The Acceptance of E-Assessment Considering Security Perspective: Work in Progress

The implementation of e-assessment as tool to support
the process of teaching and learning in university has become a
popular technological means in universities. E-Assessment provides
many advantages to the users especially the flexibility in teaching and
learning. The e-assessment system has the capability to improve its
quality of delivering education. However, there still exists a
drawback in terms of security which limits the user acceptance of the
online learning system. Even though there are studies providing
solutions for identified security threats in e-learning usage, there is no
particular model which addresses the factors that influences the
acceptance of e-assessment system by lecturers from security
perspective. The aim of this study is to explore security aspects of eassessment
in regard to the acceptance of the technology. As a result
a conceptual model of secure acceptance of e-assessment is proposed.
Both human and security factors are considered in formulation of this
conceptual model. In order to increase understanding of critical issues
related to the subject of this study, interpretive approach involving
convergent mixed method research method is proposed to be used to
execute the research. This study will be useful in providing more
insightful understanding regarding the factors that influence the user
acceptance of e-assessment system from security perspective.





References:
[1] Hilmi M.F., Pawanchik S., and Mustapha Y. (2011). Exploring Security
Perception of Learning Management System (LMS) Portal.
International Congress on Engineering Education. 7 – 8 December.
IEEE 132 – 136.
[2] Yao H., Ji Y. (2011). Security Protection for Online Learning of Music.
Computer Communications and Networks (ICCCN). 31 July – 4 August.
IEEE 1 – 4.
[3] Althaff Irfan C.M., Nomura S., Ouzzane K., Fukumura Y.(2009) Facebased
Access Control and Invigilation Tool for E-Learning Systems.
International Conference on Biometric and Kansei Engineering. 25 – 28
June. IEEE 40 – 44.
[4] Zamzuri Z.F., Manaf M., Yunus Y., Ahmad A. (2013). 6th International
Conference on University Learning and Teaching. 10 October. 923 –
930.
[5] Luminita D.C. (2011). Information Security in E-Learning Platforms.
Procedia Social and Behavioral Sciences, 15, 2689 – 2693. Elsevier Ltd.
[6] Miguel J., Caballe S., Xhafa F., Prieto J. (2014) Security in Online
Learning Assessment Towards an Effective Trustworthiness Approach
to Support e-Learning Teams. International Conference on Advanced
Information Networking and Applications (AINA). 13 – 16 May. IEEE
123 – 130.
[7] Mu’azu A.A., Lawal I.A. (2012). E-Learning System Vulnerabilities:
Threats and Promises for Students’ Information System. E-learning, EManagement
and E-Services (IS3e) Symposium. 21 – 24 October. IEEE
1 – 6.
[8] Alwi N.H.M., Ip-Shing Fan (2009). Information Security Management
in E-Learning. International Conference for Internet Technology and
Secured Transactions (ICITST). 9 – 12 November. IEEE 1 – 6.
[9] Kaur J., Mustafa N. (2013) Examining the Effects of Knowledge,
Attitude and Behaviour on Information Security Awareness: A Case on
SME. 3rd International Conference on Research and Innovation in
Information Systems. 27 – 28 November. IEEE 286 – 290.
[10] Jiao Pei (2011) How to Solve the Security and Privacy Problems within
E-Learning. International Symposium on IT in Medicine and Education
(ITME). 9 – 11 December. IEEE 66 – 69.
[11] Shava F.B., Van Greunen D. (2013) Factors Affecting User Experience
with Security Features: A case study of an academic institution in
Namibia. Information Security for South Africa. 14 – 16 August. IEEE 1
– 8.
[12] Imtiaz A., Maarop N. (2014) Feasibility Study of Lecturers’ Acceptance
of E-Assessment. 25th Australasian Conference on Information System.
8 – 10 December.
[13] Findik D., Ozkan S. (2010) Work in Progress – Learning Management
Systems acceptances of instructors from various departments: Empirical
investigation. Frontiers in Education Conference. 27 – 30 October.
IEEE 1- 3.
[14] Persico D., Manca S., Pozzi F. (2014) Adapting the Technology
Acceptance Model to evaluate the innovative potential of e-learning
systems. Computers in Human Behaviour. 30. 614 – 622.
[15] Abbad M. (2012) Proposed Model of E-Learning Acceptance.
International Conference on Education and e-Learning Innovations. 1 –
3 July. IEEE 1 – 9.
[16] Pynoo B., Devolder P., Tondeur J., Braak J.V., Duyck W., Duyck P.
(2011) Predicting secondary school teachers’ acceptance and use of
digital learning environment: A cross-sectional study. Computers in
Human Behaviour. 27. 568 – 575.
[17] Lui S.M., Hui W. (2011) The effects of knowledge on security
technology adoption: Results from a quasi-experiment. Information
Science and Service Science (NISS). 24 – 26 October. IEEE 328 – 333.
[18] Wang P.A. (2010) Information Security Knwoledge and Behaviour: An
adapted model of technology acceptance. 2nd International Conference
on Education Technology and Computer. 22 – 24 June. IEEE 364 – 367.
