References
- Doo-Hyun Kim and Jong-Ho Lee, "Qualitative Assessment for Hazard on the Electric Power Installations of a Construction Field using FMEA," Journal of the Korean Society of Safety, Vol.19, No.14, pp.36-41, 2004,
- S.Y. Kim, W.Y. Yun, and H.G. kim, "Reestablishment of RPN Evaluation Method in FMEA Procedure for Motors in Household Appliances," Journal of the Korean Society for Quality Management, Vol.35, No.1, pp.1-9, 2007.
- Eun-Mi Kim, "Safety Verification Method Based on Fault Tree Analysis," Proceedings of the Korean Information Science Society, Vol.25, No.2, pp.582-584, 1998.
- Hyo Young Kim and Hyuk Soo Han, "A Defect Prevention Model based on SW-FMEA," Journal of Korean Information Science Society, Vol.33, No.7, pp.605-614, 2006.
- Myonghee Kim and Man-Gon Park, "A Study on the Software Fault Modes and Effect Analysis for Software Safety Evaluation," Journal of the Korean Multimedia Society, Vol.15, No.1, pp.113-130, 2012. https://doi.org/10.9717/kmms.2012.15.1.115
- Man-Gon Park and Su-Do Kim, "The Architecture of e-Teaching and Learning System based on the CBD," Proceedings of the Korean Multimedia Society, Vol.7, No.2, pp.113-116, 2004.
- Hyun Ki Park, "A Study on Methods of Fault Analysis and the Failure Effect Analysis for Security Improvement of e-Teaching and Learning System", Ph.D Dissertation of the PuKyong National University, 2012.
- S.W. Lee, Y.H. Kim, H.J. Seo, J.H. Kim, and K.A. Moon, "Next Generation e-Learning Service: Focused on e-Learning System," ETRI Electronics and Communication Trend Analysis, Vol.20, No.4, pp.155-166, 2005.
- Ik-Sung Lee, "A Study for Quality Improvement of Convention by Failure Mode and Effects Analysis," Journal of the Korean Convention Society, Vol.5, No.1, pp.101-107, 2005.
- Joong-Soon Jang, "A Study on Performing FMEA Effectively," Journal of the Korean Institute of Plant Engineering, Vol.4, No.4, pp.69-77, 1999.
- Joong-Soon Jang and Dong-Geun An, "How to Perform FMEA Effectively," Journal of the Korean Society of Quality Management, Vol.25, No.1, pp.156-172, 1997.
- Adem Sabic and Jasmin Azemovic, "Model of Efficient Assessment System with Accent on Privacy, Security and Integration with e-University Components," Second International Conference on Education Technology and Computer(ICETC), Vol.3, pp.128-131, 2010.
- Edgar R. Weippl, "Security in e-Learning," Springer, 2005.
- Galyna Akmayeva, Charles Shoniregun, "Ontology of e-Learning Security," International Conference on Information Society (i-Society), pp.652-655, 2010.
- Jeffy Mwakalinga, Stewart Kowalski, and Louise Yngstrom, "Secure E-learning Using a Holistic and Immune Security Framework," International Conference for Internet Technology and Secured Transactions,(ICITST), pp.1-6, 2009.
- Jianming Yong, "Security Modelling for e-Learning," First IEEE International Symposium on Information Technologies and Applications in Education(ISITAE), pp.1-5, 2007.
- M. Ben-Daya and Abdul Raouf, "A Revised Failure Mode and Effects Analysis Model," International Journal of Quality & Reliability Management, Vol.13, No.1, pp.43-47, 1996. https://doi.org/10.1108/02656719610108297
- M. Warren and W. Hutchinson, "Information Security-An E-learning Problem," Lecture Notes in Computer Science, Vol.2783, pp.21-26, 2003.
- Najwa Hayaati Mohd Alwi and Ip-Shing Fan, "Information Security Management in E-Learning," International Journal of Technology Enhanced Learning, Vol.3, pp.358-371, 2010.
- N. Snooke and C. Price, "Model-driven automated software FMEA," Proceedings of Reliability and Maintainability Symposium (RAMS), pp.1-6, 2011.
- Najwa Hayaati Mohd Alwi and Ip-Shing Fan, "Information Security Management in E-Learning," International Conference for Internet Technology and Secured Transactions(ICITST), pp.1-6, 2009.
- Pascal Bou Nassar and Youakim Badr, "Towards Integrating Security Services in e-learning Platforms," International Conference on Advances in Computational Tools for Engineering Applications(ACTEA), pp.573-577, 2009.
- Prveen Kumar, Shefalika Ghoch Samaddar, Arun B. Samaddar, and Arun Kumar Misra, "Extending IEEE LTSA e-Learning Framework in Secured SOA Environment," Second International Conference on Education Technology and Computer(ICETC), Vol.2, pp.136-140, 2010.
- Rodrigo de Queiroz Souza and Alberto Jose Alvares, "FMEA and FTA Analysis for Application of the Reliability Centered Maintenance Methodology: Case Study on Hydraulic Turbines," ABCM Symposium Series in Mechatronic, Vol.3, pp.803-812, 2008.
- Ruth Raitman, Leanne Ngo, Naomi Augar, and Wanlei Zhou, "Security in the Online e-learning Environment," Fifth IEEE International Conference on Advanced Learning Technologies(ICALT), pp.702-706, 2005.
- Sigrid Schubert, Andreas Schwill (Advisors) and Christian Josef Eibl (Recipient), "Discussion of Information Security in E-Learning," Ph. D Thesis, Dept. of Computer Science, University of Siegen, Germany, pp.1-193, 2010. Retrieved on 16th November 2011 from http://dokumentix.ub.unisiegen. de/opus/volltexte/2010/444/
- Taiwo Ayodele, Charles A. Shoniregun, and Galyna Akmayeva, "Towards e-Learning Security: A Machine Learning Approach," International Conference on Information Society (i-Society), pp.490-492, 2011.
- Zhang Hong and Liu Binbin, "Integrated Analysis of Software FMEA and FTA," Proceedings of International Conference on Information Technology and Computer Science, pp.184-187, 2009.
Cited by
- FTA-FMEA-based validity verification techniques for safety standards vol.34, pp.3, 2017, https://doi.org/10.1007/s11814-016-0321-1