首页> 外文学位 >An Empirical Study of Authentication Methods to Secure E-learning System Activities Against Impersonation Fraud.
【24h】

An Empirical Study of Authentication Methods to Secure E-learning System Activities Against Impersonation Fraud.

机译:对防止假冒欺诈行为保护电子学习系统活动的身份验证方法的实证研究。

获取原文
获取原文并翻译 | 示例

摘要

Studies have revealed that securing Information Systems (IS) from intentional misuse is a concern among organizations today. The use of Web-based systems has grown dramatically across industries including e-commerce, e-banking, e-government, and e learning to name a few. Web-based systems provide e-services through a number of diverse activities. The demand for e-learning systems in both academic and non-academic organizations has increased the need to improve security against impersonation fraud. Although there are a number of studies focused on securing Web-based systems from Information Systems (IS) misuse, research has recognized the importance of identifying suitable levels of authenticating strength for various activities. In e-learning systems, it is evident that due to the variation in authentication strength among controls, a 'one size fits all' solution is not suitable for securing diverse e-learning activities against impersonation fraud. The main goal of this study was to use the framework of the Task-Technology Fit (TTF) theory to conduct an exploratory research design to empirically investigate what levels of authentication strength users perceive to be most suitable for activities in e-learning systems against impersonation fraud. This study aimed to assess if the 'one size fits all' approach mainly used nowadays is valid when it comes to securing e-learning activities from impersonation fraud. Following the development of an initial survey instrument (Phase 1), expert panel feedback was gathered for instrument validity using the Delphi methodology. The initial survey instrument was adjusted according to feedback (Phase 2). The finalized Web-based survey was used to collect quantitative data for final analyses (Phase 3). This study reported on data collected from 1,070 e-learners enrolled at a university. Descriptive statistics was used to identify what e-learning activities perceived by users and what users perceived that their peers would identify to have a high potential for impersonation. The findings determined there are a specific set of e-learning activities that high have potential for impersonation fraud and need a moderate to high level of authentication strength to reduce the threat. Principal Component Analysis was used to identify significant components of authentication strength to be suitable against the threats of impersonation for e-learning activities.
机译:研究表明,保护信息系统(IS)免受故意滥用已成为当今组织关注的问题。基于Web的系统的使用在包括电子商务,电子银行,电子政务和电子学习等在内的各个行业中都得到了飞速发展。基于Web的系统通过许多不同的活动提供电子服务。学术组织和非学术组织对电子学习系统的需求都增加了提高防范假冒欺诈行为的安全性的需求。尽管有许多研究致力于防止基于Web的系统受到信息系统(IS)滥用的影响,但是研究已经认识到为各种活动确定适当级别的认证强度的重要性。在电子学习系统中,很明显的是,由于控件之间身份验证强度的差异,“一刀切”的解决方案不适用于确保各种模拟学习活动以防止假冒他人。这项研究的主要目标是使用任务技术适合度(TTF)理论的框架进行探索性研究设计,以经验方式调查用户认为哪种级别的身份验证强度最适合进行模拟学习的电子学习系统中的活动欺诈。这项研究旨在评估当今主要使用的“一刀切”方法在确保电子学习活动免受假冒欺诈方面是否有效。在开发了初始调查工具(第1阶段)之后,使用Delphi方法收集了专家小组的反馈,以确保工具的有效性。根据反馈(第二阶段)调整了初始调查工具。最终的基于Web的调查用于收集定量数据以进行最终分析(第3阶段)。这项研究报告了从一所大学的1,070名在线学习者那里收集的数据。描述性统计数据用于识别用户认为哪些电子学习活动,以及哪些用户认为其同龄人会识别出极高的冒充潜力。调查结果确定,存在着一系列特定的电子学习活动,这些活动极有可能冒充假冒行为,并且需要中等到高水平的身份验证强度才能减少威胁。主成分分析被用来识别认证强度的重要成分,以适合于冒用电子学习活动的威胁。

著录项

  • 作者

    Beaudin, Shauna.;

  • 作者单位

    Nova Southeastern University.;

  • 授予单位 Nova Southeastern University.;
  • 学科 Information science.
  • 学位 Ph.D.
  • 年度 2016
  • 页码 172 p.
  • 总页数 172
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号