Managing security in a new Learning Management System (LMS)
Common security problems when creating a new system range from basic browser authentication to physical access to servers. The security perspective in e-learning systems is often ignored, and this why this paper tends to emphasize common security issues when developing new Information Systems. We in...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 342 |
---|---|
container_issue | |
container_start_page | 337 |
container_title | |
container_volume | |
creator | Besimi, Adrian Shehu, Visar Abazi-Bexheti, Lejla Dika, Zamir |
description | Common security problems when creating a new system range from basic browser authentication to physical access to servers. The security perspective in e-learning systems is often ignored, and this why this paper tends to emphasize common security issues when developing new Information Systems. We introduce a three layered security measure, such as: the physical control layer, the software control layer and the social engineering training. These three layers tend in various methods to secure users credentials and other data in the newly created Learning Content Management System (LMS). |
doi_str_mv | 10.1109/ITI.2009.5196105 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>pascalfrancis_6IE</sourceid><recordid>TN_cdi_ieee_primary_5196105</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5196105</ieee_id><sourcerecordid>22470712</sourcerecordid><originalsourceid>FETCH-LOGICAL-i205t-14d0e00728102a6d42dc2520f86835882d5f72bb7a3ae931fdc2f02e17ece2653</originalsourceid><addsrcrecordid>eNo9kMFLwzAUhwMqOObugpdcBD20vveyNAmeZEwddHjYPI-0fR2BLYymIv3vnW54-h2-j-_wE-IWIUcE97RYL3ICcLlGVyDoCzFxxjqtDCqL2l6KESoFGQLStZikFCoAAuuUw5F4XvrotyFuZeL6qwv9IEOUXkb-liX7Lv6iP4f3HHu5GlLPe_lQLlePN-Kq9bvEk_OOxefrfD17z8qPt8XspcwCge4znDbAAIYsAvmimVJTkyZobWGVtpYa3RqqKuOVZ6ewPeIWiNFwzVRoNRb3p-7Bp9rv2s7HOqTNoQt73w0boqkBg3T07k5eYOZ_fL5F_QD28VMv</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Managing security in a new Learning Management System (LMS)</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Besimi, Adrian ; Shehu, Visar ; Abazi-Bexheti, Lejla ; Dika, Zamir</creator><creatorcontrib>Besimi, Adrian ; Shehu, Visar ; Abazi-Bexheti, Lejla ; Dika, Zamir</creatorcontrib><description>Common security problems when creating a new system range from basic browser authentication to physical access to servers. The security perspective in e-learning systems is often ignored, and this why this paper tends to emphasize common security issues when developing new Information Systems. We introduce a three layered security measure, such as: the physical control layer, the software control layer and the social engineering training. These three layers tend in various methods to secure users credentials and other data in the newly created Learning Content Management System (LMS).</description><identifier>ISSN: 1330-1012</identifier><identifier>ISBN: 9789537138158</identifier><identifier>ISBN: 9537138151</identifier><identifier>DOI: 10.1109/ITI.2009.5196105</identifier><language>eng</language><publisher>Zagreb: IEEE</publisher><subject>Access control ; Access Control List ; ACL ; Applied sciences ; Authentication ; Computer science; control theory; systems ; Computer systems and distributed systems. User interface ; Data security ; Electronic learning ; Engineering management ; Exact sciences and technology ; General aspects ; Information security ; Information systems security ; Learning Management Systems security ; Least squares approximation ; LMS ; Management information systems ; Management training ; Occupational training. Personnel. Work management ; phishing ; physical security ; social engineering ; Software ; software security ; Technology management</subject><ispartof>Information technology interfaces, 2009, p.337-342</ispartof><rights>2015 INIST-CNRS</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5196105$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2051,4035,4036,27904,54898</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5196105$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=22470712$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><creatorcontrib>Besimi, Adrian</creatorcontrib><creatorcontrib>Shehu, Visar</creatorcontrib><creatorcontrib>Abazi-Bexheti, Lejla</creatorcontrib><creatorcontrib>Dika, Zamir</creatorcontrib><title>Managing security in a new Learning Management System (LMS)</title><title>Information technology interfaces</title><addtitle>ITI</addtitle><description>Common security problems when creating a new system range from basic browser authentication to physical access to servers. The security perspective in e-learning systems is often ignored, and this why this paper tends to emphasize common security issues when developing new Information Systems. We introduce a three layered security measure, such as: the physical control layer, the software control layer and the social engineering training. These three layers tend in various methods to secure users credentials and other data in the newly created Learning Content Management System (LMS).