The mLearning Security Rule Base System with Social

advertisement
The mLearning Security Rule Base System
with Social Network on eCampus: A Case
Study of North-Chiang Mai University
Sarawut Ramjan
Department of e-Commerce Management, Faculty of Science and Technology,
North-Chiang Mai University, Thailand
sarawutr@northcm.ac.th
Abstract - Private University in Thailand
intends to overcome the education divide
problem by expanding the sub campus to
other area. The mLearning is useable to
content exchange between subs with main
campus
under
social
network
environment.
Unfortunately,
this
technology and social network features
can be bombarded from wireless threat
and problem on vulnerability point;
student, lecturer and network technician.
Therefore, those universities aware to
finding a security solution that is suitable
with each characteristic themselves. Thus,
this paper desire to demonstrated the
security rule base system that can be used
for searching the security control which
appropriate with each operational style of
each university who establish sub campus
which rely on social network over
mLearning infrastructure for link
eClassroom system with main campus.
Moreover, this document exemplifies a
case study of North-Chiang Mai
University for the content reviewing and
supporting the m-Learning security rule
base system with social network model.
Keywords - mLearning and eCampus,
Rule Base, Security, Social network
I. INTRODUCTION
At present, Thai government agency
created new education act regarding to the
university
outside
main
location
establishment [1]. Therefore, private
university in Thailand can grab this
opportunity for overcome the digital divide
problem. They expand sub campus in to area
where underdeveloped concerning to higher
education. In order to construct the education
quality in sub campus equal to main campus,
this intend to employ mLearning on social
network which trendy and cheapness for
drive eClassroom at sub campus to join with
main campus [3] [4]. This activity can
improve the quality level at sub campus as
same as main campus. mLearning on social
network necessary to be provided from
wireless network infrastructure in 3G
environment.
For
concentrated,
this
infrastructure involving with concerning
party; student, lecturer and network
technician at University, internet service
provider and wireless communication
provider that aid working between each other
for operated the social network on mLearning system as show in figure below:
Fig.1 mLearning environment at NCU with Nong
Khai international campus
From figure above, this paper can
discover that they have vulnerability points
which can be attracted from mobility threat
and problem. Accordingly, Thai universities
realize for this problem that they prepare
security solution for a protecting in each
weak point of mLearning infrastructure on
social network channel. For high security,
they must invest on various security controls
for a preventing in each vulnerability point.
Therefore, this document intend to analysis
the m-Learning security rule base system
with social network on eCampus that can be
The Eighth International Conference on eLearning for Knowledge-Based Society, 23-24 February 2012, Thailand
1
Sarawut Ramjan
useable to filter the security control which
appropriated with each characteristic of
university and social network. In additional,
this model can be employed for university
considering about mLearning security
investment
under
social
network
environment.
For specification, this paper focuses on
real case study that is North-Chiang Mai
University: NCU where constructed the sub
campus that call Nong Khai International
campus. In order to foundation the element
of education at Nong Khai campus that
strong equal to NCU main campus, NCU
intend to rely mLearning system and several
types of social network mobile application
such as facebook, twitter or google+ that
new release to social network industry [5]
[6]. Unfortunate, NCU also faces with threat
and problem on mLearning and social
network channels both. Thus, they try to
striving from cyber grave by the relying on
technological solution and policy that
according to operational style of NCU which
collaborative with Nong Khai campus.
Hence, this is best real case for bring up to
example for constructing the security rule
base system that help university for analysis
security control which suitable on mobile
social network class room between sub and
main campus.
II. THE M-LEARNING SECURITY
RULE BASE SYSTEM ON SOCIAL
NETWORK
In order to save cost of m-Learning on
social network investment, this section will
be created the rule base system that can be
useable to finding a technological solution
that appropriated with each operational style
of each university. This model employ NIST
800-30 standard that is useable to guide the
university for the evaluated the risk degree of
mLearning system themselves [2]. This risk
analysis model can apply to rule base system
that filters the vulnerability point from
mLearning system and social network
feature characterization. Rule base model
analyzed the security solution that
organization provide for protect on
mLearning
system.
This
standard
recommend concerning to the threat
identification in order to considering the
attack motivation.
From movement above, this model can
analysis the likelihood determination and
impact analysis that compromised analysis to
risk degree which is recommended or
reported connecting with technological
solution and policy that appropriated with
each characteristic of each university who
employ social network feature on mLearning
system for join sub and main campus for one
virtual class room and eCampus. For
efficiency demonstrated the security rule
base model, this paper will guide by NCU
process that set up full mLearning system on
social network feature. Therefore, this figure
is illustrated for a display and focus below:
Special Issue of the International Journal of the Computer, the Internet and Management, Vol. 19 No. SP2, February, 2012
2
The mLearning Security Rule Base System with Social Network on eCampus: A Case Study of North-Chiang Mai University
Fig.2 NCU mLearning security rule base system on social network
From illustrated above, this paper
employ NIST standard which is appropriate
with small application similar to social
network system that operated on mobile
device. This guideline is decency to run the
risk level of NCU mLearning security. In
order to concentrated, this section will be
narrated concerning to the rule base model as
step following:
First step, mLearning security rule base
system gathers information from sub and
main campus that integrated for created
virtual class room on mobility device. This
step uses various techniques for the data
The Eighth International Conference on eLearning for Knowledge-Based Society, 23-24 February 2012, Thailand
3
Sarawut Ramjan
colleting which are questionnaire, interview,
experiment and observation that cover on
sub and main campus of NCU in point of
system related information and operational
information of social network mLearning.
