Studi Pustaka Tentang Kerentanan Keamanan E-Learning dan Penanganannya
DOI:
https://doi.org/10.30865/mib.v4i2.1934Keywords:
Information Security, e-Learning, VulnerabilityAbstract
E-learning is an educational media that use ICT in the learning process. Nowadays, most of the higher education (universities) in Indonesia have integrated the learning process with e-learning systems. By using this system, learning can be done outside the classroom, anytime and anywhere. Based on the literature reviews, e-learning has many positive impacts on higher education components and its ecosystems, i.e., students, lecturers, higher education staff, and campus officials. Although it offers many advantages, similar to the information technology in general, e-learning systems are also vulnerable to security issues. Because, several security holes in the system can be penetrated easily by hackers, where the essential data contained in e-learning has high potential to be spoofed even modified by irresponsible parties. The security aspect of the e-learning system must be considered to minimize risks. Thus, the higher education can run their business as well. This paper aims to elaborate on the e-Learning system, opportunities, challenges, and several offered solutions on it. The research method used in this paper is literature studies from the latest references
References
Savulescu C and Al E, 2015 Security in e-learning systems in Proc. of. Electronics, Computers and Artificial Intelligence Int. Conf. p. 19–24.
Mandala S Abdullah A H and Ismail A S, 2013 A Survey of E-learning Security in Int. Conf. on ICT for Smart Society p. 1–6.
Shuttleworth M, 2009, What is a Literature Review? [Online]. Available: https://explorable.com/what-is-a-literature-review. [Accessed: 10-Apr-2019].
Majid H A and Al E, 2015 Investigation of Security Awareness on e-learning System Among Lecturers and Students in Higher Education Institution in Int. Conf. on Computer, Communication, and Control Technology (I4CT) p. 216–220.
Helmiawan M A, 2018, Keamanan E-Learning Menggunakan Metode Square (Studi Kasus STMIK Sumedang), academia.edu. [Online]. Available: https://www.academia.edu/18056542/KEAMANAN_E-LEARNING_MENGGUNAKAN_METODE_SQUARE . [Accessed: 23-Jan-2020].
Ayodele T and Al. E, 2011 Towards E-learning Security: A Machine Learning Approach in Int. Conf. on Information Society (i-Society) p. 490–492.
Alwi N H M and Fan I S, 2015 Information Security Management in E-learning in Int. Conf. for Internet Technology and Secured Transactions (ICITST) p. 767–770.
Darmawan D Rian R Al and Herlandy P B, 2020 Game Edukasi Adventure Pengenalan Komponen Komputer Untuk Peserta Didik SMK Dar El Hikmah Pekanbaru EduTeach J. Edukasi dan Teknol. Pembelajaran 1, 1 p. 22–29.
Bersin J, 2009, Modernize Corporate Training: The Enterprise Learning Framework, joshbersin.com. [Online]. Available: https://joshbersin.com/2009/05/modern-corporate-training-the-enterprise-learning-framework/. [Accessed: 22-Dec-2019].
Rochmah E and Majid N W A, 2018 Membangun virtual classroom melalui social learning networks (SLNS) Prem. Educ. J. Pendidik. Dasar dan Pembelajaran 8, 1 p. 15–21.
Sholihah D A Shanti W N and Abdullah A A, 2019 Model Experiential Learning untuk Meningkatkan Kemampuan Berpikir Kritis Mahasiswa Pendidikan Matematika ION J. Ilm. Pendidik. Mat. 7, 3 p. 383–390.
Sholihah D A and Shanti W N, 2017 Diposisi Berpikir Kritis Matematis Dalam Pembelajaran Menggunakan Metode Socrates J. Karya Pendidik. Mat. 4, 2 p. 1–9.
Herlandy P B and Novalia M, 2019 Penerapan e-Learning pada Pembelajaran Komunikasi dalam Jaringan dengan Metode Blended learning Bagi Siswa SMK J. Educ. Inform. Technol. Sci. 1, 1 p. 24–33.
Rahmawati F, 2016 E-Learning Implementation: Its Opportunities and Drawbacks Perceived by EFL Students J. Foreign Lang. Teach. Learn. 1, 1.
Vitoria L Mislinawati M and Nurmasyitah N, 2018 Students’ perceptions on the implementation of e-learning: Helpful or unhelpful? IOP Conf. Ser. J. Phys. Conf. Ser. 1088.
Majid N W A and Fuada S, 2020 E-Learning for Society: A Great Potential to Implement Education for All (EFA) Movement in Indonesia Int. J. Interact. Mob. Technol. 14, 2 p. 250–258.
Aldheleai H F and Al E, 2015 User Security in E-learning System in Int. Conf. on Communication Systems and Network Technologies p. 767–770.
Violettas G E Theodorou T L and Stephanides G C, 2013 E-learning Software Security Tested for Security Vulnerabilities & Issues in Int. Conf. on e-learning p. 233 – 240.
Kambourakis G and Al. E, 2007 A PKI approach for deploying modern secure distributed e-learning and m-learning environments Comput. Educ. 48, 1 p. 1–16.
Sajjadi Z Khodami A A and Modiri N, 2008 Learning Contents Integrity verification on E-learning Systems Using Digital Watermarking Technique in Int. Conf. on Information and Communication Technologies: From Theory to Applications p. 1–3.
Serrhini M Dargham A and Moussa A A, 2012 Improve security of web Browser with stand-alone e-learning awareness application in Int. Conf. on Multimedia Computing and Systems p. 852 – 857.
Ahmed S Buragga K and Ramani A K, 2011 Security Issues Concern for E-learning by Saudi Universities in Int. Conf. on Advanced Communication Technology (ICACT) p. 1579 – 1582.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).