Cloud Computing Based E-learning System

Cloud Computing Based E-learning System

Cloud Computing Based E-learning SystemDigital Education

Cloud computing is a new model for managing and delivering services over the internet. It consists of a series of hardware and software resources made available on the Internet. Users can access, process, share, and store information through the Internet anytime and anywhere from any digital device. Cloud computing is flexible, highly scalable and creates virtualized resources that users can access all these resources without any specialized knowledge about the concept of cloud computing.

Cloud computing has a significant impact on teaching and learning environment. It is highly practical in education for both students and teachers. The cloud based environment supports the creation of new generation of e-learning systems. “E-learning (web-based learning system) is an Internet-based learning process using internet technology to design, implement, select, manage, support, and extend learning, which will not replace traditional education method, but will greatly improve the efficiency of education.” In fact, using web-based learning system has revolutionized educational organizations and has affected teaching and learning contexts in universities and educational institutions all over the world. In traditional web-based learning model, educational institutions invest a huge amount of money on hardware and software applications, infrastructure, maintenance and the appropriate training of staff to enable them to use technology effectively. However, in cloud based e-learning model, educational institutions without any infrastructure investments can get powerful software with lower or no up-front costs and fewer management headaches in the classroom. The development of e-Learning services within the cloud computing environment enables users to access diverse software applications, share data, collaborate more easily, and keep their data safely in the infrastructure. Moreover, it can lower expenses, reduce energy consumption, and help organizations with limited IT resources to deploy and maintain needed software in a timely manner.

Nowadays, some educational institutions provide private cloud services for their staff and students as well as external people for collaboration purposes. They can access various applications, services, and tools wherever and whenever they want. Students and teachers can conduct formal lessons even without a standard indoor classroom because cloud services allow them to share their information with anyone, anywhere, and at any time. Hence, learner-staff and learner-learner interactions as well as the learning experiences of both learners and staff will be enhanced. Therefore, cloud based-learning can be an efficient and effective system to help students obtain the 21st century skills and prepare them to succeed in the global information society.

Shifting e-learning in the cloud creates new security challenges. Main security concerns are about confidentiality, integrity and availability. Microsoft has provided instructions for IT managers to enhance the security in cloud based e-learning.

They are as follows:

  • Integration: Security and identity management technologies such as active directory, controls for role-based access and entity-level applications can be used to check integration points.
  • Privacy: data encryption, effective data anonymization and mobile location privacy are techniques for enhancing the security of cloud based e-learning.
  • Access: Educational institutions should be aware of a variety of methods to protect education records from improper access.
  • Jurisdiction: “ A cloud provider’s terms of service, privacy policy, and location may significantly affect a user’s privacy and confidentiality interests.” Educational institutions need to check the data whether it is to reside within their legal jurisdiction. Therefore, security concerns about cloud-based E-learning products are critical, and essential security measures should be implemented to protect valuable data.

By Mojgan Afshari

Follow me

Mojgan Afshari

Mojgan Afshari is a senior lecturer in the Department of Educational Management, Planning and Policy at the University of Malaya. She earned a Bachelor of Science in Industrial Applied Chemistry from Tehran, Iran. Then, she completed her Master’s degree in Educational Administration. After living in Malaysia for a few years, she pursued her PhD in Educational Administration with a focus on ICT use in education from the University Putra Malaysia.She currently teaches courses in managing change and creativity and statistics in education at the graduate level. Her research areas include teaching and learning with ICT, school technology leadership, Educational leadership, and creativity. She is a member of several professional associations and editor of the Journal of Education.She has written or co-authored articles in the following journals: Journal of Technology, Pedagogy and Education, The Turkish Online Journal of Educational Technology, International Journal of Education and Information Technologies, International Journal of Instruction, International Journal of Learning, European Journal of Social Sciences, Asia Pacific Journal of Cancer Prevention, Life Science Journal, Australian Journal of Basic and Applied Sciences, Scientific Research and Essays.
Follow me

Latest posts by Mojgan Afshari (see all)

Sorry, comments are closed for this post.

Join Our Newsletter

Receive updates each week on news, tips, events, comics and much more...

Can I Contribute To CloudTweaks?

Yes, much of our focus in 2015 will be on working with other influencers in a collaborative manner. If you're a technology influencer looking to collaborate long term with CloudTweaks – a globally recognized leader in cloud computing information – drop us an email with “tech influencer” in the subject line.

Please review the guidelines before applying.

Contributors

Cloud Infographic – Wearable Tech And Preventative Healthcare

Cloud Infographic – Wearable Tech And Preventative Healthcare

Wearable Tech And Preventative Healthcare There are so many exciting new opportunities available to utilize wearable technology in the future.  Areas such as nanotechnology disease monitoring, crowdfunding to wearable accessories are some excellent examples of the potential. Estimates vary, but appear to suggest that the market will produce between $14-50 Billion over the next few years. Included below

Ten Tips For Successful Business Intelligence Implementation

Ten Tips For Successful Business Intelligence Implementation

Ten Tips for Successful Business Intelligence Implementation The cost of Business Intelligence (BI) software goes far beyond the purchase price. Time spent researching, implementing, and maintaining your BI investment can snowball quickly and mistakes are often expensive. Your time is valuable – save it by learning from other businesses’ experiences. We’ve compiled the top ten

Knots And Cloud Service Providers

Knots And Cloud Service Providers

How Do These Two Compare? In Boy Scouts, I learned how to tie knots. The quickest knot you can tie is the slipknot. It’s very effective for connecting one thing to another via the rope you have. It was used in setting up tents, mooring boats to docks temporarily and lifting your food up into

Aggregated News

Popular News Sources

Big Data Is Entering the Age of Aquarius

Big Data Is Entering the Age of Aquarius

Suddenly, I realized: fluids are in, animals are out. The big data ecosystem has given up on its elephants, impalas and pigs in favor of aquatics.  Perhaps, the shift started with “data lakes,” or, perhaps, data lakes just reflected the state of big data (pun intended). Or maybe, Cascading was the one that signified the

Hewlett-Packard Company On-Demand Webinar

Hewlett-Packard Company On-Demand Webinar

Shifting Workloads and the Server Evolution Learn more about the latest industry trends and the challenges customers are talking about. Every ten to fifteen years, the types of workloads servers host swiftly shift. This happened with the first single-mission mainframes and today, as disruptive technologies appear in the form of big data, cloud, mobility and

Microsoft, The Government And Privacy

Microsoft, The Government And Privacy

Microsoft, The Government And Privacy But European companies can’t afford to get complacent if they have any tied to the US Apple, Cisco, Verizon and AT&T are considering joining Microsoft’s battle against the US government to safeguard customers’ privacy – but European corps should also take note.… Read the source article at The Register About