Share This Article:

A Novel Information Security Scheme for E-Learning Infrastructure Success Based on TRI Model

DOI: 10.4236/oalib.1101424    652 Downloads   1,035 Views   Citations

ABSTRACT

The fast growth of the Internet proposes and offers several new applications and advanced services that has greatly and quickly innovated the educational environment. The platform of e-learning represents an attractive educational field where the acceptance or utilization progresses and more and more people are taking courses or training using this technology. Mainly, e-learning platform exploits Internet infrastructure which became location for illegal events and actions, especially exposed to several kinds of threats or attacks. Furthermore, most of e-learning platforms are designed without taking into account security concerns. In this paper, we present e-learning environment, especially characteristics, development, growth, benefits and challenges. We also discussed and used TRI (Technology Readiness Index) which is considered a widely accepted metric for studying the behavior process behind the utilization of technological products and services. The results of the conducted TRI study demonstrate the need for a security scheme that incorporates students’ behaviors and requirements for improving e-learning usage. For this reason, we develop a new security scheme that combines the use of information service management (ISM) and a hybrid algorithm for guaranteeing the needed security requirements. Finally, we demonstrate that our proposal can guarantee the suitable environment which provides students’ satisfaction and acceptance as well as e-leaning success.

Conflicts of Interest

The authors declare no conflicts of interest.

Cite this paper

Khlifi, Y. and Bessadok, A. (2015) A Novel Information Security Scheme for E-Learning Infrastructure Success Based on TRI Model. Open Access Library Journal, 2, 1-12. doi: 10.4236/oalib.1101424.

References

[1] Sun, P.C., Ray, J.T., Finger, G., Chen, Y.Y. and Yeh, D. (2008) What Drives a Successful E-Learning? An Empirical Investigation of the Critical Factors Influencing Learner Satisfaction. Computers and Education, Elsevier, 50, 1183-1202.
http://dx.doi.org/10.1016/j.compedu.2006.11.007
[2] Sung, Y.T., Chang, K.E. and Yu, W.C. (2011) Evaluating the Reliability and Impact of a Quality Assurance System for E-Learning Courseware. Computers & Education, 57, 1615-1627.
http://dx.doi.org/10.1016/j.compedu.2011.01.020
[3] Weippl, E.R. (2005) Advances in Information Security. Security in e-Learning, Springer.
[4] Parasuraman, A. (2000) Technology Readiness Index (TRI) a Multiple-Item Scale to Measure Readiness to Embrace New Technologies. Journal of Service Research, 2, 307-320.
http://dx.doi.org/10.1177/109467050024001
[5] Ben Arfa Rabai, L., Rjaibi, N. and Ben Aissa, A. (2011) Quantifying Security Threats for E-Learning Systems. International Conference on Education and e-Learning Innovations.
[6] Naaji, A. and Herman, C. (2011) Implementation of an E-Learning System: Optimization and Security Aspects. Proceedings of the 15th WSEAS International Conference on Computers.
[7] Rjaibi, N., et al. (2012) Cyber Security Measurement in Depth for E-learning Systems. International Journal of Advanced Research in Computer Science and Software Engineering, 1-15.
[8] Alwi, N.H.M. and Fan, I.S. (2010) E-Learning and Information Security Management. International Journal of Digital Society (IJDS), 1, 148-156.
[9] Gefen, D., Straub, D. and Boudreau, M.-C. (2000) Structural Equation Modeling and Regression: Guidelines for Research Practice. Communications of the Association for Information Systems 4.1.
[10] Mason, R. and Rennie, F. (2006) E-Learning: The Key Concepts. Routlege, Abingdon Great Britain.
[11] Hair Jr., J.F., Black, W.C., Babin, B.J., Anderson, R.E. and Tatham, R.L. (2006) Multivariate Data Analysis. 6th Edition, Prentice-Hall International, New Jersey.
[12] Khlifi, Y. and Allehaibi, M.M. (2014) Information Security Services and Requirements for E-learning Infrastructure Success. 2014 World Congress on E-Learning, Education and Computer Science (WCEECS’2014), Hammamet.
[13] Parasuraman, A. and Colby, C.L. (2001) Techno-Ready Marketing: How and Why Your Customers Adopt Technology. The Free Press, New York.
[14] Cooper, D.R. and Schindler, P.S. (2003) Business Research Methods. 8th Edition, McGraw-Hill Irwin, Boston.
[15] Fornell, C. and Larcker, D.F. (1981) Evaluating Structural Equation Models with Unobservable Variables and Measurement Error. Journal of Marketing Research, 39-50.
http://dx.doi.org/10.2307/3151312
[16] Bagozzi, R.P. and Youjae, Yi. (1988) On the Evaluation of Structural Equation Models. Journal of the Academy of Marketing Science, 16, 74-94.
http://dx.doi.org/10.1007/BF02723327
[17] Fornell, C., Tellis, G.J. and Zinkhan, G.M. (1982) Validity Assessment: A Structural Equations Approach Using Partial Least Squares. Proceedings of the American Marketing Association Educators’ Conference.
[18] Kline, R.B. (2005) Principles and Practice of Structural Equation Modeling. 2nd Edition, The Guilford Press, New York.

  
comments powered by Disqus

Copyright © 2019 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.