Get Out Of My Space! The Need For Secured Shared Space In Online Collaborative Learning
←
→
Page content transcription
If your browser does not render page correctly, please read the page content below
The Clute Institute International Academic Conference San Antonio, Texas, USA 2014 Get Out Of My Space! The Need For Secured Shared Space In Online Collaborative Learning Robert Ekblaw, University at Albany, SUNY, USA ABSTRACT The proliferation of online learning, combined with an emphasis on collaborative learning in graduate or senior-level courses, has generated a flurry of tools and applications. A key part of any tool is the means for the students working together to share their work. However, many instructors and administrators do not consider that aspect. Some commercial online Course Management Systems (like Blackboard) do not provide a separate and secured space for student collaboration, forcing the students to come up with their own solution. The students, however, may not be experienced enough to know what to look for in such an application, and may not select the most appropriate one for their situation. This could lead to security, privacy, and data integrity problems. This paper will discuss case studies and examples in the literature where security and data integrity have been an issue in collaborative learning. It will also examine some repercussions of a lack of security. In addition, suggestions from both students and instructors will be discussed. Keywords: Collaborative Learning; Online Learning; Security; Data Integrity; Trust INTRODUCTION Online learning has become a major trend in modern collegiate education. Higher costs and dwindling budgets have inspired many institutions to add online courses to increase the number of students taking courses while minimizing expenses. Unfortunately, many of these “movements” to online courses are not funded with the time or money to train the instructors in its use, or research the best applications to conduct online learning (Bouwma-Gearhart & Bess, 2012). Thus, the cheapest and easiest tool will be used, and the focus will be on delivering the course material. That focus may be fine for courses focusing on individual effort, like degree-program introductory courses. However, many advanced courses, especially senior-level and graduate courses, practice collaborative learning, where groups of students are working together on assignments and projects. This adds a new focus area to the online course. Course material delivery is not the only consideration; now, it is also important to consider the security, integrity, and privacy of the information shared among students. Since most commercially-available online course tools do not provide a secure shared space like that, as they were not designed with collaborative learning in mind, many students often use external tools, like Google docs or Wikis. The use of these tools fools students and instructors alike, believing that the use of a password to access such tools ensures their security and privacy (Tu, 2002). However, this is not always the case, especially among wikis (Raitman, Ngo, Augar, & Zhou, 2005). The increased use of mobile devices (tablets, smartphones, etc) has added an additional level of concern. Now users must not only be concerned about the security of the data repository they are using, but also about the security of the transmission between user and data (Kambourakis, Kontoni, Rouskas, & Gritzalis, 2007). The students are so used to their devices, however, that they fail to consider such concerns. © Copyright by author(s) 120 The Clute Institute
The Clute Institute International Academic Conference San Antonio, Texas, USA 2014 Why should they be concerned? What could happen if their shared information is insecure? Depending upon the tool and medium used, there could be different results. Many classes that practice collaborative learning begin the course by having the students introduce each other on some wiki or discussion board. If that data is compromised, outsiders could learn personal information about the students, and perhaps use that in negative ways (like harassment or identify theft). If other students in the course can access the information, they may copy it and turn it in as their own work, creating questions of cheating. If the team is working on innovative research, an outsider could copy and even patent their ideas. There are three main issues involved here: security, privacy, and data integrity. The successive sections of this paper will define and describe these issues, and examine what are some of the consequences of weak safeguards in each area. The next section will be an overview of current literature, where I examine what other professionals have already identified as issues, and what has been done to address some of them. The following section will analyze what is already being done in this arena, and what I see is necessary to continue or expand research. The fourth section will detail some preliminary analysis work I’ve already conducted, and the last section will postulate and suggest further research. LITERATURE REVIEW As I was gathering literature in this area, I quickly discovered that very little research has actually been done. There are plenty of studies looking into the effectiveness of collaborative learning, and the importance of social presence in its success, but little has been discussed about privacy and security. There seems to be two main reasons why that is so: 1. Students are not really concerned about privacy. In surveys asking students what were their concerns about engaging in collaborative learning, security ranked very low (Tu, 2002) 2. Students believe that anywhere they need to sign into using a userid and password blocks unauthorized users (Weisband & Reinig, 1995) While there has been little research into this area, there have been a sufficient number of studies to categorize the work into four major areas of emphasis: trust among the student collaborators, social presence, security of the system, and privacy of information. More recently, the increased use in mobile devices has spurred more interest in security concerns, so I’ll also look at that focus. A sense of trust is vital in the effective result of collaborative learning. This is important because the members of the collaborative group must be able to trust each other (Sapon-Shevin & Chandler-Okott, 2001). Trust is the key to maintaining motivation and confidence among the students working together (Kambourakis, Kontoni, Rouskas, & Gritzalis, 2007). If trust is broken or not present, the students will not want to work together, and won’t believe in the team. They may even believe that other members are self-serving, pushing their own agenda or altering data so that they appear more important, or a more contributing member, than the rest of the team (Sapon- Shevin & Chandler-Okott, 2001). Trust among the members is not the only important aspect of trust. The student users must be able to trust the system they are using (Tamjklyamcholo, Sapiyan, Baba, Tamjid, & Gholipour, 2013). Furthermore, they must be able to trust the administrators and other users of that system. Otherwise, they will not disclose personal information (Tu, 2002). They may even choose not to use the system at all (Raitman, Ngo, Augar, & Zhou, 2005), and thus not participate in the collaborative learning process. A final aspect of trust is trust in the final result. If the student users do not trust that their information is secure, they will also not use the system, and may not participate in the process at all (Bouwma-Gearhart & Bess, 2012). Trust, or the lack of it, can also affect social presence. Social presence is defined as the sense that each student is active and participating in the process (Shea & Bidjerano, 2010). If the students do not trust the system or © Copyright by author(s) 121 The Clute Institute
The Clute Institute International Academic Conference San Antonio, Texas, USA 2014 process, they won’t participate as much, and thus limit their social presence. Strangely, despite research illustrating the impact of trust and concerns of security on social presence, students frequently rank concerns about privacy and data security very low among factors that negatively impact social presence (Tu, 2002). Tu summarized that due to the fact that “users are unable to visualize the negative impacts” of many security concerns (Tu, 2002; p 298). One consistent aspect Tu found was that students consider bulletin boards and discussion boards less secure than other means of communication, and thus tend to limit posting personal or confidential information. That could indicate that discussion boards, a common tool for online collaborative learning, might not support discourse as much as instructors might desire. Security of the data used by collaborating students would seem to be a major concern, but many of the surveys conducted in the literature found that it was not a major concern among the students. A major reason many students were not concerned was due to the use of passwords. They figured that if they had to enter a password in order to access the location of the data, the data was secure (Tu, 2002; Weisband & Reinig, 1995). Some students, and even instructors, felt that data security was a matter for the Information Technology group, and not an issue for the students (Tamjklyamcholo, Sapiyan, Baba, Tamjid, & Gholipour, 2013). Therefore, they did not concern themselves with it. Wikis are a popular communication and workspace tool for collaborative learning. Here, again, students did not have a major security concern. They figured that the presence of an instructor or administrator overseeing what was posted on the wiki served as an appropriate security measure (Raitman, Ngo, Augar, & Zhou, 2005), even if they had no idea how frequently the overseer reviewed the wiki. In fact, students were more concerned about losing work (i.e. someone deleting their post) than outsiders gaining access to their work (Raitman, Ngo, Augar, & Zhou, 2005). Interestingly, apathy was a major barrier to security concerns. Many students felt that other people simply wouldn’t be interested in their musings or contributions, so it didn’t really matter to them whether their work was secure (Tu, 2002). This was especially true for community discussion boards, where students figured that the information there was so course-related, and didn’t contain much personal information, that it didn’t matter if the data was secure or not (Weisband & Reinig, 1995). Ownership and proprietorship were two concerns that some authors raised, especially among graduate students. The fact that some of their collaborative research might be used for publication raised some issues about making privacy and ownership of the work (Bouwma-Gearhart & Bess, 2012), especially when the students shared their work in blogs. They felt it was important to maintain privacy of crucial research findings, so that someone performing similar research didn’t steal their findings and publish first (Bouwma-Gearhart & Bess, 2012). Bouwma’s group also found some concerns about “lurkers”, people loosely connected to the research who had access to the blog, but were not active participants in the research. A good