Security and Privacy Management for Learning Management Systems

Security and Privacy Management for Learning Management Systems

Wolfgang Hommel
ISBN13: 9781466600119|ISBN10: 146660011X|EISBN13: 9781466600126
DOI: 10.4018/978-1-4666-0011-9.ch602
Cite Chapter Cite Chapter

MLA

Hommel, Wolfgang. "Security and Privacy Management for Learning Management Systems." Virtual Learning Environments: Concepts, Methodologies, Tools and Applications, edited by Information Resources Management Association, IGI Global, 2012, pp. 1151-1170. https://doi.org/10.4018/978-1-4666-0011-9.ch602

APA

Hommel, W. (2012). Security and Privacy Management for Learning Management Systems. In I. Management Association (Ed.), Virtual Learning Environments: Concepts, Methodologies, Tools and Applications (pp. 1151-1170). IGI Global. https://doi.org/10.4018/978-1-4666-0011-9.ch602

Chicago

Hommel, Wolfgang. "Security and Privacy Management for Learning Management Systems." In Virtual Learning Environments: Concepts, Methodologies, Tools and Applications, edited by Information Resources Management Association, 1151-1170. Hershey, PA: IGI Global, 2012. https://doi.org/10.4018/978-1-4666-0011-9.ch602

Export Reference

Mendeley
Favorite

Abstract

Once a prototype for a Learning Management System (LMS) has successfully been set up and tested, the demand for putting it into production use rises. However, seamlessly integrating an LMS into existing data center infrastructures is a challenging task whose complexity is often underestimated. In this chapter we take a risk-driven approach (“what could go wrong?”) to discuss the real-world operation of a fully-featured LMS from the perspective of security and privacy management. First, the authors analyze their LMS-specific security goals and the related threats to LMS components. They then investigate how an LMS security policy should be established and which technical controls can be used for implementation, enforcement, and auditing by the LMS administrators as well as by the system and network administrators. Finally, the authors discuss the benefits of inter-organizational LMS usage when it is based on identity federation technologies, and the new security and privacy challenges it brings.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.