E-learning stakeholders information security vulnerability model

Date published

2012-03

Free to read from

Supervisor/s

Journal Title

Journal ISSN

Volume Title

Publisher

Cranfield University

Department

Type

Thesis or dissertation

ISSN

Format

Citation

Abstract

The motivation to conduct this research has come from awareness that the Internet exposes the e-learning environment to information security threats and vulnerabilities. Information security management as practised as a top down approach in many organisations tend to detach of people’s responsibility in ensuring the security of e-learning. Literature has pointed out that people’s behaviour required to be addressed to control the information security threats. This research proposes an ISM human behaviour model for e-learning provider in public universities in Malaysia. With socio technical reflection, this model aims to improve the implementation and management of information security in e-learning taking consideration of the user perspective. This research consists of four phases, the Planning phase, Data Collection and Analysis Phase, Model development Phase and Discussion and Conclusion Phase. A pilot study highlighted data confidentiality difficulties and pointed to data collection by using existing public from multiple sources. Six multi-method studies were conducted to generate the dimensions for the model development. Review from expert confirmed the research findings and validated the practicality of addressing people behaviours in information security management. This research contributes to better understanding of the people complexity in information security. The research suggests that the culture view of individual is significant in preparing information security management. This model makes clear the influence of people towards security threats and vulnerabilities. This approach can guide on what can be done to improve the stakeholder’s participation and responsibilities on securing e-learning. This research is also extending the existing knowledge of information security and e-learning fields by analytically focussing on the intersection of both fields. New knowledge about the security in e-learning environment from the users’ perspective is derived.

Description

Software Description

Software Language

Github

Keywords

DOI

Rights

© Cranfield University 2012. All rights reserved. No part of this publication may be reproduced without the written permission of the copyright owner.

Relationships

Relationships

Resources

Funder/s