IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Management Conflicts in E-Learning Environment: Vulnerabilities in E-Learning Environments

Management Conflicts in E-Learning Environment: Vulnerabilities in E-Learning Environments
View Sample PDF
Author(s): Tomás Sola Martínez (Granada University, Spain), Dalila Alves Durães (Caldas das Taipas Higher School, Portugal), Francisco Javier Hinojo Lucena (Granada University, Spain)and José Javier Romero Díaz de la Guardia (International University of La Rioja (UNIR), Spain)
Copyright: 2016
Pages: 11
Source title: Interdisciplinary Perspectives on Contemporary Conflict Resolution
Source Author(s)/Editor(s): Paulo Novais (University of Minho, Portugal)and Davide Carneiro (University of Minho, Portugal)
DOI: 10.4018/978-1-5225-0245-6.ch017

Purchase

View Management Conflicts in E-Learning Environment: Vulnerabilities in E-Learning Environments on the publisher's website for pricing and purchasing information.

Abstract

The development and technological revolution has contributed to a remarkable increase in the supply of training processes in e-learning educational institutions. The interaction and participation in educational activities under this paradigm involves a series of implications from the point of view of safety and privacy. This chapter presents the main vulnerabilities of e-learning systems and their involvement in the emergence of conflicts for the participants from online training activities and for the educational institutions. The study develops from three types of conflicts: the availability and system integrity, the privacy of the information that is exchanged in virtual environment and the process of authentication of the participants. The authors emphasize the main conflicts that can occur and the actions to take into account in e-learning environments to avoid or mitigate the effect of these vulnerabilities, to ensuring design and topology of systems, application code, and communications that are exchanged in training processes.

Related Content

Sunil Kumar, Nishi Patel, Paturi Jagadeeswar Reddy. © 2024. 18 pages.
Soumya Sankar Ghosh. © 2024. 24 pages.
Hilda Abraham Mwangakala. © 2024. 21 pages.
Alaattin Parlakkılıç. © 2024. 22 pages.
Subir Sinha. © 2024. 22 pages.
Minaxi Parmar. © 2024. 19 pages.
Poonam Arora, Nidhi Arora. © 2024. 17 pages.
Body Bottom