Cargando…

Intelligent Data Analysis for e-Learning : Enhancing Security and Trustworthiness in Online Learning Systems.

Intelligent Data Analysis for e-Learning: Enhancing Security and Trustworthiness in Online Learning Systems addresses information security within e-Learning based on trustworthiness assessment and prediction. Over the past decade, many learning management systems have appeared in the education marke...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Miguel, Jorge
Formato: Electrónico eBook
Idioma:Inglés
Publicado: San Francisco, UNITED STATES : Academic Press, 2016.
Colección:Intelligent data-centric systems
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ma 4500
001 OR_ocn958454794
003 OCoLC
005 20231017213018.0
006 m o d
007 cr |n|||||||||
008 160916s2016 cau o 000 0 eng d
040 |a IDEBK  |b eng  |e pn  |c IDEBK  |d YDX  |d EBLCP  |d OCLCQ  |d GBVCP  |d LVT  |d OCLCQ  |d UKMGB  |d OCLCO  |d OCLCF  |d ORMDA  |d OCLCO  |d OCLCQ  |d OCLCO 
015 |a GBB6B7896  |2 bnb 
016 7 |a 017986416  |2 Uk 
019 |a 958355690  |a 962413537 
020 |a 0128045450  |q (ebk) 
020 |a 9780128045459 
020 |z 0128045353 
020 |z 9780128045350 
029 1 |a GBVCP  |b 1013802004 
029 1 |a UKMGB  |b 017986416 
029 1 |a AU@  |b 000068473714 
035 |a (OCoLC)958454794  |z (OCoLC)958355690  |z (OCoLC)962413537 
037 |a 953482  |b MIL 
037 |a 9780128045459  |b O'Reilly Media 
050 4 |a LB2846.M548 2017 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Miguel, Jorge. 
245 1 0 |a Intelligent Data Analysis for e-Learning :  |b Enhancing Security and Trustworthiness in Online Learning Systems. 
260 |a San Francisco, UNITED STATES :  |b Academic Press,  |c 2016. 
300 |a 1 online resource (194) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 0 |a Intelligent data-centric systems 
588 0 |a Print version record. 
505 0 |a Front Cover; Intelligent Data Analysis for e-Learning: Enhancing Security and Trustworthiness in Online Learning Systems; Copyright; Dedication; Contents; List of Figures; List of Tables; Foreword; Acknowledgments; Chapter 1: Introduction; 1.1 Objectives; 1.2 Book Organization; 1.3 Book Reading; Chapter 2: Security for e-Learning; 2.1 Background; 2.2 Information Security in e-Learning; 2.2.1 Classifying Security Attacks; 2.2.2 Security Attacks in e-Learning; 2.2.3 Modeling Security Services; 2.2.4 Security in e-Learning: Real e-Learning Scenarios. 
505 8 |a 2.3 Secure Learning Management Systems2.4 Security for e-Learning Paradigms; 2.4.1 Collaborative Learning; 2.4.2 Mobile Learning; 2.4.3 Massive Open Online Courses; 2.5 Discussion; Chapter 3: Trustworthiness for secure collaborative learning; 3.1 Background; 3.1.1 General Trustworthiness Models; 3.1.2 Trustworthiness Factors and Rules; 3.1.3 Trustworthiness in e-Learning; 3.1.4 Normalized Trustworthiness Models; 3.1.5 Time Factor and Trustworthiness Sequences; 3.1.6 Predicting Trustworthiness; 3.1.7 Related Trustworthiness Methodological Approaches. 
505 8 |a 3.2 Knowledge management for trustworthiness e-Learning data3.2.1 Knowledge Management Process; 3.2.2 Data Collection and Processing; 3.2.3 Educational Data Mining and Learning Analytics; 3.2.4 Data Visualization; 3.2.5 Data Analysis and Visualization for P2P Models; 3.3 Trustworthiness-based CSCL; 3.3.1 Security in CSCL Based on Trustworthiness; 3.3.2 Functional Security Approaches for CSCL; 3.3.3 Functional Security for CSCL Based on Trustworthiness; 3.4 Trustworthiness-based security for P2P e-Assessment; 3.4.1 Assessment Classification; 3.4.2 Security in e-Assessment. 
