Proposing a Holistic Model for Formulating the Security Requirements of e-learning based on Stakeholders’ Point of Veiw

Document Type : Research Paper


1 Ph.D. of Information Technology Management, Iran Telecommunication Research Center, Tehran, Iran

2 Associate Prof., Faculty of Management, University of Tehran, Tehran, Iran


Development of e-learning applications and services in the context of information and communication networks –beside qualitative and quantitative improvement in the scope and range of services they provide – has increased veriety of threats which are emerged from these networks and telecommunications infrastructure. This kind of issue have mad the effective and accurate analysing of security issues nessesary to managers and decision makers. Accordingly, in this study, using findings of other studies in the field of e-learning security, using methasyntesis, attempted to define a holistic model for classification and organization of security requirements. A structure that defines the origin of security requirements of e-learning and rolplays as a reference for formulating security requirements for this area.


Main Subjects

Adams, A. & Blandford, A. (2003). Security and Online Learning: To Protect or Prohibit. Idea Group Inc. UK: IDEA Publishing.
Aljawarneh, S. (2011). A web engineering security methodology for e-learning systems. Network Security, 3: 12-15.
Anderson, J. (2009). The Work-Role Transition of Expert Clinician to Novice Academic Educator. Journal of Nursing Education, 48(4): 203-208.
Arabsorkhi, A. & Yadegari, A. (2011). Identifying and Analysis of Security Challenges and Solutions in e-Learning Environments. Journal of Information Processing and Management, 26(2): 441-464. (in Persian)
Arabsorkhi, A., Yadegari, M. & Kharrat, M. (2009). Some tactics and their requirements for assuring security in e-learning enviroment. International Conference on E-Learning & Teching. Iran University of Science & Technology. (in Persian)
Assefa, S. & Solms, V. (2009). An InformationSecurity Reference Framework for e-Learning Management Systems (ISRFe-LMS). Proceedings of 9th WCCE.
Balasundaram, S. (2011). Securing tests in E-learning environment. In Proceedings of the 2011 International Conference on Communication. Computing & Security (ICCCS '11), pp. 624-627.
Barlow, R. (2007). A study of security in learning management systems. An essay submitted in partial fulfillment of the requirements for the degree of master of science in information systems. Athabasca, Alberta.
Bleimann, U. (2004). Atlantis University: a new pedagogical approach beyond e-learning. Campus-wide Information Systems. 24(5): 191-195.
Cardenas, R. & Sanchez, E. (2005). Security Challenges of Distributed e-Learning Systems. Fifth IEEE Int. Symp. And School on Advanced Distributed Systems (ISSADS) (pp. 538-544). Berlin: Springer.
Chen, J. (2011). The effects of education compatibility and technological expectancy on e-learning acceptance. Computers & Education 57(2): 1501–1511.
Chin, K. & Kon, P. (2003). Key factors for a fully online e-learning mode: A Delphi study. Proceedings of the 20th Annual Conference of the Australasian Society for Computers in Learning in Tertiary Education.
Chuang, U., Chen, C., Wu, T. & Chao, H. (2012). Establish a Secure and Trustworthy ICT Environment for Educational Systems: A Case Study. Journal of Intelligent Manufacturing, 23(4): 965-975.
Defta, L. (2011). Security Issues in E-learning Platforms. World Journal on Educational Technology, 3(3): 153-167.
Dong, Y., Li, M., Chen, M. & Zheng, S. (2002). Research on intellectual property right problems of peer-to-peer networks. The Electronic Library,  20(2): 143-150.
Eibl, C.J.: Risk Analysis towards Secure E-Learning. In: Wheeler, S.; Kassam, A.; Brown, D. (eds.): LYICT 2008. Proc. on CD-ROM, July 2008. 
Eibl, C. (2009). Privacy and Confidentiality in E-Learning Systems. Fourth International Conference on Internet and Web Applications and Services (ICIW 2009). IEEE Computer Society Press. doi:978-0-7695-3613-2
El-Khatib, K., Kobra, L., Xu, Y. & Yee, G. (2003). Privacy and Security in E-Learning. Journal of Distance Education, 1(4): 1-19.
Furnell, S. (1999). Security Considerations in Online Distance Learning. Proceedings of Euromedia, 99: 131-5.
Furnell, S. & Karweni, T. (2001). Security issues in Online Distance Learning. VINE, 31(2): 28-35.
Furnell, S., Onions, P., Knahl, M., Sanders, P., Bleimann, U., Gojny, U. & Roder, H. (1998). A security framework for online distance learning and training. Internet Research, 8(3): 236-242.
Gelbord, B. (2003). On the use of PKI technologies for secure and private e-Iearning environments. 4th International Conference Conference on Computer Systems and Technologies: e-Learning, pp. 568-572.
Hamid, A. (2002). E-learning Is it the “e” or the Learning that matters? The Internet and Higher Education, 4(3-4): 311-316.
