TY - BOOK AU - Weippl,Edgar ED - SpringerLink (Online service) TI - Security in E-Learning T2 - Advances in Information Security, SN - 9780387260655 AV - QA76.9.D35 U1 - 005.74 23 PY - 2005/// CY - Boston, MA PB - Springer US KW - Computer science KW - Software engineering KW - Computer programming KW - Data structures (Computer science) KW - Data encryption (Computer science) KW - Computer Science KW - Data Structures, Cryptology and Information Theory KW - Information Systems Applications (incl. Internet) KW - Data Encryption KW - Software Engineering/Programming and Operating Systems KW - Programming Techniques KW - Software Engineering N1 - Quick Start -- Authors -- Teachers -- Managers -- Students -- In-Depth -- Protecting Content -- Security Risk Analysis -- Personal Security Checklist -- Access Control, Authentication & Auditing -- Cryptography -- Additional Resources -- PGP - Pretty Good Privacy -- Plagiarism Detection and Prevention N2 - Security in E-Learning is organized in three parts. First, the author raises awareness that security is an important issue in the context of education. The second part of the book emphasizes that security is mainly an organizational and management issue. The third goal highlights improving security as an ongoing process. Security in E-Learning includes technical fundamentals (buzz words), examples and case studies covering each of these three topics. Considering the enormous costs of creating and maintaining courses, it is surprising that security is not yet considered an important issue by professionals, professors and students. Traditional security research has been largely driven by military requirements to enforce secrecy in the realm of e-learning. In most cases, the knowledge contained in e-learning programs is widely available. Therefore, the asset is not the information itself, but the hypermedia presentation used to convey the information. Security in E-Learning is designed for a professional audience composed of researchers and practitioners in industry and IT professionals. This volume is also suitable for upper undergraduate-level and graduate-level students in computer science UR - http://dx.doi.org/10.1007/b136702 ER -