Journal of information and communication convergence engineering 2023; 21(1): 32-44
Published online March 31, 2023
https://doi.org/10.56977/jicce.2023.21.1.32
© Korea Institute of Information and Communication Engineering
Correspondence to : Mujiono Sadikin (E-mail: mujiono.sadikin@gmail.com)
Faculty of Computer Science, Universitas Bhayangkara Jakarta Raya, Bekasi 17121, Indonesia
This is an Open Access article distributed under the terms of the Creative Commons Attribution Non-Commercial License (http://creativecommons.org/licenses/by-nc/3.0/) which permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited.
Information security breach is a major risk in e-learning. This study presents the potential information security disruptions in Learning Management Systems (LMS) from the perspective of users. We use the Technology Acceptance Model approach as a user perception model of information security, and the results of a questionnaire comprising 44 questions for instructors and students across Indonesia to verify the model. The results of the data analysis and model testing reveals that lecturers and students perceive the level of information security in the LMS differently. In general, the information security aspects of LMSs affect the perceptions of trust of student users, whereas such a correlation is not found among lecturers. In addition, lecturers perceive information security aspect on Moodle is and Google Classroom differently. Based on this finding, we recommend that institutions make more intense efforts to increase awareness of information security and to run different information security programs.
Keywords Information security, E-learning, Moodle, Google Classroom, User perception, COVID-19
Currently, the e-learning systems are becoming increasingly important because of the digitalization of education. Most educational institutions utilize e-learning systems considering the significant advantages. These include flexibility in terms of time and space, cost, and infrastructure efficiencies, and also overcome traffic jams, which is a common problem in major cities [1,2]. The COVID-19 pandemic, the importance of e-learning systems in education and teaching mushroomed. Many studies have shown that online learning system environments, such as Moodle and Google Classroom have been widely appreciated [3-6]. As the learning process enabler, e-learning provides numerous benefits such as flexibility in learning material format (text, audio, video, image) and storage media for teaching materials, lower cost for students, and increase in the capacity of classrooms [7]. Furthermore, the decrease in energy consumption and paper usage reduces the negative impact of education-related activities on the environment [8]. E-learning systems also offer benefits in terms of instructor - student interactions, such as flexibility, usability, and efficiency in face-to-face learning [9]. According to Fatoni et al. [10], the most advantageous feature of e-learning systems is the comfortable educational environment.
The security concerns associated with the COVID-19 pandemic forced humankind to pursue all possible activities online, including education and teaching. Thus, e-learning systems have become a necessity, and the entire academic community must be familiar with them [11,12]. However, elearning during the pandemic faces various challenges and risks that must be overcome [13-15]. Most of the risks that have been identified are related to information security issues, such as Internet traffic, which is specific to COVID-19/data availability, lack of data processing, illegitimate use, data integrity disruption, and privacy violation [11,16,17]. Accordingly, several approaches have been proposed to address the information security issues of e-learning systems during the pandemic era, such as the framework of intrusion detection [18], online learning quality assessment [12], and cryptography [17].
The Learning Management System (LMS) is the most important component of e-learning systems. Owing to the increasing demand for LMS during the COVID-19 outbreak, numerous LMS applications have been developed and recommended, either as open source, proprietary, cloud, or onpremises models. Meanwhile, as a response to the COVID-19 outbreak, UNESCO released a distance learning system recommendation comprising 11 systems. Two of these are Moodle and Google Classroom [19].
Moodle LMS is one of the most popular LMSs [20-22]. Various implementation models of the Moodle LMS have been demonstrated, ranging from the standard version to the customized module. The deployment of Moodle LMS customization covers a wide range of scope to fulfill the specific requests of each organization that implements the system [23,24]. To achieve better performance and continuity of services, various architectures have also been implemented, such as the load-balancing clustering scenario [25].
The usage of Google Classroom also increased dramatically during the pandemic [26]. Google Classroom is one of the three most adopted ready-to-use LMSs in developing countries during the outbreak [27-29]. It is also among the top three learning tools chosen by students [30]. In areas where a limited LMS system, such as global contact lens education, was used prior to the pandemic, Google Classroom is the third most used below Zoom and WeChat [31]. Google Classroom is also the most popular LMS platform for various of educational institutions in Indonesia owing to the fact that it is readily usable and can be easily set up. To be precise, the user is not required to install and set up the application, which is required for the Moodle LMS. Some studies regarding the benefits of using Google Classroom by Indonesian education institutions are presented in [5,6,32-34].
However, several risks are embedded in these LMSs. One such risk is the disruption of information security, which can appear in various forms, such as viruses, spyware, malware, ransomware, Denial of Service (DOS), or information accessed by unauthorized users [35]. The access of information/data by an unauthorized user is based on various objectives, including abuse of authority, changing data on activities, stealing information, or for certain trivial reasons [36,37]. The risk of unauthorized access to information typically increases if the system environment does not support information and system protection. In addition, users who lack information security knowledge or information security awareness are exposed to a greater risk of information security disruption. The literature review study presented in [38] shows the importance of human factors for any organization to ensure a culture of information security.
The information security concept represents the balancing of Confidentiality, Integrity, and Availability (CIA) [39,40]. “Confidentiality” refers to the condition that information sources remain hidden to all parties except for those with authorization. The principle of “Integrity” stipulates that data/information integrity and consistency are maintained at various levels and in various forms of presentations. Finally, “Availability” requires that all necessary data/information must always be available to authorized users. The basic rule of information security is that all three elements must be balanced. For example, a request to increase the level of confidentiality should not result in inaccessibility of the data/information, which it is a decrease in availability.
The risk of disruption of information security must be governed properly to ensure that whenever gaps in the security are exploited, the impacts can be minimized [41]. Accordingly, the disruption potentialities must be identified. Typically, sources of information security disruption vary, ranging from hardware or software malfunction, to human activities, such as hacking or misuse by internal users [42]. In most cases, internal user disruptions have more serious repercussions.
Various models, methods, and deterrents of information security disruptions have been studied and practiced. Lavanya et al. [43] proposed an elliptic curve cryptography algorithm (ECC) to protect data confidentiality and integrity in cloudbased e-learning systems. This method was used to counteract DOS attacks and DROWN (Decrypting RSA with Obsolete and Weakened eNcryption). Hasan [44] proposed an approach to achieve more comprehensive security of e-learning systems in terms of management depending upon the target organization. In the proposed approach, the author evaluated the security requirements of e-learning applications as a basis for preparing security models. The case studies of security approaches of e-learning applications were used as a basis for modeling security requirements that ensure the control of access, privacy, and integrity. In the early stages of compiling, an information security model was used to conduct an agent-based environmental analysis on an e-learning platform, which revealed that the critical issues for MAS (Multi-Agent Services) security were trust, authority, and authentication. The proposed security model considers this aspect and combines it with the PMA3 platform.
Security is one of the major influencing factors in e-learning adoption in Jordan, as published in [22]. According to this study, information security has a significant impact on the learning success. The survey concluded that most elearning participants have information security awareness, as they consider information security as a major e-learning success factor. Another exploratory study that recommended levels of authentication for e-learning activities was conducted by [45]. In response to previous research, this study explores the need to identify authentication levels that are specifically suitable for e-learning activities to prevent misuse. According to the descriptive statistical data collected, a certain set of e-learning activities exists, in which users feel that their identifying partners can potentially assume their identity. The results show that e-learning systems need to be authenticated even at the level of activities for summative eassessment using appropriate authentication to secure the identity of remote users.
In an integrated e-learning system study conducted in Japan [46], information security was involved in the initial stage of development as one of the main factors. Numerous international students study in Japan, giving rise to diverse information ethics and cultures. Thus, information security education was considered highly important to ensure that these differences were accommodated. In the proposed system, the information security aspects were reflected in questionnaires related to topics such as copyright and personal information. The answers to the questions were collected and assigned priority values calculated from the learner’s consciousness factor scores. Finally, the importance of each influencing factor was determined based on the priority values.
Furthermore, the drastic increase in the use of e-learning systems exacerbated the risks. Several academicians and practitioners have proposed ideas to address this problem. Giatman et al. [12] proposed a university framework for Online Learning Quality Control to guarantee the minimum standard of the learning process along with quality of the results. The framework covers the establishment of a Quality Control unit, preparation of the readiness of instructors and students, and settlement of quality assessment methods and materials. At the technical level, a cryptography mechanism to protect the CIA of an e-learning system environment was also proposed by [17]. However, cryptography alone is insufficient for this purpose. It must be combined with other techniques, such as firewalls, IDS, biometric authentication, security process models, and digital watermarking. A specific Distributed DOS (DDoS) model based on the characteristics of the e-learning system application was investigated by Vitic et al. [18]. The DDoS model considers the specifics of the operation of e-learning systems during the pandemic and can separate flash crowd events from outliers in the communication network.
Furthermore, the potential sources of disruption must be identified to protect e-learning system against them [37,47]. In this study, we elaborate on the potential disruptions from the perspective of LMS users based on their knowledge, awareness, and behavior related to LMS information security aspects. In addition, we attempt to validate hypotheses that correlate users’ knowledge and awareness of information security, perceived information confidentiality, perceived data integrity, and perceived system availability with perceived LMS trustworthiness (called the User Perceived of LMS / UPoLMS model). Furthermore, we present the security event management (SEM) approach, which was the research framework adopted in [48,49]. The objective of this study is to provide recommendations for improving the information security aspects proposed to e-learning system administrators.
Descriptive and comparative research methods were used to conduct the study. The research model was constructed based on the Technology Acceptance Model (TAM) using external variables that influence the user perception of information security aspects. The TAM is widely used to identify correlations between factors in descriptive or comparative research [9,48,50,51]. In our model, the proposed factors are categorized into two groups: the first group is user knowledge or experience of the LMS and the second is a user-perceived information security triad (the CIA triad). The proposed UPoLMS model is depicted in Fig. 1.
