Adaptable mobile user interface for securing e-learning environment

  • Mohanned Abdullah Aljbori Alexandria university
  • Shawkat K Guirguis Alexandria University
  • Magda M Madbouly Alexandria University
Keywords: E-learning, Mobile learning, E-learning problem, E-learning challenges, Adaptive Mobile user interface

Abstract

E-Learning is a pedagogy empowered by Information and Communication technologies supporting education/training. While e-Learning exists over the past decade and a half, it is do not receiving considerable attention only in the recent times. Both Industry and Academia are heavily depending on e-Learning in streamlining their teaching process, and also E-learning has provided us with the capability of providing quality education to masses without restricting them to specific time or place, So that E-Learning become the most used and popular teaching method in universities with availability of E-learning tools and techniques, development of technology communications and networks. We can say that distance education’s popularity is increasing day by day and has become one of the most preferred methods for obtaining information. And it provides great facilities in many aspects according to traditional education. One of the most effective parameters in Electronic Learning or E-Learning systems’ success is the security of these systems. But this feature is ignored in the most of cases. An E-Learning system has different user groups such as authors, teachers and students. Each of these groups has special and unique security requirements. In this paper we will work on secure e-learning environment against unauthorized access through design a system for securing and control access to e-learning environment in distance learning institutions by adaptable mobile user interface associated with the token code generator Technology for learners who use mobile devices to access educational content.

Author Biographies

Mohanned Abdullah Aljbori, Alexandria university
Msc.student - information technology department / Institute of Graduate Studies & Research, Alexandria University
Shawkat K Guirguis, Alexandria University

Professor of Computer Science & Informatics
Department of Information Technology
Institute of Graduate Studies & Research, Alexandria University
163 El-Horreya Avenue, P. O. Box 832, Alexandria, Egypt

Magda M Madbouly, Alexandria University

Ph.D. in information technology
Department of Information Technology
Institute of Graduate Studies & Research, Alexandria University
163 El-Horreya Avenue, P. O. Box 832, Alexandria, Egypt

References

Ali Naserasadi, “Author’s Security in Electronic Learning Systems”, International Journal of Computer Applications, Vol. 21, Issue 10, pp. 25-29, 2011.

Carine G. Webber, Maria de Fátima W.P.Lima, Marcos E.Casa, Alexandre M.Ribeiro, “Towards Secure e-Learning Applications: a Multi agent Platform”, Journal Of Software, Vol. 2, Issue 1, pp. 60-69, 2007.

El-Khatib, K., Korba, L., Xu, Y., and Yee, G., "Privacy and Security in E-Learning", International Journal of Distance Education Technologies (IJDET), Vol. 1, No. 4, pp. 1-19, 2003.

Jianming Yong, “Enhancing the Privacy of e-Learning Systems with Alias and Anonymity", International Conference on Computer Supported Cooperative Work in Design, pp. 534-544, 2008.

Umit Kocabicak, Deniz Dural, “Secure and Interoperable e-Learning Platforms Based on Web Services ", International Conference on New Horizons in Education, pp. 1265 – 1271, June 2012.

Jianming Yong, "Security and Privacy Preservation for Mobile E-Learning via Digital Identity Attributes“, Journal of Universal Computer Science (J.UCS), Vol. 17, No. 2, pp. 296-310, 2011.

Ivica Boticki, Natasa Hoic-Bozic, Ivan Budiscak, " A System Architecture for a Context-aware Blended Mobile Learning Environment", Journal of Computing and Information Technology(CIT), Vol. 17, No. 2, pp. 165–175, 2009.

Jorge Fontenla Gonza´ lez, Manuel Caeiro Rodrı´guez, Martı´n Llamas Nistal, and Luis Anido Rifo´n, “Reverse Oath: A solution to achieve delegated authorizations in single sign-on e-learning systems”, computers & security, Vol. 28, No 8, pp. 843-656, 2009.

Shadi R Masadeh, Nedal Turab, Farhan Obisat, “A secure model for building e-learning systems”, Network Security, Vol. 2012, No 1, pp. 17–20, 2012.

Felician Alecu, Paul Pocatilu, George Stoica, Cristian Ciurea, Sergiu Capisizu, “OpenID, a Single Sign-On Solution for E-learning Applications “,Journal of Mobile, Embedded and Distributed Systems(JMEDS), Vol. 3, No. 3, pp. 136-141, 2011.

Huping Wang, Chunxiao Fan, Shuai Yang, Junwei Zou, Xiaoying Zhang, “A New Secure OpenID Authentication Mechanism Using One-Time Password (OTP) “,Wireless Communications, Networking and Mobile Computing (WiCOM), 7th International Conference on, 2011.

Shadi R. Masadeh,Bilal Abul-Huda andNidal M. Turab, “a novel secure e-contents system for multimedia interchange workflows in e-learning environment”, International Journal of Computer Networks & Communications (IJCNC), Vol. 15, No 5, pp. 131–139, 2013.

Georgios Kambourakis, Denise-Penelope N. Kontoni, Angelos Rouskas, and Stefanos Gritzalis, “A PKI approach for deploying modern secure distributed e-learning and m-learning environments “,Computers & Education, Vol. 48, No. 1, pp. 1–16, August 2007.

