{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T10:00:51Z","timestamp":1760608851933},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2015,1,25]],"date-time":"2015-01-25T00:00:00Z","timestamp":1422144000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["World Wide Web"],"published-print":{"date-parts":[[2015,11]]},"DOI":"10.1007\/s11280-014-0320-2","type":"journal-article","created":{"date-parts":[[2015,1,24]],"date-time":"2015-01-24T02:47:02Z","timestamp":1422067622000},"page":"1655-1676","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Security in online web learning assessment"],"prefix":"10.1007","volume":"18","author":[{"given":"Jorge","family":"Miguel","sequence":"first","affiliation":[]},{"given":"Santi","family":"Caball\u00e9","sequence":"additional","affiliation":[]},{"given":"Fatos","family":"Xhafa","sequence":"additional","affiliation":[]},{"given":"Josep","family":"Prieto","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,1,25]]},"reference":[{"key":"320_CR1","unstructured":"Bernthal, P.: A survey of trust in the workplace. Executive summary, HR Benchmark Group, Pittsburg, PA (1997)"},{"key":"320_CR2","unstructured":"CSO Magazine, US Secret Service, Software Engineering Insistute CERT Program at Carnegie Mellon University, Deloitte: 2011 Cybersecurity Watch Survey. Tech. rep., CSO Magazine (2011)"},{"key":"320_CR3","doi-asserted-by":"crossref","unstructured":"Dai, C., Lin, D., Bertino, E., Kantarcioglu, M.: An approach to evaluate data trustworthiness based on data provenance. In: W. Jonker, M. Petkovi\u0107 (eds.) Secure Data Management, vol. 5159, pp. 82\u201398. Springer, Berlin Heidelberg (2008)","DOI":"10.1007\/978-3-540-85259-9_6"},{"key":"320_CR4","doi-asserted-by":"crossref","unstructured":"Dark, M.J.: Information assurance and security ethics in complex systems: interdisciplinary perspectives. Information Science Reference, Hershey, PA (2011)","DOI":"10.4018\/978-1-61692-245-0"},{"key":"320_CR5","unstructured":"Demott, J.D., Sotirov, A., Long, J.: Gray Hat Hacking, Third Edition Reviews. 3edn. McGraw-Hill Companies, New York (2011)"},{"key":"320_CR6","volume-title":"Discussion of information security in e-learning. Ph.D. thesis, Universitat Siegen\u0308","author":"CJ Eibl","year":"2010","unstructured":"Eibl, C.J.: Discussion of information security in e-learning. Ph.D. thesis, Universitat Siegen\u0308. Siegen, Germany (2010). http:\/\/dokumentix.ub.uni-siegen.de\/opus\/volltexte\/2010\/444\/pdf\/eibl.pdf"},{"key":"320_CR7","unstructured":"Ferencz, S.K., Goldsmith, C.W.: Privacy issues in a virtual learning environment. Cause\/Effect, A practitioner\u2019s journal about managing and using information resources on college and university campuses, vol. 21, pp. 5\u201311. Educause (1998). http:\/\/net.educause.edu\/ir\/library\/html\/cem\/cem98\/cem9812.html"},{"key":"320_CR8","unstructured":"Levy, Y., Ramim, M.: A theoretical approach for biometrics authentication of e-exams. In: Chais Conference on Instructional Technologies Research. The Open University of Israel, Raanana, Israel (2006)"},{"key":"320_CR9","doi-asserted-by":"crossref","unstructured":"Liu, Y., Wu, Y.: A survey on trust and trustworthy e-learning system. In: 2010 International Conference on Web Information Systems and Mining, pp. 118\u2013122. IEEE (2010). doi: 10.1109\/WISM.2010.62 http:\/\/ieeexplore.ieee.org\/lpdocs\/epic03\/wrapper.htm?arnumber=5662295","DOI":"10.1109\/WISM.2010.62"},{"key":"320_CR10","doi-asserted-by":"crossref","unstructured":"Miguel, J., Caball\u00e9, S., Prieto, J.: Providing security to computer-supported collaborative learning systems: An overview. In: Fourth IEEE International Conference on Intelligent Networking and Collaborative Systems (INCOS 2012), pp. 97\u2013104. IEEE Computer Society, Bucharest, Romania (2012), doi: 10.1109\/iNCoS.2012.60","DOI":"10.1109\/iNCoS.2012.60"},{"key":"320_CR11","unstructured":"Miguel, J., Caball\u00e9, S., Prieto, J.: Security in learning management systems: Designing collaborative learning activities in secure information systems. eLearning Papers. European Comission: elearningeuropa.info. http:\/\/elearningeuropa.info\/en\/article\/Security-in-Learning-Management-Systems\u2216%3A-Designing-Collaborative-Learning-Activities-in-Secure-Information-Systems?paper=116112 (2012)"},{"key":"320_CR12","doi-asserted-by":"crossref","unstructured":"Miguel, J., Caball\u00e9, S., Prieto, J.: Information security in support for mobile collaborative learning. In: The 7th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS-2013), pp. 379\u2013384. IEEE Computer Society, Taichung, Taiwan. 