Skip to main content

Cyber Security Education in Developing Countries: A South African Perspective

  • Conference paper

Abstract

Cyberspace has become significant to the wellbeing of the individuals, organisations and general economy of a country. It is for this reason that a country should play a leading role in securing cyberspace. However, in the face of the inherent challenges, the awareness of and education on cyber security cannot be overlooked. This paper aims to determine the current situation regarding cyber security in South Africa (SA) as a case of developing countries, specifically from an awareness and educational point of view. This will be achieved by providing a comparative analysis between two well-advanced countries and South Africa in order to abstract key points from a policy and policy implementation point of view to the actual execution of cyber security education initiatives. From the identified key points, some aspects are highlighted that a developing country should perhaps consider in engineering its cyber security education plan.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Hunton, P.: A rigorous approach to formalising the technical investigation stages of cybercrime and criminality within a UK law enforcement enviroment. Digital Investigation 7, 105–113 (2011)

    Article  Google Scholar 

  2. Digital Britain In: Digital Britain the interim report, http://webarchive.nationalarchives.gov.uk/+/http://www.culture.gov.uk/images/publications/digital_britain_interimreportjan09.pdf (accessed January 2009)

  3. Maignan, I., Lukas, B.: The Nature and Uses of the Internet: A qualitative Investigation. Journal of Consumer Affairs 31(2), 346–371 (1997)

    Article  Google Scholar 

  4. Reim, A.: Cybercrimes of the 21st Century. Computer Fraud & Security 2001(3), 13–15 (2001)

    Article  Google Scholar 

  5. Selwyn, N.: A Safe Haven for Misbehaving? An Investigation of Online Misbehavior Among University Students. Social Science Computer Review 26(4), 446–465 (2008)

    Article  Google Scholar 

  6. de Joode, A.: Effective Corporate security and cybercrime. Network Security 2011(3), 16–18 (2011)

    Article  Google Scholar 

  7. Nickolov, E.: Critical Information Infrastructure Protection: Analysis, Evaluation and Expectations. Information & Security 17, 105–119 (2005)

    Google Scholar 

  8. Cole, K., Chetty, M., LaRosa, C., Reitta, F., Schmitt, D., Goodman, S.: Cybersecurity in Africa: An Assessment, http://www.cistp.gatech.edu/publications/files/AnAssessmentofAfricanCybersecurity.pdf (accessed April 25, 2008)

  9. Cabinet Office In: Cabinet Office, http://www.cabinetoffice.gov.uk/news/protecting-and-promoting-uk-digital-world (accessed Month 2011)

  10. Get Safs Online In: Get Safs Online, http://www.getsafeonlineblog.org/get-safe-online-the-rough-guide-to-online-safety (accessed April 2012)

  11. BBC News: Technology In: BBC News, http://www.bbc.co.uk/news/technology-107425888?print=true (accessed April 2012)

  12. NICE In: National Initiative for Cybersecurity Education, http://csrc.nist.gov/nice/ (accessed August 2011)

  13. Homeland Security In: Homeland Security, http://www.dhs.gov/files/events/stop-think-connect.shtm (accessed August 2011)

  14. Homeland Security In: Homeland Security, http://www.dhs.gov/files/programs/gc_1158611596104.shtm (accessed October 2011)

  15. US-CERT In: US-CERT, http://www.us-cert.gov/ (accessed August 2011)

  16. Lamprecht, I.: In: News24, http://www.news24.com/SciTech/SA-ranks-high-in-cyber-crime-20110327-2 (accessed March 2011)

  17. Department of Communications In: Cloud Front, http://d2zmx6mlqh7g3a.cloudfront.net/cdn/farfuture/mtime:1266829764/files/docs/100219cybersecurity.pdf (accessed February 2010)

  18. Houses of Parliament: Cyber Security in the UK

    Google Scholar 

  19. Locke, E., Shaw, K., Saari, L., Latham, G.: Goal setting and task performance: 1969–1980. Psychological Bulletin 90(1), 125–152 (1981)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Kortjan, N., von Solms, R. (2013). Cyber Security Education in Developing Countries: A South African Perspective. In: Jonas, K., Rai, I.A., Tchuente, M. (eds) e-Infrastructure and e-Services for Developing Countries. AFRICOMM 2012. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 119. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-41178-6_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-41178-6_30

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-41177-9

  • Online ISBN: 978-3-642-41178-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics