{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T21:53:14Z","timestamp":1765230794428,"version":"3.41.2"},"reference-count":13,"publisher":"Emerald","issue":"3","license":[{"start":{"date-parts":[[1998,8,1]],"date-time":"1998-08-01T00:00:00Z","timestamp":901929600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998,8,1]]},"abstract":"<jats:p>Considers the requirement for information security within the\ndomain of online distance learning. A generic module\nstructure is presented which represents a high level abstraction\nof the different stages of the educational process.\nDiscusses the main security issues that must be considered at\neach stage. These various requirements are being addressed\nin practice by the security framework being developed by the\nSDLearn research project, a collaborative initiative between\nhigher academic establishments in the UK and Germany.<\/jats:p>","DOI":"10.1108\/10662249810217821","type":"journal-article","created":{"date-parts":[[2002,7,27]],"date-time":"2002-07-27T02:08:10Z","timestamp":1027735690000},"page":"236-242","source":"Crossref","is-referenced-by-count":17,"title":["A security framework for online distance learning and training"],"prefix":"10.1108","volume":"8","author":[{"given":"S.M.","family":"Furnell","sequence":"first","affiliation":[]},{"given":"P.D.","family":"Onions","sequence":"additional","affiliation":[]},{"given":"M.","family":"Knahl","sequence":"additional","affiliation":[]},{"given":"P.W.","family":"Sanders","sequence":"additional","affiliation":[]},{"given":"U.","family":"Bleimann","sequence":"additional","affiliation":[]},{"given":"U.","family":"Gojny","sequence":"additional","affiliation":[]},{"given":"H.F.","family":"R\u00f6der","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022012420114201900_b1","unstructured":"Bray, P. (1997, \u201cLoving to learn the Internet\u201d, The Sunday Times, \u201cWired World\u201d Supplement, 27 April, p. 11."},{"key":"key2022012420114201900_b2","doi-asserted-by":"crossref","unstructured":"Chaum, D. (1992, \u201cAchieving electronic privacy\u201d, Scientific American, August, pp. 96\u2010101.","DOI":"10.1038\/scientificamerican0892-96"},{"key":"key2022012420114201900_b3","unstructured":"DEMOS (1997, Distance Education and Tutoring in Heterogeneous Telematics Environments, EU Telematics applications for users and providers project, http:\/\/www.redestb.es\/personal\/softbase\/demosfra.tm."},{"key":"key2022012420114201900_b4","doi-asserted-by":"crossref","unstructured":"Furnell, S.M., Morrissey, J.P., Sanders, P.W. and Stockel, C.T. (1996, \u201cApplications of keystroke analysis for improved login security and continuous user authentication\u201d, in Proceedings of IFIP SEC \u201996 \u2010 12th International Conference on Information Security, Samos, Greece, 21\u201024 May, pp. 283\u201094.","DOI":"10.1007\/978-1-5041-2919-0_25"},{"key":"key2022012420114201900_b5","unstructured":"Halfhill, T.R. (1997, \u201cCheaper computing: part 1\u201d, Byte, Vol. 22 No. 4, pp. 66\u201080."},{"key":"key2022012420114201900_b6","unstructured":"ISO (1987, Information Processing Systems \u2010 Open Systems Interconnection Reference Model \u2010 Part 2: Security Architecture. International Organisation for Standardization, ISO 7498\u20102."},{"key":"key2022012420114201900_b7","doi-asserted-by":"crossref","unstructured":"Jobusch, D.L. and Oldehoeft, A.E. (1989, \u201cA survey of password mechanisms : part 1\u201d, Computers & Security, Vol. 8 No. 7, pp. 587\u2010604.","DOI":"10.1016\/0167-4048(89)90051-5"},{"key":"key2022012420114201900_b8","doi-asserted-by":"crossref","unstructured":"Lunt, T.F. (1993, \u201cA survey of intrusion detection techniques\u201d, Computers & Security, Vol. 12 No. 4, pp. 405\u201018.","DOI":"10.1016\/0167-4048(93)90029-5"},{"key":"key2022012420114201900_b9","unstructured":"MasterCard (1997, \u201cSET secure electronic transaction specification \u2010 book 1: business description\u201d, Version 1.0, MasterCard\/VISA, 31 May, http:\/\/www.mastercard.com\/set\/"},{"key":"key2022012420114201900_b10","unstructured":"Nuttall, N. (1997, \u201cUniversity meets online challenge\u201d, The Times, \u201cInterface\u201d supplement, 19 February, p. 11."},{"key":"key2022012420114201900_b11","unstructured":"Paulsen, M.F. (1995, \u201cThe online report on pedagogical techniques for computer\u2010mediated communication\u201d, ISBN 82\u2010562\u20103690\u20106, NKI,Oslo, Norway. http:\/\/www.nki.o\/\u223cmorten\/"},{"key":"key2022012420114201900_b12","doi-asserted-by":"crossref","unstructured":"Thomas, P. (1997, \u201cTeaching over the Internet: the future\u201d, Computing & Control Engineering Journal, Vol. 8 No. 3, pp. 136\u201042.","DOI":"10.1049\/cce:19970306"},{"key":"key2022012420114201900_b13","unstructured":"Zoreda, J.L. and Oton, J.M. (1994, Smart Cards, Artech House."}],"container-title":["Internet Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/10662249810217821","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/10662249810217821\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/10662249810217821\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:40:55Z","timestamp":1753400455000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/intr\/article\/8\/3\/236-242\/177419"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998,8,1]]},"references-count":13,"journal-issue":{"issue":"3","published-print":{"date-parts":[[1998,8,1]]}},"alternative-id":["10.1108\/10662249810217821"],"URL":"https:\/\/doi.org\/10.1108\/10662249810217821","relation":{},"ISSN":["1066-2243"],"issn-type":[{"type":"print","value":"1066-2243"}],"subject":[],"published":{"date-parts":[[1998,8,1]]}}}