The Acceptance of E-Assessment Considering Security Perspective: Work in Progress
Authors: Kavitha Thamadharan, Nurazean Maarop
Abstract:
The implementation of e-assessment as tool to support the process of teaching and learning in university has become a popular technological means in universities. E-Assessment provides many advantages to the users especially the flexibility in teaching and learning. The e-assessment system has the capability to improve its quality of delivering education. However, there still exists a drawback in terms of security which limits the user acceptance of the online learning system. Even though there are studies providing solutions for identified security threats in e-learning usage, there is no particular model which addresses the factors that influences the acceptance of e-assessment system by lecturers from security perspective. The aim of this study is to explore security aspects of eassessment in regard to the acceptance of the technology. As a result a conceptual model of secure acceptance of e-assessment is proposed. Both human and security factors are considered in formulation of this conceptual model. In order to increase understanding of critical issues related to the subject of this study, interpretive approach involving convergent mixed method research method is proposed to be used to execute the research. This study will be useful in providing more insightful understanding regarding the factors that influence the user acceptance of e-assessment system from security perspective.
Keywords: Secure Technology Acceptance, E-Assessment Security, E-Assessment, Education Technology.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1099874
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2438References:
[1] Hilmi M.F., Pawanchik S., and Mustapha Y. (2011). Exploring Security Perception of Learning Management System (LMS) Portal. International Congress on Engineering Education. 7 – 8 December. IEEE 132 – 136.
[2] Yao H., Ji Y. (2011). Security Protection for Online Learning of Music. Computer Communications and Networks (ICCCN). 31 July – 4 August. IEEE 1 – 4.
[3] Althaff Irfan C.M., Nomura S., Ouzzane K., Fukumura Y.(2009) Facebased Access Control and Invigilation Tool for E-Learning Systems. International Conference on Biometric and Kansei Engineering. 25 – 28 June. IEEE 40 – 44.
[4] Zamzuri Z.F., Manaf M., Yunus Y., Ahmad A. (2013). 6th International Conference on University Learning and Teaching. 10 October. 923 – 930.
[5] Luminita D.C. (2011). Information Security in E-Learning Platforms. Procedia Social and Behavioral Sciences, 15, 2689 – 2693. Elsevier Ltd.
[6] Miguel J., Caballe S., Xhafa F., Prieto J. (2014) Security in Online Learning Assessment Towards an Effective Trustworthiness Approach to Support e-Learning Teams. International Conference on Advanced Information Networking and Applications (AINA). 13 – 16 May. IEEE 123 – 130.
[7] Mu’azu A.A., Lawal I.A. (2012). E-Learning System Vulnerabilities: Threats and Promises for Students’ Information System. E-learning, EManagement and E-Services (IS3e) Symposium. 21 – 24 October. IEEE 1 – 6.
[8] Alwi N.H.M., Ip-Shing Fan (2009). Information Security Management in E-Learning. International Conference for Internet Technology and Secured Transactions (ICITST). 9 – 12 November. IEEE 1 – 6.
[9] Kaur J., Mustafa N. (2013) Examining the Effects of Knowledge, Attitude and Behaviour on Information Security Awareness: A Case on SME. 3rd International Conference on Research and Innovation in Information Systems. 27 – 28 November. IEEE 286 – 290.
[10] Jiao Pei (2011) How to Solve the Security and Privacy Problems within E-Learning. International Symposium on IT in Medicine and Education (ITME). 9 – 11 December. IEEE 66 – 69.
[11] Shava F.B., Van Greunen D. (2013) Factors Affecting User Experience with Security Features: A case study of an academic institution in Namibia. Information Security for South Africa. 14 – 16 August. IEEE 1 – 8.
[12] Imtiaz A., Maarop N. (2014) Feasibility Study of Lecturers’ Acceptance of E-Assessment. 25th Australasian Conference on Information System. 8 – 10 December.
[13] Findik D., Ozkan S. (2010) Work in Progress – Learning Management Systems acceptances of instructors from various departments: Empirical investigation. Frontiers in Education Conference. 27 – 30 October. IEEE 1- 3.
[14] Persico D., Manca S., Pozzi F. (2014) Adapting the Technology Acceptance Model to evaluate the innovative potential of e-learning systems. Computers in Human Behaviour. 30. 614 – 622.
[15] Abbad M. (2012) Proposed Model of E-Learning Acceptance. International Conference on Education and e-Learning Innovations. 1 – 3 July. IEEE 1 – 9.
[16] Pynoo B., Devolder P., Tondeur J., Braak J.V., Duyck W., Duyck P. (2011) Predicting secondary school teachers’ acceptance and use of digital learning environment: A cross-sectional study. Computers in Human Behaviour. 27. 568 – 575.
[17] Lui S.M., Hui W. (2011) The effects of knowledge on security technology adoption: Results from a quasi-experiment. Information Science and Service Science (NISS). 24 – 26 October. IEEE 328 – 333.
[18] Wang P.A. (2010) Information Security Knwoledge and Behaviour: An adapted model of technology acceptance. 2nd International Conference on Education Technology and Computer. 22 – 24 June. IEEE 364 – 367.
