Cyber safety in e-learning: The effects of cyber awareness and information security policies with moderating effects of gender and experience levels among e-learning students

In recent times, the rapid growth of e-learning has brought about increased concerns regarding cybersecurity risks within digital learning environments. Despite the growing importance of cybersecurity awareness among e-learning students, there is limited research on the factors that influence studen...

Full description

Saved in:
Bibliographic Details
Published inEducation and information technologies Vol. 30; no. 10; pp. 14197 - 14236
Main Authors Oroni, Chrispus Zacharia, Xianping, Fu, Ndunguru, Daniela Daniel, Ani, Arsenyan
Format Journal Article
LanguageEnglish
Published New York Springer US 01.07.2025
Springer Nature B.V
Subjects
Online AccessGet full text

Cover

Loading…
Abstract In recent times, the rapid growth of e-learning has brought about increased concerns regarding cybersecurity risks within digital learning environments. Despite the growing importance of cybersecurity awareness among e-learning students, there is limited research on the factors that influence students' understanding and adherence to cyber safety practices. This study investigates the relationship between e-learning engagement, cybersecurity awareness, and cyber safety practices, with a focus on the moderating roles of gender and e-learning experience. The research emphasizes the need to consider demographic factors such as gender and experience level when designing cybersecurity interventions for online learners. The investigation uses structural equation modeling to analyze how engagement in e-learning platforms influences students' cybersecurity awareness and their adherence to security protocols. Among the key findings from SEM, the study reveals that e-learning engagement positively impacts cybersecurity awareness, with gender and experience level acting as significant moderators. However, the study also found that experienced learners may initially face challenges in applying security protocols effectively, though their understanding improves over time with continued engagement. In addition, the research found that students with higher e-learning engagement are more likely to adopt cyber safety practices and comply with information security policies. Interestingly, the results suggest that educational institutions should tailor cybersecurity programs to address the unique needs of students based on their gender and experience levels. Furthermore, our research can inform future policies and interventions aimed at promoting cybersecurity awareness among e-learning students, ultimately contributing to safer and more secure digital learning environments.
AbstractList In recent times, the rapid growth of e-learning has brought about increased concerns regarding cybersecurity risks within digital learning environments. Despite the growing importance of cybersecurity awareness among e-learning students, there is limited research on the factors that influence students' understanding and adherence to cyber safety practices. This study investigates the relationship between e-learning engagement, cybersecurity awareness, and cyber safety practices, with a focus on the moderating roles of gender and e-learning experience. The research emphasizes the need to consider demographic factors such as gender and experience level when designing cybersecurity interventions for online learners. The investigation uses structural equation modeling to analyze how engagement in e-learning platforms influences students' cybersecurity awareness and their adherence to security protocols. Among the key findings from SEM, the study reveals that e-learning engagement positively impacts cybersecurity awareness, with gender and experience level acting as significant moderators. However, the study also found that experienced learners may initially face challenges in applying security protocols effectively, though their understanding improves over time with continued engagement. In addition, the research found that students with higher e-learning engagement are more likely to adopt cyber safety practices and comply with information security policies. Interestingly, the results suggest that educational institutions should tailor cybersecurity programs to address the unique needs of students based on their gender and experience levels. Furthermore, our research can inform future policies and interventions aimed at promoting cybersecurity awareness among e-learning students, ultimately contributing to safer and more secure digital learning environments.
Author Xianping, Fu
Ani, Arsenyan
Ndunguru, Daniela Daniel
Oroni, Chrispus Zacharia
Author_xml – sequence: 1
