Information Security and Learning Content Management System (LCMS)

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

User’s Interaction with Information through eFront Learning Management System

Background and Aim: In order to comprehension of interactive content and content production standards, and also users interaction with LMSs, and their behavior in dealing with information, the aim of this paper is to examine the users interaction information provided in the eFront application, an open source Learning Management System, by emphasizing SCORM standard. Method: The method that used...

متن کامل

Curriculum Management Information System

Curriculum Management Information System

متن کامل

Semantic Learning Content Management System

Building semantics concepts into the learning tools and utilities will open the road for the next generation of the Learning Content Management System (LCMS). We propose here to name this new learning environment the Semantic LCMS. This paper presents some reflections about how the semantic kernel of an SLCMS could be viewed. This semantic kernel is in close relation with a set of primitive rul...

متن کامل

Learning Content Management and Authoring System

Developing web based learning courses usually requires a lot of programming efforts to provide session management. Our system is designed to enable authors to develop easily learning courses. In this paper, we describe the adaptable, the interactive, and the communicative features of the environment. Authors are supported in many ways to develop and manage courses via an online interface. We pr...

متن کامل

Information Security Management: A System Dynamics Approach

Managing security for information assets presents a challenging task. The need for effective information security management assumes greater importance with growing reliance on distributed systems and Internet-accessible systems. Many factors play a role in determining the vulnerability of information assets to security threats. Using a system dynamics approach, this study evaluates information...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Advanced Computer Science and Applications

سال: 2017

ISSN: 2156-5570,2158-107X

DOI: 10.14569/ijacsa.2017.081174