The improvement in Information and Communication Technology (ICT) infrastructure has led to an explosion in web usage over the world. Since then eLearning has been taken place for quite a long time far and wide and has reinforced the importance of learning and helped to bring convergence between learning, working, correspondence and entertainment. It widens the access to education through eLearning concept which has redefined the method for dispensing education over the world. However, in the context of world, there have been success stories and in addition some failures to acquire objectives of eLearning.
These days we normally equate educational technology with computers, portable workstations, iPads, iPhones, 3Dprinters, etc. However technology is not that new to education and most likely in 50 years it will look very different from what we now consider as being howdy tech. Just to make a point here, a technological development was introduced to the classroom that would prove to have a significant effect on teaching.
These days, social software is in demand in very different settings. Overseeing relationships (e.g., person to person communication sites) and content sharing (e.g., photograph sharing), additionally collaborative working by means of the Internet became a widely accepted piece of the social lives of people. Especially, collaborative environments provide stages supporting users in creating and exchanging new ideas, material, and leading dialogs, additionally in representing themselves by considering concurring proﬁle management etc.
Supporting the users’ privacy in such interactive environments remains in sharp complexity to the objectives of joint effort. However, previous work has demonstrated that different approaches may overcome this ostensible disagreement. One further approach is subject of this paper and comprises of a differentiated role management. Likewise, this paper describes the specific settings of uses forming Privacy-Enhanced Collaborative Environments (PECE), for which a comprehensive role management must be realized. The paper discusses the suggestions on the role concept resulting from the security related settings and introduces a three-dimensional methodology for roles in a collaborative environment.
The research in E-learning is no longer in its outset, however developing very quickly as per the tremendous technological progress being made. As we progress, we witness a major change of research interests in e-learning towards the improvement of technologies that better bolster user investment and interactivity. One of the noticeable trends is on the integration of user following process in learning environments. Actually, utilizing following systems to observe the learning process has been seen to be a reliable backing to the members, especially in distance learning circumstances. For instance, by following students through learning environment, the mentors can keep themselves informed of the activities being undertaken and the resources being consumed by the students. It is because students’ following information are critical sources of data that reveal both the students’ activities and their yields.
These days, we are confronted with a new circumstance. Existing technologies used in learning environments have increased security and security problems, which leads to a circumstance where security and privacy are becoming essential for the users. The study we present in this paper is not meant to address new research challenges, but rather to help researchers, teachers and students to acquire a better understanding of security and privacy issues in E-learning. Its fundamental objective is to raise an awareness of these issues, which are often neglected in the research efforts that implicate student following and the use of student’s personal information. The real commitment of this study relies on the examination of a number of existing studies, which help one pick up a broader perspective on utilizing following methodology for the instructional purposes.
Recent researches discovered the theories behind the effective learning and teaching. It is essential to identify the affections it conveys to the eLearning too. Hence, purpose of this study is to identify the meaning of effectiveness in eLearning with regard to users ‘perspective and the components affecting the effectiveness of eLearning. It is found in numerous explorative studies that the potentials in MOOCs (Massive Open Online Courses) are increasing due to the actualities it addresses the Social and collaborative-ness in an eLearning stage. As indicated by the review of working paper published in Harvard and MIT, states it is the beginning of an exciting effort to understand how people learn and how to educate well and effectively at scale.
Universities are currently in an environment of intense change, being required to educate more students, from an increasingly variety of foundations, with different ages and different needs. Data technologies and eLearning are viewed as an imperative consider streaming their operations and all universities are investing heavily in systems and services. The implementation of technology covers aspects like IT infrastructure, online management systems, academic management systems which may be completely integrated with the learning management systems and monetary systems, advanced library investment and extensive staff development.
However we ought not to underestimate the difficulties involved in advancement and change for both academics and students. Our students are computerized natives and use technology as an integral piece of their everyday lives. Of most interest is the way that they use technology extensively for Internet searching, mingling and correspondence.
