E-learning stakeholders information security vulnerability model

Show simple item record

dc.contributor.advisor Fan, Ip-Shing
dc.contributor.author Mohd Alwi, Najwa Hayaati
dc.date.accessioned 2012-07-16T15:34:53Z
dc.date.available 2012-07-16T15:34:53Z
dc.date.issued 2012-03
dc.identifier.uri http://dspace.lib.cranfield.ac.uk/handle/1826/7387
dc.description.abstract The motivation to conduct this research has come from awareness that the Internet exposes the e-learning environment to information security threats and vulnerabilities. Information security management as practised as a top down approach in many organisations tend to detach of people’s responsibility in ensuring the security of e-learning. Literature has pointed out that people’s behaviour required to be addressed to control the information security threats. This research proposes an ISM human behaviour model for e-learning provider in public universities in Malaysia. With socio technical reflection, this model aims to improve the implementation and management of information security in e-learning taking consideration of the user perspective. This research consists of four phases, the Planning phase, Data Collection and Analysis Phase, Model development Phase and Discussion and Conclusion Phase. A pilot study highlighted data confidentiality difficulties and pointed to data collection by using existing public from multiple sources. Six multi-method studies were conducted to generate the dimensions for the model development. Review from expert confirmed the research findings and validated the practicality of addressing people behaviours in information security management. This research contributes to better understanding of the people complexity in information security. The research suggests that the culture view of individual is significant in preparing information security management. This model makes clear the influence of people towards security threats and vulnerabilities. This approach can guide on what can be done to improve the stakeholder’s participation and responsibilities on securing e-learning. This research is also extending the existing knowledge of information security and e-learning fields by analytically focussing on the intersection of both fields. New knowledge about the security in e-learning environment from the users’ perspective is derived. en_UK
dc.language.iso en en_UK
dc.publisher Cranfield University en_UK
dc.rights © Cranfield University 2012. All rights reserved. No part of this publication may be reproduced without the written permission of the copyright owner. en_UK
dc.title E-learning stakeholders information security vulnerability model en_UK
dc.type Thesis or dissertation en_UK
dc.type.qualificationlevel Doctoral en_UK
dc.type.qualificationname PhD en_UK


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search CERES


Browse

My Account

Statistics