As e-learning increases in popularity and reach, more people are taking online courses and need to understand the relevant security issues. This book discusses typical threats to e-learning projects, introducing how they have been and should be addressed.
As e-learning increases in popularity and reach, more people are taking online courses and need to understand the relevant security issues. This book discusses typical threats to e-learning projects, introducing how they have been and should be addressed.
This compendium provides a detailed account of the lognormality principle characterizing the human motor behavior by summarizing a sound theoretical framework for modeling such a behavior, introducing the most recent algorithms for extracting the lognormal components of complex movements in 2, 2.5 and 3 dimensions. It also vividly reports the most advanced applications to handwriting analysis and recognition, signature and writer verification, gesture recognition and calligraphy generation, evaluation of motor skills, improvement/degradation with aging, handwriting learning, education and developmental deficits, prescreening of children with ADHD (Attention Development and Hyperactivity Disorder), monitoring of concussion recovery, diagnosis and monitoring of Alzheimer's and Parkinson's diseases and aging effects in speech and handwriting.The volume provides a unique and useful source of references on the lognormality principle, an update on the most recent advances and an outlook at the most promising future developments in e-Security, e-Learning and e-Health.
Scenario-Based e-Learning Scenario-Based e-Learning offers a new instructional design approach that can accelerate expertise, build critical thinking skills, and promote transfer of learning. This book focuses on the what, when, and how of scenario-based e-learning for workforce learning. Throughout the book, Clark defines and demystifies scenario-based e-learning by offering a practical design model illustrated with examples from veterinary science, automotive troubleshooting, sales and loan analysis among other industries. Filled with helpful guidelines and a wealth of illustrative screen shots, this book offers you the information needed to: Identify the benefits of a SBeL design for learners and learning outcomes Determine when SBeL might be appropriate for your needs Identify specific outcomes of SBeL relevant to common organizational goals Classify specific instructional goals into one or more learning domains Apply a design model to present content in a task-centered context Evaluate outcomes from SBeL lessons Identify tacit expert knowledge using cognitive task analysis techniques Make a business case for SBeL in your organization Praise for Scenario-Based e-Learning "Clark has done it again—with her uncanny ability to make complex ideas accessible to practitioners, the guidelines in this book provide an important resource for you to build your own online, problem-centered instructional strategies." —M. David Merrill, professor emeritus at Utah State University; author, First Principles of Instruction "Clark's wonderful book provides a solid explanation of the how, what, and why of scenario-based e-learning. The tools, techniques, and resources in this book provide a roadmap for creating engaging, informative scenarios that lead to tangible, measurable learning outcomes. If you want to design more engaging e-learning, you need to read this book." —Karl M. Kapp, Professor of Instructional Technology, Bloomsburg University; author, The Gamification of Learning and Instruction
Defending Assessment Security in a Digital World explores the phenomenon of e-cheating and identifies ways to bolster assessment to ensure that it is secured against threats posed by technology. Taking a multi-disciplinary approach, the book develops the concept of assessment security through research from cybersecurity, game studies, artificial intelligence and surveillance studies. Throughout, there is a rigorous examination of the ways people cheat in different contexts, and the effectiveness of different approaches at stopping cheating. This evidence informs the development of standards and metrics for assessment security, and ways that assessment design can help address e-cheating. Its new concept of assessment security both complements and challenges traditional notions of academic integrity. By focusing on proactive, principles-based approaches, the book equips educators, technologists and policymakers to address both current e-cheating as well as future threats.
The censorship and surveillance of individuals, societies, and countries have been a long-debated ethical and moral issue. In consequence, it is vital to explore this controversial topic from all angles. Censorship, Surveillance, and Privacy: Concepts, Methodologies, Tools, and Applications is a vital reference source on the social, moral, religious, and political aspects of censorship and surveillance. It also explores the techniques of technologically supported censorship and surveillance. Highlighting a range of topics such as political censorship, propaganda, and information privacy, this multi-volume book is geared towards government officials, leaders, professionals, policymakers, media specialists, academicians, and researchers interested in the various facets of censorship and surveillance.
A follow-up to his best-selling E-Learning, Beyond E-Learning explains the most current thinking on how organizations learn and apply what they know to be successful, and explores the increasingly important role that technology plays, not as an end in itself but as a vital means to get there. The book also provides a clear path for helping to integrate learning—including e-learning—knowledge management, and performance support, and will help training professionals and the organizations they serve go beyond common myths and misconceptions about training and e-learning, focus training/learning activities directly on organizational know-how, and implement a framework that can (at last) be a catalyst for true organizational learning.
Internet and intranet technologies offer tremendous opportunities to bring learning into the mainstream of business. E-Learning outlines how to develop an organization-wide learning strategy based on cutting-edge technologies and explains the dramatic strategic, organizational, and technology issues involved. Written for professionals responsible for leading the revolution in workplace learning, E-Learning takes a broad, strategic perspective on corporate learning. This wake-up call for executives everywhere discusses: • Requirements for building a viable e-learning strategy • How online learning will change the nature of training organizations • Knowledge management and other new forms of e-learning Marc J. Rosenberg, Ph.D. (Hillsborough, NJ) is an independent consultant specializing in knowledge management, e-learning strategy and the reinvention of training. Prior to this, he was a senior direction and kowledge management field leader for consulting firm DiamondCluster International.
Modern society has become dependent on technology, allowing personal information to be input and used across a variety of personal and professional systems. From banking to medical records to e-commerce, sensitive data has never before been at such a high risk of misuse. As such, organizations now have a greater responsibility than ever to ensure that their stakeholder data is secured, leading to the increased need for cybersecurity specialists and the development of more secure software and systems. To avoid issues such as hacking and create a safer online space, cybersecurity education is vital and not only for those seeking to make a career out of cybersecurity, but also for the general public who must become more aware of the information they are sharing and how they are using it. It is crucial people learn about cybersecurity in a comprehensive and accessible way in order to use the skills to better protect all data. The Research Anthology on Advancements in Cybersecurity Education discusses innovative concepts, theories, and developments for not only teaching cybersecurity, but also for driving awareness of efforts that can be achieved to further secure sensitive data. Providing information on a range of topics from cybersecurity education requirements, cyberspace security talents training systems, and insider threats, it is ideal for educators, IT developers, education professionals, education administrators, researchers, security analysts, systems engineers, software security engineers, security professionals, policymakers, and students.
With the increasing use of e-learning, technology has not only revolutionized the way businesses operate but has also impacted learning processes in the education sector. E-learning is slowly replacing traditional methods of teaching and security in e-learning is an important issue in this educational context. With this book, you will be familiarized with the theoretical frameworks, technical methodologies, information security, and empirical research findings in the field to protect your computers and information from threats. Secure Data Management for Online Learning Applications will keep you interested and involved throughout.