Second step, there are three activities
including with security providing, the
attacker’s motivation from first step and
system characterization from first step. In
security providing, rule base system will
consider about the level acceptance from
concerning party on the providing of
mLearning security which run on social
network channel. Then, if concerning party
can accept the security solution providing,
this model will transfer the solution to
assessment for vulnerability point analysis
and keep in database. In contrast, if
concerning party reject this checking, rule
base system will create mLearning security
requirement that necessary with m-Learning
system on social network for input to
vulnerability point database.
In this real case study, vulnerability
points including with lecturer, student and
network technician of NCU including with
concerning party that are ISP, wireless
communication provider and social network
provider. The weak points are concerning
parties that are stake holder who operated the
data exchange between sub and main campus
via mobile social network. In second
component, concerning party is collected
about attack motivation that bombard in each
characteristic of NCU mLearning system on
social network. Therefore, concerning party
must inform the characteristic of mLearning
system that rely on social network in order to
identify attack motivation which will be
transformed to threat identification database.
From second step that is run three
activity on parallel operation, the forth step
make rule base system for solution analysis
which pull solution data from security
solution store and vulnerability point that
rely on security solution. Then this section
will sent the analysis result into likelihood
determination process that survey the
solution with vulnerability point and threat in
order to analysis likelihood determination to
likelihood level which is transfer to impact
analysis step. Yet, the impact analysis not
require only the likelihood level, it is also
require the system characteristic for analysis
the impact level.
Next step, impact level will be used for
identify the risk level that deploy the security
recommendation which appropriate with
NCU mLearning on social network channel.
Moreover, this process will transform the
recommendation into the security solution
and policy report that display to IT manager
at NCU. In additional, this detail can keep in
solution store in order to employ in risk
analysis again.
Therefore, this mLearning security rule
base system on social network that make
NCU model to case study can be employ for
guide other university who tries to expand
the sub campus to other area and intend to
setup the m-Learning on social network
channel. They can use this model for
decency to construct the security system that
suitable
with
system
characteristic
themselves.
III. CONCLUSION
There are many respects regarding to the
rule base security model that is employs for
the finding the security control which
appropriate with each characteristic of
university where rely mobility device for
operated virtual class room on social
network in order to combination between sub
and main campus. For concentrated in real
case study, this review focuses on NorthChiang Mai University that useful on social
network on m-Learning system for make
high standard of education at Nong Khai
international campus that equal to main
campus at Chiang Mai province. The
similarly to other universities, NCU faces
with threat and problem on various social
network types. Therefore, this paper intend
to consider connecting with social network
including with facebook, google+ and twitter
that set up on smart phone device in order to
comparative
the
features
that
are
vulnerability point of mLearning system.
Moreover, this document apply the NIST
Special Issue of the International Journal of the Computer, the Internet and Management, Vol. 19 No. SP2, February, 2012
4
The mLearning Security Rule Base System with Social Network on eCampus: A Case Study of North-Chiang Mai University
standard 800-30 that is employ for construct
the security rule base system under risk
management concept. This model operated
by filtering vulnerability point, threat and
problem, attack motivation, likelihood level,
level of impact and control analysis on
mobility system for analysis the risk level.
This level can be useable to identify the
security solution and policy that suitable
with university who make eClassroom which
join between sub and main campus under
mobility environment including with social
network feature. This rule base model can be
employed for drive the security system on mLearning that encompass with social network
application. In additional, this guideline can
ease up to other analysis model later.
REFERENCES
[1] Law of educational ministry. “Education
management outside main campus of private
university 2008” Office of the higher education
commission, 2008.
[2] Gary Stoneburner, Alice Goguen and Alexis
Feringa.
“Risk
management
guide
for
information technology system” National
institute of standard and technology, Technology
administration, US. Department of commerce,
2002.
[3] Marsella Yeanette Hatane and Henny Putri
Saking Wijaya. “The Impacts and Efficacy of
Social Networks as Part of eLearning in English
Department, Petra Christian University”. The
Seventh International Conference on eLearning
for Knowledge-Based Society, 2010.
[4] Ion MIERLUS – MAZILU. “mLearning
objective” The Sixth International Conference on
eLearning for Knowledge-Based Society, 2009.
[5] Aaron Beach, Mike Gartrell, and Richard Han.
“Solutions to Security and Privacy Issues in
Mobile Social Networking” International
Conference on Computational Science and
Engineering, 2009.
[6] Endarnoto, S.K.; Pradipta, S.; Nugroho, A.S.;
Purnama, J. “Traffic Condition Information
Extraction & Visualization from Social Media
Twitter for Android Mobile Application”.
International
Conference
on
Electrical
Engineering and Informatics (ICEEI), 2011.
The Eighth International Conference on eLearning for Knowledge-Based Society, 23-24 February 2012, Thailand
5
Download