A Key Aspect of Security in e-Learning Systems: Correct Identification and Authentication of Users




José Ramón Soler (ETIB)


Despite the many problems that e-Learning systems have had to overcome since its inception, they have not stopped growing, both in quantity of users and performance. Wrapped by growing technological innovations that have adopted a set of increasingly powerful and adequate tools, mainly thanks to the Internet, they are part on merit of the educational environment.

Paradoxically, these same technological innovations have enhanced some of the problems inherent in the delivery of distance teaching, mainly of impersonation or identity theft. Techniques to avoid this problem are varied and range from traditional controls to use biometrics for identification and authentication. Although these methods are regarded as very reliable, however they don’t prevent all problems. In this brief introduction we intend to present the techniques currently used to authenticate the actors in an e-Learning system, trends and the problems they present.



Author's Biography

José Ramón Soler

José Ramón Soler Fuensanta received his Degree in Computer Engineering in the Universidad Autonoma of Madrid, he also holds a Ph.D. in Industrial Engineering, Superior School of Industrial Engineering, The Department of Contro, Electric and Electronic Engineering and CISA (Certified Information Systems Auditor). His career is marked, on the one hand, by the study of cryptography and its history, a subject to which he has devoted several works published in book form and in national and international journals, and on the other hand in his role as consultant and auditor, primarily in the application of new technologies in hospitality. Finally, in the field of education, has been an associate professor at the UNED for several years and now he works at the School of Tourism in Ibiza.

Share this post

Submit to Google PlusSubmit to TwitterSubmit to LinkedIn