COVID-19 has a considerable impact on the adoption of Digital Learning platforms by schools and universities. These platforms allow teachers to deliver courses remotely, and students take courses at a distance. E-learning platforms collect, process, and store personal and metadata about participants. These data, in the right hands, help to improve educational facilities. But in the wrong hands, it can ruin the reputation of those involved. This paper has shown that it is necessary to identify which personal data is involved in Digital Learning, look at the security risks associated with Digital Learning, and formulate the required security measures required to mitigate them. Our research has highlighted that, for reliable and effective security, e-learning platform providers must comply with the legislation in force in their country and implement the existing security mechanisms. In addition, teachers and students should be aware of the regulations and privacy policies. The best practice is to protect ourselves before, during and after Online Learning.

1.
B. B.
Lockee
, “
Online education in the post-COVID era
,”
Nat. Electron.
, vol.
4
, no.
1
, pp.
5
6
,
2021
.
2.
N. S.
Raj
and
V.
Renumol
, “
A Rule-Based Approach for Adaptive Content Recommendation in a Personalized Learning Environment: An Experimental Analysis
,” in
2019 IEEE Tenth International Conference on Technology for Education (T4E)
,
2019
, pp.
138
141
.
3.
D.
Garg
,
R.
Patel
,
R.
Patel
,
B.
Kaka
,
P.
Goel
, and
B.
Patel
, “
Digital Learning: A New Perception to Learn Beyond the Classroom Boundary
,” in
International Conference on Information and Communication Technology for Intelligent Systems
,
2020
, pp.
517
527
.
4.
J. L.
Moore
,
C.
Dickson-Deane
, and
K.
Galyen
, “
e-Learning, online learning, and distance learning environments: Are they the same?
,”
Internet High. Educ.
, vol.
14
, no.
2
, pp.
129
135
,
2011
.
5.
G.
Siemens
,
D.
Gasevic
, and
S.
Dawson
, “
A review of the history and current state of distance, blended, and online learning
,”
Prep. Digit. Univ. Athabasca Univ. Bill Melinda Gates Found.
,
2015
.
6.
Z.
Bezovski
and
S.
Poorani
, “
The evolution of e-learning and new trends
,” in
Information and Knowledge Management
,
2016
, vol.
6
, pp.
50
57
.
7.
J. B.
Williams
and
M.
Goldberg
, “
The evolution of e-learning
,”
Balance Fidel. Mobil. Maint. Momentum
, pp.
725
728
,
2005
.
8.
S.
Downes
, “
E-learning 2.0
,”
ELearn
, vol.
2005
, no.
10
, p.
1
,
2005
.
9.
M.
Dominic
,
S.
Francis
, and
A.
Pilomenraj
, “
E-learning in web 3.0
,”
Int. J. Mod. Educ. Comput. Sci.
, vol.
6
, no.
2
, p.
8
,
2014
.
10.
F.
Hussain
, “
E-Learning 3.0= E-Learning 2.0+ Web 3.0?
.,”
Int. Assoc. Dev. Inf. Soc.
,
2012
.
11.
P.
Miranda
,
P.
Isaias
, and
C. J.
Costa
, “
E-Learning and web generations: Towards Web 3.0 and E-Learning 3.0
,”
Int. Proc. Econ. Dev. Res.
, vol.
81
, p.
92
,
2014
.
12.
N.
Rubens
,
D.
Kaplan
, and
T.
Okamoto
, “
E-Learning 3.0: anyone, anywhere, anytime, and AI
,” in
International conference on web-based learning
,
2012
, pp.
171
180
.
13.
J. S.
Barrot
,
I. I.
Llenares
, and
L. S.
del Rosario
, “
Students’ online learning challenges during the pandemic and how they cope with them: The case of the Philippines
,”
Educ. Inf. Technol.
, pp.
1
18
,
2021
.
14.
M.
Rohman
,
F.
Baskoro
, and
L.
EndahCahyaNingrum
, “
The Effectiveness and Efficiency of Google Classroom as an Alternative Online Learning Media to Overcome Physical Distancing in Lectures Due to the Covid-19 pandemic: Student Perspectives
,” in
2020 Third International Conference on Vocational Education and Electrical Engineering (ICVEE)
,
2020
, pp.
1
6
.
15.
A. P.
Rovai
and
H. M.
Jordan
, “
Blended learning and sense of community: A comparative analysis with traditional and fully online graduate courses
,”
Int. Rev. Res. Open Distrib. Learn.
, vol.
5
, no.
2
, pp.
1
13
,
2004
.
16.
H.
Singh
, “
Building effective blended learning programs
,” in
Challenges and Opportunities for the Global Implementation of E-Learning Frameworks
, IGI Global,
2021
, pp.
15
23
.
17.
P.
Dorsah
and others, “
Synchronous Versus Asynchronous: Pre-Service Teachers’ Performance in Science Formative Assessment Tests
,”
Open Access Libr. J.
, vol.
8
, no.
04
, p.
1
,
2021
.
18.
N. G.
Koroleva
,
A. V.
Vozdvizhenskaya
,
A. K.
Vsevolodova
, and
A. Y.
Vikhareva
, “The Effect of Remote Classroom Attendance on Students’ Course-Satisfaction,” in
Knowledge in the Information Society
,
Springer
,
2020
, pp.
311
323
.
19.
J.
Busch
,
P.
Hanna
,
I.
O’Neill
,
N.
Anderson
, and
A.
McGowan
, “
Design, development and analysis of a new approach to synchronous learning through a web-based broadcasting platform
.,” in
Computing Education Practice
,
2017
.
20.
S. M.
Kamunya
,
R. O.
Oboko
,
E. M.
Maina
, and
E. K.
Miriti
, “
A Systematic Review of Gamification Within E-Learning
,”
Handb. Res. Equity Comput. Sci. P-16 Educ.
, pp.
201
218
,
2021
.
21.
T. T.
Lee
,
K. T.
Wong
,
N.
Daud
,
I.
Zainol
,
M. I. M.
Damanhuri
, and others, “
Chemistry laboratory management techniques massive open online course: Development and evaluation on students’ perception
,”
Educ. J. Sci. Math. Technol.
, vol.
7
, no.
2
, pp.
50
64
,
2020
.
22.
N.
Ahmad
, “
Web Engagement Strategies In Business, Government And Education Sector
,”
Int. J. Softw. Eng. Comput. Syst.
, vol.
7
, no.
1
, pp.
12
23
,
2021
.
23.
B.
Berendt
,
A.
Littlejohn
, and
M.
Blakemore
, “
AI in education: learner choice and fundamental rights
,”
Learn. Media Technol.
, vol.
45
, no.
3
, pp.
312
324
,
2020
.
24.
R.
Paiva
and
I. I.
Bittencourt
, “
Helping teachers help their students: A human-ai hybrid approach
,” in
International Conference on Artificial Intelligence in Education
,
2020
, pp.
448
459
.
25.
S.
Coghlan
,
T.
Miller
, and
J.
Paterson
,
“Good proctor or" Big Brother"? AI Ethics and Online Exam Supervision Technologies
,” ArXiv Prepr. ArXiv:201107647,
2020
.
26.
C.
Panigrahi
and others, “
Use of Artificial Intelligence in education
,”
Manag. Account.
, vol.
55
, pp.
64
67
,
2020
.
27.
A.
Scavarelli
,
A.
Arya
, and
R. J.
Teather
, “
Virtual reality and augmented reality in social learning spaces: A literature review
,”
Virtual Real.
, vol.
25
, pp.
257
277
,
2021
.
28.
K.
Nesenbergs
,
V.
Abolins
,
J.
Ormanis
, and
A.
Mednis
, “
Use of Augmented and Virtual Reality in Remote Higher Education: A Systematic Umbrella Review
,”
Educ. Sci.
, vol.
11
, no.
1
, p.
8
,
2021
.
29.
K.
Dahdouh
,
A.
Dakkak
,
A.
Dakkak
,
L.
Oughdir
, and
I.
Abdelali
, “
Improving Online Education Using Big Data Technologies
,”
Role Technol Educ
,
2020
.
30.
H.
Waheed
,
S.-U.
Hassan
,
N. R.
Aljohani
,
J.
Hardman
,
S.
Alelyani
, and
R.
Nawaz
, “
Predicting academic performance of students from VLE big data using deep learning models
,”
Comput. Hum. Behav.
, vol.
104
, p.
106189
,
2020
.
31.
M. A.
Khan
and
K.
Salah
, “
Cloud adoption for e-learning: Survey and future challenges
,”
Educ. Inf. Technol.
, vol.
25
, no.
2
, pp.
1417
1438
,
2020
.
32.
D.
Otoo-Arthur
and
T. L.
van Zyl
, “
A Scalable Heterogeneous Big Data Framework for e-Learning Systems
,” in
2020 International Conference on Artificial Intelligence, Big Data, Computing and Data Communication Systems (icABCD)
,
2020
, pp.
1
15
.
33.
T.
Hewa
,
M.
Ylianttila
, and
M.
Liyanage
, “
Survey on blockchain based smart contracts: Applications, opportunities and challenges
,”
J. Netw. Comput. Appl.
, p.
102857
,
2020
.
34.
T. Y.
Lam
and
B.
Dongol
, “
A blockchain-enabled e-learning platform
,”
Interact. Learn. Environ.
, pp.
1
23
,
2020
.
35.
P. A.
Sunarya
,
U.
Rahardja
,
L.
Sunarya
, and
M.
Hardini
, “
The Role Of Blockchain As A Security Support For Student Profiles In Technology Education Systems
,”
InfoTekJar J. Nas. Inform. Dan Teknol. Jar.
, vol.
4
, no.
2
, pp.
13
17
,
2020
.
36.
A.
Pfeiffer
,
S.
Bezzina
,
T.
Wernbacher
, and
S.
Kriglstein
, “
Blockchain Technologies for the Validation, Verification, Authentication and Storing of Students’ Data
,” in
European Conference on e-Learning
,
2020
, pp.
421
XIX
.
37.
M.
Takev
,
E.
Somova
,
S.
Gaftandzhieva
, and
M. R.
Artacho
, “
System for creation, support and tracking of interactive learning activities
,” in
IOP Conference Series: Materials Science and Engineering
,
2020
,
ol. 878
, p.
012034
.
38.
C.-M.
Chen
and
W.-F.
Wang
, “
Mining effective learning behaviors in a web-based inquiry science environment
,”
J. Sci. Educ. Technol.
, vol.
29
, pp.
519
535
,
2020
.
39.
C.
De Medio
,
C.
Limongelli
,
F.
Sciarrone
, and
M.
Temperini
, “
MoodleREC: A recommendation system for creating courses using the moodle e-learning platform
,”
Comput. Hum. Behav.
, vol.
104
, p.
106168
,
2020
.
40.
K. S. Erika McCallister Tim
Grance
, “
Guide to Protecting the Confidentiality of Personally Identifiable Information (PII
),”
Natl. Inst. Stand. Technol.
,
2010
.
41.
B.
Wolford
, “
What is GDPR, the EU’s new data protection law?
,”
GDPR.eu.
Feb.
2019
. [Online]. Available: https://gdpr.eu/what-is-gdpr/
42.
R. H.
Huang
,
Personal Data and Privacy Protection in Online Learning: Guidance for Students, Teachers and Parents
.
Beijing
:
Smart Learning Institute of Beijing Normal University
,
2020
.
43.
Á.
Del Blanco
,
Á.
Serrano
,
M.
Freire
,
I.
Martínez-Ortiz
, and
B.
Fernández-Manjón
, “
E-Learning standards and learning analytics. Can data collection be improved by using standard data models?
,” in
2013 IEEE Global Engineering Education Conference (EDUCON)
,
2013
, pp.
1255
1261
.
44.
P.
Dráždilová
,
G.
Obadi
,
K.
Slaninová
,
S.
Al-Dubaee
,
J.
Martinovič
, and
V.
Snášel
, “
Computational intelligence methods for data analysis and mining of elearning activities
,” in
Computational intelligence for technology enhanced learning
,
Springer
,
2010
, pp.
195
224
.
45.
V. M.
Deshpande
and
A.
Desai
, “
Smart Secure: A Novel Risk based Maturity Model for Enterprise Risk Management during Global Pandemic
,” in
2021 6th International Conference for Convergence in Technology (I2CT)
,
2021
, pp.
1
7
.
46.
E.
Djeki
,
J.
Degila
,
C.
Bondiombouy
, and
M. H.
Alhassan
, “
Security Issues in Digital Learning Spaces
,” in
2021 IEEE International Conference on Computing (ICOCO)
, Nov.
2021
, pp.
71
77
. doi: .
47.
Forcepoint
, “
What is Data Security?
” May
2021
. [Online]. Available: https://www.forcepoint.com/fr/cyber-edu/data-security
48.
IBM
, “
What is data security? Definition, solutions and how to secure data
.” [Online]. Available: https://www.ibm.com/topics/data-security
49.
E.
Djeki
,
J.
Dégila
,
M. H.
Alhassan
, and
C.
Bondiombouy
, “
Analyzing Learners’ Privacy in MOOC and Online Learning Platform
,” in
2022 IEEE International Conference on Computing (ICOCO)
, Nov.
2022
, pp.
358
363
. doi: .
50.
UNCTAD
,
“Data Protection and Privacy Legislation Worldwide.” UNCTAD
, Apr.
2020
. [Online]. Available: https://unctad.org/page/data-protection-and-privacy-legislation-worldwide
51.
OHCHR
, “
OHCHR and privacy in the digital age
.” OHCHR, 2019. [Online]. Available: https://www.ohchr.org/en/issues/digitalage/pages/digitalageindex.aspx
52.
T. O.
Adekunle
and
O. O.
Olufunke
, “
ISO/IEC 29100:2011
,”
ISO. ISO
, May 2017. [Online]. Available: https://www.iso.org/standard/45123.html
53.
S. M.
Boyne
, “
Data protection in the united states
,”
Am. J. Comp. Law
, vol.
66
, no. suppl_
1
, pp.
299
343
,
2018
.
54.
I. G.
Cohen
and
M. M.
Mello
, “
HIPAA and protecting health information in the 21st century
,”
Jama
, vol.
320
, no.
3
, pp.
231
232
,
2018
.
55.
A.
Ghosh
, “
Discerning the impact of disaggregated non-interest income activities on bank risk and profits in the post-Gramm-Leach-Bliley Act era
,”
J. Econ. Bus.
, vol.
108
, p.
105874
,
2020
.
56.
E. I.
Brooks
and
A. K.
Moeller
, “
Children’s Perceptions and Concerns of Online Privacy
,” in
Extended Abstracts of the Annual Symposium on Computer-Human Interaction in Play Companion Extended Abstracts
,
2019
, pp.
357
362
.
57.
O. of the P. C. of
Canada
, “
Questions and Answers regarding the application of PIPEDA, Alberta and British Columbia’s Personal Information Protection Acts
,”
Office of the Privacy Commissioner of Canada.
Nov. 2004. [Online]. Available: https://www.priv.gc.ca/en/privacy-topics/privacy-laws-in-canada/the-personal-information-protection-and-electronic-documents-act-pipeda/r_o_p/02_05_d_26/
58.
S.
Umeda
, “
Online Privacy Law: Japan
,”
Online Privacy Law: Japan | Law Library of Congress.
Jun.
2012
. [Online]. Available: https://www.loc.gov/law/help/online-privacy-law/2012/japan.php
59.
X.
Wu
, “
Chronology of Practice: Chinese Practice in Public International Law in 2016
,”
Chin. J. Int. Law
, vol.
16
, no.
3
, pp.
547
615
,
2017
.
60.
S.
Mabunda
, “
Cybersecurity in South Africa: Towards Best Practices
,” in
CyberBRICS, Springer
,
2021
, pp.
227
270
.
61.
S. A.
Government
, “
Protection of Personal Information Act 4 of 2013
,”
South African Government.
[Online]. Available: https://www.gov.za/documents/protection-personal-information-act
62.
A.
Akinwunmi
, “
Nigeria - Data Protection Overview
,”
DataGuidance.
Jun.
2021
. [Online]. Available: https://www.dataguidance.com/notes/nigeria-data-protection-overview
63.
J.
Anyanwu
, “
The Nigeria Data Protection Regulation: KPMG NG
,”
KPMG. KPMG, Aug. 2019.
[Online]. Available: https://home.kpmg/ng/en/home/insights/2019/08/the-nigeria-data-protection-regulation.html
64.
A.
Sylla
, “
Data protection in Benin: ALB Article
,”
ALB Legal and Business Issues from Africa.
Global Legal Group. [Online]. Available: https://iclg.com/alb/10175-data-protection-in-benin
65.
E.
Djeki
,
J.
Degila
,
C.
Bondiombouy
, and
M. H.
Alhassan
, “
Preventive Measures for Digital Learning Spaces’ Security Issues
,” in
2022 IEEE Technology and Engineering Management Conference (TEMSCON EUROPE)
, Apr.
2022
, pp.
48
55
. doi: .
66.
S.
Al-Fedaghi
and
O.
Alsumait
, “
Towards a conceptual foundation for physical security: Case study of an it department
,”
Int. J. Saf. Secur. Eng.
, vol.
9
, no.
2
, pp.
137
156
,
2019
.
67.
Red
Hat
, “
What is different about cloud security
,”
Red Hat.
[Online]. Available: https://www.redhat.com/en/topics/security/cloud-security
68.
M. La
Polla
,
F.
Martinelli
, and
D.
Sgandurra
, “
A survey on security for mobile devices
,”
IEEE Commun. Surv. Tutor.
, vol.
15
, no.
1
, pp.
446
471
,
2012
.
69.
G.
Delac
,
M.
Silic
, and
J.
Krolo
, “
Emerging security threats for mobile platforms
,” in
2011 Proceedings of the 34th International Convention MIPRO
,
2011
, pp.
1468
1473
.
70.
S.
Gaw
and
E. W.
Felten
, “
Password management strategies for online accounts
,” in
Proceedings of the second symposium on Usable privacy and security
,
2006
, pp.
44
55
.
This content is only available via PDF.
You do not currently have access to this content.