Sunday, February 16, 2025
Volume 4, 2016: Issue 1 |
||
Title: |
An empirical study of authentication methods to secure e-learning system activities against impersonation fraud |
|
Author(s): |
Shauna Beaudin, Nova Southeastern University, Florida, USA |
|
Abstract: |
The demand for e-learning systems in both academic and non-academic organizations has increased the need to improve security against impersonation fraud. Although there are a number of studies focused on securing Web-based systems from Information Systems (IS) misuse, research has recognized the importance of identifying suitable levels of authenticating strength for various activities. In e-learning systems, it is evident that due to the variation in authentication strength among controls, a ‘one size fits all’ solution is not suitable for securing diverse e-learning activities against impersonation fraud. The focus of this exploratory study was to investigate what levels of authentication strength users perceive to be most suitable for activities in e-learning systems against impersonation fraud and aimed to assess if the ‘one size fits all’ approach that is mainly used is valid when it comes to securing e-learning activities from impersonation fraud. A sample of 1,070 e-learners was analyzed using descriptive statistics and exploratory factor analysis to uncover suitable levels of authentication strength to secure elearning activities against impersonation fraud. The findings determined that there is a specific set of e-learning activities that have high potential for impersonation and need a moderate to high level of authentication strength to reduce the threat. |
|
Keywords: |
Authentication in e-learning systems, e-learning impersonation fraud, risk mitigation in e-learning, authentication in e-learning activities, suitable authentication strength in e-learning activities |
|
DOI: |
||
Type: |
Research paper |
|
Journal: |
The Online Journal of Applied Knowledge Management (OJAKM), ISSN: 2325-4688 |
|
Publisher: |
International Institute for Applied Knowledge Management (IIAKM) |
|
Pages: |
42-61 |