14 research outputs found

    Towards an aligned South African National Cybersecurity Policy Framework

    Get PDF
    This thesis measured and aligned factors that contribute to the misalignment of the South African National Cybersecurity Policy Framework (SA-NCPF). The exponential growth rate of cyber-attacks and threats has caused more headaches for cybersecurity experts, law enforcement agents, organisations and the global business economy. The emergence of the global Corona Virus Disease-2019 has also contributed to the growth of cyber-attacks and threats thus, requiring concerted efforts from everyone in society to devise appropriate interventions that mitigate unacceptable user behaviour in the reality of cyberspace. In this study, various theories were identified and pooled together into an integrative theoretical framework to provide a better understanding of various aspects of the law-making process more comprehensively. The study identified nine influencing factors that contributed to misalignment of the South African National Cybersecurity Policy Framework. These influencing factors interact with each other continuously producing complex relationships, therefore, it is difficult to measure the degree of influence of each factor, hence the need to look at and measure the relationships as Gestalts. Gestalts view individual interactions between pairs of constructs only as a part of the overall pattern. Therefore, the integrative theoretical framework and Gestalts approach were used to develop a conceptual framework to measure the degree of alignment of influencing factors. This study proposed that the stronger the coherence among the influencing factors, the more aligned the South African National Security Policy Framework. The more coherent the SA-NCPF is perceived, the greater would be the degree of alignment of the country's cybersecurity framework to national, regional and global cyberlaws. Respondents that perceived a strong coherence among the elements also perceived an effective SA-NCPF. Empirically, this proposition was tested using nine constructs. Quantitative data was gathered from respondents using a survey. A major contribution of this study was that it was the first attempt in South Africa to measure the alignment of the SA-NCPF using the Gestalts approach as an effective approach for measuring complex relationships. The study developed the integrative theoretical framework which integrates various theories that helped to understand and explain the South African law making process. The study also made a significant methodological contribution by adopting the Cluster-based perspective to distinguish, describe and predict the degree of alignment of the SA-NCPF. There is a dearth of information that suggests that past studies have adopted or attempted to address the challenge of alignment of the SA-NCPF using the cluster-based and Gestalts perspectives. Practical implications from the study include a review of the law-making process, skills development strategy, a paradigm shift to address the global Covid-19 pandemic and sophisticated cybercrimes simultaneously. The study asserted the importance of establishing an independent cybersecurity board comprising courts, legal, cybersecurity experts, academics and law-makers to provide cybersecurity expertise and advice. From the research findings, government and practitioners can draw lessons to review the NCPF to ensure the country develops an effective national cybersecurity strategy. Limitations and recommendations for future research conclude the discussions of this study

    The role of knowledge management in enhancing organisational performance in selected banks in South Africa

    Get PDF
    Knowledge management (KM) has been cited as a strategic asset and a source of competitive advantage for organisations. While the issues of KM have been widely discussed by many researchers, there is a paucity of studies pertaining to the role of KM in enhancing organisational performance, especially in the banking sector. The focus of this research was to investigate the role of KM in enhancing organisational performance in selected banks of South Africa. The objective was to find out how knowledge was identified, captured, organised and retained in order to enhance performance of the banks. There is uncertainty about whether the use of KM could partly solve the banks‟ approaches to improving their quality of service to their communities in the modern information environment. Though KM has been implemented in commercial and business environments towards operational advantages and financial gains, KM survival principles and tools might help South African banks improve performance and fulfil their mandate. Knowledge, when properly managed, can significantly enhance an organisation‟s performance. The research design that was used in this study was an embedded case study design. Quantitative data were collected from a sample of middle level managers with the aid of a survey whilst interviews and document analysis were used to collect qualitative data. The findings of this study indicated that KM concepts were not universally understood at selected banks. The findings showed that collaboration between banks and the communities in creating a meaningful and relevant knowledge environment was essential for the survival of organisations. The banking industry practices were not deliberately based on KM but the study established that they were amenable to KM practices. The recommendation was to perform a knowledge inventory which could help develop appropriate institution-wide policies and practices for proper and well-organised methods of integrating work processes, collaborating and sharing (including the efficient use of knowledge technology platforms), and developing an enabling institutional culture.Information ScienceD. Litt. et Phil. (Information Science

    Phishing Attacks: A Security Challenge for University Students Studying Remotely

    Get PDF
    The emergence of the deadly global respiratory coronavirus disease (COVID-19) in 2019 claimed many lives and altered the way people live and behave as well as how companies operated. Considerable pressure was exerted on Institutions of Higher Learning (universities) to salvage the academic projects through the process of business model reconfiguration. Students were required to study remotely and were, therefore, exposed to phishing and scamming cyber-attacks. The effects of these attacks were examined in this study with the support of literature and empirical research leading to appropriate recommendations being proposed. Data were obtained through semi-structured interviews from students at a selected public-funded university. Atlas.Ti was used for data analysis to identify usable and sensible themes. The study established that students were aware of the factors that exposed them to phishing and scamming attacks but lacked the skills to identify such attacks before becoming victims

