Open Access Open Access  Restricted Access Subscription Access

A Cybersecurity Culture Framework for Grassroots Levels in Zimbabwe


Affiliations
1 Zimbabwe Academy of Sciences, Trep Building, University of Zimbabwe Harare, Zimbabwe
2 Zimbabwe Open University, Corner House, Samora Machel Avenue/ L.takawira Street Harare
 

Cybersecurity is a combination of technologies, processes and operations that are designed to protect information systems, computers, devices, programs, data and networks from internal or external threats, harm, damage, attacks or unauthorized access.1 The research was purposed to develop a cybersecurity culture framework which ensures that grassroot users of cyberspace are secured from cyber threats. Literature review showed that in Zimbabwe, no research had attempted to come up with a cybersecurity culture framework for grassroot users of cyberspace.The research was guided by the interpretivist paradigm and employed a qualitative methodology. A descriptive research design was used to answer the research questions and unstructured interviews were done to ascertain the cybersecurity needs and challenges of grassroot users of cyberspace. A cybersecurity culture framework was then crafted based on the research findings. The researchers recommended that Zimbabwe should have a cybersecurity vision and strategy that cascades to the grassroot users of cyberspace. Furthermore, the education curricula should be revised so that it incorporates cybersecurity courses at primary and secondary school level. This will then ensure that ICT adoption is matched with cyber hygiene and responsible use of cyberspace.



Keywords

Artificial Intelligence; Big Cloud Computing; Culture Framework; Cybersecurity, Data Analytics, Internet Of Things; Machine Learning
User
Notifications
Font Size

  • Kabanda G. Performance of Machine Learning and other Artificial Intelligence paradigms in Cybersecurity. Orient.J. Comp. Sci. and Technol; 13(1).
  • Sarker, I. H., Kayes, A. S. M., Badsha, S., Alqahtani, H., Watters, P., & Ng, A. Cybersecurity data science: an overview from machine learning perspective, 2020. Journal of Big Data. https://doi.org/10.1186/ s40537-020-00318-5
  • Berman, D.S., Buczak, A.L., Chavis, J.S., and Corbett, C.L.Survey of Deep Learning Methods for Cyber Security; 2019. doi:10.3390/info10040122
  • Bringas, P.B and Santos, I. Bayesian Networks for Network Intrusion Detection, Bayesian Network, Ahmed Rebai (Ed.), ISBN: 978-953-307-124-4; 2010. InTech, Available from: http://www.intechopen.com/ books/bayesian-network/bayesian-networksfornetwork-intrusion-detection
  • Bloice, M. and Holzinger, A. A Tutorial on Machine Learning and Data Science Tools with Python. Graz, Austria, 2018: s.n.
  • Gcaza, N., Solms, R. Von, & Vuuren, J. Van. An Ontology for a National Cybersecurity Culture Environment,. In Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2015) (1-10); 2015.
  • Malyuk and Miloslavska. Cybersecurity Culture as an Element of IT Professional Training; 2015
  • United Nations. Policy Brief. Tackling the challenges of cybersecurity in Africa; 2014
  • Al Hogail M. How is the ministry fostering public-private partnerships (PPPs) with local private developers?, 2015. https://oxfordbusinessgroup.com/interview/ right-home-obg-talks-majed-al-hogailministerhousing.
  • International Telecommunication Union. Global Security Report; 2008.
  • Sharma R.Study of Latest Emerging Trends on Cybersecurity and its Challenges to Society, 2012. International Journal of Scientific and Engineering Research. Vol 3 Issue 6, June 2012
  • Wamala, F. ITU National Cybersecurity Strategy Guide. Chemistry & Geneva, Switzerland;2011
  • Symantec .Cybercrime and cybersecurity trends in Africa;2016
  • Ernst and Young. Cybersecurity and the Internet of Things;2015
  • Concierge. Concierge Security Report. Cybersecurity: Trends from 2017 and Predictions for 2018, 2018
  • ACS .Cybersecurity: Opportunities, Threats and Challenges; 2016
  • SANS Cybersecurity Threat Landscape Survey; 2017
  • McAfee Labs Threats Report;2018
  • KPMG .Clarity on Cybersecurity. Driving growth with confidence;2018
  • Cox, R. & Wang, G. Predicting the US bank failure: A discriminant analysis. Economic Analysis and Policy, Issue 44.2, pp. 201-211;2014
  • Yang, C., Yu, M., Hu, F., Jiang, Y., & Li, Y. Utilizing Cloud Computing to address big geospatial data challenges. Computers, Environment and Urban Systems;2017 https://doi.org/10.1016/j.compenvurbsys. 2016.10.010
  • Gercke, M. Cybercrime Understanding Cybercrime, Understanding cybercrime: phenomena, chal lenges and legal response;2012
  • Murugan, S., and Rajan, M.S. Detecting Anomaly IDS in Network using Bayesian Network,2014. IOSR Journal of Computer Engineering (IOSR-JCE), e-ISSN: 22780661, p- ISSN: 2278-8727, Volume 16, Issue 1, Ver. III (Jan. 2014), PP 01-07;2014 www.iosrjournals.org
  • National Institute Of Standards and Technology. Framework for Improving Critical Infrastructure Cybersecurity Version 1.1;2018
  • Alkaraz C. and Zeadally S. Critical Infrastructure Protection: Requirements and Challenges for the 21st Century. Journal of Critical Infrastructure Protection (IJCIP), volume 8, Elsevier Science, pp. 53-66, 01/2015;2015
  • Schuessler J.H .General Deterrence Theory: Assessing Information Systems Security Effectiveness In Large Versus Small Businesses,2009.Accessible on: https://digital.library.unt.edu/ark:/67531/metadc9829/m2/1/high_res_d/ dissertation.pdf
  • Alanezi, M. A., Kamil, A., & Basri, S. A proposed instrument dimensions for e-government service quality, 2010. International Journal of u-and e-Service, 3(4), 1–18.
  • Chukwudi A.E, Udoka E, Charles I. Game Theory Basics and Its Application in Cyber Security; 2017. Advances in Wireless Communications and Networks. Vol. 3, No. 4, 2017, pp. 45-49. doi: 10.11648/j. awcn.20170304.13
  • Norwegian Institute of International Affairs, 2018
  • Bande .Legislating against Cyber Crime in Southern African Development Community: Balancing International Standards with Country-Specific Specificities, 2018. International Journal of Cyber Criminology Volume 12 Issue 1 January-June 2018
  • ITU . Measuring the Information Society 2012;2012
  • Schia N.N. The cyber frontier and digital pitfalls in the Global South, 2018. Third World Quarterly, 39(5): 821-837.
  • Muller P.L. Cybersecurity Capacity Building in Developing Countries. Opportunities and Challenges, 2015.
  • Kortjan, N. & Von Solms, R. A conceptual framework for cybersecurity awareness and education in SA, 2014. South African Computer Journal, 52, 29-41., 2014(52), pp.29–41.
  • The Republic of Mauritius Cybercrime Strategy 2017-2019,2017
  • https://www.webopedia.com/TERM/C/cryptography.html
  • https://www.garykessler.net/library/crypto.html
  • https://hitachi-id.com/resource/iam-concepts/authentication.html):
  • https://www.techopedia.com/definition/10284/integrity).

