Managing security in a new Learning Management System (LMS)

Common security problems when creating a new system range from basic browser authentication to physical access to servers. The security perspective in e-learning systems is often ignored, and this why this paper tends to emphasize common security issues when developing new Information Systems. We in...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Besimi, Adrian, Shehu, Visar, Abazi-Bexheti, Lejla, Dika, Zamir
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 342
container_issue
container_start_page 337
container_title
container_volume
creator Besimi, Adrian
Shehu, Visar
Abazi-Bexheti, Lejla
Dika, Zamir
description Common security problems when creating a new system range from basic browser authentication to physical access to servers. The security perspective in e-learning systems is often ignored, and this why this paper tends to emphasize common security issues when developing new Information Systems. We introduce a three layered security measure, such as: the physical control layer, the software control layer and the social engineering training. These three layers tend in various methods to secure users credentials and other data in the newly created Learning Content Management System (LMS).
doi_str_mv 10.1109/ITI.2009.5196105
format Conference Proceeding
fullrecord <record><control><sourceid>pascalfrancis_6IE</sourceid><recordid>TN_cdi_ieee_primary_5196105</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5196105</ieee_id><sourcerecordid>22470712</sourcerecordid><originalsourceid>FETCH-LOGICAL-i205t-14d0e00728102a6d42dc2520f86835882d5f72bb7a3ae931fdc2f02e17ece2653</originalsourceid><addsrcrecordid>eNo9kMFLwzAUhwMqOObugpdcBD20vveyNAmeZEwddHjYPI-0fR2BLYymIv3vnW54-h2-j-_wE-IWIUcE97RYL3ICcLlGVyDoCzFxxjqtDCqL2l6KESoFGQLStZikFCoAAuuUw5F4XvrotyFuZeL6qwv9IEOUXkb-liX7Lv6iP4f3HHu5GlLPe_lQLlePN-Kq9bvEk_OOxefrfD17z8qPt8XspcwCge4znDbAAIYsAvmimVJTkyZobWGVtpYa3RqqKuOVZ6ewPeIWiNFwzVRoNRb3p-7Bp9rv2s7HOqTNoQt73w0boqkBg3T07k5eYOZ_fL5F_QD28VMv</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Managing security in a new Learning Management System (LMS)</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Besimi, Adrian ; Shehu, Visar ; Abazi-Bexheti, Lejla ; Dika, Zamir</creator><creatorcontrib>Besimi, Adrian ; Shehu, Visar ; Abazi-Bexheti, Lejla ; Dika, Zamir</creatorcontrib><description>Common security problems when creating a new system range from basic browser authentication to physical access to servers. The security perspective in e-learning systems is often ignored, and this why this paper tends to emphasize common security issues when developing new Information Systems. We introduce a three layered security measure, such as: the physical control layer, the software control layer and the social engineering training. These three layers tend in various methods to secure users credentials and other data in the newly created Learning Content Management System (LMS).</description><identifier>ISSN: 1330-1012</identifier><identifier>ISBN: 9789537138158</identifier><identifier>ISBN: 9537138151</identifier><identifier>DOI: 10.1109/ITI.2009.5196105</identifier><language>eng</language><publisher>Zagreb: IEEE</publisher><subject>Access control ; Access Control List ; ACL ; Applied sciences ; Authentication ; Computer science; control theory; systems ; Computer systems and distributed systems. User interface ; Data security ; Electronic learning ; Engineering management ; Exact sciences and technology ; General aspects ; Information security ; Information systems security ; Learning Management Systems security ; Least squares approximation ; LMS ; Management information systems ; Management training ; Occupational training. Personnel. Work management ; phishing ; physical security ; social engineering ; Software ; software security ; Technology management</subject><ispartof>Information technology interfaces, 2009, p.337-342</ispartof><rights>2015 INIST-CNRS</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5196105$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2051,4035,4036,27904,54898</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5196105$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&amp;idt=22470712$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><creatorcontrib>Besimi, Adrian</creatorcontrib><creatorcontrib>Shehu, Visar</creatorcontrib><creatorcontrib>Abazi-Bexheti, Lejla</creatorcontrib><creatorcontrib>Dika, Zamir</creatorcontrib><title>Managing security in a new Learning Management System (LMS)</title><title>Information technology interfaces</title><addtitle>ITI</addtitle><description>Common security problems when creating a new system range from basic browser authentication to physical access to servers. The security perspective in e-learning systems is often ignored, and this why this paper tends to emphasize common security issues when developing new Information Systems. We introduce a three layered security measure, such as: the physical control layer, the software control layer and the social engineering training. These three layers tend in various methods to secure users credentials and other data in the newly created Learning Content Management System (LMS).</description><subject>Access control</subject><subject>Access Control List</subject><subject>ACL</subject><subject>Applied sciences</subject><subject>Authentication</subject><subject>Computer science; control theory; systems</subject><subject>Computer systems and distributed systems. User interface</subject><subject>Data security</subject><subject>Electronic learning</subject><subject>Engineering management</subject><subject>Exact sciences and technology</subject><subject>General aspects</subject><subject>Information security</subject><subject>Information systems security</subject><subject>Learning Management Systems security</subject><subject>Least squares approximation</subject><subject>LMS</subject><subject>Management information systems</subject><subject>Management training</subject><subject>Occupational training. Personnel. Work management</subject><subject>phishing</subject><subject>physical security</subject><subject>social engineering</subject><subject>Software</subject><subject>software security</subject><subject>Technology management</subject><issn>1330-1012</issn><isbn>9789537138158</isbn><isbn>9537138151</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2009</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNo9kMFLwzAUhwMqOObugpdcBD20vveyNAmeZEwddHjYPI-0fR2BLYymIv3vnW54-h2-j-_wE-IWIUcE97RYL3ICcLlGVyDoCzFxxjqtDCqL2l6KESoFGQLStZikFCoAAuuUw5F4XvrotyFuZeL6qwv9IEOUXkb-liX7Lv6iP4f3HHu5GlLPe_lQLlePN-Kq9bvEk_OOxefrfD17z8qPt8XspcwCge4znDbAAIYsAvmimVJTkyZobWGVtpYa3RqqKuOVZ6ewPeIWiNFwzVRoNRb3p-7Bp9rv2s7HOqTNoQt73w0boqkBg3T07k5eYOZ_fL5F_QD28VMv</recordid><startdate>200906</startdate><enddate>200906</enddate><creator>Besimi, Adrian</creator><creator>Shehu, Visar</creator><creator>Abazi-Bexheti, Lejla</creator><creator>Dika, Zamir</creator><general>IEEE</general><general>University Computing Centre</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope><scope>IQODW</scope></search><sort><creationdate>200906</creationdate><title>Managing security in a new Learning Management System (LMS)</title><author>Besimi, Adrian ; Shehu, Visar ; Abazi-Bexheti, Lejla ; Dika, Zamir</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i205t-14d0e00728102a6d42dc2520f86835882d5f72bb7a3ae931fdc2f02e17ece2653</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2009</creationdate><topic>Access control</topic><topic>Access Control List</topic><topic>ACL</topic><topic>Applied sciences</topic><topic>Authentication</topic><topic>Computer science; control theory; systems</topic><topic>Computer systems and distributed systems. User interface</topic><topic>Data security</topic><topic>Electronic learning</topic><topic>Engineering management</topic><topic>Exact sciences and technology</topic><topic>General aspects</topic><topic>Information security</topic><topic>Information systems security</topic><topic>Learning Management Systems security</topic><topic>Least squares approximation</topic><topic>LMS</topic><topic>Management information systems</topic><topic>Management training</topic><topic>Occupational training. Personnel. Work management</topic><topic>phishing</topic><topic>physical security</topic><topic>social engineering</topic><topic>Software</topic><topic>software security</topic><topic>Technology management</topic><toplevel>online_resources</toplevel><creatorcontrib>Besimi, Adrian</creatorcontrib><creatorcontrib>Shehu, Visar</creatorcontrib><creatorcontrib>Abazi-Bexheti, Lejla</creatorcontrib><creatorcontrib>Dika, Zamir</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Besimi, Adrian</au><au>Shehu, Visar</au><au>Abazi-Bexheti, Lejla</au><au>Dika, Zamir</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Managing security in a new Learning Management System (LMS)</atitle><btitle>Information technology interfaces</btitle><stitle>ITI</stitle><date>2009-06</date><risdate>2009</risdate><spage>337</spage><epage>342</epage><pages>337-342</pages><issn>1330-1012</issn><isbn>9789537138158</isbn><isbn>9537138151</isbn><abstract>Common security problems when creating a new system range from basic browser authentication to physical access to servers. The security perspective in e-learning systems is often ignored, and this why this paper tends to emphasize common security issues when developing new Information Systems. We introduce a three layered security measure, such as: the physical control layer, the software control layer and the social engineering training. These three layers tend in various methods to secure users credentials and other data in the newly created Learning Content Management System (LMS).</abstract><cop>Zagreb</cop><pub>IEEE</pub><doi>10.1109/ITI.2009.5196105</doi><tpages>6</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1330-1012
ispartof Information technology interfaces, 2009, p.337-342
issn 1330-1012
language eng
recordid cdi_ieee_primary_5196105
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Access control
Access Control List
ACL
Applied sciences
Authentication
Computer science
control theory
systems
Computer systems and distributed systems. User interface
Data security
Electronic learning
Engineering management
Exact sciences and technology
General aspects
Information security
Information systems security
Learning Management Systems security
Least squares approximation
LMS
Management information systems
Management training
Occupational training. Personnel. Work management
phishing
physical security
social engineering
Software
software security
Technology management
title Managing security in a new Learning Management System (LMS)
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-25T02%3A23%3A47IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-pascalfrancis_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Managing%20security%20in%20a%20new%20Learning%20Management%20System%20(LMS)&rft.btitle=Information%20technology%20interfaces&rft.au=Besimi,%20Adrian&rft.date=2009-06&rft.spage=337&rft.epage=342&rft.pages=337-342&rft.issn=1330-1012&rft.isbn=9789537138158&rft.isbn_list=9537138151&rft_id=info:doi/10.1109/ITI.2009.5196105&rft_dat=%3Cpascalfrancis_6IE%3E22470712%3C/pascalfrancis_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5196105&rfr_iscdi=true