[19] Lin S.C., Persada S.F., Nadlifatin R. (2014) A study of student behavior in accepting the blackboard learning system: a technology acceptance model (TAM) approach. 18th International Conference on Computer Supported Cooperative Work in Design. 21 – 23 May. IEEE 457 – 462.
[20] Cheung R., Vogel D. (2013) Predicting user acceptance of collaborative technologies: An extension of the technology acceptance model for elearning. Computers & Education. 63. 160 – 175.
[21] Wu H., Wei C.W. (2010) Factors affecting learners’ knowledge sharing intentions in web-based learning. International Symposium on Computer, Communication, Control and Automation. 5 – 7 May. IEEE 83 – 86.
[22] Sumak B., Polancic G., Hericko M. (2010) An empirical study of virtual learning environment adoption using UTAUT. 2nd International Conference on Mobile, Hybrid, and On-Line Learning. 10 – 16 February. IEEE 17 – 22.
[23] Udo G.J., Bagchi K.K., Kirs P.J. (2011) Using SERVQUAL to assess the quality of e-learning experience. Computers in Human Behaviour. 27. 1272 – 1283.
[24] Lee B.C., Yoon J.O., Lee I. (2009) Learners’ acceptance of e-learning in South Korea: Theories and Results. Computers & Education. 53. 1320 – 1329.
[25] Venkatesh V., Morris M.G., Davis G.B., Davis F.D., (2003) User acceptance of information technology: Toward a unified view. MIS quarterly, 425 -478.
[26] DeLone W.H., McLean E.R. (1992) Information system success: the quest for the dependent variable. Information Systems Research. 3. 60.
[27] Song X. (2011) Teaching and Learning experience with Learning Management Systems: an adapted IS Success Model in LMS Context. International Symposium on IT in Medicine and Education. 9 – 11 December. IEEE 148 – 152.
[28] Khayun V., Ractham P. (2011) Measuring e-Excise Tax Success Factors: Applying the DeLone and McLean Information Systems Success Model. International Conference on System Sciences. 4 – 7 January. IEEE 1 – 10.
[29] Li J., Sun J. (2009) An empirical study of e-commerce website success model. International Conference on Management and Service Science. 20 – 22 September. IEEE 1 – 4.
[30] Baraka H.A., Baraka H.A., Gamily I.H. (2013) Assessing call centers’ success: A validation of the DeLone and McLean model for Information System. Egyptian Informatics Journal. 14. 99 – 108.
[31] Wang Y.S., Liao Y.W. (2007) Assessing e-Government systems success: A validation of the DeLone and McLean model of Information System success. Government Information Quarterly. 25. 717 – 733.
[32] Sung Y-T, Chang K-E, Yu Wen-Cheng (2011) Evaluating the reliability and impact of a quality assurance for E-learning courseware. Computers and Education. 57, 1615-1627.
[33] Alkis N., Ozkan S. (2010) Work in Progress – A modified technology acceptance model for e-assessment: Intentions of Engineering Students to use web-based assessment tools. Frontiers in Education Conference. 27 – 30 October. IEEE 1 – 3.
[34] Montague E.N.H., Kleiner B.M., Winchester W.W. (2009) Empirically understanding trust in medical technology. International Journal of Industrial Ergonomics. 39. 628 – 634.
[35] Sakri S., Salim J., Sembok T.M.T. (2012) Information Communications and Technology (ICT) Abuse in the Malaysia Public Sector: The Influence of Ethical, Organisational Bond and General Deterrence Factors. Akademika. 82(1) 125 – 137.
[36] Blazic B.J., Klobucar T. (2005) Privacy Provision in E-Learning Standardized Systems: Status and Improvements. Computer Standards & Interfaces. 27. 561 – 578.
[37] Hassan N.H., Ismail Z., Maarop N. (2013) A Conceptual Model for Knowledge Sharing towards Information Security Culture in Healthcare Organization. International Conference on Research and Innovation in Information Systems. 27 – 28 November. IEEE 516 – 520.
[38] Conger S., Loch K.D., Helft B.L. (1995) Ethics and Information Technology Use: A factor analysis of attitudes to computer use. Information Systems Journal. 5. 161 – 84.
[39] Gattiker U.E., Kelly H. (1999) Morality and Computers: Attitudes and Differences in Moral Judgments. Information Systems Research. 10(3). 233-54.
[40] Teddlie, C. and Tashakkori, A. Major Issues and Controversies in The Use of Mixed Methods in The Social And Behavioral Sciences. In: Tashakkori, A., and Teddlie, C. (Eds), Handbook of mixed method in social and behavioural research. Thousand Oaks, CA: Sage, pp 3-50, 2003.
[41] Creswell, J.W and Plano Clark, V.L. Designing and conducting mixed methods research. Thousand Oaks, CA: Sage, 2011.
[42] Teddlie, C. and Tashakkori, A. Foundations of Mixed Methods Research: Integrating Quantitative and Qualitative Approaches in the Social and Behavioral Sciences. Thousand Oaks, CA: Sage, 2009.
[43] Gilchrist, V. J. and R. L. Williams (1999). Key Informant Interviews. Doing Qualitative Research. B. F. Crabtree and W. L. Miller. Thousand Oaks, CA, Sage: 195-218.