC 2004). In Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004. International Conference on (Vol. 1, pp. 450–454). IEEE.

  • Bell, D. E., & La Padula, L. J. (1976). Secure computer system: Unified exposition and multics interpretation (No. MTR-2997-REV-1). MITRE CORP BEDFORD MA.

  • Biba, K. J. (1975). Integrity consideration for secure computer systems. Technical raport MTR-3153, The MITRE corpooration.

  • El-Khatib, K., Korba, L., Xu, Y., & Yee, G. (2003). Privacy and security in e-learning. International Journal of Distance Education Technologies (IJDET),1(4), 1–19.

  • Ferraiolo, D. F., Sandhu, R., Gavrila, S., Kuhn, D. R., & Chandramouli, R. (2001). Proposed NIST standard for role-based access control. ACM Transactions on Information and System Security (TISSEC), 4(3), 224–274.

    Article  Google Scholar 

  • Gavrila, S. I., & Barkley, J. F. (1998). Formal specification for role based access control user/role and role/role relationship management. In Proceedings of the third ACM workshop on Role-based access control (pp. 81–90). ACM.

  • Jeghal, A., Oughdir, L., Tairi, H., & El Affar, A. (2013). A model of the reuse of the profiles of learners. Journal of Theoretical & Applied Information Technology, 57(2), 288–293.

  • Jerman-Blažič, B., & Klobučar, T. (2005). Privacy provision in e-learning standardized systems: status and improvements. Computer Standards & Interfaces, 27(6), 561–578.

    Article  Google Scholar 

  • Joshi, J. B., Aref, W. G., Ghafoor, A., & Spafford, E. H. (2001). Security models for web-based applications. Communications of the ACM, 44(2), 38–44.

    Article  Google Scholar 

  • Lampson, B. W. (1974). Protection. ACM SIGOPS Operating Systems Review, 8(1), 18–24.

    Article  MATH  Google Scholar 

  • Sandhu, R. S., & Samarati, P. (1994). Access control: principle and practice. Communications Magazine, IEEE, 32(9), 40–48.

    Article  Google Scholar 

  • Weippl, E. R. (2005). Security in E-learning. eLearn Magazine, 2005(3), 3.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Adil Jeghal.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jeghal, A., Oughdir, L. & Tairi, H. Politic of security, privacy and transparency in human learning systems. Educ Inf Technol 21, 521–530 (2016). https://doi.org/10.1007/s10639-014-9336-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10639-014-9336-6

Keywords

Navigation