Evaluation of Awareness, Experience, and Implementation of Information Security in E-Learning Systems

Evaluation of Awareness, Experience, and Implementation of Information Security in E-Learning Systems

Authors

  • Siti Sarah Nabila Informatics Engineering department, Universitas Sebelas April
  • Ismi Indah Aryani

Keywords:

information security, e-learning, security awareness, cybersecurity experience, SEM-PLS, LMS

Abstract

Advances in information technology have driven the widespread use of e-learning in educational settings. However, e-learning systems are not free from information security challenges, particularly because they store sensitive data such as user identities and academic materials. This study aims to evaluate the relationship between user awareness, experience with cybersecurity incidents, and the implementation of information security in e-learning systems. The method used was quantitative with a survey approach of 100 respondents, consisting of students and university students using e-learning. Data analysis was conducted using the Structural Equation Modeling Partial Least Squares (SEM-PLS) method to test the influence of awareness and experience (phenomena) variables on security perceptions. The results showed that both variables significantly influenced security perceptions, with experience with security incidents having a greater influence than awareness levels. These findings emphasize the importance of real-life experiences as a trigger for increased vigilance, as well as the need for educational institutions to strengthen cybersecurity education and continuous system evaluation, especially in dealing with incidents such as the misuse of LMS systems by unauthorized content.

References

R. Wirawan, “Studi Kompetensi dan Kesadaran Pengguna E-Learning Terhadap Keamanan Sistem E-Learning Pada Pendidikan Tinggi,” ETHOS (Jurnal Penelitian dan Pengabdian), vol. 7, no. 1, pp. 9–17, Jan. 2019, doi: 10.29313/ethos.v7i1.3850.

F. Irfan Adristi and E. Ramadhani, “Analisis Dampak Kebocoran Data Pusat Data Nasional Sementara 2 (PDNS 2) Surabaya: Pendekatan Matriks Budaya Keamanan Siber dan Dimensi Budaya Nasional Hofstede,” 2024. [Online]. Available: https://journal.uii.ac.id/selma/index

K. Akbar Ghofar, H. Wibiksana, and A. Nurhayati, “Keamanan Learning Management System Perguruan Tinggi dengan Standard ISO/IEC 27002:2022,” Edukatif : Jurnal Ilmu Pendidikan, vol. 7, no. 2, 2025, doi: 10.31004/edukatif.v7i2.7775.

K. Grosse, L. Bieringer, T. R. Besold, B. Biggio, and K. Krombholz, “Machine Learning Security in Industry: A Quantitative Survey,” Mar. 2023, doi: 10.1109/TIFS.2023.3251842.

S. Bauer, E. W. N. Bernroider, and K. Chudzikowski, “Prevention is better than cure! Designing information security awareness programs to overcome users’ non-compliance with information security policies in banks,” Comput Secur, vol. 68, pp. 145–159, Jul. 2017, doi: 10.1016/j.cose.2017.04.009Helmiawan, M. A., Firmansyah, E., Fadil, I., Sofivan, Y., Mahardika, F., & Guntara, A. (2020). Analysis of web security using open web application security project 10. 2020 8th International Conference on Cyber and IT Service Management

Helmiawan, M. A., Julian, E., Cahyan, Y., & Saeppani, A. (2021). Experimental evaluation of security monitoring and notification on network intrusion detection system for server security. 2021 9th International Conference on Cyber and IT Service Management (CITSM ….

Helmiawan, M. A., Fadil, I., Sofiyan, Y., & Firmansyah, E. (2021). Security model using intrusion detection system on cloud computing security management. 2021 9th International Conference on Cyber and IT Service Management (CITSM ….

Helmiawan, M. A., & Nasution, A. I. (2022). The Effect of Internet Banking Use and Customer Protection Against Cyber Crime at Bank Rakyat Indonesia. Journal of Islamic Economics and Business, 2(2), 170–183.

Published

2025-08-22
Loading...