184
Views
0
CrossRef citations to date
0
Altmetric
Research Article

A guiding framework for enhancing database security in state-owned universities in Zimbabwe

, ORCID Icon & ORCID Icon

References

  • Ablon, Lillian. 2018. “Data Thieves: The Motivations of Cyber Threat Actors and Their Use and Monetization of Stolen Data.” Santa Monica, CA: Rand Corporation. Accessed at www.rand.org/pubs/testimonies/CT490.html.
  • Ahlan, Abdul Rahman, Muharman Lubis, and Arif Ridho Lubis. 2015. “Information Security Awareness at the Knowledge-Based Institution: Its Antecedents and Measures.” Procedia Computer Science 72: 361–73. https://doi.org/10.1016/j.procs.2015.12.151.
  • Al-Mohannadi, Hamad, Qublai Mirza, Anitta Namanya, Irfan Awan, Andrea Cullen, and Jules Disso. 2016. “Cyber-Attack Modeling Analysis Techniques: An Overview.” In Proceedings – 2016 4th International Conference on Future Internet of Things and Cloud Workshops, W-FiCloud 2016, 69–76. Institute of Electrical and Electronics Engineers Inc. doi:10.1109/W-FiCloud.2016.29.
  • Aldawood, Hussain, and Geoffrey Skinner. 2019. “Reviewing Cyber Security Social Engineering Training and Awareness Programs-Pitfalls and Ongoing Issues.” Future Internet 11 (3). https://doi.org/10.3390/fi11030073.
  • Asean. 2014. “ASEAN Investment Report 2013-2014: FDI Development and Regional Value Chains.” Jakarta 12110. https://unctad.org/system/files/official-document/unctad_asean_air2014d1.pdf.
  • Basharat, Iqra, and Abdul Wahab Muzaffar. 2012. “Database Security and Encryption: A Survey Study.” International Journal of Computer Applications 47.
  • Cacciattolo, Marcelle. 2015. “Ethical Considerations in Research.” The Praxis of English Language Teaching and Learning (PELT): Beyond the Binaries: Researching Critically in EFL Classrooms, 55–73. doi:10.1007/978-94-6300-112-0_4.
  • *Chabrow, E. 2015. “China Blamed for Penn State Breach - Hackers Remained Undetected for More than Two Years.” Data Breach Today, May 15, 2015. http://www.databreachtoday.com/china-blamed-for-penn-state-breach-a-8230.
  • Cherdantseva, Yulia. 2014. “Secure *BPMN – A Graphical Extension for BPMN 2.0 Based on a Reference Model of Information Assurance & Security.” PhD diss., Cardiff University. http://orca.cardiff.ac.uk/id/eprint/74432.
  • CNBC. 2014. “Hackers Target Colleges to Steal Personal Data, University Research.” CNBC, August 21. https://www.cnbc.com/2014/08/21/hackers-target-colleges-to-steal-personal-data-university-research.html.
  • Cohen, Louis, Lawrence Manion, and Keith Morrison. 2017. Research Methods in Education. Research Methods in Education. doi:10.4324/9781315456539.
  • Coleman, Lori, and Bernice M Purcell. 2015. “Data Breaches in Higher Education.” Journal of Business Cases and Applications 15 (15): 1–7.
  • Comber, C., A. Colley, D. J. Hargreaves, L. Dorn. 1997. "The Effects of Age, Gender and Computer Experience upon Computer Attitudes." Educational Research 39 (2): 123–133. doi:10.1080/0013188970390201.
  • EdGuards. 2018. “Brief History of Higher Education Insecurity.” Accessed at https://edguards.com/wp/a-brief-history-of-higher-education-insecurity/.
  • ENISA. 2019. “ENISA Threat Landscape Report 2018 15 Top Cyberthreats and Trends.” doi:10.2824/622757.
  • Financial Gazette. 2017. “Harare Institute of Technology Allegedly Hit with Cyber Attack,” June 20, 2017. https://www.financialgazette.co.zw/harare-institute-of-technology-allegedly-hit-with-cyber-attack/.
  • Frazer, L., and M. Lawley. 2001. Questionnaire Design and Administration. Brisbane: Wiley.
  • Fontes, Edison Luiz Gonçalves, and Antonio José Balloni. 2007. “Innovations and Advanced Techniques in Computer and Information Sciences and Engineering.” Innovations and Advanced Techniques in Computer and Information Sciences and Engineering September: 163–166. doi:10.1007/978-1-4020-6268-1_30.
  • Gay, Mills. 2016. Quantitative Research Relies on the Collection and Analysis of Numerical Data to Describe, Explain, Predict, or Control Variables and Phenomena of Interest. New York: Sage.
  • Gocha, Munyaradzi, Samuel Musungwini, and Lockias Chitanana. 2014. “The Use of Information Communication Technology by A-Level Teachers in Selected Secondary Schools in Gweru, Zimbabwe.” Journal of Technology Management 1 (1): 1–21.
  • Halevi, Tzipora, Nasir Memon, James Lewis, Ponnurangam Kumaraguru, Sumit Arora, Nikita Dagar, Fadi Aloul, and Jay Chen. 2016. “Cultural and Psychological Factors in Cyber-Security.” ACM International Conference Proceeding Series, no. November: 318–24. doi:10.1145/3011141.3011165.
  • Hashim, Hassan Bediar. 2018. “Challenges and Security Vulnerabilities to Impact on Database Systems.” Al-Mustansiriyah Journal of Science 29 (2): 117. doi:10.23851/mjs.v29i2.332.
  • Horne, Craig A., Atif Ahmad, and Sean B. Maynard. 2016. “A Theory on Information Security A Theory on Information Security A Theory on Information Security.” 1–12.
  • Hussein, Ayub. 2012. “Evaluation of Data Security Measures in a Network Environment Towards Developing Cooperate Data Security Guidelines.” International Journal of Advanced Computer Science and Applications 3 (3): 106–9. https://doi.org/10.14569/ijacsa.2012.030318.
  • Hussein, N. H, and A Khalid. 2016. “A Survey of Cloud Computing Security Challenges and Solutions.” International Journal of Computer Science and Information Security 14 (1): 52–56. http://search.proquest.com.library.capella.edu/docview/1764183503?accountid=27965.
  • Imperva. 2015. “Top Ten Database Security Threats.” Accessed at https://informationsecurity.report/Resources/Whitepapers/e763d022-6ee4-4215-9efd-1896b0d9c381_wp_topten_database_threats%20imperva.pdf
  • International Telecommunication Union, O.E.C.D. 2011. M-Government: Mobile Technologies for Responsive Governments and Connected Societies. Paris. doi:10.1787/9789264118706-en.
  • Iyamu, Tiko, and Yandiswa Ngqame. 2017. “Towards a Conceptual Framework for Protection of Personal Information from the Perspective of Activity Theory.” South African Journal of Information Management 19 (1): 1–7. https://doi.org/10.4102/sajim.v19i1.867.
  • Iqra, Basharat, Azam Farooque, and Muzaffar Wahab Abdul. 2012. “Database Security and Encryption: A Survey Study.” International Journal of Computer Applications 47 (12): 975–888. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.258.8172&rep=rep1&type=pdf.
  • Jain, Swati, and Dimple Chawla. 2020. “A Relative Study on Different Database Security Threats and Their Security Techniques.” International Journal of Innovative Science and Research Technology 5 (1): 794–799. doi:10.13140/RG.2.2.11657.60000.
  • Kay, R., D. Benzimra, and J. Li. 2017. “Exploring Factors That Influence Technology-Based Distractions in Bring Your Own Device Classrooms.” Journal of Educational Computing Research 55 (7): 974–95.
  • Krombholz, K., H. Hobel, M. Huber, and E. Weippl. 2015. “Advanced Social Engineering Attacks.” Journal of Information Security and Applications, 22, 113–122.
  • Kshetri, Nir. 2015. “Cybercrime and Cybersecurity Issues in the BRICS Economies.” Journal of Global Information Technology Management 18 (4): 245–249. doi:10.1080/1097198X.2015.1108093.
  • Kshetri, Nir. 2019. “Cybercrime and Cybersecurity in Africa.” Journal of Global Information Technology Management 22 (2): 77–81. https://doi.org/10.1080/1097198X.2019.1603527.
  • Liu, Che-wei., Peng Huang, and Henry C. Lucas Jr. 2020. “Centralized IT Decision Making and Cybersecurity Breaches: Evidence from U.S. Higher Education Institutions.” Journal of Management Information Systems 37 (3): 758–787. doi:10.1080/07421222.2020.1790190.
  • Liu, Che-Wei, Peng Huang and Henry C. Lucas. 2016. “IT Governance, Security Outsourcing, and Cybersecurity Breaches: Evidence from the U.S. Higher Education.” doi:10.2139/ssrn.2850178.
  • Madondo, Tinos. 2017. “Exploring Cyber Security Threats in Zimbabwe.” Policy Brief No. 8, November 2017.
  • Mahlangu, Gilbert, Samuel Musungwini, and Sindiso Nleya. 2018. “An Algorithm for Using Internet of Things (IoTs) to Improve Load Management in Electric Power Grid.” International Journal of Computer Applications 179 (35): 10–17. doi:10.5120/ijca2018916786.
  • Malik, Mubina. 2019. “Database Security – Attacks and.” doi:10.5121/ijist.2016.6218.
  • Malik, Mubina, and Trisha Patel. 2016. “Database Security – Attacks and Control Methods.” International Journal of Information Sciences and Techniques 6 (1/2): 175–183. doi:10.5121/ijist.2016.6218.
  • Mello, Samantha. 2018. “Data Breaches in Higher Education Institutions.” University of New Hampshire, Durham. https://scholars.unh.edu/cgi/viewcontent.cgi?article=1407&context=honors.
  • Moghaddasi, Hamid, Samad Sajjadi, and Mehran Kamkarhaghighi. 2016. “Reasons in Support of Data Security and Data Security Management as Two Independent Concepts: A New Model.” The Open Medical Informatics Journal 10 (1): 4–10. doi:10.2174/1874431101610010004.
  • Mybroadband. 2016. “South African University Website Hacked.” May 13. Accessed at https://mybroadband.co.za/news/security/165004-south-african-university-website-hacked-by-anonymous.html.
  • Naveh, Gali. 2015. “Information Technology in Higher Education Teaching: Much Ado About Nothing?” CSEDU 2015 – 7th International Conference on Computer Supported Education, Proceedings 2: 450–454. doi:10.5220/0005486904500454.
  • Nokhbeh Zaeem, Razieh, Monisha Manoharan, Yongpeng Yang, and K. Suzanne Barber. 2017. “Modeling and Analysis of Identity Threat Behaviors Through Text Mining of Identity Theft Stories.” Computers and Security 65 (March): 50–63. doi:10.1016/j.cose.2016.11.002.
  • Pawlak, Patryk, and Gergana Petkova. 2015. “State-Sponsored Hackers: Hybrid Armies?European Union Institute for Security Studies. doi:10.2815/341983.
  • Pindula. 2017. “HIT and Nust Websites Hacked.” Accessed at https://news.pindula.co.zw/2017/06/22/hit-nust-websites-hacked/.
  • Qiang, C. Z.-W., G. R. Clarke, and N. Halewood. 2006. The Role of ICT in Doing Business. Information and Communications for Development Global Trends and Policies. doi:10.1596/978-0-8213-6346-1.
  • Rajguru, Shagufta, and Deepak Sharma. 2014. “Countermeasures to Database Security: A Survey.” International Journal of Computer Applications 87 (7): 1–5. doi:10.5120/15217-3722
  • Raymond, Mugyenyi. 2017. “Analysing Information Systems Security in Higher Learning Institutions of Uganda.” International Journal of Scientific & Technology Research 6 (10): 385–392.
  • Reserve Bank of Zimbabwe. 2021. “National Payment Systems: Risk Based Guideline On Cybersecurity.” Accessed at https://www.rbz.co.zw/documents/nps/2021/NPS-CYBER-SECURITY-FRAMEWORK-20210427.pdf.
  • Ross, Anderson. 2008. Security Engineering: A Guide to Building Dependable Distributed Systems. Indianapolis, IN: Wiley.
  • Ruvinga, Caroline, Lawrence Ruvinga, Munyaradzi Zhou, Samuel Musungwini, and Tinashe Gwendolyn Zhou. 2014. “Laying Foundation for Software Development Industry in Zimbabwe.” International Journal of Advanced Research in Computer Science and Technology (IJARCST 2014) 2 (1). Accessed at http://ir.msu.ac.zw:8080/xmlui/bitstream/handle/11408/3445/Layingfoundation for software development.pdf?sequence=1&isAllowed=y.
