The growing interconnectedness of the world has led to a rise in cybersecurity risks. Although it is increasingly conventional to use technology to assist business transactions, exposure to these risks must be minimised to allow business owners to do transactions in a secure manner. While a wide range of studies have been undertaken regarding the effects of cyberattacks on several industries and sectors, However, very few studies have focused on the effects of cyberattacks on the educational sector, specifically higher educational institutions (HEIs) in West Africa. Consequently, this study developed a survey and distributed it to HEIs particularly universities in West Africa to examine the data architectures they employed, the cyberattacks they encountered during the COVID-19 pandemic period, and the role of data analysis in decision-making, as well as the countermeasures employed in identifying and preventing cyberattacks. A total of one thousand, one hundred and sixty-four (1164) responses were received from ninety-three (93) HEIs and analysed. According to the study’s findings, data-informed architecture was adopted by 71.8% of HEIs, data-driven architecture by 24.1%, and data-centric architecture by 4.1%, all of which were vulnerable to cyberattacks. In addition, there are further concerns around data analysis techniques, staff training gaps, and countermeasures for cyberattacks. The study’s conclusion includes suggestions for future research topics and recommendations for repelling cyberattacks in HEIs.
The ability to take advantage of new digital solutions and technology will give companies a competitive edge, and operational optimization remains a major concern. A significant area of risk is cyber security because software-based technologies are integral to ship operations. Particular emphasis has been placed on the vulnerabilities of the Global Navigation Satellite System (GNSS), since it is an essential part of many maritime facilities and hence a target for hackers. Presently, research has shown that increased integration of new enabling technologies, like the Internet of Things (IoT) and big data, is driving the dramatic proliferation of cybercrimes. However, most of the attacks are related to ransomware attacks and/or with direct attack to the information technology (IT) and infrastructure. Nevertheless, there is a strong trend toward increased systems integration, which will produce substantial business value by making it easier to operate autonomous vessels, utilizing smart ports more, reducing the need for labour, and improving economic stability and service efficiency. Cybersecurity is becoming more and more important as a result of the quick digital transformation of the offshore and maritime sectors, which has also brought new dangers and laws. The marine sector has started to take cybersecurity seriously in light of the multiple documented instances of cyberattacks that have exposed business or personal data, caused large financial losses, and caused other problems. However, the body of existing research on emerging threats in maritime cyberspace is either inadequate or ignores important variables. Based on the most recent developments in the maritime sector, the article presents a classification of the most serious cyberthreats as well as the risks to cybersecurity in maritime operations and possible mitigation strategies from an educational research perspective.
The study is focusing on cyberspace—a new type of space mastered by humans with the help of digital technologies. This systematic review uses SPAR-4-SLR protocol to analyze over 30 years of scholarly research indexed in Scopus database, highlighting five time periods: before 1995, 1996–2008, 2009–2012, 2013–2019, and after 2020. A final sample of 6645 publications in social sciences, Business, management and accounting (BMA), and Economics, econometrics and finance (EEF) was analyzed across multiple parameters, including: chronology, types of documents, sources, countries, institutions, authors, topics, and most cited publications. The review has systematized information about the most influential organizations and individuals involved in cyberspace research. First of all, these are researchers from the United States, the United Kingdom, and China. Key journals that publish research on the topic have been identified, and a ranked list of funding organizations supporting research on the social and economic aspects of cyberspace are identified. The study provides insights into the achievements of the social and economic sciences in cyberspace over the past 30 years. The results will be useful to scholars who seek for a general overview on the topic of cyberspace, as well as experts and policymakers developing mechanisms and tools for regulating cyberspace as a mixture of the virtual and real worlds.
A smart city focuses on enhancing and interconnecting facilities and services through digital technology to offer convenient services for both people and businesses. The basic infrastructure of smart cities consists of modern technologies such as the Internet of Things (IoT), cloud computing and artificial intelligence. These urban areas utilize different networks, such as the Internet and IoT, to share real-time information, improving convenience for the inhabitants. However, the reliance of smart cities on modern technologies exposes them to a range of organized, diverse, and sophisticated cyber threats. Therefore, prioritizing cybersecurity awareness and implementing appropriate measures and solutions are essential to protect the privacy and security of citizens. This study aims to identify cyber threats and their impact on smart cities, as well as the methods and measures required for key areas such as smart government, smart healthcare, smart mobility, smart environment, smart economy, smart living, and smart people. Furthermore, this study seeks to evaluate previous research in this field, establish necessary policies to mitigate these threats, and propose an appropriate model for the infrastructure associated with IT networks in smart cities.
The technological infrastructure is the basis for the successful implementation and operation of information systems in small and medium enterprises. The study aimed to demonstrate the impact of cybersecurity on entrepreneurship strategies in small and medium enterprises. Through technological infrastructure in Balqa Governorate. The study population consisted of small and medium enterprises in Balqa Governorate in Jordan. The study followed the descriptive analytical approach and relied on the questionnaire to collect data. The sample size was 360 individuals were randomly select. The Statistical Package for Social Sciences (SPSS) was use to analyze the data. The study reached a set of results, including that the management of small and medium enterprises is committed to continuous supervision and control of customer information. Dealing with reliable parties to ensure the confidentiality of information, following strict standards for disclosure and circulation of customer data and information based on legal texts. Maintaining the privacy of customers’ financial data, in addition to supporting the successes of individuals based on the personal efforts of employees, providing a suitable work environment for employees, sustaining excellence and achievement, and working to increase awareness among its employees of the importance of innovation and creativity in work. The study recommended that customer data confidentiality should be consider a top priority for small and medium enterprises. The data should be stored in more than one place at the same time, that project websites should follow a privacy policy, and that the customer’s identity should be verify before submitting his data and documents, by involving employees in small and medium enterprises in specialized courses and workshops to demonstrate the importance of data and information confidentiality.
Distributed Energy Resources (DERs), such as solar photovoltaic (PV) systems, wind turbines, and energy storage systems, offer many benefits, including increased energy efficiency, sustainability, and grid reliability. However, their integration into the smart grid also introduces new vulnerabilities to cyber threats. The smart grid is becoming more digitalized, with advanced technologies like Internet of Things (IoT) devices, communication networks, and automation systems that enable the integration of DER systems. While this enhances grid efficiency and control, it creates more entry points for attackers and thus expands the attack surface for potential cyber threats. Protecting DERs from cyberattacks is crucial to maintaining the overall reliability, security, and privacy of the smart grid. The adopted cybersecurity strategies should not only address current threats but also anticipate future dangers. This requires ongoing risk assessments, staying updated on emerging threats, and being prepared to adapt cybersecurity measures accordingly. This paper highlights some critical points regarding the importance of cybersecurity for Distributed Energy Resources (DERs) and the evolving landscape of the smart grid. This research study shows that there is need for a proactive and adaptable cybersecurity approach that encompasses prevention, detection, response, and recovery to safeguard these critical energy systems against cyber threats, both today and in the future. This work serves as a valuable tool in enhancing the cybersecurity posture of utilities and grid-connected DER owners and operators. It allows them to make informed decisions, protect critical infrastructure, and ensure the reliability and security of grid-connected DER systems in an evolving energy landscape.
Copyright © by EnPress Publisher. All rights reserved.