P.R.Lakshmi Eswari, “A Process Framework for Securing an e-Learning Ecosystem “, 6th international conference on internet technology and secured transaction, pp. 403 - 407, Abu Dhabi, United Arab Emirates, 11-14, December 2011.

Anastasia Balia, and Dimitrios Koukopoulos, “A Secure Collaborative Multimedia Learning Scheme in Cultural Environments “,international conference on Information, Intelligence, Systems and Applications (IISA), pp. 1-5, Piraeus, 10-12 July 2013.

Yu-Lin Jeng, “An OpenID Based Authentication Mechanism in a Distributed System Environment”, International Journal of Computer and Communication Engineering, Vol. 1, No. 3, pp. 250-252, September 2012.

M. Tariq Banday, " Ensuring Authentication and Integrity of Open Source Software using Digital Signature”, International Journal of Computer Applications, IJCA Special Issue on Network Security and Cryptography NSC, Vol. 4, No. 2, pp. 11-14, 2011.

Yu-Hsiu Chuang, Chi-Yuan Chen, Tzong-ChenWu, and Han-Chieh Chao,” Establish a secure and trustworthy ICT environment for educational systems: a case study “,Journal of Intelligent Manufacturing, Vol. 23, Issue 4, pp. 965-975, August 2012.

Shantha Visalakshi. U and Shyamala. K, “Multi-agent coordination in distributed e-learning environment providing access permissions “, International Journal of Engineering and Technology (IJET), Vol. 5, No. 2, pp. 1306-1310, May 2013.

Dimitrios K. Koukopoulos, and Georgios D. Styliaras," Security in Collaborative Multimedia Web-based Art Projects", Journal Of Multimedia, Vol. 5, No. 5, pp. 404-416, October 2010.

Amjad Mahfouth, "The Authentication Techniques in Distributed E-Learning between Universities in Avicenna Virtual Campus Network", International Journal of Computer Science Issues (IJCSI), Vol. 9, Issue 3, No 2, pp. 418- 422, May 2012.

Felician ALECU, Paul POCATILU and Sergiu CAPISIZU, " WiMAX Security Issues in E-learning Systems", Journal of Mobile, Embedded and Distributed Systems(JMEDS), Vol. 2, No. 1, pp. 15-20, 2010.

Sadaf Ahmad and Mohammad Ubaidullah Bokhari, “A New Approach to Multi Agent Based Architecture for Secure and Effective E-learning “,International Journal of Computer Applications(IJCA), Vol. 46, No22, pp. 26-29, May 2012.

Mohammed Alzaabi, Jawad Berri and Mohamed Jamal Zemerly, “Web-based Architecture for Mobile Learning “,International Journal for Infonomics (IJI), Vol. 3, Issue. 1, pp. 207-216, March 2010.

MD. Anwar Hossain Masud and Xiaodi Huang, “M-learning Architecture for Cloud-based Higher Education System of Bangladesh “, Mobile Computing, Vol. 2, Issue. 4, pp. 84-94, November 2013.

T. Altameem, "Contextual Mobile Learning System for Saudi Arabian Universities ", International Journal of Computer Applications, Vol. 21, No 4, pp-21-26, May 2011.

Krzysztof Walczak, Jacek Chmielewski, Wojciech Wiza, Dariusz Rumiński and Grzegorz Skibiński, "Adaptable mobile user interfaces for e-learning repositories ", IADIS International Conference on Mobile Learning, 2011.

Krzysztof Walczak, Wojciech Wiza, Dariusz Rumiński, Jacek Chmielewski and Adam Wójtowicz, “Adaptable User Interfaces for Web 2.0 Educational Resources ", IT Tools in Management and Education-Selected Problems, pp. 104-124, 2011.

N. Nurseitov, M. Paulson, R. Reynolds, and C. Izurieta, "Comparison of JSON and XML Data Interchange Formats: A Case Study", in Proc. CAINE, 2009, pp.157-162.

Antonio Sarasa-Cabezuelo and José-Luis Sierra, "Grammar-Driven Development of JSON Processing Applications", Proceedings of the Federated Conference on Computer Science and Information Systems, pp. 1545 – 1552, 8-11 Sept. 2013.

Adam Wójtowicz, Jakub Flotyński, Dariusz Rumiński, and Krzysztof Walczak, “Securing Learning Services Accessible with Adaptable User Interfaces", Information Systems Architecture and Technology, Service Oriented Networked Systems, pp. 109-118, 2011.

Georgios Kambourakis, " Security and Privacy in m-Learning and Beyond: Challenges and State-of-the-art”, International Journal of u- and e- Service, Science and Technology, Vol. 6, No. 3, pp. 67-84, June, 2013.

Roberto G´omez C´ardenas and Erika Mata S´anchez, “Security Challenges of Distributed e-Learning Systems “, 5th International School and Symposium, ISSADS, Volume 3563, pp. 538-544, Guadalajara, Mexico, January 24-28, 2005.

