IDEAS home Printed from https://ideas.repec.org/a/khe/journl/v5y2013i2p55-59.html
   My bibliography  Save this article

Information Security Management in e-Learning

Author

Listed:
  • Aurel Serb
  • Costinela - Luminita Defta
  • Nicoleta Magdalena Iacob
  • Marius Cristian Apetrei

    ("Dimitrie Cantemir" Christian University)

Abstract

The security risks introduced by the e-learning represent an important issue which was not seriously taken into account in the actual educational context, where increasingly more people are taking online courses. Also, universities and other organizations are resorting to e- learning to provide instruction on-line. The e-learning platforms are today production systems that need to be secured. In this paper we will discuss the security elements required to be implemented within e-learning environments. Also we paper presents the most popular e-learning standards to determine their provisions and limitations for privacy and security.

Suggested Citation

  • Aurel Serb & Costinela - Luminita Defta & Nicoleta Magdalena Iacob & Marius Cristian Apetrei, 2013. "Information Security Management in e-Learning," Knowledge Horizons - Economics, Faculty of Finance, Banking and Accountancy Bucharest,"Dimitrie Cantemir" Christian University Bucharest, vol. 5(2), pages 55-59, June.
  • Handle: RePEc:khe:journl:v:5:y:2013:i:2:p:55-59
    as

    Download full text from publisher

    File URL: http://orizonturi.ucdc.ro/arhiva/2013_khe_2_pdf/khe_vol_5_iss_1_55to59.pdf
    Download Restriction: no

    File URL: http://orizonturi.ucdc.ro/arhiva/2013_khe_2_pdf/khe_vol_5_iss_1_55to59.pdf
    Download Restriction: no
    ---><---

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Neeraj Chopra & Rajiv Sindwani & Manisha Goel, 2021. "A Hybrid Approach Based on Fuzzy TOPSIS-AHP for Ranking and Classifying MOOC Key Acceptance Factors," International Journal of Web-Based Learning and Teaching Technologies (IJWLTT), IGI Global, vol. 16(5), pages 1-20, September.

    More about this item

    Keywords

    e-learning; security; confidentiality; administration;
    All these keywords.

    JEL classification:

    • C88 - Mathematical and Quantitative Methods - - Data Collection and Data Estimation Methodology; Computer Programs - - - Other Computer Software

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:khe:journl:v:5:y:2013:i:2:p:55-59. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Adi Sava (email available below). General contact details of provider: https://edirc.repec.org/data/ffucdro.html .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.