The proposed model is based on two initial assumptions: first, more experienced and more knowledgeable users will be more aware of information security-related aspects, and, second, the user’s trust in an LMS is influenced by the performance of the LMS information security aspects as experienced by users. Information Security Knowledge (IS-K) and Information Security Awareness (IS-A) play dominant roles in securing the systems, information, or data contained within. Several studies show that 70-80% of information securityrelated incidents occur due to negligence or unawareness of users [52]. IS-A is referred to as a state of consciousness about information security where the user ideally commits to the rules, recognizes potential risks, understands the importance of responsibilities, and acts accordingly [53-55]. User experience (UE), in this context, is the time spent by users on the LMS to perform learning activities. In this study, we treat UE as a part of IS-K because the components of UE are only measured by the time spent by the user using the LMS. PIC, PIA, and PII refer to the user perception of the information security triad, whereas the Perception of Trustworthiness (PT) refers to the user’s acceptance or trust of the LMS.
To validate these two assumptions, we provide eight study hypotheses, as listed in Table 1. Each of the study hypotheses is validated with the statistical associative hypothesis, as described in Table 1. Thus, H1 of the study is validated with statistical hypotheses H1.0 and H1.1, and so on for H2-H8.
Research hypotheses
Hypothesis | Description |
---|---|
H1 | IS-K positively affects the user’s IS-A |
H1.0 | IS-K is not positively associate with the user’s IS-A |
H1.1 | IS-K is positively associate with the user’s IS-A |
H2 | IS-K positively affects the user’s PIC |
H2.0 | IS-K is not positively associate with the user’s PIC |
H2.1 | IS-K is positively associate with the user’s PIC |
H3 | IS-K positively affects the user’s PIA |
H3.0 | IS-K is not positively associate with the user’s PIA |
H3.1 | IS-K is positively associate with the user’s PIA |
H4 | IS-K positively affects the user’s PII |
H4.0 | IS-K is not positively associate with the user’s PII |
H4.1 | IS-K is positively associated with the user’s PII |
H5 | IS-A positively affects the users PT |
H5.0 | IS-A is not positively associated with the user’s PT |
H5.1 | IS-A is positively associated with the user’s PT |
H6 | PIC positively affects the users PT |
H6.0 | PIC is not positively associated with the user’s PT |
H6.1 | PIC is positively associated with the user’s PT |
H7 | PIA positively affects the user’s PT |
H7.0 | PIA is not positively associated with the user’s PT |
H7.1 | PIA is positively associated with the user’s PT |
H8 | PII positively affects the user’s PT |
H8.0 | PII is not positively associated with the user’s PT |
H8.1 | PII is positively associated with the user’s PT |
Overall, the study comprised the following stages: survey, statistical data analysis, comparison of results, and summarization. The survey was conducted during the early stage of the pandemic outbreak in Indonesia in 2020, and it was updated by a second survey in 2022. The feedback collection was performed using both the Google form application and hard copy, which were manually collected, whereas the data processing and analysis were performed using MS Excel and the SPSS application. The detailed steps of this study are shown in Fig. 2.
The survey and questionnaires were designed on the basis of the model described above. Therefore, the questionnaires were divided into four groups. The first group of the questionnaires focused on general information about the respondent (gender, institution where they come from, what the most used LMS platform is, user role in the e-learning system, i.e., lecturer or student, department, and age), and the indication of their LMS experiences. The second group of questionnaires focused on the knowledge and experience of respondents in information security. The third group of questionnaires focused on the information security triad, and the last group assessed the perceived trustworthiness of the LMS. For all groups, we developed a collection of questionnaires with 44 questions; the number of questions in each category is presented in Table 2.
Number of each questioner category questions
Questionnaires Category | #Quest. |
---|---|
IS-K: User's Information Security Knowledge (incl. User Experience) | 15 |
IS-A: User's Information Security Awareness | 7 |
PIC: User Perception of Information Security | 7 |
PIA: User Perception of Information/Data availability | 4 |
PII: User Perception of Information/Data Integrity | 4 |
PT: User Perception of Trustiness to the LMS | 7 |
Students and lecturers are central to e-learning systems in terms of numbers and intensity of use. Other additional user roles, such as system administrators, process business owners, process business administrators, and management also exist. In the survey, we focused only on students and lecturers as respondents.
We also developed open and closed questions. The open questions were mostly directed at collecting user comments and opinions regarding the LMS the respondents used. The closed questions were multiple-choice models with five answer choices ranging from “Strongly agree,” “Agree,” “Neutral,” “Disagree,” and “Strongly disagree.” All questions were formulated to reflect a positive opinion. Thus, a higher Likert scale score given to a certain question indicates a better (more positive) response to the opinion represented by the question. A few of these questions are listed in Table 3.
The samples of survey questions
Category | Question |
---|---|
IS-K | The e-learning system should maintain a balance between availability, confidentiality, and data integrity |
IS-K | The e-learning password is the "I know" authentication factor |
IS-A | I change my password periodically, retaining it for a maximum of 6 (six) months |
IS-A | I always have backups of my e-learning data on my personal computer |
PIC | The current state of the e-learning system does not allow unauthorized users to access module files |
PIC | The current state of the e-learning system does not allow unauthorized users to access end user data |
PII | The condition of the module file that I uploaded in e-learning was identical to that when it was downloaded by a student and to that on my computer |
PIA | In the past semester / six months I have not experienced a failure in downloading student grades |
PIA | In the last semester / six months I have not experienced a module upload failure |
PT | The e-learning system has a good reputation in carrying out elearning -based learning activities |
PT | The e-learning system can guarantee the security of its information |
In the first round of surveys, we distributed questionnaires only to a limited number of users to validate the questionnaires and obtain feedback on quality. The purpose of the first survey round was to ensure that some quality parameters were achieved. These parameters are all questions that can be clearly understood; no bias or overlap is present in the questions, and which are grammatically correct.
Two feedback collection mechanisms were employed: online and offline. Online feedback collection was performed using the Google form application, whereas offline collection was performed using the hard copy form distributed in the classrooms.
The main function of the data pre-processing stage was to provide clean and ready-to-process feedback data. Activities performed in this stage included the removal of user privacy information, data entry of offline feedback, and removal of invalid data. The main activity was converting users’ answers on closed questions into scores on the Likert scale: "Strongly agree” (5), "Agree” (4), "Neutral” (3), "Disagree” (2), "Strongly disagree” (1).
The first task in the data analysis stage was feedback reliability validation testing. We used Cronbach’s alpha validation tools to perform the testing, since it was the most popular [56]. The next data analysis task was correlation testing to validate each hypothesis, as presented in Table 1. We used the following linear correlation function:
where Y is the average of the Likert scale values of the affected IS factor X is the average of the Likert scale values of the affected IS factor
For example, when applying the formula for H1, Y is the average IS-A Likert scale value, X is the average of IS-K Likert scale value, In the case of H2, Y is the average PIC Likert scale value, X is the average of IS-K Likert scale value, and so on for the remaining Hi, where i = 3,4,5,6,7,8.
We distributed the questionnaire in Google Form format through messaging systems and social media platforms such as WhatsApp, Facebook, Instagram, and Twitter. A total of 1033 respondents from various institutions spread across the globe were surveyed. Since the Google Form questionnaires were openly distributed through various media, all user ranging from lecturers and students to industry practitioners and government staff were part of the survey. Most of the respondents are affiliated to universities followed by members of the government and private sector. Meanwhile, Moodle and Google Classroom were the two most used LMSs. In addition, the global summary of respondent profiles is shown in Fig. 3, which presents the institutions, respondents’ roles, LMS used, and time spent on the LMS. In the analysis of the feedback results, Moodle and Google Classroom were selected as the representative LMS platforms, and lecturers and students as the representative users. Thus, we present four categories of analysis: The Moodle LMS Information Security aspect from the instructor’s perception, Moodle LMS Information Security aspect from students’ perception, Google Classroom Information Security aspect from instructor’s perception, and Google Classroom Information Security aspect from students’ perceptions.
The overall reliability validation testing of the sample using an Cronbach’s alpha variable is presented in Table 4. Cronbach’s alpha coefficient justifies factors as reliable if their value is 0.70 or greater [57,58]. The Cronbach’s value of each factor (variable) for each user role and LMS platform, as presented in Table 4, varies from 0.35 0.98. A few of the Cronbach alpha values are less than 0.70, which indicates that the factor is unreliable. Accordingly, we ignore the corresponding factors in the subsequent stage of analysis The unreliable factors are: the IS-A factor of lecturers on Google Classroom, P-II factor of lecturers on Google Classroom, IS-A factor of lecturers on Moodle, and P-II factor of students on Moodle, which have, which have Cronbach values of 0.35, 0.42, 0.67, and 0.68, respectively.
The Cronbach alpha value
UE-ISK | IS-A | P-IC | P-II | P-IA | PT | |
---|---|---|---|---|---|---|
Student-Moodle | 0.84 | 0.76 | 0.94 | 0.68 | 0.86 | 0.93 |
Student-Google Classroom | 0.87 | 0.93 | 0.98 | 0.72 | 0.90 | 0.94 |
Lecturer-Moodle | 0.85 | 0.67 | 0.95 | 0.72 | 0.95 | 0.94 |
Lecturer-Google Classroom | 0.77 | 0.35 | 0.90 | 0.42 | 0.81 | 0.86 |
To validate our hypothesis, we applied the linear regression model presented in Section 3. In this section, we elaborate on the analysis of each category based on the dominant respondent role.
Table 5 presents the overall hypothesis analysis of the student- Moodle and Google Classroom UPoLMS model. As presented on the left side of Table 5, seven out of eight Hx.0 hypothesis of the student-Moodle UPoLMS are contradicted by the questionnaire’s feedback data; therefore, all Hx.0 are rejected and Hx.1 are accepted. The results indicate that IS-K influences IS-A (β2 = 0.2941, P-value = 0.000), PIC (β2 = 0.26600, P-value = 0.000), PIA (β2=0.3683, P-value = 0.000), and PII (β2 = 0.2567, P-value = 0.000) factors, respectively. The last three rows, except for PII that is ignored, indicate that PT factors are consistently influenced by IS-A, PIC, and PI-A, as shown by the β2 coefficient and P-value. For, IS-A, β2 = 0.6332, and P-value = 0.0000; for PIC, β2 = 0.0163, and P-value = 0.000; and for PIA, β2 = 0.4774, and P-value = 0.0000. Based on the results of the data correlation analysis, the Moodle students’ UPoLMS model was revised, as shown in Fig. 4.
