Abstract
The privacy of e-learning systems has become a big concern. This paper proposes a new approach, which can effectively protect the privacy of elearning users. We propose to use the alias and anonymity to implement the privacy preservation for e-learning systems. Through the approach, a unique alias represents the real e-learning user to communicate with each other or e-learning users use the anonymity to hide their information. This approach can be very simple and efficient to be implemented in the e-learning system by well designed meta-formats of digital identities of four types of e-learning users. The anonymity can be adopted by all e-learning users to keep their privacy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Zhang, D., Zhao, J.L., Zhou, L., Nunamaker Jr., J.F.: Can E-learning replace classroom learning? The communications of the ACM 47(5), 75–79 (2004)
Bhargav-Spantzel, A., Squicciarini, A.C., Bertino, E.: Establishing and protecting digital identity in federation systems. In: DIM 2005, Fairfax, Virginia, USA, pp. 11–19 (2005)
Bhargav-Spantzel, A., Squicciarini, A.C., Bertino, E.: Privacy Preserving mutli-factor authentication with biometrics. In: DIM 2006, Alexandria, Virginia, USA, pp. 63–71 (2006)
Borcea-Pfitzmann, K., Franz, E., Pfitzmann, A.: Usable presentation of secure pseudonyms. In: DIM 2005, Fairfax, Virginia, USA, pp. 70–76 (2005)
Isshiki, T., Mori, K., Sako, K.: Using group signatures for identity management and its implementation. In: DIM 2006, Alexandria, Virginia, USA, pp. 73–78 (2006)
Candebat, T., Dune, C.R., Gray, D.T.: Pseudonym management using mediated identity-based cryptography. In: DIM 2005, Fairfax, Virginia, USA, pp. 1–10 (2005)
Berghel, H.: Identity theft, social security numbers, and the web. The Communications of the ACM 43(2), 17–21 (2000)
Yong, J.: Internet-Based E-Learning Workflow Process. In: Shen, W.-m., Chao, K.-M., Lin, Z., Barthès, J.-P.A., James, A. (eds.) CSCWD 2005. LNCS, vol. 3865, pp. 516–524. Springer, Heidelberg (2006)
Yong, J., Yan, J., Huang, X.: WFMS-based Data Integration for e-learning. In: Proceedings of the 10th International Conference on Computer Supported Cooperative Design, Nanjing, China, pp. 1361–1367 (2006)
Iahad, N., Dafoulas, G.A., Kalaizakis, E., Macaulay, L.A.: Evaluation of online assessment: The role of feedback in learner-centered e-learning. In: The 37th Hawaii International Conference on System Science. IEEE, Los Alamitos (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yong, J. (2008). Enhancing the Privacy of e-Learning Systems with Alias and Anonymity. In: Shen, W., Yong, J., Yang, Y., Barthès, JP.A., Luo, J. (eds) Computer Supported Cooperative Work in Design IV. CSCWD 2007. Lecture Notes in Computer Science, vol 5236. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-92719-8_48
Download citation
DOI: https://doi.org/10.1007/978-3-540-92719-8_48
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-92718-1
Online ISBN: 978-3-540-92719-8
eBook Packages: Computer ScienceComputer Science (R0)