Cyber safety in e-learning: The effects of cyber awareness and information security policies with moderating effects of gender and experience levels among e-learning students
In recent times, the rapid growth of e-learning has brought about increased concerns regarding cybersecurity risks within digital learning environments. Despite the growing importance of cybersecurity awareness among e-learning students, there is limited research on the factors that influence studen...
Saved in:
Published in | Education and information technologies Vol. 30; no. 10; pp. 14197 - 14236 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
New York
Springer US
01.07.2025
Springer Nature B.V |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | In recent times, the rapid growth of e-learning has brought about increased concerns regarding cybersecurity risks within digital learning environments. Despite the growing importance of cybersecurity awareness among e-learning students, there is limited research on the factors that influence students' understanding and adherence to cyber safety practices. This study investigates the relationship between e-learning engagement, cybersecurity awareness, and cyber safety practices, with a focus on the moderating roles of gender and e-learning experience. The research emphasizes the need to consider demographic factors such as gender and experience level when designing cybersecurity interventions for online learners. The investigation uses structural equation modeling to analyze how engagement in e-learning platforms influences students' cybersecurity awareness and their adherence to security protocols. Among the key findings from SEM, the study reveals that e-learning engagement positively impacts cybersecurity awareness, with gender and experience level acting as significant moderators. However, the study also found that experienced learners may initially face challenges in applying security protocols effectively, though their understanding improves over time with continued engagement. In addition, the research found that students with higher e-learning engagement are more likely to adopt cyber safety practices and comply with information security policies. Interestingly, the results suggest that educational institutions should tailor cybersecurity programs to address the unique needs of students based on their gender and experience levels. Furthermore, our research can inform future policies and interventions aimed at promoting cybersecurity awareness among e-learning students, ultimately contributing to safer and more secure digital learning environments. |
---|---|
AbstractList | In recent times, the rapid growth of e-learning has brought about increased concerns regarding cybersecurity risks within digital learning environments. Despite the growing importance of cybersecurity awareness among e-learning students, there is limited research on the factors that influence students' understanding and adherence to cyber safety practices. This study investigates the relationship between e-learning engagement, cybersecurity awareness, and cyber safety practices, with a focus on the moderating roles of gender and e-learning experience. The research emphasizes the need to consider demographic factors such as gender and experience level when designing cybersecurity interventions for online learners. The investigation uses structural equation modeling to analyze how engagement in e-learning platforms influences students' cybersecurity awareness and their adherence to security protocols. Among the key findings from SEM, the study reveals that e-learning engagement positively impacts cybersecurity awareness, with gender and experience level acting as significant moderators. However, the study also found that experienced learners may initially face challenges in applying security protocols effectively, though their understanding improves over time with continued engagement. In addition, the research found that students with higher e-learning engagement are more likely to adopt cyber safety practices and comply with information security policies. Interestingly, the results suggest that educational institutions should tailor cybersecurity programs to address the unique needs of students based on their gender and experience levels. Furthermore, our research can inform future policies and interventions aimed at promoting cybersecurity awareness among e-learning students, ultimately contributing to safer and more secure digital learning environments. |
Author | Xianping, Fu Ani, Arsenyan Ndunguru, Daniela Daniel Oroni, Chrispus Zacharia |
Author_xml | – sequence: 1 givenname: Chrispus Zacharia orcidid: 0009-0005-1768-5215 surname: Oroni fullname: Oroni, Chrispus Zacharia email: chrisoroni12@gmail.com organization: School of Information Science and Technology, Dalian Maritime University – sequence: 2 givenname: Fu surname: Xianping fullname: Xianping, Fu organization: School of Information Science and Technology, Dalian Maritime University – sequence: 3 givenname: Daniela Daniel surname: Ndunguru fullname: Ndunguru, Daniela Daniel organization: Chang’an University – sequence: 4 givenname: Arsenyan surname: Ani fullname: Ani, Arsenyan organization: Chang’an University |
BookMark | eNp9kctOQyEURYmpiVb9AUckjlEevdA6M42vpIkTHRMuHCrmFircWvtTfqPUGnXkCE6y9uKEPUSDmCIgdMroOaNUXRRGpZgQyhvChJCS8D10yBoliJJ0PKh3ISnholEHaFjKC6V0okb8EH1MNy1kXIyHfoNDxEA6MDmGOL_Ej8-AwXuwfcHJY_uFmrXJEKEUbKKrCZ_ywvQhRVzArnKommXqgg1Q8Dr0z3iRHORKxPlf2Ryi29qqA96XkANEC7iDN-iqeZG29M8quPQrB7Evx2jfm67Ayfd5hJ5urh-nd2T2cHs_vZoRyxXtibPMScHr10DDFDQjz9rGK9e2vGEjMaqDdXUUY94KIw0FzqlijLdjx4xT4gid7bzLnF5XUHr9klY51ie14HzMpJrIplJ8R9mcSsng9TKHhckbzaje9qJ3vejai_7qRfMaErtQqXCcQ_5V_5P6BPoZljA |
Cites_doi | 10.54536/ajet.v2i4.2248 10.1080/08874417.2020.1712269 10.1007/978-3-319-20062-0_10 10.1007/s40692-021-00195-8 10.1007/s10639-024-12472-x 10.3102/0034654309333844 10.1186/s41239-020-00199-x 10.1109/access.2022.3171829 10.4018/jksr.2013040102 10.18178/ijiet.2020.10.5.1393 10.3390/su151914132 10.1145/3563137.3563149 10.23962/10539/23572 10.20544/ersict.01.16.p02 10.36948/ijfmr.2024.v06i01.14058 10.23956/ijarcsse/v6i12/01204 10.1016/j.sbspro.2011.04.171 10.1016/j.chb.2016.12.040 10.3390/bdcc5020023 10.3390/fi13020039 10.33003/fjs-2021-0501-554 10.1080/23738871.2021.1973526 10.24059/olj.v19i4.561 10.2139/ssrn.4190146 10.14527/pegegog.2017.004 10.36348/jaep.2023.v07i08.007 10.1108/ics-12-2018-0142 10.26417/723gru15 10.1016/j.asw.2021.100586 10.3390/app11083383 10.2307/23044045 10.1080/08874417.2018.1432996 10.1145/3614321.3614364 10.28945/894 10.1108/09685220911006687 10.2307/25750690 10.1080/10494820.2023.2184392 10.37458/ssj.2.2.4 10.53532/ss.039.01.00115 10.2139/ssrn.2363824 10.1007/978-3-031-61463-7_14 10.28945/3864 10.1109/csci62032.2023.00286 10.51483/ijdsbda.2.2.2022.11-17 10.1504/ijmda.2017.087624 10.1109/PICST54195.2021.9772173 10.1145/3380799.3380803 10.1057/ejis.2009.8 10.1016/j.cose.2009.05.008 10.19173/irrodl.v14i5.1632 10.47604/jir.3055 10.1007/978-3-030-80519-7 10.1037/0021-9010.88.5.879 10.2991/978-94-6463-136-4_57 10.1080/08874417.2019.1650676 10.21125/inted.2020.1323 10.1016/j.compedu.2011.01.020 10.1007/s10639-019-09942-y 10.3390/jcp2010001 10.1080/10705511.2013.769397 10.1109/isdfs49300.2020.9116415 10.1556/063.2024.00273 10.1007/978-3-030-21814-0_3 10.48550/arxiv.2406.12568 10.1016/j.cose.2023.103208 10.37391/ijeer.100210 10.2139/ssrn.3176319 10.1080/01587919.2018.1476845 10.3390/app12052589 10.1080/02619768.2020.1821184 10.1007/978-94-007-0753-5_2604 10.1007/978-94-6209-404-8_8 10.1007/s10639-023-12360-w 10.1142/s0219649216500076 10.1145/3290607.3312786 10.1007/s10639-021-10806-7 10.1007/s11187-024-00946-8 10.24106/kefdergi.351517 10.3390/info15020117 10.20533/ijds.2040.2570.2010.0019 10.1177/0013164405282485 10.1016/j.cose.2023.103266 10.1007/s11227-021-03981-4 10.1007/s40647-021-00325-7 10.1186/s40537-017-0110-7 10.1016/j.cose.2024.104276 10.1111/isj.12271 10.1016/j.cose.2019.101640 10.1016/j.tele.2018.05.005 10.25300/misq/2018/13853 10.1111/jcom.12045 10.35467/cal/157123 10.2307/3151312 10.5817/cp2016-1-2 10.1007/s11042-024-19724-5 10.1146/annurev-psych-120710-100452 10.3390/educsci14060588 10.1007/s40747-021-00409-7 10.4324/9781410600219 10.1016/j.jaccpubpol.2018.10.003 10.56977/jicce.2023.21.1.32 10.12753/2066-026x-17-225 10.54884/s181570410020509-4 10.1007/978-3-030-52581-1_14 10.1155/2022/2693080 10.1016/j.ijcip.2017.03.002 10.14569/ijacsa.2021.0120334 10.1080/25741292.2023.2199960 |
ContentType | Journal Article |
Copyright | The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025 Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law. The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025. |
Copyright_xml | – notice: The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025 Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law. – notice: The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025. |
DBID | AAYXX CITATION AHOVV |
DOI | 10.1007/s10639-025-13366-2 |
DatabaseName | CrossRef Education Research Index |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Education Computer Science |
EISSN | 1573-7608 |
EndPage | 14236 |
ExternalDocumentID | 10_1007_s10639_025_13366_2 |
GeographicLocations | Kenya |
GeographicLocations_xml | – name: Kenya |
GroupedDBID | -W8 -Y2 -~C .86 .GO .VR 0-V 06D 0R~ 0VY 1N0 1SB 2.D 203 28- 29G 2J2 2JN 2JY 2KG 2LR 2P1 2VQ 2~H 30V 4.4 406 408 409 40D 40E 5GY 5QI 5VS 67Z 6NX 8G5 8TC 8UJ 95- 95. 95~ 96X AABHQ AACDK AAHNG AAHSB AAIAL AAJBT AAJKR AANZL AAOBN AAPKM AARHV AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYOK AAYQN AAYTO AAYZH ABAKF ABBBX ABBRH ABBXA ABDBE ABDZT ABECU ABFSG ABFTD ABFTV ABHLI ABHQN ABJNI ABJOX ABKCH ABKTR ABMNI ABMQK ABNWP ABOPQ ABQBU ABQSL ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABUWG ABWNU ABXPI ACAOD ACDTI ACGFO ACGFS ACHSB ACHXU ACKNC ACMDZ ACMFV ACMLO ACOKC ACOMO ACPIV ACREN ACSNA ACSTC ACYUM ACZOJ ADHHG ADHIR ADHKG ADIMF ADKNI ADKPE ADMLS ADRFC ADTPH ADURQ ADYFF ADYOE ADZKW AEBTG AEFIE AEFQL AEGAL AEGNC AEJHL AEJRE AEKMD AEMSY AEOHA AEPYU AESKC AETLH AEVLU AEXYK AEZWR AFBBN AFDZB AFEXP AFGCZ AFHIU AFKRA AFLOW AFOHR AFQWF AFWTZ AFYQB AFZKB AGAYW AGDGC AGGDS AGJBK AGMZJ AGQEE AGQMX AGQPQ AGRTI AGWIL AGWZB AGYKE AHAVH AHBYD AHKAY AHPBZ AHSBF AHWEU AHYZX AIAKS AIGIU AIIXL AILAN AITGF AIXLP AJBLW AJRNO AJZVZ ALMA_UNASSIGNED_HOLDINGS ALSLI ALWAN AMKLP AMTXH AMXSW AMYLF AMYQR AOCGG ARALO ARMRJ ASPBG ATHPR AVWKF AXYYD AYFIA AYJHY AZFZN AZQEC B-. BA0 BBWZM BDATZ BENPR BGNMA BPHCQ BSONS CAG CCPQU CJNVE COF CS3 CSCUP DDRTE DL5 DNIVK DPUIP DU5 DWQXO EBLON EBS EDJ EIOEI EJD ESBYG FEDTE FERAY FFXSO FIGPU FINBP FNLPD FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNUQQ GNWQR GQ7 GQ8 GUQSH GXS H13 HF~ HG5 HG6 HMJXF HQYDN HRMNR HVGLF HZ~ I09 IAO ICD IEA IER IHE IJ- IKXTQ ITC ITM IWAJR IXC IZIGR IZQ I~X I~Z J-C J0Z JBSCW JCJTX JZLTJ KDC KOV KOW LAK LLZTM M0P M2O M4Y MA- MK~ ML~ N2Q NB0 NDZJH NPVJJ NQJWS NU0 O-J O9- O93 O9G O9I O9J OAM OVD P19 P2P P9O PF0 PHGZM PHGZT PQEDU PQQKQ PROAC PT4 PT5 Q2X QOK QOS R-Y R4E R89 R9I RHV RNI ROL RPX RSV RZC RZD RZK S16 S1Z S26 S27 S28 S3B SAP SCJ SCLPG SCO SDH SDM SHX SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 T16 TEORI TSG TSK TSV TUC U2A UG4 UOJIU UTJUX UZXMN VC2 VFIZW W23 W48 WK6 WK8 YLTOR Z45 ZMTXR ~A9 ~EX AAYXX CITATION ABRTQ AHOVV |
