{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T10:00:14Z","timestamp":1777888814238,"version":"3.51.4"},"reference-count":37,"publisher":"SAGE Publications","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["SCS"],"published-print":{"date-parts":[[2022,2,14]]},"abstract":"<jats:p>The contemporary smart educational environment uses different information technologies like social networks, virtual laboratories, augmented reality, artificial intelligence, big data, and so on. Each of these technologies has its security and privacy threats profile, but their integration in one system can lead to completely new challenges. The article analyses the technological development of smart educational environments from the point of view of their security and privacy issues. Any technological or legislative security control could be broken as the result of one mistake caused by human factors. People with different levels of competence are interacting every day with each other in educational environments. The risks of personal data leaking or hacking of educational services should be minimized during this interaction. Therefore, not only the key technologies that form the architecture of the educational environment but also the main points of interaction between the users and the education environment should be taken into account in the analysis. The article provides a basic analysis of security and privacy risks for smart education environments. As the result, the analysis identifies key information security technologies development of which is necessary for the sustainable development of a smart educational environment as part of a smart city.<\/jats:p>","DOI":"10.3233\/scs-210114","type":"journal-article","created":{"date-parts":[[2022,2,8]],"date-time":"2022-02-08T19:24:51Z","timestamp":1644348291000},"page":"17-29","source":"Crossref","is-referenced-by-count":28,"title":["The analysis of security and privacy risks in smart education environments"],"prefix":"10.1177","volume":"1","author":[{"given":"Anton","family":"Kamenskih","sequence":"first","affiliation":[{"name":"Department of Automation and Remote Control, Perm National Research Polytechnic University, Main Academic Building, Komsomolsky Prospect 29, Room 329, Perm 614990, Russia. E-mail:\u00a0antoshkinoinfo@yandex.ru"}]}],"member":"179","reference":[{"key":"10.3233\/SCS-210114_ref1","doi-asserted-by":"publisher","DOI":"10.1109\/FTDCS.2008.22"},{"issue":"2","key":"10.3233\/SCS-210114_ref2","doi-asserted-by":"publisher","first-page":"53","DOI":"10.11120\/ital.2009.08020053","article-title":"Ambient intelligence: Opportunities and consequences of its use in smart classrooms","volume":"8","author":"Augusto","year":"2009","journal-title":"Innovation in Teaching and Learning in Information and Computer Sciences"},{"key":"10.3233\/SCS-210114_ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1128817.1128824"},{"key":"10.3233\/SCS-210114_ref5","doi-asserted-by":"crossref","unstructured":"B.\u00a0Biggio et al., Evasion attacks against machine learning at test time, in: Joint European Conference on Machine Learning and Knowledge Discovery in Databases, Springer, Berlin, Heidelberg, 2013, pp.\u00a0387\u2013402.","DOI":"10.1007\/978-3-642-40994-3_25"},{"issue":"2","key":"10.3233\/SCS-210114_ref7","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1080\/08841241.2018.1466756","article-title":"Co-creation in higher education: Towards a conceptual model","volume":"28","author":"Dollinger","year":"2018","journal-title":"Journal of Marketing for Higher Education"},{"issue":"7866","key":"10.3233\/SCS-210114_ref8","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1038\/s41586-021-03582-4","article-title":"Quantum phases of matter on a 256-atom programmable quantum simulator","volume":"595","author":"Ebadi","year":"2021","journal-title":"Nature"},{"key":"10.3233\/SCS-210114_ref10","doi-asserted-by":"crossref","unstructured":"K.\u00a0Eykholt et al., Robust physical-world attacks on deep learning visual classification, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2018, pp.