Zainal Fikri Zamzuri, Mazani Manaf, Adnan Ahmad, and Yuzaimi Yunus, "Computer Security Threats towards the E-Learning System Assets”, Second International Conference, ICSECS, Volume 180, pp. 335-345, June 27-29, Kuantan, Pahang, Malaysia 2011.

Alok Tripathi, and Abhinav Mishra, "A Web-based E-Learning Environment for Information Security", International Journal of Computer Applications (IJCA), Vol. 45, No. 4, pp. 50- 54, May 2012.

Rajesh Wadhvani, and Devshri Roy, "Developing Agent Oriented Mobile Learning System ", International Journal of Computer Science and Information Security (IJCSIS),, Vol. 10, No. 4, PP. 93-98, April 2012.

Mohd Anwar and Jim Greer, “Facilitating Trust in Privacy-Preserving E-Learning Environments”, IEEE Transactions on Learning Technologies, Vol. 5, No. 1, pp. 62-73, January -March 2012.

Lili Sun, Hua Wang, and Yan Li, "Protecting Disseminative Information in E-Learning ", 6th International Conference Advances in Web Based Learning (ICWL), pp. 554–565, UK, August 15-17, 2008.

E. Kritzinger, “Information Security in an E-learning Environment “, IFIP International Federation for Information Processing, Volume 210, pp. 345-349, August 21–24, Chile 2006.

Miguel, J., Caballe, S. and Prieto, J, “Information Security in Support for Mobile Collaborative Learning “, Seventh International Conference on Complex, Intelligent, and Software Intensive Systems, pp. 379- 384, 3-5 July Taichung 2013.

Najwa Hayaati Mohd Alwi and Ip-Shing Fan, " E-Learning and Information Security Management”, International Journal of Digital Society (IJDS), Vol. 1, Issue. 2, pp. 148-156, June 2010.

Ateeq Ahmad and Mohammed Ahmed Elhossiny,” E-Learning and Security Threats “, (IJCSNS) International Journal of Computer Science and Network Security, Vol. 12, No. 4, pp. 15-18, April 2012.

Vladimir I. Zuev, “E-Learning Security Models”, (JMIS) Journal of Management Information Systems, Vol. 7, No. 2, pp. 024-028 April 2012.

Im Y. Jung and Heon Y. Yeom, "Enhanced Security for Online Exams Using Group Cryptography ", IEEE Transactions on Education, Vol. 52, No. 3, pp. 340-349, August 2009.

Defta (Ciobanu) Costinela – Luminita, “Information security in E-learning Platforms “,3rd World Conference on Educational Sciences, Volume 15, pp. 2689–2693, Istanbul, Turkey 2011.

Professor Aurel ŞERB PhD, Lecturer Costinela - Luminiţa DEFTA, PhD. Candidate, Junior Lecturer Nicoleta Magdalena IACOB, PhD and Lecturer Marius Cristian APETREI, PhD. candidate, “Information Security Management In E-Learning “,Knowledge horizons Journal , Vo. 5, No. 2, pp. 1 - 6, 2013.

Nikhilesh Barik and Dr. Sunil Karforma, "Risks and Remedies In E-Learning System", International Journal of Network Security & Its Applications (IJNSA), Vol.4, No.1, pp. 51-59, January 2012.

S.Hameetha Begum, T.Sheeba and S.N.Nisha Rani, “Security in Cloud based E-Learning “,International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 3, Issue. 1,, pp. 270-278, January 2013.

Mr. Dhiraj K. Chandak and Prof.Mr. M.M. Bartere, “Security in Cloud Based M-learning”, International Journal of Computer Science and Management Research, Vol. 2 Issue 4, pp. 2163-2170 , April 2013.

Defta (Ciobanu) Costinela – Luminita, “Security issues in e-learning platforms “, World Journal on Educational Technology, Vol. 3, issue. 3, pp. 153-167, December 2011.

Maria Nickolova and Eugene Nickolov, “Threat Model for User Security in E-Learning Systems”, International Journal "Information Technologies and Knowledge, Vol. 1, No. 1, pp. 341-347, 2007.

Kyle Montague, Vicki L. Hanson, and Andy Cobley, “Adaptive Interfaces: A Little Learning is a Dangerous Thing “, 6th International Conference Universal Access in Human-Computer Interaction. Design for All and eInclusion (UAHCI), Volume 6765, Orlando, FL, USA, pp. 391–399, July 9-14, 2011.

Janet L. Wesson, Akash Singh, and Bradley van Tonder “, Can Adaptive Interfaces Improve the Usability of Mobile Applications, Second IFIP International Federation for Information Processing, pp. 187–198, Australia, September 20-23, 2010.

E. Kritzinger, and S.H von Solms, " E-learning: Incorporating Information Security Governance", Issues in Informing Science and Information Technology, Vol. 3, pp. 319-325, 2006.

Published
2014-09-02
How to Cite
Aljbori, M. A., Guirguis, S. K., & Madbouly, M. M. (2014). Adaptable mobile user interface for securing e-learning environment. Transactions on Networks and Communications, 2(4), 64-83. https://doi.org/10.14738/tnc.24.360