Abstract
The learning environment has recently undergone a quantum leap due to rapid growth in information technology. This development has allowed the e-learning environment to take advantage of electronic tools to improve teaching methods using LCMS. The emergence of many e-learning institutions has accelerated the adoption of information and communication technology without taking due care and understanding of security concerns. LCMS is a new learning method that ultimately relies on the web in its implementation. This article argues essential elements of information security (IS) that require application through the information management system. On other hand, the paper also identifies anti IS measures that can boost IS within the information management system.
Highlights
E-learning is a term that shows the utility of the IT to help boost the educational system between the teacher and the learner, electronic services that share similar characteristics, such as electric business, electronic government, and electronic health record
The initial part of this paper argues the status of Learning Content Management System (LCMS) definition, benefits, challenges and Information Threats on Internet, which are deemed securely in the content of education and defy in the application of LCMS
The benefits of LCMS are that it facilitates the integration of social learning in e-learning strategy
Summary
E-learning is a term that shows the utility of the IT to help boost the educational system between the teacher and the learner, electronic services that share similar characteristics, such as electric business, electronic government, and electronic health record. The initial part of this paper argues the status of LCMS definition, benefits, challenges and Information Threats on Internet, which are deemed securely in the content of education and defy in the application of LCMS. In another part of this article consideration at IS in the LCMS. Issues such as legitimate new users (authorized), the reliability about the content of education, access to it, and there are other things, all you need to protect information requirements in a request to preserve the prosperity of the LCMS process. The article discusses the possible essential elements of IS, which require application through the LCMS, as well as determine the anti-information that can enhance information security within the LCMS security
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have