Emerging Trends in Cloud-Based ELearning: A Systematic Review of Predictors, Security and Themes

被引:0
|
作者
Al manyi, Noorah Abdullah [1 ]
Yusof, Ahmad Fadhil [1 ]
Sadiq, Ali Safaa [2 ]
机构
[1] Univ Teknol Malaysia, Fac Comp, Utm Johor Bahru 81310, Johor, Malaysia
[2] Nottingham Trent Univ, Dept Comp Sci, Clifton Lane, Nottingham NG11 8NS, England
关键词
Cloud -based e -learning; PRISMA; Secure cloud; TAM; Thematic analysis; E-LEARNING ADOPTION; DEVELOPING-COUNTRIES; COMPUTING ADOPTION; STUDENTS INTENTION; HIGHER-EDUCATION; USER ACCEPTANCE; TECHNOLOGY; DETERMINANTS; MODEL; USAGE;
D O I
10.3837/tiis.2024.01.006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud -based e -learning (CBEL) represents a promising technological frontier. Existing literature has presented a diverse array of findings regarding the determinants that influence the adoption of CBEL. The primary objective of this study is to conduct an exhaustive examination of the available literature, aiming to determine the key predictors of CBEL utilization by employing the Preferred Reporting Items for Systematic Reviews and MetaAnalyses (PRISMA) methodology. A comprehensive review of 35 articles was undertaken, shedding light on the status of CBEL as an evolving field. Notably, there has been a discernible downturn in related research output during the COVID-19 pandemic, underscoring the temporal dynamics of this subject. It is noteworthy that a significant portion of this research has emanated from the Asian continent. Furthermore, the dominance of the technology acceptance model (TAM) in research frameworks is affirmed by our findings. Through a rigorous thematic analysis, our study identified five overarching themes, each encompassing a diverse range of sub -themes. These themes encompass 1) technological factors, 2) individual factors, 3) organizational factors, 4) environmental factors, and 5) security factors. This categorization provides a structured framework for understanding the multifaceted nature of CBEL adoption determinants. Our study serves as a compass, guiding future research endeavours in this domain. It underscores the imperative for further investigations utilizing diverse theoretical frameworks, contextual settings, research methodologies, and variables. This call for diversity and expansion in research efforts reflects the dynamic nature of CBEL and the evolving landscape of e -learning technologies.
引用
收藏
页码:89 / 104
页数:16
相关论文
共 50 条
  • [1] Security Solutions in Cloud-based Healthcare Information Systems: A Systematic Review
    Tabatabaei, Mohsen S.
    Langarizadeh, Mostafa
    Akbari, Mohammad K.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2018, 18 (09): : 57 - 64
  • [2] Security and privacy concerns in cloud-based scientific and business workflows: A systematic review
    Soveizi, Nafiseh
    Turkmen, Fatih
    Karastoyanova, Dimka
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2023, 148 : 184 - 200
  • [3] Cloud-Based Business Process Security Risk Management: A Systematic Review, Taxonomy, and Future Directions
    Abioye, Temitope Elizabeth
    Arogundade, Oluwasefunmi Tale
    Misra, Sanjay
    Adesemowo, Kayode
    Damasevicius, Robertas
    [J]. COMPUTERS, 2021, 10 (12)
  • [4] Cloud-based global online marketplaces review on trust and security
    Ghazali, Osman
    Leow, Chun Yang
    Qaiser, Shahzad
    Pattabiraman, Nanthini
    Vasuthevan, Sathiyaroobaa
    Abdusalam, Eman Mohamed
    Barakat, Mustafa M.
    [J]. International Journal of Interactive Mobile Technologies, 2019, 13 (04): : 96 - 116
  • [5] Cloud-Based Data Architecture Security
    N. A. Semenov
    A. A. Poltavtsev
    [J]. Automatic Control and Computer Sciences, 2019, 53 : 1056 - 1064
  • [6] Cloud-Based Data Architecture Security
    Semenov, N. A.
    Poltavtsev, A. A.
    [J]. AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2019, 53 (08) : 1056 - 1064
  • [7] Data Security in Cloud-Based Applications
    Pandey, Surabhi
    Purohit, G. N.
    Munshi, Usha Mujoo
    [J]. DATA SCIENCE LANDSCAPE: TOWARDS RESEARCH STANDARDS AND PROTOCOLS, 2018, 38 : 321 - 326
  • [8] Related Work in Cloud-Based Security
    不详
    [J]. IEEE SECURITY & PRIVACY, 2013, 11 (01) : 45 - 45
  • [9] Process Mining for Cloud-Based Applications: A Systematic Literature Review
    El-Gharib, Najah Mary
    Amyot, Daniel
    [J]. 2019 IEEE 27TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE WORKSHOPS (REW 2019), 2019, : 34 - 43
  • [10] Validating Security Protocols with Cloud-Based Middleboxes
    Taylor, Curtis R.
    Shue, Craig A.
    [J]. 2016 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2016, : 261 - 269