E-learning stakeholders information security vulnerability model

Doctoral thesis English OPEN
Mohd Alwi, Najwa Hayaati (2012)
  • Publisher: Cranfield University

The motivation to conduct this research has come from awareness that the Internet exposes the e-learning environment to information security threats and vulnerabilities. Information security management as practised as a top down approach in many organisations tend to detach of people’s responsibility in ensuring the security of e-learning. Literature has pointed out that people’s behaviour required to be addressed to control the information security threats. This research proposes an ISM human behaviour model for e-learning provider in public universities in Malaysia. With socio technical reflection, this model aims to improve the implementation and management of information security in e-learning taking consideration of the user perspective. This research consists of four phases, the Planning phase, Data Collection and Analysis Phase, Model development Phase and Discussion and Conclusion Phase. A pilot study highlighted data confidentiality difficulties and pointed to data collection by using existing public from multiple sources. Six multi-method studies were conducted to generate the dimensions for the model development. Review from expert confirmed the research findings and validated the practicality of addressing people behaviours in information security management. This research contributes to better understanding of the people complexity in information security. The research suggests that the culture view of individual is significant in preparing information security management. This model makes clear the influence of people towards security threats and vulnerabilities. This approach can guide on what can be done to improve the stakeholder’s participation and responsibilities on securing e-learning. This research is also extending the existing knowledge of information security and e-learning fields by analytically focussing on the intersection of both fields. New knowledge about the security in e-learning environment from the users’ perspective is derived.
  • Metrics
    views in OpenAIRE
    views in local repository
    downloads in local repository

    The information is available from the following content providers:

    From Number Of Views Number Of Downloads
    Cranfield CERES - IRUS-UK 0 184
Share - Bookmark

  • Download from
    Cranfield CERES via Cranfield CERES (Doctoral thesis, 2012)
  • Cite this publication