An empirical study of authentication methods to secure e-learning system activities against impersonation fraud

  • Shauna Beaudin
  • , Yair Levy
  • , James Parrish
  • , Theon Danet

Research output: Contribution to journalArticlepeer-review

Abstract

The demand for e – learning systems in both academic and non – academic organizations has increased the need to improve security against impersonation fraud. Although there are a number of studies focused on securing Web - based systems from Information Systems (IS) misuse, research has recognized the importance of identifying suitable levels of authenticating strength for various activities. In e - learning systems, it is evident that due to the variation in authentication strength among controls, a ‘one size fits all’ solution is not suitable for securing diverse e - learning activities against impersonation fraud. The focus of this exploratory study was to investigate what levels of authentication strength users perceive to be most suitable for activities in e - learning systems against impersonation fraud and aimed to assess if the ‘one size fits all’ approach that is mainly used is valid when it comes to securing e - learning activities from impersonation fraud. A sample of 1,070 e - learners was analyzed using descriptive statistics and exploratory factor analysis to uncover suitable levels of authentication strength to secure e - learning activities against impersonation fraud. The findings determined that there is a specific set of e – learning activities that have high potential for impersonation and need a moderate to high level of authentication strength to reduce the threat.

Original languageAmerican English
JournalOnline Journal of Applied Knowledge Management
Volume4
StatePublished - Jan 1 2016

Keywords

  • Authentication in e - learning systems
  • authentication in e - learning activities
  • e - learning impersonation fraud
  • risk mitigation in e - learning
  • suitable authentication strength in e - learning activities

Disciplines

  • Computer Sciences

Fingerprint

Dive into the research topics of 'An empirical study of authentication methods to secure e-learning system activities against impersonation fraud'. Together they form a unique fingerprint.

Cite this