The centrality of the student and her/his learning needs is clear and it is presently assumed by all performers involved in the educational process. So the questions that arise relate to how students interact with learning materials, with the teacher and with peer learners and which is the potential of online technology? What does it offer that can enhance or replace and/or offer alternative or greater effect of face-to-face modes of operation? The answer to these questions may offer a better understanding on how technology can improve the learning experience, make it more rousing and efficient.
Privacy is required for personal self-sufficiency, emotional release, self-evaluation, and limited & protected correspondences. This is especially true in the context of e-learning. The problems for conﬁdentiality of personal information in learning management systems (LMS). A learner ought to be able to act under different halfway identities or namelessly. These parathion of activities encourages learners to be unrestricted and permit them to learn without pressure. E-learning takes place in a collaborative work setting. Privacy in collaborative work settings is vital with the end goal of impression management.
Identity Management Based Solution to Privacy:
Research emphasizes on two aspects of sharing personal information that pertain to security of learners: (a) Data miserliness disclose as meager personal information as could be allowed, and (b) Data dividing parcel information into halfway identities. The European Future of Identity in the Information Society (FIDIS) project, investigating identity management, views security enhancing identity management as a characteristic answer for protection management online. We take the view, like that a user-controlled identity management system that goes for helping users manage their protection is a key answer for security. So established a role-and relationship-base did entity management (RRIM) model. By the evaluation of RRIM in e-learning discourse gathering.
In Role based Access Control, a subject can access resources based on their assigned roles (complying with the privileges granted to the respective role). In RRIM, the fundamental supposition is that roles and relationships provide the contexts for articulating identity in a correspondence episode. Users participate in a learning action for some purpose. In such a learning movement, users assume roles and forge relationships with one another. While a purpose is used as a means to specify a coarse-grained context, a relationship is considered to deﬁne a ﬁne-grained context. We further observe that one purpose cascades in too the more ﬁne grained purposes, joining a dimension of security to the context of identity. The identity acting inside of the context of a more generic purpose is less security sensitive: the more open presentation of the self of a member. On the other hand, the identity acting inside of the context of a more speciﬁc purpose is more private: the more private presentation of the self of a member.
Anca Popovici, Cosmina Mironov. (2014). Students’ perception on using eLearning technologies. The 6th International Conference Edu World 2014 “Education Facing Contemporary World Issues (pp. 1514 – 1519 ). Bucharest, Romania: Procedia – Social and Behavioral Sciences.
Anja Lorenz, KatrinBorcea-Pﬁtzmann. (2010). Role Management in a Privacy-Enhanced Collaborative Environment. Proceedings of the IADIS International Conferencee-Society.
Dilrukshi Gamage, Shantha Fernando, Indika Perera. (2014). Factors affecting to effective eLearning: Learners Perspective. Scientific Research Journal(SCIRJ), Volume II, Issue V.
Elke Franz,Hagen Wahrig, Alexander Boettcher, Katrin Borcea-Pﬁtzmann. (2013). Access Control in a Privacy-Aware eLearning Environment. Dresden: Dresden University of Technology.
James Nicholson, Mark Huber, Dan Jackson, Patrick Olivier. (2014). Panopticon as an eLearning Support Search Tool. UK: NewcastleUniversity.
Jasmine Renner. (2015). Intellectual Property Rights In eLearning. the eLearning Industry.
JohannM.Marquez-Barja, Guillaume Jourjon, Alexander Mikroyannidis, Christos Tranoris. (2014). FORGE:Enhancing eLearning and research in ICT through remote experimentation.
Madeth May, Sébastien George. (n.d.). Privacy Concerns in E-learning: Is Using Tracking System a Threat? INSA-Lyon: University of Lyon.
Mohd Anwar, JimGreer. (2010). Role and Relationship-based Identity Management for Privacy-enhanced E-learning. International Journal of Artiﬁcial Intelligence in Education, IOS Press.
Richard Butler. (2014). Make eLearning Better by Making It Complete.
Wilcox, K. A. (2014). A REPORT ON THE EFFECTIVENESS OF A PROTOTYPE ELEARNING MODULE DESIGNED FOR TECHNICAL WRITERS. Monterey Bay: California State University.