Trustworthiness and technological security solutions are closely related to online collaborative learning and they can be combined with the aim of reaching information security requirements for e-Learning participants and designers. Moreover, mobile collaborative learning is an emerging educational model devoted to providing the learner with the ability to assimilate learning any time and anywhere. In this paper, we justify the need of trustworthiness models as a functional requirement devoted to improving information security. To this end, we propose a methodological approach to modelling trustworthiness in online collaborative learning. Our proposal sets out to build a theoretical approach with the aim to provide e-Learning designers and ...
This article may be used for non-commercial purposes in accordance with Wiley Terms and Conditions f...
(c) 2014 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for...
This paper proposes a trustworthiness-based approach for the design of secure learning activities in...
Trustworthiness and technological security solutions are closely related to online collaborative lea...
Trustworthiness and technological security solutions are closely related to online collaborative lea...
Trustworthiness and technological security solutions are closely related to online collaborative lea...
(c) 2014 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for...
(c) 2014 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for...
Peer-reviewedThis paper proposes a trustworthiness model for the design of secure learning assessmen...
Peer-reviewedThis paper proposes a trustworthiness model for the design of secure learning assessmen...
This is a copy of the author 's final draft version of an article published in the journal World wid...
(c) 2014 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for...
(c) 2014 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for...
(c) 2015 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for...
This article may be used for non-commercial purposes in accordance with Wiley Terms and Conditions f...
This article may be used for non-commercial purposes in accordance with Wiley Terms and Conditions f...
(c) 2014 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for...
This paper proposes a trustworthiness-based approach for the design of secure learning activities in...
Trustworthiness and technological security solutions are closely related to online collaborative lea...
Trustworthiness and technological security solutions are closely related to online collaborative lea...
Trustworthiness and technological security solutions are closely related to online collaborative lea...
(c) 2014 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for...
(c) 2014 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for...
Peer-reviewedThis paper proposes a trustworthiness model for the design of secure learning assessmen...
Peer-reviewedThis paper proposes a trustworthiness model for the design of secure learning assessmen...
This is a copy of the author 's final draft version of an article published in the journal World wid...
(c) 2014 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for...
(c) 2014 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for...
(c) 2015 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for...
This article may be used for non-commercial purposes in accordance with Wiley Terms and Conditions f...
This article may be used for non-commercial purposes in accordance with Wiley Terms and Conditions f...
(c) 2014 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for...
This paper proposes a trustworthiness-based approach for the design of secure learning activities in...