The student hypothesis analysis result
Hypothesis | Description | Moodle | Google CR | ||||||
---|---|---|---|---|---|---|---|---|---|
β1 | β2 | P-val | Results | β1 | β2 | P-val | Results | ||
H1.0 | IS-K->ISA | 2.1125 | 0.2941 | 0.0000 | reject H1.0 | -1.3629 | 1.2233 | 0.0000 | reject H1.0 |
H2.0 | IS-K->PIC | 2.2204 | 0.2660 | 0.0000 | reject H2.0 | -0.9815 | 1.1502 | 0.0000 | reject H2.0 |
H3.0 | IS-K->PIA | 2.3234 | 0.3683 | 0.0000 | reject H3.0 | 1.5105 | 0.6653 | 0.0000 | reject H3.0 |
H4.0 | IS-K->PII* | 3.0917 | 0.2567 | 0.0000 | N/A due to Cronbach alpha | 1.6713 | 0.6465 | 0.0000 | Reject H4.0 |
H5.0 | IS-A->PT | 3.1475 | 0.6332 | 0.0000 | reject H5.0 | 1.7723 | 0.6452 | 0.0000 | reject H5.0 |
H6.0 | PIC->PT | 3.1475 | 0.1603 | 0.0001 | reject H6.0 | 2.4191 | 0.4943 | 0.0000 | reject H6.0 |
H7.0 | PIA->PT | 1.8714 | 0.4774 | 0.0000 | reject H7.0 | 1.7549 | 0.6153 | 0.0000 | reject H7.0 |
H8.0 | PII->PT* | 0.6155 | 0.7453 | 0.0000 | N/A due to Cronbach alpha | -0.0666 | 0.9919 | 0.0000 | reject H8.0 |
The results of Cronbach’s analysis of the student-Google Classroom differed slightly from the Moodle results, as shown in Table 4. We can use all the model factors of Google Classroom to perform further hypothesis validation of the student-Google Classroom UPoLMS. Overall, seven out of 8 Hx.0 hypotheses (since we ignore the PII factor) are contradicted by the questionnairés feedback data; therefore, all Hx.0 are rejected and Hx.1 are accepted. The results indicate that IS-K influences IS-A (β2 = 1.2233, P-value = 0.000), PIC (b2 = 1.1502, P-value = 0.000), and PIA (β2 = 0.6683, P-value = 0.000). The last four rows of data of β2 coefficient and P-value confirm that PT factors are consistently influenced by IS-A, PIC, PI-A, and PII, as well as by their positive β2 coefficient and zero P-Value. Based on the correlation data results, the UPoLMS student-Google Classroom model matches the proposed model, as depicted in Fig. 3. Therefore, the proposed model does not require modification.
A hypothesis analysis of the lecturer UPoLMS model is presented in Table 6. The IS-A factor was ignored in the hypothesis analysis stage because its Cronbach’s value was under 0.7. Based on the P-value of each factor, which is above 0.05 for both Moodle and Google Classroom LMS, most of the Hx.0 hypotheses are accepted. The exceptions are the PIA and PII factors for Moodle, which influence the PT factor. The hypothesis analysis results reveal that the lecturers’ Information Security Knowledge and the Information Security triad are not correlated. However, the perception of trustworthiness in both Moodle and Google Classroom is influenced only by the perception of information availability and integrity.
The student hypothesis analysis result
Hypothesis | Description | Moodle | Google CR | ||||||
---|---|---|---|---|---|---|---|---|---|
β1 | β2 | P-val | Results | β1 | β2 | P-val | Results | ||
H1.0 | IS-K->ISA* | 3.2283 | -0.0013 | 0.9761 | N/A due to Cronbach alpha | 1.8776 | 0.0968 | 0.3757 | N/A due to Cronbach alpha |
H2.0 | IS-K->PIC | 3.5590 | -0.0227 | 0.7695 | accept H2.0 | 1.3858 | -0.0864 | 0.5466 | accept H2.0 |
H3.0 | IS-K->PIA | 3.3155 | 0.1135 | 0.1840 | accept H3.0 | 1.7601 | 0.0021 | 0.5494 | accept H3.0 |
H4.0 | IS-K->PII | 3.7406 | 0.0550 | 0.3434 | accept H4.0 | 3.2627 | -0.1460 | 0.2416 | accept H4.0 |
H5.0 | IS-A->PT | 3.7952 | 0.0273 | 0.7855 | accept H5.0 | 4.5633 | -0.3320 | 0.1146 | accept H5.0 |
H6.0 | PIC->PT | 3.9885 | -0.0304 | 0.5941 | accept H6.0 | 4.9183 | -0.1966 | 0.0113 | accept H6.0 |
H7.0 | PIA->PT | 2.4956 | 0.3674 | 0.0000 | reject H7.0 | 4.8593 | -0.2131 | 0.0248 | accept H7.0 |
H8.0 | PII->PT | 1.5109 | 0.5984 | 0.0000 | reject H8.0 | 3.5973 | -0.0287 | 0.3175 | accept H8.0 |
In this stage, we investigate whether the characteristics of perception of Information Security differ significantly between lecturers and students. The samples collected included 726 students and 300 lecturers/instructors; thus, based on this number of samples, we can assume that the sampling is normally distributed. Accordingly, we conducted a t-test validation as an independent sample test tool to determine the differences in perception of information security factors. The proposed hypothesis of the test is as follows:
H0: μ1 ≤ μ2 (lecturer’s rating of Information Security is less than or equal to that of the student)
H1: μ1 > μ2 (lecturer’s rating of Information Security is better than that of the student)
The t-test results, using a = 0.05, are presented in Table 7, which shows a significant difference between lecturers and students in their perception of the Moodle and Google Classroom information security factors. In the case of Moodle, for four of the six factors t-stat > t-critical one-tile, whereas for the remaining two factors present t-stat < t-critical one tile. Thus, for the four factors, as H0 is rejected and H1 is accepted, the lecturer perception of information security in Moodle is better than the student perception. Conversely, in the Google Classroom t-test, for five of the six t-test factors, t-stat < t-critical one tile, indicating that the confidence level of students is better than that of lecturers. In contrast, the PII and PT factors exhibit similar perception patterns for both Moodle and Google Classroom. In the PII factor for both Moodle and Google Classroom, the students’ perception is better than that of the lecturers, whereas for the PT factor, the lecturer’s perception is better than the student’s perception.
Correlation analysis of lecturer UPoLMS model
Factors | Moodle | Google Classroom | ||
---|---|---|---|---|
t Stat | t Critical one-tail | t Stat | t Critical one-tail | |
IS-K: User's Information Security Knowledge (1) | 2.1534 | 1.6484 | -5.4962 | 1.6606 |
IS-A: User's Information Security Awareness (2) | 1.9821 | 1.6483 | -12.3654 | 1.6522 |
PIC: User Perception of Information Security (3) | 3.3472 | 1.6492 | -6.5524 | 1.6561 |
PIA: User Perception of Information/Data Availability (4) | 0.1068 | 1.6493 | -5.9765 | 1.6587 |
PII: User Perception of Information/Data Integrity (5) | -3.0639 | 1.6496 | -6.8155 | 1.6583 |
PT: User Perception of Trustiness to LMS (6) | 3.9142 | 1.6486 | 6.0757 | 1.6524 |
The next analysis was performed to determine the level of user perception of the information security aspect. As described in Section 3.3, all questions were formulated as positive opinions. In other words, a higher value of the user’s answer, represents a more positive perception. Here, we employed mean value analysis by comparing the mean value to 3.5 as the minimum threshold of good perception. Fig. 5 depicts the chart of the Likert scale mean of the information security-related perception factors of lecturers and students for (a) Moodle and (b) Google Classroom. These charts show the different information security-related perceptions of lecturers and students. For Moodle, the results indicate that, in general, lecturers have more positive perceptions compared with students, whereas the converse is true for Google Classroom, for which students have better perceptions.
On comparing the two LMSs, both lecturers and students are seen to have a better perception of Google Classroom, which could be attributed to the fact that Google Classroom services are provided by a mature company, whereas Moodle is managed independently, which results in different management standards depending upon the institutions. These standards lead to different levels of service. However, further investigation is required to validate this assumption. Overall, both user roles have a positive perception of the two LMSs, as indicated by the average level of perception above the threshold of 3.5. Table 8 shows the detailed results of the Likert-scale mean level presented with the variance of each factor. As shown in the Table, in general, the perception level is above the threshold. However, the perception level of both user roles is below the threshold for IS-A and PIC. In particular, information security awareness needs to receive more attention for Moodle and Google Classroom because both lecturer and student perceptions of this factor are below the threshold. Meanwhile, for Google Classroom, only the perception of the lecturers is below the threshold.
Likert scale mean - variance of information security related factors
Factors | Moodle | Google Classroom | ||
---|---|---|---|---|
Mean | Variance | Mean | Variance | |
IS-K: User's Information Security Knowledge (1) | ||||
Lecture | 4.0628 | 0.4897 | 4.2768 | 0.2784 |
Student | 3.9264 | 0.5882 | 4.7156 | 0.2343 |
Difference | 0.1364 | -0.0985 | -0.4387 | 0.0441 |
IS-A: User's Information Security Awareness (2) | ||||
Lecture | 3.2229 | 0.2170 | 3.4891 | 0.0925 |
Student | 3.1693 | 0.2530 | 4.4057 | 0.5811 |
Difference | 0.0537 | -0.0359 | -0.9166 | -0.4886 |
PIC: User Perception of Information Security (3) | ||||
Lecture | 3.4669 | 0.6696 | 3.7337 | 0.4110 |
Student | 3.3183 | 0.5303 | 4.4425 | 0.6881 |
Difference | 0.1486 | 0.1392 | -0.7089 | -0.2770 |
PIA: User Perception of Information/Data Availability (4) | ||||
Lecture | 3.7766 | 0.8197 | 4.1186 | 0.3174 |
Student | 3.7714 | 0.6236 | 4.6480 | 0.3534 |
Difference | 0.0052 | 0.1961 | -0.5294 | -0.0360 |
PII: User Perception of Information/Data Integrity (5) | ||||
Lecture | 3.9639 | 0.3772 | 4.3023 | 0.1492 |
Student | 4.0637 | 0.2538 | 4.7200 | 0.1764 |
Difference | -0.0998 | 0.1234 | -0.4177 | -0.0272 |
PT: User Perception of Trustiness to LMS (6) | ||||
Lecture | 3.8831 | 0.4984 | 4.9661 | 0.0666 |
Student | 3.7270 | 0.5057 | 4.6150 | 0.3264 |
Difference | 0.1561 | -0.0073 | 0.3511 | -0.2597 |
In practice, the results of user perceptions of these LMSes can be considered for institutions that use Moodle or Google Classroom. Based on the perception and differences between lecturers and students, institutions need to customize their LMS information security policies separately, according to the needs of lecturers and students.
