Mostra el registre d'ítem simple
A data visualization approach for trustworthiness in social networks for on-line learning
dc.contributor.author | Miguel, Jorge |
dc.contributor.author | Caballé Llobet, Santiago |
dc.contributor.author | Xhafa Xhafa, Fatos |
dc.contributor.author | Snasel, Vaclav |
dc.contributor.other | Universitat Politècnica de Catalunya. Departament de Ciències de la Computació |
dc.date.accessioned | 2016-04-25T14:40:32Z |
dc.date.available | 2016-04-25T14:40:32Z |
dc.date.issued | 2015 |
dc.identifier.citation | Miguel, J., Caballé , Santi, Xhafa, F., Snasel, V. A data visualization approach for trustworthiness in social networks for on-line learning. A: IEEE International Conference on Advanced Information Networking and Applications. "IEEE 29th International Conference on Advanced Information Networking and Applications, Gwangju, South Korea, March 25-27, 2015: proceedings". Gwangju: 2015, p. 490-497. |
dc.identifier.isbn | 978-1-4799-7904-2 |
dc.identifier.uri | http://hdl.handle.net/2117/86165 |
dc.description | (c) 2015 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. |
dc.description.abstract | Up to now, the problem of ensuring collaborative activities in e-Learning against dishonest students' behaviour has been mainly tackled with technological security solutions. Over the last years, technological security solutions have evolved from isolated security approaches based on specific properties, such as privacy, to holistic models based on technological security comprehensive solutions, such as public key infrastructures, biometric models and multidisciplinary approaches from different research areas. Current technological security solutions are feasible in many e-Learning scenarios but on-line assessment involves certain requirements that usually bear specific security challenges related to e-Learning design. In this context, even the most advanced and comprehensive technological security solutions cannot cope with the whole scope of e-Learning vulnerabilities. To overcome these deficiencies, our previous research aimed at incorporating information security properties and services into on-line collaborative e-Learning by a functional approach based on trustworthiness assessment and prediction. In this paper, we present a peer-to-peer on-line assessment approach carried out in a real on-line course developed in our real e-Learning context of the Open University of Catalonia. The design presented in this paper is conducted by our trustworthiness security methodology with the aim of building peer-to-peer collaborative activities, which enhances security e-Learning requirements. Eventually, peer-to-peer visualizations methods are proposed to manage security e-Learning events, as well as on-line visualization through peer-to-peer tools, intended to analyse collaborative relationship. |
dc.format.extent | 8 p. |
dc.language.iso | eng |
dc.subject | Àrees temàtiques de la UPC::Ensenyament i aprenentatge::Metodologies docents::Aprenentatge cooperatiu |
dc.subject | Àrees temàtiques de la UPC::Informàtica::Aplicacions de la informàtica |
dc.subject | Àrees temàtiques de la UPC::Informàtica::Seguretat informàtica |
dc.subject.lcsh | Team learning approach in education |
dc.subject.lcsh | Computer-assisted instruction |
dc.subject.lcsh | Computer security |
dc.subject.lcsh | Social networks |
dc.subject.other | information security |
dc.subject.other | computer-supported collaborative learning |
dc.subject.other | on-line assessment |
dc.subject.other | peer-to-peer analysis |
dc.subject.other | trustworthiness |
dc.title | A data visualization approach for trustworthiness in social networks for on-line learning |
dc.type | Conference report |
dc.subject.lemac | Aprenentatge--Treball en equip |
dc.subject.lemac | Ensenyament assistit per ordinador |
dc.subject.lemac | Seguretat informàtica |
dc.subject.lemac | Xarxes socials |
dc.identifier.doi | 10.1109/AINA.2015.226 |
dc.description.peerreviewed | Peer Reviewed |
dc.relation.publisherversion | http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7098011 |
dc.rights.access | Open Access |
local.identifier.drac | 17549954 |
dc.description.version | Postprint (author's final draft) |
local.citation.author | Miguel, J.; Caballé, Santi; Xhafa, F.; Snasel, V. |
local.citation.contributor | IEEE International Conference on Advanced Information Networking and Applications |
local.citation.pubplace | Gwangju |
local.citation.publicationName | IEEE 29th International Conference on Advanced Information Networking and Applications, Gwangju, South Korea, March 25-27, 2015: proceedings |
local.citation.startingPage | 490 |
local.citation.endingPage | 497 |