research blog should allow contributors to review their part of the research, but not the overall results. The use of social networks brought out additional concerns about ownership and privacy. In a study on the use of social networks in collaborative learning, 70% of students surveyed stated they would not use social networks to share thoughts or ideas unless specifically told to do so (Jones, Blackey, Fitzgibbon, & Chew, 2010). They were unsure of the social site’s rules on ownership (like, did it become public domain as soon as it was posted?). Also, most students use social networks for fun, and they did not like the idea of using their “fun zone” for academic purposes. That study did show how students have little concern about sites they access for fun purposes (gaming, music sharing, etc), even if they access those sites using the devices they use to access or store their academic and research work. The consideration of devices brings us to the advancement of mobile devices. As the use of mobile devices among students has grown, so has the number of research articles examining their safe use. This can be a major concern, as personal information like cell number, IP address, and GPS location is transmitted every time a mobile device accesses the Internet (Kambourakis, Security and Privacy in m-learning and Beyond: Challenges and State- of-the-Art, 2013). I found a significant number of research articles investigating the safe use of mobile devices. Still, even then, authors found that a majority of work into the use of mobile devices focused on design, © Copyright by author(s) 122 The Clute Institute
The Clute Institute International Academic Conference San Antonio, Texas, USA 2014 development, and implementation, not security (Kambourakis, Security and Privacy in m-learning and Beyond: Challenges and State-of-the-Art, 2013). Kambourakis identified two main aspects of security for mobile apps: protection against unauthorized intrusion, and integrity of the data. Session protocols and other methods of determining false IP addresses are a common means to protect against unauthorized intrusion, but Kambourakis felt they still had a long way to go before they were a truly secure method (Kambourakis, Security and Privacy in m-learning and Beyond: Challenges and State-of-the-Art, 2013). Kambourakis is looking forward to advances in biometrics, while other authors feel that voice recognition (Lee & Salman, 2012)or signature-based systems (Razaque & Elleithy, 2012) would be excellent solutions. Note all three methods are designed to uniquely identify the user, so even someone else using the same device would not be authorized. These methods would resolve one stated concern – what if someone picked up my phone and started accessing the site? (Kambourakis, Kontoni, Rouskas, & Gritzalis, 2007) Many mobile device applications already use a combination of public and private keys, as well as local security certificates, to help authenticate both users and data (Kambourakis, Kontoni, Rouskas, & Gritzalis, 2007). These are better than simple passwords, as they authenticate the DEVICE as well as the USER, but since many browsers and mobile apps allow a user to save a password, that still doesn’t resolve the possibility that a different person is using the device. Banks and other institutions solve that with a visual key or selection that only the authorized user would know (Kambourakis, Security and Privacy in m-learning and Beyond: Challenges and State- of-the-Art, 2013). Some shared sites use additional security badges that only allow access to certain folders or files, further providing security of the data contained (Liu, Jiang, Sha, & Govindan, 2012). The use of cloud-based data systems has raised some new security issues. Researchers have examined cloud security and identified five key aspects (Alshwaier, Youssef, & Emam, 2012): 1. Identification and Authentication 2. Authorization 3. Integrity and Confidentiality 4. Non-repudiation 5. Availability Identification and Authentication means that the system provides a method to identify who is the user and whether that user is allowed. Userids and passwords are the simplest way that most cloud-based data repositories handle that aspect. Authorization refers to any particular user’s rights, permissions, and ownership to items. Ownership is usually automatic – the person who uploads the file or information is the owner. That owner can assign permissions to other people as they are given permission to share the data. Often, shared users can read, edit, download, or copy the cloud-based data. Integrity and confidentiality refers to whatever encryption orvalidity schemes are in use to ensure that the data is accurate, and that confidential information like exams or grades are viewable only by the intended parties. Most cloud-based data sites use a combination of public and private keys to ensure data integrity (Liu, Jiang, Sha, & Govindan, 2012). Encryption is more interesting. Some cloud sites use encryption on incoming data packets, but they don’t differentiate between data packets of higher confidentiality (like exams or grades) versus standard data packets. Non-repudiation ensures that transaction processing works and doesn’t lose any transactions. This is important for simultaneous multi-user environments, as cloud apps are designed to be. Basically, transaction processing is used for situations where more than one user is referencing or updating the same file at the same time. The transaction processing will ensure that all changes are corrected implemented, and the final product is the correct combination of all transactions. Many cloud apps handle this with a “check out” procedure, where only one user can obtain an editable copy of the file at a time, and others must wait until the user checks that back in (Alshwaier, Youssef, & Emam, 2012). That’s okay for small courses, but Massive Open Online Courses (MOOCs) © Copyright by author(s) 123 The Clute Institute
