Perception of Information Security in the Process of Distance Learning During the COVID-19 Pandemic on the Example of University Teachers’ Experiences

Authors

DOI:

https://doi.org/10.31261/IJREL.2021.7.2.05

Keywords:

distance learning, Covid-19 pandemic, distance learning security, information safety, Internet threats

Abstract

The COVID-19 pandemic has greatly affected every area of our lives. One of them was education, which had to undergo a huge transformation in a very short time. Overnight, the computer replaced the blackboard and became the only tool of communication between a student and a teacher. Teachers had to completely change the tools used in the teaching process and enter a completely new and, for many of them completely unknown, working environment. Online learning has replaced traditional teaching. A computer with Internet access has become a basic work tool for people who have so far used it mainly for recreational purposes. Teachers were thrown in at the deep end, for most of themit was the first time they had encountered platforms for remote communication.
As the workspace has changed, learners and teachers have begun to move much more frequently into the world of the Internet, which harbors many dangers of which quite a few people were previously unaware. For this reason, the authors decided to investigate the problem of information security in e-learning. This paper attempts to collect the experiences and assess the awareness of university teachers about information security threats while teaching during the COVID-19 pandemic. The research results presented in this paper showed that the level of awareness of the risks, that may affect academic teachers in the distance learning process, is very low. Additionally, no appropriate procedures for safe distance learning have been developed. The communication security area was practically completely overlooked during the COVID-19 educational  revolution.

References

Amiri, I.S., & Akanbi, O.A. (2015). A Machine-Learning Approach to Phishing Detection and Defense, Waltham, Elsevier, ISBN 9780128029466.

Beaman C., Barkworth A., Akande T., Hakak S., & Khan M., (2021), Ransomware: Recent advances, analysis, challenges and future research directions, Computers & Security, 111, ISSN 0167-4048, DOI: 10.1016/j.cose.2021.102490.

Bentkowski, M. (2021). Generowanie łatwych do zapamietania haseł z wykorzystaniem łańcuchów Markowa (Generating easy-to-remember passwords using Markov strings), retrieved from https://sekurak.pl/generowanie-latwych-do-zapamietania-hasel-z-wykorzystaniem-lancuchowmarkowa/ (accessed 15.08.2021).

Formosa, P., Wilson, M., & Richards, D., (2021), A principlist framework for cybersecurity ethics, Computers & Security, 109, ISSN 0167-4048, DOI: 10.1016/j.cose.2021.102382.

Giza M. (2021). Przegląd ataków na polskich internautów (6–19.09.2021 r.) [Overview of attacks on Polish internet users], Retrieved from https://sekurak.pl/przeglad-atakow-na-polskichinternautow-6-19-09-2021-r/ (accessed 21.09.2021).

Information technology ‒ Security techniques ‒ Information security management systems ‒ Overview and vocabulary PN-EN ISO/IEC 27000:2018.

Jakieła J., & Wójcik J., (2018). Przegląd problemów bezpieczeństwa informacji oraz prywatności w akademickim nauczaniu na odległość. [Review of information security and privacy issues in academic distance learning], Zeszyty Naukowe Uniwersytetu Ekonomicznego w Katowicach [In Polish], 355: 31-44, ISSN 2083-8611.

Kaspersky Security Awareness (2021). Training programs to help you build a cybersafe organization. Retrived from https://www.kaspersky.com/enterprise-security/security-awareness (accessed 9.09.2021).

Liderman, K. (2008). Analiza ryzyka i ochrona informacji w systemach komputerowych (Riskanalysis and information protection in computer systems), Warszawa, PWN, ISBN 9788301153700.

Liderman, K. (2017). Bezpieczeństwo informacyjne (Information security), Warszawa, PWN, ISBN 9788301175009.

McGahagan, J., Bhansali, D. Pinto-Coelho, C. & Cukier, M. (2021), Discovering features for detecting malicious websites: An empirical study, Computers & Security, 109, DOI: 10.1016/j.cose.2021.102374.

Ponemon Institute Report (2020). Cost of a Data Breach Report 2020 IBM, Retrieved from https://www.ibm.com/security/data-breach (accessed17.09.2021).

Ring, M., Schlör, D., Wunderlich, S., Landes, D. & Hotho, A. (2021). Malware detection on Windows Audit Logs using LSTMs. Computers & Security. 109. DOI: 102389. 10.1016/j.cose.2021.102389.

Scerbakov, A., Scerbakov, N. & Kappe, F. (2019). Security Vulnerabilities in Modern LMS, DOI: 10.33965/el2019_201909C038.

Skoudis, E., & Zeltser, L. (2004). Malware: Fighting Malicious Code, Pearson Education, Saddle River. ISBN 9780131014053

The National Cyber Security Centre (2021). Reducing your exposure to cyber-attack, Retrieved from https://www.ncsc.gov.uk/ (accessed 17.09.2021).

Verizon Report (2020). Data Breach Investigations Report 2020, Retrieved from https://www.verizon.com/business/resources/reports/dbir/ (accessed 9.09.2021)

Wiener, G. (2019). Cyberterrorism and Ransomware Attacks, New York, Greenhaven Publishing. ISBN 9781534503403

Woźniak-Zapór, M. (2016). Zarządzanie bezpieczeństwem informacji – metody przeciwdziałania zagrożeniom bezpieczeństwa informacji na platformie e-learningowej [Information security management ‒ methods of counter acting information security threats on the e-learning platform], Bezpieczeństwo. Teoria i praktyka [In Polish], 4: 87-97, ISSN2451-0718.

Yuste, J. & Pastrana, S. (2021). Avaddon ransomware: an in-depth analysis and decryption of infected systems. Computers & Security, 109, DOI:10.1016/j.cose.2021.102388

Downloads

Published

2021-12-31

How to Cite

Kubacka, A., Biały, D., & Gołąb, R. (2021). Perception of Information Security in the Process of Distance Learning During the COVID-19 Pandemic on the Example of University Teachers’ Experiences. International Journal of Research in E-Learning, 7(2), 1–18. https://doi.org/10.31261/IJREL.2021.7.2.05

Issue

Section

Articles