Cloud Computing Based E-learning System

Cloud Computing Based E-learning System

Cloud Computing Based E-learning SystemDigital Education

Cloud computing is a new model for managing and delivering services over the internet. It consists of a series of hardware and software resources made available on the Internet. Users can access, process, share, and store information through the Internet anytime and anywhere from any digital device. Cloud computing is flexible, highly scalable and creates virtualized resources that users can access all these resources without any specialized knowledge about the concept of cloud computing.

Cloud computing has a significant impact on teaching and learning environment. It is highly practical in education for both students and teachers. The cloud based environment supports the creation of new generation of e-learning systems. “E-learning (web-based learning system) is an Internet-based learning process using internet technology to design, implement, select, manage, support, and extend learning, which will not replace traditional education method, but will greatly improve the efficiency of education.” In fact, using web-based learning system has revolutionized educational organizations and has affected teaching and learning contexts in universities and educational institutions all over the world. In traditional web-based learning model, educational institutions invest a huge amount of money on hardware and software applications, infrastructure, maintenance and the appropriate training of staff to enable them to use technology effectively. However, in cloud based e-learning model, educational institutions without any infrastructure investments can get powerful software with lower or no up-front costs and fewer management headaches in the classroom. The development of e-Learning services within the cloud computing environment enables users to access diverse software applications, share data, collaborate more easily, and keep their data safely in the infrastructure. Moreover, it can lower expenses, reduce energy consumption, and help organizations with limited IT resources to deploy and maintain needed software in a timely manner.

Nowadays, some educational institutions provide private cloud services for their staff and students as well as external people for collaboration purposes. They can access various applications, services, and tools wherever and whenever they want. Students and teachers can conduct formal lessons even without a standard indoor classroom because cloud services allow them to share their information with anyone, anywhere, and at any time. Hence, learner-staff and learner-learner interactions as well as the learning experiences of both learners and staff will be enhanced. Therefore, cloud based-learning can be an efficient and effective system to help students obtain the 21st century skills and prepare them to succeed in the global information society.

Shifting e-learning in the cloud creates new security challenges. Main security concerns are about confidentiality, integrity and availability. Microsoft has provided instructions for IT managers to enhance the security in cloud based e-learning.

They are as follows:

  • Integration: Security and identity management technologies such as active directory, controls for role-based access and entity-level applications can be used to check integration points.
  • Privacy: data encryption, effective data anonymization and mobile location privacy are techniques for enhancing the security of cloud based e-learning.
  • Access: Educational institutions should be aware of a variety of methods to protect education records from improper access.
  • Jurisdiction: “ A cloud provider’s terms of service, privacy policy, and location may significantly affect a user’s privacy and confidentiality interests.” Educational institutions need to check the data whether it is to reside within their legal jurisdiction. Therefore, security concerns about cloud-based E-learning products are critical, and essential security measures should be implemented to protect valuable data.

By Mojgan Afshari

Follow me

Mojgan Afshari

Mojgan Afshari is a senior lecturer in the Department of Educational Management, Planning and Policy at the University of Malaya. She earned a Bachelor of Science in Industrial Applied Chemistry from Tehran, Iran. Then, she completed her Master’s degree in Educational Administration. After living in Malaysia for a few years, she pursued her PhD in Educational Administration with a focus on ICT use in education from the University Putra Malaysia.She currently teaches courses in managing change and creativity and statistics in education at the graduate level. Her research areas include teaching and learning with ICT, school technology leadership, Educational leadership, and creativity. She is a member of several professional associations and editor of the Journal of Education.She has written or co-authored articles in the following journals: Journal of Technology, Pedagogy and Education, The Turkish Online Journal of Educational Technology, International Journal of Education and Information Technologies, International Journal of Instruction, International Journal of Learning, European Journal of Social Sciences, Asia Pacific Journal of Cancer Prevention, Life Science Journal, Australian Journal of Basic and Applied Sciences, Scientific Research and Essays.
Follow me

Latest posts by Mojgan Afshari (see all)

FacebookTwitterLinkedInGoogle+Share

Sorry, comments are closed for this post.

Join Our Newsletter

Receive updates each week on news, tips, events, comics and much more...

Advertising Programs

Click To Find Out!

Sponsored Posts

Sponsored Posts

CloudTweaks has enjoyed a great relationship with many businesses, influencers and readers over the years, and it is one that we are interested in continuing. When we meet up with prospective clients, our intent is to establish a more solid relationship in which our clients invest in a campaign that consists of a number of

Popular

Top Viral Impact

Technology Advice Report: 2014 Business Intelligence Buying Trends

Technology Advice Report: 2014 Business Intelligence Buying Trends

Technology Advice Report: 2014 Business Intelligence Buying Trends For nearly every business, the concept of business intelligence is nothing new. Ambitious organizations have been searching for any type of data-driven advantage for some time now – perhaps for as long as they’ve existed. However, the historical use of competitive intelligence pales in comparison to the

Cloud Computing Adoption Continues

Cloud Computing Adoption Continues

Cloud Computing Adoption Continues Nowadays, many companies are changing their overall information technology strategies to embrace cloud computing in order to open up business opportunities.  There are numerous definitions of cloud computing. Simply speaking, the term “cloud computing” comes from network diagrams in which cloud shapes are  used to describe certain types of networks. All

Can I Contribute To CloudTweaks?

Yes, much of our focus in 2015 will be on working with other influencers in a collaborative manner. If you're a technology influencer looking to collaborate long term with CloudTweaks – a globally recognized leader in cloud computing information – drop us an email with “tech influencer” in the subject line.

Please review the guidelines before applying.

Whitepapers

Top Research Assets

HP OpenStack® Technology Breaking the Enterprise Barrier

HP OpenStack® Technology Breaking the Enterprise Barrier

Explore how cloud computing is a solution to the problems facing data centers today and highlights the cutting-edge technology (including OpenStack cloud computing) that HP is bringing to the current stage. If you are a CTO, data center administrator, systems architect, or an IT professional looking for an enterprise-grade, hybrid delivery cloud computing solution that’s open,

Public Cloud Flexibility, Private Cloud Security

Public Cloud Flexibility, Private Cloud Security

Public Cloud Flexibility, Private Cloud Security Cloud applications are a priority for every business – the technology is flexible, easy-to-use, and offers compelling economic benefits to the enterprise. The challenge is that cloud applications increase the potential for corporate data to leak, raising compliance and security concerns for IT. A primary security concern facing organizations moving