  • Safa, N. S. 2019. “Deterrence and Prevention-Based Model to Mitigate Information Security Insider Threats in Organisations.” Future Generation Computer Systems, 97, 587–597.
  • Sani, Habiba, and Muhammad Yabo. 2015. “A Database System Security Framework.” International Journal of Computer Science and Information Technology 7 (6): 165–174. doi:10.5121/ijcsit.2015.7614.
  • Sharma, Shwadhin. 2020. “I Want It My Way: Using Consumerism and Neutralization Theory to Understand Students’ Cyberslacking Behavior.” International Journal of Information Management 53 (August). doi:10.1016/j.ijinfomgt.2020.102131.
  • Sarmah, Simanta Shekhar. 2019. “Database Security –Threats & Prevention.” International Journal of Computer Trends and Technology 67 (5): 46–53. https://doi.org/10.14445/22312803/ijctt-v67i5p108
  • Straumshein, C. 2015. “A Playground for Hackers.” Inside Higher Ed. Accessed at https://www.insidehighered.com/news/2015/07/06/pennsylvania-state-u-cyberattackspossibly-part-larger-trend-experts-say
  • Techzim. 2017. “Harare Institute of Technology Allegedly Hit with Cyber Attack.” Accessed at https://www.techzim.co.zw/2017/06/hit-allegedly-hit-cyber-attack/.
  • The Ugandan. 2017. “Makerere System Hacked, 50 Students Deleted from 2017 Graduation List.” The Ugandan. https://thelocal.ug/makerere-system-hacked-50-students-deleted-from-2017-graduation-list/.
  • Tsokota, Theo, Samuel Musungwini, and Amanda Mutembedza. 2020. “A Strategy to Enhance Consumer Trust in the Adoption of Mobile Banking Applications.” African Journal of Science, Technology, Innovation and Development 0 (0): 1–16. doi:10.1080/20421338.2020.1829352.
  • Ulven, Joachim Bjørge, and Gaute Wangen. 2021. “A Systematic Review of Cybersecurity Risks in Higher Education.” Future Internet 13 (2): 39. doi:10.3390/fi13020039.
  • Utami, Ema, and Suwanto Raharjo. 2014. “Database Security – Attacks and Control Methods.” International Journal of Information Technology and Computer Science 2014 (Fisma 2014): 1–11. doi:10.5121/ijist.2016.6218.
  • Utami, Ema, Stmik Amikom Yogyakarta, Suwanto Raharjo, and Teknologi Akprind Yogyakarta. 2016. “Database Security Model in the Academic Information System.” doi:10.14257/ijsia.2014.8.3.18.
  • Van Niekerk, Brett. 2017. “An Analysis of Cyber-Incidents in South Africa.” The African Journal of Information and Communication 20: 113–132. doi:10.23962/10539/23573.
  • Venter, Isabella M., Rénette J. Blignaut, Karen Renaud, and M. Anja Venter. 2019. “Cyber Security Education is as Essential as ‘the Three R’s’.” Heliyon 5 (12): 0–7. doi:10.1016/j.heliyon.2019.e02855.
  • Verizon. 2017. “2017 Data Breach Investigations Report Tips on Getting the Most from This Report.” Verizon Business Journal. doi:10.1017/CBO9781107415324.004.
  • White, H. D. 2007. “Combining Bibliometrics, Information Retrieval, and Relevance Theory, Part 2: Some Implications for Information Science.” Journal of the Association for Information Science and Technology 58 (4): 583–605. doi.org/10.1002/asi.20542.
  • World Economic Forum. 2020. “Why Investors Should Care about Cyber Breaches.” World Economic Forum: Global Risks Report, 2020. Accessed at https://www3.weforum.org/docs/WEF_Global_Risk_Report_2020.pdf.
  • Yojana, Sharma. 2018. Hundreds of Universities Targeted in Global Data Steal. University World News.
  • Zhou, Munyaradzi, Marlien Herselman, and Alfred Coleman. 2015. “USSD Technology a Low Cost Asset in Complementing Public Health Workers’ Work Processes.” Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 9044: 57–64. doi:10.1007/978-3-319-16480-9_6.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.