DOI QR코드

DOI QR Code

Information Security on Learning Management System Platform from the Perspective of the User during the COVID-19 Pandemic

  • Received : 2022.12.02
  • Accepted : 2023.01.25
  • Published : 2023.03.31

Abstract

Information security breach is a major risk in e-learning. This study presents the potential information security disruptions in Learning Management Systems (LMS) from the perspective of users. We use the Technology Acceptance Model approach as a user perception model of information security, and the results of a questionnaire comprising 44 questions for instructors and students across Indonesia to verify the model. The results of the data analysis and model testing reveals that lecturers and students perceive the level of information security in the LMS differently. In general, the information security aspects of LMSs affect the perceptions of trust of student users, whereas such a correlation is not found among lecturers. In addition, lecturers perceive information security aspect on Moodle is and Google Classroom differently. Based on this finding, we recommend that institutions make more intense efforts to increase awareness of information security and to run different information security programs.

Keywords

Acknowledgement

The authors would like to thank LPPM Universitas Bhayangkara Jakarta Raya, who supported this research through research funding contract No.: PK/ 16 / IV /LPPMPUBJ/PENELITIAN/2022.

References

  1. M. Sadikin and S. K. Purwanto, "The implementation of e-Learning system governance to deal with user need , institution objective , and regulation compliance," Telecommunication Computing Electronics and Control, vol. 16, no. 3, pp. 1332-1344, Jun. 2018. DOI: 10.12928/telkomnika.v16i3.8699.
  2. M. Sadikin and S. Purwanto, "To govern e-learning system: A proposal to deal with regulation complience, institution objective and user need," in 83rd ISERD International Conference, Barcelona, Spain, pp. 33-38. 2017. [Online]. Available: http://www.worldresearchlibrary.org/up_proc/pdf/1021-150536458933-38.pdf.
  3. N. R. Maulana and A. P. Lintangsari, "The use of Moodle in English language learning during the pandemic: The students voice," The Journal of English Literacy Education, vol. 8, no. 1, pp. 27-41, May 2021. DOI: 10.36706/jele.v8i1.14020.
  4. R. Quansah and C. Essiam, "The Use of Learning Management System (LMS) Moodle in the midst of Covid-19 Pandemic: Students' perspective," Journal of Educational Technology and Online Learning, vol. 4, no. 3, pp. 418-431, Sep. 2021. DOI: 10.31681/jetol.934730.
  5. Sukmawati, "Implementasi pemanfaatan Google Classroom dalam proses pembelajaran online di era industri 4.0," Jurnal Kreatif Online, vol. 8, no. 1, 2020.
  6. R. Atikah, R. T. Prihatin Titik, H. Hernayati, and J. Misbah, "Pemanfaatan google classroom sebagai media pembelajaran di masa pandemi covid-19," Jurnal Pendidikan Teknologi Informasi Dan Komunikasi, vol. 7, no. 1, pp. 7-18, Mar. 2021. DOI: 10.31980/jpetik.v7i1. 988.
  7. B. Kwofie and A. Henten, "The advantages and challenges of elearning implementation:The story of a developing nation," in 3rd World Conference on Educational Science, Istabul, Turkey, 2011. [Online] Available: https://vbn.aau.dk/en/publications/the-advantagesand-challenges-of-e-learning-implementation-the-st.
  8. M. M. Alkharang and G. Ghinea, "E-learning in higher educational institutions in Kuwait: Experiences and challenges," International Journal of Advanced Computer Science and Application., vol. 4, no. 4, pp. 1-6, Apr. 2013. DOI: 10.14569/IJACSA.2013.040401.
  9. W. M. Al-Rahmi, N. Yahaya, A. A. Aldraiweesh, M. M. Alamri, N. A. Aljarboa, U. Alturki, and A. A. Aljeraiwi, "Integrating technology acceptance model with innovation diffusion theory: An empirical investigation on students' intention to use e-learning systems," IEEE Access, vol. 7, pp. 26797-26809, Feb. 2019. DOI: 10.1109/ACCESS.2019.2899368.