In this study, we investigated the perception of two dominant user roles, lecturer and student, of LMS Information Security factors. We proposed a model of user perception for Moodle and Google Classroom LMSs (UPoLMS) based on information security-related aspects. The model was then validated using statistical testing tools with input data collected from feedback surveys.
According to the feedback from respondents, statistical testing was applied to the defined factors. The results show that lecturers and students perceive information security aspects of LMSs differently. In the case of students, user knowledge of information security influences the user perception, which, in turn, influences the user perception of trustworthiness of both Moodle and Google Classroom. Conversely, in the case of lecturers, information security knowledge and information security-related perceptions do not affect the perception of trustworthiness of an LMS. Only the PI-A and PII factors affect user perception of trustworthiness of Moodle among lecturers.
Based on the Likert scale threshold, which represents an adequate IS user perception, lecturers and students have significantly different perceptions of Moodle and Google Classroom. Lecturers have a better perception of Moodle, whereas students have a better perception of Google Classroom. In any case, both user roles have a relatively good perception of the information security factors of the two LMSs, as indicated by their Likert scales, which are all above 3.5. However, both the lecturer and student users have a better perception of the information security offered by Google Classroom, compared to Moodle LMS.
The lack of information security awareness has the potential to expose organizations to security risk. Moreover, the majority of information security-related incidents can be attributed to negligence or a lack of awareness on the part of users [52]. Considering that the results of this study indicate a general lack of awareness, institutions that use Moodle, in particular, need to conduct information security awareness programs such as trainings and social events to emphasize the importance of information security and the leadership's commitment to comply with information security governance. We also recommend that institutions implement different information security programs depending on user characteristics and the LMS (Moodle or Google Classroom) used.
Despite in general the objectives of this study were achieved; this study revealed several drawbacks in the results of the study. One of the drawbacks is that the large number of respondent data is invalid when tested with Cronbach's alpha analysis, causing the UPoLMS mode to be revised. Because of the revision, we were unable to elaborate on the relationship between some of the TAM model factors.
This study does not explore synchronous online learning models that can be integrated with Moodle or Google Classroom as LMS objects under study, such as Google Meet for Google Classroom and Big Blue Button for Moodle LMS. In future studies, apart from working on improving data collection techniques to improve data quality, we will elaborate on the information security aspects of the synchronous model. Several problem formulations related to this research include the ease of integration with LMS (integrity aspect), how stable synchronous applications are when integrated with LMS (availability aspect), and how authentication and authority are managed (confidential aspect).
The authors would like to thank LPPM Universitas Bhayangkara Jakarta Raya, who supported this research through research funding contract No.: PK/ 16 / IV /LPPMPUBJ/PENELITIAN/2022.
N/A
was born in 1970, in Magetan, East Java, Indonesia. He acquired his Bachelor’s degree in Informatics and Magister’s degree in Informatics from Bandung Institute of Technology, followed by a doctoral degree in Computer Science from Universitas Indonesia, Jakarta in 2017. He currently serves as a member of the Faculty of Computer Science Universitas Bhayangkara Jakarta Raya and IT Director of the University. His area of research includes AI, Machine Learning, and IT Governance. The focus of his publ ications are mainl y machine learning and e-Learning. He can be contacted via email:
He holds a master’s degree in computer science from STMIK Nusa Mandiri Jakarta, Indonesia for his thesis “Application of Greedy Forward Selection and Bagging in Logistic Regression for Software Defects Prediction”. His research interests include Software engineering, Data Mining, Networking, and e-Learning. He currently serves as a tenured lecturer at the Department of Informatics, Universitas Bhayangkara Jakarta Raya. He can be contacted via email:
She received her Magister’s degree in computational science from the Mathematics and Natural Science Institut Teknologi Bandung (ITB), West Java, Indonesia. She currently serves as a member of the Computer Science Faculty at Universitas Bhayangkara Jakarta Raya, Bekasi, Indonesia. Her research interests include computational science, machine learning, data science and artificial intelligence. She is also a member of the Indonesian Computational Society, Asosiasi Profesi Perguruan Tinggi Ilmu Komputer (APTIKOM), Asosiasi Ilmuwan Data Indonesia (AIDI), and Relawan Jurnal Indonesia (RJI).
Dyah Ayu was born in Jakarta, Indonesia in 1997. She is currently enrolled in a doctoral program in Business at IPB University, Bogor, Indonesia. She holds a bachelor’s degree in business from Prasetiya Mulya University, Jakarta, Indonesia, and a master’s degree in marketing management from Universitas Indonesia, Jakarta, Indonesia. Her specialization and interests lie in the Business and Marketing fields.
He was born in Jakarta in 1978. He holds a master’s degree in Telecommunication technology from Mercu Buana University Jakarta. His area of research includes mobile network and transmission technology. He can be contacted via email:
She holds a BS degree in Electro Engineering from ISTN, Jakarta and a master’s degree in Telecommunication Management from Mercu Buana University, Jakarta. Her research interests include E-business, Business Intelligence, and Learning Management System.
Journal of information and communication convergence engineering 2023; 21(1): 32-44
Published online March 31, 2023 https://doi.org/10.56977/jicce.2023.21.1.32
Copyright © Korea Institute of Information and Communication Engineering.
Mujiono Sadikin 1*, Rakhmat Purnomo 1, Rafika Sari 1, Dyah Ayu Nabilla Ariswanto 2, Juanda Wijaya 3, and Lydia Vintari3
1Faculty of Computer Science, Universitas Bhayangkara Jakarta Raya, Bekasi 17121, Indonesia
2Faculty of Business, IPB University, Bogor, Indonesia
3Faculty of Computer Science, Universitas Mercu Buana, Jakarta 11650, Indonesia
Correspondence to:Mujiono Sadikin (E-mail: mujiono.sadikin@gmail.com)
Faculty of Computer Science, Universitas Bhayangkara Jakarta Raya, Bekasi 17121, Indonesia
This is an Open Access article distributed under the terms of the Creative Commons Attribution Non-Commercial License (http://creativecommons.org/licenses/by-nc/3.0/) which permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited.
Information security breach is a major risk in e-learning. This study presents the potential information security disruptions in Learning Management Systems (LMS) from the perspective of users. We use the Technology Acceptance Model approach as a user perception model of information security, and the results of a questionnaire comprising 44 questions for instructors and students across Indonesia to verify the model. The results of the data analysis and model testing reveals that lecturers and students perceive the level of information security in the LMS differently. In general, the information security aspects of LMSs affect the perceptions of trust of student users, whereas such a correlation is not found among lecturers. In addition, lecturers perceive information security aspect on Moodle is and Google Classroom differently. Based on this finding, we recommend that institutions make more intense efforts to increase awareness of information security and to run different information security programs.
Keywords: Information security, E-learning, Moodle, Google Classroom, User perception, COVID-19
Currently, the e-learning systems are becoming increasingly important because of the digitalization of education. Most educational institutions utilize e-learning systems considering the significant advantages. These include flexibility in terms of time and space, cost, and infrastructure efficiencies, and also overcome traffic jams, which is a common problem in major cities [1,2]. The COVID-19 pandemic, the importance of e-learning systems in education and teaching mushroomed. Many studies have shown that online learning system environments, such as Moodle and Google Classroom have been widely appreciated [3-6]. As the learning process enabler, e-learning provides numerous benefits such as flexibility in learning material format (text, audio, video, image) and storage media for teaching materials, lower cost for students, and increase in the capacity of classrooms [7]. Furthermore, the decrease in energy consumption and paper usage reduces the negative impact of education-related activities on the environment [8]. E-learning systems also offer benefits in terms of instructor - student interactions, such as flexibility, usability, and efficiency in face-to-face learning [9]. According to Fatoni et al. [10], the most advantageous feature of e-learning systems is the comfortable educational environment.
The security concerns associated with the COVID-19 pandemic forced humankind to pursue all possible activities online, including education and teaching. Thus, e-learning systems have become a necessity, and the entire academic community must be familiar with them [11,12]. However, elearning during the pandemic faces various challenges and risks that must be overcome [13-15]. Most of the risks that have been identified are related to information security issues, such as Internet traffic, which is specific to COVID-19/data availability, lack of data processing, illegitimate use, data integrity disruption, and privacy violation [11,16,17]. Accordingly, several approaches have been proposed to address the information security issues of e-learning systems during the pandemic era, such as the framework of intrusion detection [18], online learning quality assessment [12], and cryptography [17].
The Learning Management System (LMS) is the most important component of e-learning systems. Owing to the increasing demand for LMS during the COVID-19 outbreak, numerous LMS applications have been developed and recommended, either as open source, proprietary, cloud, or onpremises models. Meanwhile, as a response to the COVID-19 outbreak, UNESCO released a distance learning system recommendation comprising 11 systems. Two of these are Moodle and Google Classroom [19].
Moodle LMS is one of the most popular LMSs [20-22]. Various implementation models of the Moodle LMS have been demonstrated, ranging from the standard version to the customized module. The deployment of Moodle LMS customization covers a wide range of scope to fulfill the specific requests of each organization that implements the system [23,24]. To achieve better performance and continuity of services, various architectures have also been implemented, such as the load-balancing clustering scenario [25].