[19] Lin S.C., Persada S.F., Nadlifatin R. (2014) A study of student behavior
in accepting the blackboard learning system: a technology acceptance
model (TAM) approach. 18th International Conference on Computer
Supported Cooperative Work in Design. 21 – 23 May. IEEE 457 – 462.
[20] Cheung R., Vogel D. (2013) Predicting user acceptance of collaborative
technologies: An extension of the technology acceptance model for elearning.
Computers & Education. 63. 160 – 175.
[21] Wu H., Wei C.W. (2010) Factors affecting learners’ knowledge sharing
intentions in web-based learning. International Symposium on
Computer, Communication, Control and Automation. 5 – 7 May. IEEE
83 – 86.
[22] Sumak B., Polancic G., Hericko M. (2010) An empirical study of virtual
learning environment adoption using UTAUT. 2nd International
Conference on Mobile, Hybrid, and On-Line Learning. 10 – 16
February. IEEE 17 – 22.
[23] Udo G.J., Bagchi K.K., Kirs P.J. (2011) Using SERVQUAL to assess
the quality of e-learning experience. Computers in Human Behaviour.
27. 1272 – 1283.
[24] Lee B.C., Yoon J.O., Lee I. (2009) Learners’ acceptance of e-learning in
South Korea: Theories and Results. Computers & Education. 53. 1320 –
1329.
[25] Venkatesh V., Morris M.G., Davis G.B., Davis F.D., (2003) User
acceptance of information technology: Toward a unified view. MIS
quarterly, 425 -478.
[26] DeLone W.H., McLean E.R. (1992) Information system success: the
quest for the dependent variable. Information Systems Research. 3. 60.
[27] Song X. (2011) Teaching and Learning experience with Learning
Management Systems: an adapted IS Success Model in LMS Context.
International Symposium on IT in Medicine and Education. 9 – 11
December. IEEE 148 – 152.
[28] Khayun V., Ractham P. (2011) Measuring e-Excise Tax Success
Factors: Applying the DeLone and McLean Information Systems
Success Model. International Conference on System Sciences. 4 – 7
January. IEEE 1 – 10.
[29] Li J., Sun J. (2009) An empirical study of e-commerce website success
model. International Conference on Management and Service Science.
20 – 22 September. IEEE 1 – 4.
[30] Baraka H.A., Baraka H.A., Gamily I.H. (2013) Assessing call centers’
success: A validation of the DeLone and McLean model for Information
System. Egyptian Informatics Journal. 14. 99 – 108.
[31] Wang Y.S., Liao Y.W. (2007) Assessing e-Government systems
success: A validation of the DeLone and McLean model of Information
System success. Government Information Quarterly. 25. 717 – 733.
[32] Sung Y-T, Chang K-E, Yu Wen-Cheng (2011) Evaluating the reliability
and impact of a quality assurance for E-learning courseware. Computers
and Education. 57, 1615-1627.
[33] Alkis N., Ozkan S. (2010) Work in Progress – A modified technology
acceptance model for e-assessment: Intentions of Engineering Students
to use web-based assessment tools. Frontiers in Education Conference.
27 – 30 October. IEEE 1 – 3.
[34] Montague E.N.H., Kleiner B.M., Winchester W.W. (2009) Empirically
understanding trust in medical technology. International Journal of
Industrial Ergonomics. 39. 628 – 634.
[35] Sakri S., Salim J., Sembok T.M.T. (2012) Information Communications
and Technology (ICT) Abuse in the Malaysia Public Sector: The
Influence of Ethical, Organisational Bond and General Deterrence
Factors. Akademika. 82(1) 125 – 137.
[36] Blazic B.J., Klobucar T. (2005) Privacy Provision in E-Learning
Standardized Systems: Status and Improvements. Computer Standards
& Interfaces. 27. 561 – 578.
[37] Hassan N.H., Ismail Z., Maarop N. (2013) A Conceptual Model for
Knowledge Sharing towards Information Security Culture in Healthcare
Organization. International Conference on Research and Innovation in
Information Systems. 27 – 28 November. IEEE 516 – 520.
[38] Conger S., Loch K.D., Helft B.L. (1995) Ethics and Information
Technology Use: A factor analysis of attitudes to computer use.
Information Systems Journal. 5. 161 – 84.
[39] Gattiker U.E., Kelly H. (1999) Morality and Computers: Attitudes and
Differences in Moral Judgments. Information Systems Research. 10(3).
233-54. [40] Teddlie, C. and Tashakkori, A. Major Issues and Controversies in The
Use of Mixed Methods in The Social And Behavioral Sciences. In:
Tashakkori, A., and Teddlie, C. (Eds), Handbook of mixed method in
social and behavioural research. Thousand Oaks, CA: Sage, pp 3-50,
2003.
[41] Creswell, J.W and Plano Clark, V.L. Designing and conducting mixed
methods research. Thousand Oaks, CA: Sage, 2011.
[42] Teddlie, C. and Tashakkori, A. Foundations of Mixed Methods
Research: Integrating Quantitative and Qualitative Approaches in the
Social and Behavioral Sciences. Thousand Oaks, CA: Sage, 2009.
[43] Gilchrist, V. J. and R. L. Williams (1999). Key Informant Interviews.
Doing Qualitative Research. B. F. Crabtree and W. L. Miller. Thousand
Oaks, CA, Sage: 195-218.