scholarly journals A conceptual framework for cyber security awareness and education in SA

2014 ◽  
Vol 52 ◽  
Author(s):  
Noluxolo Kortjan ◽  
Rossouw Von Solms

The Internet is becoming increasingly interwoven in the daily lives of many individuals, organisations and nations. It has, to a large extent, had a positive effect on the way people communicate. It has also introduced new avenues for business; and it has offered nations an opportunity to govern online. Nevertheless, although cyberspace offers an endless list of services and opportunities, it is also accompanied by many risks, of which many Internet users are not aware. As such, various countries have developed and implemented cyber-security awareness and education measures to counter the perceived ignorance of the Internet users. However, there is currently a definite lack in South Africa (SA) in this regard; as there are currently, little government-led and sponsored cyber-security awareness and education initiatives. The primary research objective of this paper, therefore, is to propose a cyber-security awareness and education framework for SA that would assist in creating a cyber-secure culture in SA among all of the users of the Internet. This framework will be developed on the basis of key factors extrapolated from a comparative analysis of relevant developed countries.

Author(s):  
Viacheslav Izosimov ◽  
Martin Törngren

Our societal infrastructure is transforming into a connected cyber-physical system of systems, providing numerous opportunities and new capabilities, yet also posing new and reinforced risks that require explicit consideration. This chapter addresses risks specifically related to cyber-security. One contributing factor, often neglected, is the level of security education of the users. Another factor, often overlooked, concerns security-awareness of the engineers developing cyber-physical systems. Authors present results of interviews with developers and surveys showing that increase in security-awareness and understanding of security risks, evaluated as low, are the first steps to mitigate the risks. Authors also conducted practical evaluation investigating system connectivity and vulnerabilities in complex multi-step attack scenarios. This chapter advocates that security awareness of users and developers is the foundation to deployment of interconnected system of systems, and provides recommendations for steps forward highlighting the roles of people, organizations and authorities.


Author(s):  
Xichen Zhang ◽  
Ali A. Ghorbani

Over recent years, the extensive development of information technology has dramatically advanced the way that people use the internet. The fast growth of the internet of things and mobile crowdsensing applications raise challenging security and privacy issues for the society. More often than before, malicious attackers exploit human vulnerability as the weakest link to launch cyberattacks and conduct fraudulent online activities. How to profile users' daily behavior becomes an essential component for identifying users' vulnerable/malicious level and predicting the potential cyber threats. In this chapter, the authors discuss human factors and their related issues in cyber security and privacy. Three categories of human behaviors—desktop behavior, mobile behavior, and online behavior—and their corresponding security and privacy issues are demonstrated in detail to estimate the vulnerabilities of internet users. Some future directions related to human-factor based security and privacy issues are proposed at the end of this chapter.


2018 ◽  
Vol 13 ◽  
pp. 3288-3300
Author(s):  
Rudy Agus Gemilang Gultom ◽  
Asep Adang Supriyadi ◽  
Tatan Kustana

Nowadays, the extremism, radicalism and terrorism groups have taken advantages the use of Internet access to support their activities, i.e, member recruitment, propaganda, fundraising, cyberattack actions against their targets, etc. This is one of the issues of cyber security as a negative impact of internet utilization especially by the extremism, radicalism and terrorism groups. They know the benefits of the internet services and social media can be used to facilitate the control of information in their organizational command and control system.  In order to tackle this cyber security issue, the internet users in Association of Southeast Asian Nations (ASEAN) member countries should get more understanding as well as protection from their government against the danger of cyber extremism, cyber radicalism or cyber terrorism activities over the Internet. Therefore, this paper tries to explain the need of an ASEAN Cyber Security Framework standard in order to countering cyber terrorism activities via Internet as well as introducing the initial concept of Six-Ware Cyber Security Framework (SWCSF). 


2021 ◽  
Vol 4 (4) ◽  
pp. 1-9
Author(s):  
Kurihara Y ◽  

IT (Information Technology) was invented and penetrated into our daily lives and business world from the 1980s. It has also spread quickly in developed economies. This study examines whether such phenomenon has impacted international trade. More concretely, this study empirically examines the relationship (1) between the improvement of banking and financial services and international trade, (2) between the Internet speed and international trade, and (3) mobile subscribers and international trade. The empirical results show that GDP per capita is positively related with international trade significantly. Moreover, they show that banking and financial services can increase international trade. Also, Internet speed is significantly associated with promoting international trade. However, there is no evidence that the spreading use of mobile has caused increasing international trade. If the pros of the spreading use of mobile related IT are large, there is some room for promoting this transition. Security, reliability, and so on are key factors to promote mobile into business, including international trade.