The usage of Google Classroom also increased dramatically during the pandemic [26]. Google Classroom is one of the three most adopted ready-to-use LMSs in developing countries during the outbreak [27-29]. It is also among the top three learning tools chosen by students [30]. In areas where a limited LMS system, such as global contact lens education, was used prior to the pandemic, Google Classroom is the third most used below Zoom and WeChat [31]. Google Classroom is also the most popular LMS platform for various of educational institutions in Indonesia owing to the fact that it is readily usable and can be easily set up. To be precise, the user is not required to install and set up the application, which is required for the Moodle LMS. Some studies regarding the benefits of using Google Classroom by Indonesian education institutions are presented in [5,6,32-34].
However, several risks are embedded in these LMSs. One such risk is the disruption of information security, which can appear in various forms, such as viruses, spyware, malware, ransomware, Denial of Service (DOS), or information accessed by unauthorized users [35]. The access of information/data by an unauthorized user is based on various objectives, including abuse of authority, changing data on activities, stealing information, or for certain trivial reasons [36,37]. The risk of unauthorized access to information typically increases if the system environment does not support information and system protection. In addition, users who lack information security knowledge or information security awareness are exposed to a greater risk of information security disruption. The literature review study presented in [38] shows the importance of human factors for any organization to ensure a culture of information security.
The information security concept represents the balancing of Confidentiality, Integrity, and Availability (CIA) [39,40]. “Confidentiality” refers to the condition that information sources remain hidden to all parties except for those with authorization. The principle of “Integrity” stipulates that data/information integrity and consistency are maintained at various levels and in various forms of presentations. Finally, “Availability” requires that all necessary data/information must always be available to authorized users. The basic rule of information security is that all three elements must be balanced. For example, a request to increase the level of confidentiality should not result in inaccessibility of the data/information, which it is a decrease in availability.
The risk of disruption of information security must be governed properly to ensure that whenever gaps in the security are exploited, the impacts can be minimized [41]. Accordingly, the disruption potentialities must be identified. Typically, sources of information security disruption vary, ranging from hardware or software malfunction, to human activities, such as hacking or misuse by internal users [42]. In most cases, internal user disruptions have more serious repercussions.
Various models, methods, and deterrents of information security disruptions have been studied and practiced. Lavanya et al. [43] proposed an elliptic curve cryptography algorithm (ECC) to protect data confidentiality and integrity in cloudbased e-learning systems. This method was used to counteract DOS attacks and DROWN (Decrypting RSA with Obsolete and Weakened eNcryption). Hasan [44] proposed an approach to achieve more comprehensive security of e-learning systems in terms of management depending upon the target organization. In the proposed approach, the author evaluated the security requirements of e-learning applications as a basis for preparing security models. The case studies of security approaches of e-learning applications were used as a basis for modeling security requirements that ensure the control of access, privacy, and integrity. In the early stages of compiling, an information security model was used to conduct an agent-based environmental analysis on an e-learning platform, which revealed that the critical issues for MAS (Multi-Agent Services) security were trust, authority, and authentication. The proposed security model considers this aspect and combines it with the PMA3 platform.
Security is one of the major influencing factors in e-learning adoption in Jordan, as published in [22]. According to this study, information security has a significant impact on the learning success. The survey concluded that most elearning participants have information security awareness, as they consider information security as a major e-learning success factor. Another exploratory study that recommended levels of authentication for e-learning activities was conducted by [45]. In response to previous research, this study explores the need to identify authentication levels that are specifically suitable for e-learning activities to prevent misuse. According to the descriptive statistical data collected, a certain set of e-learning activities exists, in which users feel that their identifying partners can potentially assume their identity. The results show that e-learning systems need to be authenticated even at the level of activities for summative eassessment using appropriate authentication to secure the identity of remote users.
In an integrated e-learning system study conducted in Japan [46], information security was involved in the initial stage of development as one of the main factors. Numerous international students study in Japan, giving rise to diverse information ethics and cultures. Thus, information security education was considered highly important to ensure that these differences were accommodated. In the proposed system, the information security aspects were reflected in questionnaires related to topics such as copyright and personal information. The answers to the questions were collected and assigned priority values calculated from the learner’s consciousness factor scores. Finally, the importance of each influencing factor was determined based on the priority values.
Furthermore, the drastic increase in the use of e-learning systems exacerbated the risks. Several academicians and practitioners have proposed ideas to address this problem. Giatman et al. [12] proposed a university framework for Online Learning Quality Control to guarantee the minimum standard of the learning process along with quality of the results. The framework covers the establishment of a Quality Control unit, preparation of the readiness of instructors and students, and settlement of quality assessment methods and materials. At the technical level, a cryptography mechanism to protect the CIA of an e-learning system environment was also proposed by [17]. However, cryptography alone is insufficient for this purpose. It must be combined with other techniques, such as firewalls, IDS, biometric authentication, security process models, and digital watermarking. A specific Distributed DOS (DDoS) model based on the characteristics of the e-learning system application was investigated by Vitic et al. [18]. The DDoS model considers the specifics of the operation of e-learning systems during the pandemic and can separate flash crowd events from outliers in the communication network.
Furthermore, the potential sources of disruption must be identified to protect e-learning system against them [37,47]. In this study, we elaborate on the potential disruptions from the perspective of LMS users based on their knowledge, awareness, and behavior related to LMS information security aspects. In addition, we attempt to validate hypotheses that correlate users’ knowledge and awareness of information security, perceived information confidentiality, perceived data integrity, and perceived system availability with perceived LMS trustworthiness (called the User Perceived of LMS / UPoLMS model). Furthermore, we present the security event management (SEM) approach, which was the research framework adopted in [48,49]. The objective of this study is to provide recommendations for improving the information security aspects proposed to e-learning system administrators.
Descriptive and comparative research methods were used to conduct the study. The research model was constructed based on the Technology Acceptance Model (TAM) using external variables that influence the user perception of information security aspects. The TAM is widely used to identify correlations between factors in descriptive or comparative research [9,48,50,51]. In our model, the proposed factors are categorized into two groups: the first group is user knowledge or experience of the LMS and the second is a user-perceived information security triad (the CIA triad). The proposed UPoLMS model is depicted in Fig. 1.
The proposed model is based on two initial assumptions: first, more experienced and more knowledgeable users will be more aware of information security-related aspects, and, second, the user’s trust in an LMS is influenced by the performance of the LMS information security aspects as experienced by users. Information Security Knowledge (IS-K) and Information Security Awareness (IS-A) play dominant roles in securing the systems, information, or data contained within. Several studies show that 70-80% of information securityrelated incidents occur due to negligence or unawareness of users [52]. IS-A is referred to as a state of consciousness about information security where the user ideally commits to the rules, recognizes potential risks, understands the importance of responsibilities, and acts accordingly [53-55]. User experience (UE), in this context, is the time spent by users on the LMS to perform learning activities. In this study, we treat UE as a part of IS-K because the components of UE are only measured by the time spent by the user using the LMS. PIC, PIA, and PII refer to the user perception of the information security triad, whereas the Perception of Trustworthiness (PT) refers to the user’s acceptance or trust of the LMS.
To validate these two assumptions, we provide eight study hypotheses, as listed in Table 1. Each of the study hypotheses is validated with the statistical associative hypothesis, as described in Table 1. Thus, H1 of the study is validated with statistical hypotheses H1.0 and H1.1, and so on for H2-H8.
Research hypotheses.
Hypothesis | Description |
---|---|
H1 | IS-K positively affects the user’s IS-A |
H1.0 | IS-K is not positively associate with the user’s IS-A |
H1.1 | IS-K is positively associate with the user’s IS-A |
H2 | IS-K positively affects the user’s PIC |
H2.0 | IS-K is not positively associate with the user’s PIC |
H2.1 | IS-K is positively associate with the user’s PIC |
H3 | IS-K positively affects the user’s PIA |
H3.0 | IS-K is not positively associate with the user’s PIA |
H3.1 | IS-K is positively associate with the user’s PIA |
H4 | IS-K positively affects the user’s PII |
H4.0 | IS-K is not positively associate with the user’s PII |
H4.1 | IS-K is positively associated with the user’s PII |
H5 | IS-A positively affects the users PT |
H5.0 | IS-A is not positively associated with the user’s PT |
H5.1 | IS-A is positively associated with the user’s PT |
H6 | PIC positively affects the users PT |
H6.0 | PIC is not positively associated with the user’s PT |
H6.1 | PIC is positively associated with the user’s PT |
H7 | PIA positively affects the user’s PT |
H7.0 | PIA is not positively associated with the user’s PT |
H7.1 | PIA is positively associated with the user’s PT |
H8 | PII positively affects the user’s PT |
H8.0 | PII is not positively associated with the user’s PT |
H8.1 | PII is positively associated with the user’s PT |
Overall, the study comprised the following stages: survey, statistical data analysis, comparison of results, and summarization. The survey was conducted during the early stage of the pandemic outbreak in Indonesia in 2020, and it was updated by a second survey in 2022. The feedback collection was performed using both the Google form application and hard copy, which were manually collected, whereas the data processing and analysis were performed using MS Excel and the SPSS application. The detailed steps of this study are shown in Fig. 2.
The survey and questionnaires were designed on the basis of the model described above. Therefore, the questionnaires were divided into four groups. The first group of the questionnaires focused on general information about the respondent (gender, institution where they come from, what the most used LMS platform is, user role in the e-learning system, i.e., lecturer or student, department, and age), and the indication of their LMS experiences. The second group of questionnaires focused on the knowledge and experience of respondents in information security. The third group of questionnaires focused on the information security triad, and the last group assessed the perceived trustworthiness of the LMS. For all groups, we developed a collection of questionnaires with 44 questions; the number of questions in each category is presented in Table 2.
Number of each questioner category questions.
Questionnaires Category | #Quest. |
---|---|
IS-K: User's Information Security Knowledge (incl. User Experience) | 15 |
IS-A: User's Information Security Awareness | 7 |
PIC: User Perception of Information Security | 7 |
PIA: User Perception of Information/Data availability | 4 |
PII: User Perception of Information/Data Integrity | 4 |
PT: User Perception of Trustiness to the LMS | 7 |
Students and lecturers are central to e-learning systems in terms of numbers and intensity of use. Other additional user roles, such as system administrators, process business owners, process business administrators, and management also exist. In the survey, we focused only on students and lecturers as respondents.
We also developed open and closed questions. The open questions were mostly directed at collecting user comments and opinions regarding the LMS the respondents used. The closed questions were multiple-choice models with five answer choices ranging from “Strongly agree,” “Agree,” “Neutral,” “Disagree,” and “Strongly disagree.” All questions were formulated to reflect a positive opinion. Thus, a higher Likert scale score given to a certain question indicates a better (more positive) response to the opinion represented by the question. A few of these questions are listed in Table 3.
The samples of survey questions.
Category | Question |
---|---|
IS-K | The e-learning system should maintain a balance between availability, confidentiality, and data integrity |
IS-K | The e-learning password is the "I know" authentication factor |
IS-A | I change my password periodically, retaining it for a maximum of 6 (six) months |
IS-A | I always have backups of my e-learning data on my personal computer |
PIC | The current state of the e-learning system does not allow unauthorized users to access module files |
PIC | The current state of the e-learning system does not allow unauthorized users to access end user data |
PII | The condition of the module file that I uploaded in e-learning was identical to that when it was downloaded by a student and to that on my computer |
PIA | In the past semester / six months I have not experienced a failure in downloading student grades |
PIA | In the last semester / six months I have not experienced a module upload failure |
PT | The e-learning system has a good reputation in carrying out elearning -based learning activities |
PT | The e-learning system can guarantee the security of its information |
In the first round of surveys, we distributed questionnaires only to a limited number of users to validate the questionnaires and obtain feedback on quality. The purpose of the first survey round was to ensure that some quality parameters were achieved. These parameters are all questions that can be clearly understood; no bias or overlap is present in the questions, and which are grammatically correct.
Two feedback collection mechanisms were employed: online and offline. Online feedback collection was performed using the Google form application, whereas offline collection was performed using the hard copy form distributed in the classrooms.
The main function of the data pre-processing stage was to provide clean and ready-to-process feedback data. Activities performed in this stage included the removal of user privacy information, data entry of offline feedback, and removal of invalid data. The main activity was converting users’ answers on closed questions into scores on the Likert scale: "Strongly agree” (5), "Agree” (4), "Neutral” (3), "Disagree” (2), "Strongly disagree” (1).
The first task in the data analysis stage was feedback reliability validation testing. We used Cronbach’s alpha validation tools to perform the testing, since it was the most popular [56]. The next data analysis task was correlation testing to validate each hypothesis, as presented in Table 1. We used the following linear correlation function:
where Y is the average of the Likert scale values of the affected IS factor X is the average of the Likert scale values of the affected IS factor
For example, when applying the formula for H1, Y is the average IS-A Likert scale value, X is the average of IS-K Likert scale value, In the case of H2, Y is the average PIC Likert scale value, X is the average of IS-K Likert scale value, and so on for the remaining Hi, where i = 3,4,5,6,7,8.
We distributed the questionnaire in Google Form format through messaging systems and social media platforms such as WhatsApp, Facebook, Instagram, and Twitter. A total of 1033 respondents from various institutions spread across the globe were surveyed. Since the Google Form questionnaires were openly distributed through various media, all user ranging from lecturers and students to industry practitioners and government staff were part of the survey. Most of the respondents are affiliated to universities followed by members of the government and private sector. Meanwhile, Moodle and Google Classroom were the two most used LMSs. In addition, the global summary of respondent profiles is shown in Fig. 3, which presents the institutions, respondents’ roles, LMS used, and time spent on the LMS. In the analysis of the feedback results, Moodle and Google Classroom were selected as the representative LMS platforms, and lecturers and students as the representative users. Thus, we present four categories of analysis: The Moodle LMS Information Security aspect from the instructor’s perception, Moodle LMS Information Security aspect from students’ perception, Google Classroom Information Security aspect from instructor’s perception, and Google Classroom Information Security aspect from students’ perceptions.
The overall reliability validation testing of the sample using an Cronbach’s alpha variable is presented in Table 4. Cronbach’s alpha coefficient justifies factors as reliable if their value is 0.70 or greater [57,58]. The Cronbach’s value of each factor (variable) for each user role and LMS platform, as presented in Table 4, varies from 0.35 0.98. A few of the Cronbach alpha values are less than 0.70, which indicates that the factor is unreliable. Accordingly, we ignore the corresponding factors in the subsequent stage of analysis The unreliable factors are: the IS-A factor of lecturers on Google Classroom, P-II factor of lecturers on Google Classroom, IS-A factor of lecturers on Moodle, and P-II factor of students on Moodle, which have, which have Cronbach values of 0.35, 0.42, 0.67, and 0.68, respectively.
The Cronbach alpha value.
UE-ISK | IS-A | P-IC | P-II | P-IA | PT | |
---|---|---|---|---|---|---|
Student-Moodle | 0.84 | 0.76 | 0.94 | 0.68 | 0.86 | 0.93 |
Student-Google Classroom | 0.87 | 0.93 | 0.98 | 0.72 | 0.90 | 0.94 |
Lecturer-Moodle | 0.85 | 0.67 | 0.95 | 0.72 | 0.95 | 0.94 |
Lecturer-Google Classroom | 0.77 | 0.35 | 0.90 | 0.42 | 0.81 | 0.86 |
To validate our hypothesis, we applied the linear regression model presented in Section 3. In this section, we elaborate on the analysis of each category based on the dominant respondent role.
Table 5 presents the overall hypothesis analysis of the student- Moodle and Google Classroom UPoLMS model. As presented on the left side of Table 5, seven out of eight Hx.0 hypothesis of the student-Moodle UPoLMS are contradicted by the questionnaire’s feedback data; therefore, all Hx.0 are rejected and Hx.1 are accepted. The results indicate that IS-K influences IS-A (β2 = 0.2941, P-value = 0.000), PIC (β2 = 0.26600, P-value = 0.000), PIA (β2=0.3683, P-value = 0.000), and PII (β2 = 0.2567, P-value = 0.000) factors, respectively. The last three rows, except for PII that is ignored, indicate that PT factors are consistently influenced by IS-A, PIC, and PI-A, as shown by the β2 coefficient and P-value. For, IS-A, β2 = 0.6332, and P-value = 0.0000; for PIC, β2 = 0.0163, and P-value = 0.000; and for PIA, β2 = 0.4774, and P-value = 0.0000. Based on the results of the data correlation analysis, the Moodle students’ UPoLMS model was revised, as shown in Fig. 4.
The student hypothesis analysis result.
Hypothesis | Description | Moodle | Google CR | ||||||
---|---|---|---|---|---|---|---|---|---|
β1 | β2 | P-val | Results | β1 | β2 | P-val | Results | ||
H1.0 | IS-K->ISA | 2.1125 | 0.2941 | 0.0000 | reject H1.0 | -1.3629 | 1.2233 | 0.0000 | reject H1.0 |
H2.0 | IS-K->PIC | 2.2204 | 0.2660 | 0.0000 | reject H2.0 | -0.9815 | 1.1502 | 0.0000 | reject H2.0 |
H3.0 | IS-K->PIA | 2.3234 | 0.3683 | 0.0000 | reject H3.0 | 1.5105 | 0.6653 | 0.0000 | reject H3.0 |
H4.0 | IS-K->PII* | 3.0917 | 0.2567 | 0.0000 | N/A due to Cronbach alpha | 1.6713 | 0.6465 | 0.0000 | Reject H4.0 |
H5.0 | IS-A->PT | 3.1475 | 0.6332 | 0.0000 | reject H5.0 | 1.7723 | 0.6452 | 0.0000 | reject H5.0 |
H6.0 | PIC->PT | 3.1475 | 0.1603 | 0.0001 | reject H6.0 | 2.4191 | 0.4943 | 0.0000 | reject H6.0 |
H7.0 | PIA->PT | 1.8714 | 0.4774 | 0.0000 | reject H7.0 | 1.7549 | 0.6153 | 0.0000 | reject H7.0 |
H8.0 | PII->PT* | 0.6155 | 0.7453 | 0.0000 | N/A due to Cronbach alpha | -0.0666 | 0.9919 | 0.0000 | reject H8.0 |
The results of Cronbach’s analysis of the student-Google Classroom differed slightly from the Moodle results, as shown in Table 4. We can use all the model factors of Google Classroom to perform further hypothesis validation of the student-Google Classroom UPoLMS. Overall, seven out of 8 Hx.0 hypotheses (since we ignore the PII factor) are contradicted by the questionnairés feedback data; therefore, all Hx.0 are rejected and Hx.1 are accepted. The results indicate that IS-K influences IS-A (β2 = 1.2233, P-value = 0.000), PIC (b2 = 1.1502, P-value = 0.000), and PIA (β2 = 0.6683, P-value = 0.000). The last four rows of data of β2 coefficient and P-value confirm that PT factors are consistently influenced by IS-A, PIC, PI-A, and PII, as well as by their positive β2 coefficient and zero P-Value. Based on the correlation data results, the UPoLMS student-Google Classroom model matches the proposed model, as depicted in Fig. 3. Therefore, the proposed model does not require modification.
A hypothesis analysis of the lecturer UPoLMS model is presented in Table 6. The IS-A factor was ignored in the hypothesis analysis stage because its Cronbach’s value was under 0.7. Based on the P-value of each factor, which is above 0.05 for both Moodle and Google Classroom LMS, most of the Hx.0 hypotheses are accepted. The exceptions are the PIA and PII factors for Moodle, which influence the PT factor. The hypothesis analysis results reveal that the lecturers’ Information Security Knowledge and the Information Security triad are not correlated. However, the perception of trustworthiness in both Moodle and Google Classroom is influenced only by the perception of information availability and integrity.
The student hypothesis analysis result.
Hypothesis | Description | Moodle | Google CR | ||||||
---|---|---|---|---|---|---|---|---|---|
β1 | β2 | P-val | Results | β1 | β2 | P-val | Results | ||
H1.0 | IS-K->ISA* | 3.2283 | -0.0013 | 0.9761 | N/A due to Cronbach alpha | 1.8776 | 0.0968 | 0.3757 | N/A due to Cronbach alpha |
H2.0 | IS-K->PIC | 3.5590 | -0.0227 | 0.7695 | accept H2.0 | 1.3858 | -0.0864 | 0.5466 | accept H2.0 |
H3.0 | IS-K->PIA | 3.3155 | 0.1135 | 0.1840 | accept H3.0 | 1.7601 | 0.0021 | 0.5494 | accept H3.0 |
H4.0 | IS-K->PII | 3.7406 | 0.0550 | 0.3434 | accept H4.0 | 3.2627 | -0.1460 | 0.2416 | accept H4.0 |
H5.0 | IS-A->PT | 3.7952 | 0.0273 | 0.7855 | accept H5.0 | 4.5633 | -0.3320 | 0.1146 | accept H5.0 |
H6.0 | PIC->PT | 3.9885 | -0.0304 | 0.5941 | accept H6.0 | 4.9183 | -0.1966 | 0.0113 | accept H6.0 |
H7.0 | PIA->PT | 2.4956 | 0.3674 | 0.0000 | reject H7.0 | 4.8593 | -0.2131 | 0.0248 | accept H7.0 |
H8.0 | PII->PT | 1.5109 | 0.5984 | 0.0000 | reject H8.0 | 3.5973 | -0.0287 | 0.3175 | accept H8.0 |
In this stage, we investigate whether the characteristics of perception of Information Security differ significantly between lecturers and students. The samples collected included 726 students and 300 lecturers/instructors; thus, based on this number of samples, we can assume that the sampling is normally distributed. Accordingly, we conducted a t-test validation as an independent sample test tool to determine the differences in perception of information security factors. The proposed hypothesis of the test is as follows:
H0: μ1 ≤ μ2 (lecturer’s rating of Information Security is less than or equal to that of the student)
H1: μ1 > μ2 (lecturer’s rating of Information Security is better than that of the student)
The t-test results, using a = 0.05, are presented in Table 7, which shows a significant difference between lecturers and students in their perception of the Moodle and Google Classroom information security factors. In the case of Moodle, for four of the six factors t-stat > t-critical one-tile, whereas for the remaining two factors present t-stat < t-critical one tile. Thus, for the four factors, as H0 is rejected and H1 is accepted, the lecturer perception of information security in Moodle is better than the student perception. Conversely, in the Google Classroom t-test, for five of the six t-test factors, t-stat < t-critical one tile, indicating that the confidence level of students is better than that of lecturers. In contrast, the PII and PT factors exhibit similar perception patterns for both Moodle and Google Classroom. In the PII factor for both Moodle and Google Classroom, the students’ perception is better than that of the lecturers, whereas for the PT factor, the lecturer’s perception is better than the student’s perception.
Correlation analysis of lecturer UPoLMS model.
Factors | Moodle | Google Classroom | ||
---|---|---|---|---|
t Stat | t Critical one-tail | t Stat | t Critical one-tail | |
IS-K: User's Information Security Knowledge (1) | 2.1534 | 1.6484 | -5.4962 | 1.6606 |
IS-A: User's Information Security Awareness (2) | 1.9821 | 1.6483 | -12.3654 | 1.6522 |
PIC: User Perception of Information Security (3) | 3.3472 | 1.6492 | -6.5524 | 1.6561 |
PIA: User Perception of Information/Data Availability (4) | 0.1068 | 1.6493 | -5.9765 | 1.6587 |
PII: User Perception of Information/Data Integrity (5) | -3.0639 | 1.6496 | -6.8155 | 1.6583 |
PT: User Perception of Trustiness to LMS (6) | 3.9142 | 1.6486 | 6.0757 | 1.6524 |
The next analysis was performed to determine the level of user perception of the information security aspect. As described in Section 3.3, all questions were formulated as positive opinions. In other words, a higher value of the user’s answer, represents a more positive perception. Here, we employed mean value analysis by comparing the mean value to 3.5 as the minimum threshold of good perception. Fig. 5 depicts the chart of the Likert scale mean of the information security-related perception factors of lecturers and students for (a) Moodle and (b) Google Classroom. These charts show the different information security-related perceptions of lecturers and students. For Moodle, the results indicate that, in general, lecturers have more positive perceptions compared with students, whereas the converse is true for Google Classroom, for which students have better perceptions.
On comparing the two LMSs, both lecturers and students are seen to have a better perception of Google Classroom, which could be attributed to the fact that Google Classroom services are provided by a mature company, whereas Moodle is managed independently, which results in different management standards depending upon the institutions. These standards lead to different levels of service. However, further investigation is required to validate this assumption. Overall, both user roles have a positive perception of the two LMSs, as indicated by the average level of perception above the threshold of 3.5. Table 8 shows the detailed results of the Likert-scale mean level presented with the variance of each factor. As shown in the Table, in general, the perception level is above the threshold. However, the perception level of both user roles is below the threshold for IS-A and PIC. In particular, information security awareness needs to receive more attention for Moodle and Google Classroom because both lecturer and student perceptions of this factor are below the threshold. Meanwhile, for Google Classroom, only the perception of the lecturers is below the threshold.
Likert scale mean - variance of information security related factors.
Factors | Moodle | Google Classroom | ||
---|---|---|---|---|
Mean | Variance | Mean | Variance | |
IS-K: User's Information Security Knowledge (1) | ||||
Lecture | 4.0628 | 0.4897 | 4.2768 | 0.2784 |
Student | 3.9264 | 0.5882 | 4.7156 | 0.2343 |
Difference | 0.1364 | -0.0985 | -0.4387 | 0.0441 |
IS-A: User's Information Security Awareness (2) | ||||
Lecture | 3.2229 | 0.2170 | 3.4891 | 0.0925 |
Student | 3.1693 | 0.2530 | 4.4057 | 0.5811 |
Difference | 0.0537 | -0.0359 | -0.9166 | -0.4886 |
PIC: User Perception of Information Security (3) | ||||
Lecture | 3.4669 | 0.6696 | 3.7337 | 0.4110 |
Student | 3.3183 | 0.5303 | 4.4425 | 0.6881 |
Difference | 0.1486 | 0.1392 | -0.7089 | -0.2770 |
PIA: User Perception of Information/Data Availability (4) | ||||
Lecture | 3.7766 | 0.8197 | 4.1186 | 0.3174 |
Student | 3.7714 | 0.6236 | 4.6480 | 0.3534 |
Difference | 0.0052 | 0.1961 | -0.5294 | -0.0360 |
PII: User Perception of Information/Data Integrity (5) | ||||
Lecture | 3.9639 | 0.3772 | 4.3023 | 0.1492 |
Student | 4.0637 | 0.2538 | 4.7200 | 0.1764 |
Difference | -0.0998 | 0.1234 | -0.4177 | -0.0272 |
PT: User Perception of Trustiness to LMS (6) | ||||
Lecture | 3.8831 | 0.4984 | 4.9661 | 0.0666 |
Student | 3.7270 | 0.5057 | 4.6150 | 0.3264 |
Difference | 0.1561 | -0.0073 | 0.3511 | -0.2597 |
In practice, the results of user perceptions of these LMSes can be considered for institutions that use Moodle or Google Classroom. Based on the perception and differences between lecturers and students, institutions need to customize their LMS information security policies separately, according to the needs of lecturers and students.
In this study, we investigated the perception of two dominant user roles, lecturer and student, of LMS Information Security factors. We proposed a model of user perception for Moodle and Google Classroom LMSs (UPoLMS) based on information security-related aspects. The model was then validated using statistical testing tools with input data collected from feedback surveys.
According to the feedback from respondents, statistical testing was applied to the defined factors. The results show that lecturers and students perceive information security aspects of LMSs differently. In the case of students, user knowledge of information security influences the user perception, which, in turn, influences the user perception of trustworthiness of both Moodle and Google Classroom. Conversely, in the case of lecturers, information security knowledge and information security-related perceptions do not affect the perception of trustworthiness of an LMS. Only the PI-A and PII factors affect user perception of trustworthiness of Moodle among lecturers.
Based on the Likert scale threshold, which represents an adequate IS user perception, lecturers and students have significantly different perceptions of Moodle and Google Classroom. Lecturers have a better perception of Moodle, whereas students have a better perception of Google Classroom. In any case, both user roles have a relatively good perception of the information security factors of the two LMSs, as indicated by their Likert scales, which are all above 3.5. However, both the lecturer and student users have a better perception of the information security offered by Google Classroom, compared to Moodle LMS.
The lack of information security awareness has the potential to expose organizations to security risk. Moreover, the majority of information security-related incidents can be attributed to negligence or a lack of awareness on the part of users [52]. Considering that the results of this study indicate a general lack of awareness, institutions that use Moodle, in particular, need to conduct information security awareness programs such as trainings and social events to emphasize the importance of information security and the leadership's commitment to comply with information security governance. We also recommend that institutions implement different information security programs depending on user characteristics and the LMS (Moodle or Google Classroom) used.
Despite in general the objectives of this study were achieved; this study revealed several drawbacks in the results of the study. One of the drawbacks is that the large number of respondent data is invalid when tested with Cronbach's alpha analysis, causing the UPoLMS mode to be revised. Because of the revision, we were unable to elaborate on the relationship between some of the TAM model factors.
This study does not explore synchronous online learning models that can be integrated with Moodle or Google Classroom as LMS objects under study, such as Google Meet for Google Classroom and Big Blue Button for Moodle LMS. In future studies, apart from working on improving data collection techniques to improve data quality, we will elaborate on the information security aspects of the synchronous model. Several problem formulations related to this research include the ease of integration with LMS (integrity aspect), how stable synchronous applications are when integrated with LMS (availability aspect), and how authentication and authority are managed (confidential aspect).
The authors would like to thank LPPM Universitas Bhayangkara Jakarta Raya, who supported this research through research funding contract No.: PK/ 16 / IV /LPPMPUBJ/PENELITIAN/2022.
N/A
Research hypotheses.
