Full Paper View Go Back

Effect of Cybersecurity, Privacy and Academic Integrity Concerns on Assessment in E-Learning Environment

H. Alquran1 , B. Ferdousi2

Section:Research Paper, Product Type: Journal-Paper
Vol.8 , Issue.11 , pp.11-18, Nov-2022


Online published on Nov 30, 2022


Copyright © H. Alquran, B. Ferdousi . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: H. Alquran, B. Ferdousi, “Effect of Cybersecurity, Privacy and Academic Integrity Concerns on Assessment in E-Learning Environment,” International Journal of Scientific Research in Multidisciplinary Studies , Vol.8, Issue.11, pp.11-18, 2022.

MLA Style Citation: H. Alquran, B. Ferdousi "Effect of Cybersecurity, Privacy and Academic Integrity Concerns on Assessment in E-Learning Environment." International Journal of Scientific Research in Multidisciplinary Studies 8.11 (2022): 11-18.

APA Style Citation: H. Alquran, B. Ferdousi, (2022). Effect of Cybersecurity, Privacy and Academic Integrity Concerns on Assessment in E-Learning Environment. International Journal of Scientific Research in Multidisciplinary Studies , 8(11), 11-18.

BibTex Style Citation:
@article{Alquran_2022,
author = {H. Alquran, B. Ferdousi},
title = {Effect of Cybersecurity, Privacy and Academic Integrity Concerns on Assessment in E-Learning Environment},
journal = {International Journal of Scientific Research in Multidisciplinary Studies },
issue_date = {11 2022},
volume = {8},
Issue = {11},
month = {11},
year = {2022},
issn = {2347-2693},
pages = {11-18},
url = {https://www.isroset.org/journal/IJSRMS/full_paper_view.php?paper_id=2982},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRMS/full_paper_view.php?paper_id=2982
TI - Effect of Cybersecurity, Privacy and Academic Integrity Concerns on Assessment in E-Learning Environment
T2 - International Journal of Scientific Research in Multidisciplinary Studies
AU - H. Alquran, B. Ferdousi
PY - 2022
DA - 2022/11/30
PB - IJCSE, Indore, INDIA
SP - 11-18
IS - 11
VL - 8
SN - 2347-2693
ER -

268 Views    194 Downloads    47 Downloads
  
  

Abstract :
Technology development in the field of information and communication (ICT) and the increased interest in the adoption of this advanced technology have built a new virtual world through which individuals are conducting their business and performing their daily activities. Although this change is considered useful for many persons, since they can obtain more flexible options to accomplish the assigned work or reach the intended goals, the existence of the digital world has triggered new types of risks and concerns. Security, privacy, and ethical issues have been observed in various sectors. The electronic learning (e-learning) environment is the space where students need to trust learning management systems (LMSs), and where procedures are expected to ensure a complete protection of students’ information, discussions, grades, and ideas. This paper-based study plans to provide a better understanding regarding the concerns of cybersecurity including remote assessment and awareness in cybersecurity, privacy, and academic integrity to spread awareness in e-learning environment.

Key-Words / Index Term :
Online Learning, Cybersecurity Concerns, Privacy, Ethical issues, Academic integrity, e-Assessment

References :
[1] B. Ferdousi, “Addressing student retention and persistence issue in online classes,” Proceedings of the 2016 ASEE North Central Section Conference, American Society for Engineering Education, 2016.
[2] A. Khaskheli, Y. Jiang, S. A. Raza, & S. Qamar Yousufi, “Social isolation & toxic behavior of students in e-learning: evidence during the time of the COVID-19 pandemic,” Interactive Learning Environments, pp. 1-20, 2022.
[3] A. Y. Alqahtani, & A. A. Rajkhan, “E-learning critical success factors during the covid-19 Pandemic: A comprehensive analysis of e-learning managerial perspectives,” Education sciences, Vol.10, No. 9, pp. 216, 2020.
[4] M. Adnan, & k. Anwar, “Online learning amid the covid-19 pandemic: students` perspectives,” Online Submission, Vol.2, No. 1, pp. 45-51, 2020.
[5] A. Melissa Ng Lee Yen, “The influence of self-regulation processes on metacognition in a virtual learning environment,” Educational Studies, Vol. 46, No. 1, pp. 1-17, 2020.
[6] T. Shamir?Inbal, & I. Blau, “Characteristics of pedagogical change in integrating digital collaborative learning and their sustainability in a school culture: e?CSAMR framework,” Journal of Computer Assisted Learning, Vol. 37, No.3, pp. 825-838, 2021.
[7] P. Z. R.Agustina, & T. H. Cheng, “How students’ perspectives about online learning amid the COVID-19 pandemic?” Studies in Learning and Teaching, Vol.1, No. 3, pp.133-139, 2020.
[8] R. Estriegana, J. Medina, R. Robina, & R. Barchino, “Virtual learning environment to encourage students` relationships and cooperative competence acquisition,” In Proceedings of the 26th ACM Conference on Innovation and Technology in Computer Science Education Vol. 1, pp. 53-59, 2021, June.
[9] N. B. Hamutoglu, O. Gemikonakli, I. Duman, A. Kirksekiz, & M. Kiyici, “Evaluating students experiences using a virtual learning environment: satisfaction and preferences,” Educational Technology Research and Development, Vol. 68, No.1, pp. 437-462, 2020.
[10] S. L. Proskura, & S. H. Lytvynova, “The approaches to Web-based education of computer science bachelors in higher education institutions,” 2020.
[11] A. Astalini, D. Darmaji, W. Kurniawan, K. Anwar, & D. Kurniawan, “Effectivenes of using e-module and e-assessment,” 2019.
[12] T. Khdour, “A semantic assessment framework for e-learning systems”. International Journal of Knowledge and Learning, Vol. 13, No. 2, pp. 110-122, 2020.
[13] Y. Khlifi, & H. A. El-Sabagh, “A novel authentication scheme for E-assessments based on student behavior over e-learning platform,” International Journal of Emerging Technologies in Learning, Vol. 12, No. 4, 2017.
[14] H. R. Ismael, & S. Y. Ameen, “Investigation and development of transparent online assessment: A Case Study at DPU,” In 2022 International Conference on Decision Aid Sciences and Applications (DASA), pp. 66-70, IEEE, 2022, March.
[15] M. Garg, & A. Goel, “A systematic literature review on online assessment security: Current challenges and integrity strategies,” Computers & Security, Vol. 113, No. 102544, 2022.
[16] M. Bujaki, C. Lento, & N. Sayed, “Utilizing professional accounting concepts to understand and respond to academic dishonesty in accounting programs,” Journal of Accounting Education, Vol. 47, pp. 28-47, 2019.
[17] I. Bandara, F. Ioras, & K. Maher, “Cyber security concerns in e-learning education,” In: Proceedings of ICERI2014 Conference, IATED, pp. 0728-
[18] S. Kaikini, K. Agarwal, K. Raj, & S. Kulshrestha, “Statics on Cyber Crimes and Cyber Laws in India: A Study,” JOURNAL OF ALGEBRAIC STATISTICS, Vol.13, No. 2, pp. 2935-2944, 2022.
[19] N. Assarut, P. Bunaramrueang, & P. Kowpatanakit, “Clustering cyberspace population and the tendency to commit cybercrime: a quantitative application of space transition theory,” International Journal of Cyber Criminology. Vol. 13, No.1, pp. 84–100, 2019.
[20] O. A. Ige, “School-based cybersecurity education programme for schoolchildren in South Africa! A timely call from Bloemfontein,” Universal Journal of Educational Research, Vol. 8, No. 6, pp. 2710-2716, 2020.
[21] M. G. Cains, L. Flora, D. Taber, Z. King, & D. S. Henshel, “Defining cyber security and cyber security risk within a multidisciplinary context using expert elicitation,” Risk Analysis, Vol. 42, No. 8, pp.1643-1669, 2022.
