<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE ArticleSet PUBLIC "-//NLM//DTD PubMed 2.7//EN" "https://dtd.nlm.nih.gov/ncbi/pubmed/in/PubMed.dtd">
<ArticleSet>
<Article>
<Journal>
				<PublisherName>Faculty of Management, University of Tehran</PublisherName>
				<JournalTitle>Journal of Information Technology Management</JournalTitle>
				<Issn>2008-5893</Issn>
				<Volume>8</Volume>
				<Issue>1</Issue>
				<PubDate PubStatus="epublish">
					<Year>2016</Year>
					<Month>03</Month>
					<Day>20</Day>
				</PubDate>
			</Journal>
<ArticleTitle>Proposing a Holistic Model for Formulating the Security Requirements of e-learning based on Stakeholders’ Point of Veiw</ArticleTitle>
<VernacularTitle>ارائۀ مدلی مرجع برای تبیین الزامات امنیتی در حوزۀ یادگیری الکترونیکی از نگاه ذی‏نفعان مختلف</VernacularTitle>
			<FirstPage>141</FirstPage>
			<LastPage>154</LastPage>
			<ELocationID EIdType="pii">54697</ELocationID>
			
<ELocationID EIdType="doi">10.22059/jitm.2016.54697</ELocationID>
			
			<Language>EN</Language>
<AuthorList>
<Author>
					<FirstName>Abouzar</FirstName>
					<LastName>Arabsorkhi Mishabi</LastName>
<Affiliation>Ph.D. of Information Technology Management, Iran Telecommunication Research Center, Tehran, Iran</Affiliation>

</Author>
<Author>
					<FirstName>Mohammad</FirstName>
					<LastName>Musakhani</LastName>
<Affiliation>Associate Prof., Faculty of Management,  University of Tehran, Tehran, Iran</Affiliation>

</Author>
<Author>
					<FirstName>Amir</FirstName>
					<LastName>Manian</LastName>
<Affiliation>Associate Prof., Faculty of Management,  University of Tehran, Tehran, Iran</Affiliation>

</Author>
</AuthorList>
				<PublicationType>Journal Article</PublicationType>
			<History>
				<PubDate PubStatus="received">
					<Year>2015</Year>
					<Month>08</Month>
					<Day>31</Day>
				</PubDate>
			</History>
		<Abstract>Development of e-learning applications and services in the context of information and communication networks –beside qualitative and quantitative improvement in the scope and range of services they provide – has increased veriety of threats which are emerged from these networks and telecommunications infrastructure. This kind of issue have mad the effective and accurate analysing of security issues nessesary to managers and decision makers. Accordingly, in this study, using findings of other studies in the field of e-learning security, using methasyntesis, attempted to define a holistic model for classification and organization of security requirements. A structure that defines the origin of security requirements of e-learning and rolplays as a reference for formulating security requirements for this area.</Abstract>
		<ObjectList>
			<Object Type="keyword">
			<Param Name="value">E-learning</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Security requirement</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">holistic model</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">stakeholder</Param>
			</Object>
		</ObjectList>
<ArchiveCopySource DocType="pdf">https://jitm.ut.ac.ir/article_54697_809909288e019d67dd122c6203633f17.pdf</ArchiveCopySource>
</Article>
</ArticleSet>