    Evaluating Factors Contributing to Misalignment of the South African National Cybeersecurity Policy Framework

    Get PDF
    This paper evaluates factors contributing to misalignment of the South African National Cybersecurity Framework (SA-NCPF) and suggest better ways to align the national policy framework to national, regional and global cyberlaws. The SA-NCPF is designed to mitigate, address and provide the regulatory guidelines relating to escalating cybercrimes, however, the complexity and interplays of factors contributing to misalignment make it difficult to achieve and measure alignment of national cyberlaws. The SA-NCPF recognises the complexities, inconsistencies, fragmentation and poor coordination of e-legislation, thus, it is imperative to recommend the removal of hindrances. By reviewing various literature, we were able to discuss and integrate a number of theoretical works that explain inconsistencies/misalignments in law. We synthesised literature to produce an integrated theoretical framework, which is a major innovation of this study. The integrated theoretical framework provides a broader perspective of the influencing factors and their interplay resulting in complex relationships which are difficult to understand. The researchers used the integrative theoretical framework and the configuration approach to develop a conceptual model. This model guides the measurement of the extent of alignment of the influencing factors and the identification of that combinations of these factors that yields an effective Cybersecurity Policy Framework. The conceptual model will be validated in a later study

    Cyberattacks and threats during COVID-19: A systematic literature review

    Get PDF
    The novel Coronavirus Disease-2019 (COVID-19) pandemic, a deadly contagious disease has left the global village in disarray, driving people and firms, especially healthcare service providers to rely heavily on information communication technologies (ICTs) for administering telemedicine through digital tools. This study contributes to knowledge and information sharing and debates on cybersecurity.The objective was to analyse the impact of cybercrimes on the global economy at a time when the whole world is focused on fighting and minimising the spread of COVID-19. The study also analysed common cybersecurity threats, attacks and information systems security vulnerabilities during the period of the pandemic

    Entrepreneurship and management of small enterprises: An overview of agricultural activities in the Mopani district municipality

    Get PDF
    This study analysed entrepreneurial dynamics, activities and challenges confronting small agricultural businesses in the Mopani District Municipality in Limpopo, South Africa. Mopani is a rural district municipality and home to 1,2 million people of whom 77% live below the poverty line. Agriculture is a major income-generating sector for many disadvantaged communities in rural areas of South Africa, and it plays a significant role in the economy. The objectives of the study were to investigate the operational practices that contribute to the success/failure of emerging agricultural small enterprise owners in their agricultural activities within Mopani District – a district with large numbers of highly competitive and commercial farmers. In addition, the study suggested interventions that could help smallholder farmers to sustain their income-generating businesses

    Analysing information literacy practices at selected academic libraries in Zimbabwe

    Get PDF
    Background: Information literacy (IL) skills are significant in the knowledge and information economy because the IL skills allow information users to cope with the challenges of an evolving and complex information landscape. IL is one of the most important aspects in academic libraries because it equips university communities with the skills of finding, locating and using information effectively and efficiently. Objectives: The study focused on evaluating the IL programmes and practices, as well as the challenges of implementing IL at selected academic libraries in Zimbabwe. The objective was to establish the existing policies and skills required by institutions of higher learning to implement and teach IL. Method: Qualitative data collected using face-to-face interviews and focus group interviews were analysed with the assistance of Qualitative Data Analysis Software (Atlas. ti version 8). Participants of the study included the library directors and assistant librarians with regard to IL modules and the Zimbabwe Universities Library Consortium policy documents. Results: The results revealed that all librarians understood the importance of IL in academic libraries; however, there were no IL policies and skills in existence, either at national, consortium or institutional levels. The study revealed that Zimbabwean academic libraries used different and incoherent methods in implementing and teaching IL and that IL initiatives were confronted with a myriad of challenges. Conclusion: The study concluded that academic libraries should have IL policies in place which aid in the implementation and teaching of IL in Zimbabwean academic libraries, as well as guide all the consortium members especially on collaboration issues, teaching aspects, as well as the recognition of IL by university stakeholders other than the librarians

    Remediating Sub-Saharan airline challenges and limitations

    Get PDF
    Air transport connectivity to and within Africa is provided by both African and non-African airlines. These carriers are confronted by both intrinsic and extrinsic challenges, which constrain their ability to provide the level of air transport connectivity demanded to fully enable economic growth for the continent. In addition, since April 2020, the reduction in air connectivity resulting from the coronavirus disease 2019 (COVID-19) pandemic has further constrained the capacity of the air transport industry to meet the passenger and freight demand

    Secondary school teachers’ perceptions of BYOD among learners within the classroom

    Get PDF
    The use of personally owned devices among learners has remained a contentious issue in schools across the globe. While several studies have been devoted to explaining the importance of such initiatives, the debate has continued to rage on, with most school authorities imposing a blanket ban on the use of these devices within their premises. In this study, we seek to contribute by examining in-service teachers’ perceptions of the use of personally owned devices in schools within the global south context. The qualitative study explores teachers’ understanding of the usefulness of technology and associated devices such as smartphones in the classroom
    corecore