AI-SEC-EDU Conceptual Framework: Securing E-Learning in Low-Income Countries’ Higher Education Institutions
Abstract
The evolving digital threat landscape, characterized by sophisticated AI-driven attacks, increasingly targets Higher Education Institutions (HEIs) through e-learning systems. This study introduces the AI-SEC-EDU framework to guide the integration of security controls and AI-enabled intelligence into cybersecurity strategies for e-learning platforms. The framework is based on a narrative review of existing cybersecurity interventions for e-learning in Low-Income Countries (LICs) and their approach to managing cybersecurity in the age of Artificial Intelligence. A search across four databases—ACM, Springer, ScienceDirect, and Google Scholar—in May 2025 identified 621 papers, of which eight met the inclusion criteria using PICO and PRISMA guidelines. The selected papers focused on cybersecurity in e-learning, discussing frameworks, models, and algorithms for platforms like Moodle, Google Classroom, and Coursera, some of which incorporate AI and open-source options. The study identifies three key security risk domains: technological infrastructure, human factors, and institutional governance, all of which are compounded by limited AI integration. Existing measures focus on system hardening but fail to address AI-based threat prediction and human behavior vulnerabilities. The AI-SEC model integrates AI, user awareness, and governance controls to provide adaptive, context-sensitive cybersecurity solutions for e-learning in LICs. This framework serves as a diagnostic and planning tool, aligning policies, institutional practices, and national strategies.
Downloads
References
S. T. Hossain, T. Yigitcanlar, K. Nguyen, and Y. Xu, "Local Government Cybersecurity Landscape: A Systematic Review and Conceptual Framework," Multidisciplinary Digital Publishing Institute (MDPI), Jul. 1, 2024, doi: 10.3390/app14135501.
D. Korać, B. Damjanović, and D. Simić, "A model of digital identity for better information security in e-learning systems," J. Supercomput., vol. 78, no. 3, pp. 3325–3354, Feb. 2022, doi: 10.1007/s11227-021-03981-4.
P. T. Mai and A. Tick, "Cyber Security Awareness and Behavior of Youth in Smartphone Usage: A Comparative Study between University Students in Hungary and Vietnam," 2021.
R. F. A. Hweidi and D. Eleyan, "Social Engineering Attack concepts, frameworks, and Awareness: A Systematic Literature Review," Int. J. Comput. Digit. Syst., vol. 20, 2021.
M. M. Maas, "Concepts in Advanced AI Governance: A Literature Review of Key Terms and Definitions," SSRN Electron. J., 2023, doi: 10.2139/ssrn.4612473.
R. Ouma, "Beyond ‘carrots’ and ‘sticks’ of online learning during the COVID-19 pandemic: A Case of Uganda Martyrs University," Cogent Educ., vol. 8, no. 1, 2021, doi: 10.1080/2331186X.2021.1974326.
H. M. Tusiime and N. E. Alemu, "Embracing E-Learning in Public Universities in Ethiopia and Uganda," Dec. 2023, doi: 10.14507/MCF-eLi.J2.
J. Holmes, O. R. Moraes, L. Rickards, W. Steele, M. Hotker, and A. Richardson, "Online learning and teaching for the SDGs – exploring emerging university strategies," Int. J. Sustain. High. Educ., Feb. 24, 2022, doi: 10.1108/IJSHE-07-2020-0278.
S. Milton, "Higher education and sustainable development goal 16 in fragile and conflict-affected contexts," High Educ. (Dordr.), 2020, doi: 10.1007/s10734-020-00617-z.
A. Mughaid, S. AlZu’bi, A. Hnaif, S. Taamneh, A. Alnajjar, and E. A. Elsoud, "An intelligent cyber security phishing detection system using deep learning techniques," Cluster Comput., vol. 25, no. 6, pp. 3819–3828, Dec. 2022, doi: 10.1007/s10586-022-03604-4.
J. A. Trivedi and A. Mehta, "Maslow’s Hierarchy of Needs-Theory of Human Motivation," 2019. [Online]. Available: www.raijmr.com.
M. Alier, M. J. Casañ Guerrero, D. Amo, C. Severance, and D. Fonseca, "Privacy and e-learning: A pending task," Sustainability (Switzerland), vol. 13, no. 16, Aug. 2021, doi: 10.3390/su13169206.
T. N. Ghezeljeh, R. Karimpour, S. Omrani, S. Haghani, and A. Emami, "The Effects of E-Learning on Patient Safety Culture in Emergency Nurses," J. Client-Centered Nurs. Care, vol. 7, no. 3, pp. 215–226, 2021, doi: 10.32598/JCCNC.7.3.378.1.
A. Bin Rashid and M. A. K. Kausik, "AI revolutionizing industries worldwide: A comprehensive overview of its diverse applications," Hybrid Adv., vol. 7, p. 100277, Dec. 2024, doi: 10.1016/j.hybadv.2024.100277.
R. R. Saqr, S. A. Al-Somali, and M. Y. Sarhan, "Exploring the Acceptance and User Satisfaction of AI-Driven e-Learning Platforms (Blackboard, Moodle, Edmodo, Coursera and edX): An Integrated Technology Model," Sustainability (Switzerland), vol. 16, no. 1, Jan. 2024, doi: 10.3390/su16010204.
I. U. Wada, G. O. Izibili, T. Babayemi, A. Abdulkareem, O. M. Macaulay, and A. Emadoye, "AI-driven cybersecurity in higher education: A systematic review and model evaluation for enhanced threat detection and incident response," World J. Adv. Res. Rev., vol. 25, no. 3, Mar. 2025, doi: 10.30574/wjarr.2025.25.3.0989.
A. Arif, M. I. Khan, A. Raza, and A. R. Khan, "An overview of cyber threats generated by AI," 2024.
H. El-Sofany, S. A. El-Seoud, O. H. Karam, B. Bouallegue, and A. M. Ahmed, "A proposed secure framework for protecting cloud-based educational systems from hacking," Egypt. Informatics J., vol. 27, Sep. 2024, doi: 10.1016/j.eij.2024.100505.
B. Guembe, A. Azeta, S. Misra, V. C. Osamor, L. Fernandez-Sanz, and V. Pospelova, "The Emerging Threat of AI-driven Cyber Attacks: A Review," 2022, Taylor and Francis Ltd., doi: 10.1080/08839514.2022.2037254.
Y. Zeng, "AI Empowers Security Threats and Strategies for Cyber Attacks," Procedia Comput. Sci., Elsevier B.V., 2022, pp. 170–175, doi: 10.1016/j.procs.2022.10.025.
F. Femi-Oyewole, V. Osamor, and D. Okunbor, "A Systematic Review of Social Engineering Attacks & Techniques: The Past, Present, and Future," in 2024 Int. Conf. Sci. Eng. Bus. Driving Sustain. Dev. Goals (SEB4SDG), IEEE, Apr. 2024, pp. 1–12, doi: 10.1109/SEB4SDG60871.2024.10629836.
M. H. Alsulami et al., "Measuring awareness of social engineering in the educational sector in the kingdom of Saudi Arabia," Inf. (Switzerland), vol. 12, no. 5, 2021, doi: 10.3390/info12050208.
A. Parsaei, "Awareness and Social Engineering-Based Cyberattacks," Int. J. Reliab. Risk Safety: Theory Appl., vol. 7, no. 1, pp. 31–36, 2024, doi: 10.22034/IJRRS.2024.7.1.4.
R. M. Abdulla, H. A. Faraj, C. O. Abdullah, A. H. Amin, and T. A. Rashid, "Analysis of Social Engineering Awareness Among Students and Lecturers," IEEE Access, vol. 11, pp. 101098–101111, 2023, doi: 10.1109/ACCESS.2023.3311708.
N. A. Karim and A. H. Ali, "E-learning virtual meeting applications: A comparative study from a cybersecurity perspective," Nov. 1, 2021, Inst. Adv. Eng. Sci., doi: 10.11591/ijeecs.v24.i2.pp1121-1129.
D.-N. Mihalache, "Assessing Web Security in E-Learning Systems," 2024.
A. Ahmad, "Improving Distance Learning Security using Machine Learning," J. Comput. Sci. Appl. Eng., vol. 1, no. 2, pp. 39–43, 2023.
L. Băjenaru, C. Gura, and I. Smeureanu, "Data Security Mechanisms of the Health E-learning System: Case Study," Romanian Cyber Sec. J., vol. 5, no. 2, pp. 103–115, Nov. 2023, doi: 10.54851/v5i2y202310.
M. Dandotiya, P. Rahi, A. Khunteta, A. Anushya, and S. S. Ahmad, "SAFE: A Secure Authenticated & Integrated Framework for E-learning," in ACM Int. Conf. Proceeding Ser., Assoc. Comput. Mach., Dec. 2022, doi: 10.1145/3590837.3590926.
A. Y. Eshetu, E. A. Mohammed, and A. O. Salau, "Cybersecurity vulnerabilities and solutions in Ethiopian university websites," J. Big Data, vol. 11, no. 1, Dec. 2024, doi: 10.1186/s40537-024-00980-z.
I. Parfonova and O. Zinchenko, "Countering Cyber Threats in the Context of Digital Educational Technologies in the Higher Education System of Ukraine," Sci. J. Polonia Univ., vol. 67, no. 6, pp. 230–238, Mar. 2025, doi: 10.23856/6729.
S. Salturk and N. Kahraman, "Deep learning-powered multimodal biometric authentication: integrating dynamic signatures and facial data for enhanced online security," Neural Comput. Appl., vol. 36, no. 19, pp. 11311–11322, Jul. 2024, doi: 10.1007/s00521-024-09690-2.
A. Srhir, T. Mazri, and M. Benbrahim, "Towards secure smart campus: security requirements, attacks and counter measures," Indonesian J. Electr. Eng. Comput. Sci., vol. 32, no. 2, pp. 900–914, Nov. 2023, doi: 10.11591/ijeecs.v32.i2.pp900-914.
S. A. L. Akacha and A. I. Awad, "Enhancing Security and Sustainability of e-Learning Software Systems: A Comprehensive Vulnerability Analysis and Recommendations for Stakeholders," Sustainability (Switzerland), vol. 15, no. 19, Oct. 2023, doi: 10.3390/su151914132.
H. Taherdoost, "Understanding Cybersecurity Frameworks and Information Security Standards—A Review and Comprehensive Overview," Jul. 1, 2022, MDPI, doi: 10.3390/electronics11142181.
A. A. S. Al-Sherideh, K. Maabreh, M. Maabreh, M. R. Al Mousa, and M. Asassfeh, "Assessing the impact and effectiveness of cybersecurity measures in e-learning on students and educators: A case study," Int. J. Adv. Comput. Sci. Appl., vol. 14, no. 5, pp. 158–164, 2023.
T. F. Babajide, "Cybersecurity Challenges in the Age of AI: Theoretical Approaches and Practical Solutions," Comput. Sci. IT Res. J., vol. 5, no. 3, pp. 703–724, Mar. 2024, doi: 10.51594/csitrj.v5i3.930.
ISACA, "HCL-ISACA-State-of-Cybersecurity-2021-Part-2," 2021.
S. Sukumaran Nair, "Securing Against Advanced Cyber Threats: A Comprehensive Guide to Phishing, XSS, and SQL Injection Defense," 2024, doi: 10.32996/jcsts.
W. Syafitri, Z. Shukur, U. A. Mokhtar, R. Sulaiman, and M. A. Ibrahim, "Social Engineering Attacks Prevention: A Systematic Literature Review," IEEE Access, vol. 10, pp. 39325–39343, 2022, doi: 10.1109/ACCESS.2022.3162594.
Z. Wang, H. Zhu, and L. Sun, "Social engineering in cybersecurity: Effect mechanisms, human vulnerabilities and attack methods," IEEE Access, vol. 9, pp. 11895–11910, 2021, doi: 10.1109/ACCESS.2021.3051633.
J. O'Brien, S. Ee, and Z. Williams, "Deployment corrections: An incident response framework for frontier AI models," arXiv preprint arXiv:2310.00328, 2023.
S. Ee, J. O'Brien, Z. Williams, A. El-Dakhakhni, M. Aird, and A. Lintz, "Adapting cybersecurity frameworks to manage frontier AI risks: A defense-in-depth approach," arXiv preprint arXiv:2408.07933, 2024.
S. Metta, I. Chang, J. Parker, M. P. Roman, and A. F. Ehuan, "Generative AI in cybersecurity," arXiv preprint arXiv:2405.01674, 2024.
M. Anderljung, J. Barnhart, A. Korinek, J. Leung, C. O'Keefe, J. Whittlestone, and K. Wolf, "Frontier AI regulation: Managing emerging risks to public safety," arXiv preprint arXiv:2307.03718, 2023.
F. Jimmy, "Emerging Threats: The Latest Cybersecurity Risks and the Role of Artificial Intelligence in Enhancing Cybersecurity Defenses," Int. J. Sci. Res. Manage., vol. 9, no. 02, pp. 564–574, Feb. 2021, doi: 10.18535/ijsrm/v9i2.ec01.
M. Anderljung, J. Barnhart, A. Korinek, J. Leung, C. O'Keefe, J. Whittlestone, and K. Wolf, "Frontier AI regulation: Managing emerging risks to public safety," arXiv preprint arXiv:2307.03718, 2023.
N. S. Fouad, "Securing Higher Education Against Cyberthreats: From an Institutional Risk to a National Policy Challenge," J. Cyber Policy, vol. 6, no. 2, pp. 137–154, May 2021, doi: 10.1080/23738871.2021.1973526.
Leonardo R, "Evidence Based Medicine and Practice," Evid. Based Med., 2018, doi: 10.4172/2471-9919.1000115.
I. Kalaycioglu, B. Rioux, J. N. Briard, A. Nehme, L. Touma, B. Dansereau, and M. R. Keezer, "Inter-rater reliability of risk of bias tools for non-randomized studies," Systematic Reviews, vol. 12, no. 1, p. 227, 2023.
Abstract views: 53 times
Download PDF: 28 times
Copyright (c) 2025 Journal of Information Systems and Informatics

This work is licensed under a Creative Commons Attribution 4.0 International License.
- I certify that I have read, understand and agreed to the Journal of Information Systems and Informatics (Journal-ISI) submission guidelines, policies and submission declaration. Submission already using the provided template.
- I certify that all authors have approved the publication of this and there is no conflict of interest.
- I confirm that the manuscript is the authors' original work and the manuscript has not received prior publication and is not under consideration for publication elsewhere and has not been previously published.
- I confirm that all authors listed on the title page have contributed significantly to the work, have read the manuscript, attest to the validity and legitimacy of the data and its interpretation, and agree to its submission.
- I confirm that the paper now submitted is not copied or plagiarized version of some other published work.
- I declare that I shall not submit the paper for publication in any other Journal or Magazine till the decision is made by journal editors.
- If the paper is finally accepted by the journal for publication, I confirm that I will either publish the paper immediately or withdraw it according to withdrawal policies
- I Agree that the paper published by this journal, I transfer copyright or assign exclusive rights to the publisher (including commercial rights)














