53,517 research outputs found

    Towards Security Goals in Summative E-Assessment Security

    No full text
    The general security goals of a computer system are known to include confidentiality, integrity and availability (C-I-A) which prevent critical assets from potential threats. The C-I-A security goals are well researched areas; however they may be insufficient to address all the needs of the summative e-assessment. In this paper, we do not discard the fundamental C-I-A security goals; rather we define security goals which are specific to summative e-assessment security

    Security in online learning assessment towards an effective trustworthiness approach to support e-learning teams

    Get PDF
    (c) 2014 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works.This paper proposes a trustworthiness model for the design of secure learning assessment in on-line collaborative learning groups. Although computer supported collaborative learning has been widely adopted in many educational institutions over the last decade, there exist still drawbacks which limit their potential in collaborative learning activities. Among these limitations, we investigate information security requirements in on-line assessment, (e-assessment), which can be developed in collaborative learning contexts. Despite information security enhancements have been developed in recent years, to the best of our knowledge, integrated and holistic security models have not been completely carried out yet. Even when security advanced methodologies and technologies are deployed in Learning Management Systems, too many types of vulnerabilities still remain opened and unsolved. Therefore, new models such as trustworthiness approaches can overcome these lacks and support e-assessment requirements for e-Learning. To this end, a trustworthiness model is designed in order to conduct the guidelines of a holistic security model for on-line collaborative learning through effective trustworthiness approaches. In addition, since users' trustworthiness analysis involves large amounts of ill-structured data, a parallel processing paradigm is proposed to build relevant information modeling trustworthiness levels for e-Learning.Peer ReviewedPostprint (author's final draft

    Academic Integrity Resources - links and guides

    Get PDF
    an online tutorial, a pdf version, a powerpoint presentation, links to regulations

    Capturing organisational knowledge from educational enhancement: identifying patterns for curriculum innovation

    No full text
    On-line and blended learning is much fĂŞted, particularly by university management as part of the solution to many issues currently facing higher education. However, experienced academics lack examples of suitable pedagogically engaging on-line activities, and remain sceptical or resistant to change. This paper describes a case study of an initiative taken by a newly formed centre with responsibility for introducing such change within a university. It uses a single module to demonstrate a range of on-line activities blended with conventional face-to-face approaches which may then be presented to staff as reusable patterns with generic applicability. At the same time we show how these approaches can meet the requirements of the university management

    Innovation and Employability in Knowledge Management Curriculum Design

    Get PDF
    During 2007/8, Southampton Solent University worked on a Leadership Foundation project focused on the utility of the multi-functional team approach as a vehicle to deliver innovation in strategic and operational terms in higher education (HE). The Task-Orientated Multi-Functional Team Approach (TOMFTA) project took two significant undertakings for Southampton Solent as key areas for investigation, one academic and one administrative in focus. The academic project was the development of an innovative and novel degree programme in knowledge management (KM). The new KM Honours degree programme is timely both in recognition of the increasing importance to organisations of knowledge as a commodity, and in its adoption of a distinctive structure and pedagogy. The methodology for the KM curriculum design brings together student-centred and market-driven approaches: positioning the programme for the interests of students and requirements of employers, rather than just the capabilities of staff; while looking at ways that courses can be delivered with more flexibility, e.g. accelerated and block-mode; with level-differentiated activities, common cross-year content and material that is multi-purpose for use in short courses. In order to permit context at multiple levels in common, a graduate skills strand is taught separately as part of the University’s business-facing education agenda. The KM portfolio offers a programme of practically-based courses integrating key themes in knowledge management, business, information distribution and development of the media. They develop problem-solving, communications, teamwork and other employability skills as well as the domain skills needed by emerging information management technologies. The new courses are built on activities which focus on different aspects of KM, drawing on existing content as a knowledge base. This paper presents the ongoing development of the KM programme through the key aspects in its conception and design

    Authentication of Students and Students’ Work in E-Learning : Report for the Development Bid of Academic Year 2010/11

    Get PDF
    Global e-learning market is projected to reach $107.3 billion by 2015 according to a new report by The Global Industry Analyst (Analyst 2010). The popularity and growth of the online programmes within the School of Computer Science obviously is in line with this projection. However, also on the rise are students’ dishonesty and cheating in the open and virtual environment of e-learning courses (Shepherd 2008). Institutions offering e-learning programmes are facing the challenges of deterring and detecting these misbehaviours by introducing security mechanisms to the current e-learning platforms. In particular, authenticating that a registered student indeed takes an online assessment, e.g., an exam or a coursework, is essential for the institutions to give the credit to the correct candidate. Authenticating a student is to ensure that a student is indeed who he says he is. Authenticating a student’s work goes one step further to ensure that an authenticated student indeed does the submitted work himself. This report is to investigate and compare current possible techniques and solutions for authenticating distance learning student and/or their work remotely for the elearning programmes. The report also aims to recommend some solutions that fit with UH StudyNet platform.Submitted Versio

    A Competency-based Approach toward Curricular Guidelines for Information Technology Education

    Get PDF
    The Association for Computing Machinery and the IEEE Computer Society have launched a new report titled, Curriculum Guidelines for Baccalaureate Degree Programs in Information Technology (IT2017). This paper discusses significant aspects of the IT2017 report and focuses on competency-driven learning rather than delivery of knowledge in information technology (IT) programs. It also highlights an IT curricular framework that meets the growing demands of a changing technological world in the next decade. Specifically, the paper outlines ways by which baccalaureate IT programs might implement the IT curricular framework and prepare students with knowledge, skills, and dispositions to equip graduates with competencies that matter in the workplace. The paper suggests that a focus on competencies allows academic departments to forge collaborations with employers and engage students in professional practice experiences. It also shows how professionals and educators might use the report in reviewing, updating, and creating baccalaureate IT degree programs worldwide
    • …
    corecore