\u00a01625\u20131634.","DOI":"10.1109\/CVPR.2018.00175"},{"issue":"3","key":"10.3233\/SCS-210114_ref11","first-page":"265","article-title":"Lifelong learning\u00a0\u2013 more than training","volume":"11","author":"Fischer","year":"2000","journal-title":"Journal of Interactive Learning Research"},{"key":"10.3233\/SCS-210114_ref13","doi-asserted-by":"crossref","unstructured":"D.\u00a0Gabay, K.\u00a0Akkaya and M.\u00a0Cebe, Privacy-preserving authentication scheme for connected electric vehicles using blockchain and zero knowledge proofs, in: IEEE Transactions on Vehicular Technology, Vol.\u00a069, 2020, pp.\u00a05760\u20135772.","DOI":"10.1109\/TVT.2020.2977361"},{"key":"10.3233\/SCS-210114_ref14","doi-asserted-by":"publisher","DOI":"10.22331\/q-2021-04-15-433"},{"key":"10.3233\/SCS-210114_ref15","doi-asserted-by":"publisher","DOI":"10.4324\/9781351186193-7"},{"issue":"1","key":"10.3233\/SCS-210114_ref16","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1137\/0218012","article-title":"The knowledge complexity of interactive proof systems","volume":"18","author":"Goldwasser","year":"1989","journal-title":"SIAM Journal on Computing"},{"key":"10.3233\/SCS-210114_ref17","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.127.140503"},{"key":"10.3233\/SCS-210114_ref19","unstructured":"K.\u00a0Grosse et al., Adversarial perturbations against deep neural networks for malware classification, in: European Symposium on Research in Computer Security, 2017."},{"key":"10.3233\/SCS-210114_ref20","doi-asserted-by":"crossref","unstructured":"J.\u00a0Groth et al., Updatable and universal common reference strings with applications to zk-SNARKs, in: Annual International Cryptology Conference, Springer, Cham, 2018, pp.\u00a0698\u2013728.","DOI":"10.1007\/978-3-319-96878-0_24"},{"key":"10.3233\/SCS-210114_ref21","doi-asserted-by":"crossref","unstructured":"G.J.\u00a0Hwang et al., Vision, challenges, roles and research issues of artificial intelligence, in: Education, in Computers and Education: Artificial Intelligence, Vol.\u00a01, 2020, pp.\u00a01\u20135.","DOI":"10.1016\/j.caeai.2020.100001"},{"key":"10.3233\/SCS-210114_ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00057"},{"issue":"5","key":"10.3233\/SCS-210114_ref23","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1136\/injuryprev-2016-042162","article-title":"School shootings during 2013\u20132015 in the USA","volume":"23","author":"Kalesan","year":"2017","journal-title":"Injury prevention"},{"key":"10.3233\/SCS-210114_ref24","unstructured":"M.\u00a0Khalil, M.\u00a0Ebner and W.\u00a0Admiraal, How can gamification improve MOOC student engagement, in: Proceedings of the 11th European Conference on Games Based Learning: ECGBL, 2017, pp.\u00a0819\u2013828."},{"key":"10.3233\/SCS-210114_ref25","doi-asserted-by":"crossref","unstructured":"H.\u00a0Kikuchi et al., Privacy-preserving similarity evaluation and application to remote biometrics authentication, in: Soft Computing, Vol.\u00a014, 2010, pp.\u00a0529\u2013536.","DOI":"10.1007\/s00500-009-0449-6"},{"key":"10.3233\/SCS-210114_ref27","doi-asserted-by":"crossref","unstructured":"R.\u00a0Kop, The challenges to connectivist learning on open online networks: Learning experiences during a massive open online course, in: International Review of Research in Open and Distributed Learning, Vol.\u00a012, 2001, pp.\u00a019\u201338.","DOI":"10.19173\/irrodl.v12i3.882"},{"key":"10.3233\/SCS-210114_ref29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5334\/jime.502","article-title":"The pursuit of patterns in educational data mining as a threat to student privacy","volume":"1","author":"Kyritsi","year":"2019","journal-title":"Journal of Interactive Media in Education"},{"key":"10.3233\/SCS-210114_ref30","unstructured":"C.S.\u00a0Li and B.\u00a0Irby, An overview of online education: Attractiveness, benefits, challenges, concerns and recommendations, College Student Journal 42(2) (2008)."},{"key":"10.3233\/SCS-210114_ref31","doi-asserted-by":"crossref","unstructured":"J.