Advertisement

The South African ICT Security Awareness Framework for Education (SAISAFE)

  • Mvelo WalazaEmail author
  • Marianne Loock
  • Elmarie Kritzinger
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11937)

Abstract

The literature review and the investigations that have been conducted show that there is a need for a framework that would integrate ICT security awareness into the South African education system. The state of the current usage of ICT in South Africa was investigated as well as the level of ICT security awareness among South African school learners. A gap analysis between the two spheres of ICT security awareness and ICT in education showed that there was indeed a problem. A vigorous research methodology using among others an extensive questionnaire and themes was used to propose a framework that would attempt to provide a solution to the identified problem. After receiving feedback from the research participants, the proposed framework underwent an analysis phase and it was improved and the responses were incorporated to it. A framework called the South African ICT Security Awareness Framework for Education (SAISAFE) has been proposed in this research. This paper presents the process that was undertaken in order to formulate the proposed framework. The complete proposed framework and a brief description of its components are also presented in this paper.

Keywords

ICT ICT security awareness Education Framework SAISAFE 

References

  1. 1.
    Kreutzer, T.: Assessing cell phone usage in a South African Township School. Int. J. Educ. Dev. Inf. Commun. Technol. Cape Town: e/merge 5(5), 43–57 (2009)Google Scholar
  2. 2.
    Belayneh, B.: South African Centre for Information Security (2010)Google Scholar
  3. 3.
    Kritzinger, E., Padayachee, K.: Teaching Safe and Secure usage of ICTs in South African Schools (2010)Google Scholar
  4. 4.
    Kritzinger, E., Von Solms, S.H.: Cyber security for home users: a new way of protection through awareness enforcement. Comput. Secur. 29(8), 840–847 (2010)CrossRefGoogle Scholar
  5. 5.
    Walaza, M., Loock, M., Kritzinger, E.: A pragmatic approach towards the integration of ICT security awareness into the South African Education System. In: Second International Conference on Information Security and Cyber Forensics, pp. 35–40. Cape Town (2015)Google Scholar
  6. 6.
    Williams, A.S., Maharaj, M.S., Ojo, A.I.: Employee behavioural factors and information security standard compliance in Nigeria banks. Int. J. Comput. Digit. Syst. 8(04), 387–396 (2019)CrossRefGoogle Scholar
  7. 7.
    Von Solms, R., Von Solms, S.: Cyber safety education in developing countries. In: IMSCI 2015 - 9th International Multi-Conference Soc Cybern Informatics, Proceedings, pp. 173–178 (2015)Google Scholar
  8. 8.
    Creswell, J.W.: Research design: qualitative, quantitative and mixed approaches, 3rd edn. Res. Des. Qual. Quant. Mix, Methods Approaches (2009)Google Scholar
  9. 9.
    Olivier, M.S.: Information Technology Research: A Practical Guide for Computer Science and Informatics, 2nd edn. Van Schaik Publishers, Pretoria (2004)Google Scholar
  10. 10.
    Swanepoel, A.J.: Towards a framework for understanding Information Systems ownership (Doctoral dissertation, University of Pretoria) (2015)Google Scholar
  11. 11.
    Walaza, M., Loock, M., Kritzinger, E.: A Framework To Integrate Information And Communication Technology Security Awareness into the South African Education System. University of South Africa (2017)Google Scholar
  12. 12.
    Da Veiga, A.: Cultivating and assessing information security culture (Doctoral dissertation, University of Pretoria) (2008)Google Scholar
  13. 13.
    Kritzinger, E.: An information security retrieval and awareness model for industry (2006)Google Scholar
  14. 14.
    Draper, K.: Understanding science teachers’ use and integration of ICT in a developing country context (Doctoral dissertation, University of Pretoria) (2010)Google Scholar
  15. 15.
    ISACA A. Introduction to the Business Model for Information Security (2009)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Mvelo Walaza
    • 1
    Email author
  • Marianne Loock
    • 1
  • Elmarie Kritzinger
    • 1
  1. 1.University of South AfricaPretoriaSouth Africa

Personalised recommendations