</description><subject>Access control</subject><subject>Access Control List</subject><subject>ACL</subject><subject>Applied sciences</subject><subject>Authentication</subject><subject>Computer science; control theory; systems</subject><subject>Computer systems and distributed systems. User interface</subject><subject>Data security</subject><subject>Electronic learning</subject><subject>Engineering management</subject><subject>Exact sciences and technology</subject><subject>General aspects</subject><subject>Information security</subject><subject>Information systems security</subject><subject>Learning Management Systems security</subject><subject>Least squares approximation</subject><subject>LMS</subject><subject>Management information systems</subject><subject>Management training</subject><subject>Occupational training. Personnel. Work management</subject><subject>phishing</subject><subject>physical security</subject><subject>social engineering</subject><subject>Software</subject><subject>software security</subject><subject>Technology management</subject><issn>1330-1012</issn><isbn>9789537138158</isbn><isbn>9537138151</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2009</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNo9kMFLwzAUhwMqOObugpdcBD20vveyNAmeZEwddHjYPI-0fR2BLYymIv3vnW54-h2-j-_wE-IWIUcE97RYL3ICcLlGVyDoCzFxxjqtDCqL2l6KESoFGQLStZikFCoAAuuUw5F4XvrotyFuZeL6qwv9IEOUXkb-liX7Lv6iP4f3HHu5GlLPe_lQLlePN-Kq9bvEk_OOxefrfD17z8qPt8XspcwCge4znDbAAIYsAvmimVJTkyZobWGVtpYa3RqqKuOVZ6ewPeIWiNFwzVRoNRb3p-7Bp9rv2s7HOqTNoQt73w0boqkBg3T07k5eYOZ_fL5F_QD28VMv</recordid><startdate>200906</startdate><enddate>200906</enddate><creator>Besimi, Adrian</creator><creator>Shehu, Visar</creator><creator>Abazi-Bexheti, Lejla</creator><creator>Dika, Zamir</creator><general>IEEE</general><general>University Computing Centre</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope><scope>IQODW</scope></search><sort><creationdate>200906</creationdate><title>Managing security in a new Learning Management System (LMS)</title><author>Besimi, Adrian ; Shehu, Visar ; Abazi-Bexheti, Lejla ; Dika, Zamir</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i205t-14d0e00728102a6d42dc2520f86835882d5f72bb7a3ae931fdc2f02e17ece2653</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2009</creationdate><topic>Access control</topic><topic>Access Control List</topic><topic>ACL</topic><topic>Applied sciences</topic><topic>Authentication</topic><topic>Computer science; control theory; systems</topic><topic>Computer systems and distributed systems. User interface</topic><topic>Data security</topic><topic>Electronic learning</topic><topic>Engineering management</topic><topic>Exact sciences and technology</topic><topic>General aspects</topic><topic>Information security</topic><topic>Information systems security</topic><topic>Learning Management Systems security</topic><topic>Least squares approximation</topic><topic>LMS</topic><topic>Management information systems</topic><topic>Management training</topic><topic>Occupational training. Personnel. Work management</topic><topic>phishing</topic><topic>physical security</topic><topic>social engineering</topic><topic>Software</topic><topic>software security</topic><topic>Technology management</topic><toplevel>online_resources</toplevel><creatorcontrib>Besimi, Adrian</creatorcontrib><creatorcontrib>Shehu, Visar</creatorcontrib><creatorcontrib>Abazi-Bexheti, Lejla</creatorcontrib><creatorcontrib>Dika, Zamir</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Besimi, Adrian</au><au>Shehu, Visar</au><au>Abazi-Bexheti, Lejla</au><au>Dika, Zamir</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Managing security in a new Learning Management System (LMS)</atitle><btitle>Information technology interfaces</btitle><stitle>ITI</stitle><date>2009-06</date><risdate>2009</risdate><spage>337</spage><epage>342</epage><pages>337-342</pages><issn>1330-1012</issn><isbn>9789537138158</isbn><isbn>9537138151</isbn><abstract>Common security problems when creating a new system range from basic browser authentication to physical access to servers. The security perspective in e-learning systems is often ignored, and this why this paper tends to emphasize common security issues when developing new Information Systems. We introduce a three layered security measure, such as: the physical control layer, the software control layer and the social engineering training. These three layers tend in various methods to secure users credentials and other data in the newly created Learning Content Management System (LMS).</abstract><cop>Zagreb</cop><pub>IEEE</pub><doi>10.1109/ITI.2009.5196105</doi><tpages>6</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1330-1012 |
ispartof | Information technology interfaces, 2009, p.337-342 |
issn | 1330-1012 |
language | eng |
recordid | cdi_ieee_primary_5196105 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Access control Access Control List ACL Applied sciences Authentication Computer science control theory systems Computer systems and distributed systems. User interface Data security Electronic learning Engineering management Exact sciences and technology General aspects Information security Information systems security Learning Management Systems security Least squares approximation LMS Management information systems Management training Occupational training. Personnel. Work management phishing physical security social engineering Software software security Technology management |
title | Managing security in a new Learning Management System (LMS) |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-25T02%3A23%3A47IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-pascalfrancis_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Managing%20security%20in%20a%20new%20Learning%20Management%20System%20(LMS)&rft.btitle=Information%20technology%20interfaces&rft.au=Besimi,%20Adrian&rft.date=2009-06&rft.spage=337&rft.epage=342&rft.pages=337-342&rft.issn=1330-1012&rft.isbn=9789537138158&rft.isbn_list=9537138151&rft_id=info:doi/10.1109/ITI.2009.5196105&rft_dat=%3Cpascalfrancis_6IE%3E22470712%3C/pascalfrancis_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5196105&rfr_iscdi=true |