Ethical Implications of Cooperation and Safety vis-à-vis Cyber Security in Africa

Author(s):  
Essien D. Essien

Discourses on the threats to cyber security in today's digital society have revealed that cyberspace has become an arena of complex national security concern. This lends credence to the fact that many countries, especially in Africa, need to urgently scale up their efforts to effectively secure the Internet and ICT infrastructures. Drawing upon extensive literature on cyber-security challenges, this chapter examines the phenomenon of cybercrime using Ronald Rogers' “protection motivation theory”. The study employs qualitative analysis of the current cyber-security landscape in Africa. Findings posit that with the risk and vulnerability of the cyberspace, cyber security in Africa poses a number of unique challenges which predicate a coordinated response for security and safety engagement. The study suggests collaborative measures to counter cybercrime through investigation, prosecution, and sharing information.

2018 ◽  
pp. 1294-1317
Author(s):  
Libi Shen ◽  
Irene Chen ◽  
Anchi Su

Has anyone considered his/her family information going viral and through his/her trusted, chosen school district? This is an age where a mis-sent e-mail with student data can represent enormous liabilities, and a lost laptop can cause newspaper headlines. School institutes are facing new cyber security challenges in the Information Age. A number of school institutes were grappling with the loss of confidential information and protecting students on the Internet. How should school authorities react in case of data breach? What should they do to prevent data breaches at schools? What are upcoming trends in cybersecurity? The purpose of this chapter is to explore data breaches at K-12 schools as well as to examine the ways to improve cybersecurity. In this chapter, the researchers attempt to provide suggestions, solutions, and recommendations on cybersecurity after examining the problems of data breaches.


Author(s):  
Libi Shen ◽  
Irene Chen ◽  
Anchi Su

Has anyone considered his/her family information going viral and through his/her trusted, chosen school district? This is an age where a mis-sent e-mail with student data can represent enormous liabilities, and a lost laptop can cause newspaper headlines. School institutes are facing new cyber security challenges in the Information Age. A number of school institutes were grappling with the loss of confidential information and protecting students on the Internet. How should school authorities react in case of data breach? What should they do to prevent data breaches at schools? What are upcoming trends in cybersecurity? The purpose of this chapter is to explore data breaches at K-12 schools as well as to examine the ways to improve cybersecurity. In this chapter, the researchers attempt to provide suggestions, solutions, and recommendations on cybersecurity after examining the problems of data breaches.


2019 ◽  
pp. 1200-1213
Author(s):  
Essien Essien

This article examines the cyber security dimension of the global information Infrastructure which has resulted in the attainment of remarkable milestones and unlimited opportunities. However, these benefits notwithstanding, the cyberspace is increasingly under attack by cybercriminals, and the cost and damages from such attacks are increasing alarming. This article therefore, sets out to examine the ethical implications of cybersecurity phenomenon. Relying upon an extensive contemporary literature on cyber security, this study examines the phenomenon using the protection motivation theory. The article employs qualitative analysis of the current cybersecurity landscape in Nigeria. With an insight provided into understanding the independent layers of cyber security in Nigeria, a criterion on what should constitute appropriate procedure for cyber security is thus supplied. Findings posit that with the vulnerability of cyberspace, cyber security phenomenon in Africa, mirrors the existing social inequalities and widens the social division that is more apparent with the expansion of the ICTs.


Author(s):  
Essien D. Essien

This article examines the cyber security dimension of the global information Infrastructure which has resulted in the attainment of remarkable milestones and unlimited opportunities. However, these benefits notwithstanding, the cyberspace is increasingly under attack by cybercriminals, and the cost and damages from such attacks are increasing alarming. This article therefore, sets out to examine the ethical implications of cybersecurity phenomenon. Relying upon an extensive contemporary literature on cyber security, this study examines the phenomenon using the protection motivation theory. The article employs qualitative analysis of the current cybersecurity landscape in Nigeria. With an insight provided into understanding the independent layers of cyber security in Nigeria, a criterion on what should constitute appropriate procedure for cyber security is thus supplied. Findings posit that with the vulnerability of cyberspace, cyber security phenomenon in Africa, mirrors the existing social inequalities and widens the social division that is more apparent with the expansion of the ICTs.


Author(s):  
Muhammad Saad ◽  
Tariq Rahim Soomro

Internet has become a vital part of our lives. The number of Internet connected devices are increasing every day and approximate there will be 34 billion IoT devices by 2020. It is observed that security is very weak in these devices and can be easily compromised by hackers as some manufactures failed to implement basic security. Current devices use standards that are easy to implement and works for most forms of communications and storage. There is no such standard solution that will work on every device within the Internet of Things, because of the varied constraints between different devices; resulting in classifications within the Internet of Things. This study addresses security challenges in the Internet of Things (IoT); first will discuss the IoT evolution, architecture and its applications in industries. Further, classify and examine privacy threats, including survey, and pointing out the challenges that need to be overcome to ensure that the Internet of Things becomes a reality.


The armed forces of Europe have undergone a dramatic transformation since the collapse of the Soviet Union. The Handbook of European Defence Policies and Armed Forces provides the first comprehensive analysis of national security and defence policies, strategies, doctrines, capabilities, and military operations, as well as the alliances and partnerships of European armed forces in response to the security challenges Europe has faced since the end of the cold war. A truly cross-European comparison of the evolution of national defence policies and armed forces remains a notable blind spot in the existing literature. This Handbook aims to fill this gap with fifty-one contributions on European defence and international security from around the world. The six parts focus on: country-based assessments of the evolution of the national defence policies of Europe’s major, medium, and lesser powers since the end of the cold war; the alliances and security partnerships developed by European states to cooperate in the provision of national security; the security challenges faced by European states and their armed forces, ranging from interstate through intra-state and transnational; the national security strategies and doctrines developed in response to these challenges; the military capabilities, and the underlying defence and technological industrial base, brought to bear to support national strategies and doctrines; and, finally, the national or multilateral military operations by European armed forces. The contributions to The Handbook collectively demonstrate the fruitfulness of giving analytical precedence back to the comparative study of national defence policies and armed forces across Europe.


Author(s):  
Dan Jerker B. Svantesson

Internet jurisdiction has emerged as one of the greatest and most urgent challenges online, severely affecting areas as diverse as e-commerce, data privacy, law enforcement, content take-downs, cloud computing, e-health, Cyber security, intellectual property, freedom of speech, and Cyberwar. In this innovative book, Professor Svantesson presents a vision for a new approach to Internet jurisdiction––for both private international law and public international law––based on sixteen years of research dedicated specifically to the topic. The book demonstrates that our current paradigm remains attached to a territorial thinking that is out of sync with our modern world, especially, but not only, online. Having made the claim that our adherence to the territoriality principle is based more on habit than on any clear and universally accepted legal principles, Professor Svantesson advances a new jurisprudential framework for how we approach jurisdiction. He also proposes several other reform initiatives such as the concept of ‘investigative jurisdiction’ and an approach to geo-blocking, aimed at equipping us to solve the Internet jurisdiction puzzle. In addition, the book provides a history of Internet jurisdiction, and challenges our traditional categorisation of different types of jurisdiction. It places Internet jurisdiction in a broader context and outlines methods for how properly to understand and work with rules of Internet jurisdiction. While Solving the Internet Puzzle paints a clear picture of the concerns involved and the problems that needs to be overcome, this book is distinctly aimed at finding practical solutions anchored in a solid theoretical framework.


Author(s):  
Lucy Osler ◽  
Joel Krueger

AbstractIn this paper, we introduce the Japanese philosopher Tetsurō Watsuji’s phenomenology of aidagara (“betweenness”) and use his analysis in the contemporary context of online space. We argue that Watsuji develops a prescient analysis anticipating modern technologically-mediated forms of expression and engagement. More precisely, we show that instead of adopting a traditional phenomenological focus on face-to-face interaction, Watsuji argues that communication technologies—which now include Internet-enabled technologies and spaces—are expressive vehicles enabling new forms of emotional expression, shared experiences, and modes of betweenness that would be otherwise inaccessible. Using Watsuji’s phenomenological analysis, we argue that the Internet is not simply a sophisticated form of communication technology that expresses our subjective spatiality (although it is), but that it actually gives rise to new forms of subjective spatiality itself. We conclude with an exploration of how certain aspects of our online interconnections are hidden from lay users in ways that have significant political and ethical implications.


Sign in / Sign up

Export Citation Format

Share Document