Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Weippl, Edgar
SBA Research
Vienna, Austria
 
   Featured Reviewer
   Reader Recommended
   Reviewer Selected
   Highlighted
Follow this Reviewer
 
 
 

Edgar R. Weippl holds a MS and a Ph.D. in Computer Science, and an MA in Business Administration. He has taught courses on computer security at the University of Linz (Austria), The Polytechnic University (Hagenberg, Austria), Beloit College (Wisconsin, USA) and the University of Vienna (Austria).

His general areas of interest are security and e-learning. Specifically, his work focuses on security in e-learning (http://www.e-learning-security.org). E-learning can be considered as a special form of e-business. The good involved is digital content that has to be distributed, maintained, and updated. Moreover, the value of this good has to be adequately protected from unauthorized use and modification, without preventing students from using it in a flexible way.

The goal of Weippl's research is to analyze the requirements of using e-learning content, which emerge from both the technical interactions between systems and the social interactions of individual students and faculty. The complexity of such cooperative systems often necessitates new methodological and theoretical directions, encompassing both technically sound solutions and user-centered design.

When trying to increase user acceptance, a standard approach taken by many e-learning researchers and vendors is to incorporate interactivity and to improve multimedia capabilities of the system. Although these features may contribute to the success of e-learning systems, Weippl considers security as the crucial part when it comes to enhancing user acceptance. The reason why security can be seen as an enabling technology in this context is that people often refrain from using systems that they do not trust. When analyzing the requirements of security in complex cooperative systems, he has drawn data from the risk analysis of several previous projects touching this issue. The goal of security in e-learning is to protect authors' e-learning content from copyright infringements, to protect teachers from students who may undermine their evaluation system by cheating, and to protect students from being too closely monitored by their teachers when using the software. Since these intertwined requirements are not met by existing systems, new approaches are needed.

Scholarly activities such as giving tutorials at renowned conferences (for instance, ED-MEDIA) and serving as a reviewer for scientific journals (including IEEE Internet, where he was mentioned as an outstanding reviewer in 2000,) play a major role in Weippl's daily work. He also serves on the editorial board of JISE.

Currently, Weippl is creating a chapter on security in e-learning in a multi-university e-learning project (http://www.planet-et.at). He has presented tutorials at various conferences, and actively participates in the scientific community. Previously, he worked for three years in a non-profit research organization focusing on security.

Weippl spends his leisure time exploring underwater worlds with his scuba diving wife Kathrin, and--like many Austrians-- skiing and snowboarding in the Alps.

 
 
Options:
Date Reviewed  
 
1
- 9 of 9 reviews

   
   Computer forensics: computer crime scene investigation (Networking Series)
Vacca J., Charles River Media, Inc., Rockland, MA, 2005. 832 pp.  Type: Book (9781584503897)

Computer forensics is a domain of growing importance, similar to all security-related services, and the number of new books in this area is increasing rapidly....

Dec 7 2005  
   Outsourcing information security
Axelrod C., Artech House, Inc., Norwood, MA, 2004. 266 pp.  Type: Book (9781580535311)

Outsourcing has become a large industry that helps companies save substantially by moving services such as information technology (IT) support and administration overseas. With regard to outsourcing IT security, there are two distinct ...

Nov 16 2005  
   An approach to cooperative updates of XML documents in distributed systems
Bertino E., Ferrari E., Mella G. Journal of Computer Security 13(2): 191-242, 2005.  Type: Article

Today, people collaborate around the world, and they cooperatively write documents. When many people work on a document, an access control model that supports a fine level of granularity is essential. Moreover, some steps in the workfl...

Sep 28 2005  
   Computing information technology: the human side
Gordon S. Idea Group Publishing, Hershey, PA, 2003.  Type: Divisible Book

This book is a selection of the best papers from the Information Resources Management Association (IRMA) Conference. Most papers address human-computer interaction (HCI) related issues, with a focus “on the human side.&am...

May 7 2004  
   Securing system with the Solaris security toolkit
Noordergraaf A., Brunette G., Prentice Hall Professional Technical Reference, Upper Saddle River, NJ, 2003. 416 pp.  Type: Book (9780131410718)

This is an easy-to-read guide that first clearly outlines all necessary steps, and subsequently gives details about how to implement them. It is specifically written for users of the Solaris Security Toolkit to secure Solaris OE versio...

Dec 29 2003  
   The art and science of computer security
Bishop M., Addison-Wesley Longman Publishing Co., Inc., Boston, MA, 2002. 1120 pp.  Type: Book (9780201440997), Reviews: (1 of 2)

Bishop has long worked in computer security research, and has profited from collaborating with other well-known researchers. The book is a truly comprehensive work on this topic. Written as a textbook, it can be read in various ways ac...

Apr 21 2003  
   Computers play the beer game: can artificial agents manage supply chains?
Kimbrough S., Wu D., Zhong F. Decision Support Systems 33(3): 323-333, 2002.  Type: Article

The authors describe experiments with autonomous agents that play the beer game and variations thereof. The beer game is a simulation of a supply chain with four sequentially arranged players: manufacturer, distributor, wholesaler, an...

Feb 26 2003  
   Digital watermarking
Cox I., Miller M., Bloom J., Morgan Kaufmann Publishers Inc., San Francisco, CA, 2002. 539 pp.  Type: Book (9781558607149), Reviews: (3 of 3)

In their introduction, the authors state that their book is not intended to serve as a comprehensive survey of research on watermarking, but rather constitutes their personal view. Since the authors have made significant contributions...

Jan 6 2003  
   Designing security architecture solutions
Ramachandran J., John Wiley & Sons, Inc., New York, NY, 2002. 452 pp.  Type: Book (9780471206026), Reviews: (2 of 2)

The author recommends this book for system architects who want to learn more about security and how to design security as an integral part of a project. The book is not written to help novices study security basics. According to the a...

Oct 21 2002  
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy