Cyberspace has become significant to the wellbeing of the individuals, organisations and general economy of a country. It is for this reason that a country should play a leading role in securing cyberspace. However, in the face of the inherent challenges, the awareness of and education on cyber security cannot be overlooked. This paper aims to determine the current situation regarding cyber security in South Africa (SA) as a case of developing countries, specifically from an awareness and educational point of view. This will be achieved by providing a comparative analysis between two well-advanced countries and South Africa in order to abstract key points from a policy and policy implementation point of view to the actual execution of cyber security education initiatives. From the identified key points, some aspects are highlighted that a developing country should perhaps consider in engineering its cyber security education plan.


cyberspace cyber security cyber security education 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Hunton, P.: A rigorous approach to formalising the technical investigation stages of cybercrime and criminality within a UK law enforcement enviroment. Digital Investigation 7, 105–113 (2011)CrossRefGoogle Scholar
  2. 2.
  3. 3.
    Maignan, I., Lukas, B.: The Nature and Uses of the Internet: A qualitative Investigation. Journal of Consumer Affairs 31(2), 346–371 (1997)CrossRefGoogle Scholar
  4. 4.
    Reim, A.: Cybercrimes of the 21st Century. Computer Fraud & Security 2001(3), 13–15 (2001)CrossRefGoogle Scholar
  5. 5.
    Selwyn, N.: A Safe Haven for Misbehaving? An Investigation of Online Misbehavior Among University Students. Social Science Computer Review 26(4), 446–465 (2008)CrossRefGoogle Scholar
  6. 6.
    de Joode, A.: Effective Corporate security and cybercrime. Network Security 2011(3), 16–18 (2011)CrossRefGoogle Scholar
  7. 7.
    Nickolov, E.: Critical Information Infrastructure Protection: Analysis, Evaluation and Expectations. Information & Security 17, 105–119 (2005)Google Scholar
  8. 8.
    Cole, K., Chetty, M., LaRosa, C., Reitta, F., Schmitt, D., Goodman, S.: Cybersecurity in Africa: An Assessment, (accessed April 25, 2008)
  9. 9.
    Cabinet Office In: Cabinet Office, (accessed Month 2011)
  10. 10.
    Get Safs Online In: Get Safs Online, (accessed April 2012)
  11. 11.
    BBC News: Technology In: BBC News, (accessed April 2012)
  12. 12.
    NICE In: National Initiative for Cybersecurity Education, (accessed August 2011)
  13. 13.
    Homeland Security In: Homeland Security, (accessed August 2011)
  14. 14.
    Homeland Security In: Homeland Security, (accessed October 2011)
  15. 15.
    US-CERT In: US-CERT, (accessed August 2011)
  16. 16.
    Lamprecht, I.: In: News24, (accessed March 2011)
  17. 17.
    Department of Communications In: Cloud Front, (accessed February 2010)
  18. 18.
    Houses of Parliament: Cyber Security in the UK Google Scholar
  19. 19.
    Locke, E., Shaw, K., Saari, L., Latham, G.: Goal setting and task performance: 1969–1980. Psychological Bulletin 90(1), 125–152 (1981)CrossRefGoogle Scholar

Copyright information

© ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering 2013

Authors and Affiliations

  • Noluxolo Kortjan
    • 1
  • Rossouw von Solms
    • 1
  1. 1.Nelson Mandela Metropolitan UniversityPort ElizabethSouth Africa

Personalised recommendations