2016
DOI: 10.4018/ijhcitp.2016070107
|View full text |Cite
|
Sign up to set email alerts
|

Architecture of Combined e-Learning Environment and Investigation of Secure Access and Privacy Protection

Abstract: The contemporary digital world based on network communications, globalization and information sharing outlines new important targets in the area of privacy and personal data protection which reflect to applied principles of secure access to proposed information structures. In this reason the aim of secure access to all resources of an e-learning environment is very important and adequate technological and organizational measures for authentication, authorization and protection of personal data must be applied.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 17 publications
(26 reference statements)
0
2
0
Order By: Relevance
“…The main goal of each business ISMS is to protect the corporative (private) information resources and to regulate the access to them. The implemented procedures must be realized on the basis of strong strategies and policies for information security and data protection in the hierarchical order “Security Policy” → “IT Security Policy” → “Data Protection Policy” (Romansky, ; Romansky & Noninska, ). This is very important especially when a company takes part in the e‐governance activities and communicates with other partners, because the ISMS must guarantee successful data protection during input, remote access, processing, archiving, and transfer via the Internet of different types of corporative information, including personal data and supported customers' personal profiles.…”
Section: Functionality and Modelling Of Ismsmentioning
confidence: 99%
“…The main goal of each business ISMS is to protect the corporative (private) information resources and to regulate the access to them. The implemented procedures must be realized on the basis of strong strategies and policies for information security and data protection in the hierarchical order “Security Policy” → “IT Security Policy” → “Data Protection Policy” (Romansky, ; Romansky & Noninska, ). This is very important especially when a company takes part in the e‐governance activities and communicates with other partners, because the ISMS must guarantee successful data protection during input, remote access, processing, archiving, and transfer via the Internet of different types of corporative information, including personal data and supported customers' personal profiles.…”
Section: Functionality and Modelling Of Ismsmentioning
confidence: 99%
“…Specifically, a general architectural concept of an e-learning system called Heterogeneous e-Learning Environment (HeLE) is proposed as a new concept. The study proposed here can be taken as a continuation of the problems discussed in (Romansky & Noninska, 2016) and (Romansky & Noninska, 2019). The contribution of the article can be determined by defining the functionality of the main subsystems, expressed in a set of procedures for regulating access to different resources (internal and external), the defined formalization of processes and proposed conceptual model, as well as in the organization of deterministic model investigation using the apparatus of a Petri net with discussion of the obtained analytical results.…”
Section: Introductionmentioning
confidence: 99%