Being on the safe side :: intellectual property rights and transparency in e-learning

2016-01-01
Transparency, a term usually associated with not hiding anything, is also used in computing for things or actions which take place without any visible effect. Since e-learning relies mainly on computing, the term transparency within this context can arouse a conflict; it can both be a threat and a credibility issue. It can be a threat if invisible digital actions aim to harm or misuse the e-learning system, and it can be a credibility issue when all parties involved are able to see and follow what is happening and how. This chapter approaches the term transparency as in its basic definition implying clearness and visibility within the framework of intellectual property issues regarding student works. Although e-learning institutions may reveal their codes of conduct encompassing these issues, prospective and current students may need more information on how their rights in terms of submitted original works or any work product would be protected. This chapter proposes various virtual platform arrangements to assist transparency on handling intellectual property issues for students.

Suggestions

Anomaly detection from personal usage patterns in web applications
Vural, Gürkan; Yöndem (Turhan), Meltem; Department of Computer Engineering (2006)
The anomaly detection task is to recognize the presence of an unusual (and potentially hazardous) state within the behaviors or activities of a computer user, system, or network with respect to some model of normal behavior which may be either hard-coded or learned from observation. An anomaly detection agent faces many learning problems including learning from streams of temporal data, learning from instances of a single class, and adaptation to a dynamically changing concept. The domain is complicated by ...
A faster intrusion detection method for high-speed computer networks
Tarım, Mehmet Cem; Schmidt, Şenan Ece; Department of Electrical and Electronics Engineering (2011)
The malicious intrusions to computer systems result in the loss of money, time and hidden information which require deployment of intrusion detection systems. Existing intrusion detection methods analyze packet payload to search for certain strings and to match them with a rule database which takes a long time in large size packets. Because of buffer limits, packets may be dropped or the system may stop working due to high CPU load. In this thesis, we investigate signature based intrusion detection with sig...
Specification and verification of confidentiality in software architectures
Ulu, Cemil; Oğuztüzün, Mehmet Halit S.; Department of Computer Engineering (2004)
This dissertation addresses the confidentiality aspect of the information security problem from the viewpoint of the software architecture. It presents a new approach to secure system design in which the desired security properties, in particular, confidentiality, of the system are proven to hold at the architectural level. The architecture description language Wright is extended so that confidentiality authorizations can be specified. An architectural description in Wright/c, the extended language, assigns...
UNWANTED BEHAVIOUR DETECTION AND CLASSIFICATION IN NETWORK TRAFFIC
Onem, Ismail Melih (2010-10-28)
An Intrusion Detection System classifies activities at an unwanted intention and can log or prevent activities that are marked as intrusions. Intrusions occur when malicious activity and unwanted behaviour gain access to or affect the usability of a computer resource. During the last years, anomaly discovery has attracted the attention of many researchers to overcome the disadvantage of signature-based IDSs in discovering novel attacks, and KDDCUP'99 is the mostly widely used data set for the evaluation of ...
UTILIZATION OF SPATIAL INFORMATION FOR POINT CLOUD SEGMENTATION
Akman, Oytun; Bayramoglu, Neslihan; Alatan, Abdullah Aydın; Jonker, Pieter (2010-06-09)
Object segmentation has an important role in the field of computer vision for semantic information inference. Many applications such as 3DTV archive systems, 3D/2D model fitting, object recognition and shape retrieval are strongly dependent to the performance of the segmentation process. In this paper we present a new algorithm for object localization and segmentation based on the spatial information obtained via a Time-of-Flight (TOF) camera. 3D points obtained via a TOF camera are projected onto the major...
Citation Formats
M. B. Gündoğan, Being on the safe side :: intellectual property rights and transparency in e-learning. 2016, p. 94.