scholarly journals Exploring The Correlation between Cyber Security Awareness, Protection Measures and the State of Victimhood: The Case Study of Ambo University’s Academic Staffs

Author(s):  
Bayisa Kune Mamade ◽  
Diriba Mangasha Dabala

The advancement of information communication technology has triggered a revolution in using the Internet for legitimate educational purposes on university campuses. Therefore, the Internet has changed the way of human communication and contributed to the development of mankind. On the other hand it is regrettable that its revolution has helped malicious users to exploit it for the malign purpose to commit a cyberspace crime that has in turn negatively affected fellow users who were preyed on by cyber predators. This work aimed to examine the awareness of cybersecurity, the measures taken to protect against cyberattacks and the state of victimization among professors at Ambo University. Thus, the present study comes up with the following findings. First, the result shows that the respondents’ cybersecurity awareness was significantly influenced by cyber-crime victimization, fields of study, and protection measures. Second, the current study also depicts that the respondents’ protection measures were connected to and influenced by cyber-crime victimization, education level, and cyber-security awareness. Finally, the study’s findings show that being a cyber-crime victim has been linked to predictors’ variables: protection measures and the level of cybersecurity awareness.

2014 ◽  
Vol 52 ◽  
Author(s):  
Noluxolo Kortjan ◽  
Rossouw Von Solms

The Internet is becoming increasingly interwoven in the daily lives of many individuals, organisations and nations. It has, to a large extent, had a positive effect on the way people communicate. It has also introduced new avenues for business; and it has offered nations an opportunity to govern online. Nevertheless, although cyberspace offers an endless list of services and opportunities, it is also accompanied by many risks, of which many Internet users are not aware. As such, various countries have developed and implemented cyber-security awareness and education measures to counter the perceived ignorance of the Internet users. However, there is currently a definite lack in South Africa (SA) in this regard; as there are currently, little government-led and sponsored cyber-security awareness and education initiatives. The primary research objective of this paper, therefore, is to propose a cyber-security awareness and education framework for SA that would assist in creating a cyber-secure culture in SA among all of the users of the Internet. This framework will be developed on the basis of key factors extrapolated from a comparative analysis of relevant developed countries.


2017 ◽  
pp. 251
Author(s):  
Е. И. Наумова

This article is about the problem of conflict in the frame of the formation and development postcapitalist tendencies in society. The result of the introduction of digital technologies in economic is the formation of a number of new types of products — information, knowledge, communication. The non-material type of the product doesn’t keep within the settled and a little mobile laws of material economy, that’s why the law of cost and the law of the surplus value need revision. The Internet as a platform for free exchange and distribution of information and knowledges appears the place of deployment of the conflicts between capitalist monopoles, the state and Internet users. It doesn’t exist accurate criteria, methodology and the theory which allow to create a clear boundary between «piracy» and the possibility of free distribution of information in network space. The ideology of Open Source calls into the question copyright and creates prerequisites for revision of the intellectual property rights concerning a digital product. Monetization of knowledge, information, communication in digital space conducts to the fact that the Internet becomes the additional platform for the generation of profit for the monopolistic corporations. Whereas there is a possibility for using an Internet platform as powerful resource for cooperation, mutual aid and collective production of innovations necessary for development of society. The conflict between capitalist corporations, the state and users can be resolved in case of revision the economic and precepts of law in relation to the digital space with the purpose to draw line between lawful and illegal distribution of non-material products, having kept an opportunity for creative and free using the Internet platform as a resource of social production of the innovations.


Author(s):  
Viacheslav Izosimov ◽  
Martin Törngren

Our societal infrastructure is transforming into a connected cyber-physical system of systems, providing numerous opportunities and new capabilities, yet also posing new and reinforced risks that require explicit consideration. This chapter addresses risks specifically related to cyber-security. One contributing factor, often neglected, is the level of security education of the users. Another factor, often overlooked, concerns security-awareness of the engineers developing cyber-physical systems. Authors present results of interviews with developers and surveys showing that increase in security-awareness and understanding of security risks, evaluated as low, are the first steps to mitigate the risks. Authors also conducted practical evaluation investigating system connectivity and vulnerabilities in complex multi-step attack scenarios. This chapter advocates that security awareness of users and developers is the foundation to deployment of interconnected system of systems, and provides recommendations for steps forward highlighting the roles of people, organizations and authorities.


10.29007/3xgx ◽  
2019 ◽  
Author(s):  
Nthabiseng Modiba ◽  
Sunday Ojo ◽  
Zenzo Ncube

The internet has become a crucial part of our everyday lives so it is important to ensure that one is secure when surfing on it since personal information can be exchanged. Cyber security awareness is the key to internet security. The research discussed in this paper aims to develop an ontology model for cyber security awareness for educational purposes, to enable users to take responsibility for their own safety online. It aims to fill a gap in understanding of the cyber security awareness (CSA) education and to bridge the consensus gap between the Body of Knowledge (BoK) contributors. The research study was conducted using CURONTO (which is a curriculum ontology) model, to develop our CSA education ontology model that we propose. There are many attempts being made to allow for CSA education, but there remains a challenge of lack of consensus or common understanding of the CSA body of knowledge. There is need for a common model and format aimed at bringing together and putting in place, measures to address cybersecurity attacks. This will assist organizations and countries to close the gap and difference in the available CSA information globally, and to especially assist countries and organizations that are still developing cybersecurity protection measures, to have the information that they need readily available (Takahashi, Kadobayashi, 2011). We used an ontology because it will also be available to the academic community also to refine, extend or apply to other domains and also an ontology is both sharable and interoperable. In this paper we used the CURONTO model to develop our CSA ontology model for educational purposes, we expanded the one class of the model called syllabus and we added more classes so that it can serve for the CSA education. Then we did a literature study to develop a CSA syllabus from, the acquired syllabus was then represented in the model.


