State of Cybersecurity in South Africa, 20101-2019
... South African companies anticipate more cyberattacks in 2023 than in 2022. In comparison, African organizations spend more on cybersecurity than their global counterparts, with cyberattacks costing SA R2.2 billion annually, as reported by Interpol in 2021 [5]. With the growing cybersecurity market and increasing cyber threats, there is a significant need for more skilled professionals to address cybersecurity requirements [1]. ...
... The lack of women and diversity in the cybersecurity space is considered a shortfall or vulnerability. This can increase the risk of cyber-attacks and data breaches, putting businesses and individuals at risk [5]. ...
... Offer training and career development: Companies can help women improve their careers by offering them career development and cybersecurity training opportunities; this can consist of resources for professional growth, on-the-job training, and mentorship programs [5]. An example of such an organization is CybHER. ...
Artificial intelligence (AI) and fifth generation network technology (5G) are now being utilised by some companies and financial institutions such as banks to enhance their competitiveness and expand their businesses. The general types of AI include functional AI, interactive AI, text AI, visual AI and analytic AI. The key components of AI include machine learning, fast Internet connectivity, deep learning, neural networks and advanced data analysis. These components may be complemented by the adoption and use of standard 5G cellular networks. 5G utilises broadband Internet access and Internet connection, and is now employed by some banking institutions, especially in developed countries. It is not clear whether South African banking institutions have adopted 5G for their Internet connectivity and operations. AI and 5G may be used to detect and combat cybercrimes in banking institutions. On the other hand, AI and 5G may also be abused by cybercriminals to commit financial crimes such as money laundering and insider trading. In this regard it is submitted that South African policy makers should carefully revise the Cybersecurity Bill B6-2017 (Cybercrimes Bill) to embrace the use of AI and 5G to detect and combat cybercrimes in South African banks. Accordingly, this article examines the adequacy of the Cybercrimes Bill. It also explores the regulation and use of 5G and AI to detect, prevent and combat cybercrimes in banks and other financial institutions in South Africa.
Computer and Information Security (CIS) is usually approached adopting a technology-centric viewpoint, where the human components of sociotechnical systems are generally considered as their weakest part, with little consideration for the end users’ cognitive characteristics, needs and motivations. This paper presents a holistic/Human Factors (HF) approach, where the individual, organisational and technological factors are investigated in pilot healthcare organisations to show how HF vulnerabilities may impact on cybersecurity risks. An overview of current challenges in relation to cybersecurity is first provided, followed by the presentation of an integrated top–down and bottom–up methodology using qualitative and quantitative research methods to assess the level of maturity of the pilot organisations with respect to their capability to face and tackle cyber threats and attacks. This approach adopts a user-centred perspective, involving both the organisations’ management and employees, The results show that a better cyber-security culture does not always correspond with more rule compliant behaviour. In addition, conflicts among cybersecurity rules and procedures may trigger human vulnerabilities. In conclusion, the integration of traditional technical solutions with guidelines to enhance CIS systems by leveraging HF in cybersecurity may lead to the adoption of non-technical countermeasures (such as user awareness) for a comprehensive and holistic way to manage cyber security in organisations.
Autonomous vehicles (AVs) or self-driving cars have the potential to provide many benefits such as improving mobility and reducing the energy and emissions consumed, travel time, and vehicle ownership. Thus, in the last few years, both research and industry have put significant efforts to develop AVs. However, laws and regulations are not ready yet for this switch and the legal sector is unable to take the lead but follow the development of AVs. Besides, the social acceptance is considered as a main key factor for the success of any new technology. Despite the enthusiastic speculation of AVs, little is known about the public acceptance and perception of the AVs technology or the factors that influence the public acceptance. This paper reviews the previous studies that focuses on testing the public acceptance and perception of AVs and sketches out the main trends in this area to provide some directions and recommendations for the future. This paper focuses on the influence of safety, ethics, liability, regulations, and the recent pandemic on the public acceptance of AVs.
Background: The novel Coronavirus Disease-2019 (COVID-19) pandemic, a deadly contagious disease has left the global village in disarray, driving people and firms, especially healthcare service providers to rely heavily on information communication technologies (ICTs) for administering telemedicine through digital tools. This study contributes to knowledge and information sharing and debates on cybersecurity.
Objective: The objective was to analyse the impact of cybercrimes on the global economy at a time when the whole world is focused on fighting and minimising the spread of COVID-19. The study also analysed common cybersecurity threats, attacks and information systems security vulnerabilities during the period of the pandemic.
Method: The study adopted a systematic literature review from December 2019 to June 2020. There are global research studies on cybersecurity issues brought about by the coronavirus pandemic, and therefore, literature survey was not limited to any geographic area. A mixed method research was adopted in this study.
Results: The study revealed that there is an exponential growth of cyberattacks and threats because the global economy has been paying much attention to the COVID-19 pandemic. During the pandemic, large corporations, healthcare industry and government agencies have been targets for cyberattacks and threats.
Conclusion: It has been demonstrated that cyberattacks and threats during the COVID-19 pandemic are rising exponentially, creating another wave of challenges for the global economy, which is already reeling under the novel coronavirus. Thus, exerting excessive pressure on financial and human resources that have to contend with the novel coronavirus, with the expectation that resources have to be mobilised to deal with cybercrimes. The study recommends that firms and individuals should devise cybersecurity interventions to protect their data and information systems infrastructure.
Theoretical and empirical work on digital media use and social connectedness has often considered face-to-face communication to be an available option. But how do various digital media uses relate to social connectedness when face-to-face communication is not, or much less, possible? Drawing on survey data from 2925 US adults during the early months of the COVID-19 pandemic, we find that different digital communication methods display different relationships with social connectedness under stay-at-home circumstances with limited in-person interactions outside the home. Overall, digital communication relates to lower social connectedness. In line with notions from social presence theory, especially digital media lower in social presence (e.g. email, social media, and online games, and to some extent text messaging) relate negatively to social connectedness, while this is not the case for higher social presence media (e.g. voice and video calls). Our study has implications for theorizing about digital media use and social connectedness in times when face-to-face communication is less available.
Russia is pursuing select 4th Industrial Revolution (4IR) technologies in a drive to rapidly close the capability gaps with rivals. The transformation of warfare these technologies portend could also make Russia more vulnerable. Joining the ‘technological race’ seems therefore less of a choice than an existential necessity. Constrained by structural problems and lacking the resources of the US and China, however, Russia has so far struggled to leverage its ambitions within the 4IR. Yet it has also shown the ability to experiment with 4IR technologies, including hypersonics and AI, to amplify existing symmetric and asymmetric capabilities, and create interconnected systems that may provide critical advantages.
The Indian economy is one of the fastest-growing economies of the world with India being an important G-20 member. Ever since the Indian economy made its presence felt on the global platform, the research community is now even more interested in studying and analyzing what India has to offer. This volume has 32 chapters and covers a wide range of topics in international economics and finance.
This material is based on work supported by the U.S. Office of Naval Research, Grant No. N00014-09-1-0597. Any opinions, findings, conclusions or recommendations therein are those of the author(s) and do not necessarily reflect the views of the Office of Naval Research.