{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T06:45:36Z","timestamp":1742971536831,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642221903"},{"type":"electronic","value":"9783642221910"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22191-0_30","type":"book-chapter","created":{"date-parts":[[2011,6,27]],"date-time":"2011-06-27T20:22:53Z","timestamp":1309206173000},"page":"335-345","source":"Crossref","is-referenced-by-count":9,"title":["Computer Security Threats Towards the E-Learning System Assets"],"prefix":"10.1007","author":[{"given":"Zainal Fikri","family":"Zamzuri","sequence":"first","affiliation":[]},{"given":"Mazani","family":"Manaf","sequence":"additional","affiliation":[]},{"given":"Adnan","family":"Ahmad","sequence":"additional","affiliation":[]},{"given":"Yuzaimi","family":"Yunus","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"30_CR1","first-page":"241","volume":"4","author":"W. Tastle","year":"2005","unstructured":"Tastle, W., White, B., Shackleton, P.: E-Learning in Higher Education: The Challenge, Effort, and Return on Investment. International Journal on E-Learning\u00a04, 241\u2013251 (2005)","journal-title":"International Journal on E-Learning"},{"key":"30_CR2","volume-title":"Network Security and Management","author":"B. Singh","year":"2007","unstructured":"Singh, B.: Network Security and Management, vol.\u00a01. Prentice-Hall of India Pvt. Ltd., New Delhi (2007)"},{"key":"30_CR3","doi-asserted-by":"crossref","unstructured":"Gehling, B., Stankard, D.: Ecommerce Security. In: Information Security Curriculum Development (Infoseccd) Conference Kennesaw, GA,USA, pp. 32\u201337 (2005)","DOI":"10.1145\/1107622.1107631"},{"key":"30_CR4","doi-asserted-by":"publisher","DOI":"10.1201\/9781420031195","volume-title":"Information Security Risk Analysis","author":"T. Peltier","year":"2005","unstructured":"Peltier, T.: Information Security Risk Analysis. CRC Press, Boca Raton (2005)"},{"key":"30_CR5","unstructured":"Myagmar, S., Lee, A.J., Yurcik, W.: Threat Modeling as a Basis for Security Requirements. In: Proceedings of the Symposium on Requirements Engineering for Information Security (SREIS 2005), Paris (2005)"},{"key":"30_CR6","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1108\/17415650580000048","volume":"2","author":"E. Weippl","year":"2005","unstructured":"Weippl, E., Tjoa, A.: Privacy in E-Learning: Anonymity, Pseudonyms and Authenticated Usage. International Journal of Interactive Technology and Smart Education (ITSE)\u00a02, 247\u2013256 (2005)","journal-title":"International Journal of Interactive Technology and Smart Education (ITSE)"},{"key":"30_CR7","volume-title":"Expanding the Knowledge Economy: Issues, Applications, Case Studies","author":"T. Klobu Ar","year":"2007","unstructured":"Klobu Ar, T., Jenabi, M., Kaibel, A., Karapidis, A.: Security and Privacy Issues in Technology-Enhanced Learning. In: Cunningham, P., Cunningham, M. (eds.) Expanding the Knowledge Economy: Issues, Applications, Case Studies. IOS Press, Amsterdam (2007)"},{"key":"30_CR8","doi-asserted-by":"crossref","unstructured":"Sun, L., Wang, H., Li, Y.: Protecting Disseminative Information in E-Learning. In: Advances in Web Based Learning, ICWL 2007, pp. 554\u2013565 (2008)","DOI":"10.1007\/978-3-540-78139-4_49"},{"key":"30_CR9","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1016\/S0097-8493(02)00062-6","volume":"26","author":"F. Graf","year":"2002","unstructured":"Graf, F.: Providing Security for elearning. Computers and Graphics (Pergamon)\u00a026, 355\u2013365 (2002)","journal-title":"Computers and Graphics (Pergamon)"},{"key":"30_CR10","doi-asserted-by":"crossref","unstructured":"Asha, S., Chellappan, C.: Authentication of E-Learners Using Multimodal Biometric Technology. In: International Symposium on Biometrics and Technology, Islamabad (2008)","DOI":"10.1109\/ISBAST.2008.4547640"},{"key":"30_CR11","doi-asserted-by":"crossref","unstructured":"Agulla, E., Castro, L., Mateo, J.: Is My Student at the Other Side? Applying Biometric Web Authentication to E-Learning Environments. In: Proceedings of Eighth IEEE International Conference on Advanced Learning Technologies (ICALT 