10.1109\/CISIS.2013.69 (2013)","DOI":"10.1109\/CISIS.2013.69"},{"key":"320_CR13","doi-asserted-by":"crossref","unstructured":"Miguel, J., Caball\u00e9, S., Prieto, J.: Providing information security to MOOC: Towards effective student authentication. In: 5-th International Conference on Intelligent Networking and Collaborative Systems (INCoS-2013), pp. 289\u2013292. IEEE Computer Society, Xian, China. doi: 10.1109\/INCoS.2013.52 (2013)","DOI":"10.1109\/INCoS.2013.52"},{"key":"320_CR14","volume-title":"A massive data processing approach for effective trustworthiness in online learning groups","author":"J Miguel","year":"2014","unstructured":"Miguel, J., Caball\u00e9, S., Xhafa, F., Prieto, J.: A massive data processing approach for effective trustworthiness in online learning groups. Concurrency and Computation, Practice and Experience (2014)"},{"key":"320_CR15","doi-asserted-by":"crossref","unstructured":"Miguel, J., Caball\u00e9, S., Xhafa, F., Prieto, J.: Security in Online assessments: towards an effective trustworthiness approach to support e-learning teams. In: 28th International Conference on Advanced Information Networking and Applications (AINA 2014), pp. 123\u2013130. IEEE Computer Society, Victoria, Canada 2014. doi; 10.1109\/AINA.2014.106 Best paper of AINA (2014)","DOI":"10.1109\/AINA.2014.106"},{"key":"320_CR16","doi-asserted-by":"crossref","unstructured":"Miguel, J., Caball\u00e9, S., Xhafa, F., Prieto, J., Barolli, L.: A collective intelligence approach for building student\u2019s trustworthiness profile in online learning. In: Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC-2014). GUANGZHOU, P.R. China (2014)","DOI":"10.1109\/3PGCIC.2014.132"},{"key":"320_CR17","doi-asserted-by":"crossref","unstructured":"Miguel, J., Caball\u00e9, S., Xhafa, F., Prieto, J., Barolli, L.: A methodological approach to modelling trustworthiness in online collaborative learning. In: Fourth International Workshop on Adaptive Learning via Interactive, Collaborative and Emotional Approaches (ALICE 2014). Salerno, Italy (2014)","DOI":"10.1109\/INCoS.2014.18"},{"key":"320_CR18","doi-asserted-by":"crossref","unstructured":"Miguel, J., Caball\u00e9, S., Xhafa, F., Prieto, J., Barolli, L.: Predicting trustworthiness behavior to enhance security in on-line assessment. In: 6th International Conference on Intelligent Networking and Collaborative Systems (INCoS-2014). Salerno, Italy (2014)","DOI":"10.1109\/INCoS.2014.19"},{"key":"320_CR19","doi-asserted-by":"crossref","unstructured":"Miguel, J., Caball\u00e9, S., Xhafa, F., Prieto, J., Barolli, L.: Towards a normalized trustworthiness approach to enhance security in on-line assessment. In: Eighth International Conference on Complex, Intelligent and Software Intensive Systems (CISIS 2014), pp. 147\u2013154. IEEE Computer Society, Birmingham (2014), doi: 10.1109\/CISIS.2014.22","DOI":"10.1109\/CISIS.2014.22"},{"key":"320_CR20","doi-asserted-by":"crossref","unstructured":"Mobasher, B., Burke, R., Bhaumik, R., Williams, C.: Toward trustworthy recommender systems: An analysis of attack models and algorithm robustness. ACM Trans. Internet Technol. (2007). doi: 10.1145\/1278366.1278372","DOI":"10.1145\/1278366.1278372"},{"key":"320_CR21","doi-asserted-by":"crossref","unstructured":"Ray, I., Chakraborty, S.: A vector model of trust for developing trustworthy systems. In: D. Hutchison, T. Kanade, J. Kittler, J.M. Kleinberg, F. Mattern, J.C. Mitchell, M. Naor, O. Nierstrasz, C. Pandu Rangan, B. Steffen, M. Sudan, D. Terzopoulos, D. Tygar, M.Y. Vardi, G. Weikum, P.Samarati, P. Ryan, D. Gollmann, R. Molva (eds.) Computer Security - ESORICS 2004, vol. 3193, pp. 260\u2013275. Springer Berlin Heidelberg, Berlin, Heidelberg (2004)","DOI":"10.1007\/978-3-540-30108-0_16"},{"key":"320_CR22","doi-asserted-by":"crossref","unstructured":"Schneier, B.: The psychology of security. In: Proceedings of the Cryptology in Africa 1st International Conference on Progress in Cryptology, AFRICACRYPT\u201908, pp 50\u201379. Springer-Verlag, Berlin, Heidelberg (2008)","DOI":"10.1007\/978-3-540-68164-9_5"},{"key":"320_CR23","unstructured":"Weippl, E.R.: Security in e-learning. In: H. Bidgoli (ed.) Handbook of information security Vol. 1, Key concepts, infrastructure, standards and protocols., vol. 1, Wiley, Hoboken (2006)"},{"key":"320_CR24","doi-asserted-by":"crossref","unstructured":"Wu, Z., Ou, Y., Liu, Y.: A taxonomy of network and computer attacks based on responses. In: International Conference on Information Technology, Computer Engineering and Management Sciences (ICM), vol. 1, pp. 26 \u201329 (2011)","DOI":"10.1109\/ICM.2011.363"}],"container-title":["World Wide Web"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11280-014-0320-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11280-014-0320-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11280-014-0320-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,3]],"date-time":"2019-06-03T10:16:55Z","timestamp":1559557015000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11280-014-0320-2"}},"subtitle":["Providing an effective trustworthiness approach to support e-learning teams"],"short-title":[],"issued":{"date-parts":[[2015,1,25]]},"references-count":24,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2015,11]]}},"alternative-id":["320"],"URL":"https:\/\/doi.org\/10.1007\/s11280-014-0320-2","relation":{},"ISSN":["1386-145X","1573-1413"],"issn-type":[{"value":"1386-145X","type":"print"},{"value":"1573-1413","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,1,25]]}}}