ArticlePDF Available

Abstract

This paper proposes the Cyber Resilience Preparedness Index for monitoring and comparing the cyber resilience of Africa’s top-12 emerging economies. The index covers five critical areas that incorporate a total of 24 indicators derived or adapted from the International Telecommunication Union’s 2014 Cyber Wellness Profiles, a Depository Trust and Clearing Corporation white paper on global cyber risk and the well-known Cyber Readiness Index. The final Cyber Resilience Preparedness Index is a simple average of the five area (sub-index) scores; the score for each sub-index is also the simple average of the scores of the composing indicators. This computation assumes that all the sub-indices contribute equally to national cyber resilience preparedness. The results indicate that six countries, namely Sudan, Ghana, Libya, Zimbabwe, Algeria and Angola, are at risk to compromises of their critical systems. In contrast, Egypt tops the chart of six countries, Egypt, Kenya, Nigeria, Tunisia, Morocco and South Africa, that demonstrate preparedness against compromises to their critical systems, industries and classified documents, as well as against industrial espionage. This study also argues that assessments of the progress of Africa’s fastest-growing economies should be conducted periodically using evolving evaluation criteria.
Ada S. Peter, Cyber resilience preparedness of Africa’s top-12 emerging economies, International
Journal of Critical Infrastructure Protection, Available online 27 March 2017, ISSN 1874-5482,
http://dx.doi.org/10.1016/j.ijcip.2017.03.002.
(http://www.sciencedirect.com/science/article/pii/S1874548217300458)
Abstract
This paper proposes the Cyber Resilience Preparedness Index for monitoring and comparing the
cyber resilience of Africa’s top-12 emerging economies. The index covers five critical areas that
incorporate a total of 24 indicators derived or adapted from the International Telecommunication
Union’s 2014 Cyber Wellness Profiles, a Depository Trust and Clearing Corporation white paper
on global cyber risk and the well-known Cyber Readiness Index. The final Cyber Resilience
Preparedness Index is a simple average of the five area (sub-index) scores; the score for each
sub-index is also the simple average of the scores of the composing indicators. This computation
assumes that all the sub-indices contribute equally to national cyber resilience preparedness.
The results indicate that six countries, namely Sudan, Ghana, Libya, Zimbabwe, Algeria and
Angola, are at risk to compromises of their critical systems. In contrast, Egypt tops the chart of six
countries, Egypt, Kenya, Nigeria, Tunisia, Morocco and South Africa, that demonstrate
preparedness against compromises to their critical systems, industries and classified documents, as
well as against industrial espionage. This study also argues that assessments of the progress of
Africa’s fastest-growing economies should be conducted periodically using evolving evaluation
criteria.
Keywords: Emerging Economies; Africa; Cyber Resilience Preparedness; Cyber Resilience
Preparedness Index.
... Global cybercrime has increased unprecedentedly in recent years [20], [17]. Africa has not been excluded either, as reports indicate that it has one of the highest rates of cybercrime, which impacts the continent's strategic, economic, and social development [18]. ...
... In this direction, attempts have been made to assess the state of cyber security awareness (knowledge of cyber threats and risk, cyber hygiene, and suitable response options) in Africa [20]. Overall, the results indicate that a lack of awareness campaigns about cyber security and Internet safety leads to a lax corporate environment regarding information security and has harmed public trust on multiple occasions [20], [21]. ...
... In this direction, attempts have been made to assess the state of cyber security awareness (knowledge of cyber threats and risk, cyber hygiene, and suitable response options) in Africa [20]. Overall, the results indicate that a lack of awareness campaigns about cyber security and Internet safety leads to a lax corporate environment regarding information security and has harmed public trust on multiple occasions [20], [21]. This report analyzes the potential and problems facing business cyber security in Africa today. ...
