Next Article in Journal
Measuring the Sustainability of the Orange Economy
Next Article in Special Issue
Construction of a Tangible VR-Based Interactive System for Intergenerational Learning
Previous Article in Journal
Satisfaction with the COVID-19 Economic Stimulus Policy: A Study of the Special Cash Payment Policy for Residents of Japan
Previous Article in Special Issue
Effect of Adding Emotion Recognition to Film Teaching—Impact of Emotion Feedback on Learning through Puzzle Films
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Sustainable and Security Focused Multimodal Models for Distance Learning

1
Faculty of Informatics, Kaunas University of Technology, 44249 Kaunas, Lithuania
2
Department of Software Engineering, Transport and Telecommunication Institute, 1019 Riga, Latvia
*
Author to whom correspondence should be addressed.
Sustainability 2022, 14(6), 3414; https://doi.org/10.3390/su14063414
Submission received: 17 February 2022 / Revised: 10 March 2022 / Accepted: 10 March 2022 / Published: 14 March 2022
(This article belongs to the Special Issue Sustainable E-learning and Education with Intelligence)

Abstract

:
The COVID-19 pandemic has forced much education to move into a distance learning (DL) model. The problem addressed in the paper is related to the increased necessity for the capacity of data, secure infrastructure, Wi-Fi possibilities, and equipment, learning resources which are needed when students connect to systems managed by institutional, national, and international organizations. Meanwhile, there have been cases when learners were not able to use technology in a secure manner, since they were requested to connect to external learning objects or systems. The research aims to develop a sustainable strategy based on a security concept model that consists of three main components: (1) security assurance; (2) users, including administration, teachers, and learners; and (3) DL organizational processes. The security concept model can be implemented at different levels of security. We modelled all the possible levels of security. To implement the security concept model, we introduce a framework that consists of the following activities: plan, implement, review, and improve. These activities were performed in a never-ending loop. We provided the technical measures required to implement the appropriate security level of DL infrastructure. The technical measures were provided at the level of a system administrator. We enriched the framework by joining technical measures into appropriate activities within the framework. The models were validated by 10 experts from different higher education institutions. The feasibility of the data collection instrument was determined by a Cronbach’s alpha coefficient that was above 0.9.

1. Introduction

The disruption of learning processes disrupted by the COVID-19 pandemic has involved a radical transformation of education and training, and one of the sectors undergoing dramatic digital transformation globally is higher education [1]. The sudden forced closure of face-to-face teaching activities has led many academics and many students into “unfamiliar terrain” due to the need to adapt swiftly to total distance learning (DL) settings [2]. This sudden change has required universities to evolve toward DL in record time, implementing and adapting the technological resources available and involving professors and researchers who lack innate technological capacities for DL.
DL requires large resources of computers, information, and communication channels. Additionally, DL faces other challenges that are as follows: (1) organization of DL processes associated with practical and laboratory work, (2) skill testing and evaluation using information and communication technology, (3) forecasting of system load, (4) cybersecurity, and (5) data protection issues. The infrastructure of DL, which consists of three sections: management and governance, physical infrastructure, and logical infrastructure [3], is indispensable in the learning processes.
The emergence of disruptive innovation is a time of risk and uncertainty, but it is also a time of opportunities, bringing talent and innovation to the education system [4]. The questionnaire at King Saud University, Saudi Arabia [5] revealed that the success factors of DL named by the students and faculty members differ. The importance of technical skills, effective time management, individual differences, and support is fostered by the technology infrastructure of the DL environment [6]. When each of these pillars is equally prioritized in fully DL delivery, ultimately the best-equipped students succeed in their course from orientation through to graduation.
The use of technology helped educators to overcome the issue of DL during disaster times, but the educators argued that robust IT infrastructure is a prerequisite for DL [7]. The infrastructure needs to be strong enough that it can provide unrestricted services during a pandemic [8]. Huang et al. [9] underlined that reliability and sufficient availability of, for example, communication infrastructure, learning tools, and digital learning resources are of utmost importance in such severe situations.
Since DL is being improved and supported by technical innovations and infrastructure, many users of innovative infrastructure are not experts in using it, therefore, it is necessary to have a support staff and an established structural system for successful entrance to the DL market [10].
The problem addressed in the paper is related to the increased necessity for the capacity of the data, secure infrastructure, Wi-Fi possibilities, and equipment, which are needed learning resources when students connect to systems managed by institutional, national, and international organizations. Meanwhile, there have been cases when learners were not able to use technology in a secure manner since they were requested to connect to external learning objects or systems.
The research question is “How to assure secure and effective DL by developing security concept models consisting of three main components: (1) security assurance; (2) users, including administration, teachers, and learners; and (3) DL organizational processes”.
One of our co-authors is employed as a security manager of a whole university network. All of his suggestions came from a practical point of view. So, he practically knows the viability of the proposed models and their technical merits to ensure the security of DL infrastructure.
This paper is structured as follows: The related work is reviewed in Section 2. Section 3 presents a problem formulation and a model of DL infrastructure. A security concept model and implementation framework are presented in Section 4. Results and discussion are provided in Section 5. The conclusions of the paper and the limitations of the research work are discussed in Section 6.

2. Literature Review

Literature reviews include 42 articles from Scopus, Web of Science, and databases related to the topic. Screening was performed in two phases. The first phase was used for screening titles and abstracts and the second phase is screening full texts. We used a reference management system for literature resources collecting for citing the most appropriate papers related to the topic.
Tyagi and Verma [11] focused on security in sustainable education and distance learning. The authors [11] presented sustainable education as an educational approach aimed at entrenching in students, schools, and communities the values and motivations to act for sustainability now and in the future—in one’s own life, in their communities, and on a worldwide platform.
However, the authors of the paper present the Sustainable Multimodal Model for DL as the model suggesting to educational organizations systematic and consistent ways to effectively implement teaching and learning in the worldwide platforms.
Gaiveo [12] presents the security of the computer-based information systems, that links with the preservation of the information that is supported by those systems, controlling information and systems collection, treatment, use, support, and accesses.
The authors of the paper describe the Security Focused Multimodal Models for Distance Learning as the models for educational organizations to guide them on: (1) security assurance; (2) safe and effective management of users, including administration, teachers, and learners; and (3) DL organizational processes.
We provide a review of research works considering issues of DL infrastructure and security. We firstly review the research works devoted to the development of DL infrastructure. We then review the research works that analyze security threats to the DL infrastructure and suggest ways mitigate the security threats.
Ergüzen et al. [13] suggests improving the technological infrastructure of DL through a trustworthy hardware platform-independent remote education laboratory. The reason for this suggestion is that the students are not able to acquire the costly software needed for studies. A platform-independent remote laboratory suitable for computers, smartphones, and tablets has been developed for DL students in information technology. To access the virtual laboratory a security layer containing student-specific information and security measures was used. The developed laboratory had additional benefits as follows: (1) no need for installation on students’ own computers; and (2) provides a way for students with weak computers to use server power for all transactions. The students using the newly developed laboratory got a 12.89% higher average mean score than the students using traditional methods in a web programming course.
Moore and Fodrey [14] present a model of a DL technology infrastructure. The model consists of four components: systems, objectives, evaluation, and personnel. Each of these components is required for any DL technology infrastructure. It is an IT division-level framework. There is not a specific order for this model on how projects may be initiated. For the component of the system, there are two aspects of interest within the system’s component. The first is what delivery method is used to create instructional content, and the second is what tool will be used to deliver this content. It is critical to establish clear learning objectives and to align them with the technology tools that are selected and implemented. Learning objectives must be firstly considered, then only tools selected and evaluated. There are two parts of evaluation within this model. The initial evaluation of the selected tool and the continuous evaluation must occur after the implementation. Finally, the division will need to determine if it has personnel who can support this new tool for the faculty members and for live-event support. The main shortcoming of this model is that the model is provided at the IT division level. The authors of the model recognize that a technology infrastructure plan is needed for e-learning leaders. However, planning is not an activity of the model.
Thomas [15] clusters the infrastructure of DL into four layers from bottom to top: internet, hardware, software, and rules and regulations. Three groups of actors interact with the infrastructure of DL. These groups are as follows: institutions, individual instructors, and individual learners. Associating the layers of DL to actors enables a better understanding of the specific challenges. These challenges vary for different actors. For example, broadband internet is usual for the institution, but it can be a problem for the individual instructors and learners. The same is valid for hardware and software. However, Thomas [15] did not consider the security issues related to the infrastructure of DL.
García-Peñalvo [16] define a reference framework for introducing eLearning practices into face-to-face education. The proposed framework consists of seven layers. The basic level of the framework is an infrastructure that is divided into three sections: management and governance, physical infrastructure, and logical infrastructure. The government of technologies is an essential factor for the success of DL. The physical infrastructure to support DL must cover all the different needs concerning physical equipment. The logical infrastructure includes the software components and users with experience who are also part of DL infrastructure. Security is the fifth layer in this framework. The security is considered together with ethics and privacy issues. Privacy of individuals must be respected and based on General Data Protection Regulation (GDPR) [17]. However, García-Peñalvo [16] provided no details on how to solve the security issues.
Not only the infrastructure of DL, but also the security of DL platforms is a key success factor of DL [18,19]. DL platforms are important for billions of users and they rely on them to perform routine activities. The user-friendliness of the graphical user interface and their constant availability made them vulnerable. Therefore, it is important to secure web applications from attacks. Bhatia and Maitra [20] analyzed all the open-source e-learning platforms available in the market today to test their vulnerability against attacks. All the analyzed e-learning platforms had severe vulnerabilities. Moodle, which is the most popular e-learning platform [21], was not an exception. Bhatia and Maitra [20] propose a model for ensuring the security of e-learning platforms. The proposed security model is posed on a two-fold holistic view: a hierarchical approach and a distributed approach. The hierarchical approach consists of the following layers from top to bottom: system administrator, instructors, and learners. The distributed approach keeps separate security models of each element in the e-learning platform. The advantage of the hierarchical approach is centralization. The advantage of the distributed approach is scalability. The implementation of the security model could be done in four steps: (1) define security policy; (2) implement security policy within an e-learning system; (3) launch constant monitoring; and (4) react to an ongoing attack. The last step is invoked by the third step in case of need. A regular update is needed to the security model since threats change. The main disadvantage of the proposed security model is that the model was presented only as a collection of ideas. The security model of the e-learning system was not validated by experts.
Husain and Budiyantara [22] analyzed the effect of the control security and privacy on the attitude and behavioral intentions of e-learning users. The results of the investigation indicate that the control of security and privacy has a significant influence on the attitude and behavioral intention of e-learning users.
During the pandemic, the number of online resources drastically increased. However, the number of cyber-attacks increased, as well [23]. Khan et al. [24] identified ten deadly cybersecurity threats during the COVID-19 pandemic. They are as follows: (1) DDoS attacks; (2) malicious domains; (3) malicious websites; (4) malware; (5) ransomware; (6) spam emails; (7) malicious social media messaging; (8) business email compromise; (9) mobile threats; and (10) browsing apps. These threats are oriented to the general e-community rather than e-learners. It is important to know the most common cybersecurity threats since e-learners are part of the general e-community. Khan et al. [24] noticed also that the most widely used online conferencing tool, Zoom, faced massive criticism because the default settings of privacy and security are not adequately secure.
Ali and Zafar [25] stated that an institution providing e-learning must implement robust measures to protect sensitive participants’ data against loss or unauthorized use. For this purpose, Ali and Zafar [25] presented a conceptual model of the information security and privacy factors related to e-learning. The factors are as follows: (1) data evaluation; (2) policies; (3) legislation/regulation; (4) architecture; (5) integration; (6) training; and (7) risk analysis. The authors analyzed all the factors and made propositions for every factor. The most compelling proposition is for the first factor. This proposition says that the participation of all stakeholders in the data evaluation step will enhance the security and privacy of e-learning technology. No reason was provided why this specific order of enumeration of the factors was chosen. The ordering of factors raises some doubts. Ali and Zafar [25] also provided recommendations for the implementation of the proposed conceptual model.
Ran et al. [26] asserted that identity verification of the user of the DL platform should not terminate at the login process, but it must proceed as the user is connected to the platform. Therefore, Ran et al. [26] developed an identity authentication model based on the private cloud. The model is based on multi-fold security approach and it provides an authentication methods repository. The repository includes classical methods and behavioral validation methods that are as follows: email verification, two-step verification (login + SMS), Captcha test, face recognition, fingerprint identification, speech recognition, and keystroke recognition. After the initial login, the process of constant verification starts. The main component of this process is face recognition. However, the method faces constraints of network bandwidth and computer hardware.
Nita and Mihailescu [27] proposed a secure framework for e-learning platforms using attribute-based encryption applied in cloud computing. The framework consists of the following components: methods and criteria, education and training, e-learning users, improved access mechanism, security layer, cloud, authorities, and owners. Improved access mechanism means attribute-based encryption. However, the proposed framework is not well-structured since it connects the different types of components. Moreover, neither validation nor experiments are provided using the proposed framework.
Amo et al. [28] analyzed how learning management systems (LMSs) store and process personal data. The authors established that these data are stored unencrypted, and these data are easily accessible to many users of LMSs. Therefore, the LMSs are vulnerable to the loss of sensitive information and such information storing is not in line with GDPR. To comply with GDPR, LMSs apply a simple solution: everything or nothing. If you do not agree with terms and conditions, you do not have access. The authors suggested solving the problem to use an access matrix. The suggestion to store the personal data in encrypted form was also provided. The suggested solution was implemented for the LMS Moodle.
Amo et al. [29] proceeded with the earlier investigation on GDPR implementation in the LMS and studied the possibility for the students to be anonymous in the LMS since GDPR delegates such a right. The LMS does not have such a function. The questionnaire was carried out among learners and educators. The educators did not contradict to teach the anonymous students. Therefore, the authors implemented an add-in for the LMS Moodle. The add-in is called “Protected Users”, which allows hiding of the learner’s identity. The add-in is freely available on GitHub.
Caviglione and Coccoli [30] noticed that online learning is an interplay among social, educational, and technological aspects. They suggested a model to identify and classify security threats and vulnerabilities of e-learning frameworks in smart cities. The model is called a holistic one, but no proof is provided. The model is divided into three spaces: infrastructure, data, and learner. A training and technological awareness of individuals is a prime countermeasure for learner space. No countermeasures are proposed to fight security threats in the infrastructure and data spaces.
Mahmood [31] presented an agent-based framework for providing the security and privacy of the cloud-based E-learning. An architecture of the cloud-based E-learning usually consists of five main layers: hardware resource layer, software resource layer, resource management layer, service layer, and business application layer. The service layer is comprised of the three services: SaaS (software as a service), PaaS (platform as a service), and IaaS (infrastructure as a service). The framework is introduced just to SaaS service.
Alexei and Alexei [32] observed that use of cloud computing (CC), learning management systems (LMS), and video conferencing applications (VCA) has become the mainstream for conducting distance learning. They presented a review of security threats to these three types of applications and provided common recommendations to secure CC, LMS, and VCA. These common recommendations include classifying information, implementing access policies at the application or resource level, updating systems, and using cryptographic protocols.
We provide a summary of the main features of the discussed related works in Table 1.
We can conclude, observing Table 1, that none of the authors of the reviewed papers have demonstrated a systematic view of the problem of the security of the DL infrastructure. Moreover, the reviewed authors demonstrated different understanding of DL infrastructure. In the next section, we will present our view on the DL infrastructure.

3. Problem Formulation and the Model of DL Infrastructure

Based on the literature review, we developed the requirements for the models of the DL infrastructure and security:
  • The model of DL infrastructure must include all the components required for distance learning.
  • The security concept model should cover: (1) IT infrastructure security profile; (2) levels of IT security; and (3) secure and reliable DL infrastructure framework.
  • The plan for the implementation of the DL infrastructure framework, which joins levels of IT security and IT infrastructure security profile, should be provided in the form of a matrix.
  • The security concept model must include the protection of personal data.
  • The security concept model must include the management of copyright and licenses for digital content and software in education.
The IT infrastructure of the organization is a set of hardware, software, technical, communication, information, organizational, and technological tools that ensure proper functioning and management. The IT infrastructure includes a combination of various applications, databases, servers, disk arrays, and network equipment, and provides users with access to information sources. IT infrastructure is a technological component of any service that ensures the delivery of the considered service following agreed rules and procedures. During the pandemic, the range of participants of DL has significantly increased, their IT skills vary greatly, and the available tools for remote work (RW) differ in terms of technical parameters: workplace equipment has different capacity, and the capacity of communication channels is often insufficient.
Therefore, carefully selected, developed, and configured IT infrastructure is essential to ensure reliable and secure DL and RW (Figure 1). Next, we present the components of the model of DL infrastructure.
User devices constitute an exceptionally large spectrum of computing devices used by the participants of the DL process. This includes smartphones, tablets, and personal and desktop computers. The capabilities of these devices differ in ensuring secure and reliable DL and RW. This imposes some restrictions on the components of DL infrastructure.
Network resources include modems, routers, Wi-Fi devices, and communication lines. These resources together with user devices must ensure secure and reliable user connection with computing and information resources. To accomplish the mentioned goal the devices must use secure communication protocols (HTTPS, SSL/TLS, virtual private network, and others) and they must ensure the required bandwidth.
Virtualization is usually used in modern technologies, especially in cloud computing. Virtualization enables more effective, more flexible, and more secure use of resources. This is useful for the organization of DL and RW.
Computing resources (processors and memory blocks) are one of the most important resources, especially during the pandemic when requirements for the resources significantly increase.
Data warehouses store the digital contents of e-learning, the generated contents (individual assignments, projects, control works, and others) by e-learners, the private information of participants of DL, and others. During the pandemic, this resource is the most important since the requirements for it drastically increase.
Data resources, digital contents of e-learning, the organizational data of DL, and private data of participants of DL are critical for the process of DL. Therefore, high requirements are imposed on these resources.
The software encompasses the operational software, software of e-learning platforms, educational programs, and others. Software is one of the main components of DL infrastructure. The software is solely responsible for the ability to present e-learning material to the users of DL, for the ability of the users to communicate online and offline during the process of DL.
Continuity of activities is a set of regulations and rules that are responsible for the operation of an institution during various conditions.
Security is a set of organizational, legal, and technical regulations that are responsible for ensuring the secure operation of DL infrastructure.
Network perimeter security (firewalls, incident detection software) is a set of tools to ensure the secure operation of inner IT infrastructure.

4. Security Concept Model and Implementation Framework

4.1. Security Concept Model of DL Infrastructure

Three components take part in the DL process [16]. They are as follows: people, IT infrastructure, and organizational processes. A security model of DL infrastructure must ensure the security of the entire DL ecosystem. Figure 2 presents a security concept model that consists of security assurance, people, and organizational processes.
Organizational processes of DL were considered in our previous research work [33]. They include methods of e-learning and educational technologies to support these methods.
In the security assurance, we distinguish three the most important components (Figure 2):
  • Security of IT infrastructure;
  • Protection of personal data (GDPR);
  • Copyright and licensing of digital content and software.
Next, we will consider the implementation of these three components.

4.2. Security Profile of IT Infrastructure and Levels of IT Security

To implement security of IT infrastructure we present a security profile of IT infrastructure (Figure 3).
For the implementation of security of IT infrastructure, we used the standard ISO 27001 [34], which sets out requirements for an information security management system so that the organization can assess risks and put in place appropriate controls to protect confidentiality, integrity, and availability of information. IT infrastructure is also associated with the control of access to associated technologies. This is defined by the standard COBIT 5 [35] which is one of the most popular IT management methodologies developed and supported by the organization of ISACA (Information Systems Audit and Control Association).
When dealing with IT infrastructure solutions, it is necessary to assess the risks and information security aspects (Figure 3):
  • Threats (external and internal): Every employee and endpoint are potential points of entry into the network. It is possible exploitation of vulnerabilities, a combination of spam, fraud, malicious URLs, and social engineering that are easier than ever to detect, automate, and deploy.
  • Risks associated with sensitive data: organizations handle many types of sensitive data, including protected learner records and data that is to be exported. The protection of sensitive data requires a good understanding of the nature of the information, knowing its location, knowing how it is generated, transmitted, shared, stored, processed, and ultimately deleted. This security profile of IT infrastructure deals with the identification, documentation, implementation, and control to protect high-value assets and sensitive information throughout its lifecycle.
  • Information security covers three main aspects:
    • Information confidentiality—protection of information against unauthorized disclosure;
    • Information integrity—protection of information against unauthorized or accidental alteration of data and/or information;
    • Access to information—ensuring that information is available when it is needed by designated users of information.
Next, we present all the components of the security profile of IT infrastructure.
Email and web browser protection is oriented to the security flaws related to the user actions. The malicious persons using different fraud strategies persuade the users of email to share sensitive information or to download the malicious programs into the network. The email protection enables the identification of spam. It can be used to identify dangerous e-letters, block attacks, and prevent sharing of sensitive data.
Application protection must enable the protection of all the application programs that can be related to the security of organization networks and security metrics. Application programs are the usual target of hackers.
Security information and event management (SIEM) tools enable a selection of data from different resources to be put into single storage for quick action in the case of need.
Anomaly detection is not a straightforward action. It can be quite difficult to find anomalies in the operations of an organization network since no one knows how the network operates in the anomaly-free mode. A careful investigation is needed to learn anomaly-free network operation mode. The available network anomaly detection tools allow analysis of the network operations. They can establish an early warning when a violation of the network operations is detected.
Data loss prevention (DLP) technologies and policy usually enable the protection of users who do not intend to use secret data improperly, and will not lose sensitive data in the network. The human factor is the weakest part of the chain of network security. Therefore, safeguards are needed to prevent either malicious or unintentional but harmful actions of the users.
Network segmentation allows assigning of the appropriate safeguard to the particular traffic in the network since traffic from different resources requires different protection. Such network partition enables application of the specific protection to each type of traffic.
Web protection is a segment of network security. Web protection is a generic term, which encompasses all the tools and measures that the organization must enable to ensure the secure usage of the internet in the inner network of the organization. Such protection does not allow the use of browsers as a means to invade the organization’s network.
A firewall is a segment of network security. The goal of a firewall is to protect boundaries between an organization’s network and the internet. A firewall is used to manage the network traffic and to block access to undesirable traffic.
Intrusion prevention systems (sometimes called intrusion detection systems) are a segment of network security. They constantly read and analyze the network traffic to notice as quickly as possible various attacks on the network and to react to them. These systems are founded on the basis of the known attacks [36] to recognize the known threats.
Endpoint (BYOD) protection is a segment of network security. Organizations allow users to use their owned computing devices. This is called bring your own device (BYOD). However, user-owned devices usually do not possess such strong protection as an organization’s computers. Therefore, they become an easy target for hackers. Therefore, the endpoint protection adds a defensive layer between remote computing devices and organization networks, for example, a virtual private network (VPN).
Wireless access control is a separate component in the security profile of IT infrastructure since wireless networks are less secure than traditional networks. Therefore, additional measures are needed to secure wireless networks.
Virtual private network access control is used to enable authenticated communication between the endpoint device and secure organization networks. For remote VPN access authentication, either IPsec or Secure Sockets Layer protocol is used to create an encrypted communication channel that other interesting parties would not be able to access the transmitted data.
Security education is an important component of the security profile of IT infrastructure, as well. It provides four major benefits to organizations: (1) improve employee behavior; (2) increase the ability to hold employees accountable for their actions; (3) mitigate the liability of the organization for an employee’s behavior; and (4) comply with regulations and contractual obligations.
The security profile of IT infrastructure can be implemented at different levels of security (Figure 4).
The security levels within an organization can be ensured by appropriate technical measures that are enumerated in the security profile of IT infrastructure. To ensure that the areas of the cybersecurity model and the level of cybersecurity are sufficient, it is necessary to assess the situation of the organization’s existing IT infrastructure. It is a ground level of cybersecurity.

