IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Learning Management Systems: Understand and Secure Your Educational Technology

Learning Management Systems: Understand and Secure Your Educational Technology
View Sample PDF
Author(s): Sharon L. Burton (American Meridian University, USA), Rondalynne McClintock (Claremont Graduate University, USA), Darrell N. Burrell (Florida Institute of Technology, USA), Kim L. Brown-Jackson (National Graduate School of Quality Management, USA), Dustin Bessette (National Graduate School of Quality Management, USA)and Shanel Lu (National Graduate School of Quality Management, USA)
Copyright: 2015
Pages: 18
Source title: New Threats and Countermeasures in Digital Crime and Cyber Terrorism
Source Author(s)/Editor(s): Maurice Dawson (Illinois Institute of Technology, USA)and Marwan Omar (Nawroz University, Iraq)
DOI: 10.4018/978-1-4666-8345-7.ch014

Purchase

View Learning Management Systems: Understand and Secure Your Educational Technology on the publisher's website for pricing and purchasing information.

Abstract

Learning management systems (LMSs) are significant in offering highly collaborative, widely accessible, and manageable learning solutions. It is feasible that learning solutions stakeholders pursue an in-depth understanding of the LMS and the vulnerabilities surrounding technology-enabled learning and teaching. The over 300 types of active LMSs, proprietary or open source, are not off limits to hackers. Past research shows that hackers compromise technology systems to ascertain personal identifiable information and interfere with the integrities of post-secondary institutions. Stakeholders must understand how to safeguard the LMS. To address LMS cybercrime concerns, this text reviews vulnerability information on over 12 LMS features. After reading this text, stakeholders will gain increased insight into their works to thwart security related LMS incidents. This text can support stakeholders' knowledge in actions to take prior to the LMS reaching unacceptable vulnerability levels. Researchers and practitioners will benefit from this text's perspective on the LMS and mitigating risk.

Related Content

Hossam Nabil Elshenraki. © 2024. 23 pages.
Ibtesam Mohammed Alawadhi. © 2024. 9 pages.
Akashdeep Bhardwaj. © 2024. 33 pages.
John Blake. © 2024. 12 pages.
Wasswa Shafik. © 2024. 36 pages.
Amar Yasser El-Bably. © 2024. 12 pages.
Sameer Saharan, Shailja Singh, Ajay Kumar Bhandari, Bhuvnesh Yadav. © 2024. 23 pages.
Body Bottom