Predicting Online Learning Success Based on Learners’ Perceptions: The Integration of the Information System Success Model and the Security Triangle Framework
DOI:
https://doi.org/10.19173/irrodl.v24i2.6895Keywords:
online learning, Delone and McLean's information system success model, security triangle framework, higher educationAbstract
Although online learning has become ubiquitous worldwide, earlier research has neglected the relationship between its actual use and security concerns. Learners’ lack of security awareness while using learning technologies remains rarely studied. This paper integrates Delone and McLean’s information system success (D&M-ISS) model with the security triangle framework. Data from 2,451 higher education students at different universities and a wide variety of disciplines in Iraq were collected. In addition to the effectiveness of the D&M-ISS factors, the research findings based on the structural equation model suggest that the three constructs of the security triangle framework—namely, confidentiality, integrity, and availability—were significant predictors of students’ use of online learning. This research can thus help academic organizations understand factors that can lead to the successful implementation of online learning and learners’ security awareness.
References
Ab Hamid, M. R., Sami, W., & Mohmad Sidek, M. H. (2017). Discriminant validity assessment: Use of Fornell & Larcker criterion versus HTMT criterion. Journal of Physics: Conference Series, 890(1), Article 012163. https://doi.org/10.1088/1742-6596/890/1/012163
Ajzen, I., & Fishbein, M. (1980). Understanding attitudes and predicting social behaviour. Prentice Hall.
Al-Adwan, A. S., Albelbisi, N. A., Hujran, O., Al-Rahmi, W. M., & Alkhalifah, A. (2021). Developing a holistic success model for sustainable e-learning: A structural equation modeling approach. Sustainability, 13(16), Article 9453. https://doi.org/10.3390/su13169453
Al-Adwan, A. S., Nofal, M., Akram, H., Albelbisi, N. A., & Al-Okaily, M. (2022). Towards a sustainable adoption of e-learning systems: The role of self-directed learning. Journal of Information Technology Education: Research, 21, 245–267. https://doi.org/10.28945/4980
Al-Azawei, A. (2019). What drives successful social media in education and e-learning? A comparative study on Facebook and Moodle. Journal of Information Technology Education: Research, 18, 253–274. https://doi.org/10.28945/4360
Al-Azawei, A., & Al-Azawi, R. (2021). Evaluating Facebook success in Iraq: An extension of the DeLone and McLean’s model of information systems success (ISS). Journal of Physics: Conference Series, 1804, Article 012114. https://doi.org/10.1088/1742-6596/1804/1/012114
Al-Azawei, A., & Lundqvist, K. (2015). Learner differences in perceived satisfaction of an online learning: An extension to the technology acceptance model in an Arabic sample. Electronic Journal of E-Learning, 13(5), 408–426. https://academic-publishing.org/index.php/ejel/article/view/1942
Al-Azawei, A., Parslow, P., & Lundqvist, K. (2016). Barriers and opportunities of e-learning implementation in Iraq: A case of public universities. The International Review of Research in Open and Distance Learning, 17(5), 126–146. https://doi.org/10.19173/irrodl.v17i5.2501
Al-shargabi, B., Sabri, O., & Aljawarneh, S. (2021). The adoption of an e-learning system using information systems success model: A case study of Jazan University. PeerJ Computer Science, 7, Article e723. https://doi.org/10.7717/peerj-cs.723
Alowayr, A., & Al-Azawei, A. (2021). Predicting mobile learning acceptance: An integrated model and empirical study based on the perceptions of higher education students. Australasian Journal of Educational Technology, 37(3), 38–55. https://doi.org/10.14742/ajet.6154
Alshurideh, M., Al Kurdi, B., & Salloum, S. A. (2020). Examining the main mobile learning system drivers’ effects: A mix empirical examination of both the expectation-confirmation model (ECM) and the technology acceptance model (TAM). Advances in Intelligent Systems and Computing, 1058, 406–417.https://doi.org/10.1007/978-3-030-31129-2_37
Ameen, N., Tarhini, A., Shah, M. H., & Madichie, N. (2020). Employees’ behavioural intention to smartphone security: A gender-based, cross-national study. Computers in Human Behavior, 104, Article 106184. https://doi.org/10.1016/j.chb.2019.106184
Awad, R., Aljaafreh, A., & Salameh, A. (2022). Factors affecting students’ continued usage intention of e-learning during COVID-19 pandemic: Extending Delone & Mclean IS success model. International Journal of Emerging Technologies in Learning, 17(10), 120–144. https://doi.org/10.3991/ijet.v17i10.30545
Çelik, K., & Ayaz, A. (2022). Validation of the Delone and McLean information systems success model: A study on student information system. Education and Information Technologies, 27(4), 4709–4727. https://doi.org/10.1007/s10639-021-10798-4
Chaeikar, S., Jafari, M., Taherdoost, H., & Chaei Kar, N. S. (2012). Definitions and criteria of CIA security triangle in electronic voting system. International Journal of Advanced Computer Science and Information Technology, 1(1), 14–23. https://ssrn.com/abstract=2372782
Cidral, W., Aparicio, M., & Oliveira, T. (2020). Students’ long-term orientation role in e-learning success: A Brazilian study. Heliyon, 6, Article e05735. https://doi.org/10.1016/j.heliyon.2020.e05735
Davis, F. (1985). A technology acceptance model for empirically testing new end-user information systems: Theory and results [PhD Dissertation, Massachusetts Institute of Technology]. http://hdl.handle.net/1721.1/15192
Delone, W. H., & McLean, E. R. (1992). Information systems success: The quest for the dependent variable. Information Systems Research, 3(1), 60–95. https://doi.org/10.1287/isre.3.1.60
Delone, W. H., & McLean, E. R. (2003). The Delone and McLean model of information systems success: A ten-year update. Journal of Management Information Systems, 19(4), 9–30. https://doi.org/10.1080/07421222.2003.11045748
Dong, T. P., Cheng, N. C., & Wu, Y. C. J. (2014). A study of the social networking Website service in digital content industries: The Facebook case in Taiwan. Computers in Human Behavior, 30, 708–714. https://doi.org/10.1016/j.chb.2013.07.037
El-Khatib, K., Korba, L., Xu, Y., & Yee, G. (2003). Privacy and security in e-learning. International Journal of Distance Education Technologies (IJDET), 1(4), Article 1. https://doi.org/10.4018/jdet.2003100101
Farooq, A., Ahmad, F., Khadam, N., Lorenz, B., & Isoaho, J. (2020). The impact of perceived security on intention to use e-learning among students. In Proceedings—2020 IEEE 20th International Conference on Advanced Learning Technologies (ICALT) (pp. 360–364). IEEE Computer Society/Conference Publishing Services. https://doi.org/10.1109/ICALT49669.2020.00115
Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39–50. https://doi.org/10.2307/3151312
Hair, J. F., Black, W. C., Babin, B. J., Anderson, R. E., & Tatham, R. L. (2006). Multivariate data analysis (6th ed.). Pearson Prentice Hall.
Harefa, E. B. (2020). Usability measurement of Google Classroom applications as elearning for students of department of building engineering education IKIP Gunungsitoli. Indonesian Science Education Research, 2(1), 11–14. https://jurnal.unimed.ac.id/2012/index.php/iser/article/view/20170/14273
Hartono, E., Kim, K.-Y., Na, K.-S., Simpson, J. T., & Berkowitz, D. (2013). Perceived site security as a second order construct and its relationship to e-commerce site usage. In Á. Rocha, A. Correia, T. Wilson, & K. Stroetmann (Eds.), Advances in information systems and technologies (pp. 1075–1085). Springer. https://doi.org/10.1007/978-3-642-36981-0_102
Henseler, J., Ringle, C. M., & Sarstedt, M. (2015). A new criterion for assessing discriminant validity in variance-based structural equation modeling. Journal of the Academy of Marketing Science, 43, 115–135. https://doi.org/10.1007/s11747-014-0403-8
Isaac, O., Aldholay, A., Abdullah, Z., & Ramayah, T. (2019). Online learning usage within Yemeni higher education: The role of compatibility and task-technology fit as mediating variables in the IS success model. Computers and Education, 136, 113–129. https://doi.org/10.1016/j.compedu.2019.02.012
Lowry, P. B., & Gaskin, J. (2014). Partial least squares (PLS) structural equation modeling (SEM) for building and testing behavioral causal theory: When to choose it and how to use it. IEEE Transactions on Professional Communication, 57(2), 123–146. https://doi.org/10.1109/TPC.2014.2312452
Maqableh, M., Hmoud, H. Y., & Jaradat, M. (2021). Integrating an information systems success model with perceived privacy, perceived security, and trust: The moderating role of Facebook addiction. Heliyon, 7(9), Article E07899. https://doi.org/10.1016/j.heliyon.2021.e07899
Meharia, P. (2012). Assurance on the reliability of mobile payment system and its effects on its use: An empirical examination. Accounting and Management Information Systems, 11(1), 97–111. https://ideas.repec.org/a/ami/journl/v11y2012i1p97-111.html
Mshali, H., & Al-Azawei, A. (2022). Predicting online learning adoption: The role of compatibility, self-efficacy, knowledge sharing, and knowledge acquisition. Journal of Information Science Theory and Practice, 10(3), 24–39. https://doi.org/10.1633/JISTaP.2022.10.3.3
Pallant, J. (2013). SPSS survival manual: A step by step guide to data analysis using IBM SPSS (5th ed.). McGraw Hill.
Peat, J. K., & Barton, B. (2005). Medical statistics: A guide to data analysis and critical appraisal (1st ed.). Blackwell Publishing.
Petter, S., & McLean, E. R. (2009). A meta-analytic assessment of the DeLone and McLean IS success model: An examination of IS success at the individual level. Information and Management, 46(3), 159–166. https://doi.org/10.1016/j.im.2008.12.006
Pitt, L. F., Watson, R. T., & Kavan, C. B. (1995). Service quality: A measure of information systems effectiveness. MIS Quarterly: Management Information Systems, 19(2), 173–185. https://doi.org/10.2307/249687
Ramirez-Correa, P. E., Javier Rondan-Cataluña, F., Arenas-Gaitán, J., & Alfaro-Perez, J. L. (2017). Moderating effect of learning styles on a learning management system’s success. Telematics and Informatics, 34, 272–286. https://doi.org/10.1016/j.tele.2016.04.006
Ringle, C. M., Wende, S., & Becker, J.-M. (2015). SmartPLS 3. http://www.smartpls.com
Roemer, E., Schuberth, F., & Henseler, J. (2021). HTMT2—An improved criterion for assessing discriminant validity in structural equation modeling. Industrial Management and Data Systems, 121(12), 2637–2650. https://doi.org/10.1108/IMDS-02-2021-0082
Rönkkö, M., & Cho, E. (2022). An updated guideline for assessing discriminant validity. Organizational Research Methods, 25(1), 6–47. https://doi.org/10.1177/1094428120968614
Salam, N. R. A., & Ali, S. (2020). Determining factors of cloud computing adoption: A study of Indonesian local government employees. Journal of Accounting and Investment, 21(2), 312–333. https://doi.org/10.18196/jai.2102151
Saunders, M., Lewis, P., & Thornhill, A. (2012). Research methods for business students (6th ed.). Pearson.
Shim, M., & Sug Jo, H. (2020). What quality factors matter in enhancing the perceived benefits of online health information sites? Application of the updated DeLone and McLean information systems success model. International Journal of Medical Informatics, 137, Article 104093. https://doi.org/10.1016/j.ijmedinf.2020.104093
Solimeno, A., Mebane, M. E., Tomai, M., & Francescato, D. (2008). The influence of students and teachers characteristics on the efficacy of face-to-face and computer supported collaborative learning. Computers & Education, 51(1), 109–128. https://doi.org/10.1016/j.compedu.2007.04.003
Stallings, W. (2003). Network security essentials: Applications and standards (2nd ed.). Prentice Hall.
Tsiakis, T., & Sthephanides, G. (2005). The concept of security and trust in electronic payments. Computers and Security, 24(1), 10–15. https://doi.org/10.1016/j.cose.2004.11.001
Venkatesh, V., & Bala, H. (2008). Technology acceptance model 3 and a research agenda on interventions. Decision Sciences, 39(2), 273–315. https://doi.org/10.1111/j.1540-5915.2008.00192.x
Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of information technology: Toward a unified view. MIS Quarterly, 27(3), 425–478. https://doi.org/10.2307/30036540
Venkatesh, V., Thong, J. Y. L., & Xu, X. (2012). Consumer acceptance and use of information technology: Extending the unified theory of acceptance and use of technology. MIS Quarterly, 36(1), 157–178. https://doi.org/10.2307/41410412
Zhang, Z., Cao, T., Shu, J., & Liu, H. (2020). Identifying key factors affecting college students’ adoption of the e-learning system in mandatory blended learning environments. Interactive Learning Environments, 30(8), 1388–1401. https://doi.org/10.1080/10494820.2020.1723113
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution 4.0 International License.
This work is licensed under a Creative Commons Attribution 4.0 International Licence. The copyright of all content published in IRRODL is retained by the authors.
This copyright agreement and use license ensures, among other things, that an article will be as widely distributed as possible and that the article can be included in any scientific and/or scholarly archive.
You are free to
- Share — copy and redistribute the material in any medium or format
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
The licensor cannot revoke these freedoms as long as you follow the license terms below:
- Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.