Factors Affecting Cyber Security Awareness in Combating Cyber Crime in Kenyan Public Universities

Abstract

Over the years, cyber-based attacks have become widespread and are growing rapidly with the increasing use of technology. As a result, cyber security is best understood as a process designed to keep cyberspace safe from potentially known and unknown threats. Therefore, cyber security awareness is vital as it plays an important role in preventing these cyber attacks due to the increasing use of information and communication technologies (ICT) as well as e-learning platforms in universities. Therefore, the paper assesses the key factors influencing cyber security awareness in the fight against cybercrime in the context of Kenyan public universities. A survey tested academic staff from 31 public universities for the variable cyber security awareness, the variable cyber security self-perception, and the factors influencing cyber security awareness. The results show that a significant number of respondents do not have adequate cyber security training. The paper also highlights that most public universities do not have a mandated cyber security policy, as well as adequate infrastructure for ICT cyber security practices.

Country : Kenya

1 M. K. Chizanga2 J. Agola3 A. Rodrigues

  1. Jaramogi Oginga Odinga University of Science and Technology, P.O. Box 210-40601, Bondo, Kenya
  2. Jaramogi Oginga Odinga University of Science and Technology, P.O. Box 210-40601, Bondo, Kenya
  3. Jaramogi Oginga Odinga University of Science and Technology, P.O. Box 210-40601, Bondo, Kenya

IRJIET, Volume 6, Issue 1, January 2022 pp. 54-57

doi.org/10.47001/IRJIET/2022.601011

References

  1. Strassmann, P. A. "Cyber security for the Department of Defense."http://www.strassmann.com/pubs/dod/cybersecurity-draft-v1.pdf
  2. Chandarman, Rajesh, and Brett Van Niekerk. "Students' cybersecurity awareness at a private tertiary educational institution." The African Journal of Information and Communication 20 (2017): 133-155.
  3. Gaudin, Sharon. "TJ Maxx security breach costs soar to 10 times earlier estimate." Information Week. http://www.informationweek.com/shared/printableArticle.jhtml (2007).
  4. Carvalho, Joana, Rita Francisco, and Ana P. Relvas. "Family functioning and information and communication technologies: How do they relate? A literature review." Computers in Human Behavior 45 (2015): 99-108.
  5. Veletsianos, George, and Royce Kimmons. "Scholars in an increasingly open and digital world: How do education professors and students use Twitter?." The Internet and Higher Education 30 (2016): 1-10.
  6. Dunn, J. "The importance of internet access in schools." (2012). http://www.edudemic.com/the-importance-of-internet-access-in-schools/.
  7. Kiptalam, George Kibet, and Anthony Joachim Rodrigues. "Internet utilization: A case of connected rural and urban secondary schools in Kenya." International journal of computing and ICT research 4.1 (2010): 49-63.
  8. O'Brien, James A., and G. M. Marakas. "Developing business/IT solutions." Management information systems 488489 (2011): 74-89.
  9. Ojwang, Charles O. E-learning readiness and e-learning adoption among public secondary schools in Kisumu County, Kenya. Diss. 2012.
  10. Mbowe, Joseph Elias, et al. "A conceptual framework for threat assessment based on organization’s information security policy." Journal of Information Security 5.04 (2014): 166.
  11. Knapp, Kenneth Joseph. A Model of Managerial Effectiveness in Information Security: From grounded theory to empirical test. Auburn University, 2005.
  12. Aloul, Fadi A. "The need for effective information security awareness." Journal of advances in information technology 3.3 (2012): 176-183.
  13. Idrus, A. B., and J. B. Newman. "Construction related factors influencing the choice of concrete floor systems." Construction Management & Economics 20.1 (2002): 13-19.
  14. Nfuka, Edephonce Ngemera, Camilius Sanga, and Maduhu Mshangi. "The rapid growth of cybercrimes affecting information systems in the global: is this a myth or reality in Tanzania?." International Journal of Information Security Science 3.2 (2014): 182-199.
  15. Nyamongo, D. M. "Information Systems Security Management A Case Study of Private Chartered Universities in Kenya." Nairobi: Strathmore University (2012).
  16. Ndeda, Laureen Akumu, and Odoyo, Collins Otieno "Cyber threats and cyber security in the Kenyan business context". Global Scientific Journals, 7.9 (2019): 576-582.
  17. Jethwani, Kanika, and G. Surbhi. "Cyber Crime: Issues and Challenges." Delhi: International Journal of Emerging Research in Management &Technology (2015).
  18. Sawatarat, Soirithai. "Attitudes of mobile phone users toward multimedia messaging service (MMS) in Thailand: a case study of I-Mobile soft company." (2003).
  19. Brown, Scott H. "Multiple linear regression analysis: a matrix approach with MATLAB." Alabama Journal of Mathematics 34 (2009): 1-3.