An integrated framework for the security of e-learning systems in higher education institutions

被引:0
作者
AlKalbani, Hajar Rashid [1 ]
Al-Busaidi, Kamla Ali [1 ]
机构
[1] Sultan Qaboos Univ, Informat Syst Dept, POB 20, Al Khoud 123, Oman
关键词
E-learning; E-learning security; Information systems security; Security framework; MANAGEMENT; SUCCESS;
D O I
10.1007/s10639-025-13634-1
中图分类号
G40 [教育学];
学科分类号
040101 ; 120403 ;
摘要
This study aims to develop an integrated framework for the security of e-learning systems. As a main knowledge management system (KMS) in higher education institutions, the security of the e-learning system is critical. The literature indicated that inadequate security measures make it difficult for e-learning systems to fend off cyberattacks. Researchers underline the importance of comparing IS security frameworks based on institutional needs. Thus, the study evaluates three current common security frameworks in the context of KMS and e-learning and proposes an integrated framework to improve the security of e-learning systems. The study interviewed 13 IT managers and/or e-learning administrators in Omani higher academic institutions and used N-Vivo software for content analysis. The findings indicated that an effective e-learning security framework must include the following 10 components. These components are: (1) Risk management, (2) Policy Compliance, (3) Resource Optimization, (4) Stakeholder Involvement, (5) Control Environment, (6) Maturity Level Measurement, (7) IT Governance, (8) E-learning Index Value and Services, (9) Continuous Service Improvement, and (10) Monitoring and Evaluation. The results also highlighted several activities under each e-learning security component. The study contributes to the literature by enriching the understanding of the security of e-learning. The integrated framework can be used as a practical guide for practitioners in higher education institutions.
引用
收藏
页数:30
相关论文
共 88 条
[61]   Big data analytics: a link between knowledge management capabilities and superior cyber protection [J].
Obitade, Peter Oluseyi .
JOURNAL OF BIG DATA, 2019, 6 (01)
[62]  
Parker C., 2019, SNOWBALL SAMPLING, DOI DOI 10.4135/9781526421036831710
[63]  
Pasikowski S., 2024, Przegld Bada Edukacyjnych (Educational Studies Review), V2, P105, DOI [10.12775/PBE.2023.030, DOI 10.12775/PBE.2023.030, 10.12775/pbe.2023.030]
[64]  
Popping R., 2015, Bull. Sociol. Methodol., V128, P23, DOI DOI 10.1177/0759106315597389
[65]  
Qwaider WQ., 2011, Journal of Emerging Trends in Computing and Information Sciences, V2, P485
[66]  
Radwan A., 2017, International Journal for E-Learning Security
[67]  
Ramalingam R, 2016, Arxiv, DOI arXiv:1605.05580
[68]  
Ravitch S., 2019, QUALITATIVE RES BRID, V2nd
[69]  
Rodrguez-Gmez D., 2015, Computers Security, V55, P56
[70]  
Rogava J., 2022, arXiv