  givenname: Chrispus Zacharia
  orcidid: 0009-0005-1768-5215
  surname: Oroni
  fullname: Oroni, Chrispus Zacharia
  email: chrisoroni12@gmail.com
  organization: School of Information Science and Technology, Dalian Maritime University
– sequence: 2
  givenname: Fu
  surname: Xianping
  fullname: Xianping, Fu
  organization: School of Information Science and Technology, Dalian Maritime University
– sequence: 3
  givenname: Daniela Daniel
  surname: Ndunguru
  fullname: Ndunguru, Daniela Daniel
  organization: Chang’an University
– sequence: 4
  givenname: Arsenyan
  surname: Ani
  fullname: Ani, Arsenyan
  organization: Chang’an University
BookMark eNp9kctOQyEURYmpiVb9AUckjlEevdA6M42vpIkTHRMuHCrmFircWvtTfqPUGnXkCE6y9uKEPUSDmCIgdMroOaNUXRRGpZgQyhvChJCS8D10yBoliJJ0PKh3ISnholEHaFjKC6V0okb8EH1MNy1kXIyHfoNDxEA6MDmGOL_Ej8-AwXuwfcHJY_uFmrXJEKEUbKKrCZ_ywvQhRVzArnKommXqgg1Q8Dr0z3iRHORKxPlf2Ryi29qqA96XkANEC7iDN-iqeZG29M8quPQrB7Evx2jfm67Ayfd5hJ5urh-nd2T2cHs_vZoRyxXtibPMScHr10DDFDQjz9rGK9e2vGEjMaqDdXUUY94KIw0FzqlijLdjx4xT4gid7bzLnF5XUHr9klY51ie14HzMpJrIplJ8R9mcSsng9TKHhckbzaje9qJ3vejai_7qRfMaErtQqXCcQ_5V_5P6BPoZljA
Cites_doi 10.54536/ajet.v2i4.2248
10.1080/08874417.2020.1712269
10.1007/978-3-319-20062-0_10
10.1007/s40692-021-00195-8
10.1007/s10639-024-12472-x
10.3102/0034654309333844
10.1186/s41239-020-00199-x
10.1109/access.2022.3171829
10.4018/jksr.2013040102
10.18178/ijiet.2020.10.5.1393
10.3390/su151914132
10.1145/3563137.3563149
10.23962/10539/23572
10.20544/ersict.01.16.p02
10.36948/ijfmr.2024.v06i01.14058
10.23956/ijarcsse/v6i12/01204
10.1016/j.sbspro.2011.04.171
10.1016/j.chb.2016.12.040
10.3390/bdcc5020023
10.3390/fi13020039
10.33003/fjs-2021-0501-554
10.1080/23738871.2021.1973526
10.24059/olj.v19i4.561
10.2139/ssrn.4190146
10.14527/pegegog.2017.004
10.36348/jaep.2023.v07i08.007
10.1108/ics-12-2018-0142
10.26417/723gru15
10.1016/j.asw.2021.100586
10.3390/app11083383
10.2307/23044045
10.1080/08874417.2018.1432996
10.1145/3614321.3614364
10.28945/894
10.1108/09685220911006687
10.2307/25750690
10.1080/10494820.2023.2184392
10.37458/ssj.2.2.4
10.53532/ss.039.01.00115
10.2139/ssrn.2363824
10.1007/978-3-031-61463-7_14
10.28945/3864
10.1109/csci62032.2023.00286
10.51483/ijdsbda.2.2.2022.11-17
10.1504/ijmda.2017.087624
10.1109/PICST54195.2021.9772173
10.1145/3380799.3380803
10.1057/ejis.2009.8
10.1016/j.cose.2009.05.008
10.19173/irrodl.v14i5.1632
10.47604/jir.3055
10.1007/978-3-030-80519-7
10.1037/0021-9010.88.5.879
10.2991/978-94-6463-136-4_57
10.1080/08874417.2019.1650676
10.21125/inted.2020.1323
10.1016/j.compedu.2011.01.020
10.1007/s10639-019-09942-y
10.3390/jcp2010001
10.1080/10705511.2013.769397
10.1109/isdfs49300.2020.9116415
10.1556/063.2024.00273
10.1007/978-3-030-21814-0_3
10.48550/arxiv.2406.12568
10.1016/j.cose.2023.103208
10.37391/ijeer.100210
10.2139/ssrn.3176319
10.1080/01587919.2018.1476845
10.3390/app12052589
10.1080/02619768.2020.1821184
10.1007/978-94-007-0753-5_2604
10.1007/978-94-6209-404-8_8
10.1007/s10639-023-12360-w
10.1142/s0219649216500076
10.1145/3290607.3312786
10.1007/s10639-021-10806-7
10.1007/s11187-024-00946-8
10.24106/kefdergi.351517
10.3390/info15020117
10.20533/ijds.2040.2570.2010.0019
10.1177/0013164405282485
10.1016/j.cose.2023.103266
10.1007/s11227-021-03981-4
10.1007/s40647-021-00325-7
10.1186/s40537-017-0110-7
10.1016/j.cose.2024.104276
10.1111/isj.12271
10.1016/j.cose.2019.101640
10.1016/j.tele.2018.05.005
10.25300/misq/2018/13853
10.1111/jcom.12045
10.35467/cal/157123
10.2307/3151312
10.5817/cp2016-1-2
10.1007/s11042-024-19724-5
10.1146/annurev-psych-120710-100452
10.3390/educsci14060588
10.1007/s40747-021-00409-7
10.4324/9781410600219
10.1016/j.jaccpubpol.2018.10.003
10.56977/jicce.2023.21.1.32
10.12753/2066-026x-17-225
10.54884/s181570410020509-4
10.1007/978-3-030-52581-1_14
10.1155/2022/2693080
10.1016/j.ijcip.2017.03.002
10.14569/ijacsa.2021.0120334
10.1080/25741292.2023.2199960
ContentType Journal Article
Copyright The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025 Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025.
Copyright_xml – notice: The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025 Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
– notice: The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025.
DBID AAYXX
CITATION
AHOVV
DOI 10.1007/s10639-025-13366-2
DatabaseName CrossRef
Education Research Index
DatabaseTitle CrossRef
DatabaseTitleList

DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Education
Computer Science
EISSN 1573-7608
EndPage 14236
ExternalDocumentID 10_1007_s10639_025_13366_2
GeographicLocations Kenya
GeographicLocations_xml – name: Kenya
GroupedDBID -W8
-Y2
-~C
.86
.GO
.VR
0-V
06D
0R~
0VY
1N0
1SB
2.D
203
28-
29G
2J2
2JN
2JY
2KG
2LR
2P1
2VQ
2~H
30V
4.4
406
408
409
40D
40E
5GY
5QI
5VS
67Z
6NX
8G5
8TC
8UJ
95-
95.
95~
96X
AABHQ
AACDK
AAHNG
AAHSB
AAIAL
AAJBT
AAJKR
AANZL
AAOBN
AAPKM
AARHV
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYOK
AAYQN
AAYTO
AAYZH
ABAKF
ABBBX
ABBRH
ABBXA
ABDBE
ABDZT
ABECU
ABFSG
ABFTD
ABFTV
ABHLI
ABHQN
ABJNI
ABJOX
ABKCH
ABKTR
ABMNI
ABMQK
ABNWP
ABOPQ
ABQBU
ABQSL
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABUWG
ABWNU
ABXPI
ACAOD
ACDTI
ACGFO
ACGFS
ACHSB
ACHXU
ACKNC
ACMDZ
ACMFV
ACMLO
ACOKC
ACOMO
ACPIV
ACREN
ACSNA
ACSTC
ACYUM
ACZOJ
ADHHG
ADHIR
ADHKG
ADIMF
ADKNI
ADKPE
ADMLS
ADRFC
ADTPH
ADURQ
ADYFF
ADYOE
ADZKW
AEBTG
AEFIE
AEFQL
AEGAL
AEGNC
AEJHL
AEJRE
AEKMD
AEMSY
AEOHA
AEPYU
AESKC
AETLH
AEVLU
AEXYK
AEZWR
AFBBN
AFDZB
AFEXP
AFGCZ
AFHIU
AFKRA
AFLOW
AFOHR
AFQWF
AFWTZ
AFYQB
AFZKB
AGAYW
AGDGC
AGGDS
AGJBK
AGMZJ
AGQEE
AGQMX
AGQPQ
AGRTI
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHKAY
AHPBZ
AHSBF
AHWEU
AHYZX
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AIXLP
AJBLW
AJRNO
AJZVZ
ALMA_UNASSIGNED_HOLDINGS
ALSLI
ALWAN
AMKLP
AMTXH
AMXSW
AMYLF
AMYQR
AOCGG
ARALO
ARMRJ
ASPBG
ATHPR
AVWKF
AXYYD
AYFIA
AYJHY
AZFZN
AZQEC
B-.
BA0
BBWZM
BDATZ
BENPR
BGNMA
BPHCQ
BSONS
CAG
CCPQU
CJNVE
COF
CS3
CSCUP
DDRTE
DL5
DNIVK
DPUIP
DU5
DWQXO
EBLON
EBS
EDJ
EIOEI
EJD
ESBYG
FEDTE
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNUQQ
GNWQR
GQ7
GQ8
GUQSH
GXS
H13
HF~
HG5
HG6
HMJXF
HQYDN
HRMNR
HVGLF
HZ~
I09
IAO
ICD
IEA
IER
IHE
IJ-
IKXTQ
ITC
ITM
IWAJR
IXC
IZIGR
IZQ
I~X
I~Z
J-C
J0Z
JBSCW
JCJTX
JZLTJ
KDC
KOV
KOW
LAK
LLZTM
M0P
M2O
M4Y
MA-
MK~
ML~
N2Q
NB0
NDZJH
NPVJJ
NQJWS
NU0
O-J
O9-
O93
O9G
O9I
O9J
OAM
OVD
P19
P2P
P9O
PF0
PHGZM
PHGZT
PQEDU
PQQKQ
PROAC
PT4
PT5
Q2X
QOK
QOS
R-Y
R4E
R89
R9I
RHV
RNI
ROL
RPX
RSV
RZC
RZD
RZK
S16
S1Z
S26
S27
S28
S3B
SAP
SCJ
SCLPG
SCO
SDH
SDM
SHX
SISQX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
T16
TEORI
TSG
TSK
TSV
TUC
U2A
UG4
UOJIU
UTJUX
UZXMN
VC2
VFIZW
W23
W48
WK6
WK8
YLTOR
Z45
ZMTXR
~A9
~EX
AAYXX
CITATION
ABRTQ
AHOVV
ID FETCH-LOGICAL-c270t-dc1d632100e517e54f1b5f7dbb251434b5fcd7db382b3a6a0e2207112b8d1ad73
IEDL.DBID U2A
ISSN 1360-2357
IngestDate Fri Jul 25 08:54:14 EDT 2025
Thu Jul 10 08:10:10 EDT 2025
Thu Jul 10 06:07:29 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 10
Keywords E-learning environments
Cybersecurity awareness
Information security
Cybersecurity interventions
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c270t-dc1d632100e517e54f1b5f7dbb251434b5fcd7db382b3a6a0e2207112b8d1ad73
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0009-0005-1768-5215
PQID 3228167965
PQPubID 55384
PageCount 40
ParticipantIDs proquest_journals_3228167965
crossref_primary_10_1007_s10639_025_13366_2
springer_journals_10_1007_s10639_025_13366_2
PublicationCentury 2000
PublicationDate 20250700
2025-07-00
20250701
PublicationDateYYYYMMDD 2025-07-01
PublicationDate_xml – month: 7
  year: 2025
  text: 20250700
PublicationDecade 2020
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationSubtitle The Official Journal of the IFIP Technical Committee on Education
PublicationTitle Education and information technologies
PublicationTitleAbbrev Educ Inf Technol
PublicationYear 2025
Publisher Springer US
Springer Nature B.V
Publisher_xml – name: Springer US
– name: Springer Nature B.V
References 13366_CR21
T Daengsi (13366_CR34) 2021; 27
Z Zhang (13366_CR112) 2021; 51
M Anwar (13366_CR15) 2016; 69
13366_CR19
H Rhee (13366_CR96) 2009; 28