Hypothesis | Description |
---|---|
H1 | IS-K positively affects the user’s IS-A |
H1.0 | IS-K is not positively associate with the user’s IS-A |
H1.1 | IS-K is positively associate with the user’s IS-A |
H2 | IS-K positively affects the user’s PIC |
H2.0 | IS-K is not positively associate with the user’s PIC |
H2.1 | IS-K is positively associate with the user’s PIC |
H3 | IS-K positively affects the user’s PIA |
H3.0 | IS-K is not positively associate with the user’s PIA |
H3.1 | IS-K is positively associate with the user’s PIA |
H4 | IS-K positively affects the user’s PII |
H4.0 | IS-K is not positively associate with the user’s PII |
H4.1 | IS-K is positively associated with the user’s PII |
H5 | IS-A positively affects the users PT |
H5.0 | IS-A is not positively associated with the user’s PT |
H5.1 | IS-A is positively associated with the user’s PT |
H6 | PIC positively affects the users PT |
H6.0 | PIC is not positively associated with the user’s PT |
H6.1 | PIC is positively associated with the user’s PT |
H7 | PIA positively affects the user’s PT |
H7.0 | PIA is not positively associated with the user’s PT |
H7.1 | PIA is positively associated with the user’s PT |
H8 | PII positively affects the user’s PT |
H8.0 | PII is not positively associated with the user’s PT |
H8.1 | PII is positively associated with the user’s PT |
Number of each questioner category questions.
Questionnaires Category | #Quest. |
---|---|
IS-K: User's Information Security Knowledge (incl. User Experience) | 15 |
IS-A: User's Information Security Awareness | 7 |
PIC: User Perception of Information Security | 7 |
PIA: User Perception of Information/Data availability | 4 |
PII: User Perception of Information/Data Integrity | 4 |
PT: User Perception of Trustiness to the LMS | 7 |
The samples of survey questions.
Category | Question |
---|---|
IS-K | The e-learning system should maintain a balance between availability, confidentiality, and data integrity |
IS-K | The e-learning password is the "I know" authentication factor |
IS-A | I change my password periodically, retaining it for a maximum of 6 (six) months |
IS-A | I always have backups of my e-learning data on my personal computer |
PIC | The current state of the e-learning system does not allow unauthorized users to access module files |
PIC | The current state of the e-learning system does not allow unauthorized users to access end user data |
PII | The condition of the module file that I uploaded in e-learning was identical to that when it was downloaded by a student and to that on my computer |
PIA | In the past semester / six months I have not experienced a failure in downloading student grades |
PIA | In the last semester / six months I have not experienced a module upload failure |
PT | The e-learning system has a good reputation in carrying out elearning -based learning activities |
PT | The e-learning system can guarantee the security of its information |
The Cronbach alpha value.
UE-ISK | IS-A | P-IC | P-II | P-IA | PT | |
---|---|---|---|---|---|---|
Student-Moodle | 0.84 | 0.76 | 0.94 | 0.68 | 0.86 | 0.93 |
Student-Google Classroom | 0.87 | 0.93 | 0.98 | 0.72 | 0.90 | 0.94 |
Lecturer-Moodle | 0.85 | 0.67 | 0.95 | 0.72 | 0.95 | 0.94 |
Lecturer-Google Classroom | 0.77 | 0.35 | 0.90 | 0.42 | 0.81 | 0.86 |
The student hypothesis analysis result.
Hypothesis | Description | Moodle | Google CR | ||||||
---|---|---|---|---|---|---|---|---|---|
β1 | β2 | P-val | Results | β1 | β2 | P-val | Results | ||
H1.0 | IS-K->ISA | 2.1125 | 0.2941 | 0.0000 | reject H1.0 | -1.3629 | 1.2233 | 0.0000 | reject H1.0 |
H2.0 | IS-K->PIC | 2.2204 | 0.2660 | 0.0000 | reject H2.0 | -0.9815 | 1.1502 | 0.0000 | reject H2.0 |
H3.0 | IS-K->PIA | 2.3234 | 0.3683 | 0.0000 | reject H3.0 | 1.5105 | 0.6653 | 0.0000 | reject H3.0 |
H4.0 | IS-K->PII* | 3.0917 | 0.2567 | 0.0000 | N/A due to Cronbach alpha | 1.6713 | 0.6465 | 0.0000 | Reject H4.0 |
H5.0 | IS-A->PT | 3.1475 | 0.6332 | 0.0000 | reject H5.0 | 1.7723 | 0.6452 | 0.0000 | reject H5.0 |
H6.0 | PIC->PT | 3.1475 | 0.1603 | 0.0001 | reject H6.0 | 2.4191 | 0.4943 | 0.0000 | reject H6.0 |
H7.0 | PIA->PT | 1.8714 | 0.4774 | 0.0000 | reject H7.0 | 1.7549 | 0.6153 | 0.0000 | reject H7.0 |
H8.0 | PII->PT* | 0.6155 | 0.7453 | 0.0000 | N/A due to Cronbach alpha | -0.0666 | 0.9919 | 0.0000 | reject H8.0 |
The student hypothesis analysis result.
Hypothesis | Description | Moodle | Google CR | ||||||
---|---|---|---|---|---|---|---|---|---|
β1 | β2 | P-val | Results | β1 | β2 | P-val | Results | ||
H1.0 | IS-K->ISA* | 3.2283 | -0.0013 | 0.9761 | N/A due to Cronbach alpha | 1.8776 | 0.0968 | 0.3757 | N/A due to Cronbach alpha |
H2.0 | IS-K->PIC | 3.5590 | -0.0227 | 0.7695 | accept H2.0 | 1.3858 | -0.0864 | 0.5466 | accept H2.0 |
H3.0 | IS-K->PIA | 3.3155 | 0.1135 | 0.1840 | accept H3.0 | 1.7601 | 0.0021 | 0.5494 | accept H3.0 |
H4.0 | IS-K->PII | 3.7406 | 0.0550 | 0.3434 | accept H4.0 | 3.2627 | -0.1460 | 0.2416 | accept H4.0 |
H5.0 | IS-A->PT | 3.7952 | 0.0273 | 0.7855 | accept H5.0 | 4.5633 | -0.3320 | 0.1146 | accept H5.0 |
H6.0 | PIC->PT | 3.9885 | -0.0304 | 0.5941 | accept H6.0 | 4.9183 | -0.1966 | 0.0113 | accept H6.0 |
H7.0 | PIA->PT | 2.4956 | 0.3674 | 0.0000 | reject H7.0 | 4.8593 | -0.2131 | 0.0248 | accept H7.0 |
H8.0 | PII->PT | 1.5109 | 0.5984 | 0.0000 | reject H8.0 | 3.5973 | -0.0287 | 0.3175 | accept H8.0 |
Correlation analysis of lecturer UPoLMS model.
Factors | Moodle | Google Classroom | ||
---|---|---|---|---|
t Stat | t Critical one-tail | t Stat | t Critical one-tail | |
IS-K: User's Information Security Knowledge (1) | 2.1534 | 1.6484 | -5.4962 | 1.6606 |
IS-A: User's Information Security Awareness (2) | 1.9821 | 1.6483 | -12.3654 | 1.6522 |
PIC: User Perception of Information Security (3) | 3.3472 | 1.6492 | -6.5524 | 1.6561 |
PIA: User Perception of Information/Data Availability (4) | 0.1068 | 1.6493 | -5.9765 | 1.6587 |
PII: User Perception of Information/Data Integrity (5) | -3.0639 | 1.6496 | -6.8155 | 1.6583 |
PT: User Perception of Trustiness to LMS (6) | 3.9142 | 1.6486 | 6.0757 | 1.6524 |
Likert scale mean - variance of information security related factors.
Factors | Moodle | Google Classroom | ||
---|---|---|---|---|
Mean | Variance | Mean | Variance | |
IS-K: User's Information Security Knowledge (1) | ||||
Lecture | 4.0628 | 0.4897 | 4.2768 | 0.2784 |
Student | 3.9264 | 0.5882 | 4.7156 | 0.2343 |
Difference | 0.1364 | -0.0985 | -0.4387 | 0.0441 |
IS-A: User's Information Security Awareness (2) | ||||
Lecture | 3.2229 | 0.2170 | 3.4891 | 0.0925 |
Student | 3.1693 | 0.2530 | 4.4057 | 0.5811 |
Difference | 0.0537 | -0.0359 | -0.9166 | -0.4886 |
PIC: User Perception of Information Security (3) | ||||
Lecture | 3.4669 | 0.6696 | 3.7337 | 0.4110 |
Student | 3.3183 | 0.5303 | 4.4425 | 0.6881 |
Difference | 0.1486 | 0.1392 | -0.7089 | -0.2770 |
PIA: User Perception of Information/Data Availability (4) | ||||
Lecture | 3.7766 | 0.8197 | 4.1186 | 0.3174 |
Student | 3.7714 | 0.6236 | 4.6480 | 0.3534 |
Difference | 0.0052 | 0.1961 | -0.5294 | -0.0360 |
PII: User Perception of Information/Data Integrity (5) | ||||
Lecture | 3.9639 | 0.3772 | 4.3023 | 0.1492 |
Student | 4.0637 | 0.2538 | 4.7200 | 0.1764 |
Difference | -0.0998 | 0.1234 | -0.4177 | -0.0272 |
PT: User Perception of Trustiness to LMS (6) | ||||
Lecture | 3.8831 | 0.4984 | 4.9661 | 0.0666 |
Student | 3.7270 | 0.5057 | 4.6150 | 0.3264 |
Difference | 0.1561 | -0.0073 | 0.3511 | -0.2597 |
Satmintareja, Wahyul Amien Syafei, and Aton Yulianto
Journal of information and communication convergence engineering 2024; 22(1): 23-32 https://doi.org/10.56977/jicce.2024.22.1.23Abduljalil, Sami;Kang, Dae-Ki;
The Korea Institute of Information and Commucation Engineering 2011; 9(1): 1-5 https://doi.org/10.6109/jicce.2011.9.1.001Boyd, Colin;
The Korea Institute of Information and Commucation Engineering 2013; 11(1): 17-23 https://doi.org/10.6109/jicce.2013.11.1.017