Data architectures and the prevalent cyberattacks encountered by West African higher educational institutions in the COVID-19 era

Ismaila Idris Sinan, Vivian Nwoacha, Kingsley Eghonghon Ukhurebor, Jules Degila, Adebukola Onashoga, Esosa Enoyoze, Lyda Emmanuel

Article ID: 3736
Vol 8, Issue 8, 2024

VIEWS - 5 (Abstract) 4 (PDF)

Abstract


The growing interconnectedness of the world has led to a rise in cybersecurity risks. Although it is increasingly conventional to use technology to assist business transactions, exposure to these risks must be minimised to allow business owners to do transactions in a secure manner. While a wide range of studies have been undertaken regarding the effects of cyberattacks on several industries and sectors, However, very few studies have focused on the effects of cyberattacks on the educational sector, specifically higher educational institutions (HEIs) in West Africa. Consequently, this study developed a survey and distributed it to HEIs particularly universities in West Africa to examine the data architectures they employed, the cyberattacks they encountered during the COVID-19 pandemic period, and the role of data analysis in decision-making, as well as the countermeasures employed in identifying and preventing cyberattacks. A total of one thousand, one hundred and sixty-four (1164) responses were received from ninety-three (93) HEIs and analysed. According to the study’s findings, data-informed architecture was adopted by 71.8% of HEIs, data-driven architecture by 24.1%, and data-centric architecture by 4.1%, all of which were vulnerable to cyberattacks. In addition, there are further concerns around data analysis techniques, staff training gaps, and countermeasures for cyberattacks. The study’s conclusion includes suggestions for future research topics and recommendations for repelling cyberattacks in HEIs.


Keywords


COVID-19; cybersecurity; cyberattacks; data architecture; higher educational institutions

Full Text:

PDF


References


AAU. (2022). List of Members—AAU. Available online: https://aau.org/members/list/ (accessed on 28 April 2023).

Adam, B. (2021). Bad education: Universities struggle to defend against surging cyber-attacks during coronavirus pandemic. Available online: https://portswigger.net/daily-swig/bad-education-universities-struggle-to-defend-against-surging-cyber-attacks-during-coronavirus-pandemic (accessed on 28 April 2023).

Adams, A., & Blanford, A. (2003). Security and online learning: To protect and prohibit. In Usability evaluation of online learning programs, 331–359. https://doi.org/10.4018/978-1-59140-105-6.ch018

Aidonojie, P. A., Okuonghae, N., & Ukhurebor, K. E. (2022). The Legal Rights and Challenges of COVID-19 Patients Accessing Private Healthcare in Nigeria. BESTUUR, 10(2), 183. https://doi.org/10.20961/bestuur.v10i2.68118

Ajie, I. (2019). A Review of Trends and Issues of Cybersecurity in Academic Libraries. Library Philosophy and Practice (ejournal).

Alfonso, F. Data-driven versus data-centric. Available online: https://blog.stratio.com/datadriven-versus-datacentric/ (accessed on 13 February 2023).

Asanga, M. P., Essiet, U. U., Ukhurebor, K. E., et al. (2023). Social Media and Academic Performance: A Survey Research of Senior Secondary School Students in Uyo, Nigeria. International Journal of Learning, Teaching and Educational Research, 22(2), 323–337. https://doi.org/10.26803/ijlter.22.2.18

Ascend. (2020). Data-Informed, Data-Driven, and Data-Centric: What’s the Difference? Ascend Venture Capital. Available online: https://www.ascendstl.com/press/2020/4/28/data-driven-and-data-centric-whats-the-difference (accessed on 13 February 2023).

Aslan, Ö., Aktuğ, S. S., Ozkan-Okay, M., et al. (2023). A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions. Electronics, 12(6), 1333. https://doi.org/10.3390/electronics12061333

Beaudin, K. (2015). College and university data breaches: Regulating higher education cybersecurity under state and federal law. JC & UL, 41, 657.

Beaudin, K. (2017). The legal implications of storing student data: Preparing for and responding to data breaches. New Directions for Institutional Research, 2016(172), 37–48. https://doi.org/10.1002/ir.20202

Breitinger, F., Tully-Doyle, R., & Hassenfeldt, C. (2020). A survey on smartphone user’s security choices, awareness and education. Computers & Security, 88, 101647. https://doi.org/10.1016/j.cose.2019.101647

Buil-Gil, D., Miró-Llinares, F., Moneva, A., et al. (2020). Cybercrime and shifts in opportunities during COVID-19: a preliminary analysis in the UK. European Societies, 23(sup1), S47–S59. https://doi.org/10.1080/14616696.2020.1804973

Carol, D. The Difference Between Data-centric and Data-driven. Available online: https://www.asti.com/the-difference-between-data-centric-and-data-driven/ (accessed on 28 April 2023).

Chen, Y., & He, W. (2013). Security risks and protection in online learning: A survey. The International Review of Research in Open and Distributed Learning, 14(5). https://doi.org/10.19173/irrodl.v14i5.1632

Chigada, J., & Madzinga, R. (2021). Cyberattacks and threats during COVID-19: A systematic literature review. SA Journal of Information Management, 23(1). https://doi.org/10.4102/sajim.v23i1.1277

Clark, L. A., & Watson, D. (2019). Constructing validity: New developments in creating objective measuring instruments. Psychological Assessment, 31(12), 1412–1427. https://doi.org/10.1037/pas0000626

Cuchta, T., Blackwood, B., Devine, T. R., et al. (2019). Human Risk Factors in Cybersecurity. In: Proceedings of the 20th Annual SIG Conference on Information Technology Education. https://doi.org/10.1145/3349266.3351407

Dadkhah, M., Borchardt, G., & Maliszewski, T. (2017). Fraud in Academic Publishing: Researchers Under Cyber-Attacks. The American Journal of Medicine, 130(1), 27–30. https://doi.org/10.1016/j.amjmed.2016.08.030

Dave, M. (2020). The Data-Centric Revolution: Data-Centric vs. Data-Driven. Available online: https://tdan.com/the-data-centric-revolution-data-centric-vs-data-driven/20288 (accessed on 28 April 2023).

Diaz, A., Sherman, A. T., & Joshi, A. (2020). Phishing in an academic community: A study of user susceptibility and behavior. Cryptologia, 44(1), 53–67. https://doi.org/10.1080/01611194.2019.1623343

Draugalis, J. R., Coons, S. J., & Plaza, C. M. (2008). Best Practices for Survey Research Reports: A Synopsis for Authors and Reviewers. American Journal of Pharmaceutical Education, 72(1), 11. https://doi.org/10.5688/aj720111

Dupont, B., & Whelan, C. (2021). Enhancing relationships between criminology and cybersecurity. Journal of Criminology, 54(1), 76–92. https://doi.org/10.1177/00048658211003925

Fatokun, F. B., Hamid, S., Norman, A., et al. (2019). The Impact of Age, Gender, and Educational level on the Cybersecurity Behaviors of Tertiary Institution Students: An Empirical investigation on Malaysian Universities. Journal of Physics: Conference Series, 1339(1), 012098. https://doi.org/10.1088/1742-6596/1339/1/012098

Fouad, N. S. (2021). Securing higher education against cyberthreats: from an institutional risk to a national policy challenge. Journal of Cyber Policy, 6(2), 137–154. https://doi.org/10.1080/23738871.2021.1973526

Furnell, S., Heyburn, H., Whitehead, A., & Shah, J.N. 2020. Understanding the full cost of cyber security breaches. Computer Fraud & Security, 2020, (12), 6–12. https://doi.org/10.1016/S1361-3723(20)30127-5

Georgiadou, A., Mouzakitis, S., & Askounis, D. (2021). Working from home during COVID-19 crisis: a cyber security culture assessment survey. Security Journal, 35(2), 486–505. https://doi.org/10.1057/s41284-021-00286-2

Gourisetti, S. N. G., Mylrea, M., & Patangia, H. (2020). Cybersecurity vulnerability mitigation framework through empirical paradigm: Enhanced prioritized gap analysis. Future Generation Computer Systems, 105, 410–431. https://doi.org/10.1016/j.future.2019.12.018

Horgan, S., Collier, B., Jones, R., et al. (2021). Re-territorialising the policing of cybercrime in the post-COVID-19 era: towards a new vision of local democratic cyber policing. Journal of Criminal Psychology, 11(3), 222–239. https://doi.org/10.1108/jcp-08-2020-0034

Hussaini, A. R., Ibrahim, S., Ukhurebor, K. E., et al. (2023). The Influence of Information and Communication Technology in the Teaching and Learning of Physics. International Journal of Learning, Teaching and Educational Research, 22(6), 98–120. https://doi.org/10.26803/ijlter.22.6.6

Hussain, H. S., Din, R., Khidzir, N. Z., et al. (2018). Risk and Threat via Online Social Network among Academia at Higher Education. Journal of Physics: Conference Series, 1018, 012008. https://doi.org/10.1088/1742-6596/1018/1/012008

Kampakis, D. S. What are the differences between data-driven, data-informed and data-centric? Available online: https://thedatascientist.com/data-driven-data-informed-data-centric/ (accessed on 1 December 2023).

Kariuki, P., Ofusori, L. O., & Subramaniam, P. R. (2023). Cybersecurity threats and vulnerabilities experienced by small-scale African migrant traders in Southern Africa. Security Journal. https://doi.org/10.1057/s41284-023-00378-1

Kashiwazaki, H. (2018). Personal Information Leak in a University, and Its Cleanup. Proceedings of the 2018 ACM SIGUCCS Annual Conference. https://doi.org/10.1145/3235715.3235727

Khan, N. A., Brohi, S. N., & Zaman, N. (2020). Ten Deadly Cyber Security Threats Amid COVID-19 Pandemic. https://doi.org/10.36227/techrxiv.12278792.v1

Kim, H. (2019). Research Issues on Data Centric Security and Privacy Model for Intelligent Internet of Things based Healthcare. Biomedical Journal of Scientific & Technical Research, 16(3). https://doi.org/10.26717/bjstr.2019.16.002856

Lallie, H. S., Shepherd, L. A., Nurse, J. R. C., et al. (2021). Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Computers & Security, 105, 102248. https://doi.org/10.1016/j.cose.2021.102248

Marra, D. E., Hamlet, K. M., Bauer, R. M., et al. (2020). Validity of teleneuropsychology for older adults in response to COVID-19: A systematic and critical review. The Clinical Neuropsychologist, 34(7–8), 1411–1452. https://doi.org/10.1080/13854046.2020.1769192

Monteith, S., Bauer, M., Alda, M., et al. (2021). Increasing Cybercrime Since the Pandemic: Concerns for Psychiatry. Current Psychiatry Reports, 23(4). https://doi.org/10.1007/s11920-021-01228-w

Ncube, C., & Garrison, C. (2010). Lessons learned from university data breaches. Palmetto Business & Economic Review, 13, 27–37.

Ndunagu, J. N., Ukhurebor, K. E., Adesina, A. (2023). Virtual Laboratories for STEM in Nigerian Higher Education: The National Open University of Nigeria Learners’ Perspective. In: Proceedings of the Technology-Enhanced Learning in Laboratories Workshop (TELL 2023). pp. 38–48.

Nneji, C. C., Urenyere, R., Ukhurebor, K. E., et al. (2022). The impacts of COVID-19-induced online lectures on the teaching and learning process: An inquiring study of junior secondary schools in Orlu, Nigeria. Frontiers in Public Health, 10. https://doi.org/10.3389/fpubh.2022.1054536

Paladhi, A. G., Manohar, M., Pal, K., et al. (2022). Novel electrochemical biosensor key significance of smart intelligence (IoMT & IoHT) of COVID-19 virus control management. Process Biochemistry, 122, 105–109. https://doi.org/10.1016/j.procbio.2022.09.023

Palmieri, M., Shortland, N., & McGarry, P. (2021). Personality and online deviance: The role of reinforcement sensitivity theory in cybercrime. Computers in Human Behavior, 120, 106745. https://doi.org/10.1016/j.chb.2021.106745

Pimentel, J. L. (2010). A note on the usage of Likert Scaling for research data analysis. USM R&D Journal, 18(2), 109–112.

Sinam, I. I., & Lawan, A. (2019). An improved C4. 5 model classification algorithm based on Taylor’s series. Jordanian Journal of Computers and Information Technology (JJCIT), 5(01).

Sinan, I. I., Degila, J., Nwaocha, V., et al. (2022). Data Architectures’ Evolution and Protection. In: Proceedings of the 2022 International Conference on Electrical, Computer and Energy Technologies (ICECET). https://doi.org/10.1109/icecet55527.2022.9872597

Syed, R. (2020). Cybersecurity vulnerability management: A conceptual ontology and cyber intelligence alert system. Information & Management, 57(6), 103334. https://doi.org/10.1016/j.im.2020.103334

Teixeira da Silva, J. A., Al-Khatib, A., & Tsigaris, P. (2019). Spam emails in academia: issues and costs. Scientometrics, 122(2), 1171–1188. https://doi.org/10.1007/s11192-019-03315-5

Ukhurebor, K. E., Aigbe, U. O., Onyancha, R. B., et al. (2022). Greenhouse Gas Emission: Perception during the COVID-19 Pandemic. BioMed Research International, 2022, 1–12. https://doi.org/10.1155/2022/6166276

Ukhurebor, K. E., Singh, K. R., Nayak, V., et al. (2021). Influence of the SARS-CoV-2 pandemic: a review from the climate change perspective. Environmental Science: Processes & Impacts, 23(8), 1060–1078. https://doi.org/10.1039/d1em00154j

Ulven, J. B., & Wangen, G. (2021). A Systematic Review of Cybersecurity Risks in Higher Education. Future Internet, 13(2), 39. https://doi.org/10.3390/fi13020039

Vista. (2021). Data-centric Architecture—A Different Way of Thinking. Available online: https://www.vistaprojects.com/blog/data-centric-architecture/ (accessed on 28 April 2023).

Vuță, D. R., Nichifor, E., Țierean, O. M., et al. (2022). Extending the Frontiers of Electronic Commerce Knowledge through Cybersecurity. Electronics, 11(14), 2223. https://doi.org/10.3390/electronics11142223

Wangen, G., Hellesen, N., Torres, H., & Brækken, E. (2017). An empirical study of root-cause analysis in information security management. Rome. Conference SECURWARE, IARIA, 1–14.

Whitman, M. E., & Mattord, H. J. (2016). Threats to information protection-industry and academic perspectives: An annotated bibliography. Journal of Cybersecurity Education, Research and Practice, 2016(2), 4.

Wolf. A (2023). 8 Major Cyber Attacks Against Schools and Colleges. Available online: https://arcticwolf.com/resources/blog/cyber-attacks-against-schools-and-colleges/ (accessed on 7 January 2024).

Zaripova, D.A. 2021. Network security issues and effective protection against network attacks. International Journal on Integrated Education 4 (2): 79–85.

Zhang-Kennedy, L., & Chiasson, S. (2021). A Systematic Review of Multimedia Tools for Cybersecurity Awareness and Education. ACM Computing Surveys, 54(1), 1–39. https://doi.org/10.1145/3427920

Zheng, X., Li, Q., & Kong, L. (2010). A Data Storage Architecture Supporting Multi-level Customization for SaaS. In: Proceedings of the 2010 Seventh Web Information Systems and Applications Conference. https://doi.org/10.1109/wisa.2010.18




DOI: https://doi.org/10.24294/jipd.v8i8.3736

Refbacks

  • There are currently no refbacks.


Copyright (c) 2024 Ismaila Idris Sinan, Vivian Nwoacha, Kingsley Eghonghon Ukhurebor, Jules Degila, Adebukola Onashoga, Esosa Enoyoze, Lyda Emmanuel

License URL: https://creativecommons.org/licenses/by/4.0/

This site is licensed under a Creative Commons Attribution 4.0 International License.