Hayaati, N. & Ip-Shing, F. (2010). E-learning and Information Security Management. International Journal of Digital Society, 1(2): 148-156.
Hitchings, J. (1995). Deficiencies of the traditional approach to information security and the requirements for a new methodology. Proceedings of Computers & Security, 14(5): 377-383.
Jalal, A., Zeb, M. & Peshawar, P. (2008). Security enhancement for e-learning portal. International Journal of Computer Science and Network Security, 2(4): 236.
Jethro, O., Grace, A. & Thomas, A. (2012). E-Learning and its effects on teaching and learning in a global age. Indian Journal of Education and Information Management, 1(2): 73-78.
Kambourakis, G., D-P.N, K., Rouskas, A. & Gritzalis, S. (2007). A PKI approach for deploying modern secure distributed e-learning and m-learning environments. Computers & Education, 48(1): 1-16.
Kasse, P. & Balunywa, W. (2013). An assessment of e-learning utilization by a section of Ugandan universities: challenges, success factors and way forward. Conference Papers – International Conference on ICT for Africa.
Khodabandeh, A., Afshari, H. & Manian, A. (2010). Critical factors affecting e-learner’s satisfaction an empirical study. Presented at World Conference on Educational Multimedia, Hypermedia and Telecommunications 2010, Chesapeake, VA.
Lambrinoudakis, C., Gritzalis, S., Dridi, F. & Pernul, G. (2003). Security requirements for e-government services: a methodological approach for developing a common PKI-based security policy. Computer Communications, 26(16): 1873-1883.
Lim, C., & Jin, J. (2006). A study on applying software security to information systems: e-learning portals. International Journal of Computer Science and Network Security, 6 (3B): 162-166.
May, M. & Sébastien, G. (2011). Privacy Concerns in E-learning: Is Using Tracking System a Thread? International Journal of Information and Education Technology, 1(1): 1-8.
Mellado, D., Blanco, C., Sánchez, L. & Fernández-Medina, E. (2010). A systematic review of security requirements engineering. Computer Standards & Interfaces, 32(4): 153-165.
Moore, J., Dickson-Deane, C. & Galyen, K. (2011). e-Learning, online learning, and distance learning environments: Are they the same? The Internet and Higher Education, 14(2): 129–135.
Mutula, S. (2011). Ethics and trust in digital scholarship. The Electronic Library, 29(2): 261-267.
Noorminshah, A. (2012). The impact of e-learning on students performance in tertiary institutions. International Journal of Computer Networks and Wireless Communications, 2(2): 121-130.
Perakovic, D. & Remenar, V. (2010). Security audit and mechanism of protecting e-Learning system at the Faculty of Transport and Traffic Sciences, Fakultet prometnih znanosti, Vukeliceva 4, 10000.
Ramim, M. & Levy, Y. (2006). Securing E-Learning Systems: A Case of Insider Cyber Attacks and Novice IT Management in a Small University. Journal of Cases on Information Technology, 8(4): 24-34.
Roffe, I. (2002). E-learning: engagement, enhancement and execution. Quality Assurance in Education, 10(1): 40-50.
Saleem Basha, M.S. & Dhavachelvan, P. (2010). Web Service Based Secure E-Learning Management System – EweMS. Journal of Convergence Information Technology, 5(7): 57-69.
Smith, A., & Rupp, W. (2004). Managerial implications of computer-based online/face-to-face business education: a case study. Online Information Review, 28(2): 100- 109.
Webber, C., Lima, M., Casa, M., Ribeiro, A. (2007). Towards Secure E-Learning Applications: a Multiagent Platform. Journal of Software, 2(1): 60-69.
Wentling, T., Waight, C., Gallaher, J., La-Fleur, J., Wang, C. & Kanfer, A. (2000). E-learning-A review of literature. University of Illinois.
Wong, D. (2007). A critical literature review on e-learning limitations. Journal for the Advancement of Science and Arts, 2(1): 55-62.Yau, J., Hui, L., Cheung, B. & Yiu, S. (2003). eCX: a secure infrastructure for e-course delivery. Internet Research, 13(2): 116- 125.
Yong, J. (2011). Security and privacy preservation for mobile e-learning via digital identity attributes. Journal of Universal Computer Science, 17(2): 296-310.
Younis, A., Cater-Steel, A. & Soar, J. (2013). IT infrastructure services as a requirement for e-learning system success. Computers & Education, 69(3): 431-451.
Ziemba, E. & Olszak, C. (2012). Building a regional structure of an information society on the basis of e-administration. Issues in Informing Science and Information Technology, 9: 129-150.
Zimmer, L. (2006). Qualitative meta-synthesis: A question of dialoguing with texts. Journal of Advanced Nursing, 53(3): 311-318.
Zisis, D., Lekkas, D. & Spyrou, T. (2007). Security services in e-School and their role in the evaluation of educational processes. International Conference on Institutional Evaluation Techniques in Education, ICIETE07.
Zuev, V. (2012). E-learning Security Models. Management Information Systems, 7(2): 024-028.