The Clute Institute International Academic Conference San Antonio, Texas, USA 2014 make that impractical. A commonly used cloud sharing system, Google Docs, handles it by maintaining one open copy of the file. Additional users simply gain access to it, and all users can see who is editing it at the same time, where each user’s changes are denoted by a different color and a sidebar key shows which user is denoted by which color (Alshwaier, Youssef, & Emam, 2012). Availability means that the cloud, and the desired data, is available whenever a user might need it. Redundancy helps ensure that. Redundancy means that a second archived copy exists somewhere else, so that if the primary data site is down for maintenance or repairs, the copy can be accessed (Alshwaier, Youssef, & Emam, 2012). FINDINGS AND FOCUS I find it interesting that most of the literature points to a lack of concerns among students, instructors, and administrators regarding the security and privacy of the data shared during collaborative learning. That would serve to explain why there has been so little research and discussion about it in the literature. However, one has to wonder if there truly is a lack of concern regarding that, or, as mentioned in the article by Tamjklyamcholo et.al., it is believed to be a matter for the IT staff. Before we disregard the need for security and privacy of shared data in collaborative learning, it would be wise to truly delve into the minds of the students and instructors using collaborative learning tools. Thus, one research concern would be what users consider important regarding the security, privacy, and integrity of their shared data. The increased use of cloud-based technologies raises additional questions. Prior to that, most institutions would use a Course Management System that was loaded onto their own computer network, and therefore be managed by maintained by their local Information Technology department. Thus, any issues of data security and privacy were local to the university or institution. This history is why both Tu and Weising reported that students felt comfortable about the security of their data if they needed to provide a password to access the system. Since all of the data was located on the local network, and anyone wishing to access would need to provide a password, only authorized individuals would have access to the data. However, cloud-based applications are not located on the local network. The application and its associated data are not managed by the local IT department. Security is now managed by an external source, and the institution has no control over it. Despite that, the use of such applications is on the rise. We, as an information-based society, have grown so comfortable with our use of the Internet, that we have taken it for granted. We are now longer concerned about the accuracy of the information out there, or how others are connected to us when we are accessing the Internet, until something negative or tragic happens that forces us to consider it. Often, though, it’s too late then. Clearly it is necessary to examine the security protocols and procedures used by developers and administrators of cloud-based education and collaboration tools. That examination would include determining how it protects the data, how user access is handled and regulated, and what sort of safeguards are engaged. It might even include determining what form of archiving or backup retrieval is available, in case the site or application becomes corrupted. Such an examination leads to another research question, specifically, “What are the standard security and data protection protocols used by cloud-based applications?” There is one last issue that is hardly touched in the literature. Most of the researchers engaged in this research are experienced in either computer technology or data management. They instinctively know of some concerns, and thus don’t need to ask about them. However, the general student user of collaborative learning tools would not have that knowledge. They may have different concerns, or they may lack concerns due to a poor understanding of the risks. A true examination of data security cannot simply end with how satisfied these users are, but whether they truly have concerns. A student may respond to a survey that they are satisfied with the data security of an application they using simply because they have no idea if there is anything about which they should be concerned. Thus, a true examination of this topic would require understanding if users have any concerns, and exactly what those concerns might be. Based on the findings of the literature, the following research questions were created. These will serve as the basis for the research discussed in the remaining sections of this paper: © Copyright by author(s) 124 The Clute Institute
The Clute Institute International Academic Conference San Antonio, Texas, USA 2014 1. What do users consider important aspects of data security, privacy, and integrity when using shared data? 2. What are standard security protocols in most web-based and cloud-based applications? 3. How is data protected and archived in most web-based and cloud-based applications? 4. What are concerns for true online collaboration, both procedural and data security-related? A model has also been created from the literature. Called the Collaborative Tool Acceptance Model, it includes both internal (centered on the individual student) and external (course or institution-based) factors. The model is shown below: Internal External Trust of other users Privacy of the site and its data Intention to use Acceptance of use Trust of the Security of the system system Student Social Ownership of Presence the data Figure 1: Collaboration Tool Acceptance Model The next section of the paper will discuss research conducted to prove the veracity of this model. RESEARCH Since the model depends upon both the students and the system, both aspects are examined in the research. To gather student opinion, I distributed a survey to students of fully and partially online courses. Each course surveyed uses at least one Cloud-based data sharing system. A copy of the survey can be found in Appendix A. To gather information about the data-sharing applications themselves, I obtained a list of the Top Ten Cloud-based and mobile data sharing application development companies. I contacted those companies and asked to interview a few of their developers. After assuring them that no trade secrets or proprietary information will be obtained in the research, I was allowed to interview their developers. I had created a series of questions designed to obtain the information I needed to validate the model. A copy of those questions appears in Appendix B. Sometimes additional questions had to be asked to draw out the specific information I needed, but those questions served as the basis of the interviews. So far, the survey has been distributed to students in 24 classes taught at two different universities. More universities, and more classes, are being identified and added to the research. The interviews have been conducted with twelve developers from four of the top ten companies. Three other companies have agreed to the interviews, and interviews are being scheduled. RESEARCH FINDINGS The surveys were analyzed using a 5-point Likert scale, using a value of 1 for “Strongly disagree” and a value of 5 for “Strongly agree.” To have a question average agreement, the overall average of that question’s scale must be at least 3.7. The following table shows the average scale value for each question among the surveys processed so far: © Copyright by author(s) 125 The Clute Institute
The Clute Institute International Academic Conference San Antonio, Texas, USA 2014 Question # Question Average value 1 I feel that data I place in an online application is safe 3.4 Having to use a password to access an online application makes me feel that my data is 2 4.2 secure 3 I trust that the online applications used in class are secure 4.1 4 I trust that an online application suggested by my instructor would be secure 4.3 5 I trust that online applications I access through a computer on campus are secure 3.6 6 I trust that online applications I access via my mobile device are secure 3.5 7 I trust that data I place in an online repository is secure 4.2 8 I trust that data I place in a local application is secure 4.3 I have more faith that my data is secure in a local application than in an online 9 4.5 repository A large percentage of the surveys had answers of “Slightly agree” across the board. Unless the students are just overly agreeable in life, that would seem to agree with Weisband & Reinig’s impression that most students aren’t concerned about the safety of their data (Weisband & Reinig, 1995). Some interesting findings have emerged in the research so far. Clearly, the use of a password increases a student’s sense of security when using an application. They also have more faith in applications used or suggested by the instructor or the institution. More interesting, students have more faith in local data repositories, ones that are assumed to be managed by the educational institution, than those managed by an external entity. These support the “Trust of the system” part of the model, which promotes students’ intention to use the system. The interviews that have been conducted seems to augment that impression. The developers I spoke with understand that data security is a key emphasis of their work, and they do spend extra time planning and testing that their application maintains data securely. There wasn’t a single developer that did not view data security as a crucial consideration, and everyone spent time ensuring the security of their application. Overall, it does appear that some students don’t really think about the security of the data they place on data sharing applications. However, it appears that many of them do. They are not worried about it, though, because they believe that many systems are secure, especially those recommended by representatives of the educational institution. Developers of such applications reinforce that belief, as they focus on data security during the construction of data sharing applications. While data breaches continue to become headline news, such incidents do not seem to elicit panic among collaborative education students. FUTURE WORK This research is verifying aspects of trust in the system, composed of privacy and data security. However, two other aspects of the Collaborative Tool Acceptance Model are not tested in this research. Further research is required to test how much Student Social Presence affects their acceptance of a collaborative data tool. Such research might involve measuring student presence in a course, and then shifting them to a new data sharing tool. Additional research is also required to measure how trust in the other students affects acceptance of a data sharing tool. Would students be more hesitant to share data with other students that they don’t trust? Intuitively that question would be answered “Yes,” but research would be required to determine whether that is truly the case. A final research topic could verify whether students’ trust in online applications is well-placed. Research could determine whether additional focus on data security during the development process actually results in a more secure system. Such research could also determine if students have more faith in systems that are truly more secure, thereby showing that students’ trust is well-placed. REFERENCES 1. Alshwaier, A., Youssef, A., & Emam, A. (2012). A New Trend for E-Learning in KSA Using Educational Clouds. Advanced Computing: An International Journal, 3(1), 81-97. © Copyright by author(s) 126 The Clute Institute