2008), pp. 551\u2013553, (2008)","DOI":"10.1109\/ICALT.2008.184"},{"key":"30_CR12","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/s10043-003-0255-9","volume":"10","author":"R. Inaba","year":"2003","unstructured":"Inaba, R., Watanabe, E., Kodate, K.: Security Applications of Optical Face Recognition System: Access Control in E-Learning. Optical Review\u00a010, 255\u2013261 (2003)","journal-title":"Optical Review"},{"key":"30_CR13","unstructured":"Marais, E., Argles, D., Von Solms, B.: Security Issues Specific to E-Assessments. The International Journal for Infonomics Special issue: \u2018e-Learning Security\u2019 (2006)"},{"key":"30_CR14","unstructured":"Levy, Y., Ramim, M.: A Theoretical Approach for Biometrics Authentication of E-Exams. In: The 2007 Chais Conference on Instructional Technologies Research (2007)"},{"key":"30_CR15","doi-asserted-by":"crossref","unstructured":"Apampa, K., Wills, G., Argles, D., Marais, E.: Electronic Integrity Issues in E-Assessment Security. In: Eighth IEEE International Conference on Advanced Learning Technologies, pp. 394\u2013395 (2008)","DOI":"10.1109\/ICALT.2008.242"},{"key":"30_CR16","unstructured":"Weippl, E.: On the Use of Test Centers in E-Assessment, E-Learning Reports. Vienna University of Technology (2006)"},{"key":"30_CR17","doi-asserted-by":"crossref","unstructured":"Hern\u00e1ndez, J., Ortiz, A., Andaverde, J., Burlak, G.: Biometrics in Online Assessments: A Study Case in High School Students. In: Proceedings of the 18th International Conference on Electronics, Communications and Computers (Conielecomp 2008), pp. 111\u2013116 (2008)","DOI":"10.1109\/CONIELECOMP.2008.36"},{"key":"30_CR18","unstructured":"Nickolova, M., Nickolov, E.: Threat Model for User Security in E-Learning Systems. International Journal Of Information Technologies and Knowledge, 341\u2013347 (2007)"},{"key":"30_CR19","doi-asserted-by":"crossref","unstructured":"Yong, J.: Security Modelling for E-Learning. In: Proceedings of the 2007 1st International Symposium on Information Technologies & Applications in Education (ISITAE 2007), Kunming, pp. 1\u20135 (2007)","DOI":"10.1109\/ISITAE.2007.4409226"},{"key":"30_CR20","unstructured":"Ostyn, C.: In the Eye of the SCORM: An Introduction to SCORM 2004 for Content Developers (2007) (retrieved)"},{"key":"30_CR21","volume-title":"Security in E-Learning (Advances in Information Security)","author":"E. Weippl","year":"2005","unstructured":"Weippl, E.: Security in E-Learning (Advances in Information Security). Springer, New York (2005)"},{"key":"30_CR22","unstructured":"Olzak, T.: A Practical Approach to Threat Modeling, http:\/\/adventuresinsecurity.com\/blog\/wp-content\/uploads\/2006\/03\/A_Practical_Approach_to_Threat_Modeling.pdf"},{"key":"30_CR23","unstructured":"The UM-Miller School of Medicine\u2019s Department of Information Technology, http:\/\/it.med.miami.edu\/x1297.xml"},{"key":"30_CR24","unstructured":"M.U. Information Services and Technology, http:\/\/ist.mit.edu\/security\/data_classification"},{"key":"30_CR25","doi-asserted-by":"publisher","first-page":"53","DOI":"10.5120\/282-444","volume":"1","author":"V. Prasath","year":"2010","unstructured":"Prasath, V.: Modeling the Evaluation Criteria for Security Patterns in Web Service Discovery. International Journal of Computer Applications IJCA\u00a01, 53\u201360 (2010)","journal-title":"International Journal of Computer Applications IJCA"},{"key":"30_CR26","unstructured":"Desmet, L., Jacobs, B., Piessens, F., Joosen, W.: Threat Modeling for Web Services Based Web Applications. DistriNet Research Group, Katholieke Universiteit Leuven (2005)"}],"container-title":["Communications in Computer and Information Science","Software Engineering and Computer Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22191-0_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,12]],"date-time":"2019-06-12T08:16:31Z","timestamp":1560327391000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22191-0_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642221903","9783642221910"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22191-0_30","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}