[22] B. Ferdousi, “Data security concerns and consumers’ trust in online business,” In 5th NA International Conference on Industrial Engineering and Operations Management Detroit, 2020, August
[23] D. Schatz, R. Bashroush, & J. Wall, “Towards a more representative definition of cyber security,” Journal of Digital Forensics, Security and Law, Vol. 12, No. 2, pp. 8, 2017.
[24] A. G. Buja, “Cyber security features for national e-learning policy,” Turkish Journal of Computer and Mathematics Education (TURCOMAT), Vol. 12, No. 5, pp. 1729-1735, 2021.
[25] S. Mystakidis, E. Berki, & J. P. Valtanen, “Deep and meaningful e-learning with social virtual reality environments in higher education: A systematic literature review,” Applied Sciences, Vol. 11, No. 5, pp. 2412, 2021.
[26] H. M. Mohammed, & Q. I. Ali, “E-proctoring systems: a review on designing techniques, features and abilities against threats and attacks,” Quantum Journal Of Engineering, Science And Technology, Vol. 3, No. 2, pp. 14-30, 2022.
[27] N. Rjaibi, L. B. A. Rabai, A. B. Aissa, & M. Louadi, “Cyber security measurement in depth for e-learning systems,” International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE), Vol. 2, No. 11, pp. 107-120, 2012
[28] N. H. M. Alwi, & I. S. Fan, “E-learning and information security management,” International Journal of Digital Society (IJDS), 1(2), 148-156. 2010
[29] S. S Kim, “Motivators and concerns for real-time online classes: focused on the security and privacy issues,” Interactive Learning Environments, pp. 1-14, 2021.
[30] S. M. Furnell, & T. Karweni, “Security issues in online distance learning,” Vine, 2001.
[31] R. Kumar, & R. Goyal, “On cloud security requirements, threats, vulnerabilities and countermeasures: A survey,” Computer Science Review, Vol. 33, pp. 1-48, 2019.
[32] N. Rjaibi, & L. B. A. Rabai, “How stakeholders perceived security risks? a new predictive functional level model and its application to e-learning,” EAI Endorsed Transactions on Security and Safety, Vol. 5, No. 15, e3, 2018.
[33] D. Upadhyay, & S. Sampalli, “SCADA (supervisory control and data acquisition) systems: vulnerability assessment and security recommendations,” Computers & Security, Vol. 89, No. 101666, 2020.
[34] L. A. Alexei, & A. Alexei, “Analysis of IoT security issues used in Higher Education Institutions,” International Journal Of Mathematics And Computer Research, Vol. 5, pp. 2277-2286, 2021.
[35] S. S. M. Huda, M. Kabir, & T. Siddiq, “E-assessment in higher education: students` perspective,” International Journal of Education and Development using Information and Communication Technology, Vol. 16, No. 2, pp. 250-258, 2020.
[36] A. Okada, I. Noguera, L. Alexieva, A. Rozeva, S. Kocdar, F. Brouns, T. Ladonlahti, D. Whitelock, & A. Guerrero-Roldán, “Pedagogical approaches for e-assessment with authentication and authorship verification in Higher Education,” British Journal of Educational Technology. Vol. 50, pp. 3264–3282, 2019.
[37] X. Baró?Solé, A. E. Guerrero?Roldan, J. Prieto?Blázquez, A. Rozeva, O. Marinov, C. Kiennert, ., ... & J. Garcia?Alfaro, “Integration of an adaptive trust?based e?assessment system into virtual learning environments—The TeSLA project experience,” Internet Technology Letters, Vol. 1, No.4, e56, 2018.
[38] A. A. Moustafa, A. Bello, & A. Maurushat, “The role of user behaviour in improving cyber security management,” Frontiers in Psychology, Vol. 12, 2021.
[39] S. Yusif, & A. Hafeez-Baig, “A conceptual model for cybersecurity governance,” Journal of applied security research, Vol. 16, No. 4, pp. 490-513, 2021.
[40] L. I. Eleje, I. C. Metu, A. C. Ikwelle, N. G. Mbelede, N. C. Ezeugo, F. N. Ufearo, & N. E. Ezenwosu, “Influence of cyber-security problems in digital assessment on students’ assessment outcome: lecturers’ perspective,” Journal of Scientific Research & Reports, Vol. 28, No.10, pp.11-20, 2022.
[41] P. T. Mai, & A. Tick, “Cyber Security Awareness and behavior of youth in smartphone usage: A comparative study between university students in Hungary and Vietnam,” Acta Polytech. Hung, Vol. 18, pp. 67-89, 2021.
[42] R. Beuran, D. Tang, Z. Tan, S. Hasegawa, Y. Tan, & Y. Shinoda, “Supporting cybersecurity education and training via LMS integration: CyLMS,” Education and Information Technologies, Vol. 24, No. 6, pp. 3619-3643, 2019. http://dx.doi.org.ezproxy.emich.edu/10.1007/s10639-019-09942-y