\u00a0Looyestyn et al., Does gamification increase engagement with online programs? A systematic review, PloS one 12(3) (2017), e0173403.","DOI":"10.1371\/journal.pone.0173403"},{"key":"10.3233\/SCS-210114_ref32","first-page":"53","volume-title":"Context-Based Access Control and Trust Scores in Zero Trust Campus Networks","author":"Lukaseder","year":"2020"},{"key":"10.3233\/SCS-210114_ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2021.105532"},{"key":"10.3233\/SCS-210114_ref35","first-page":"43","article-title":"An immersive experience in the virtual 3D VirBELA environment for leadership development in undergraduate students during the COVID-19 quarantine","volume":"6","author":"Mora-Beltr\u00e1n","year":"2020","journal-title":"Learning"},{"key":"10.3233\/SCS-210114_ref36","unstructured":"R.T.\u00a0Osguthorpe and C.R.\u00a0Graham, Blended learning environments: Definitions and directions, Quarterly review of distance education 4(3) (2021). Retrieved October 11, 2021 from https:\/\/www.learntechlib.org\/p\/97576\/."},{"key":"10.3233\/SCS-210114_ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053009"},{"key":"10.3233\/SCS-210114_ref38","doi-asserted-by":"crossref","unstructured":"R.\u00a0Reyes et al., Methodology for the implementation of virtual assistants for education using Google dialogflow, in: Mexican International Conference on Artificial Intelligence, Springer, Cham, 2019, pp.\u00a0440\u2013451.","DOI":"10.1007\/978-3-030-33749-0_35"},{"issue":"1","key":"10.3233\/SCS-210114_ref39","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1038\/s41598-021-84139-3","article-title":"An approach for security evaluation and certification of a complete quantum communication system","volume":"11","author":"Sajeed","year":"2021","journal-title":"Scientific Reports"},{"issue":"6","key":"10.3233\/SCS-210114_ref41","doi-asserted-by":"publisher","first-page":"397","DOI":"10.3152\/147154300781781733","article-title":"Beyond Humboldt? The relationship between teaching and research in European university systems","volume":"27","author":"Schimank","year":"2000","journal-title":"Science and Public Policy"},{"key":"10.3233\/SCS-210114_ref43","doi-asserted-by":"crossref","unstructured":"A.M.\u00a0Toda, P.H.\u00a0Valle and S.\u00a0Isotani, The dark side of gamification: An overview of negative effects of gamification in education, in: Researcher Links Workshop: Higher Education for All, Springer, Cham, 2017, pp.\u00a0143\u2013156.","DOI":"10.1007\/978-3-319-97934-2_9"},{"key":"10.3233\/SCS-210114_ref44","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1016\/j.compedu.2018.08.018","article-title":"Need-supporting gamification in education: An assessment of motivational effects over time","volume":"127","author":"Van Roy","year":"2018","journal-title":"Computers & Education"},{"issue":"4","key":"10.3233\/SCS-210114_ref45","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1002\/pfi.21777","article-title":"The case for mixed reality to improve performance","volume":"57","author":"Volkow","year":"2018","journal-title":"Performance Improvement"},{"issue":"4","key":"10.3233\/SCS-210114_ref46","doi-asserted-by":"publisher","first-page":"835","DOI":"10.3758\/BF03192976","article-title":"The HIVE: A huge immersive virtual environment for research in spatial cognition","volume":"39","author":"Waller","year":"2007","journal-title":"Behavior Research Methods"},{"key":"10.3233\/SCS-210114_ref48","unstructured":"Z.\u00a0Zhang et al., A virtual laboratory system with biometric authentication and remote proctoring based on facial recognition, in: Computers in Education Journal, Vol.\u00a07, 2016, pp.\u00a074\u201384."}],"container-title":["Journal of Smart Cities and Society"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/SCS-210114","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T04:58:36Z","timestamp":1777611516000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/SCS-210114"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,14]]},"references-count":37,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.3233\/scs-210114","relation":{},"ISSN":["2772-3585","2772-3577"],"issn-type":[{"value":"2772-3585","type":"electronic"},{"value":"2772-3577","type":"print"}],"subject":[],"published":{"date-parts":[[2022,2,14]]}}}