Use this URL to cite or link to this record in EThOS:
Title: E-learning stakeholders information security vulnerability model
Author: Mohd Alwi, Najwa Hayaati
Awarding Body: Cranfield University
Current Institution: Cranfield University
Date of Award: 2012
Availability of Full Text:
Access from EThOS:
Access from Institution:
The motivation to conduct this research has come from awareness that the Internet exposes the e-learning environment to information security threats and vulnerabilities. Information security management as practised as a top down approach in many organisations tend to detach of people’s responsibility in ensuring the security of e-learning. Literature has pointed out that people’s behaviour required to be addressed to control the information security threats. This research proposes an ISM human behaviour model for e-learning provider in public universities in Malaysia. With socio technical reflection, this model aims to improve the implementation and management of information security in e-learning taking consideration of the user perspective. This research consists of four phases, the Planning phase, Data Collection and Analysis Phase, Model development Phase and Discussion and Conclusion Phase. A pilot study highlighted data confidentiality difficulties and pointed to data collection by using existing public from multiple sources. Six multi-method studies were conducted to generate the dimensions for the model development. Review from expert confirmed the research findings and validated the practicality of addressing people behaviours in information security management. This research contributes to better understanding of the people complexity in information security. The research suggests that the culture view of individual is significant in preparing information security management. This model makes clear the influence of people towards security threats and vulnerabilities. This approach can guide on what can be done to improve the stakeholder’s participation and responsibilities on securing e-learning. This research is also extending the existing knowledge of information security and e-learning fields by analytically focussing on the intersection of both fields. New knowledge about the security in e-learning environment from the users’ perspective is derived.
Supervisor: Fan, Ip-Shing Sponsor: Not available
Qualification Name: Thesis (Ph.D.) Qualification Level: Doctoral
EThOS ID:  DOI: Not available