Reference Hub1
Survey of Vulnerabilities and Mitigation Techniques for Mooc-Based Applications

Survey of Vulnerabilities and Mitigation Techniques for Mooc-Based Applications

Hossain Shahriar, Hisham M. Haddad, David Lebron, Rubana Lupu
Copyright: © 2016 |Volume: 7 |Issue: 4 |Pages: 18
ISSN: 1947-3036|EISSN: 1947-3044|EISBN13: 9781466691971|DOI: 10.4018/IJSSE.2016100101
Cite Article Cite Article

MLA

Shahriar, Hossain, et al. "Survey of Vulnerabilities and Mitigation Techniques for Mooc-Based Applications." IJSSE vol.7, no.4 2016: pp.1-18. http://doi.org/10.4018/IJSSE.2016100101

APA

Shahriar, H., Haddad, H. M., Lebron, D., & Lupu, R. (2016). Survey of Vulnerabilities and Mitigation Techniques for Mooc-Based Applications. International Journal of Secure Software Engineering (IJSSE), 7(4), 1-18. http://doi.org/10.4018/IJSSE.2016100101

Chicago

Shahriar, Hossain, et al. "Survey of Vulnerabilities and Mitigation Techniques for Mooc-Based Applications," International Journal of Secure Software Engineering (IJSSE) 7, no.4: 1-18. http://doi.org/10.4018/IJSSE.2016100101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Massive Open Online Courses (MOOCs) are commonly hosted as web servers for learners worldwide to access education and learning materials at low cost. Many of the well-known MOOCs have adopted open source software and database technologies and frequently operate within cloud environments. It is likely that the well-known software security vulnerabilities may manifest to MOOC-based applications. Unfortunately, few studies have identified a set of common vulnerabilities applicable to MOOC-based applications. This paper1 presents an exploratory study of potential security vulnerabilities and challenges for MOOC platforms, and it provide some guidelines and suggestions to mitigate these concerns. This study helps practitioners (educators and developers) to adopt MOOC applications while considering potential vulnerabilities and be prepared to deal with these risks.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.