  10. A. Purwanto, "University students online learning system during Covid-19 pandemic: Advantages, constraints and solutions," Systematic Reviews in Pharmacy, vol. 11, no. 7, pp. 570-576, 2020. DOI: 10.31838/srp.2020.7.81.
  11. M. P. A. Murphy, "COVID-19 and emergency eLearning: Consequences of the securitization of higher education for postpandemic pedagogy," Contemporary Security Policy, vol. 41, no. 3, pp. 492-505, Apr. 2020. DOI: 10.1080/13523260.2020.1761749.
  12. M. Giatman, S. Siswati, and I. Y. Basri, "Online learning quality control in the pandemic covid-19 era in Indonesia," Journal of Nonformal Education, vol. 6, no. 2, pp. 168-175, Aug. 2020. [Online]. Available: https://journal.unnes.ac.id/nju/index.php/jne/article/view/25594.
  13. M. Hafeez, Q. A. Kazmi, and F. Tahira, "Challenges faced by the teachers and students in online learning during covid-19," Journal Cakrawala Pendidikan, vol. 41, no. 1, pp. 55-70, Feb. 2022. DOI: 10.21831/cp.v41i1.35411.
  14. N. Islam, M. Beer, and F. Slack, "E-Learning challenges faced by academics in higher education: A literature review," Journal of Education and Training Studies, vol. 3, no. 5, pp. 102-112, Jul. 2015. DOI: 10.11114/jets.v3i5.947.
  15. M. V. Zharova, S. Y. Trapitsin, V. V. Timchenko, and A. I. Skurihina, "Problems and opportunities of using LMS moodle before and during COVID-19 quarantine: Opinion of teachers and students," in Proceedings of the 2020 International Conference Quality Management, Transport and Information Security, Information Technologies, Yaroslavl, Russia, pp. 554-557, 2020. DOI: 10.1109/ITQMIS51053.2020.9322906.
  16. F. Shersad and S. Salam, "Managing risks of E-learning during COVID-19," International Journal of Innovation and Research in Educational Science, vol. 7, no. 4, pp. 348-358, Jul. 2020. [Online]. Available: https://www.ijires.org/index.php/issues?view=publication&task=show&id=593
  17. L. C. R. Salvador, C. L. A. Llerena, and H. P. Dai Nguyen, "Digital education: Security challenges and best practice," Security Science Journal, vol. 2, no. 2, pp. 65-76, Dec. 2021. DOI: 10.37458/ssj.2.2.4.
  18. I. Cvitic, D. Perakovic, M. Perisa, and A. D. Jurcut, "Methodology for detecting cyber intrusions in e-learning systems during COVID-19 pandemic," Mobile Networks and Applications, Jun. 2021. DOI: 10.1007/s11036-021-01789-3.
  19. Unesco, "UNESCO's Covid-19 education response: Distance learning solution," 2020. [Online] Available: https://webarchive.unesco.org/web/20221007040001/https:/en.unesco.org/covid19/educationresponse/solutions.
  20. W. Fenton, "The Best LMS (Learning Management Systems) of 2017 | PCMag.com," 2017. [Online] Available: https://www.pcmag.com/roundup/336308/the-best-lms-learning-management-systems.
  21. J. T. Nagy, "Using learning management systems in business and economics studies in Hungarian higher education," Education and Information Technologies, vol. 21, no. 4, pp. 897-917, Jul. 2016. DOI: 10.1007/s10639-014-9360-6.
  22. M. Shkoukani, "Explore the major characteristics of learning management systems and their impact on e-learning success," International Journal of Advanced Computer Science and Applications, vol. 10, no. 1, pp. 296-301, 2019. DOI: 10.14569/ijacsa.2019.0100139.
  23. B. Warin, O. Talbi, C. Kolski, and F. Hoogstoel, "Multi-Role Project (MRP): A new project-based learning method for STEM," IEEE Transactions on Education., vol. 59, no. 2, pp. 137-146, May. 2016. DOI: 10.1109/TE.2015.2462809.
  24. R. K. Kampa and P. Kaushik, "Integrating the Library within the Moodle Learning Managament system: A case study," Journal of Library & Information Science, vol. 6, no. 4, pp. 702-710, Dec. 2016. [Online]. Available: http://irjlis.com/integrating-the-library-withinthe-moodle-learning-management-system-a-case-study/.
  25. M. Sadikin, R. Yusuf, and A. R. Dwiyanto, "Load balancing clustering on Moodle LMS to overcome performance issue of elearning system," Journal of Telecommunication Computing Electronics and Control, vol. 17, no. 1, pp. 131-138, Feb. 2019. DOI: 10.12928/telkomnika.v17i1.10284.
