Abstract

Article history: Received January 20, 2014 Accepted 30 August 2014 Available online August 31 2014 Application development and e-learning services in the context of communication networks and information along with qualitative and quantitative improvements of activities and services can expand some of threats which emergence in the networks of this infrastructure of telecommunications. Consequently, this is an inevitable necessity attention to accuracy and efficiency payment issues and security concerns to managers and decision makers. Based on other researches and effective experiences in the field of e-learning security, this research attempts to define a logical structure to security contents in this field. We have presented a three-dimensional model for security issues and requirements of e-learning, based on the findings of research. Actuarial three-dimensional model are infrastructure-oriented viewpoint; service-oriented viewpoint and customer-oriented viewpoint. Each of these three dimensions in this model has described in the form of model with two fields: e-learning issues and security of e-learning issues. © 2014 Growing Science Ltd. All rights reserved. E-learning Security issues Formulating requirements

Highlights

  • Development and diffusion of information and communication technology (ICT) has altered activates of social units, business units even influence on governments in the social, economic, political and technological infrastructures

  • It should be noted that meta-synthesis method has utilized to build a framework to security issues in the field of e-learning

  • The following questions are associated to achieve desired goals using meta-synthesis method: “Based on the security issues in the field of e-learning, what a logical framework is? And what its dimensions are?” Previous studies are analyzed on the two features to formulate a logical framework to e-learning security requirements:

Read more

Summary

Introduction

Development and diffusion of information and communication technology (ICT) has altered activates of social units, business units even influence on governments in the social, economic, political and technological infrastructures. There are two basic requirements to fulfill the security requirements of the technology space, services and preservation in the field of e-learning: First, facing with systematic security threats and challenges of this field (Arabsorkhi & Yadegari, 2010; Hayaati, 2010) and second, having a comprehensive approach to identify and cover all areas of challenges in the security issues. These two needs can be accountable by providing security framework in the field of e-learning (Mellado et al, 2010)

Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.