4.3. The Framework to Ensure the Secure and Reliable DL Infrastructure

The framework to ensure a secure and reliable DL infrastructure is based on a Lean [37] methodology. It is one of the methodologies to implement agile methods. This methodology is a process improvement methodology based on reducing resources and improving the efficiency of providing them.
The first step of the Lean methodology is the most important one that is an assessment of the current security situation of DL infrastructure to eliminate wasting of resources. For this purpose, it is necessary to carry out an analysis and identify specifics of the protection level for those working and learning remotely. When all the information concerning the current situation is collected, we can start a framework that opens a never-ending loop (Figure 5). The start of the framework is usually done on the planning activity. The other title for this activity is a definition of priorities. When the priorities are defined, they have to be implemented. Threats and risks to cybersecurity change constantly. Therefore, the reviewing of threats and risks must be done permanently. The decision can be made to improve cybersecurity after reviewing the threats and risks.
It is also appropriate to lay down specific measures to create security appropriate to the user. As for the selection of tools, Table 2 enumerates domains of the application of cybersecurity and the technical measures applied to these domains.
We provide the information of Table 2 in concise form using a matrix to ensure secure and reliable DL infrastructure within the organization (Table 3).
The use of the secure and reliable DL infrastructure framework (Figure 5) and the description of the technical measures taken for distance learning at different IT security levels within the organization (Figure 4) in the field of cybersecurity can significantly increase the resilience to cyberattacks:
  • Domains of the cybersecurity model: 17;
  • Actions: 35;
  • Technical measures for DL and RW: 39;
  • Levels of IT security in the organization: (0–5).
The appropriate choice of technical measures and their prioritization, as shown in Figure 6, can ensure the full security of the educational institution’s infrastructure during DL and RM. We can observe in Figure 6 that the specific technical measures are joint to the appropriate activities of the framework.
The technical measures to ensure cybersecurity may be selected for the domains that will be protected or that are of higher priority and subject to the proposed DL infrastructure framework matrix (Table 3). Capacity within the organization is also considered and is taken into account. As the level of maturity increases, the plan must be updated (Figure 5), followed by the implementation of measures and review of existing measures while ensuring the security level of DL infrastructure.
For the proper and successful application of the cybersecurity profile, we provide a matrix of ensuring secure and reliable DL infrastructure in the organization (Table 4). The matrix is used to assign the technical measures to the appropriate IT security levels.

4.4. A Case Study

Each institution starts to take care of security from a level 0 to assess what measures it already has and can use. If such an institution decides to set level 1 of secure and reliable DL infrastructure, the institution uses the proposed framework (Figure 5) and reviews the domains of the application of the cybersecurity model. Level 1 of the cybersecurity model includes AC, IA, MP, PE, SC, and SI, as shown in Table 4. The technical measures for the implementation of security to the selected domains can be found in Table 3. They are as follows: TK, UV, KP, GT, AN, EN, PS, SM, VT, ZS, and BK. The joint information for the implementation of security level 1 is shown in Table 5.

4.5. Protection of Personal Data

Recently, the protection of personal data has received a lot of attention. Higher education institutions possess personal data, and therefore they have a statutory and regulatory responsibility for the careful processing of personal data. Personal data protection issues are particularly relevant during the implementation of DL and RW as personal data are not processed in a relatively secure intranet environment of the organization, but the data are transmitted and processed outside the intranet. Therefore, additional security measures are needed to ensure the secure transmission of personal data over the internet as well as the processing and storage of personal data whenever a person works remotely.
As our uses and approaches to technology generate new cybersecurity challenges, regulations are growing in number and complexity. This growth in regulatory changes often overwhelms organizations as they need to become more flexible to comply quickly and simultaneously with different mandatory controls and requirements. Personal data protection is specifically mapped with Control the privileged user rights (TK) to help organizations to meet multiple General Data Protection Regulation (GDPR) [17] and ISO 27001 [34] requirements with one comprehensive solution.
The implementation of the GDPR requirements is a complex process that requires considerable resources and expertise. Depending on the nature of the institution, its activities, the volume of data managed and processed, international and national organizations offer various methodologies and models that have been developed for the implementation of the GDPR. The State Data Protection Inspectorate of Lithuania has drawn up a 12-step set of recommendations to guide the preparation process for the implementation of the GDPR [38]. These recommendations are based on the guidelines of the UK Information Commissioner’s Office [39], adapting them to the case of Lithuania. These steps are as follows: (1) awareness; (2) information that you are possessing; (3) provision of privacy information; (4) rights of data subjects; (5) implementation of the subject right to acquaint with personal data; 6) legal base of personal data management; (7) consent; (8) data of children; (9) violations of management of personal data; (10) applied personal data protection; (11) officer of personal data protection; and (12) internationalization.
We can recall that the institution must periodically review the security risks of IT infrastructure and improve protection when risks change. This is prescribed according to the secure and reliable IT framework (Figure 5). The same rule must be applied to the implementation of GDPR, as well.

4.6. Licensing of Software

When purchasing (whether for payment or free) software, you are entitled to use the program, but not to become the owner of the program. The terms and conditions regarding the use of the program depend on the license in which the copyright holder defines the conditions of use of the program in a particular case. The user of the program must understand and agree to and use the terms of the license without violating the existing restrictions. If the license terms are not accepted, the software cannot be used. Generally, a license entitles you to install a program on one computer and have a backup. The license may also include other authorizations, such as free use with additional restrictions, modification of the program, and distribution under certain conditions. There are two main types of licenses: free software and proprietary. Public domain software may be distinguished as a separate group. The four types of licenses are used the most frequently. They are as follows: (1) Copyright (©); (2) Creative Commons (CC); (3) Public Domain (PD); and (4) author-defined license.
Software used in the teaching/learning process requires a careful assessment of the software distribution and use license (terms and conditions) to avoid possible legal consequences or potential security breaches. Special care should be taken when using software that is free or temporarily free and that can be unlawfully distributed, with security issues, etc.
Digital content is usually shared using the Creative Commons (CC) license. Creative Commons is an international non-profit organization that has created several standard license agreements. The authors using these types of licenses can define terms of use of their products. Creative Commons defined four types of terms of product usage [40]. Combining these four types of terms six types of Creative Commons licenses and two types of Public Domain licenses are obtained. The terms of product usage are labeled using a special graphic character and/or a short description of terms of product usage. Creative Commons licenses enable usage of products without the separate permission of authors and/or holders of property rights. Different types of licenses define different terms of product usage. Creative Commons licenses apply practice that some property rights are reserved, meanwhile, the traditional copyright applies practice that all the property rights are reserved. Creative Commons licenses restrict only some rights of product usage.
The use of software that is copied, hacked, having an uncertain origin, or without specified authorship, in some cases, may be freely distributed; however, it may lead to certain risks, as well:
  • Legal or financial consequences;
  • The possible distribution of malicious software;
  • Possible improper, illegal processing, collection (leakage) of personal data;
  • Frequently has poor or no documentation at all;
  • No guarantees are given regarding the consequences of this program usage;
  • Usually, such a program is not supported, updated, bugs are not fixed, and technical assistance is not provided.
Although cybersecurity has always been important, it arguably has never been more vital for organizations to protect their data and reduce the risk of being hacked with so many of us working from home these days. The larger number of employees working from home leaves an organization open to more risks, as a home set-up will often be far less restricted compared to the office-based one. By consolidating IT, systems organizations can control what software their employees utilize, identify all assets (asset management (AM)), and protect against cyberattacks. The proposed model can be provided with the data for which assets are connecting to servers. Cybersecurity can protect the services (and remote access into the organization’s infrastructure) by creating policies.

5. Results and Discussion

The proposed models are validated by experts in distance learning and IT security. The experts evaluated the models anonymously. The single qualification requirement for the experts was to have at least five years’ experience of employment in the studies organization process, including distance learning and/or IT security. The experts were the distance learning process coordinators in their organizations, having a possibility to compare the use of IT infrastructure before and during the pandemic, as they first identified the challenges of the pandemic and had to assure a successful and secure study process.
Experts were invited to evaluate the proposed models of DL infrastructure and security. One of our co-authors is employed as a security manager of a whole university network. So, he practically knows the viability of the proposed models and their technical merits to ensure security of distance learning infrastructure. All the suggestions came from the practical point of view.
To ensure the anonymity of expert assessments, an expert survey was conducted using the anonymous survey tool Google Forms [41].
Because the proposed models are of an applied nature, a method based on Ikoma et al. [42] and the basic validation principles described in the IEEE 1012-2012 standard [43] are applied:
  • Compliance with the requirements of the product;
  • The usability of the product.
Model evaluation criteria and scale are based on the Likert methodology presented by McLeod [44]. The Likert scale was chosen to measure the expert opinions. According to the Likert methodology, the questionnaire presents the question as a statement and several answer options. The options for an answer must show the extent to which the respondent agrees.
Five types of answers were used to assess the fulfillment of the requirements: “fulfilled”, “more fulfilled than not”, “neither fulfilled nor not”, “more unfulfilled than fulfilled”, and “unfulfilled”. Their corresponding numeric values were 5, 4, 3, 2, and 1, respectively.
To assess the suitability of the model the following options were suggested: “suitable”, “more suitable than not”, “neither suitable nor unsuitable”, “more unsuitable than suitable”, and “unsuitable”. Their corresponding numeric values were 5, 4, 3, 2, and 1, respectively.
The number of experts was chosen based on assumptions developed in the evaluation theory, which argues that the reliability of the aggregated solutions and the number of experts is linked to the factor determining the effectiveness of the research. Libby and Blashfield [45] have shown that the accuracy of decisions and assessments made by the group, consisting of 10 experts, is not inferior to that of a large expert group. The highest percentage of reliability is obtained with the evaluation of at least 7–10 experts, later the percentage of reliability changes very insignificantly, therefore 15 experts were invited to evaluate the validity of the distance learning models. The qualification of the experts was as follows: 14 of them had a doctoral degree, 1 had a master’s degree, 10 of them were researchers in the field of technological sciences (9 of them were in the field of computer science, 1 in the field of mechanics), 5 of them were in the field of educational sciences; 6 of them were professors of universities (5 different universities), 3 of them were secondary school teachers, 5 of them were either higher or secondary school administrators, and 1 was a security expert from the business. Among the experts, eight female and seven male experts were present. Their age varied from 35 to 65 years. The mean age was 52.73 years. The standard deviation of the age was 8.99 years.
To assess the compliance of the models with the requirements, the relevant criteria for infrastructure and security models were formulated following the requirements. They are as follows:
  • The infrastructure model includes the key components of DL and RW infrastructure.
  • The security concept model covers: (1) IT infrastructure security profile, (2) levels of IT security, and (3) secure and reliable DL infrastructure framework.
  • The matrix is the appropriate form for the planning of the implementation of the DL infrastructure framework, which joins the levels of IT security and IT infrastructure security profile.
  • The security concept model includes the protection of personal data.
  • The security concept model includes the management of copyright and licenses for digital content and software in education.
In total, 15 experts were invited to verify the validity of the models and 10 experts filled out anonymous evaluation questionnaires. Table 6 presents the data provided by the experts to assess the compliance of the models with the criteria.
According to the assessment data presented in Table 6, we can observe that five experts out of ten were not critical. They thought that the presented models fully satisfied all the raised requirements and assigned the highest assessment values possible. The least assessment values among all the presented values were assigned to criterion 2, which is used to assess the security concept model. The security concept model is presented in an abstract way. Five experts out of ten thought that such a presentation did not fully reveal what is intended by it. Two experts out of ten were quite critical. They thought that there is room for the improvement of all the models.
The anonymous evaluation questionnaires for the usability of the models were completed by 10 experts out of 15 experts. The criteria for the evaluation were as follows:
  • The infrastructure model includes the key components of DL and RW infrastructure.
  • The security concept model covers: (1) IT infrastructure security profile, (2) levels of IT security, and (3) secure and reliable DL infrastructure framework.
  • The matrix is the appropriate form for the planning of the presentation of the implementation of the DL infrastructure framework, which joins the levels of IT security and IT infrastructure security profile.
  • The security concept model must include the protection of personal data.
  • The security concept model must include the management of copyright and licenses for digital content and software in education.
The assessment of the suitability of the models is presented in Table 7.
According to the assessment data presented in Table 7, we can observe that four experts out of ten were not critical. They were fully satisfied with the usability of the presented models and assigned the highest assessment values possible. The least assessment values among all the presented values were assigned to criterion 2 that is used to assess the suitability of the security concept model. The security concept model is presented in a quite abstract way. Six experts out of ten thought that such a presentation did not fully reveal what is intended by it. The first expert was especially critical in assigning the value 3 that means that the model was deemed “neither suitable nor unsuitable”. Two experts out of ten were quite critical. They thought that there is room for the improvement of the suitability of all the models.
We can observe in Table 1 presented at the end of the review of related work that just two research works [15,16] are devoted to the consideration of the DL infrastructure and security together. However, both research works [15,16] devoted all attention to the investigation of the DL infrastructure and security was mentioned at a very abstract level without providing any details how to ensure it. Other research works [20,25,26,27] summarized in Table 1 investigated only security. Different approaches were presented; however, no one approach investigated the technical measures required to implement security, and levels of IT security were not considered.
In this paper, we consider the security of DL infrastructure at the full length. We introduce a security concept model. We provide an IT infrastructure security profile, the levels of IT security, and a secure DL infrastructure framework. We enumerate the technical measures to implement the security concept model. We join the specific technical measures into appropriate activities of the framework. We show the technical measures to implement to achieve a higher security level if the institution is ready for it. We introduce an implementation of GDPR and software licensing into our security concept model. Just a few authors [28,29] discussed the problems of implementation of GDPR in the LMS and presented a possible solution. To the best of our knowledge, no author considered an implementation of GDPR as a component of the security model of the DL infrastructure. To the best of our knowledge, no author considered the problems of software licensing in any context. Consequently, we have presented the security model of the DL infrastructure, which covers all the possible domains related to the security of the DL infrastructure.

6. Conclusions

The proposed models are intended for higher education institutions whose lecturers had to adapt their teaching activities to the pandemic, integrate DL elements into their subject, and solve the new issues related to the security of the DL infrastructure. The proposed model of the DL infrastructure consists of the following components: user devices, network resources, virtualization, computing resources, data warehouses, data resources, software, continuity of activities, security, and network perimeter security.
The proposed model of the security of the DL infrastructure is presented as a hierarchical model consisting of two levels. The first level includes people, organizational processes, and security assurance. The security assurance is divided further (the second level) into the protection of personal data, copyright and licensing of digital content and software, and security of IT infrastructure. To ensure the security of IT infrastructure, an IT infrastructure security profile, the levels of IT security, and a secure DL infrastructure framework are provided. The technical measures to implement the desired security level of the institution were also presented.
The application of the proposed models will ensure security in the DL process for higher education institutions. During the assessment process, the experts decided that the proposed models fully fit the need of DL infrastructure, helping the administration to find the best solution on preparation and implementation of the DL processes. The proposed models of DL infrastructure and security fully meet the raised requirements and are suitable for use.
The first limitation of the study is that all the main contributing authors of the research to the methodology of the presentation have experience in administering university software systems. It is an advantage that the subject is well-known. On the other hand, it is a limitation since such knowledge presents an insider view. It lacks abstractions. To solve this limitation, future research should invite a co-author who would add to the study using abstractions for the representation of the subject. The second limitation of the study is that the validation by the experts was accomplished fully anonymously. It was not possible to collect information on the participating experts that would not disclose the person. For example, whether he or she is a representative of either teaching technologies or IT security, or whether he or she is a professor, administrator, or teacher. Then it would be possible to relate this information with their judgment and to decide where the possible weaknesses of the proposed models were. To solve this limitation, we suggest collecting some information, which would not disclose a person’s identification to the participating experts.
The future direction of our research is the development of a model for general data protection regulation and licensing of digital content and software.

Author Contributions

Conceptualization, Š.G. and A.V.; Methodology, V.J. and D.G.; Validation, R.B. (Renata Burbaite) and A.V.; Formal analysis, R.B. (Rita Butkiene) and B.M.; Writing—Original Draft Preparation, Š.G. and D.G.; Writing—Review and Editing, V.J. and D.G.; Visualization, Š.G.; Project administration, A.V.; Funding Acquisition, A.V. and V.J. All authors have read and agreed to the published version of the manuscript.

Funding

This paper is supported in part by European Union’s Horizon 2020 research and innovation program under Grant Agreement No. 830892, the project “Strategic programs for advanced research and technology in Europe” (SPARTA) and Lithuanian Research Council financed project “Model of distance working and learning organization and recommendations for extreme and transition period” (EKSTRE) (1 June 2020—31 December 2020). Grant Agreement S-COV-20-20.

Institutional Review Board Statement

Ethical review and approval were waived for this study, as this study involves no more than minimal risk to subjects.

Informed Consent Statement

Informed consent was obtained from all subjects involved in the study.

Data Availability Statement

The data presented in this study are available on request from the corresponding author. The data are not publicly available due to the data restriction policy by the grant provider.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Dwivedi, Y.K.; Hughes, D.L.; Coombs, C.; Constantiou, I.; Duan, Y.; Edwards, J.S.; Gupta, B.; Lal, B.; Misra, S.; Prashant, P.; et al. Impact of COVID-19 pandemic on information management research and practice: Transforming education, work and life. Int. J. Inf. Manag. 2020, 55, 102211. [Google Scholar] [CrossRef]
  2. Carolan, C.; Davies, C.L.; Crookes, P.; McGhee, S.; Roxburgh, M. COVID 19: Disruptive impacts and transformative opportunities in undergraduate nurse education. Nurse Educ. Pract. 2020, 46, 102807. [Google Scholar] [CrossRef] [PubMed]
  3. García-Holgado, A.; García-Peñalvo, F.J. A metamodel proposal for developing learning ecosystems. In Learning and Collaboration Technologies. Novel Learning Ecosystems. Proceedings of the 4th International Conference, LCT 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, 9–14 July 2017, Proceedings, Part I.; Zaphiris, P., Ioannou, A., Eds.; Springer International Publishing: Cham, Switzerland, 2017; pp. 100–109. [Google Scholar]
  4. García-Morales, V.J.; Garrido-Moreno, A.; Martín-Rojas, R. The Transformation of Higher Education after the COVID Disruption: Emerging Challenges in an Online Learning Scenario. Front. Psychol. 2021, 12, 616059. [Google Scholar] [CrossRef]
  5. Alhabeeb, A.; Rowley, J. E-learning critical success factors: Comparing perspectives from academic staff and students. Comput. Educ. 2018, 127, 1–12. [Google Scholar] [CrossRef]
  6. Roddy, C.; Amiet, D.; Chung, J.; Holt, C.; Shaw, L.; McKenzie, S.; Garivaldis, F.; Lodge, J.M.; Mundy, M.E. Applying Best Practice Online Learning, Teaching, and Support to Intensive Online Environments: An Integrative Review. Front. Educ. 2017, 2, 59. [Google Scholar] [CrossRef] [Green Version]
  7. Ayebi-Arthur, K. E-learning, resilience and change in higher education: Helping a university cope after a natural disaster. e-Learn. Digit. Media 2017, 14, 259–274. [Google Scholar] [CrossRef]
  8. Dhawan, S. Online Learning: A Panacea in the Time of COVID-19 Crisis. J. Educ. Technol. Syst. 2020, 49, 5–22. [Google Scholar] [CrossRef]
  9. Huang, R.H.; Liu, D.J.; Tlili, A.; Yang, J.F.; Wang, H.H.; Zhang, M.; Lu, H.; Gao, B.; Cai, Z.; Liu, M.; et al. Handbook on Facilitating Flexible Learning during Educational Disruption: The Chinese Experience in Maintaining Undisrupted Learning in COVID-19 Outbreak; Smart Learning Institute of Beijing Normal University: Beijing, China, 2020; Available online: https://iite.unesco.org/wp-content/uploads/2020/03/Handbook-on-Facilitating-Flexible-Learning-in-COVID-19-Outbreak-SLIBNU-V1.2-20200315.pdf (accessed on 13 September 2021).
  10. Carroll, N.; Conboy, K. Normalising the “new normal”: Changing tech-driven work practices under pandemic time pressure. Int. J. Inf. Manag. 2020, 55, 102186. [Google Scholar] [CrossRef]
  11. Tyagi, N.; Verma, S. Culturally Responsive Teaching: A Suggestive Pedagogical Framework. In Handbook of Research on Social Justice and Equity in Education; IGI Global: Noida, Uttar Pradesh, India, 2022; pp. 312–331. [Google Scholar]
  12. Gaivéo, J.M. Security of ICTs Supporting Healthcare Activities. In Standards and Standardization: Concepts, Methodologies, Tools, and Applications; IGI Global: Setubal, Portugal, 2015; pp. 192–212. [Google Scholar]
  13. Ergüzen, A.; Erdal, E.; Ünver, M.; Özcan, A. Improving Technological Infrastructure of Distance Education through Trustworthy Platform-Independent Virtual Software Application Pools. Appl. Sci. 2021, 11, 1214. [Google Scholar] [CrossRef]
  14. Moore, R.L.; Fodrey, B.P. Distance Education and Technology Infrastructure: Strategies and Opportunities. In Leading and Managing e-Learning; Piña, A., Lowell, V., Harris, B., Eds.; Educational Communications and Technology: Issues and Innovations; Springer: Cham, Switzerland, 2018; pp. 87–100. [Google Scholar] [CrossRef] [Green Version]
  15. Thomas, S.E. Digital Infrastructure. Available online: https://diiii.net/di2, (accessed on 15 February 2022).
  16. García-Peñalvo, F.J. Avoiding the Dark Side of Digital Transformation in Teaching. An Institutional Reference Framework for eLearning in Higher Education. Sustainability 2021, 13, 2023. [Google Scholar] [CrossRef]
  17. EUR-Lex. Available online: https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32016R0679&from=EN (accessed on 27 April 2021).
  18. Arora, M.; Goyal, L.M.; Chintalapudi, N.; Mittal, M. Factors affecting digital education during COVID-19: A statistical modeling approach. In Proceedings of the 2020 5th International Conference on Computing, Communication and Security (ICCCS), Patna, India, 14–16 October 2020; pp. 1–5. [Google Scholar]
  19. Favalea, T.; Soroa, F.; Trevisana, M.; Dragob, I.; Melliaa, M. Campus traffic and e-Learning during COVID-19 pandemic. Comput. Netw. 2020, 176, 107290. [Google Scholar] [CrossRef]
  20. Bhatia, M.; Maitra, J.K. E-learning Platforms Security Issues and Vulnerability Analysis. In Proceedings of the 2018 International Conference on Computational and Characterization Techniques in Engineering & Sciences (CCTES), Lucknow, India, 14–15 September 2018; pp. 276–285. [Google Scholar]
  21. De Oliveira, P.C.; de Almeida Cunha, C.J.C.; Nakayama, M.K. Learning Management Systems (LMS) and e-learning management: An integrative review and research agenda. J. Inf. Syst. Technol. Manag. 2016, 13, 157–180. [Google Scholar] [CrossRef] [Green Version]
  22. Husain, T.; Budiyantara, A. Analysis of Control Security and Privacy Based on e-Learning Users. SAR J. 2020, 3, 51–58. [Google Scholar]
  23. Weil, T.; Murugesan, S. IT Risk and Resilience—Cybersecurity Response to COVID-19. IT Prof. 2020, 22, 4–10. [Google Scholar] [CrossRef]
  24. Navid Ali, K.; Sarfraz Nawaz, B.; Noor, Z. Ten Deadly Cyber Security Threats Amid COVID-19 Pandemic; IEEE: Piscataway, NJ, USA, 2020. [Google Scholar] [CrossRef]
  25. Ali, R.; Zafar, H. A Security and Privacy Framework for e-Learning. Int. J. e-Learn. Secur. 2017, 7, 556–566. [Google Scholar] [CrossRef]
  26. Ran, J.; Hou, K.; Li, K.; Dai, N. A High Security Distance Education Platform Infrastructure Based on Private Cloud. Int. J. Emerg. Technol. Learn. 2018, 13, 42–54. [Google Scholar] [CrossRef]
  27. Nita, S.L.; Mihailescu, M.I. Proposing a secure framework for eLearning platforms using attribute based encryption. In Proceedings of the 13th International Scientific Conference “eLearning and Software for Education”, Bucharest, Romania, 27–28 April 2017; Volume 2, pp. 114–119. [Google Scholar] [CrossRef]
  28. Amo, D.; Alier, M.; García-Peñalvo, F.J.; Fonseca, D.; Casany, M.J. GDPR Security and Confidentiality compliance in LMS’ a problem analysis and engineering solution proposal. In Proceedings of the Seventh International Conference on Technological Ecosystems for Enhancing Multiculturality, Leon, Spain, 16–18 October 2019; pp. 253–259. [Google Scholar] [CrossRef] [Green Version]
  29. Amo, D.; Alier, M.; García-Peñalvo, F.J.; Fonseca, D.; Casañ, M.J. Protected Users: A Moodle Plugin To Improve Confidentiality and Privacy Support through User Aliases. Sustainability 2020, 12, 2548. [Google Scholar] [CrossRef] [Green Version]
  30. Caviglione, L.; Coccoli, M. A Holistic Model for Security of Learning Applications in Smart Cities. J. e-Learn. Knowl. Soc. 2020, 16, 1–10. [Google Scholar]
  31. Mahmoud, A.M.M. An agent-based framework for providing security in a cloud-based E-learning system. Int. J. Adv. Appl. Sci. 2020, 7, 19–24. [Google Scholar] [CrossRef]
  32. Alexei, A. Cyber Security Threat Analysis in Higher Education Institutions as a Result of Distance Learning. Int. J. Sci. Technol. Res. 2021, 10, 128–133. [Google Scholar]
  33. Jusas, V.; Butkiene, R.; Venčkauskas, A.; Burbaite, R.; Gudoniene, D. Models for Administration to Ensure the Successful Transition to Distance Learning during the Pandemic. Sustainability 2021, 13, 4751. [Google Scholar] [CrossRef]
  34. ISO/IEC 27001. Information Security Management. Available online: https://www.iso.org/isoiec-27001-information-security.html (accessed on 27 April 2021).
  35. COBIT. Available online: https://www.isaca.org/resources/cobit (accessed on 27 April 2021).
  36. CVE. Available online: https://cve.mitre.org (accessed on 27 April 2021).
  37. Principles of Lean. Available online: https://www.lean.org/WhatsLean/Principles.cfm (accessed on 27 April 2021).
  38. Pasiruošimas Taikyti Bendrąjį Duomenų Apsaugos Reglamentą (ES) 2016/679 (Preparation for the Application of the General Data Protection Regulation (EU) 2016/679). Available online: https://vdai.lrv.lt/uploads/vdai/documents/files/12zingsnius_BDAR_20170525.pdf (accessed on 15 September 2021).
  39. Information Commissioner‘s Offise (UK). Preparing for the General Data Protection Regulation (GDPR). 12 Steps to Take Now. Available online: https://ico.org.uk/media/1624219/preparing-for-the-gdpr-12-steps.pdf (accessed on 15 September 2021).
  40. About the Licenses. Available online: https://creativecommons.org/licenses/ (accessed on 27 April 2021).
  41. Google Forms. Available online: https://workspace.google.com/products/forms/ (accessed on 27 April 2021).
