2010
DOI: 10.20533/ijds.2040.2570.2010.0019
|View full text |Cite
|
Sign up to set email alerts
|

E-Learning and Information Security Management

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
14
0
2

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 46 publications
(19 citation statements)
references
References 9 publications
0
14
0
2
Order By: Relevance
“…The on-line learning management systems or e-learning systems are adopted but without a thorough understanding of the security aspects [29]. Bloggers, practitioners and researchers did not discuss the security as a big issue.…”
Section: Formulation Of the Fsrm Modelmentioning
confidence: 99%
See 2 more Smart Citations
“…The on-line learning management systems or e-learning systems are adopted but without a thorough understanding of the security aspects [29]. Bloggers, practitioners and researchers did not discuss the security as a big issue.…”
Section: Formulation Of the Fsrm Modelmentioning
confidence: 99%
“…3. For the functional components we have studied five primaries inspired by the qualitative risk analysis model [29] which are as the following: virtual library, on-line course administration, course management, registration and communications tool ( Table 1). 4.…”
Section: Formulation Of the Fsrm Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…As risk management models, we mention, the Single Loss Expectancy (SLE) [6], the Mean Failure Cost (MFC) [1,7] The Bayesian Defense Graphs and Architectural Models [14], the Availability, Integrity, Confidentiality and Authentication (AICA), the improving web application security model (IWAS) and AURUM [5] Ideally, information security will be enhanced by quantitative risk analyses [12,13] in different cases, it is difficult to exclude the risk but it can be reduced, then the assessment result is useful for future business decisions [18]. However, quantifying security is a hard task and it is harder when the related system is complex [21].…”
Section: Introductionmentioning
confidence: 99%
“…Our contribution can be generalized to other practical esystems because according to [18] an E-learning systems share similar characteristics with other e-services. These are the accessibility of service via the internet, the consumption of services by a person via the internet and the payment of a service by the consumer.…”
mentioning
confidence: 99%