13366_CR14
RK Henson (13366_CR55) 2006; 66
13366_CR16
M Zwilling (13366_CR114) 2020; 62
13366_CR33
13366_CR9
BM Byrne (13366_CR28) 2013
Y Markos (13366_CR82) 2022
13366_CR35
13366_CR6
13366_CR5
13366_CR8
13366_CR31
13366_CR7
13366_CR30
13366_CR2
I Hwang (13366_CR60) 2019; 61
D Branley-Bell (13366_CR24) 2022; 2022
C Carrillo (13366_CR29) 2020; 43
ME Erendor (13366_CR41) 2022; 10
A Wiley (13366_CR109) 2019; 88
Y Sung (13366_CR104) 2011; 57
SB MacKenzie (13366_CR78) 2011; 35
13366_CR106
A Yazdanmehr (13366_CR110) 2020; 30
13366_CR100
13366_CR102
13366_CR103
13366_CR44
13366_CR43
13366_CR46
JM Hagen (13366_CR52) 2009; 17
13366_CR45
13366_CR40
13366_CR42
N Ifeanyi-Ajufo (13366_CR62) 2023; 6
C Fornell (13366_CR47) 1981; 18
HN Chua (13366_CR32) 2018; 35
JF Hair (13366_CR54) 2017; 1
M Mukherjee (13366_CR86) 2024; 15
N Bulgurcu (13366_CR27) 2010; 34
13366_CR111
13366_CR113
13366_CR37
D Korać (13366_CR71) 2021; 78
13366_CR36
13366_CR39
13366_CR51
BL Moorhouse (13366_CR85) 2021; 9
J Weidman (13366_CR108) 2019; 28
13366_CR50
13366_CR53
AK Jain (13366_CR63) 2021; 7
JK Nwankpa (13366_CR88) 2023; 130
GK Tetteh (13366_CR105) 2024
13366_CR49
13366_CR66
DC Luminita (13366_CR77) 2011; 15
RM Bernard (13366_CR18) 2009; 79
E Djeki (13366_CR38) 2024
13366_CR65
13366_CR68
13366_CR67
13366_CR61
13366_CR64
T Abid (13366_CR1) 2021; 14
Z Aivazpour (13366_CR4) 2020; 51
R Beuran (13366_CR20) 2019; 24
A Shah (13366_CR101) 2024
13366_CR59
CZ Oroni (13366_CR89) 2023; 29
13366_CR76
13366_CR79
13366_CR73
13366_CR72
13366_CR75
13366_CR74
JB Ulven (13366_CR107) 2021; 13
SR Boss (13366_CR23) 2009; 18
13366_CR70
NS Fouad (13366_CR48) 2021; 6
DU Bolliger (13366_CR22) 2018; 39
AS Peter (13366_CR92) 2017; 17
13366_CR69
13366_CR87
13366_CR84
13366_CR83
H Berkman (13366_CR17) 2018; 37
S Hina (13366_CR58) 2018; 60
TBG Herath (13366_CR56) 2022; 2
13366_CR80
13366_CR81
MF Hilmi (13366_CR57) 2013; 4
R Broadhurst (13366_CR25) 2018
TA Brown (13366_CR26) 2006
13366_CR11
13366_CR99
13366_CR10
13366_CR98
13366_CR13
13366_CR12
13366_CR95
13366_CR94
13366_CR97
KE Pearce (13366_CR91) 2013; 63
13366_CR90
PM Podsakoff (13366_CR93) 2003; 88
HO Achuodho (13366_CR3) 2024
References_xml – ident: 13366_CR43
  doi: 10.54536/ajet.v2i4.2248
– volume: 62
  start-page: 82
  issue: 1
  year: 2020
  ident: 13366_CR114
  publication-title: Journal of Computer Information Systems
  doi: 10.1080/08874417.2020.1712269
– ident: 13366_CR36
  doi: 10.1007/978-3-319-20062-0_10
– volume: 9
  start-page: 51
  issue: 1
  year: 2021
  ident: 13366_CR85
  publication-title: Journal of Computers in Education
  doi: 10.1007/s40692-021-00195-8
– year: 2024
  ident: 13366_CR38
  publication-title: Education and Information Technologies
  doi: 10.1007/s10639-024-12472-x
– volume: 79
  start-page: 1243
  issue: 3
  year: 2009
  ident: 13366_CR18
  publication-title: Review of Educational Research
  doi: 10.3102/0034654309333844
– ident: 13366_CR42
  doi: 10.1186/s41239-020-00199-x
– volume: 10
  start-page: 52319
  year: 2022
  ident: 13366_CR41
  publication-title: IEEE Access
  doi: 10.1109/access.2022.3171829
– volume: 4
  start-page: 9
  issue: 2
  year: 2013
  ident: 13366_CR57
  publication-title: International Journal of Knowledge Society Research
  doi: 10.4018/jksr.2013040102
– ident: 13366_CR95
  doi: 10.18178/ijiet.2020.10.5.1393
– ident: 13366_CR5
  doi: 10.3390/su151914132
– ident: 13366_CR40
  doi: 10.1145/3563137.3563149
– ident: 13366_CR30
  doi: 10.23962/10539/23572
– ident: 13366_CR35
  doi: 10.20544/ersict.01.16.p02
– ident: 13366_CR68
  doi: 10.36948/ijfmr.2024.v06i01.14058
– ident: 13366_CR80
  doi: 10.23956/ijarcsse/v6i12/01204
– volume: 15
  start-page: 2689
  year: 2011
  ident: 13366_CR77
  publication-title: Procedia - Social and Behavioral Sciences
  doi: 10.1016/j.sbspro.2011.04.171
– volume: 69
  start-page: 437
  year: 2016
  ident: 13366_CR15
  publication-title: Computers in Human Behavior
  doi: 10.1016/j.chb.2016.12.040
– ident: 13366_CR6
  doi: 10.3390/bdcc5020023
– volume: 13
  start-page: 39
  issue: 2
  year: 2021
  ident: 13366_CR107
  publication-title: Future Internet
  doi: 10.3390/fi13020039
– ident: 13366_CR98
  doi: 10.33003/fjs-2021-0501-554
– volume: 6
  start-page: 137
  issue: 2
  year: 2021
  ident: 13366_CR48
  publication-title: Journal of Cyber Policy
  doi: 10.1080/23738871.2021.1973526
– ident: 13366_CR37
  doi: 10.24059/olj.v19i4.561
– year: 2022
  ident: 13366_CR82
  publication-title: SSRN Electronic Journal
  doi: 10.2139/ssrn.4190146
– ident: 13366_CR111
  doi: 10.14527/pegegog.2017.004
– ident: 13366_CR79
  doi: 10.36348/jaep.2023.v07i08.007
– volume: 28
  start-page: 423
  issue: 3
  year: 2019
  ident: 13366_CR108
  publication-title: Information & Computer Security
  doi: 10.1108/ics-12-2018-0142
– ident: 13366_CR39
  doi: 10.26417/723gru15
– volume: 51
  year: 2021
  ident: 13366_CR112
  publication-title: Assessing Writing
  doi: 10.1016/j.asw.2021.100586
– ident: 13366_CR8
  doi: 10.3390/app11083383
– volume: 35
  start-page: 293
  issue: 2
  year: 2011
  ident: 13366_CR78
  publication-title: MIS Quarterly
  doi: 10.2307/23044045
– volume: 60
  start-page: 201
  issue: 3
  year: 2018
  ident: 13366_CR58
  publication-title: Journal of Computer Information Systems
  doi: 10.1080/08874417.2018.1432996
– ident: 13366_CR51
– ident: 13366_CR73
  doi: 10.1145/3614321.3614364
– ident: 13366_CR72
  doi: 10.28945/894
– ident: 13366_CR106
– volume: 17
  start-page: 388
  issue: 5
  year: 2009
  ident: 13366_CR52
  publication-title: Information Management & Computer Security
  doi: 10.1108/09685220911006687
– volume: 34
  start-page: 523
  issue: 3
  year: 2010
  ident: 13366_CR27
  publication-title: MIS Quarterly
  doi: 10.2307/25750690
– ident: 13366_CR76
  doi: 10.1080/10494820.2023.2184392
– ident: 13366_CR99
  doi: 10.37458/ssj.2.2.4
– ident: 13366_CR100
  doi: 10.53532/ss.039.01.00115
– ident: 13366_CR87
  doi: 10.2139/ssrn.2363824
– ident: 13366_CR7
  doi: 10.1007/978-3-031-61463-7_14
– ident: 13366_CR113
  doi: 10.28945/3864
– ident: 13366_CR103
  doi: 10.1109/csci62032.2023.00286
– ident: 13366_CR64
  doi: 10.51483/ijdsbda.2.2.2022.11-17
– volume: 1
  start-page: 107
  issue: 2
  year: 2017
  ident: 13366_CR54
  publication-title: International Journal of Multivariate Data Analysis
  doi: 10.1504/ijmda.2017.087624
– ident: 13366_CR74
  doi: 10.1109/PICST54195.2021.9772173
– volume: 51
  start-page: 14
  issue: 1
  year: 2020
  ident: 13366_CR4
  publication-title: ACM SIGMIS Database: The DATABASE for Advances in Information Systems
  doi: 10.1145/3380799.3380803
– volume: 18
  start-page: 151
  issue: 2
  year: 2009
  ident: 13366_CR23
  publication-title: European Journal of Information Systems
  doi: 10.1057/ejis.2009.8
– volume: 28
  start-page: 816
  issue: 8
  year: 2009
  ident: 13366_CR96
  publication-title: Computers & Security
  doi: 10.1016/j.cose.2009.05.008
– ident: 13366_CR31
  doi: 10.19173/irrodl.v14i5.1632
– ident: 13366_CR67
  doi: 10.47604/jir.3055
– ident: 13366_CR53
  doi: 10.1007/978-3-030-80519-7
– volume: 88
  start-page: 879
  issue: 5
  year: 2003
  ident: 13366_CR93
  publication-title: Journal of Applied Psychology
  doi: 10.1037/0021-9010.88.5.879
– ident: 13366_CR102
  doi: 10.2991/978-94-6463-136-4_57
– volume: 61
  start-page: 345
  issue: 4
  year: 2019
  ident: 13366_CR60
  publication-title: Journal of Computer Information Systems
  doi: 10.1080/08874417.2019.1650676
– ident: 13366_CR14
  doi: 10.21125/inted.2020.1323
– volume: 57
  start-page: 1615
  issue: 2
  year: 2011
  ident: 13366_CR104
  publication-title: Computers & Education
  doi: 10.1016/j.compedu.2011.01.020
– volume: 24
  start-page: 3619
  issue: 6
  year: 2019
  ident: 13366_CR20
  publication-title: Education and Information Technologies
  doi: 10.1007/s10639-019-09942-y
– volume: 2
  start-page: 1
  issue: 1
  year: 2022
  ident: 13366_CR56
  publication-title: Journal of Cybersecurity and Privacy
  doi: 10.3390/jcp2010001
– ident: 13366_CR59
  doi: 10.1080/10705511.2013.769397
– ident: 13366_CR61
  doi: 10.1109/isdfs49300.2020.9116415
– year: 2024
  ident: 13366_CR3
  publication-title: The Hungarian Educational Research Journal
  doi: 10.1556/063.2024.00273
– ident: 13366_CR45
  doi: 10.1007/978-3-030-21814-0_3
– ident: 13366_CR44
  doi: 10.48550/arxiv.2406.12568
– ident: 13366_CR12
  doi: 10.1016/j.cose.2023.103208
– ident: 13366_CR75
  doi: 10.37391/ijeer.100210
– year: 2018
  ident: 13366_CR25
  publication-title: SSRN Electronic Journal
  doi: 10.2139/ssrn.3176319
– volume: 39
  start-page: 299
  issue: 3
  year: 2018
  ident: 13366_CR22
  publication-title: Distance Education
  doi: 10.1080/01587919.2018.1476845
– ident: 13366_CR11
  doi: 10.3390/app12052589
– volume-title: Confirmatory factor analysis for applied research
  year: 2006
  ident: 13366_CR26
– volume: 43
  start-page: 466
  issue: 4
  year: 2020
  ident: 13366_CR29
  publication-title: European Journal of Teacher Education
  doi: 10.1080/02619768.2020.1821184
– ident: 13366_CR49
  doi: 10.1007/978-94-007-0753-5_2604
– ident: 13366_CR46
  doi: 10.1007/978-94-6209-404-8_8
– volume: 29
  start-page: 11979
  issue: 10
  year: 2023
  ident: 13366_CR89
  publication-title: Education and Information Technologies
  doi: 10.1007/s10639-023-12360-w
– ident: 13366_CR9
  doi: 10.1142/s0219649216500076
– ident: 13366_CR65
  doi: 10.1145/3290607.3312786
– volume: 27
  start-page: 4729
  issue: 4
  year: 2021
  ident: 13366_CR34
  publication-title: Education and Information Technologies
  doi: 10.1007/s10639-021-10806-7
– year: 2024
  ident: 13366_CR105
  publication-title: Small Business Economics
  doi: 10.1007/s11187-024-00946-8
– ident: 13366_CR66
  doi: 10.24106/kefdergi.351517
– volume: 15
  start-page: 117
  issue: 2
  year: 2024
  ident: 13366_CR86
  publication-title: Information
  doi: 10.3390/info15020117
– ident: 13366_CR13
  doi: 10.20533/ijds.2040.2570.2010.0019
– volume: 66
  start-page: 393
  issue: 3
  year: 2006
  ident: 13366_CR55
  publication-title: Educational and Psychological Measurement
  doi: 10.1177/0013164405282485
– volume: 130
  start-page: 103266
  year: 2023
  ident: 13366_CR88
  publication-title: Computers & Security
  doi: 10.1016/j.cose.2023.103266
– volume: 78
  start-page: 3325
  issue: 3
  year: 2021
  ident: 13366_CR71
  publication-title: The Journal of Supercomputing
  doi: 10.1007/s11227-021-03981-4
– volume: 14
  start-page: 367
  issue: 3
  year: 2021
  ident: 13366_CR1
  publication-title: Fudan Journal of the Humanities and Social Sciences
  doi: 10.1007/s40647-021-00325-7
– ident: 13366_CR2
  doi: 10.1186/s40537-017-0110-7
– ident: 13366_CR90
  doi: 10.1016/j.cose.2024.104276
– volume: 30
  start-page: 791
  issue: 5
  year: 2020
  ident: 13366_CR110
  publication-title: Information Systems Journal
  doi: 10.1111/isj.12271
– volume: 88
  year: 2019
  ident: 13366_CR109
  publication-title: Computers & Security
  doi: 10.1016/j.cose.2019.101640
– ident: 13366_CR70
– volume: 35
  start-page: 1770
  issue: 6
  year: 2018
  ident: 13366_CR32
  publication-title: Telematics and Informatics
  doi: 10.1016/j.tele.2018.05.005
– ident: 13366_CR84
  doi: 10.25300/misq/2018/13853
– volume: 63
  start-page: 721
  issue: 4
  year: 2013
  ident: 13366_CR91
  publication-title: Journal of Communication
  doi: 10.1111/jcom.12045
– ident: 13366_CR81
  doi: 10.35467/cal/157123
– volume: 18
  start-page: 39
  issue: 1
  year: 1981
  ident: 13366_CR47
  publication-title: Journal of Marketing Research
  doi: 10.2307/3151312
– ident: 13366_CR50
– ident: 13366_CR69
  doi: 10.5817/cp2016-1-2
– year: 2024
  ident: 13366_CR101
  publication-title: Multimedia Tools and Applications
  doi: 10.1007/s11042-024-19724-5
– ident: 13366_CR94
  doi: 10.1146/annurev-psych-120710-100452
– ident: 13366_CR21
  doi: 10.3390/educsci14060588
– volume: 7
  start-page: 2157
  issue: 5
  year: 2021
  ident: 13366_CR63
  publication-title: Complex & Intelligent Systems
  doi: 10.1007/s40747-021-00409-7
– volume-title: Structural equation modeling with AMOS: Basic concepts, applications, and programming
  year: 2013
  ident: 13366_CR28
  doi: 10.4324/9781410600219
– volume: 37
  start-page: 508
  issue: 6
  year: 2018
  ident: 13366_CR17
  publication-title: Journal of Accounting and Public Policy
  doi: 10.1016/j.jaccpubpol.2018.10.003
– ident: 13366_CR97
  doi: 10.56977/jicce.2023.21.1.32
– ident: 13366_CR83
  doi: 10.12753/2066-026x-17-225
– ident: 13366_CR16
– ident: 13366_CR19
  doi: 10.54884/s181570410020509-4
– ident: 13366_CR33
  doi: 10.1007/978-3-030-52581-1_14
– volume: 2022
  start-page: 1
  year: 2022
  ident: 13366_CR24
  publication-title: Human Behavior and Emerging Technologies
  doi: 10.1155/2022/2693080
– volume: 17
  start-page: 49
  year: 2017
  ident: 13366_CR92
  publication-title: International Journal of Critical Infrastructure Protection
  doi: 10.1016/j.ijcip.2017.03.002
– ident: 13366_CR10
  doi: 10.14569/ijacsa.2021.0120334
– volume: 6
  start-page: 146
  issue: 2
  year: 2023
  ident: 13366_CR62
  publication-title: Policy Design and Practice
  doi: 10.1080/25741292.2023.2199960
SSID ssj0009742
Score 2.3631482
Snippet In recent times, the rapid growth of e-learning has brought about increased concerns regarding cybersecurity risks within digital learning environments....
SourceID proquest
crossref
springer
SourceType Aggregation Database
Index Database
Publisher
StartPage 14197
SubjectTerms Access to Information
Blended Learning
Bullying
Career and Technical Education
Classroom Environment
Computer Appl. in Social and Behavioral Sciences
Computer Science
Computers and Education
Cybersecurity
Data Analysis
Distance learning
Education
Educational Needs
Educational Practices
Educational Technology
Electronic Learning
Higher Education
Influence of Technology
Information Security
Information Systems Applications (incl.Internet)
Learner Engagement
Learning Experience
Learning Management Systems
Lifelong Learning
Literature Reviews
Online instruction
Preferences
Social Media
Social networks
User Interfaces and Human Computer Interaction
Title Cyber safety in e-learning: The effects of cyber awareness and information security policies with moderating effects of gender and experience levels among e-learning students
URI https://link.springer.com/article/10.1007/s10639-025-13366-2
https://www.proquest.com/docview/3228167965
Volume 30
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3fS8MwEA7iXvTBH1NxOsc9-KaFNm3T6NsYU1H0ycF8KkmTDkGq2Insn_Jv9C5L3RR98KUQGi6Fu1wuvbvvY-w4LONEKsLTLmJ8nAkbKIP7ylpC_-YmTgrK6N7eiatRcj1Ox74prG6q3ZuUpPPUS81ueJoGRL-K9yohAnS8rRTv7lTINeL9BdRu5ihzoliEAYG5-FaZ32V8P44WMeaPtKg7bS622IYPE6E_1-s2W7FVm202FAzgd2SbSJd9gUabrS9hC-6wj8FM48xalXY6g8cKbOAZIibngMYBvpIDnkso3FT1To1h6PlAVQY8oiqJhtqT3AFROuDSNdDvWyAWHTKgarIsbOLI6ZwM-4WjDE9UnISSidto6VOgnmNr1rtsdDG8H1wFnpwhKHgWTgNTREZQA1Bo0yizaVJGOi0zozWnGCzBQWFwGEuuYyVUaDnHcCbiWppImSzeY6vVc2X3GehSpRadnZVKJioslJBFqE0kTRJLq6IOO2l0lL_MMTjyBdoyaTRHjeZOoznvsG6jxtzvxzpHtyUp4STSDjttVLt4_be0g_9NP2RrnKzL1fN22er09c0eYdQy1T3W6l8-3Ax7zlg_AXEx6Fs
linkProvider Springer Nature
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LT8MwDI7QOAAHHgPEYIAP3KBSm7Zp4IYQaDxPTNqtSpp0QkIdokNof4rfiJ2lbCA4cKkU1XIr2XHc2v4-xo7CMk6kIjztIsbLqbCBMrivrCX0b27ipKCK7v2D6PWTm0E68ENhddPt3pQkXaSeG3bD0zQg-lX8rhIiwMC7iMmAJF_u8_MZ1G7mKHOiWIQBgbn4UZnfdXw_jmY55o-yqDttrtbZqk8T4Xxq1w22YKs2W2soGMDvyDaRLvsGjTZbmcMW3GQfFxONkrUq7XgCTxXYwDNEDM8AnQN8JweMSiicqHqnwTCMfKAqAx5RlVRD7UnugCgd8NE10O9bIBYdcqBqOK9s6MjpnA77haMMz9SchJqJ22juVaCeYmvWW6x_dfl40Qs8OUNQ8CwcB6aIjKABoNCmUWbTpIx0WmZGa045WIKLwuAyllzHSqjQco7pTMS1NJEyWbzNWtWosjsMdKlSi8HOSiUTFRZKyCLUJpImiaVVUYcdNzbKX6YYHPkMbZksmqNFc2fRnHdYtzFj7vdjnWPYklRwEmmHnTSmnd3-W9vu_8QP2VLv8f4uv7t-uN1jy5w8zfX2dllr_Ppm9zGDGesD57CfPzrpug
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1Ra9RAEF5KhdI-qL1aPD3tPPTNhks2yWb1rZwetdWjDx7cW9jNbo6C5A4TkftT_kZnNhuTlvrgS2DJMAnM7OwkM_N9jJ2HZZxIRXjaRYyX98IGyuC-spbQv7mJk4Iqul8X4mqZXK_S1WCK33W7dyXJdqaBUJqqZro15XQw-IYna0BUrPiNJUSAQfhJQtPA6NFLftnD7maOPieKRRgQsIsfm3lcx_2jqc83H5RI3ckzf86e-pQRLlsbH7M9W43Ys46OAfzuHBEBs2_WGLGjAc7gCfs922mUrFVpmx3cVWADzxax_gDoKOC7OmBTQuFE1S8aEsMoCKoy4NFVSTXUnvAOiN4BH10D_coFYtQhZ6rWQ2VrR1TndNi_mMrwnRqVUDPxHA1eBeoWZ7N-wZbzT99mV4EnaggKnoVNYIrICBoGCm0aZTZNykinZWa05pSPJbgoDC5jyXWshAot55jaRFxLEymTxadsv9pU9iUDXarUYuCzUslEhYUSsgi1iaRJYmlVNGbvOhvl2xaPI--Rl8miOVo0dxbN-ZhNOjPmfm_WOYYwScUnkY7ZRWfa_va_tb36P_EzdnD7cZ5_-by4ec0OOTmaa_OdsP3mx0_7BpOZRr91_voHcuXt7Q
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Cyber+safety+in+e-learning%3A+The+effects+of+cyber+awareness+and+information+security+policies+with+moderating+effects+of+gender+and+experience+levels+among+e-learning+students&rft.jtitle=Education+and+information+technologies&rft.au=Oroni%2C+Chrispus+Zacharia&rft.au=Xianping%2C+Fu&rft.au=Ndunguru%2C+Daniela+Daniel&rft.au=Ani%2C+Arsenyan&rft.date=2025-07-01&rft.pub=Springer+Nature+B.V&rft.issn=1360-2357&rft.eissn=1573-7608&rft.volume=30&rft.issue=10&rft.spage=14197&rft.epage=14236&rft_id=info:doi/10.1007%2Fs10639-025-13366-2&rft.externalDBID=HAS_PDF_LINK
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1360-2357&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1360-2357&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1360-2357&client=summon