Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jorge Miguel is active.

Publication


Featured researches published by Jorge Miguel.


intelligent networking and collaborative systems | 2013

Providing Information Security to MOOC: Towards Effective Student Authentication

Jorge Miguel; Santi Caballé; Josep Prieto

Despite the vertiginous growth and fast development of Massive Open Online Courses (MOOC) over the last two years, there exist still relevant drawbacks that impede MOOCs to prove their actual potential for education. Among these drawbacks, we investigate the lack of provision of Information Security to MOOC, with regards to anomalous user authentication, which cannot verify the actual students identity to meet grading requirements as well as satisfy accrediting institutions. In order to overcome this issue, we propose a global user authentication model called MOOC-SIA.


complex, intelligent and software intensive systems | 2013

Information Security in Support for Mobile Collaborative Learning

Jorge Miguel; Santi Caballé; Josep Prieto

This paper presents a study on information security considerations in mobile collaborative learning and how security plays a significant role in the design and implementation processes of e-Learning in general and collaborative learning in particular. Recent mobile technological advances offer further opportunities for these educational paradigms to be greatly exploited. In this context, over the last years, there has been an increasing attention and demand of new requirements related to information security, becoming a key requirement in e-Learning systems. However, the development of mobile supported collaborative learning guided by security as a key and transverse factor has been, to the best of our knowledge, little investigated. In order to improve collaborative learning security when adopting mobile learning models, we have investigated new security approaches, which may be applied in this context. To reach this goal, this paper provides firstly an overview of secure learning management systems, inspecting which are the most relevant factors to consider, and connecting this approach to specific aspects for mobile collaborative learning. Then, we report on real-life experience in security attacks in m-Learning showing a practical perspective of the learning management system vulnerabilities. From this experience and considerations, finally, the main guidelines for the design of security solutions applied to improve mobile collaborative learning are proposed.


intelligent networking and collaborative systems | 2012

Providing Security to Computer-Supported Collaborative Learning: An Overview

Jorge Miguel; Santi Caballé; Josep Prieto

Over the last two decades, a great variety of forms of e-Learning has been widely adopted and intensively exploited in most of educational institutions. As a result, e-Learning needs have been evolving accordingly with more and more demanding pedagogical and technological requirements. Given the added pedagogical value of group work, Computer-Supported Collaborative Learning has become one of the most influencing educational paradigms devoted to improve teaching and learning by the use of modern ICT. On the other hand, recently, there has been an increasing attention and demand of new requirements related to information security, with the aim to enhance the learning efficacy by adopting a secure perspective for each and every learning process and resource, as well as the information transmitted and shared. However, the development of CSCL systems guided by security as a key and transversal requirement has been, to the best of our knowledge, little investigated. In order to fill this gap, this paper provides firstly an overview of the current developments of CSCL systems from the security perspective. Then, the paper discusses on the problems caused in collaborative learning processes by the lack of security. Finally, the main guidelines for the design of secure CSCL systems are proposed to guide developers to incorporate security as an essential requirement into the collaborative learning process.


World Wide Web | 2015

Security in online web learning assessment

Jorge Miguel; Santi Caballé; Fatos Xhafa; Josep Prieto

This paper proposes a trustworthiness model for the design of secure learning assessment in on-line web collaborative learning groups. Although computer supported collaborative learning has been widely adopted in many educational institutions over the last decade, there exist still drawbacks which limit their potential in collaborative learning activities. Among these limitations, we investigate information security requirements in on-line assessment, (e-assessment), which can be developed in collaborative learning contexts. Despite information security enhancements have been developed in recent years, to the best of our knowledge, integrated and holistic security models have not been completely carried out yet. Even when security advanced methodologies and technologies are deployed in learning management systems, too many types of vulnerabilities still remain opened and unsolved. Therefore, new models such as trustworthiness approaches can overcome these lacks and support e-assessment requirements for e-Learning. To this end, a holistic security model is designed, implemented and evaluated in a real context of e-Learning. Implications of this study are remarked for secure assessment in on-line collaborative learning through effective trustworthiness approaches.


Computer Standards & Interfaces | 2016

A methodological approach for trustworthiness assessment and prediction in mobile online collaborative learning

Jorge Miguel; Santi Caballé; Fatos Xhafa; Josep Prieto; Leonard Barolli

Trustworthiness and technological security solutions are closely related to online collaborative learning and they can be combined with the aim of reaching information security requirements for e-Learning participants and designers. Moreover, mobile collaborative learning is an emerging educational model devoted to providing the learner with the ability to assimilate learning any time and anywhere. In this paper, we justify the need of trustworthiness models as a functional requirement devoted to improving information security. To this end, we propose a methodological approach to modelling trustworthiness in online collaborative learning. Our proposal sets out to build a theoretical approach with the aim to provide e-Learning designers and managers with guidelines for incorporating security into mobile online collaborative activities through trustworthiness assessment and prediction. Methodology to modelling trustworthiness in mobile online collaborative learningGuidelines for incorporating security into mobile online collaborative activitiesProvide trustworthiness assessment methodsTrustworthiness prediction based on a neuronal network approachEvaluation of trustworthiness prediction and methodology on real online courses


complex, intelligent and software intensive systems | 2014

Towards a Normalized Trustworthiness Approach to Enhance Security in On-Line Assessment