505 8 |a 3.4.3 Secure P2P e-Assessment3.4.4 P2P e-Assessment and Social Networks; 3.4.5 Security Limitations and Discussion; 3.5 An e-Exam Case Study; Chapter 4: Trustworthiness modeling and methodology for secure peer-to-peer e-Assessment; 4.1 Trustworthiness Modeling; 4.1.1 Notation and Terminology; 4.1.2 Modeling Trustworthiness Levels and Indicators; 4.1.3 Student Activity Data Sources; 4.1.4 Data Normalization; 4.1.5 Modeling Normalized Trustworthiness Levels; 4.1.6 Pearson Correlation Analysis; 4.2 Trustworthiness-Based Security Methodology; 4.2.1 Theoretical Analysis. 
505 8 |a 4.2.2 Methodology Key Phases4.2.3 Building Trustworthiness Components; 4.2.4 Trustworthiness Analysis and Data Processing; 4.2.5 Trustworthiness Evaluation and Prediction; 4.3 Knowledge Management for Trustworthiness and Security Methodology; 4.3.1 Data Collection Within Trustworthiness and Security Methodology; 4.3.2 Data Processing Within Trustworthiness and Security Methodology; 4.3.3 Data Analysis Within Trustworthiness and Security Methodology; 4.3.4 Data Visualization and Knowledge Discovery Within Trustworthiness and Security Methodology. 
520 |a Intelligent Data Analysis for e-Learning: Enhancing Security and Trustworthiness in Online Learning Systems addresses information security within e-Learning based on trustworthiness assessment and prediction. Over the past decade, many learning management systems have appeared in the education market. Security in these systems is essential for protecting against unfair and dishonest conduct-most notably cheating-however, e-Learning services are often designed and implemented without considering security requirements. This book provides functional approaches of trustworthiness analysis, modeling, assessment, and prediction for stronger security and support in online learning, highlighting the security deficiencies found in most online collaborative learning systems. The book explores trustworthiness methodologies based on collective intelligence than can overcome these deficiencies. It examines trustworthiness analysis that utilizes the large amounts of data-learning activities generate. In addition, as processing this data is costly, the book offers a parallel processing paradigm that can support learning activities in real-time. The book discusses data visualization methods for managing e-Learning, providing the tools needed to analyze the data collected. Using a case-based approach, the book concludes with models and methodologies for evaluating and validating security in e-Learning systems. Provides guidelines for anomaly detection, security analysis, and trustworthiness of data processingIncorporates state-of-the-art, multidisciplinary research on online collaborative learning, social networks, information security, learning management systems, and trustworthiness predictionProposes a parallel processing approach that decreases the cost of expensive data processing Offers strategies for ensuring against unfair and dishonest. 
520 8 |a AssessmentsDemonstrates solutions using a real-life e-Learning context. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Information technology  |x Management. 
650 0 |a Computer security  |x Management. 
650 0 |a Computer-assisted instruction  |x Security measures. 
650 6 |a Technologie de l'information  |x Gestion. 
650 6 |a Sécurité informatique  |x Gestion. 
650 6 |a Enseignement assisté par ordinateur  |x Sécurité  |x Mesures. 
650 7 |a Computer security  |x Management  |2 fast 
650 7 |a Information technology  |x Management  |2 fast 
776 0 8 |i Print version:  |a Miguel, Jorge.  |t Intelligent Data Analysis for e-Learning.  |d San Francisco, UNITED STATES : Academic Press, 2016  |z 9780128045350  |z 0128045353  |w (OCoLC)950449922 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780128045459/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL4675471 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis35834551 
938 |a YBP Library Services  |b YANK  |n 13159979 
994 |a 92  |b IZTAP