Cybersecurity: An Appraisal of Policy Frameworks and Related Conventions
Author(s): MPHATHENI, Mandlenkosi Richard
Author(s) keywords: computer, conventions, cybersecurity, cyberspace, policy frameworks
Reference keywords: conventions, cybersecurity, policy
Abstract:
Cybercrime is a global threat to cybersecurity that crosses national borders and has no geographical boundaries. The global community establishes, ratifies, and implements common global accepted treaties and conventions to guide and direct cybersecurity. Nonetheless, the setting of internationally accepted standards for cybersecurity has been a difficult task. Cyberspace is a complex, erratic, and rapidly developing hybrid that is both physical and virtual. To eliminate chaos in cyberspace, improve cybersecurity, and eliminate cybercrime, a global framework of laws and conventions is required. To keep up with criminals' ability to exploit cyberspace, international laws and conventions must be gradually and robustly established and speedily and continuously amended. Adherence to stringent security measures and policies on the part of both public and private companies will aid in the implementation of increasingly stringent cybersecurity measures and international regulations in this regard. Cybersecurity must be prioritised in business. Companies should have cyberattack risk management strategies in place to prevent cyber breaches. Formal training for security cluster members and business representatives is required to effectively deal with the cybersecurity phenomenon.
References:
[1]. Aldawood, H., and Skinner, G. 2018. Educating and raising awareness on cybersecurity social engineering: A literature review. (Pp. 62-68). In 2018 IEEE International Conference on Teaching, Assessment, and Learning for Engineering (TALE). IEEE.
[2]. Alshaikh, M., 2020. Developing cybersecurity culture to influence employee behaviour: A practice perspective. Computers & Security, 98: 102003.
[3]. Appazov, A., 2014. Legal aspects of Cybersecurity. The University of Copenhagen, Denmark. Available: https://www.justitsministeriet.dk/sites/default/files/media/Arbejdsomraader/Forskning/Forskningspuljen/Legal_Aspects_of_Cybersecurity.pdf.
[4]. Bada, M., Sasse, A.M., and Nurse, J.R., 2019. Cyber security awareness campaigns: Why do they fail to change behaviour? International Conference on Cyber Security for Sustainable Society Journal, doi: 10.48550/arXiv.1901.02672.
[5]. Barosy, W. 2019. Successful operational cyber security strategies for small businesses. Unpublished thesis. DBA. Walden University, Minneapolis, MN.
[6]. Aishwarya, K., Pratiksha, S., Hule, P., and Sayli, M. 2018. Survey on network security. International Journal of Current Trends in Science and Technology, 8(1): 47-53. doi:10.15520/ctst.v8i1.352.
[7]. Cassim, F., 2011. Addressing the growing spectre of cybercrime in Africa: evaluating measures adopted by South Africa and other regional role players. The Comparative and International Law Journal of Southern Africa (CILSA), 44(1): 123-138.
[8]. Dlamini, I.Z., Taute, B., and Radebe, J. 2011. Framework for an African policy towards creating cyber security awareness. Proceedings of the first IFIP TC9/TC11 South African Cyber Security Awareness Workshop (SACSAW) 2011, Gaborone, Botswana, 12 May. Available: https://researchspace.csir.co.za/dspace/bitstream/handle/10204/5163/Dlamini_2011.pdf.
[9]. Dobrinoiu, M., 2017. Need for education on Cybersecurity. International Journal of Information Security and Cybercrime (IJISC), 6(1): 25-32.
[10]. Donalds, C., and Osei-Bryson, K.M. 2019. Toward a cybercrime classification ontology: A knowledge-based approach. Computers in Human Behavior, 92: 403-418.
[11]. Dutton, W.H., Creese, S., Shillair, R., and Bada, M., 2019. Cybersecurity Capacity: Does it matter? Journal of Information Policy, 9: 280-306.
[12]. eNCA. 2016. 8.8 million South Africans hit by cyber crime. eNews Channel Africa, 6July. Available: https://www.enca.com/technology/88-million-south-africans-hit-by-cyber-crime.
[13]. Gcaza, N., and Von Solms, R., 2017. A strategy for a cybersecurity culture: A South African perspective. The Electronic Journal of Information Systems in Developing Countries, 80(1), pp.1-17.
[14]. Hathaway, M., Donaldak, C., Kerben, J., McArdle, J., and Spidalieri, F. 2013. Cyber readiness index 1.0. Great Falls, VA: Hathaway Global Strategies LLC.
[15]. Homburger, Z. 2019. The necessity and pitfall of cybersecurity capacity building for norm development in cyberspace. Global Society, 33(2): 224-242.
[16]. International Telecommunications Union (ITU). 2021. Global Cybersecurity Agenda (GCA). Available: https://www.itu.int/en/action/cybersecurity/Pages/gca.aspx.
[17]. Interpol. 2020. Online crime in Africa a bigger threat than ever before – Dlamini report warns. Media Release, 14 August. Available at: https://www.interpol.int/en/News-and-Events/News/2020/Online-crime-in-Africa-a-bigger-threat-than-ever-before-dlamini-report-warns.
[18]. Kshetri, N. 2019. Cybercrime and Cybersecurity in Africa. Journal of Global Information Technology Management. 22(2): 77-81. DOI: 10.1080/1097198X.2019.1603527.
[19]. Mabunda, S. 2021. Cybersecurity in South Africa: Towards Best Practices. (Pp. 227-270). In Luca Belli (Ed.). CyberBRICS: Cybersecurity Regulations in the BRICS Countries (pp. 227-270). Cham, Switzerland: Springer.
[20]. Mcanyana, W., Brindley., C. 2020. Accenture. Insight into the cyberthreat landscape in South Africa. Available: https://www.accenture.com/_acnmedia/PDF-125/Accenture-Insight-Into-The-Threat-Landscape-Of-South-Africa-V5.pdf.
[21]. Ntsaluba, N. 2018. The cyber security legislative and policy framework in South Africa. Unpublished dissertation. LLM (Intellectual Property). University of Pretoria, Pretoria.
[22]. Orji, U.J. 2018. The African Union Convention on Cybersecurity: A regional response towards cyber stability? Masaryk University Journal of Law and Technology, 12(2): 91-129.
[23]. Parekh, G., DeLatte, D., Herman, G.L., Oliva, L., Phatak, D., Scheponik, T., and Sherman, A.T. 2017. Identifying core concepts of cybersecurity: Results of two Delphi processes. IEEE Transactions on Education.
[24]. Peter, A.S., 2017. Cyber resilience preparedness of Africa’s top-12 emerging economies. International Journal of Critical Infrastructure Protection, 17: 49-59.
[25]. Phahlamohlaka, L.J., Jansen van Vuuren, J.C., and Coetzee, A.J., 2011. Cyber security awareness toolkit for national security: an approach to South Africa's cyber security policy implementation. (Pp. 1-14). In Proceedings of the 1st IFIP TC9 / TC11 Southern African Cyber Security Awareness Workshop (SACSAW 2011), Gaborone, Botswana, 12 May. Available at: https://researchspace.csir.co.za/dspace/bitstream/handle/10204/5603/Phahlamohlaka1_2011.pdf.
[26]. Potgieter, P., 2019. The awareness behaviour of students on cyber security awareness by using social media platforms: A case study at Central University of Technology. Kalpa Publications in Computing, 12: 272-280.
[27]. Ransomware. (2021, June). Bloomberg on #NetNuus.
[28]. Schjølberg, S. and Ghernaouti-Helie, S., 2009. A global protocol on Cybersecurity and cybercrime. Cybercrimelaw.net.
[29]. Sofaer, A.D., Goodman, S.E., Cuéllar, M.F., Drozdova, E.A., Elliott, D.D., Grove, G.D., Lukasik, S.J., Putnam, T.L. and Wilson, G.D., 2000. A proposal for an international convention on cybercrime and terrorism. Stanford University, Center for International Security and Cooperation.
[30]. Sofaer, A.D., Grove, G.D., and Wilson, G. 2001. Draft International Convention to Enhance Protection from Cyber Crime and Terrorism. (Pp. 249-265). In: A.D. Sofaer, and S.E. Goodman (Eds). The transnational dimension of cybercrime and terrorism. Stanford, CA: Hoover Institution.
[31]. South Africa 2020 Crime & Safety Report. (2020). Available at https://www.osac.gov/Content/Report/63e37d80-c040-462d-a868-181c51cf7188.
[32]. State Security Agency, South Africa. 2015. The National Cybersecurity Policy Framework (NCPF) 2015. Government Gazette, 609(39475), 4 December. Cape Town: Government Printers Available at: https://www.gov.za/sites/default/files/gcis_document/201512/39475gon609.pdf.
[33]. Tabansky, L., 2015. Cybersecurity in Israel (Vol. 598). New York: Springer.
[34]. Tidy, J. 2021, 2 July. Swedish Coop supermarkets shut due to US ransomware cyber-attack. BBC News.
[35]. Toch, E., Bettini, C., Shmueli, E., Radaelli, L., Lanzi, A., Riboni, D. and Lepri, B., 2018. The privacy implications of cyber security systems: A technological survey. ACM Computing Surveys (CSUR), 51(2): 1-27.
[36]. United Nations. (n.d.). Climate change: The Kyoto Protocol. https://unfccc.int/kyoto_protocol.
[37]. Van Epps, G., 2013. Common ground: US and NATO engagement with Russia in the cyber domain. Connections, 12(4), pp.15-50.
[38]. Van Vuuren, J., Leenen, L., and Pieterse, P. 2019, February. Framework for the Development and Implementation of a Cybercrime Strategy in Africa. (Pp. 156-167). In: N. van Der Waag-Cowling, and L. Leenen (Eds). Proceedings of the ICCWS 2019 14th International Conference on Cyber Warfare and Security.
[39]. Vasileiou, I. and Furnell, S. (eds). 2019. Cybersecurity Education for Awareness and Compliance. IGI Global.
[40]. Veksler, V.D., Buchler, N., Hoffman, B.E., Cassenti, D.N., Sample, C. and Sugrim, S., 2018. Simulations in cyber-security: a review of cognitive modeling of network attackers, defenders, and users. Frontiers in Psychology, 9: 691.
[41]. Von Solms, R., and Van Niekerk, J. 2013. From information security to cyber security. Computers & Security, 38: 97-102.
[42]. Von Solms, R., and Von Solms, B., 2015, February. National Cyber Security in South Africa: A Letter to the Minister of Cyber Security. (P. 369). In The Proceedings of the 10th International Conference on Cyber Warfare and Security: ICCWS2015.
[43]. Rajaneththi, S. 2019. Arguments on death penalty: Theoretical base of classical school of criminology.
Article Title: Cybersecurity: An Appraisal of Policy Frameworks and Related Conventions
Author(s): MPHATHENI, Mandlenkosi Richard
Date of Publication: 2023-06-28
Publication: International Journal of Information Security and Cybercrime
ISSN: 2285-9225 e-ISSN: 2286-0096
Digital Object Identifier: 10.19107/IJISC.2023.01.06
Issue: Volume 12, Issue 1, Year 2023
Section: Cyber-Attacks Evolution and Cybercrime Trends
Page Range: 45-60 (16 pages)
Copyright ©2012-2025
The International Journal of Information Security and Cybercrime (IJISC)
All rights reserved
The International Journal of Information Security and Cybercrime is a trademark of the Romanian Association for Information Security Assurance (RAISA).
No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from RAISA. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Romanian Association for Information Security Assurance, if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.