The Clute Institute International Academic Conference San Antonio, Texas, USA 2014 2. Bouwma-Gearhart, J. L., & Bess, J. L. (2012). The Transformative Potential of Blogs for Research in Higher Education. Journal of Higher Education, 83(2), 249-275. 3. Jones, N., Blackey, H., Fitzgibbon, K., & Chew, E. (2010). Get out of MySpace! Computers & Education, 776-782. 4. Kambourakis, G. (2013, June). Security and Privacy in m-learning and Beyond: Challenges and State-of- the-Art. International Journal of u- and e- Service, Science, and Technology, 6(3), 67-84. 5. Kambourakis, G., Kontoni, D.-P. M., Rouskas, A., & Gritzalis, S. (2007). A PKI approach for deploying modern secure distributed e-learning and m-learning environments. Computers & Education, 1-16. 6. Lee, K. B., & Salman, R. (2012). The Design and Development of Mobile Collaborative Learning Application Using Android. Journal of Information Technology and Application in Education, 1(1), 1-8. 7. Liu, B., Jiang, Y., Sha, F., & Govindan, R. (2012). Cloud-Enabled Privacy-Preserving Collaborative Learning for Mobile Sensing. Proceedings from SenSys: The ACM Conference on Embedded Networked Sensor Systems. Toronto, CA: ACM. 8. Raitman, R., Ngo, L., Augar, N., & Zhou, W. (2005). Security in the online e-learning environment. Proceedings of the 5th IEEE International Conference on Advanced Learning Technologies (pp. 702-706). Kaohstung, Taiwan: IEEE. 9. Razaque, A., & Elleithy, K. (2012). Restoring privacy to users to foster Mobile Collaborative Learning. Proceedings of the 2012 ASEE Northeast Section Conference. Lowell, MA: ASEE. 10. Sapon-Shevin, M., & Chandler-Okott, K. (2001). Student Cohorts: Communities of Critique or Dysfunctional Families? Journal of Teacher Education, 52, 350-365. 11. Shea, P., & Bidjerano, T. (2010). Learning presence: Toward a theory of self-efficacy, self-regulation, and the development of communities of inquiry in online and blended learning environments. Computers & Education, 1721-1731. 12. Tamjklyamcholo, A., Sapiyan, M., Baba, B., Tamjid, H., & Gholipour, R. (2013). Information security - Professionl perceptions of knowledge-sharing intention under self-efficacy, trust, reciprocity, and shared language. Computers & Education, 223-232. 13. Tu, C.-H. (2002). The relationship between social presence and online privacy. The Internet and Higher Education, 5, 293-318. 14. Weisband, S. P., & Reinig, B. A. (1995, December). Managing User Perceptions of Email Privacy. Communications of the ACM, 38(12), 40-47. © Copyright by author(s) 127 The Clute Institute
The Clute Institute International Academic Conference San Antonio, Texas, USA 2014 APPENDIX A Please respond to the following statements by filling in the bubble of the appropriate value to the right: Strongly Somewhat Neutral Somewhat Strongly disagree disagree agree agree 1. I feel that data I place in an online application is safe. 2. Having to use a password to access an online application makes me feel that my data is more secure. 3. I trust that the online applications used in class are secure. 4. I trust that an online application suggested by my instructor would be secure. 5. I trust that online applications I access through a computer on campus are secure. 6. I trust that online applications I access via my mobile device (tablet, laptop, cell phone) are secure. 7. I trust that data I place in an online repository (like Google docs or Dropbox) is secure. 8. I trust that data I place in a local application (like Blackboard) is secure. 9. I have more faith that my data is secure in a local application like Blackboard than in an online repository like Google docs. Please rate your opinion of the security of data in the following applications by filling the bubble of the appropriate value: Poor Fair Average Good Excellent 1. Email 2. Discussion Board 3. Blackboard 4. Online data repository 5. Facebook 6. Shared web service (like Github) © Copyright by author(s) 128 The Clute Institute
The Clute Institute International Academic Conference San Antonio, Texas, USA 2014 APPENDIX B The following are the base interview questions used to query mobile and Cloud-based application developers: 1. What are the chief concerns regarding data security when you are designing an application? 2. What sort of data threats do you guard against? 3. What are adequate user identification techniques to ensure that only authorized users have access to the application? 4. What permissions are necessary to adequately protect the data as used and stored by a variety of users? 5. Are there any trends or standards common to shared user access applications on the web? 6. Are there additional considerations necessary to protect data used on mobile devices like tablets or smart phones? © Copyright by author(s) 129 The Clute Institute
You can also read