MEDIAGRO ◽  
2019 ◽  
Vol 14 (01) ◽  
Author(s):  
Hilmi Arija Fachriyan ◽  
I Putu Eka Wijaya

Economic activity is currently entering an era called the era of digital economy. Digital economy involves the process of e-business or e-commerce that utilizes the internet network. The rapid growth of internet users in Indonesia has affected the agribusiness sector to adopt e-commerce called e-agribusiness.In line with the development of the internet, a new understanding of electronic marketing paradigm in e-agribusiness in the form of e-marketplace. Some agribusiness e-marketplace sites have been born in Indonesia such as "agromaret.com", "kecipir.com", "limakilo.id", and "agribisnispedia.com". These five agribusiness e-marketplaces each have their own characteristics, advantages and disadvantages. Basically, the success of an e-marketplace depends heavily on the level of involvement of the participating participants. The lack of e-marketplace reliability is often criticized as one of the key factors that reduce the confidence of sellers or buyers to participate. The process of maturing the e-marketplace is needed to influence the user's perception of the quality of the technical service, the quality of the content service and the quality of customer service. Therefore, there is pressure on the provider side to improve the quality of its services and offer something unique above industry standards to achieve a competitive advantage over other agribusiness e-marketplaces. Keywords:e-commerce, e-agribusiness, e-marketplace.


2021 ◽  
Author(s):  
◽  
Kyle Gibson

<p>This research explores the level of security awareness, of domestic Internet users in New Zealand. Awareness and online security are the top priorities of the New Zealand Cyber Security Strategy, but little research has been conducted to gauge the current level of security awareness in context with common mitigation strategies. The majority of the literature on the subject is primarily focused on organisational technology security and awareness so this had to be put in context with domestic users. A sample set of Facebook friends of the researcher were asked to respond to an online survey. The survey explored the respondents' attitude and selfevaluated level of security awareness, and their awareness of a subset of mitigation strategies from the Australian Defence Signals Directorates' 'Strategies to Mitigate Targeted Cyber Intrusions'. The respondents demonstrated a good level of security awareness regarding patching and anti-virus, but there is a need for more education regarding access control and social engineering.</p>


2022 ◽  
pp. 1-30
Author(s):  
Viacheslav Izosimov ◽  
Martin Törngren

Our societal infrastructure is transforming into a connected cyber-physical system of systems, providing numerous opportunities and new capabilities, yet also posing new and reinforced risks that require explicit consideration. This chapter addresses risks specifically related to cyber-security. One contributing factor, often neglected, is the level of security education of the users. Another factor, often overlooked, concerns security-awareness of the engineers developing cyber-physical systems. Authors present results of interviews with developers and surveys showing that increase in security-awareness and understanding of security risks, evaluated as low, are the first steps to mitigate the risks. Authors also conducted practical evaluation investigating system connectivity and vulnerabilities in complex multi-step attack scenarios. This chapter advocates that security awareness of users and developers is the foundation to deployment of interconnected system of systems, and provides recommendations for steps forward highlighting the roles of people, organizations and authorities.


2014 ◽  
Vol 39 (4) ◽  
pp. 423-437
Author(s):  
Bharti Varshney ◽  
Prashant Kumar ◽  
Vivek Sapre ◽  
Sanjeev Varshney

The study seeks to investigate the Internet usage habits among the online population in India. It intends to confirm if respondents differed on the basis of demographic variables such as age, gender, occupation and city/town tier. Based on primary research, the present study examines the differential effects of demographic variables on various online activities, their usage frequency and duration. The study proposes a possible segmentation of Internet users and a classification of Internet activities. K-mean cluster analysis and one-way analysis of variance (ANOVA) have been used to capture the same. The results suggest that activity-wise usage and duration of Internet usage vary with age, occupation and city/town tier of the respondents, but not much with gender. The factor analysis suggested grouping the dependent usage and activity variables into five major factors. The article would be helpful for the Internet service providers in segmenting the Internet users and enhancing the scholars’ understanding of effect of given demographic variables on Internet usage.


2020 ◽  
Vol 1 (6) ◽  
pp. 425-435
Author(s):  
Sulkhanul Umam

Everybody needs internet, so does SMEs, but the internet likes a knife. If wrong, can be injure users. so users must care about security in using the internet. This is called the cybersecurity awareness. a person's actions are influenced by perceptions and perceptions appear to be motivated by an ethical orientation. so it is important to examine whether there are differences in cybersecurity awareness that are motivated by ethical orientations. This study conducted in Bantul, Yogyakarta with study subjects were 59 SMEs. The test results to see differences in awareness using the Mann Whitney test show that there is no difference regarding cyber security awareness, both in individuals with an ethical orientation of idealism and relativism. Cyber ​​security awareness is absolutely necessary so that users avoid every crime that exists.


Author(s):  
Martin A. Negrón

The demographics of the Internet will experience significant changes in the near future. The developed countries are maximizing the number of citizens connected to the network while the developing countries, with the majority of the global population, increase their presence as the information technologies become more accessible. Leaders from the developed countries advocate the preservation of existing governance organizations regulating the network, such as the Internet Corporation for Assigned Names and Numbers (ICANN), on the basis of stability and security. New generations of Internet users are demanding new structures based on transparency, participation, accountability and legitimacy. In the absence of new agreements, uncoordinated changes to the existing governance structure could potentially affect the technical structure of the network and its functionality. Employing a Bayesian Belief Network model, this chapter analyzes the correlation between demographics, socio-economic factors and the feasibility of changes to the existing Internet governance structure. Favorable change conditions could initiate changes that could impact all Internet users. Results demonstrate that even when conditions for radical changes that could fragment the network are not present within the timeframe evaluated, conditions in support of changes increase with time, validating a need to modify the existing governance structure.


Sign in / Sign up

Export Citation Format

Share Document