2022 ◽  
pp. 1-30
Author(s):  
Viacheslav Izosimov ◽  
Martin Törngren

Our societal infrastructure is transforming into a connected cyber-physical system of systems, providing numerous opportunities and new capabilities, yet also posing new and reinforced risks that require explicit consideration. This chapter addresses risks specifically related to cyber-security. One contributing factor, often neglected, is the level of security education of the users. Another factor, often overlooked, concerns security-awareness of the engineers developing cyber-physical systems. Authors present results of interviews with developers and surveys showing that increase in security-awareness and understanding of security risks, evaluated as low, are the first steps to mitigate the risks. Authors also conducted practical evaluation investigating system connectivity and vulnerabilities in complex multi-step attack scenarios. This chapter advocates that security awareness of users and developers is the foundation to deployment of interconnected system of systems, and provides recommendations for steps forward highlighting the roles of people, organizations and authorities.


2020 ◽  
Vol 1 (6) ◽  
pp. 425-435
Author(s):  
Sulkhanul Umam

Everybody needs internet, so does SMEs, but the internet likes a knife. If wrong, can be injure users. so users must care about security in using the internet. This is called the cybersecurity awareness. a person's actions are influenced by perceptions and perceptions appear to be motivated by an ethical orientation. so it is important to examine whether there are differences in cybersecurity awareness that are motivated by ethical orientations. This study conducted in Bantul, Yogyakarta with study subjects were 59 SMEs. The test results to see differences in awareness using the Mann Whitney test show that there is no difference regarding cyber security awareness, both in individuals with an ethical orientation of idealism and relativism. Cyber ​​security awareness is absolutely necessary so that users avoid every crime that exists.


Author(s):  
Sunil. C. Pawar ◽  
R. S. Mente ◽  
Bapu. D. Chendage

Cyberspace is a domain that uses the electronic and electromagnetic spectrum to store, modify, and exchange data through network and system-related physical infrastructures. Cyberspace is an endless space known as the Internet. Computer transactions, especially transactions between different computers, can be viewed as a space. Images and text on the Internet exist in cyberspace. The term is used in conjunction with virtual reality, giving the name of the imaginary place where a virtual object exists. If a computer creates a picture of a building that allows the architect to "walk in" and see what the nature of a design is, the building is said to be in cyberspace.Cybercrime is a series of organized criminal attack cyberspace and cyber security. Cybercrime such as Hacking into computer,this can be through a network system and clicking on unfamiliar links connecting to unrecognized Wi-Fi, downloading software and files to unsafe sites, consuming energy, electromagnetic radiation waves, and more. Cyber security is a serious problem and must be taken seriously as it has become a national concern. Currently, most electronic devices such as computers, laptops and cell phones come with built-in firewall security software, but even so, computers are not 100 percent accurate and reliable in protecting our data.


Author(s):  
Ali Hussein Saleh Zolait ◽  
Abdul Razak Ibrahim ◽  
Ahmad Farooq

This study examines the use of the Internet for business purposes in Yemen, where main sectors of banking and private trade organizations are observed. Through interviews, a thorough study is performed concerning the Internet facilities available in Yemen, the literacy and use of Information Communication Technology (ICT) in organizations, the level of e-commerce adopted, the main hurdles in the adoption of e-commerce, and measures required to increase the adoption of e-commerce. The study finds that both organizations realize the importance of e-commerce for their business. The main causes in the delay of e-commerce adoption by some are the discrepancies in the infrastructure, high costing of the Internet facilities, bureaucratic hurdles in obtaining the facilities, and the non-availability of a secure environment. Beyond concerns about Internet security, their awareness of security hazards and protection measures is minimal. In light of the data collected, the study has come up with certain recommendations for the interested authorities to improve e-commerce in Yemen.


2010 ◽  
Vol 1 (3) ◽  
pp. 34-47 ◽  
Author(s):  
Ali Hussein Saleh Zolait ◽  
Abdul Razak Ibrahim ◽  
Ahmad Farooq

This study examines the use of the Internet for business purposes in Yemen, where main sectors of banking and private trade organizations are observed. Through interviews, a thorough study is performed concerning the Internet facilities available in Yemen, the literacy and use of Information Communication Technology (ICT) in organizations, the level of e-commerce adopted, the main hurdles in the adoption of e-commerce, and measures required to increase the adoption of e-commerce. The study finds that both organizations realize the importance of e-commerce for their business. The main causes in the delay of e-commerce adoption by some are the discrepancies in the infrastructure, high costing of the Internet facilities, bureaucratic hurdles in obtaining the facilities, and the non-availability of a secure environment. Beyond concerns about Internet security, their awareness of security hazards and protection measures is minimal. In light of the data collected, the study has come up with certain recommendations for the interested authorities to improve e-commerce in Yemen.


Sign in / Sign up

Export Citation Format

Share Document