Back
 OALibJ  Vol.2 No.4 , April 2015
A Novel Information Security Scheme for E-Learning Infrastructure Success Based on TRI Model
Abstract: The fast growth of the Internet proposes and offers several new applications and advanced services that has greatly and quickly innovated the educational environment. The platform of e-learning represents an attractive educational field where the acceptance or utilization progresses and more and more people are taking courses or training using this technology. Mainly, e-learning platform exploits Internet infrastructure which became location for illegal events and actions, especially exposed to several kinds of threats or attacks. Furthermore, most of e-learning platforms are designed without taking into account security concerns. In this paper, we present e-learning environment, especially characteristics, development, growth, benefits and challenges. We also discussed and used TRI (Technology Readiness Index) which is considered a widely accepted metric for studying the behavior process behind the utilization of technological products and services. The results of the conducted TRI study demonstrate the need for a security scheme that incorporates students’ behaviors and requirements for improving e-learning usage. For this reason, we develop a new security scheme that combines the use of information service management (ISM) and a hybrid algorithm for guaranteeing the needed security requirements. Finally, we demonstrate that our proposal can guarantee the suitable environment which provides students’ satisfaction and acceptance as well as e-leaning success.
Cite this paper: Khlifi, Y. and Bessadok, A. (2015) A Novel Information Security Scheme for E-Learning Infrastructure Success Based on TRI Model. Open Access Library Journal, 2, 1-12. doi: 10.4236/oalib.1101424.
References

[1]   Sun, P.C., Ray, J.T., Finger, G., Chen, Y.Y. and Yeh, D. (2008) What Drives a Successful E-Learning? An Empirical Investigation of the Critical Factors Influencing Learner Satisfaction. Computers and Education, Elsevier, 50, 1183-1202.
http://dx.doi.org/10.1016/j.compedu.2006.11.007

[2]   Sung, Y.T., Chang, K.E. and Yu, W.C. (2011) Evaluating the Reliability and Impact of a Quality Assurance System for E-Learning Courseware. Computers & Education, 57, 1615-1627.
http://dx.doi.org/10.1016/j.compedu.2011.01.020

[3]   Weippl, E.R. (2005) Advances in Information Security. Security in e-Learning, Springer.

[4]   Parasuraman, A. (2000) Technology Readiness Index (TRI) a Multiple-Item Scale to Measure Readiness to Embrace New Technologies. Journal of Service Research, 2, 307-320.
http://dx.doi.org/10.1177/109467050024001

[5]   Ben Arfa Rabai, L., Rjaibi, N. and Ben Aissa, A. (2011) Quantifying Security Threats for E-Learning Systems. International Conference on Education and e-Learning Innovations.

[6]   Naaji, A. and Herman, C. (2011) Implementation of an E-Learning System: Optimization and Security Aspects. Proceedings of the 15th WSEAS International Conference on Computers.

[7]   Rjaibi, N., et al. (2012) Cyber Security Measurement in Depth for E-learning Systems. International Journal of Advanced Research in Computer Science and Software Engineering, 1-15.

[8]   Alwi, N.H.M. and Fan, I.S. (2010) E-Learning and Information Security Management. International Journal of Digital Society (IJDS), 1, 148-156.

[9]   Gefen, D., Straub, D. and Boudreau, M.-C. (2000) Structural Equation Modeling and Regression: Guidelines for Research Practice. Communications of the Association for Information Systems 4.1.

[10]   Mason, R. and Rennie, F. (2006) E-Learning: The Key Concepts. Routlege, Abingdon Great Britain.

[11]   Hair Jr., J.F., Black, W.C., Babin, B.J., Anderson, R.E. and Tatham, R.L. (2006) Multivariate Data Analysis. 6th Edition, Prentice-Hall International, New Jersey.

[12]   Khlifi, Y. and Allehaibi, M.M. (2014) Information Security Services and Requirements for E-learning Infrastructure Success. 2014 World Congress on E-Learning, Education and Computer Science (WCEECS’2014), Hammamet.

[13]   Parasuraman, A. and Colby, C.L. (2001) Techno-Ready Marketing: How and Why Your Customers Adopt Technology. The Free Press, New York.

[14]   Cooper, D.R. and Schindler, P.S. (2003) Business Research Methods. 8th Edition, McGraw-Hill Irwin, Boston.

[15]   Fornell, C. and Larcker, D.F. (1981) Evaluating Structural Equation Models with Unobservable Variables and Measurement Error. Journal of Marketing Research, 39-50.
http://dx.doi.org/10.2307/3151312

[16]   Bagozzi, R.P. and Youjae, Yi. (1988) On the Evaluation of Structural Equation Models. Journal of the Academy of Marketing Science, 16, 74-94.
http://dx.doi.org/10.1007/BF02723327

[17]   Fornell, C., Tellis, G.J. and Zinkhan, G.M. (1982) Validity Assessment: A Structural Equations Approach Using Partial Least Squares. Proceedings of the American Marketing Association Educators’ Conference.

[18]   Kline, R.B. (2005) Principles and Practice of Structural Equation Modeling. 2nd Edition, The Guilford Press, New York.

 
 
Top