Proposal: A Design of E-learning User Authentication System



Similar documents
Moodle E-Learning Platforms and Technologies Project Project No. LLP-LdV-PRT-2012-LT-0316

High School Distance Learning: Online/Technology Enhanced Course or Experience Guidance

Legal Compliance Education and Awareness. Copyright Act Communicating Electronic Material. (Commonwealth) Life Impact The University of Adelaide

Virtual Classroom (VCR)

Design and Analysis of Mobile Learning Management System based on Web App

Distance Learning through Satellite

LbD4All Guidebook Series

Issues in offering numeric based courses in an online environment

ENTERPRISE VIDEO PLATFORM

RICHARD STOCKTON COLLEGE OF NJ Business Continuity Planning

(Web Conferencing Zone) 3/24/2011 2

Distance Learning in Today s Classroom: The Good, The Bad, and The Ugly

Review of the Techniques for Smart Learning Systems

The value of video in online instruction

Quality Matters Online Course Development and Guidelines

GGR272: GEOGRAPHIC INFORMATION AND MAPPING I. Course Outline

Instructional Design For elearning Courseware: The It-Plus System

Participate in an Adobe Connect Meeting For Meeting Participants

Online Training Made Easier with Video

Web Conferencing Glossary

Three Ways You Can Improve your Program with Virtual Conferencing A Guide for Post-Graduate Program Directors and Coordinators

Making Distance Learning Courses Accessible to Students with Disabilities

PREFETCH VIDEO CONFERENCE OVER LAN THROUGH PC S OR LAPTOPS

CLOUD COMPUTING CONCEPTS FOR ACADEMIC COLLABORATION

NETS for Teachers: Achievement Rubric

It provides the performance indicators to evaluate the level of knowledge and competence of teacher to apply ICT in the educational setting.

Defining Blended Learning in the GDLN Context

Middle East Technical University TECHNOPOLIS DamaSistem computer aided training solutions, tailored solutions to organizations e-learning DamaSistem

Support and Process for Developing Online and Blended Courses

Video conferencing guide

Tips, Tools, and Techniques for Teaching in the Online High School Classroom

Student Manual. for Virtual Classroom (Big Blue Button)

E-learning services in Vilnius University ESEC 2013

elearning Instructional Design Guidelines Ministry of Labour

NETS for Students: Achievement Rubric

Using Interactive Multimedia Web Interface for Multicultural Healthcare Education

Online Design & elearning, Compressed Video & Online Meetings, Introduction to Blackboard

Using Weblogs in Foreign Language Classrooms: Possibilities and Challenges

Teaching English Language with Cloud Based Tools

Getting Started with Microsoft Office Live Meeting. Published October 2007 Last Update: August 2009

Virtual Learning Platforms and Good Practice. Assoc. Prof. Dr. Kosta Boshnakov University of Chemical Technology and Metallurgy Sofia, Bulgaria

Integration of Learning Management Systems with Social Networking Platforms

Data Warehousing and Decision Support Tales from a Virtual Classroom

E-Learning at Kyongju University in Seoul, Korea: the Present and the Future

Getting Started with Microsoft Office Live Meeting. Published October 2007

Definitive Questions for Distance Learning Models

BUILDING DIGITAL LITERACY PURPOSE DEFINING DIGITAL LITERACY USING THIS GUIDE

How To Develop An Interactive Multimedia Education Program For Multicultural Healthcare Education

Online Learning at Duke: A Planning Guide

2. Initial Design. 3. Success of the initial approach. 4. Modifications to initial approach

Communication Software Laboratory Academic Year E-learning Platforms. Moodle and Dokeos.