Article
Full-text available
This study explores the outlook of cyber security in African businesses. Issues and ways out in a changing environment were highlighted. Cybersecurity measures need to be strengthened because cybercrime is estimated to cost the African continent about $10 billion annually. With just 20,000 certified cyber security specialists in Africa compared to over 1.3 million in the US, the study emphasizes African firms' low awareness and understanding. Based on empirical research and worldwide cyber security indexes, the paper analyzes the main obstacles to successful cyber security measures, such as resource limitations, knowledge gaps, and insufficient legislative frameworks. It also delved into real-world implementation problems, including disjointed infrastructure and linguistic hurdles. The report suggests cyber security awareness, utilizing technology, and encouraging cooperation through public-private partnerships to minimize these issues. The study further highlights the application of Artificial Intelligence (AI), which is revolutionizing cyber security defenses and promoting the adoption of cyber security in Africa. African businesses can negotiate the complicated cyber security landscape, resulting in a more reliable and secure digital environment and enormous potential for economic growth.
... Beduhn et al. (2017) deployed a risk-informed decision-making (RIDM) and potential failure mode analysis (PFMA) process toward the assessment of vulnerabilities and hazards, as well as the consequences of CI failure to US communities. Similarly, Peter (2017) proposed an index for cyber resilience preparedness, towards the monitoring and comparison of cyber resilience of Africa's top 12 emerging economies. ...
Article
Full-text available
Security vulnerability assessments are crucial for the sustainable development of critical infrastructure amid intensifying global environmental and socio-economic challenges. This study employs a scientometric analysis of 247 bibliographic records from the Web of Science database (2002–2022) to explore research trends and developments. A novel contribution is the mapping of research priorities before and after the 2015 United Nations Sustainable Development Goals (SDGs) declaration, illustrating a shift from "critical infrastructure" to "resilience," a perspective not comprehensively addressed in prior reviews. Using CiteSpace, the study identifies key research clusters, collaborative networks, and keyword evolutions, providing a robust, quantitative depiction of the field’s intellectual structure. The research highlights the significant roles of the USA, Italy, and China, and the influence of journals like Reliability Engineering and System Safety and Natural Hazards. It uncovers underexplored areas such as the integration of GIS, artificial intelligence, and digital twins into vulnerability assessments, positioning the research to tackle contemporary challenges, particularly climate change adaptation. These findings offer valuable insights into the evolving dynamics of infrastructure sustainability and resilience. The study emphasizes the necessity of cross-disciplinary collaborations and innovations, guiding future research and policy-making to strengthen infrastructure protection in a rapidly changing global context. This comprehensive knowledge mapping provides actionable insights for policymakers, academics, and practitioners aiming to develop robust, sustainable infrastructure strategies.
... This progress highlights the potential of e-learning to bridge knowledge gaps across rural and urban demographics. However, like other developing regions, Kenya faces challenges in cybersecurity preparedness, including limited capacity for cybersecurity training, insufficient CSA programs, and weak enforcement of robust information security policies (Akacha & Awad, 2023;Ifeanyi-Ajufo, 2023;Peter, 2017;Tetteh & Otioma, 2024). The vulnerabilities in Kenya's education system are mirrored in other developing countries. ...
Article
Full-text available
In recent times, the rapid growth of e-learning has brought about increased concerns regarding cybersecurity risks within digital learning environments. Despite the growing importance of cybersecurity awareness among e-learning students, there is limited research on the factors that influence students' understanding and adherence to cyber safety practices. This study investigates the relationship between e-learning engagement, cybersecurity awareness, and cyber safety practices, with a focus on the moderating roles of gender and e-learning experience. The research emphasizes the need to consider demographic factors such as gender and experience level when designing cybersecurity interventions for online learners. The investigation uses structural equation modeling to analyze how engagement in e-learning platforms influences students' cybersecurity awareness and their adherence to security protocols. Among the key findings from SEM, the study reveals that e-learning engagement positively impacts cybersecurity awareness, with gender and experience level acting as significant moderators. However, the study also found that experienced learners may initially face challenges in applying security protocols effectively, though their understanding improves over time with continued engagement. In addition, the research found that students with higher e-learning engagement are more likely to adopt cyber safety practices and comply with information security policies. Interestingly, the results suggest that educational institutions should tailor cybersecurity programs to address the unique needs of students based on their gender and experience levels. Furthermore, our research can inform future policies and interventions aimed at promoting cybersecurity awareness among e-learning students, ultimately contributing to safer and more secure digital learning environments.