[43] N. Taha, & L. Dahabiyeh, “College students information security awareness: a comparison between smartphones and computers,” Education and Information Technologies, Vol. 26, No. 2, pp. 1721-1736, 2021
[44] B. Macfarlane, J. Zhang, & A. Pun, “Academic integrity: a review of the literature,” Studies in Higher Education, Vol. 39, No. 2, pp. 339-358, 2014.
[45] K. A. Burgason, O. Sefiha, & L. Briggs, “Cheating is in the eye of the beholder: an evolving understanding of academic misconduct,” Innovative Higher Education, Vol. 44, No. 3, pp. 203-218, 2019.
[46] H. M. Alessio, N. Malay, K. Maurer, A. J. Bailer, & B. Rubin, “Interaction of proctoring and student major on online test performance,” International Review of Research in Open and Distributed Learning, Vol. 19, No. 5, 2018.
[47] H. Mellar, R. Peytcheva-Forsyth, S. Kocdar, A. Karadeniz, & B. Yovkova, “Addressing cheating in e-assessment using student authentication and authorship checking systems: teachers’ perspectives,” International Journal for Educational Integrity, Vol. 14, No. 1, pp. 2, 2018
[48] D. Lederman, D. Harrison, M. R. Fisher Jr, & J. Bandy, “Best way to stop cheating in online courses? ‘Teach better’,”. Inside Higher Ed. 2020
[49] K. Wakunuma, & R. Masika, “Cloud computing, capabilities and intercultural ethics: Implications for Africa,” Telecommunications Policy, Vol. 41, pp. 695-707, 2017.
[50] T. Husain, & A. Budiyantara, “Analysis of control security and privacy based on e-learning users,” SAR Journal, Vol. 3, No. 2, pp. 51-58, 2020.
[51] Z. El Andaloussi, B. Benbba, & S. Kamal, “Exploring the encgt business school students ‘perceptions toward e-learning during the covid-19 pandemic: a quantitative descriptive study,” Ijtm International Journal of Trade And Management, Vol. 1, No. 1, pp. 27-40, 2022.
[52] D. El-Bassiouny, & N. El-Bassiouny, “The challenge of online privacy preservation in Muslim-majority countries during the COVID-19 pandemic,” Journal of Islamic Marketing, 2020.
[53] R. Luppicini, & E. Walabe, “Exploring the socio-cultural aspects of e-learning delivery in Saudi Arabia,” Journal of Information, Communication and Ethics in Society, 2021.
[54] M.A. Almaiah, A. Al-Khasawneh, & A. Althunibat, “Exploring the critical challenges and factors influencing the E-learning system usage during COVID-19 pandemic,” Education and Information Technologies, Vol. 25, pp. 5261-5280, 2020.
[55] M. Kacurova, G. Stevanoski, & D. Bogatinov, “Security and privacy with e-learning software,” ?????, Vol. 1, No.1, pp. 164-173. 2021
[56] D. Turnbull, R. Chugh, & J. Luck, “Transitioning to e-learning during the covid-19 pandemic: how have higher education institutions responded to the challenge?” Education and Information Technologies, pp.1-19, 2021
[57] M.M. El Tantawi, M.M Abdelsalam, A.M. Mourady, and I.M. Elrifae, “e-Assessment in a limited-resources dental school using an open-source learning management system,” Journal of Dental Education, Vol.79, pp. 571-583, 2015.
[58] T. Langenfeld, “Internet?based proctored assessment: Security and fairness issues,” Educational Measurement: Issues and Practice, Vol. 39, No. 3, pp. 24-27. 2020
[59] P. Dawson, “Defending assessment security in a digital world: Preventing e-cheating and supporting academic integrity in higher education,” Routledge, 2020.
[60] J. A. Lara, S. Aljawarneh, & S. Pamplona, “Special issue on the current trends in E-learning Assessment,” Journal of Computing in Higher Education, Vol. 32, No. 1, pp. 1-8, 2020.
[61] S. Senel, & H. C. Senel, “Remote assessment in higher education during COVID-19 pandemic,” International Journal of Assessment Tools in Education, Vol. 8, No. 2, pp. 181-199, 2021.
[62] R.V. Caraig, & R.G. Fabro, “Students’ Engagement and Study Habits in the Online Distance Learning Environment,” International Journal of Scientific Research in Multidisciplinary Studies, Vol. 8, No. 9, pp. 25-31, 2022.
[63] Cris Norman P. Olipas, & Arsenio P. Gardoce, Jr, “Electronic Learning Modules in Mobile Devices: A Technology Acceptance Model Approach Using PLS-SEM,” International Journal of Scientific Research in Multidisciplinary Studies, Vol. 8, No. 9, pp. 37-44, 2022.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  support@isroset.org or view contact page for more details.

Go to Navigation