Understanding Cyber Security

Author(s):  
Jeffrey Kurebwa

This study provides an understanding of cyber security and further analyses the Cyber Security and Data Protection Bill of Zimbabwe. The internet and other technological developments have provided a variety of platforms for increased and sometimes unrestricted exercise of freedom of expression, association, online transactions, and access to information rights. Zimbabwe has faced increased threats from cyber activities. This has necessitated the country to enact the Cyber Security and Data Protection Bill. The purpose of the Cyber Security and Data Protection Bill is to increase cyber security in order to build confidence and trust in the secure use of information and communication technologies by data controllers, their representatives, and data subjects. This study relied on data gathered through key informant interviews and documentary search. The key informants were drawn from various institutions that deal with cybercrime. Zimbabwe does not have adequate and effective legislative instruments to combat cybercrime.

2021 ◽  
pp. 026666692110089
Author(s):  
Nejat İra ◽  
Mehmet Yıldız ◽  
Gamze Yıldız ◽  
Eylem Yalçınkaya-Önder ◽  
Ali Aksu

The aim of the study was to investigate secondary school students’ and teachers’ access to information technologies in Turkey by making interregional comparisons. Document analysis of the qualitative research methods was employed to analyze the reports issued by the Turkish Ministry of National Education, the Turkish Statistical Institute (TUIK), and the Programme for International Student Assessment (PISA). The results of the research revealed the importance of access to information and communication technologies for both students and teachers: 67.9% of the participating students were found to have Internet connection and 69.1% a computer in their homes, while 80.3% of the students were observed to use a computer outside the school, but 19.7% were not. The results also showed that 64.6% of the students have Internet connection in their classrooms, but 29.2% of these students do not use the Internet in the classroom, whereas 8.9% use it in the classroom all the time. The rate of students using a digital device for reading is 38.1%, while that of those not using one is 61.9%. Some 32.1% of secondary school students were revealed not to have Internet connection at home. Additionally, 77% of teachers were not trained in online teaching prior to the COVID-19 pandemic. Based on the findings, teachers can be suggested to develop projects – i.e., of TUBITAK, E-twinning, and Erasmus – which potentially encourage students to use information and communication technologies so that both teachers and students can benefit from them. It is also suggested that the Ministry of National Education should work on improving the information communication technology competencies of teachers and students. Besides, policies should be developed to eliminate regional differences in terms of access to digital resources and technology in terms of equal opportunities and opportunities.


2021 ◽  
Vol 16 (1) ◽  
pp. 47-60
Author(s):  
Michaela Šimonová ◽  

The arrival of information and communication technologies is nothing new. The number of people using these technologies and moving in cyberspace is growing, and therefore it is an important role of the state to respond sufficiently to such developments. A fundamental role of the state is to create a stable security system consisting of complex legislation as well as creation of a legislative environment capable of responding flexibly to the growing number of diverse incidents in cyberspace. Sufficient legal regulation consisting of unambiguous determination of competencies and tasks of individual subjects represents the basic pillar for the creation of a stable security system. The role of the state is also to maintain existing and create new partnerships with organizations that are able to provide relevant information and knowledge in the field of cyber security.


Author(s):  
Wojciech Dudek ◽  
Wojciech Szynkiewicz

A review of the known and an indication of the new threats for cyber-physical robotic systems, caused by cybernetic attacks, serves, in this paper, as a basis for the analysis of the known methods relied upon to detect and mitigate consequences of such attacks. A particular emphasis is placed on threats specific for cyber-physical systems, as they are a feature distinguishing these systems from their traditional Information and Communication Technologies (ICT) counterparts. Based on the review of literature and own analyses, unresolved issues regarding the cyber-security of robot systems are presented and discussed.


Author(s):  
Eric Luiijf

Advancements of information and communication technologies (ICT) cause infrastructure owners to augment current infrastructures with such ICT. The creation of more efficient and effective end-user services provides economical benefits and increases customer satisfaction. Concurrently, ICT advancements allow governmental and industrial sectors to develop complete new infrastructures and infrastructure services, the so called Next Generation Infrastructures (NGI). NGI will offer new services to society, end-users and the supply-chain of organisations and linked, dependent infrastructural services. For over fifty years, the introduction of new ICT-based services and infrastructures has been tightly coupled with failures in ICT-security. This chapter on NGI discusses the root causes of these security failures. Based on historical experiences, this chapter predicts threats and cyber security failures alike for the envisioned NGI such as smart (energy) grids, smart road transport infrastructure, smart cities, and e-health. This prediction will become reality unless fundamental changes in the approach to security of ICT-based and ICT-controlled infrastructures are taken.


Author(s):  
Ugo Pagallo

The chapter examines how the information revolution impacts the field of data protection in a twofold way. On the one hand, the scale and amount of cross-border interaction taking place in cyberspace illustrate how the information revolution affects basic tenets of current legal frameworks, such as the idea of the law as a set of rules enforced through the menace of physical sanctions and matters of jurisdiction on the Internet. On the other hand, many impasses of today's legal systems on data protection, liability, and jurisdiction can properly be tackled by embedding normative constraints into information and communication technologies, as shown by the principle of privacy by design in such cases as information systems in hospitals, video surveillance networks in public transports, or smart cards for biometric identifiers. Normative safeguards and constitutional constraints can indeed be embedded in places and spaces, products and processes, so as to strengthen the rights of the individuals and widen the range of their choices. Although it is unlikely that “privacy by design” can offer the one-size-fits-all solution to the problems emerging in the field, it is plausible that the principle will be the key to understanding how today's data protection issues are being handled.


Author(s):  
Rolf H. Weber

The tremendous developments in information and communication technologies (ICTs) over the last 20 years have substantially changed communication practices across the world. The Internet and mobile phones help to open new horizons for connections between people, leading to a global network for the sharing of information and ideas. In this new environment, human rights need to have a place, and traditional notions related to mass media need to be adapted to the needs of civil society. Freedom of expression has become much more individualistic, with information exchanges no longer relying on the traditional intermediaries (mass media) but on the exchange of ideas on social networking and other platforms. Civil society participation in the information world requires the necessary infrastructure however. And since states have an obligation to see to it that human rights are realized in practice, this may mean the facilitation of private investments to improve the ICT infrastructure. In this context, ICT policies favoring human rights must encompass a right to development.


2012 ◽  
pp. 1148-1164
Author(s):  
Cathrine T. Nengomasha

Governments have turned to the use of information and communication technologies with the aim of improving service delivery, encouraging citizens in the decision making process, and enhancing accountability, transparency, and effectiveness. Effective inclusive participation of citizens in the government of their country requires access to information through modern technologies. Access to information is vital for transparency, accountability, participation, and the rule of law – all hallmarks of democratic governance. This chapter looks at the role of librarians and records managers in promoting e-government. Their traditional role of collecting, organizing, preserving, and disseminating information places them in a very significant position in e-governance implementation. However, in an electronic environment, they face a number of challenges which include economic, technological, and information literacy. The role played by these professionals, and the challenges each meet are discussed. Some recommendations are provided to enhance the role of these professionals in e-government implementation.


Author(s):  
Ioannis Inglezakis

The use of Information and Communication Technologies in the workplace is constantly increasing, but also the use of surveillance technology. Electronic monitoring of employees becomes an integral part of information systems in the workplace. The specific software which is used for monitoring electronic communications is, however, intrusive and infringes upon the employees' right to privacy. The issue of surveillance of employees' electronic communications is subject to different approaches in various jurisdictions. The most comprehensive protection to employees is afforded in the EU, and it would be enhanced once the General Data Protection Regulation is passed.


PLoS ONE ◽  
2016 ◽  
Vol 11 (4) ◽  
pp. e0152655 ◽  
Author(s):  
Silvana Rossy de Brito ◽  
Aleksandra do Socorro da Silva ◽  
Adejard Gaia Cruz ◽  
Maurílio de Abreu Monteiro ◽  
Nandamudi Lankalapalli Vijaykumar ◽  
...  

Author(s):  
Ricardo Gomez ◽  
Kemly Camacho

Libraries, telecenters, and cybercafés offer opportunities for wider public access to information and communication technologies (ICT). This paper presents findings of a global exploratory study on the landscape public access venues in 25 countries around the world. The goal of the project was to better understand the users of public access venues and their needs, this being one of several papers that result from the global study. This paper identifies profiles of the users of the different types of venues with respect to age, income, education and gender. While findings are not new, their value lies in the compelling evidence drawn from 25 countries and across different types of public access venues, which has never been done before. Results highlight the importance of strengthening public access venues in non-urban settings and to strengthen programs that reach out to underserved populations. The authors also point to special challenges faced by libraries and telecenters given the immense growth of cybercafés as public access venues in most of the countries studied.


Sign in / Sign up

Export Citation Format

Share Document