E-learning systems application programming interfaces security management
Abstract
The platforms for end users to explore and use were designed with proper effort by the program developers. Programmers take every precaution to create a system with a robust user interface and minimal maintenance requirements. Numerous lines of code are used by software programs to carry out processes and complete tasks that end users specify. Learning institutions use online education to better meet the needs of each student at a lower cost while looking for ways to supply high-quality educational content. This has a significant impact on the development of open and distance learning as well as online education. Additionally, it is expected that the use of the digital education system will keep expanding due to changes in student needs and technological developments in online education. To identify and communicate with application software, electronic communication requires a protocol. Application programming interfaces (APIs), which allow applications to speak with each other and share information, are one of these methods of communication. However, this research is designed to improve the privacy trust model in relation to eLearning platforms for the prevention of personal digital data and to curb the present cyber threat in the distance and open online learning environment. The research will conduct a review of past literature on users’ security models and trust privacy in an e-learning environment. It will be established in this research that digital data breaches are imminent and require a proper security solution. The study will provide an overview of the techniques and indicators of privacy breaches and develop a model that integrates trust and privacy in e-learning environments by contextualizing the peculiarities of open and distance studies (for online learners). The research is aimed at improving the existing eLearning security model. Also, a case study or practical example illustrating the application of the proposed API security solutions in real-world e-learning scenarios was conducted based on a survey of institutions as well as a survey of e-learning end users in order to gain a more tangible grasp of the concepts presented in this study.
Keywords
Full Text:
PDFReferences
1. Nneji CC, Urenyere R, Ukhurebor KE, et al. The impacts of COVID-19-induced online lectures on the teaching and learning process: An inquiring study of junior secondary schools in Orlu, Nigeria. Frontiers in Public Health. 2022, 10. doi: 10.3389/fpubh.2022.1054536.
2. Asanga MP, Essiet UU, Ukhurebor KE, et al. Social Media and Academic Performance: A Survey Research of Senior Secondary School Students in Uyo, Nigeria. International Journal of Learning, Teaching and Educational Research. 2023, 22(2): 323-337. doi: 10.26803/ijlter.22.2.18.
3. Ndunagu JN, Ukhurebor KE, Adesina A. Virtual laboratories for STEM in Nigerian higher education: The National Open University of Nigeria learners’ perspective. In: Elmoazen, R., López-Pernas, S., Misiejuk, K., Khalil, M., Wasson, B., Saqr, M (Eds.), Proceedings of the Technology-Enhanced Learning in Laboratories Workshop (TELL 2023), 3393, 38-48.
4. Nwankwo W, Ukhurebor KE. Web forum and social media: A model for automatic removal of fake media using multilayered neural networks. International Journal of Scientific & Technology Research. 2020, 9(1), 4371-4377.
5. Hussaini AR, Ibrahim S, Ukhurebor KE, et al. The Influence of Information and Communication Technology in the Teaching and Learning of Physics. International Journal of Learning, Teaching and Educational Research. 2023, 22(6): 98-120. doi: 10.26803/ijlter.22.6.6.
6. AltexSoft a Data Science and Software Engineering consulting company founded in 2007 at US Altexsoft.com (accessed on 26 May 2023).
7. Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud system. Available online: https://aws.amazon.com (accessed on 26 May 2023).
8. Patnaik N, Dwyer A, Hallett J, et al. SLR: From Saltzer and Schroeder to 2021…47 Years of Research on the Development and Validation of Security API Recommendations. ACM Transactions on Software Engineering and Methodology. 2023, 32(3): 1-31. doi: 10.1145/3561383.
9. Wu H, Xu L, Niu X, et al. Combinatorial testing of RESTful APIs. Proceedings of the 44th International Conference on Software Engineering. Published online May 21, 2022. doi: 10.1145/3510003.3510151.
10. Hussain F, Hussain R, Noye B, et al. Enterprise API Security and GDPR Compliance: Design and Implementation Perspective. IT Professional. 2020, 22(5): 81-89. doi: 10.1109/mitp.2020.2973852.
11. Hussain F, Li W, Noye B, et al. Intelligent Service Mesh Framework for API Security and Management. 2019 IEEE 10th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON). Published online October 2019. doi: 10.1109/iemcon.2019.8936216.
12. Iacono LL, Gorski PL. I Do and I Understand. Not Yet True for Security APIs. So Sad. Proceedings 2nd European Workshop on Usable Security. Published online 2017. doi: 10.14722/eurousec.2017.23015
13. Tasnim Z, Chadni S, Muhammad I, Babar A. APIRO: A Framework for Automated Security Tools API Recommendation. Kennesaw State University Digital Commons@Kennesaw State University. 2023.
14. Ouyang R, Wang J, Xu H, et al. A Microservice and Serverless Architecture for Secure IoT System. Sensors. 2023, 23(10): 4868. doi: 10.3390/s23104868.
15. Pan Y, Jia H, Liu W, et al. Mimicry API Gateway Decision Algorithm Based on Trust Distribution. Journal of Physics: Conference Series. 2023, 2424(1): 012004. doi: 10.1088/1742-6596/2424/1/012004
16. Brajesh D. API Management Chapter 2. 2017. p.16. doi: 10.1007/978-1-4842-1305-6_2.
17. Advanced API security: Protecting the digital economy and Empowering innovation Company. Available online: wib.com (accessed on 26 May 2023).
18. Windows technical documentation for developers and IT pros. Available online: https://learn.microsoft.com/en-us/windows/deployment/update/quality-updates (accessed on 26 May 2023).
DOI: https://doi.org/10.32629/jai.v7i5.1318
Refbacks
- There are currently no refbacks.
Copyright (c) 2024 Ahmed Yusuf Mai-inji, Longe Olumide Babatope, Kingsley Eghonghon Ukhurebor, Adewale O. Adesina, Vivian Nwaocha, Idris Ismaila Sinan, Udochukwu Chidiebere Nwankwo, Emmanuel Lyada, Moses Ashawa
License URL: https://creativecommons.org/licenses/by-nc/4.0/