Computer Assisted Language Learning. Introduction

SYNCHRONOUS LEARNING TOOLS

An innovative interactive e-learning platform

Learning Technology for Blended Learning October 2005

Virtual Office Hours through Video Conferencing: Lessons Learned

Media Services University Systems

Online Collaboration For Organizational Training And Development

Faculty technology Reference Guide

How To Become An Independent Online Instructor At Niritech.Com

Applying Web-conferencing in a Beginners Chinese Class

Web Conferencing Product Comparison

Genesis LC2. Genesis LC1. Genesis Flex. Genesis Cloud. Feature/Function. Linguatronics Genesis Functional Specification List 1

Handout to Support the Presentation

Memorandum of Understanding For Development of Regent s Online Degree Courses East Tennessee State University

San Jac ITS Audio/Web Conferencing Options

Adobe Solutions for Learning Management Systems (LMS)

AC : COMMUNITY COLLEGE TEACHER PROFESSIONAL DEVELOPMENT

Facebook SVEA TRAINING MODULES.

QUEEN S UNIVERSITY BELFAST. e-learning and Distance Learning Policy

The Impact of E-Learning on some Psychological Dimensions and Academic Achievement

Second Life as a Virtual Classroom

PUAD 502 Administration in Public and Non-Profit Organizations Term Offered Fall, 2015 Syllabus

Security of Information in University Elearning Systems

Center for Distance Learning and Instructional Technology. Policies, Procedures and Best Practices for the Development and Teaching of Online Courses

Technology Inspires Dynamic 21 st -Century Teaching

A web conferencing solution to meet the needs of work based learners

CASE STUDIES FOR SELF-DIRECTED LEARNING ENVIRONMENT USING LECTURE ARCHIVES

CHAPTER 6 : ENGAGING LEARNERS AT CURTIN

PRELIMINARY MEETING PREPARATION For the best quality and experience during your WebEx Meeting, you should have the following:

SOFTWARE TOOLS FOR ONLINE TEACHING: A FACULTY PERSPECTIVE. Abstract. Background

Features of the Online Course. Table of Contents. Course Interface: Overview Syllabus Navigating through the Course Content...

ICT Skills Enhancement Training: An Online Approach towards Knowledge Deepening Dave E. Marcial, Ph.D. Project Leader

Instructional Design and Technology Professional Core Courses Instructional Design and Technology Core Courses & Descriptions

The CIO Handbook for Selecting a Blended Learning and Lecture Capture Solution

General Procedures for Developing an Online Course

Introducing Web Conferencing Tools

ACADEMIC CONTINUATION PLAN

RISKS OF SPYWARE. Lesson Procedures

Unified Communication Platform. Product Page

Development of a Service Robot System for a Remote Child Monitoring Platform

Online Proctoring Services

!"#$%&'()$*)"#%+,'%-"."/,&*01%% (0-%-"/*."'*01%,0/*0"%*0#$'2)$*,0% ($%$3"%40*."'#*$5%,+%6"00"##""%7%80,9.*//"%

The Frame Work Design Of Mobile Learning Management System

A Design and Implementation of Web-Based Project-Based Learning Support Systems

Moodle Integrated Synchronous Teaching/Conferencing: A Free Open-Source Synchronous Capability for Moodle

USING WIKIS, PODCASTS, AND VIDEO FILES TO ENHANCE THE LEARNING EXPERIENCE

Security Threats on National Defense ICT based on IoT

1. Nature of Distance Education

Student Support for Online Learning and ICT Infrastructure Procedure

Transcription:

, pp.45-50 http://dx.doi.org/10.14257/ijsia.2015.9.1.05 Proposal: A Design of E-learning User Authentication System Byeong Ho Kang 1 and Hyejin Kim 2 1 School of Engineering and ICT, University of Tasmania, Sandy bay, TAS, Australia 2 (Corresponding Author) Institute of School Safety Research, Sungshin Women s University, Seoul, Republic of Korea bhokang@gmail.com, hyejinaa@hanmail.net Abstract The user authentication is very crucial in developing an e-learning system. Emerging standards for distance learning and education influence in a major way the development of e-learning systems. E-learning system must be secured against manipulation from the side of the students and also it protects user s privacy. This paper examines privacy and security issues associated with e-learning. It presents the basic principles behind privacy practices and legislation. Concrete solutions for improving the degree of security achievable are shown. A design of an e-learning user authentication system is introduced. This framework prevents manipulation from the side of the students during learning, thus allowing a reliable control of learning success. Keywords: E-learning Privacy, Security Requirements, e-learning security 1. Introduction The growth of Information and Communication Technology has significant effects on all people around the world. These days, the Internet itself is drastically varying the provisions of services and goods, simply because of its features: immediacy, openness, ubiquity, and global reach. With this growth, people are able to connect with each other, especially through the Internet. The approach of e-learning has become a powerful way to deliver knowledge considering the increase in on-line users. E-learning systems are considered an essential application in educational institutions today. The use of these systems is not limited to universities but extends to include schools, government departments and private enterprises [3]. The security is very crucial in developing an e-learning system. Emerging standards for distance learning and education influence in a major way the development of e-learning systems. E-Learning system must be secured against manipulation from the side of the students and also it protects user s privacy. This paper examines privacy and security issues associated with e-learning. It presents the basic principles behind privacy practices and legislation. It investigates the more popular e-learning standards to determine their provisions and limitations for privacy and security. Privacy requirements for e-learning systems are explored with respect to the Privacy Principles. The capabilities of a number of existing privacy enhancing technologies, including methods for network privacy, policy-based privacy/security management, and trust systems, are reviewed and assessed. E-learning can be defined as technology-based learning in which learning material is delivered electronically to remote learners via a computer network. E-learning could be seen as a professional level of education but with the advantages of lower time and cost. Some other advantages of e-learning include larger learner population, shortage of qualified training staff and lower cost of campus maintenance, up-to-date information and accessibility. In a typical e-learning environment the lecturers, students and information are in different geographical locations and are connected via the Internet. The e-learning promotes the construction of life-long learning opinions and learning society. e- ISSN: 1738-9976 IJSIA Copyright c 2015 SERSC

Learning is a broad concept and it consists with different types, namely Synchronous and Asynchronous e- Learning. Both methods have different characteristics and they use different methods to broadcast the learning materials. Asynchronous e-learning occurs when students begin and complete their training courses at different times according to their own schedule. Synchronous e-learning allows real-time interaction and raises a sense of community among learners. The security is very crucial in developing an e- learning system. Emerging standards for distance learning and education influence in a major way the development of e-learning systems. E-Learning system must be secured against manipulation from the side of the students and also it protects user s privacy. This paper examines privacy and security issues associated with e-learning. It presents the basic principles behind privacy practices and legislation. Security is an important issue in the actual educational context where e-learning increases in popularity and more and more people are taking online courses. The e-learning platforms are today production systems that need to be secured. To achieve a good level of security, there are many important elements that must be taken into account: authentication, access control and data integrity. 2. Background This section discuss about the brief background of e-learning. E-learning refers to the use of electronic media and information and communication technologies in education. E- learning is broadly inclusive of all forms of educational technology in learning and teaching. E-learning is inclusive of, and is broadly synonymous with multimedia learning, technology-enhanced learning, computer-based instruction, computer-based training, computer-assisted instruction or computer-aided instruction, internet-based training, webbased training, online education, virtual education, virtual learning environments which are also called learning platforms, m-learning, and digital educational collaboration. These alternative names emphasize a particular aspect, component or delivery method. Standardization and compatibility are vital for both e-learning vendors and end users to be able to sell or purchase portable content and inter-changeable components on the market. They are also very important where different e-learning systems must interact with one another. Figure 1 shows the typical overview of e-learning system. The learner accesses the learning resources and does the activities as instructed. The Moderator acts as a teacher me evaluate and act as moderator of the learners. In the end, there is an evaluation process. Basically, this illustration contains the processes and the databases. 3. E-learning Elements Figure 1. Overview of Typical e-learning System Various technologies are used to facilitate e-learning. Most e-learning uses combinations of these techniques, including blogs, collaborative software, and virtual classrooms. 46 Copyright c 2015 SERSC

