2006
DOI: 10.1007/11767831_11
|View full text |Cite
|
Sign up to set email alerts
|

Towards Privacy-Aware eLearning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2006
2006
2011
2011

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 3 publications
0
6
0
Order By: Relevance
“…Usually, a pseudonym is considered secure if it fulfills the requirements (1) and (2). Consequently, if requirement (3) is ignored, the implementation will be digital pseudonyms automatically generated by a PIM system and then users will have to use these randomly generated pseudonyms.…”
Section: Requirements On Pseudonymsmentioning
confidence: 99%
See 1 more Smart Citation
“…Usually, a pseudonym is considered secure if it fulfills the requirements (1) and (2). Consequently, if requirement (3) is ignored, the implementation will be digital pseudonyms automatically generated by a PIM system and then users will have to use these randomly generated pseudonyms.…”
Section: Requirements On Pseudonymsmentioning
confidence: 99%
“…Currently, we are working on an implementation for an example application within the project PRIME [2]. The application uses services provided by a PIM system developed within this project in order to support users in partitioning their personal data [1].…”
Section: Challenges and Limitationsmentioning
confidence: 99%
“…Nevertheless, it is a crucial aspect because it can be expected that privacy risks will threaten the acceptance of eLearning in the long run. For a more detailed discussion of possible privacy risks, we refer to [3,4]. Despite existing privacy risks, users cannot act completely anonymous and unlinkable within the environment.…”
Section: Introductionmentioning
confidence: 99%
“…The only viable approach to realize these principles despite the need to collect and process personal data is to partition those data [3,4]. The necessary techniques are provided by Privacy-Enhancing Identity Management (PIM) [6,7].…”
Section: Introductionmentioning
confidence: 99%
“…E-learners are becoming more perceptive about the privacy implications of their online activities. Borcea et al point out that privacy requirements are obviously important for e-learning, since they establish an unbiased environment without prejudice or favoritism [2]. A learner should be able to act under different pseudo-identities or, when possible, anonymously.…”
Section: Introductionmentioning
confidence: 99%