CEC Faculty Articles

Document Type

Article

Date

1-1-2016

Publication Title

Online Journal of Applied Knowledge Management

ISSN or ISBN

2325-4688

Volume

4

Issue

1

First Page

42

Last Page

61

Description

The demand for e – learning systems in both academic and non – academic organizations has increased the need to improve security against impersonation fraud. Although there are a number of studies focused on securing Web - based systems from Information Systems (IS) misuse, research has recognized the importance of identifying suitable levels of authenticating strength for various activities. In e - learning systems, it is evident that due to the variation in authentication strength among controls, a ‘one size fits all’ solution is not suitable for securing diverse e - learning activities against impersonation fraud. The focus of this exploratory study was to investigate what levels of authentication strength users perceive to be most suitable for activities in e - learning systems against impersonation fraud and aimed to assess if the ‘one size fits all’ approach that is mainly used is valid when it comes to securing e - learning activities from impersonation fraud. A sample of 1,070 e - learners was analyzed using descriptive statistics and exploratory factor analysis to uncover suitable levels of authentication strength to secure e - learning activities against impersonation fraud. The findings determined that there is a specific set of e – learning activities that have high potential for impersonation and need a moderate to high level of authentication strength to reduce the threat.

Comments

Originally published in Online Journal of Applied Knowledge Management, 4(1): http://www.iiakm.org/ojakm/articles/2016/volume4_1/OJAKM_Volume4_1pp42-61.pdf

Share

COinS