Information and communication technology, cyber-security and counterterrorism in Africa

Author(s):  
Francisca Nonyelum Ogwueleka ◽  
Aniche Delight Aniche
2020 ◽  
Vol 10 (16) ◽  
pp. 5649 ◽  
Author(s):  
Bushra Canaan ◽  
Bruno Colicchio ◽  
Djaffar Ould Abdeslam

The importance of looking into microgrid security is getting more crucial due to the cyber vulnerabilities introduced by digitalization and the increasing dependency on information and communication technology (ICT) systems. Especially with a current academic unanimity on the incremental significance of the microgrid’s role in building the future smart grid, this article addresses the existing approaches attending to cyber-physical security in power systems from a microgrid-oriented perspective. First, we start with a brief descriptive review of the most commonly used terms in the latest relevant literature, followed by a comprehensive presentation of the recent efforts explored in a manner that helps the reader to choose the appropriate future research direction among several fields.


2018 ◽  
Vol 71 (5) ◽  
pp. 1025-1039 ◽  
Author(s):  
Odd Sveinung Hareide ◽  
Øyvind Jøsok ◽  
Mass Soldal Lund ◽  
Runar Ostnes ◽  
Kirsi Helkala

As technology continues to develop, information and communication technology and operational technology on board ships are increasingly being networked, and more frequently connected to the Internet. The introduction of cyber systems changes the work environment with the aim of decreasing the workload for the navigator, but at the same time introduces more complexity and vulnerabilities that in turn may alter the competencies needed to perform safe and efficient navigation. Contemporary examples of how cyber-attacks can distort situational awareness and interfere with operations are needed to enhance the navigator's competence through increased system awareness. This paper demonstrates some of the possible attack vectors that a cyber-attack can present to a ship, as well as discussing the plausibility and consequences of such attacks. In this study we provide a practical example to better understand how one can demystify cyber threats in order to enhance the navigators' competence.


2021 ◽  
Vol 19 (1) ◽  
pp. 70-94
Author(s):  
Ivo Juurvee ◽  
Uku Arold

Disruptive developments in the field of information and communication technology have enabled malicious actors to turn elements of the digital ecosystem into information weapons in hybrid conflict.  Estonia has tackled the new security realm with comprehensive national defence that is built upon understanding that the society itself is object of security and should provide appropriate safeguards and responses. Estonian conceptualisations of national cybersecurity, cyber psychological defence, strategic communications are elaborated in the light of actual seminal threat situations. Analysis of evolvement of the strategic documents guides the recommendations for even deeper blend of the technical cybersecurity culture with value-centric psychological defence and internationalisation of information security situational awareness and planning.


2019 ◽  
Vol 16 (2) ◽  
pp. 759-763
Author(s):  
T. K. Thivakaran ◽  
D. Sasikumar

Information and communication technology achieved mass improvement on ATMs cyber-security but there is a strong need to strengthen all parts of operation. ATM skimmers are card readers that collect the data from magnetic card stripe that is attached to the real payment terminals; especially criminals can create cloned cards to steal money from the bank account. After these also we think that ATM is the safest place. But, nowadays in ATM, robbery happens easily by damaging the system for money. In this paper we bring an idea about biometric based system to enhance security. There is signal processing which alerts the police and gives information to bank.


Author(s):  
DAMJAN ŠTRUCL

Povzetek Terminologija je temeljna za razumevanje in obravnavanje neke tematike, še posebej, če ta tematika vpliva na reševanje varnostnih vprašanj v sodobnem varnostnem okolju, ki ni omejeno le na fizične meje in posamične države. Svet je s kibernetskim prostorom in informacijskim okoljem postal soodvisen ter medsebojno povezan s pomočjo informacijsko-komunikacijske tehnologije, zato so se pojavili novi termini, ki jih posamezniki, strokovna javnost, države in mednarodna skupnost razumejo drugače in se posledično tudi različno odzivajo, kar vpliva na varnost vseh sodelujočih. V prispevku želimo prikazati, da urejanje varnosti v kibernetskem prostoru brez enotne in strokovne terminologije ni dovolj, še posebej, če upoštevamo definicijo kibernetske varnosti. Ključne besede Terminologija, zaščita informacij, informacijska varnost, kibernetska varnost, kibernetska obramba. Abstract Terminology is fundamental to understanding and addressing a particular topic, especially if that topic has implications for addressing security issues in a modern security environment that is not limited to physical borders and individual countries. With the existence of cyberspace and information environment, the world has through the use of information and communication technology become interdependent and interconnected. As a result, new terms have emerged which are understood differently by individuals, the professional public, countries and the international community. Consequently, their responses differ, also affecting the security of all the involved entities. The aim of this article is to show that the regulation of security in cyberspace without uniform and professional terminology is not enough, especially if we consider the definition of cyber security. Key words Terminology, information assurance, information security, cyber security, cyber defence.


2012 ◽  
Vol 43 (4) ◽  
pp. 222-231 ◽  
Author(s):  
Nina Hansen ◽  
Tom Postmes ◽  
Nikita van der Vinne ◽  
Wendy van Thiel

This paper studies whether and how information and communication technology (ICT) changes self-construal and cultural values in a developing country. Ethiopian children were given laptops in the context of an ICT for development scheme. We compared children who used laptops (n = 69) with a control group without laptops (n = 76) and a second control group of children whose laptop had broken down (n = 24). Results confirmed that after 1 year of laptop usage, the children’s self-concept had become more independent and children endorsed individualist values more strongly. Interestingly, the impact of laptop usage on cultural values was mediated by self-construal (moderated mediation). Importantly, modernization did not “crowd out” traditional culture: ICT usage was not associated with a reduction in traditional expressions (interdependent self-construal, collectivist values). Theoretical and practical implications are discussed.


2020 ◽  
Vol 3 (2) ◽  
pp. 109-119
Author(s):  
Partono Partono

So far, in implementing school strategies, they tend not to utilize Information and Communication Technology (ICT), despite the availability of ICT resources available. Stages of strategic management are needed to generate the vision, mission, objectives, policy, program, budget, and procedures as well as control and evaluation process as an effort to utilize ICT to improve school quality. Based on the interpretation and the results of the study, it is concluded that schools have organized stages in strategic management that enable schools to have a quality profile. The impact of effective utilization of ICTs for schools is the achievement of effective school management, as per the National Education Standards, which is characterized by effective planning, implementation, control, and evaluation of school ICTs.The purpose of this study is to get a general description, describe, and reveal the Strategic Management of Information and Communication Technology Utilization to Improve the Quality of School Learning in Ciledug Al Musaddadiyah Vocational High School and Garut 1 Vocational High School, both on environmental analysis, strategic formulation, implementation and strategic evaluation. The research method used in this research is the case study method, because the problems studied occur in the place and situation of Ciledug Al Musaddadiyah Vocational School and Vocational High School 1 Garut. The use of case study models in this study is based on the consideration that to provide an overview of the strategic management activities of the use of ICTs carried out at vocational high schools with the ultimate goal of being able to improve the quality of school learning. Based on observations in the field of SMK 1 Garut and SMK Al Musaddadiyah Ciledug Garut is one of the public schools and private schools that have these advantages.


Sign in / Sign up

Export Citation Format

Share Document