|
|
|
|
LEADER |
00000cam a2200000Ma 4500 |
001 |
OR_ocn958454794 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr |n||||||||| |
008 |
160916s2016 cau o 000 0 eng d |
040 |
|
|
|a IDEBK
|b eng
|e pn
|c IDEBK
|d YDX
|d EBLCP
|d OCLCQ
|d GBVCP
|d LVT
|d OCLCQ
|d UKMGB
|d OCLCO
|d OCLCF
|d ORMDA
|d OCLCO
|d OCLCQ
|d OCLCO
|
015 |
|
|
|a GBB6B7896
|2 bnb
|
016 |
7 |
|
|a 017986416
|2 Uk
|
019 |
|
|
|a 958355690
|a 962413537
|
020 |
|
|
|a 0128045450
|q (ebk)
|
020 |
|
|
|a 9780128045459
|
020 |
|
|
|z 0128045353
|
020 |
|
|
|z 9780128045350
|
029 |
1 |
|
|a GBVCP
|b 1013802004
|
029 |
1 |
|
|a UKMGB
|b 017986416
|
029 |
1 |
|
|a AU@
|b 000068473714
|
035 |
|
|
|a (OCoLC)958454794
|z (OCoLC)958355690
|z (OCoLC)962413537
|
037 |
|
|
|a 953482
|b MIL
|
037 |
|
|
|a 9780128045459
|b O'Reilly Media
|
050 |
|
4 |
|a LB2846.M548 2017
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Miguel, Jorge.
|
245 |
1 |
0 |
|a Intelligent Data Analysis for e-Learning :
|b Enhancing Security and Trustworthiness in Online Learning Systems.
|
260 |
|
|
|a San Francisco, UNITED STATES :
|b Academic Press,
|c 2016.
|
300 |
|
|
|a 1 online resource (194)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
0 |
|
|a Intelligent data-centric systems
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Front Cover; Intelligent Data Analysis for e-Learning: Enhancing Security and Trustworthiness in Online Learning Systems; Copyright; Dedication; Contents; List of Figures; List of Tables; Foreword; Acknowledgments; Chapter 1: Introduction; 1.1 Objectives; 1.2 Book Organization; 1.3 Book Reading; Chapter 2: Security for e-Learning; 2.1 Background; 2.2 Information Security in e-Learning; 2.2.1 Classifying Security Attacks; 2.2.2 Security Attacks in e-Learning; 2.2.3 Modeling Security Services; 2.2.4 Security in e-Learning: Real e-Learning Scenarios.
|
505 |
8 |
|
|a 2.3 Secure Learning Management Systems2.4 Security for e-Learning Paradigms; 2.4.1 Collaborative Learning; 2.4.2 Mobile Learning; 2.4.3 Massive Open Online Courses; 2.5 Discussion; Chapter 3: Trustworthiness for secure collaborative learning; 3.1 Background; 3.1.1 General Trustworthiness Models; 3.1.2 Trustworthiness Factors and Rules; 3.1.3 Trustworthiness in e-Learning; 3.1.4 Normalized Trustworthiness Models; 3.1.5 Time Factor and Trustworthiness Sequences; 3.1.6 Predicting Trustworthiness; 3.1.7 Related Trustworthiness Methodological Approaches.
|
505 |
8 |
|
|a 3.2 Knowledge management for trustworthiness e-Learning data3.2.1 Knowledge Management Process; 3.2.2 Data Collection and Processing; 3.2.3 Educational Data Mining and Learning Analytics; 3.2.4 Data Visualization; 3.2.5 Data Analysis and Visualization for P2P Models; 3.3 Trustworthiness-based CSCL; 3.3.1 Security in CSCL Based on Trustworthiness; 3.3.2 Functional Security Approaches for CSCL; 3.3.3 Functional Security for CSCL Based on Trustworthiness; 3.4 Trustworthiness-based security for P2P e-Assessment; 3.4.1 Assessment Classification; 3.4.2 Security in e-Assessment.
|
505 |
8 |
|
|a 3.4.3 Secure P2P e-Assessment3.4.4 P2P e-Assessment and Social Networks; 3.4.5 Security Limitations and Discussion; 3.5 An e-Exam Case Study; Chapter 4: Trustworthiness modeling and methodology for secure peer-to-peer e-Assessment; 4.1 Trustworthiness Modeling; 4.1.1 Notation and Terminology; 4.1.2 Modeling Trustworthiness Levels and Indicators; 4.1.3 Student Activity Data Sources; 4.1.4 Data Normalization; 4.1.5 Modeling Normalized Trustworthiness Levels; 4.1.6 Pearson Correlation Analysis; 4.2 Trustworthiness-Based Security Methodology; 4.2.1 Theoretical Analysis.
|
505 |
8 |
|
|a 4.2.2 Methodology Key Phases4.2.3 Building Trustworthiness Components; 4.2.4 Trustworthiness Analysis and Data Processing; 4.2.5 Trustworthiness Evaluation and Prediction; 4.3 Knowledge Management for Trustworthiness and Security Methodology; 4.3.1 Data Collection Within Trustworthiness and Security Methodology; 4.3.2 Data Processing Within Trustworthiness and Security Methodology; 4.3.3 Data Analysis Within Trustworthiness and Security Methodology; 4.3.4 Data Visualization and Knowledge Discovery Within Trustworthiness and Security Methodology.
|
520 |
|
|
|a Intelligent Data Analysis for e-Learning: Enhancing Security and Trustworthiness in Online Learning Systems addresses information security within e-Learning based on trustworthiness assessment and prediction. Over the past decade, many learning management systems have appeared in the education market. Security in these systems is essential for protecting against unfair and dishonest conduct-most notably cheating-however, e-Learning services are often designed and implemented without considering security requirements. This book provides functional approaches of trustworthiness analysis, modeling, assessment, and prediction for stronger security and support in online learning, highlighting the security deficiencies found in most online collaborative learning systems. The book explores trustworthiness methodologies based on collective intelligence than can overcome these deficiencies. It examines trustworthiness analysis that utilizes the large amounts of data-learning activities generate. In addition, as processing this data is costly, the book offers a parallel processing paradigm that can support learning activities in real-time. The book discusses data visualization methods for managing e-Learning, providing the tools needed to analyze the data collected. Using a case-based approach, the book concludes with models and methodologies for evaluating and validating security in e-Learning systems. Provides guidelines for anomaly detection, security analysis, and trustworthiness of data processingIncorporates state-of-the-art, multidisciplinary research on online collaborative learning, social networks, information security, learning management systems, and trustworthiness predictionProposes a parallel processing approach that decreases the cost of expensive data processing Offers strategies for ensuring against unfair and dishonest.
|
520 |
8 |
|
|a AssessmentsDemonstrates solutions using a real-life e-Learning context.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Information technology
|x Management.
|
650 |
|
0 |
|a Computer security
|x Management.
|
650 |
|
0 |
|a Computer-assisted instruction
|x Security measures.
|
650 |
|
6 |
|a Technologie de l'information
|x Gestion.
|
650 |
|
6 |
|a Sécurité informatique
|x Gestion.
|
650 |
|
6 |
|a Enseignement assisté par ordinateur
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Computer security
|x Management
|2 fast
|
650 |
|
7 |
|a Information technology
|x Management
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Miguel, Jorge.
|t Intelligent Data Analysis for e-Learning.
|d San Francisco, UNITED STATES : Academic Press, 2016
|z 9780128045350
|z 0128045353
|w (OCoLC)950449922
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780128045459/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL4675471
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis35834551
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 13159979
|
994 |
|
|
|a 92
|b IZTAP
|