html5-img
1 / 23

THE RISK MANAGEMENT ON DEVELOPING THE E-LEARNING STRATEGY

This article explores the risks and vulnerabilities in e-learning, including the weaknesses in the system, external threats, and associated risks for both professors and students. It also discusses general controls used in risk management.

ellenwalker
Télécharger la présentation

THE RISK MANAGEMENT ON DEVELOPING THE E-LEARNING STRATEGY

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. THE RISK MANAGEMENT ON DEVELOPING THE E-LEARNING STRATEGY

  2. RISKS AND VULNERABILITIES IN • E-LEARNING • II. THE STUDENT ASSOCIATED RISKS • III. GENERAL CONTROLLS USED IN THE RISK MANAGEMENT • IV. CONCLUSIONS

  3. I. RISKS AND VULNERABILITIES IN E-LEARNING • The vulnerabilitiesare the weaknesses inside exposing the system from the interior to those events witch ca affect the system functionality. • Threats are the potential dangers acting from the exterior finding and exploiting the internal vulnerabilities • The risks are associated with the probability that potential threatens become real and produce quantifiable or non quantifiable losses

  4. Learning System Objectives • the objectives of the IT&C system as the hardware and software e-Learning system support; • the objectives of the e-Learning as a system for transmission and assimilation of knowledge.

  5. The e-Learning Vulnerabilities as IT&C System • hardware infrastructure vulnerabilities; • software vulnerabilities; • human vulnerabilities; • data base vulnerabilities; • natural vulnerabilities.

  6. The e-Learning Threats as IT&C System • General threats • User identification and authorisation • Credibility and continuity of services • Data integrity threats • Secret threats • Legal threats

  7. The e-Leraning Risks as a Didactic System • PROFESSOR’S ASSOCIATED RISKS • THE STUDENT’S ASSOCIATED RISKS

  8. II. PROFESSORS ASSOCIATED RISKS • The competency risk • The management risk • The education risk

  9. 2.1. The Competency Risk • the didactic risk; • the technical risk; • the scientific risk; • the valuation risk.

  10. The didactic risk: • appears when an old curs is put in the same shape, without any improvement; • The scientific risk: • is associated with quality of the content of lessons; • The technological risk: • belongs to the relation between professor and the IT&C system; • The valuation risk: • generated by the desire of increasing the objectivity of valuation process, transferring, if would be possible, the responsibility to the computer.

  11. 2.2. The Management Risk • risk rise up because of: • 1. bad planning and control of the e-Learning process, courses, tests, mid tests, consultations, face-to-face one week meeting; • 2. bad using of digital poster board or breaking the dead lines discipline; • 3. bad cooperation between professors team or between professors and students.

  12. What could go wrongwith the management • compulsory requirements to promote the exam are not • clearly exposed; • bad schedule of intermediate tests and dead lines; • unexpected delay on delivery the observations • and marks; • missing personalized feedback to the students especially to the inactive or lazy students; • authentication of paternity for off - line homework.

  13. 2.3 The Education Risk • is present because is difficult to influence: • the student professional behavior; • the professional responsibility; • labor discipline; • desire of excellence.

  14. III. THE STUDENT ASSOCIATED RISKS • The participation risk • The competition risk • The personality risk • The communication risk

  15. 3.1. The Participation Risk • The participation risk linked directly with the student, with the student expectations • The students missed the professor’s guidelines and fill uncomfortable on the solitary confrontation with the e-learning system • To manage this risk is better if the professor correlates his curs much more explicit with the other courses

  16. 3.2. The Competition Risk • Is connected with the motivation of the students • we need to be innovative and organize ● professional contests; ● virtual scientific symposium • with participation of the managers representing companies, professors, and students as a virtual jury members • we must not wait until the end of the curs, the end of semester, for valuation of students.

  17. 3.3. The Personality Risk • is linked with: ◘professional authority; ◘ the individual scientific value; ◘ the leadership qualities. • we can show our appreciation making public comments on the forum about • ◘ the results of the best students; • ◘ winners of competitions.

  18. 3.4. The Communication Risk • The communication risk doesn’t belong especially to the e-Learning system it belongs in general to the IT system, and it is amplified by the Internet • The IT systems and Internet alter our communications as human bee. • From our point of view will be difficult to inspire students the filling of being a big team, strongly and performance team in benefit of general scientific behavior of students to be good, better and finally the best.

  19. IV. GENERAL CONTROLLS USED IN THE RISK MANAGEMENT – part 1 • new content structure, visual design and navigation ergonomy • □ the general subject of the curs must • be divided into logical units; • □ hierarchy of the logical units must be • reflected by parent, sibling and child • pages connected by hyperlinks; • ensuring the availability of HELP and FAQ facilities; • □ to support the effort of the students to • understand much better the curs and viewing • examples for homework.

  20. IV. GENERAL CONTROLLS USED IN THE RISK MANAGEMENT – part 2 • controls for timetable of direct meeting for consultations, meetings with guests, managers, researchers; • controls for verifying the scientific level of curs • □ study case; • □simulations; • □ games; • □ multimedia and other IT tools.

  21. IV. GENERAL CONTROLLS USED IN THE RISK MANAGEMENT - part 3 • controls the progress recorded by students before the final exam; • controls for the feedback with the students; • pursuit and control the level of students satisfaction; • preventions of fraud

  22. V. CONCLUSIONS • Important aspects are still yet to be analyzed from the cognitive prospective, emotional prospective, behavioral and social prospective. • Studying in detail the weaknesses, vulnerabilities, threats, we hope to develop procedures and implement a system of controls witch can prevent the risks or decrease the impact of risks. We can’t eliminate all risks. • How deep the analyze we push, how many vulnerabilities and risks we take into account, depends on the specific nature of the concrete discipline, theoretical level of the curs and practical orientation of seminars. • The risk management based on this procedures and controls is anyway a major component of the didactic process management itself, viewed in the general known terms of planning, organizing, coordinate and control.

  23. THANK YOU !

More Related