Exploring security perception of learning management system (LMS) portal

The advancement of information technology has changed the education landscape. Information technology has made e-learning possible and available on a large scale. The main component of an e-learning is a learning management system (LMS). By connected and accessed to the Internet, LMS are exposed to various threats. Proper understanding of these threats combined with strategy and best practices countermeasures will ensure a safe learning environment. Therefore this study will briefly explain ten domains of information security and presents the result on a survey on student's information security perception of a learning management system. Overall, respondent has strong positive perceptions towards security of their LMS. This study provides an overall picture of information security elements of a learning management system. It can serve as an introduction which help LMS administrator to understand the issues and possibilities related to the safety of LMS.

[1]  Reihaneh Safavi-Naini,et al.  Digital Rights Management for Content Distribution , 2003, ACSW.

[2]  Kevin Henry,et al.  Official (ISC)2 Guide to the CISSP CBK ((Isc)2 Press Series) , 2006 .

[3]  Dale A. Harris Online distance education in the United States , 1999, IEEE Commun. Mag..

[4]  Sik Sumaedi,et al.  The Effect of Students' Perceived Service Quality and Perceived Price on Student Satisfaction , 2011 .

[5]  Steven Hernandez Cissp Official (ISC)2 Guide to the CISSP CBK , 2012 .

[6]  Kyu Yon Lim,et al.  Online university students' satisfaction and persistence: Examining perceived level of presence, usefulness and ease of use as predictors in a structural model , 2011, Comput. Educ..

[7]  S. Levy,et al.  Six Factors to Consider when Planning Online Distance Learning Programs in Higher Education , 2003 .

[8]  Jacquie Kelly,et al.  Building trust and shared knowledge in communities of e-learning practice: collaborative leadership in the JISC eLISA and CAMEL lifelong learning projects , 2006, Br. J. Educ. Technol..

[9]  Geoffrey Crisp A model for the implementation and sustainability of a course management system in a research university , 2002, ASCILITE.

[10]  Timothy K. Shih,et al.  Security and privacy technologies for distance education applications , 2004, 18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004..

[11]  Tim Lane,et al.  A Model for Improving e-Security in Australian Universities , 2006, J. Theor. Appl. Electron. Commer. Res..

[12]  Ahmad Jalal,et al.  Security Enhancement for E-Learning Portal , 2008 .

[13]  Louise Yngström,et al.  State of ICT security management in the institutions of higher learning in developing countries: Tanzania case study , 2005, Fifth IEEE International Conference on Advanced Learning Technologies (ICALT'05).

[14]  Graça Bressan,et al.  An online Web course environment and its application , 2000, 30th Annual Frontiers in Education Conference. Building on A Century of Progress in Engineering Education. Conference Proceedings (IEEE Cat. No.00CH37135).

[15]  Nor Azila Mohd Noor,et al.  Journal of Internet Banking and Commerce the Relationship between E-service Quality and Ease of Use on Customer Relationship Management (crm) Performance: an Empirical Investigation in Jordan Mobile Phone Services , 2022 .

[16]  Neil F. Doherty,et al.  The information security policy unpacked: A critical study of the content of university policies , 2009, Int. J. Inf. Manag..

[17]  Mark Stamp,et al.  Information security - principles and practice , 2005 .

[18]  Elmarie Kritzinger,et al.  E-learning: Incorporating Information Security Governance , 2006 .

[19]  Hassan M. Selim,et al.  Critical success factors for e-learning acceptance: Confirmatory factor models , 2007, Comput. Educ..

[20]  Steven Furnell,et al.  A security framework for online distance learning and training , 1998, Internet Res..