• No se han encontrado resultados

An information security model based on trustworthiness for enhancing security in on line collaborative learning

N/A
N/A
Protected

Academic year: 2020

Share "An information security model based on trustworthiness for enhancing security in on line collaborative learning"

Copied!
122
0
0

Texto completo

Loading

Figure

Figure 1 Evaluation types
Table 1 Trustworthiness factors
Table 2 Trustworthiness Basic Indicators
Figure 2 L R,m,s level for each student and module
+7

Referencias

Documento similar

The research presented in this paper includes a definition of a model of self-directed learning, an assessment method based on rubrics and questionnaires, and a development

This profile allows us to elicit security requirements in order to define an Access Control and Audit (ACA) model for DWs at the business

For this reason (and as we will show through- out this paper), we believe that if these security rules are specified on top of the underlying multidimensional model of the

The methodology developed for security management and its maturity in SMEs will allow any organization to manage, evaluate and measure the security of it information systems, but

Based on the papers, we establish an equilibrium model of the FCC supply chain in which a supplier and a retailer form an entirety based on collaborative replenishment, and act as

In this context, an alternative approach for on-line optimal maintenance management is proposed, based also on plant data rather than only on the decaying performance model..

Finally we observe that several types of analysis can be con- ducted on the models built with this approach: (i) a performance model with a set of security requirements can be

This paper describes the design and use of this crossword puzzle exercise and provides evidence on its usefulness for enhancing students’ intrinsic motivation and learning, as well