Please use this identifier to cite or link to this item:
https://etd.cput.ac.za/handle/20.500.11838/2301
DC Field | Value | Language |
---|---|---|
dc.contributor.advisor | Mlitwa, N.W. | EN |
dc.contributor.author | Ncubukezi, Tabisa | - |
dc.date.accessioned | 2016-08-24T13:03:13Z | - |
dc.date.accessioned | 2016-09-16T07:06:57Z | - |
dc.date.available | 2016-08-24T13:03:13Z | - |
dc.date.available | 2016-09-16T07:06:57Z | - |
dc.date.issued | 2012 | - |
dc.identifier.uri | http://hdl.handle.net/20.500.11838/2301 | - |
dc.description | Thesis (MTech (Information Technology))--Cape Peninsula University of Technology,2012. | - |
dc.description.abstract | Learning management systems (LMSs) have become the central aspects of educational processes in modern universities. Arguments are that LMSs improve educational efficiencies including the processes of storage, retrieval and exchange of content without distance, space and time constraints. A trusted platform without undue intrusions however, determines the extent to which these benefits can be realized in higher education (HE) spaces. The underlying assumption in this thesis therefore, is that e-Learning systems would lose its value and integrity when the security aspects are ignored. Despite this logic, an overwhelming evidence security omissions and disruptions continue to threaten e-Learning processes at CPUT, with a risk of the actual usage of LMS in the institution. For this reason, this study sought to investigate the extent as well as causes of existing security threats, security awareness programmes and the in/effectiveness of security measures within CPUT. Within the qualitative interpretive research framework, the purposive sampling method was used to select participants. Semi-structured interviews were then used to collect primary data from administrators, technicians, academics and students in the IT and the Public Relations departments at CPUT. The activity theory (AT) was then used as the lens to understand the security aspect in e-Learning systems in the CPUT. From this theory, an analytical framework was developed. It presents holistic view of the security environment of e- Learning as an activity system composed of actors (stakeholders), educational goals, rules (in the form of policies, guidelines and procedures), activities, mediating factors, transformation, and outcomes. The tension between these components accounts for failures in e-Learning security practices, and ultimately in the e-Learning processes. Whilst security measures exist on the e-Learning platform, findings show a combination of the tools, processes and awareness measures to be inadequate and therefore inhibiting. Poor adherence to security guidelines in particular, is a major shortfall in this institution. To this end, a continuous review of network policy, clear and consolidated communication between stakeholders as well as emphasis on the enforcement of security compliance by users across all departments is therefore recommended. Frequent security awareness and training programmes for all LMS users must also be prioritized in this institution. | - |
dc.language.iso | en_ZA | en_ZA |
dc.publisher | Cape Peninsula University of Technology | - |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-sa/3.0/za/ | - |
dc.subject | Internet in higher education -- South Africa | - |
dc.subject | Education, Higher -- Computer-assisted instruction -- South Africa | - |
dc.subject | Internet in higher education -- Security measures -- South Africa | - |
dc.subject | Computer-assisted instruction -- Security measures -- South Africa | - |
dc.subject | Computer security -- South Africa | - |
dc.title | Security considerations of e-learning in higher education institutions | - |
dc.type | Thesis | - |
Appears in Collections: | Information Technology - Master's Degree |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
208217673_Ncubukezi_T_Mtech_IT_FID_2012_20135254.pdf | Thesis | 44.94 MB | Adobe PDF | View/Open |
Page view(s)
1,807
Last Week
3
3
Last month
10
10
checked on Nov 17, 2024
Download(s)
180
checked on Nov 17, 2024
Google ScholarTM
Check
This item is licensed under a Creative Commons License