  26. M. Hossain, "Unequal experience of COVID-induced remote schooling in four developing countries," International Journal of Educational Development, vol. 85, pp. 102446, Sep. 2021. DOI: 10.1016/j.ijedudev.2021.102446.
  27. M. Jebbour, "The unexpected transition to distance learning at Moroccan universities amid COVID-19 : A qualitative study on faculty experience," Social Sciences & Humanities Open, vol. 5, no. 1, pp. 100253, 2022. DOI: 10.1016/j.ssaho.2022.100253.
  28. R. M. Saidi, A. A. Sharip, N. Z. Abd Rahim, Z. A. Zulkifli, and S. M. M. Zain, "Evaluating students' preferences of Open and Distance Learning (ODL) tools," Procedia Computer Science., vol. 179, pp. 955-961, 2021. DOI: 10.1016/j.procs.2021.01.085.
  29. S. M. Saha. S. A. Pranty, M. J. Rana, M. J. Islam, and M. E. Hossain, "Teaching during a pandemic : Do university teachers prefer online teaching ?," Heliyon, vol. 8, no. 1, p. e08663, Jan. 2022. DOI: 10.1016/j.heliyon.2021.e08663.
  30. A. Q. Noori, "The impact of COVID-19 pandemic on students' learning in higher education in Afghanistan," Heliyon, vol. 7, no. 10, p. e08113, Oct. 2021. DOI: 10.1016/j.heliyon.2021.e08113.
  31. S. A. Naroo, P. B. Morgan, L. Shinde, and A. Ewbank, "The impact of COVID-19 on global contact lens education," Journal of Optometry., vol. 15, no. 1, pp. 60-68, Jan. 2022. DOI: 10.1016/j.optom.2020.11.002.
  32. S. Yani, "Pemamfaatan E-Learning Berbasis Google Classroom Sebagai Media Pembelajaran Pada Masa Pandemic Covid-19," Prosiding Seminar Nasinal., vol. 1, no. 1, 2021.
  33. H. S. Su'uga, E. Ismayati, A. I. Agung, and T. Rijanto, "Media elearning berbasis Google Classroom untuk meningkatkan hasil belajar siswa SMK," Jurnal Pendidikan Teknik Elektro, vol. 9, no. 3, pp. 605-610, Sep. 2020. [Online] Available: https://ejournal.unesa.ac.id/index.php/jurnal-pendidikan-teknik-elektro/article/view/36253.
  34. S. Soni, A. Hafid, R. Hayami, Y. Fatma, and F. A. Wenando, J. A. Amien, E. Fuad, M. Unik, H. Mukhtar, H. Hasanuddin, "Optimalisasi pemanfaatan google classroom sebagai media pembelajaran di SMK NEGERI 1 Bangkinang," Jurnal Pengabdian Untuk Mu negeRI, vol. 2, no. 1, pp. 17-20, 2018. DOI: 10.37859/jpumri.v2i1.361.
  35. M. Button, R. Klahr, J. N. Shah, P. Sheriffs, T. Rossington, G. Pestell, and V. Wang, "Cyber Security Breaches Survey 2016," Department for Digital Culture Media and Sport, 2018. DOI: 10.13140/RG.2.1.4332.6324.
  36. "Electronic Record Systems and Individual Privacy," Computers & Security, vol. 5, no. 4 pp. 361-362, Dec. 1986. DOI: 10.1016/0167-4048(86)90061-1.
  37. N. Sakiba, "Security challenges for e-learning ecosystems," Norwegian University of Secience and Technology, 2017. [Online] Available: https://www.researchgate.net/publication/319130727_Security_challenges_for_e-learning_ecosystems
  38. H. W. Glaspie and W. Karwowski, "Human Factors in Information Security Culture: A Literarture Review," Advances in Intelligent Systems and Computing, vol. 593, pp. 269-280, 2017. DOI: 10.1007/978-3-319-60585-2_25.
  39. M. Dark, R. Epstein, L. Morales, T. Countermine, Q. Yuan, M. Ali, M. Rose, and N. Harter, "A Framework for Information Security Ethics Education," in Proceedings of the 10th Colloquium for Information Systems Security Education, vol. 4, pp. 109-115, 2006.
  40. ISACA, "Audit/Assurance," 2014. http://www.isaca.org/KNOWLEDGECENTER/RESEARCH/Pages/Audit-Assurance-Programs.aspx.
  41. ISACA, CGEIT Review Manual, 7th ed. Rolling Meadow, IL, USA: ISACA, 2017. [Online] Available: www.isaca.org.
  42. W. Q. Qwaider, "Information Security and Learning Content Management System (LCMS)," International Journal of Advanced Computer Science and Applications, vol. 8, no. 11, pp. 588-593, 2017. DOI: 10.14569/IJACSA.2017.081174.
