13.07.2015 Views

pre-conference tutorials - Association for the Advancement of ...

pre-conference tutorials - Association for the Advancement of ...

pre-conference tutorials - Association for the Advancement of ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

PRE-CONFERENCE TUTORIALSMonday, June 26, Afternoon, 1:30 PM - 5:00 PMT6: Security and Dependability in E-LearningEdgar R. Weippl, Vienna University <strong>of</strong> Technology, AustriaAbstract: (www.ifs.tuwien.ac.at/~weippl/edmedia_security.pdf) Considering <strong>the</strong>enormous costs <strong>of</strong> creating and maintaining courses, it is surprising that security isnot yet considered an important issue by most people involved, including teachersand students. Unlike traditional security research, which has largely been driven bymilitary requirements to en<strong>for</strong>ce secrecy, in <strong>the</strong> realm <strong>of</strong> e-learning it is not <strong>the</strong>in<strong>for</strong>mation itself that has to be protected against unauthorized access but, <strong>the</strong> wayit is <strong>pre</strong>sented. In most cases <strong>the</strong> knowledge contained in e-learning programs ismore or less widely available; <strong>the</strong>re<strong>for</strong>e, <strong>the</strong> asset is not <strong>the</strong> in<strong>for</strong>mation itself but<strong>the</strong> hypermedia <strong>pre</strong>sentation used to convey it. Dependability includes most securityrequirements but does no longer focus on confidentiality, a requirement that isconsidered not that important by many teachers and students. In this tutorial webuild on <strong>the</strong> findings published in our book "Security in E-Learning" (to be publishedby Springer NY in 2005) and extend <strong>the</strong>m to include aspects <strong>of</strong> dependability.Objectives: After attending <strong>the</strong> tutorial <strong>the</strong> audience will be able to answer followingquestions:• Authors-Why is security relevant when creating content?-Which kind <strong>of</strong> threats are <strong>the</strong>re?-Which assets should I protect?-How can I protect <strong>the</strong> a<strong>for</strong>ementioned assets?-Are <strong>the</strong>re ways to impede illegal use through smart design?-How much additional ef<strong>for</strong>t will be required?• Teachers-Why is security relevant when using e-learning?-Which kind <strong>of</strong> threats are <strong>the</strong>re?-Which assets should I protect?-Does standardization (<strong>of</strong> e.g. exams) undermine <strong>the</strong> freedom <strong>of</strong> academia?-How can I determine <strong>the</strong> level <strong>of</strong> risk exposure <strong>of</strong> my exam questions?-How can I make my lecture „secure“? Will it have a negative impact on my“honest” students?-How much additional ef<strong>for</strong>t will be required?• Managers-Which organization issues are relevant to security?-How is security influenced by* infrastructure* buildings and floor layouts,* organizational workflows(e.g. how are exam results handled to eventually affect grades?)-How can a manager make a good case <strong>for</strong> security so that teachers, authorsand students will support him?-How much additional ef<strong>for</strong>t will be required?Outline: According to <strong>the</strong> wishes <strong>of</strong> <strong>the</strong> audience following topics will be covered;clearly, all topics will focus on specifics <strong>of</strong> Web-based E-Learning• Introduction to Security• Security Risk Analysis• Security Patterns• Common Security Weaknesses• Techniques to protect digital content• Privacy, Feedback and Assessment <strong>of</strong> Students, Authors and TeachersThis tried-and-true tutorial provides attendants with a com<strong>pre</strong>hensive overview <strong>of</strong>security issues relevant to e-learning. Even though security has become paramountin many o<strong>the</strong>r areas <strong>of</strong> Web-based business, research in e-learning is still hardlyconcerned about <strong>the</strong> issues <strong>of</strong> security and privacy.A similar tutorial (Security in E-Learning) has already been <strong>pre</strong>sented at many<strong>conference</strong>s, including EDMEDIA 2003-2005 and E-Learn 2005. Based <strong>the</strong> feedback<strong>of</strong> <strong>the</strong>se <strong>tutorials</strong> and ongoing research work this year's tutorial will <strong>of</strong>fer insightto recent advances in computer security and include aspects <strong>of</strong> dependability.The tutorial web site is available at http://www.e-learning-security.org.Prerequisites:• Authors creating e-learning content.• Teachers using e-learning systems.• Managers responsible <strong>for</strong> <strong>the</strong> selection and maintenance <strong>of</strong> e-learning programs.Intended Experience Level: AdvancedInstructor Qualifications: Dr. Edgar R. Weippl is assistant pr<strong>of</strong>essor at <strong>the</strong>Vienna University <strong>of</strong> Technology and CEO <strong>of</strong> Security Research. His research focuseson applied concepts <strong>of</strong> IT-security and e-learning. Edgar has taught several <strong>tutorials</strong>on security issues in e-learning at international <strong>conference</strong>s, including ED-MEDIA 2003-2005 and E-Learn 2005. In 2005, he published Security in E-Learning with Springer.After graduating with a Ph.D. from <strong>the</strong> Vienna University <strong>of</strong> Technology, Edgarworked <strong>for</strong> two years in a research startup. He <strong>the</strong>n spent one year teaching as anassistant pr<strong>of</strong>essor at Beloit College, WI. From 2002 to 2004, while with <strong>the</strong> s<strong>of</strong>twarevendor ISIS Papyrus, he worked as a consultant <strong>for</strong> an HMO (EmpireBlueCross BlueShield) in New York, NY and Albany, NY, and <strong>for</strong> Deutsche Bank(PWM) in Frankfurt, Germany.An extended CV including all publications is available atwww.ifs.tuwien.ac.at/~weipplTutorials are indicated by a T# and have a lecture/demonstration <strong>for</strong>mat. We advise early registration <strong>for</strong> all Tutorials due to limited space available.10

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!