  42. Ikoma, M.; Ooshima, M.; Tanida, T.; Oba, M.; Sakai, S. Using a validation model to measure the agility of software development in a large software development organization. In Proceedings of the 2009 31st International Conference on Software Engineering -Companion Volume, Vancouver, BC, Canada, 16–24 May 2009; pp. 91–100. Available online: http://ieeexplore.ieee.org/document/5070967/ (accessed on 27 April 2021).
  43. IEEE Standard for System and Software Verification and Validation. IEEE Std 1012–2012 (Revision of IEEE Std 1012-2004); IEEE: Piscataway, NJ, USA, 2012; pp. 1–223. Available online: https://ieeexplore.ieee.org/document/6204026 (accessed on 27 April 2021).
  44. McLeod, S.A.; Likert Scale Definition, Examples and Analysis. Simply Psychology 2019. Available online: https://www.simplypsychology.org/likert-scale.html (accessed on 27 April 2021).
  45. Libby, R.; Blashfield, R.K. Performance of a composite as a function of the number of judges. Organ. Behav. Hum. Perform. 1978, 21, 121–129. [Google Scholar] [CrossRef]
Figure 1. The model of DL infrastructure.
Figure 1. The model of DL infrastructure.
Sustainability 14 03414 g001
Figure 2. Security concept model of DL ecosystem.
Figure 2. Security concept model of DL ecosystem.
Sustainability 14 03414 g002
Figure 3. The security profile of IT infrastructure.
Figure 3. The security profile of IT infrastructure.
Sustainability 14 03414 g003
Figure 4. IT security levels.
Figure 4. IT security levels.
Sustainability 14 03414 g004
Figure 5. A framework of secure and reliable DL infrastructure.
Figure 5. A framework of secure and reliable DL infrastructure.
Sustainability 14 03414 g005
Figure 6. Secure DL infrastructure framework enriched by technical measures.
Figure 6. Secure DL infrastructure framework enriched by technical measures.
Sustainability 14 03414 g006
Table 1. Summary of related works.
Table 1. Summary of related works.
Research WorkDL InfrastructureSecurity Issues
Ergüzen et al. [13]Hardware platform-independent remote laboratory.VPN layer ensures security.
Moore and Fodrey [14] Model consists of four components: systems, objectives, evaluation, and personnel.Not considered.
Thomas [15] Four layers of the DL infrastructure from bottom to top: internet, hardware, software, and rules and regulations.Security measures are managed by IT departments. No details are provided.
García-Peñalvo [16] Three sections of DL infrastructure: management and governance, physical infrastructure, and logical infrastructure.Security is fifth layer in the framework. No details are provided. The security is considered together with ethics and privacy issues.
Bhatia and Maitra [20]Not considered.Hierarchical and distributed approaches. The hierarchical approach consists of the layers from top to bottom: system administrator, instructors, and learners. The distributed approach keeps separate security models of each element in the e-learning platform.
Ali and Zafar [25] Not considered.Conceptual model of the information security and privacy consists of factors in the specific ordering: (1) data evaluation, (2) policies, (3) legislation/regulation, (4) architecture, (5) integration, (6) training, and (7) risk analysis.
Ran et al. [26] Not considered.Identity authentication model using multi-fold security approach based on classical and behavioral validation methods.
Nita and Mihailescu [27] Not considered.Secure framework using attribute-based encryption consists of the components: methods and criteria, education and training, e-learning users, improved access mechanism, security layer, cloud, authorities, and owners.
Amo et al. [28,29]Not considered.GDPR compliant personal data storing in LMS Moodle.
Caviglione and Coccoli [30]The model is divided into three spaces: infrastructure, data, and learnerA training and technological awareness of individuals is a prime countermeasure for learner space.
Mahmood [31]Not considered.The framework is introduced just to SaaS service.
Alexei and Alexei [32]Not considered.Common recommendations are provided to secure cloud computing, learning management systems, and video conferencing applications.
Table 2. Domains of applications of a cybersecurity model.
Table 2. Domains of applications of a cybersecurity model.
Domains of Applications of Cybersecurity ModelActionsTechnical Measures
AC—access controlDefine requirements for system accessTK—control of privileged user
Control the access to the system from insideUV—firewall management
Control remote access to the system
Allow access to the data only to those users and processes that have a real need
AM—asset managementIdentify and document resources TS—network segmentation
Monitor and manage resources
AU—audit, and responsibilityDefine requirements for log records UV—firewall management
Protect log recordsSM—SIEM
Monitor and manage log records DP—data loss prevention
AT—awareness and trainingInform users about threats MV—security training
Organize security training and education
CM—configuration managementDefine the main (minimal, baseline) configurationsTP—application protection
Manage configuration and updates GT—endpoint protection
IA—identification, and authenticationAllow access to authenticated resourcesTK—control of privileged user
IR—incident responsePrepare an incident management plan AN—anomaly detection
Implement incident management PS—intrusion prevention system
Test incident management UV—firewall management
MA—maintenanceImplement maintenanceSM—SIEM
MP—media protectionDefine and label media KP—Malware prevention
Protect and control mediaGT—endpoint protection
Protect media channels UV—firewall management
PS—personal securityProtect sensitive informationDP—data loss prevention
TK—control of privileged user
GT—endpoint protection
PE—physical environmentRestrict physical access-
RE—recoveryManage backup copies TK—control of privileged user
Manage continuity of information security
RM—risk managementDefine, assess, and manage risk SM—SIEM
CA—control assessmentPrepare and manage a plan for information systems security -
Define and manage tools of control PS—intrusion prevention system
SM—SIEM
SA—situation awarenessImplement monitoring of threats SM—SIEM
TP—application protection
AN—anomaly detection
SC—system and communicationDefine security requirements for systems and communication BK—wireless access control
Manage communication with information systems PS—intrusion prevention system
AN—anomaly detection
EN—email and web browser protection
ZS—web protection
VT—VPN access control
SI—system integrityKnow and manage the flaws of the information systemPS—intrusion prevention system
Identify malicious contents KP—Malware prevention
Monitor network and systems SM—SIEM
Implement enhanced protection of email EN—email and web browser protection
Table 3. Implementation matrix of DL infrastructure framework.
Table 3. Implementation matrix of DL infrastructure framework.
Appropriate Technical Measures
Domains of ApplicationTKKPANTPDPENGTUVPSTSSMVTZSBKMV
ACx x
AM x
AU x x x
AT x
CM x x
IAx
IR x xx
MA x
MP x xx
PS x xx
PE
REx
RM x
CA x x
SA xx x
SC x x x xxx
SI x x x x
Table 4. The level of assurance of secure and reliable IT infrastructure in the organization.
Table 4. The level of assurance of secure and reliable IT infrastructure in the organization.
Levels of IT Security
Domains of Application 012345
AC Assessment of the current situationxxxxx
AM xx
AU xxxx
AT xxx
CM xxxx
IA xxx
IR xxxx
MA xx
MP xxx
PS x
PE xxx
RE xxx
RM xxxx
CA xxx
SA xx
SC xxxxx
SIxxxxx
Table 5. Implementation of level 1 to ensure secure and reliable IT infrastructure.
Table 5. Implementation of level 1 to ensure secure and reliable IT infrastructure.
Domains of Application of the Cybersecurity ModelDL and RW Technical Measures
AC TK UV
IA TK
MP KP GTUV
PE
SC ANEN PS VTZSBK
SI KP EN PSSM
All measures of security level 1:TKKPANENGTUVPSSMVTZSBK
Table 6. Compliance of the models with the requirements.
Table 6. Compliance of the models with the requirements.
ExpertsCriterion No 1Criterion No 2Criterion No 3Criterion No 4Criterion No 5Total
14444420
24444420
34445522
44455523
55455524
65555525
75555525
85555525
95555525
105555525
Table 7. Suitability of the models.
Table 7. Suitability of the models.
ExpertsCriterion No 1Criterion No 2Criterion No 3Criterion No 4Criterion No 5Total
14344419
24444420
35445422
45455524
55455524
65455524
75555525
85555525
95555525
105555525
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Jusas, V.; Butkiene, R.; Venčkauskas, A.; Grigaliūnas, Š.; Gudoniene, D.; Burbaite, R.; Misnevs, B. Sustainable and Security Focused Multimodal Models for Distance Learning. Sustainability 2022, 14, 3414. https://doi.org/10.3390/su14063414

AMA Style

Jusas V, Butkiene R, Venčkauskas A, Grigaliūnas Š, Gudoniene D, Burbaite R, Misnevs B. Sustainable and Security Focused Multimodal Models for Distance Learning. Sustainability. 2022; 14(6):3414. https://doi.org/10.3390/su14063414

Chicago/Turabian Style

Jusas, Vacius, Rita Butkiene, Algimantas Venčkauskas, Šarūnas Grigaliūnas, Daina Gudoniene, Renata Burbaite, and Boriss Misnevs. 2022. "Sustainable and Security Focused Multimodal Models for Distance Learning" Sustainability 14, no. 6: 3414. https://doi.org/10.3390/su14063414

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop