Perception of Information Security in the Process of Distance Learning During the COVID-19 Pandemic on the Example of University Teachers’ Experiences


The COVID-19 pandemic has greatly affected every area of our lives. One of them was education, which had to undergo a huge transformation in a very short time. Overnight, the computer replaced the blackboard and became the only tool of communication between a student and a teacher. Teachers had to completely change the tools used in the teaching process and enter a completely new and, for many of them completely unknown, working environment. Online learning has replaced traditional teaching. A computer with Internet access has become a basic work tool for people who have so far used it mainly for recreational purposes. Teachers were thrown in at the deep end, for most of themit was the first time they had encountered platforms for remote communication.
As the workspace has changed, learners and teachers have begun to move much more frequently into the world of the Internet, which harbors many dangers of which quite a few people were previously unaware. For this reason, the authors decided to investigate the problem of information security in e-learning. This paper attempts to collect the experiences and assess the awareness of university teachers about information security threats while teaching during the COVID-19 pandemic. The research results presented in this paper showed that the level of awareness of the risks, that may affect academic teachers in the distance learning process, is very low. Additionally, no appropriate procedures for safe distance learning have been developed. The communication security area was practically completely overlooked during the COVID-19 educational  revolution.


distance learning; Covid-19 pandemic; distance learning security; information safety; Internet threats

Amiri, I.S., & Akanbi, O.A. (2015). A Machine-Learning Approach to Phishing Detection and Defense, Waltham, Elsevier, ISBN 9780128029466.

Beaman C., Barkworth A., Akande T., Hakak S., & Khan M., (2021), Ransomware: Recent advances, analysis, challenges and future research directions, Computers & Security, 111, ISSN 0167-4048, DOI: 10.1016/j.cose.2021.102490.

Bentkowski, M. (2021). Generowanie łatwych do zapamietania haseł z wykorzystaniem łańcuchów Markowa (Generating easy-to-remember passwords using Markov strings), retrieved from (accessed 15.08.2021).

Formosa, P., Wilson, M., & Richards, D., (2021), A principlist framework for cybersecurity ethics, Computers & Security, 109, ISSN 0167-4048, DOI: 10.1016/j.cose.2021.102382.

Giza M. (2021). Przegląd ataków na polskich internautów (6–19.09.2021 r.) [Overview of attacks on Polish internet users], Retrieved from (accessed 21.09.2021).

Information technology ‒ Security techniques ‒ Information security management systems ‒ Overview and vocabulary PN-EN ISO/IEC 27000:2018.

Jakieła J., & Wójcik J., (2018). Przegląd problemów bezpieczeństwa informacji oraz prywatności w akademickim nauczaniu na odległość. [Review of information security and privacy issues in academic distance learning], Zeszyty Naukowe Uniwersytetu Ekonomicznego w Katowicach [In Polish], 355: 31-44, ISSN 2083-8611.

Kaspersky Security Awareness (2021). Training programs to help you build a cybersafe organization. Retrived from (accessed 9.09.2021).

Liderman, K. (2008). Analiza ryzyka i ochrona informacji w systemach komputerowych (Riskanalysis and information protection in computer systems), Warszawa, PWN, ISBN 9788301153700.

Liderman, K. (2017). Bezpieczeństwo informacyjne (Information security), Warszawa, PWN, ISBN 9788301175009.

McGahagan, J., Bhansali, D. Pinto-Coelho, C. & Cukier, M. (2021), Discovering features for detecting malicious websites: An empirical study, Computers & Security, 109, DOI: 10.1016/j.cose.2021.102374.

Ponemon Institute Report (2020). Cost of a Data Breach Report 2020 IBM, Retrieved from (accessed17.09.2021).

Ring, M., Schlör, D., Wunderlich, S., Landes, D. & Hotho, A. (2021). Malware detection on Windows Audit Logs using LSTMs. Computers & Security. 109. DOI: 102389. 10.1016/j.cose.2021.102389.

Scerbakov, A., Scerbakov, N. & Kappe, F. (2019). Security Vulnerabilities in Modern LMS, DOI: 10.33965/el2019_201909C038.

Skoudis, E., & Zeltser, L. (2004). Malware: Fighting Malicious Code, Pearson Education, Saddle River. ISBN 9780131014053

The National Cyber Security Centre (2021). Reducing your exposure to cyber-attack, Retrieved from (accessed 17.09.2021).

Verizon Report (2020). Data Breach Investigations Report 2020, Retrieved from (accessed 9.09.2021)

Wiener, G. (2019). Cyberterrorism and Ransomware Attacks, New York, Greenhaven Publishing. ISBN 9781534503403

Woźniak-Zapór, M. (2016). Zarządzanie bezpieczeństwem informacji – metody przeciwdziałania zagrożeniom bezpieczeństwa informacji na platformie e-learningowej [Information security management ‒ methods of counter acting information security threats on the e-learning platform], Bezpieczeństwo. Teoria i praktyka [In Polish], 4: 87-97, ISSN2451-0718.

Yuste, J. & Pastrana, S. (2021). Avaddon ransomware: an in-depth analysis and decryption of infected systems. Computers & Security, 109, DOI:10.1016/j.cose.2021.102388


Published : 2021-12-31

KubackaA., BiałyD., & GołąbR. (2021). Perception of Information Security in the Process of Distance Learning During the COVID-19 Pandemic on the Example of University Teachers’ Experiences. International Journal of Research in E-Learning, 7(2), 1-18.

Agnieszka Kubacka 
Carpathian State College in Krosno  Poland
Daniel Biały 
Carpathian State College in Krosno  Poland
Radosław Gołąb 
Carpathian State College in Krosno  Poland

Creative Commons License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

The Copyright Owners of the submitted texts grant the Reader the right to use the pdf documents under the provisions of the Creative Commons 4.0 International License: Attribution-Share-Alike (CC BY SA). The user can copy and redistribute the material in any medium or format and remix, transform, and build upon the material for any purpose.

1. License

The University of Silesia Press provides immediate open access to journal’s content under the Creative Commons BY-SA 4.0 license ( Authors who publish with this journal retain all copyrights and agree to the terms of the above-mentioned CC BY-SA 4.0 license.

2. Author’s Warranties

The author warrants that the article is original, written by stated author/s, has not been published before, contains no unlawful statements, does not infringe the rights of others, is subject to copyright that is vested exclusively in the author and free of any third party rights, and that any necessary written permissions to quote from other sources have been obtained by the author/s.

If the article contains illustrative material (drawings, photos, graphs, maps), the author declares that the said works are of his authorship, they do not infringe the rights of the third party (including personal rights, i.a. the authorization to reproduce physical likeness) and the author holds exclusive proprietary copyrights. The author publishes the above works as part of the article under the licence "Creative Commons Attribution-ShareAlike 4.0 International".

ATTENTION! When the legal situation of the illustrative material has not been determined and the necessary consent has not been granted by the proprietary copyrights holders, the submitted material will not be accepted for editorial process. At the same time the author takes full responsibility for providing false data (this also regards covering the costs incurred by the University of Silesia Press and financial claims of the third party).

3. User Rights

Under the CC BY-SA 4.0 license, the users are free to share (copy, distribute and transmit the contribution) and adapt (remix, transform, and build upon the material) the article for any purpose, provided they attribute the contribution in the manner specified by the author or licensor.

4. Co-Authorship

If the article was prepared jointly with other authors, the signatory of this form warrants that he/she has been authorized by all co-authors to sign this agreement on their behalf, and agrees to inform his/her co-authors of the terms of this agreement.

I hereby declare that in the event of withdrawal of the text from the publishing process or submitting it to another publisher without agreement from the editorial office, I agree to cover all costs incurred by the University of Silesia in connection with my application.