Abstract Views: 231

PDF Views: 1




  • A Cybersecurity Culture Framework for Grassroots Levels in Zimbabwe

Abstract Views: 231  |  PDF Views: 1

Authors

Gabriel Kabanda
Zimbabwe Academy of Sciences, Trep Building, University of Zimbabwe Harare, Zimbabwe
Tinashe Chingoriwo
Zimbabwe Open University, Corner House, Samora Machel Avenue/ L.takawira Street Harare

Abstract


Cybersecurity is a combination of technologies, processes and operations that are designed to protect information systems, computers, devices, programs, data and networks from internal or external threats, harm, damage, attacks or unauthorized access.1 The research was purposed to develop a cybersecurity culture framework which ensures that grassroot users of cyberspace are secured from cyber threats. Literature review showed that in Zimbabwe, no research had attempted to come up with a cybersecurity culture framework for grassroot users of cyberspace.The research was guided by the interpretivist paradigm and employed a qualitative methodology. A descriptive research design was used to answer the research questions and unstructured interviews were done to ascertain the cybersecurity needs and challenges of grassroot users of cyberspace. A cybersecurity culture framework was then crafted based on the research findings. The researchers recommended that Zimbabwe should have a cybersecurity vision and strategy that cascades to the grassroot users of cyberspace. Furthermore, the education curricula should be revised so that it incorporates cybersecurity courses at primary and secondary school level. This will then ensure that ICT adoption is matched with cyber hygiene and responsible use of cyberspace.



Keywords


Artificial Intelligence; Big Cloud Computing; Culture Framework; Cybersecurity, Data Analytics, Internet Of Things; Machine Learning

References





DOI: https://doi.org/10.13005/ojcst14.010203.03