Authors: Najwa Hayaati Mohd Alwi, Ip-Shing Fan
Addresses: School of Applied Science, Building 50, Cranfield University, Cranfield, Beds, MK43 0AL, UK. ' School of Applied Science, Building 50, Cranfield University, Cranfield, Beds, MK43 0AL, UK
Abstract: The purpose of this paper is to investigate and define the information security threats within an e-learning environment. A threat analysis has been conducted for each application in the managed learning environment (MLE) system used in the case of e-learning. Furthermore, the threats analysis was conducted according to the approach adapted by Microsoft. The findings of this study are a list of information security threats on a per-application basis used in e-learning, and a matrix of threats| risks for e-learning. This study focuses on vulnerabilities in relation to the application system and does not cover the vulnerabilities in terms of host and network in e-learning. Thus, this study reveals the information security threats specifically for applications in e-learning environment. The practical implication of the results of the threats analysis can be used as guide for e-learning providers in terms of implementing e-learning security strategy. The results can also act as a guide for e-learning users with the purpose of increasing their awareness with regard to the potential threats within the e-learning environment. This paper is innovative in the area of information security research, as it highlights details of information security threats in the case of e-learning.
Keywords: threats analysis; e-learning; electronic learning; online learning; application systems; information security; managed learning environments; MLEs; Microsoft; threat matrix; risk matrix; host vulnerabilities; network vulnerability; risk management; security strategies; user awareness; potential threats; technology enhanced learning.
International Journal of Technology Enhanced Learning, 2010 Vol.2 No.4, pp.358 - 371
Published online: 03 Oct 2010 *Full-text access for editors Access for subscribers Purchase this article Comment on this article