Title: Threats analysis for e-learning

Authors: Najwa Hayaati Mohd Alwi, Ip-Shing Fan

Addresses: School of Applied Science, Building 50, Cranfield University, Cranfield, Beds, MK43 0AL, UK. ' School of Applied Science, Building 50, Cranfield University, Cranfield, Beds, MK43 0AL, UK

Abstract: The purpose of this paper is to investigate and define the information security threats within an e-learning environment. A threat analysis has been conducted for each application in the managed learning environment (MLE) system used in the case of e-learning. Furthermore, the threats analysis was conducted according to the approach adapted by Microsoft. The findings of this study are a list of information security threats on a per-application basis used in e-learning, and a matrix of threats| risks for e-learning. This study focuses on vulnerabilities in relation to the application system and does not cover the vulnerabilities in terms of host and network in e-learning. Thus, this study reveals the information security threats specifically for applications in e-learning environment. The practical implication of the results of the threats analysis can be used as guide for e-learning providers in terms of implementing e-learning security strategy. The results can also act as a guide for e-learning users with the purpose of increasing their awareness with regard to the potential threats within the e-learning environment. This paper is innovative in the area of information security research, as it highlights details of information security threats in the case of e-learning.

Keywords: threats analysis; e-learning; electronic learning; online learning; application systems; information security; managed learning environments; MLEs; Microsoft; threat matrix; risk matrix; host vulnerabilities; network vulnerability; risk management; security strategies; user awareness; potential threats; technology enhanced learning.

DOI: 10.1504/IJTEL.2010.035738

International Journal of Technology Enhanced Learning, 2010 Vol.2 No.4, pp.358 - 371

Published online: 03 Oct 2010 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article