ID | FETCH-LOGICAL-c270t-dc1d632100e517e54f1b5f7dbb251434b5fcd7db382b3a6a0e2207112b8d1ad73 |
IEDL.DBID | U2A |
ISSN | 1360-2357 |
IngestDate | Fri Jul 25 08:54:14 EDT 2025 Thu Jul 10 08:10:10 EDT 2025 Thu Jul 10 06:07:29 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 10 |
Keywords | E-learning environments Cybersecurity awareness Information security Cybersecurity interventions |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c270t-dc1d632100e517e54f1b5f7dbb251434b5fcd7db382b3a6a0e2207112b8d1ad73 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0009-0005-1768-5215 |
PQID | 3228167965 |
PQPubID | 55384 |
PageCount | 40 |
ParticipantIDs | proquest_journals_3228167965 crossref_primary_10_1007_s10639_025_13366_2 springer_journals_10_1007_s10639_025_13366_2 |
PublicationCentury | 2000 |
PublicationDate | 20250700 2025-07-00 20250701 |
PublicationDateYYYYMMDD | 2025-07-01 |
PublicationDate_xml | – month: 7 year: 2025 text: 20250700 |
PublicationDecade | 2020 |
PublicationPlace | New York |
PublicationPlace_xml | – name: New York |
PublicationSubtitle | The Official Journal of the IFIP Technical Committee on Education |
PublicationTitle | Education and information technologies |
PublicationTitleAbbrev | Educ Inf Technol |
PublicationYear | 2025 |
Publisher | Springer US Springer Nature B.V |
Publisher_xml | – name: Springer US – name: Springer Nature B.V |
References | 13366_CR21 T Daengsi (13366_CR34) 2021; 27 Z Zhang (13366_CR112) 2021; 51 M Anwar (13366_CR15) 2016; 69 13366_CR19 H Rhee (13366_CR96) 2009; 28 13366_CR14 RK Henson (13366_CR55) 2006; 66 13366_CR16 M Zwilling (13366_CR114) 2020; 62 13366_CR33 13366_CR9 BM Byrne (13366_CR28) 2013 Y Markos (13366_CR82) 2022 13366_CR35 13366_CR6 13366_CR5 13366_CR8 13366_CR31 13366_CR7 13366_CR30 13366_CR2 I Hwang (13366_CR60) 2019; 61 D Branley-Bell (13366_CR24) 2022; 2022 C Carrillo (13366_CR29) 2020; 43 ME Erendor (13366_CR41) 2022; 10 A Wiley (13366_CR109) 2019; 88 Y Sung (13366_CR104) 2011; 57 SB MacKenzie (13366_CR78) 2011; 35 13366_CR106 A Yazdanmehr (13366_CR110) 2020; 30 13366_CR100 13366_CR102 13366_CR103 13366_CR44 13366_CR43 13366_CR46 JM Hagen (13366_CR52) 2009; 17 13366_CR45 13366_CR40 13366_CR42 N Ifeanyi-Ajufo (13366_CR62) 2023; 6 C Fornell (13366_CR47) 1981; 18 HN Chua (13366_CR32) 2018; 35 JF Hair (13366_CR54) 2017; 1 M Mukherjee (13366_CR86) 2024; 15 N Bulgurcu (13366_CR27) 2010; 34 13366_CR111 13366_CR113 13366_CR37 D Korać (13366_CR71) 2021; 78 13366_CR36 13366_CR39 13366_CR51 BL Moorhouse (13366_CR85) 2021; 9 J Weidman (13366_CR108) 2019; 28 13366_CR50 13366_CR53 AK Jain (13366_CR63) 2021; 7 JK Nwankpa (13366_CR88) 2023; 130 GK Tetteh (13366_CR105) 2024 13366_CR49 13366_CR66 DC Luminita (13366_CR77) 2011; 15 RM Bernard (13366_CR18) 2009; 79 E Djeki (13366_CR38) 2024 13366_CR65 13366_CR68 13366_CR67 13366_CR61 13366_CR64 T Abid (13366_CR1) 2021; 14 Z Aivazpour (13366_CR4) 2020; 51 R Beuran (13366_CR20) 2019; 24 A Shah (13366_CR101) 2024 13366_CR59 CZ Oroni (13366_CR89) 2023; 29 13366_CR76 13366_CR79 13366_CR73 13366_CR72 13366_CR75 13366_CR74 JB Ulven (13366_CR107) 2021; 13 SR Boss (13366_CR23) 2009; 18 13366_CR70 NS Fouad (13366_CR48) 2021; 6 DU Bolliger (13366_CR22) 2018; 39 AS Peter (13366_CR92) 2017; 17 13366_CR69 13366_CR87 13366_CR84 13366_CR83 H Berkman (13366_CR17) 2018; 37 S Hina (13366_CR58) 2018; 60 TBG Herath (13366_CR56) 2022; 2 13366_CR80 13366_CR81 MF Hilmi (13366_CR57) 2013; 4 R Broadhurst (13366_CR25) 2018 TA Brown (13366_CR26) 2006 13366_CR11 13366_CR99 13366_CR10 13366_CR98 13366_CR13 13366_CR12 13366_CR95 13366_CR94 13366_CR97 KE Pearce (13366_CR91) 2013; 63 13366_CR90 PM Podsakoff (13366_CR93) 2003; 88 HO Achuodho (13366_CR3) 2024 |
References_xml | – ident: 13366_CR43 doi: 10.54536/ajet.v2i4.2248 – volume: 62 start-page: 82 issue: 1 year: 2020 ident: 13366_CR114 publication-title: Journal of Computer Information Systems doi: 10.1080/08874417.2020.1712269 – ident: 13366_CR36 doi: 10.1007/978-3-319-20062-0_10 – volume: 9 start-page: 51 issue: 1 year: 2021 ident: 13366_CR85 publication-title: Journal of Computers in Education doi: 10.1007/s40692-021-00195-8 – year: 2024 ident: 13366_CR38 publication-title: Education and Information Technologies doi: 10.1007/s10639-024-12472-x – volume: 79 start-page: 1243 issue: 3 year: 2009 ident: 13366_CR18 publication-title: Review of Educational Research doi: 10.3102/0034654309333844 – ident: 13366_CR42 doi: 10.1186/s41239-020-00199-x – volume: 10 start-page: 52319 year: 2022 ident: 13366_CR41 publication-title: IEEE Access doi: 10.1109/access.2022.3171829 – volume: 4 start-page: 9 issue: 2 year: 2013 ident: 13366_CR57 publication-title: International Journal of Knowledge Society Research doi: 10.4018/jksr.2013040102 – ident: 13366_CR95 doi: 10.18178/ijiet.2020.10.5.1393 – ident: 13366_CR5 doi: 10.3390/su151914132 – ident: 13366_CR40 doi: 10.1145/3563137.3563149 – ident: 13366_CR30 doi: 10.23962/10539/23572 – ident: 13366_CR35 doi: 10.20544/ersict.01.16.p02 – ident: 13366_CR68 doi: 10.36948/ijfmr.2024.v06i01.14058 – ident: 13366_CR80 doi: 10.23956/ijarcsse/v6i12/01204 – volume: 15 start-page: 2689 year: 2011 ident: 13366_CR77 publication-title: Procedia - Social and Behavioral Sciences doi: 10.1016/j.sbspro.2011.04.171 – volume: 69 start-page: 437 year: 2016 ident: 13366_CR15 publication-title: Computers in Human Behavior doi: 10.1016/j.chb.2016.12.040 – ident: 13366_CR6 doi: 10.3390/bdcc5020023 – volume: 13 start-page: 39 issue: 2 year: 2021 ident: 13366_CR107 publication-title: Future Internet doi: 10.3390/fi13020039 – ident: 13366_CR98 doi: 10.33003/fjs-2021-0501-554 – volume: 6 start-page: 137 issue: 2 year: 2021 ident: 13366_CR48 publication-title: Journal of Cyber Policy doi: 10.1080/23738871.2021.1973526 – ident: 13366_CR37 doi: 10.24059/olj.v19i4.561 – year: 2022 ident: 13366_CR82 publication-title: SSRN Electronic Journal doi: 10.2139/ssrn.4190146 – ident: 13366_CR111 doi: 10.14527/pegegog.2017.004 – ident: 13366_CR79 doi: 10.36348/jaep.2023.v07i08.007 – volume: 28 start-page: 423 issue: 3 year: 2019 ident: 13366_CR108 publication-title: Information & Computer Security doi: 10.1108/ics-12-2018-0142 – ident: 13366_CR39 doi: 10.26417/723gru15 – volume: 51 year: 2021 ident: 13366_CR112 publication-title: Assessing Writing doi: 10.1016/j.asw.2021.100586 – ident: 13366_CR8 doi: 10.3390/app11083383 – volume: 35 start-page: 293 issue: 2 year: 2011 ident: 13366_CR78 publication-title: MIS Quarterly doi: 10.2307/23044045 – volume: 60 start-page: 201 issue: 3 year: 2018 ident: 13366_CR58 publication-title: Journal of Computer Information Systems doi: 10.1080/08874417.2018.1432996 – ident: 13366_CR51 – ident: 13366_CR73 doi: 10.1145/3614321.3614364 – ident: 13366_CR72 doi: 10.28945/894 – ident: 13366_CR106 – volume: 17 start-page: 388 issue: 5 year: 2009 ident: 13366_CR52 publication-title: Information Management & Computer Security doi: 10.1108/09685220911006687 – volume: 34 start-page: 523 issue: 3 year: 2010 ident: 13366_CR27 publication-title: MIS Quarterly doi: 10.2307/25750690 – ident: 13366_CR76 doi: 10.1080/10494820.2023.2184392 – ident: 13366_CR99 doi: 10.37458/ssj.2.2.4 – ident: 13366_CR100 doi: 10.53532/ss.039.01.00115 – ident: 13366_CR87 doi: 10.2139/ssrn.2363824 – ident: 13366_CR7 doi: 10.1007/978-3-031-61463-7_14 – ident: 13366_CR113 doi: 10.28945/3864 – ident: 13366_CR103 doi: 10.1109/csci62032.2023.00286 – ident: 13366_CR64 doi: 10.51483/ijdsbda.2.2.2022.11-17 – volume: 1 start-page: 107 issue: 2 year: 2017 ident: 13366_CR54 publication-title: International Journal of Multivariate Data Analysis doi: 10.1504/ijmda.2017.087624 – ident: 13366_CR74 doi: 10.1109/PICST54195.2021.9772173 – volume: 51 start-page: 14 issue: 1 year: 2020 ident: 13366_CR4 publication-title: ACM SIGMIS Database: The DATABASE for Advances in Information Systems doi: 10.1145/3380799.3380803 – volume: 18 start-page: 151 issue: 2 year: 2009 ident: 13366_CR23 publication-title: European Journal of Information Systems doi: 10.1057/ejis.2009.8 – volume: 28 start-page: 816 issue: 8 year: 2009 ident: 13366_CR96 publication-title: Computers & Security doi: 10.1016/j.cose.2009.05.008 – ident: 13366_CR31 doi: 10.19173/irrodl.v14i5.1632 – ident: 13366_CR67 doi: 10.47604/jir.3055 – ident: 13366_CR53 doi: 10.1007/978-3-030-80519-7 – volume: 88 start-page: 879 issue: 5 year: 2003 ident: 13366_CR93 publication-title: Journal of Applied Psychology doi: 10.1037/0021-9010.88.5.879 – ident: 13366_CR102 doi: 10.2991/978-94-6463-136-4_57 – volume: 61 start-page: 345 issue: 4 year: 2019 ident: 13366_CR60 publication-title: Journal of Computer Information Systems doi: 10.1080/08874417.2019.1650676 – ident: 13366_CR14 doi: 10.21125/inted.2020.1323 – volume: 57 start-page: 1615 issue: 2 year: 2011 ident: 13366_CR104 publication-title: Computers & Education doi: 10.1016/j.compedu.2011.01.020 – volume: 24 start-page: 3619 issue: 6 year: 2019 ident: 13366_CR20 publication-title: Education and Information Technologies doi: 10.1007/s10639-019-09942-y – volume: 2 start-page: 1 issue: 1 year: 2022 ident: 13366_CR56 publication-title: Journal of Cybersecurity and Privacy doi: 10.3390/jcp2010001 – ident: 13366_CR59 doi: 10.1080/10705511.2013.769397 – ident: 13366_CR61 doi: 10.1109/isdfs49300.2020.9116415 – year: 2024 ident: 13366_CR3 publication-title: The Hungarian Educational Research Journal doi: 10.1556/063.2024.00273 – ident: 13366_CR45 doi: 10.1007/978-3-030-21814-0_3 – ident: 13366_CR44 doi: 10.48550/arxiv.2406.12568 – ident: 13366_CR12 doi: 10.1016/j.cose.2023.103208 – ident: 13366_CR75 doi: 10.37391/ijeer.100210 – year: 2018 ident: 13366_CR25 publication-title: SSRN Electronic Journal doi: 10.2139/ssrn.3176319 – volume: 39 start-page: 299 issue: 3 year: 2018 ident: 13366_CR22 publication-title: Distance Education doi: 10.1080/01587919.2018.1476845 – ident: 13366_CR11 doi: 10.3390/app12052589 – volume-title: Confirmatory factor analysis for applied research year: 2006 ident: 13366_CR26 – volume: 43 start-page: 466 issue: 4 year: 2020 ident: 13366_CR29 publication-title: European Journal of Teacher Education doi: 10.1080/02619768.2020.1821184 – ident: 13366_CR49 doi: 10.1007/978-94-007-0753-5_2604 – ident: 13366_CR46 doi: 10.1007/978-94-6209-404-8_8 – volume: 29 start-page: 11979 issue: 10 year: 2023 ident: 13366_CR89 publication-title: Education and Information Technologies doi: 10.1007/s10639-023-12360-w – ident: 13366_CR9 doi: 10.1142/s0219649216500076 – ident: 13366_CR65 doi: 10.1145/3290607.3312786 – volume: 27 start-page: 4729 issue: 4 year: 2021 ident: 13366_CR34 publication-title: Education and Information Technologies doi: 10.1007/s10639-021-10806-7 – year: 2024 ident: 13366_CR105 publication-title: Small Business Economics doi: 10.1007/s11187-024-00946-8 – ident: 13366_CR66 doi: 10.24106/kefdergi.351517 – volume: 15 start-page: 117 issue: 2 year: 2024 ident: 13366_CR86 publication-title: Information doi: 10.3390/info15020117 – ident: 13366_CR13 doi: 10.20533/ijds.2040.2570.2010.0019 – volume: 66 start-page: 393 issue: 3 year: 2006 ident: 13366_CR55 publication-title: Educational and Psychological Measurement doi: 10.1177/0013164405282485 – volume: 130 start-page: 103266 year: 2023 ident: 13366_CR88 publication-title: Computers & Security doi: 10.1016/j.cose.2023.103266 – volume: 78 start-page: 3325 issue: 3 year: 2021 ident: 13366_CR71 publication-title: The Journal of Supercomputing doi: 10.1007/s11227-021-03981-4 – volume: 14 start-page: 367 issue: 3 year: 2021 ident: 13366_CR1 publication-title: Fudan Journal of the Humanities and Social Sciences doi: 10.1007/s40647-021-00325-7 – ident: 13366_CR2 doi: 10.1186/s40537-017-0110-7 – ident: 13366_CR90 doi: 10.1016/j.cose.2024.104276 – volume: 30 start-page: 791 issue: 5 year: 2020 ident: 13366_CR110 publication-title: Information Systems Journal doi: 10.1111/isj.12271 – volume: 88 year: 2019 ident: 13366_CR109 publication-title: Computers & Security doi: 10.1016/j.cose.2019.101640 – ident: 13366_CR70 – volume: 35 start-page: 1770 issue: 6 year: 2018 ident: 13366_CR32 publication-title: Telematics and Informatics doi: 10.1016/j.tele.2018.05.005 – ident: 13366_CR84 doi: 10.25300/misq/2018/13853 – volume: 63 start-page: 721 issue: 4 year: 2013 ident: 13366_CR91 publication-title: Journal of Communication doi: 10.1111/jcom.12045 – ident: 13366_CR81 doi: 10.35467/cal/157123 – volume: 18 start-page: 39 issue: 1 year: 1981 ident: 13366_CR47 publication-title: Journal of Marketing Research doi: 10.2307/3151312 – ident: 13366_CR50 – ident: 13366_CR69 doi: 10.5817/cp2016-1-2 – year: 2024 ident: 13366_CR101 publication-title: Multimedia Tools and Applications doi: 10.1007/s11042-024-19724-5 – ident: 13366_CR94 doi: 10.1146/annurev-psych-120710-100452 – ident: 13366_CR21 doi: 10.3390/educsci14060588 – volume: 7 start-page: 2157 issue: 5 year: 2021 ident: 13366_CR63 publication-title: Complex & Intelligent Systems doi: 10.1007/s40747-021-00409-7 – volume-title: Structural equation modeling with AMOS: Basic concepts, applications, and programming year: 2013 ident: 13366_CR28 doi: 10.4324/9781410600219 – volume: 37 start-page: 508 issue: 6 year: 2018 ident: 13366_CR17 publication-title: Journal of Accounting and Public Policy doi: 10.1016/j.jaccpubpol.2018.10.003 – ident: 13366_CR97 doi: 10.56977/jicce.2023.21.1.32 – ident: 13366_CR83 doi: 10.12753/2066-026x-17-225 – ident: 13366_CR16 – ident: 13366_CR19 doi: 10.54884/s181570410020509-4 – ident: 13366_CR33 doi: 10.1007/978-3-030-52581-1_14 – volume: 2022 start-page: 1 year: 2022 ident: 13366_CR24 publication-title: Human Behavior and Emerging Technologies doi: 10.1155/2022/2693080 – volume: 17 start-page: 49 year: 2017 ident: 13366_CR92 publication-title: International Journal of Critical Infrastructure Protection doi: 10.1016/j.ijcip.2017.03.002 – ident: 13366_CR10 doi: 10.14569/ijacsa.2021.0120334 – volume: 6 start-page: 146 issue: 2 year: 2023 ident: 13366_CR62 publication-title: Policy Design and Practice doi: 10.1080/25741292.2023.2199960 |
SSID | ssj0009742 |
Score | 2.3631482 |
Snippet | In recent times, the rapid growth of e-learning has brought about increased concerns regarding cybersecurity risks within digital learning environments.... |
SourceID | proquest crossref springer |
SourceType | Aggregation Database Index Database Publisher |
StartPage | 14197 |
SubjectTerms | Access to Information Blended Learning Bullying Career and Technical Education Classroom Environment Computer Appl. in Social and Behavioral Sciences Computer Science Computers and Education Cybersecurity Data Analysis Distance learning Education Educational Needs Educational Practices Educational Technology Electronic Learning Higher Education Influence of Technology Information Security Information Systems Applications (incl.Internet) Learner Engagement Learning Experience Learning Management Systems Lifelong Learning Literature Reviews Online instruction Preferences Social Media Social networks User Interfaces and Human Computer Interaction |
Title | Cyber safety in e-learning: The effects of cyber awareness and information security policies with moderating effects of gender and experience levels among e-learning students |
URI | https://link.springer.com/article/10.1007/s10639-025-13366-2 https://www.proquest.com/docview/3228167965 |
Volume | 30 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3fS8MwEA7iXvTBH1NxOsc9-KaFNm3T6NsYU1H0ycF8KkmTDkGq2Insn_Jv9C5L3RR98KUQGi6Fu1wuvbvvY-w4LONEKsLTLmJ8nAkbKIP7ylpC_-YmTgrK6N7eiatRcj1Ox74prG6q3ZuUpPPUS81ueJoGRL-K9yohAnS8rRTv7lTINeL9BdRu5ihzoliEAYG5-FaZ32V8P44WMeaPtKg7bS622IYPE6E_1-s2W7FVm202FAzgd2SbSJd9gUabrS9hC-6wj8FM48xalXY6g8cKbOAZIibngMYBvpIDnkso3FT1To1h6PlAVQY8oiqJhtqT3AFROuDSNdDvWyAWHTKgarIsbOLI6ZwM-4WjDE9UnISSidto6VOgnmNr1rtsdDG8H1wFnpwhKHgWTgNTREZQA1Bo0yizaVJGOi0zozWnGCzBQWFwGEuuYyVUaDnHcCbiWppImSzeY6vVc2X3GehSpRadnZVKJioslJBFqE0kTRJLq6IOO2l0lL_MMTjyBdoyaTRHjeZOoznvsG6jxtzvxzpHtyUp4STSDjttVLt4_be0g_9NP2RrnKzL1fN22er09c0eYdQy1T3W6l8-3Ax7zlg_AXEx6Fs |
linkProvider | Springer Nature |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LT8MwDI7QOAAHHgPEYIAP3KBSm7Zp4IYQaDxPTNqtSpp0QkIdokNof4rfiJ2lbCA4cKkU1XIr2XHc2v4-xo7CMk6kIjztIsbLqbCBMrivrCX0b27ipKCK7v2D6PWTm0E68ENhddPt3pQkXaSeG3bD0zQg-lX8rhIiwMC7iMmAJF_u8_MZ1G7mKHOiWIQBgbn4UZnfdXw_jmY55o-yqDttrtbZqk8T4Xxq1w22YKs2W2soGMDvyDaRLvsGjTZbmcMW3GQfFxONkrUq7XgCTxXYwDNEDM8AnQN8JweMSiicqHqnwTCMfKAqAx5RlVRD7UnugCgd8NE10O9bIBYdcqBqOK9s6MjpnA77haMMz9SchJqJ22juVaCeYmvWW6x_dfl40Qs8OUNQ8CwcB6aIjKABoNCmUWbTpIx0WmZGa045WIKLwuAyllzHSqjQco7pTMS1NJEyWbzNWtWosjsMdKlSi8HOSiUTFRZKyCLUJpImiaVVUYcdNzbKX6YYHPkMbZksmqNFc2fRnHdYtzFj7vdjnWPYklRwEmmHnTSmnd3-W9vu_8QP2VLv8f4uv7t-uN1jy5w8zfX2dllr_Ppm9zGDGesD57CfPzrpug |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1Ra9RAEF5KhdI-qL1aPD3tPPTNhks2yWb1rZwetdWjDx7cW9jNbo6C5A4TkftT_kZnNhuTlvrgS2DJMAnM7OwkM_N9jJ2HZZxIRXjaRYyX98IGyuC-spbQv7mJk4Iqul8X4mqZXK_S1WCK33W7dyXJdqaBUJqqZro15XQw-IYna0BUrPiNJUSAQfhJQtPA6NFLftnD7maOPieKRRgQsIsfm3lcx_2jqc83H5RI3ckzf86e-pQRLlsbH7M9W43Ys46OAfzuHBEBs2_WGLGjAc7gCfs922mUrFVpmx3cVWADzxax_gDoKOC7OmBTQuFE1S8aEsMoCKoy4NFVSTXUnvAOiN4BH10D_coFYtQhZ6rWQ2VrR1TndNi_mMrwnRqVUDPxHA1eBeoWZ7N-wZbzT99mV4EnaggKnoVNYIrICBoGCm0aZTZNykinZWa05pSPJbgoDC5jyXWshAot55jaRFxLEymTxadsv9pU9iUDXarUYuCzUslEhYUSsgi1iaRJYmlVNGbvOhvl2xaPI--Rl8miOVo0dxbN-ZhNOjPmfm_WOYYwScUnkY7ZRWfa_va_tb36P_EzdnD7cZ5_-by4ec0OOTmaa_OdsP3mx0_7BpOZRr91_voHcuXt7Q |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Cyber+safety+in+e-learning%3A+The+effects+of+cyber+awareness+and+information+security+policies+with+moderating+effects+of+gender+and+experience+levels+among+e-learning+students&rft.jtitle=Education+and+information+technologies&rft.au=Oroni%2C+Chrispus+Zacharia&rft.au=Xianping%2C+Fu&rft.au=Ndunguru%2C+Daniela+Daniel&rft.au=Ani%2C+Arsenyan&rft.date=2025-07-01&rft.pub=Springer+Nature+B.V&rft.issn=1360-2357&rft.eissn=1573-7608&rft.volume=30&rft.issue=10&rft.spage=14197&rft.epage=14236&rft_id=info:doi/10.1007%2Fs10639-025-13366-2&rft.externalDBID=HAS_PDF_LINK |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1360-2357&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1360-2357&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1360-2357&client=summon |