Jorge Miguel; Santi Caballé; Fatos Xhafa; Josep Prieto; Leonard Barolli

This paper proposes an approach to enhance information security in on-line assessment based on a normalized trustworthiness model. Among collaborative e-Learning drawbacks which are not completely solved, we have investigated information security requirements in on-line assessment (e-assessment). To the best of our knowledge, security requirements cannot be reached with technology alone, therefore, new models such as trustworthiness approaches can complete technological solutions and support e-assessment requirements for e-Learning. Although trustworthiness models can be defined and included as a service in e-assessment security frameworks, there are multiple factors related to trustworthiness which cannot be managed without normalization. Among these factors we discuss trustworthiness multiple sources, different data source formats, measure techniques and other trustworthiness factors such as rules, evolution or context. Hence, in this paper, we justify why trustworthiness normalization is needed and a normalized trustworthiness model is proposed by reviewing existing normalization procedures for trustworthy values applied to e-assessments. Eventually, we examine the potential of our normalized trustworthiness model in a real online collaborative learning course.


intelligent networking and collaborative systems | 2014

A Methodological Approach to Modelling Trustworthiness in Online Collaborative Learning

Jorge Miguel; Santi Caballé; Fatos Xhafa; Josep Prieto; Leonard Barolli

Trustworthiness and technological security solutions are closely related to online collaborative learning as they can be combined with the aim of reaching information security requirements for e-Learning participants and designers. In this paper, we justify the need of trustworthiness models as a functional requirement devoted to improve information security. To this end, we propose a methodological approach to modelling trustworthiness in online collaborative learning. Our proposal sets out to build a theoretical approach with the aim to provide e-Learning designers and managers with guidelines for incorporating security into online collaborative activities through trustworthiness assessment and prediction.


intelligent networking and collaborative systems | 2014

Predicting Trustworthiness Behavior to Enhance Security in On-line Assessment

Jorge Miguel; Santi Caballé; Fatos Xhafa; Josep Prieto; Leonard Barolli

Over the last decade, information security has been considered a key issue in e-Learning design. Although security requirements can be met with advanced technological approaches and these solutions offer feasible methods in many e-Learning scenarios, on-line assessment activities usually show specific issues that cannot be solved with technology alone. In addition, security vulnerabilities in on-line assessment impede the development of an overall model devoted to manage secure on-line assessment. In this paper, we propose an innovative approach to enhance technological security solutions with trustworthiness. To this end, we endow previous trustworthiness models with prediction features by composing trustworthiness modeling and assessment, normalization methods, history sequences, and neural network-based approaches. In order to validate our approach, we present a peer-to-peer on-line assessment model carried out in a real online course.


2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing | 2014

A Collective Intelligence Approach for Building Student's Trustworthiness Profile in Online Learning

Jorge Miguel; Santi Caballé; Fatos Xhafa; Josep Prieto; Leonard Barolli

Information and communication technologies have been widely adopted in most of educational institutions to support e-Learning through different learning methodologies such as computer supported collaborative learning, which has become one of the most influencing learning paradigms. In this context, e-Learning stakeholders, are increasingly demanding new requirements, among them, information security is considered as a critical factor involved in on-line collaborative processes. Information security determines the accurate development of learning activities, especially when a group of students carries out on-line assessment, which conducts to grades or certificates, in these cases, IS is an essential issue that has to be considered. To date, even most advances security technological solutions have drawbacks that impede the development of overall security e-Learning frameworks. For this reason, this paper suggests enhancing technological security models with functional approaches, namely, we propose a functional security model based on trustworthiness and collective intelligence. Both of these topics are closely related to on-line collaborative learning and on-line assessment models. Therefore, the main goal of this paper is to discover how security can be enhanced with trustworthiness in an on-line collaborative learning scenario through the study of the collective intelligence processes that occur on on-line assessment activities. To this end, a peer-to-peer public students profile model, based on trustworthiness is proposed, and the main collective intelligence processes involved in the collaborative on-line assessments activities, are presented.


intelligent networking and collaborative systems | 2015

A Knowledge Management Process to Enhance Trustworthiness-based Security in On-line Learning Teams

Jorge Miguel; Santi Caballé; Fatos Xhafa

Both information and communication technologies and computer-supported collaborative learning have been widely adopted in many educational institutions. Likewise, general e-assessment processes offer enormous opportunities to enhance students learning experience. In this context, e-Learning stakeholders are increasingly demanding new requirements and, among them, information security in e-Learning stands out as a key factor. One of the key strategies in information security is that security drawbacks cannot be solved with technology solutions alone. Thus we have proposed a functional approach based on trustworthiness, namely, a trustworthiness security methodology. Since this methodology proposes processes and methods, which are closely related to knowledge management, in this paper, we will endow our methodology with current knowledge management processes. For this reason, we analyse the current models and techniques used for general knowledge management to be applied to trustworthy data from e-Learning systems. Moreover, we discuss several issues that arise when managing large data sets that span a rather long period of time. Hence, the main goal of this paper is to analyse existing knowledge management processes to endow our trustworthiness security methodology with a suitable set of knowledge management techniques and models. Finally, we exemplify the approach with trustworthy data of the on-line activity of virtual classrooms in our Virtual Campus of Open University of Catalonia.

Collaboration


Dive into the Jorge Miguel's collaboration.

Top Co-Authors

Avatar

Santi Caballé

Open University of Catalonia

View shared research outputs
Top Co-Authors

Avatar

Fatos Xhafa

Polytechnic University of Catalonia

View shared research outputs
Top Co-Authors

Avatar

Josep Prieto

Open University of Catalonia

View shared research outputs
Top Co-Authors

Avatar

Leonard Barolli

Fukuoka Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jordi Conesa

Open University of Catalonia

View shared research outputs
Top Co-Authors

Avatar

Václav Snášel

Technical University of Ostrava

View shared research outputs
Researchain Logo
Decentralizing Knowledge