Audio: The radio has been around for a long time and has been used in educational purposes. Recent technologies have allowed classroom teachers to stream audio over the internet. There are also webcasts and podcasts available over the internet for students and teachers to download. For example, itunes has various podcasts available on a variety of subjects that can be downloaded for free. Video: Teachers can access video clips through the internet instead of relying on DVDs or VHS tapes. Videos allow teachers to reach students who are visual learners and tend to learn best by seeing the material rather than hearing or reading about it. Websites like YouTube are used by many teachers. Teachers can use messaging programs such as Skype, Adobe Connect, or webcams, to interact with guest speakers and other experts. Research on the use of video in lessons is preliminary, but early results show an increased retention and better results when video is used in a lesson. Creating a systematic video development method holds promise for creating video models that positively impact student learning. Blogging: Blogging allows students and instructors to share their thoughts and comments on the thoughts of others which could create an interactive learning environment. Blogs allow students and teachers to post their thoughts, ideas, and comments on a website. Whiteboards: Interactive whiteboards or smartboards allow teachers and students to write on the touch screen, so learning becomes interactive and engaging. Screencasting: Screencasting is a recent trend in e-learning. There are many screencasting tools available that allow users to share their screens directly from their browser and make the video available online so that the viewers can stream the video directly. The advantage of such tools is that it gives the presenter the ability to show his ideas and flow of thoughts rather than simply explain them, which may be more confusing when delivered via simple text instructions. With the combination of video and audio, the expert can mimic the one-on-one experience of the classroom and deliver clear, complete instructions. From the learner's point of view this provides the ability to pause and rewind and gives the learners the advantage of moving at their own pace, something a classroom cannot always offer. Virtual Learning Environment: Virtual Learning Environments (VLE), also known as learning platforms, utilizes virtual classrooms and meetings which often use a mix of communication technologies. One example of web conferencing software that enables students and instructors to communicate with each other via webcam, microphone, and real-time chatting in a group setting, are GoToTraining, WebEx Training or Adobe Connect, which are sometimes used for meetings and presentations. Participants in a virtual classroom can raise hands, answer polls or take tests. 4. Security Consideration The roles of security include the following: user authentication /authorization, protection of private information from unintended access, and protection of data integrity guarding against data corruption by attackers. We have examined the security requirements and investigated current e-learning standards for their privacy and security provisions. Authentication is very crucial in e-learning because user s information is needed to be secured. Security is an important issue in the actual educational context where e-learning increases in popularity and more and more people are taking online courses. The e-learning platforms are today production systems that need to be secured. To achieve a good level of security, there are many important elements that must be taken into account: authentication, access control and data integrity. 4.1. Database Security Database security concerns the use of a broad range of information security controls to protect databases, potentially including the data, the database applications or stored Copyright c 2015 SERSC 47

functions, the database systems, the database servers and the associated network links against compromises of their confidentiality, integrity and availability. E-Learning resources: Database should be secured from data loss, file corruption and authorized access. Learning resources should be secured from any cyber attacks, virus, malware and etc. It should only be accessible by the authentic user who are intitled to participate or access the learning resources. Secured Access: This means the e-leanring system should have a strong authentication mechanism. It has a log-in system where only the true user are only allowed to use the system or only the person who are enrolled are permitted. With the requirements, the e- learning system should have a strong authentication, an example of the effective authentication mechanism is by using the biometric authenticator or any authentication that can prove the identity of the user and that impersonation or fake user can be avoided. This is very important requirement in e-learning system. Evaluation Results Integirty, Authenticity and Confidentiality: The evaulation must have integrity and that the Learners Record must be authentic because the Evaluation Records (Exam, Activities, Quizzes). Since Evaluation Results are important, it should be confidentiall only to the true learner and cannot be viewed by others. 4.2. User Information Security Learners and Moderators Profile should be secured also. Secured access is required to verify the user. This is to prove the identity of the user against impersonation or pretention. In this way, only the true user can participate. The most effective method is by using the biometric authentication, for example, it could be in form of iris scanning or finger print. In the recent technology like for example in smartphones, there is an eye detection, which detects a person s eyes while looking on the device s screen. This authenticator must be running while learner has an ongoing session. 5. Proposed design of E-learning User Authentication System Nowadays, the authentication method is not reliable; the challenge is to design a system where it can authenticate a true user while the class session is ongoing. One of the considerations in developing an e-learning system is the security. The challenge is to make sure that the learner and moderators are authentic. To prove that the participant is the true registered learner is quiet difficult because anybody can act on behalf of the true user. In this paper, the biometric authentication is proposed, particularly the face recognition and eye pattern recognition. With the advancement in technology, this is possible. Nowadays, smartphones have eye recognition where it detects blinking eyes. With this, we can go further with the thorough research to put software and hardware altogether. What good in this authentication mechanism is that while the learner or moderator has an ongoing class session, face or eye can be detected and continuously running and making a records. This technology can be implemented in other computer devices. Camera, video device, sensors and image scanning capability are the needed hardware and also the software to make it works. 48 Copyright c 2015 SERSC

Figure 2. Learner s Sequence Diagram Face/ eye pattern Authentication Learner/Moderator E-Learning System Figure 3. Proposed Design of E-learning User Authentication System 7. Conclusion and Future Works This paper presents a review of E-learning privacy and security requirements. It investigates the more popular e-learning standards to determine their provisions and limitations for privacy and security. The authentication has been the major consideration in developing an e-learning system. This paper introduced the concept of better authentication mechanism. Our future works includes implementation of the design and the further study of hardware and software for e-learning system implementation. Copyright c 2015 SERSC 49

References [1] F. Graf, Providing security for elearning, Computers & Graphics, vol. 26, no. 2, (2002) April, pp. 355 365, http://dx.doi.org/10.1016/s0097-8493(02)00062-6 [2] A. Ortigosa, Sentiment analysis in Facebook and its application to e-learning, Computers in Human Behavior (2013), http://dx.doi.org/10.1016/j.chb.2013.05.024 [3] A. Younis Alsabawya, A. Cater-Steel and J. Soar, IT infrastructure services as a requirement for e- learning system success, Computers & Education, vol. 69, (2013) November, pp. 431-451. [4] A. D. Dharmawansa, K. T. Nakahira and Y. Fukumura, Detecting eye blinking of a real-world student and introducing to the virtual e-learning environment, Procedia Computer Science, vol. 22, (2013), pp. 717-726. [5] V. I. Zuev, E-Learning Security Models, Management Information Systems, vol. 7, no. 2, (2012), pp. 024-028. [6] K. El-Khatib, L. Korba, Y. Xu and G. Yee, Privacy and Security in E-Learning, National Research Council of Canada, http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.90.7927&rep=rep1&type=pdf [7] F. Graf, Providing security for elearning, Computers & Graphics, vol. 26, no. 2, (2002) April, pp. 355 365, http://dx.doi.org/10.1016/s0097-8493(02)00062-6 [8] A. Younis Alsabawya, A. Cater-Steel and J. Soar, IT infrastructure services as a requirement for e- learning system success, Computers & Education, vol. 69, (2013) November, pp. 431-451. [9] A. D. Dharmawansa, K. T. Nakahira and Y. Fukumura, Detecting eye blinking of a real-world student and introducing to the virtual e-learning environment, Procedia Computer Science, vol. 22, (2013), pp. 717-726. 50 Copyright c 2015 SERSC