  43. N. A. Lavanya, M. Buvana, and D. Shanthi, "Detection of Security Threats and Vulnerabilities of E-Learning Systems In Cloud Computing," Advances in Natural and Applied Sciences, vol. 11, no. 7, pp. 550-559, May. 2017.
  44. S. H. Hasan, D. M. Alghazzawi, and A. Zafar, "E-Learning Systems and their Security," MAGNT Research Report, vol. 2, no. 3, pp. 83-92, 2016. DOI: 14.9831/0971-9563.2014/2-3/BRIS.10. 14.9831/0971-9563.2014/2-3/BRIS.10
  45. S. Beaudin, "An empirical study of authentication methods to secure e-learning system activities against impersonation fraud," Ph. D. dissertation, Nova Southeastern University, vol. 4, no. 1, pp. 42-61, 2016. DOI: 10.36965/OJAKM.2016.4(1)42-61.
  46. K. Nagata, Y. Kigawa, and T. Aoki, "Trial for e-learning system on information security incorporate with learning style and consciousness factors," International Journal of Engineering Pedagogy, vol. 8, no. 3, pp. 120-136, May. 2018. DOI: 10.3991/ijep.v8i3.8163.
  47. Piyushika and K. N. Singh, "Review of cloud security for e-Learning system," International Journal of Computer Science and Technology., vol. 6, no. 2, pp. 85-89, Jan. 2015. [Online] Available: https://www.researchgate.net/publication/281096002_Review_of_Cloud_Security_for_E-Learning_System. 1096002_Review_of_Cloud_Security_for_E-Learning_System
  48. F. Kanwal and M. Rehman, "Factors affecting e-learning adoption in developing dountries - Empirical evidence from Pakistan's higher education sector," IEEE Access, vol. 5, pp. 10968-10978, 2017. DOI: 10.1109/ACCESS.2017.2714379.
  49. J. C. Roca, J. J. Garcia, and J. J. de la Vega, "The importance of perceived trust, security and privacy in online trading systems," Informtion Management Computer Security, vol. 17, no. 2, pp. 96-113, Jun. 2009. DOI: 10.1108/09685220910963983.
  50. Y. H. Lee, Y. C. Hsieh, and C. N. Hsu, "Adding innovation diffusion theory to the technology acceptance model: Supporting employees' intentions to use e-learning systems," Educational Technology and Society, vol. 14, no. 4, pp. 124-137, 2011. [Online]. Available: https://eric.ed.gov/?id=EJ963285
  51. S. Asiyah, C. W. Budiyanto, and A. G. Tamrin, "Technology acceptance model in the analysis of the influence of e-learning implementation to students' motivation," Indonesian Journal of Informatics Education, vol. 2, no. 1, pp. 55-60, Jun. 2018. DOI: 10.20961/ijie.v2i1.14496.
  52. Y. K. Mittal, S. Roy, and M. Saxena, "Role of knowledge management in enhancing information security," International Journal of Computer Science Issues, vol. 7, no. 6, pp. 320-324, Nov. 2010. [Online] Available: https://www.ijcsi.org/papers/7-6-320-324.pdf.
  53. A. R. Ahlan, M. Lubis, and A. R. Lubis, "Information security awareness at the knowledge-based institution: Its antecedents and measures," in The Third Information Systems International Conference, vol. 72, pp. 361-373, 2015. DOI: 10.1016/j.procs.2015.12.151.
  54. F. J. Haeussinger and J. Kranz, "Information security awareness: Its antecedents and mediating effects on security compliant behavior," in 34th International Conference on Information System, Milan, Italy, pp. 1-16, 2013. [Online] Available: https://www.researchgate.net/publication/258926834_Information_Security_Awareness_Its_Antecedents_and_Mediating_Effects_on_Security_Compliant_Behavior.
  55. T. Gundu and S. V. Flowerday, "Ignorance to awareness: Towards an information security awareness process," SSAIEE Africa Research Journal., vol. 104, no. 2, pp. 69-79, Jun. 2013. DOI: 10.23919/SAIEE.2013.8531867.
  56. D. G. Bonett and T. A. Wright, "Cronbach's alpha reliability: Interval estimation, hypothesis testing, and sample size planning," Journal of Organizational Behavior, vol. 36, no. 1, pp. 3-15, Jan. 2015. DOI: 10.1002/job.1960.
  57. J. C. Nunnally and I. H. Bernstein, "Psychometric Theory" Third. New York, USA: McGraw-Hill, New York, 1994.
  58. M. Saunders, P. Lewis, and A. Thornhill, "Research Methods for Business Students," 4th edition Pearson Education Limited, England, vol. 6, no. 3, 2008.