... The ability to fend off cyberattacks and reduce risks is referred to as cyber resilience. Local and global economies must maximize the value of technological innovation (Peter, 2017). This condition involves a combination of technical measures, policies, procedures, and training designed to help organizations maintain their critical operations and services in the face of cyber threats (Steingartner, Galinec and Kozina, 2021). ...
Article
Full-text available
The maritime industry is increasingly dependent on digital technology, making it vulnerable to cyber threats. Every stakeholder is exposed to cybersecurity risks and challenges. This research aims to provide an assessment and simulation model of cyber resilience in the maritime domain, supported by qualitative descriptive statistical methods. This study is also supported by system dynamics and Analytical Hierarchy Process (AHP). The data were obtained from an eight-member expert panel (academics and practitioners) and pertain to the research period January 2022 – February 2023 and the Indonesian Sea area. Research results on global weight revealed the threat (MC-1), vulnerability (MC-2), and technologies (MC-3) sub-criteria as the most important, with the global weight of 0.102 each, followed by the navigation (MO-2), and governance and compliance (CR-6) sub-criteria with the global weight of 0.072 and 0.065, respectively. Maritime cyber resilience evaluation is based on three main criteria. The maritime operation criterion has the highest resilience value, with overall evaluated value of maritime cyber resilience being in the acceptance resilience category level 4, with the value of 3.535 (70.701%). Furthermore, changes in the maritime cyber resilience value in the 2022-2025 period are still at level 4 (acceptance resilience). Maritime cyber resilience is expected to stagnate at its current level 4 in 2023. In the third and fourth year (2024-2025), a downward trend in the maritime cyber resilience value is expected.
... The Cyber Resilience Preparedness Index (C.R.I.), published in 2017, zoomed in on Africa's top 12 emerging economies. Egypt, Nigeria, and Kenya were classified as the most cyber-resilient countries on the continent (Peter, 2017). The Belfer Center's National Cyber Power Index (NCPI) at the Harvard Kennedy School considered cyber power in the context of seven national objectives countries pursue using cyber means ( Voo et al., 2020). ...
Article
Full-text available
Cyberwar is no longer subject to "if" but "when." Despite growing interest in cyberspace and cyber war readiness and resilience among academics, researchers, policymakers, and the media, the area needs to be more robust with different terminology that strategically captures the activities of state actors in cyberspace. The paper aims to provide a strategic classification of the activities of state actors in cyberspace. A typology is developed to encapsulate the strategic complexity of the activities of state actors in this terrain. The typology can illuminate the current global proportion and payoff of each type.
... However, Cavelty (2018) argues that excessive government involvement militarizes cybersecurity. Ada (2017), in turn, claims that the governmentprivate-individual approach to cybersecurity is more effective because all stakeholders have something to lose in cybersecurity. Sutherland (2017) argues that the state of cybersecurity in South Africa is a product of a lack of capacity and the constant turnover of ministers in key positions. ...
Article
Anthropogenic interference causes ecological fragmentation and vulnerability, weakening urban ecosystems' adaptive capacity. The ecological network is based on the principles of landscape ecology, connecting resource patches through linear corridors to protect biodiversity and landscape integrity, enhance environmental carrying capacity, and improve ecosystem resilience. However, current research on ecological network resilience often relies on single methods and scales, overlooking the potential discrepancies between different approaches and scales. This study uses Zhejiang to construct ecological networks with structural, functional, and integrated approaches at provincial, urban agglomeration, and city levels. The performance of these methods in protecting structure, maintaining function, and ensuring overall resilience was compared, yielding the following results: First, the spatial output consistency of source areas across different scales for the three methods ranged from 50.48% to 97.81%. Second, the integrated approach was not optimal for all three resilience goals. The structure‐oriented method demonstrated cross‐scale applicability for the structural resilience goal, while the function‐oriented strategy performed well in maintaining functional and overall resilience. Third, the scale analysis showed consistency in results at the provincial and urban agglomeration levels when meeting the same objectives, but discrepancies at the city level. By expanding the methodologies and scale perspectives in the field of ecological network resilience, this study assesses the applicability of different scales and methods for ecological network resilience. It was found that integrated methods do not always effectively coordinate multiple protection objectives; thus, large‐scale strategies cannot be directly applied at smaller scales in practical applications. This study proposes and validates a multi‐scale, multi‐method framework for assessing the resilience of ecological networks. It reveals the potential differences between scales and methods, providing valuable theoretical insights and practical guidance for future research on ecological network resilience, particularly regarding the applicability of methods at different scales.
Article
Bu çalışmanın amacı, yeni sanayileşen ülkelerin siber güvenlik düzeylerini derinlemesine değerlendirerek, bu ülkelerin Endüstri 5.0'a geçişlerini güvenli bir biçimde gerçekleştirmelerine yönelik içgörüler sunmaktır. Endüstri 5.0, kişiselleştirilmiş ürün ve hizmetlerin sürdürülebilir bir biçimde sunulmasını sağlayarak dijital dönüşümde yeni bir aşamayı temsil etmekte, ancak bu süreçte ortaya çıkan siber güvenlik riskleri işletmeler için önemli tehditler oluşturmaktadır. İşletmeler bu risklere karşı gerekli önlemleri alsalar da siber güvenliğin etkin bir şekilde sağlanabilmesi ülkelerin benimsediği politikalarla yakından ilişkilidir. Bu nedene ülkelerin siber güvenliğe ilişkin yaklaşımları, Endüstri 5.0’a geçiş sürecini önemli ölçüde şekillendirmektedir. Bu bağlamda, Entropi tabanlı MABAC yöntemiyle yapılan değerlendirme, organizasyonel önlemlerin yeni sanayileşen ülkeler için en kritik siber güvenlik göstergesi olduğunu ve Malezya'nın bu ülkeler arasında siber güvenlik düzeyi bakımından lider konumda olduğunu ortaya koymuştur.
Article
Full-text available
This study investigates the role of Information Communication Technology in worship behaviour, spiritual connectivity and development pre and post Covid-19 Lockdown. The study examined the opinion of 568 Nigerian respondents, using a questionnaire. Whilst noting through results that most religious people had to depend on the use of several Information Communication Technology devices and available applications to engage in worship of their God, this new art of worship, during the Covid-19 lockdown, has made the art of worshipping their God not only more convenient but provides a new and interesting way of engaging in religious activities. Consequently, respondents strongly believe that Information Communication Technology has helped improve their spirituality and provided understanding that their God can be presented anywhere, as worshippers only need to be connected with their hearts. The result emphasized the irrelevance of hypocrisy and the need for creativity in the use of Information Communication Technology.
Chapter
Africa is positioned to gain from a myriad of healthcare innovations that might drastically improve patient care at a reduced cost, boost preventative healthcare, and virtually transport the top medical practitioners to the continent’s most neglected regions. Exciting breakthroughs in healthcare technology, on the other hand, may put patients at risk in both the cyber and natural worlds. The Internet of Things (IoT) is sometimes viewed in the context of a fourth industrial revolution, which will elevate internet-based interconnection to unprecedented heights. This transition includes more data collecting, closely watched customer and user behavior, and growing demand for data miners and analysts. On the other hand, security problems are not just there; with the introduction of new platforms and methodologies into the corporate sector, new methods of attacking, getting data, and rendering service providers inaccessible have evolved. The security of data, numerous digital applications, and various organizational procedures have become vital in our current era of digitalization. Today, there is a growing awareness of the importance of cyber safety, security, and resilience. This is a broad topic that has piqued the interest of people all across the world. Today, numerous human variables and the proper education play an essential part in the development and comprehension of cyber resilience, giving rise to a plethora of cyber resilience programs.
ResearchGate has not been able to resolve any references for this publication.