Identifying Cybersecurity Elements for a Cybersecurity Framework in Higher Education
সংরক্ষণ করুন:
| প্রকাশিত: | International Conference on Cyber Warfare and Security (Mar 2025), p. 584 |
|---|---|
| প্রধান লেখক: | |
| অন্যান্য লেখক: | , |
| প্রকাশিত: |
Academic Conferences International Limited
|
| বিষয়গুলি: | |
| অনলাইন ব্যবহার করুন: | Citation/Abstract Full Text Full Text - PDF |
| ট্যাগগুলো: |
কোনো ট্যাগ নেই, প্রথমজন হিসাবে ট্যাগ করুন!
|
MARC
| LEADER | 00000nab a2200000uu 4500 | ||
|---|---|---|---|
| 001 | 3202190627 | ||
| 003 | UK-CbPIL | ||
| 035 | |a 3202190627 | ||
| 045 | 2 | |b d20250301 |b d20250331 | |
| 084 | |a 142229 |2 nlm | ||
| 100 | 1 | |a Nkambule, Mafika |u Tshwane University of Technology, Pretoria, South Africa | |
| 245 | 1 | |a Identifying Cybersecurity Elements for a Cybersecurity Framework in Higher Education | |
| 260 | |b Academic Conferences International Limited |c Mar 2025 | ||
| 513 | |a Conference Proceedings | ||
| 520 | 3 | |a The increasing cybersecurity threats to higher education institutions in Africa necessitate risk management frameworks that are resilient and sensitive to regional needs. This paper applies Modified General Morphological Analysis (MGMA) to identify essential elements for an adaptable cybersecurity framework, focusing on the African higher education context. African institutions face many challenges, like limited funding, underdeveloped digital infrastructures, and rising cyberattacks. Our proposed MGMA is a structured methodology to examine key cybersecurity dimensions: governance, policy, technical controls, capacity building, and resource allocation. This approach allows for assessing complex interrelations among these elements, aimed at practical solutions suitable for African institutions. This study focuses on risk management approaches to address the specific vulnerabilities of African higher education institutions (HEIs), such as restricted budgets, inadequate cybersecurity teams, and increasing reliance on digital systems. The study promotes collaborative efforts by creating institutional networks, sharing resources, and enhancing cybersecurity expertise across Africa. The findings will guide decision-makers in aligning cybersecurity investments with strategic institutional goals, providing a framework for protecting critical educational assets, strengthening resilience, and advancing digital infrastructure development across African higher education. | |
| 610 | 4 | |a National Institute of Standards & Technology | |
| 651 | 4 | |a Africa | |
| 653 | |a Problem solving | ||
| 653 | |a Digital infrastructure | ||
| 653 | |a Higher education | ||
| 653 | |a Risk management | ||
| 653 | |a User behavior | ||
| 653 | |a Resilience | ||
| 653 | |a Intellectual property | ||
| 653 | |a Funding | ||
| 653 | |a Computer platforms | ||
| 653 | |a Resource allocation | ||
| 653 | |a Cybersecurity | ||
| 653 | |a Digital systems | ||
| 653 | |a Access to education | ||
| 653 | |a Malware | ||
| 653 | |a Higher education institutions | ||
| 653 | |a Literature reviews | ||
| 653 | |a Budgets | ||
| 653 | |a Morphology | ||
| 653 | |a Learning environment | ||
| 653 | |a Infrastructure | ||
| 653 | |a Frame analysis | ||
| 653 | |a Capacity building approach | ||
| 653 | |a Institutional investments | ||
| 653 | |a Governance | ||
| 653 | |a Institutions | ||
| 653 | |a Morphological analysis | ||
| 653 | |a Decision makers | ||
| 700 | 1 | |a van Vuuren, Joey Jansen |u Tshwane University of Technology, Pretoria, South Africa | |
| 700 | 1 | |a Leenen, Louise |u University of the Western Cape and CAIR, Cape Town, South Africa | |
| 773 | 0 | |t International Conference on Cyber Warfare and Security |g (Mar 2025), p. 584 | |
| 786 | 0 | |d ProQuest |t Political Science Database | |
| 856 | 4 | 1 | |3 Citation/Abstract |u https://www.proquest.com/docview/3202190627/abstract/embedded/ZKJTFFSVAI7CB62C?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text |u https://www.proquest.com/docview/3202190627/fulltext/embedded/ZKJTFFSVAI7CB62C?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text - PDF |u https://www.proquest.com/docview/3202190627/fulltextPDF/embedded/ZKJTFFSVAI7CB62C?source=fedsrch |