scholarly journals Comparing Three Countries’ Higher Education Students’ Cyber Related Perceptions and Behaviours during COVID-19

Electronics ◽  
2021 ◽  
Vol 10 (22) ◽  
pp. 2865
Author(s):  
Andrea Tick ◽  
Desireé J. Cranfield ◽  
Isabella M. Venter ◽  
Karen V. Renaud ◽  
Rénette J. Blignaut

In 2020, a global pandemic led to lockdowns, and subsequent social and business restrictions. These required overnight implementation of emergency measures to permit continued functioning of vital industries. Digital technologies and platforms made this switch feasible, but it also introduced several cyber related vulnerabilities, which students might not have known how to mitigate. For this study, the Global Cyber Security Index and the Cyber Risk literacy and education index were used to provide a cyber security context for each country. This research project—an international, cross-university, comparative, quantitative project—aimed to explore the risk attitudes and concerns, as well as protective behaviours adopted by, students at a South African, a Welsh and a Hungarian University, during the pandemic. This study’s findings align with the relative rankings of the Oliver Wyman Risk Literacy and Education Index for the countries in which the universities reside. This study revealed significant differences between the student behaviours of students within these universities. The most important differences were identified between students’ risk attitudes and concerns. It was also discovered that South African students reported having changed their protective online behaviours to the greatest extent, since the pandemic commenced. Recommendations are made suggesting that cyber security training and education, as well as improving the digital trust and confidence in digital platforms, are critical.

1971 ◽  
Vol 32 (1) ◽  
pp. 135-141 ◽  
Author(s):  
Harald-Edwin Schmidt

The Famous Sayings test consists of four measures: (CM) Conventional Mores, (HO) Hostility, (FF) Fear of Failure, and (SA) Social Acquiescence. The test was applied to two samples of South African students, 338 College of Education students whose data were analyzed according to sex, education and age; and a nearly all male group of 110 first-year students of the Department of Architecture, whose data were combined for analysis. The mean scores for each total group on two of the four scales, CM and SA, were considerably higher for the college group. The correlations among four scales for the two groups were similar and significant ( p ≤ .01). The item-analyses (internal consistency) performed for both groups show similar reliability coefficients for CM and SA but lower reliability for College of Education group on FF and HO. On the whole, the measures are sufficiently reliable and independent for screening purposes.


Author(s):  
Petar Radanliev ◽  
David De Roure ◽  
Kevin Page ◽  
Max Van Kleek ◽  
Omar Santos ◽  
...  

AbstractMultiple governmental agencies and private organisations have made commitments for the colonisation of Mars. Such colonisation requires complex systems and infrastructure that could be very costly to repair or replace in cases of cyber-attacks. This paper surveys deep learning algorithms, IoT cyber security and risk models, and established mathematical formulas to identify the best approach for developing a dynamic and self-adapting system for predictive cyber risk analytics supported with Artificial Intelligence and Machine Learning and real-time intelligence in edge computing. The paper presents a new mathematical approach for integrating concepts for cognition engine design, edge computing and Artificial Intelligence and Machine Learning to automate anomaly detection. This engine instigates a step change by applying Artificial Intelligence and Machine Learning embedded at the edge of IoT networks, to deliver safe and functional real-time intelligence for predictive cyber risk analytics. This will enhance capacities for risk analytics and assists in the creation of a comprehensive and systematic understanding of the opportunities and threats that arise when edge computing nodes are deployed, and when Artificial Intelligence and Machine Learning technologies are migrated to the periphery of the internet and into local IoT networks.


2021 ◽  
Vol 11 (4) ◽  
pp. 177
Author(s):  
Brantina Chirinda ◽  
Mdutshekelwa Ndlovu ◽  
Erica Spangenberg

The COVID-19 global pandemic widely affected education across the world and engendered unprecedented scenarios that required expeditious responses. In South Africa, the pandemic came on top of pre-existing inequalities in the education system. Using a qualitative research method of exploratory and descriptive nature, this study engaged a social justice framework to explore the teaching and learning of mathematics during the COVID-19 lockdown in a context of historical disadvantage. A sample of twenty-three Grade 12 mathematics teachers at various public secondary schools in Gauteng, South Africa was used in the study. The teachers were selected through purposive sampling. A Google-generated open-ended questionnaire and follow-up telephonic interviews were used to collect data. Data were analysed thematically in five steps. The findings revealed that the WhatsApp platform is a valuable tool that can support the teaching and learning of mathematics beyond the classroom in the contexts of historical disadvantage. The findings also provided insights into how mathematics teachers became learners themselves during emergency remote teaching (ERT) as they had to adapt to digital teaching, find solutions to unfamiliar problems and acquire knowledge from a larger mathematics education community around the globe. The article discusses these findings and teachers’ challenges of transitioning from traditional face-to-face classrooms to ERT and how they were addressed. At the time of publishing the article, most learners in South Africa had started going to school on a rotational basis. Nonetheless, the study reported in this article is of importance as ERT in the context of historical disadvantage has foregrounded issues of inequality in the South African education system that must be dealt with urgently.


2019 ◽  
Vol 24 ◽  
Author(s):  
R. Egan ◽  
S. Cartagena ◽  
R. Mohamed ◽  
V. Gosrani ◽  
J. Grewal ◽  
...  

AbstractCyber Operational Risk: Cyber risk is routinely cited as one of the most important sources of operational risks facing organisations today, in various publications and surveys. Further, in recent years, cyber risk has entered the public conscience through highly publicised events involving affected UK organisations such as TalkTalk, Morrisons and the NHS. Regulators and legislators are increasing their focus on this topic, with General Data Protection Regulation (“GDPR”) a notable example of this. Risk actuaries and other risk management professionals at insurance companies therefore need to have a robust assessment of the potential losses stemming from cyber risk that their organisations may face. They should be able to do this as part of an overall risk management framework and be able to demonstrate this to stakeholders such as regulators and shareholders. Given that cyber risks are still very much new territory for insurers and there is no commonly accepted practice, this paper describes a proposed framework in which to perform such an assessment. As part of this, we leverage two existing frameworks – the Chief Risk Officer (“CRO”) Forum cyber incident taxonomy, and the National Institute of Standards and Technology (“NIST”) framework – to describe the taxonomy of a cyber incident, and the relevant cyber security and risk mitigation items for the incident in question, respectively.Summary of Results: Three detailed scenarios have been investigated by the working party:∙Employee leaks data at a general (non-life) insurer: Internal attack through social engineering, causing large compensation costs and regulatory fines, driving a 1 in 200 loss of £210.5m (c. 2% of annual revenue).∙Cyber extortion at a life insurer: External attack through social engineering, causing large business interruption and reputational damage, driving a 1 in 200 loss of £179.5m (c. 6% of annual revenue).∙Motor insurer telematics device hack: External attack through software vulnerabilities, causing large remediation / device replacement costs, driving a 1 in 200 loss of £70.0m (c. 18% of annual revenue).Limitations: The following sets out key limitations of the work set out in this paper:∙While the presented scenarios are deemed material at this point in time, the threat landscape moves fast and could render specific narratives and calibrations obsolete within a short-time frame.∙There is a lack of historical data to base certain scenarios on and therefore a high level of subjectivity is used to calibrate them.∙No attempt has been made to make an allowance for seasonality of renewals (a cyber event coinciding with peak renewal season could exacerbate cost impacts)∙No consideration has been given to the impact of the event on the share price of the company.∙Correlation with other risk types has not been explicitly considered.Conclusions: Cyber risk is a very real threat and should not be ignored or treated lightly in operational risk frameworks, as it has the potential to threaten the ongoing viability of an organisation. Risk managers and capital actuaries should be aware of the various sources of cyber risk and the potential impacts to ensure that the business is sufficiently prepared for such an event. When it comes to quantifying the impact of cyber risk on the operations of an insurer there are significant challenges. Not least that the threat landscape is ever changing and there is a lack of historical experience to base assumptions off. Given this uncertainty, this paper sets out a framework upon which readers can bring consistency to the way scenarios are developed over time. It provides a common taxonomy to ensure that key aspects of cyber risk are considered and sets out examples of how to implement the framework. It is critical that insurers endeavour to understand cyber risk better and look to refine assumptions over time as new information is received. In addition to ensuring that sufficient capital is being held for key operational risks, the investment in understanding cyber risk now will help to educate senior management and could have benefits through influencing internal cyber security capabilities.


ITNOW ◽  
2020 ◽  
Vol 62 (1) ◽  
pp. 32-33
Author(s):  
Matthew Mackay

Abstract Matthew Mackay, Cyber Risk Analyst at Whiteflare Consulting, explains why organisations should follow a cyber mission assurance approach (CMA) for cyber security.


Literator ◽  
2006 ◽  
Vol 27 (2) ◽  
pp. 83-108
Author(s):  
E. Kruger

Parody as hybridic text: research report Parody can be seen as one of the techniques of selfreferentiality through which a consciousness of the context dependency of meaning is revealed in an aesthetic way. This article explores the theoretical background of parody as literary style against which the researcher challenged a group of teacher education students in a research programme to generate their own parodies. The task required that they choose a well-known fairy tale and use its structure to mock their own society. Students of another group were asked as the writers’ peers to read the stories in order to engage in a dialogue between encoder and decoder in the process of reception. The educational aim of the programme was to equip students to reflect critically and react creatively to social, political and economic issues that surround them. Furthermore, the researcher wanted to discover how these texts would generate a flexibility, fluency and hybridity in relationship with the students’ cultural identity and how they would project their own liminality in a no-man’s land between youth and adulthood. Analysis and interpretation of the parody texts revealed themes of late capitalism, materialism and consumerism, as well as typical student cultural manifestations of language usage and some of their existing attitudes toward the South African political society in post-apartheid. The students’ parodies have intertextual density with imitation and subversion of the original text contexts and values. The writers used a variety of stylistic techniques to generate double-voiced narratives as manifestation of literary creativity.


Sign in / Sign up

Export Citation Format

Share Document