7

This research article investigates the application of cybersecuritymeasures to fortify the educational process in higher education. Employing a mixed-methods approach, qualitative interviews and quantitative surveys were conducted to provide a comprehensive understanding of the current cybersecurity landscape within academic institutions. The findings underscore the multifaceted nature of cybersecurity challenges, emphasizing the need for a holistic approach that addresses technological infrastructure, institutional policies, and human behavior. The study also reveals theprevalence of cyber incidents and varying degrees of cybersecurity preparedness across institutions. This research offers a roadmap for institutions to navigate the complex terrain of cybersecurity, ultimately ensuring a secure foundation for the pursuit of knowledge

  • Количество прочтений 7
  • Дата публикации 01-10-2024
  • Язык статьиIngliz
  • Страницы72-78
English

This research article investigates the application of cybersecuritymeasures to fortify the educational process in higher education. Employing a mixed-methods approach, qualitative interviews and quantitative surveys were conducted to provide a comprehensive understanding of the current cybersecurity landscape within academic institutions. The findings underscore the multifaceted nature of cybersecurity challenges, emphasizing the need for a holistic approach that addresses technological infrastructure, institutional policies, and human behavior. The study also reveals theprevalence of cyber incidents and varying degrees of cybersecurity preparedness across institutions. This research offers a roadmap for institutions to navigate the complex terrain of cybersecurity, ultimately ensuring a secure foundation for the pursuit of knowledge

Имя автора Должность Наименование организации
1 Mukhtarov F.M. Rector Fergana branch of TUIT
Название ссылки
1 1.Adams, J. R., & Wills, C. E. (2020). Institutional CybersecurityPolicy Adoption Factors in US Higher Education. Journal of Information Security and Applications, 51, 102468.2.Alazab, M., Broadhurst, R., Choo, K. K. R., & Layton, R. A. (2020). Ransomware in the Wild: Behavior Analysis. Computers & Security, 92, 101729.3.Dawson, D., & Nui, S. (2019). A Review of Cybersecurity Incidents in Higher Education. In Proceedings of the Australasian Computer Science Week Multiconference (pp. 1-9).4.Graves, L., Jensen, M., & Kelly, S. (2021). Higher Education’s Phishing Epidemic: A Review of Incidents Reported to the Privacy Rights Clearinghouse. In International Conference on Human Aspects of Information Security, Privacy, and Trust (pp. 103-120). Springer.5.Guo, J., & Chang, C. K. (2021). Information Security Culture in Higher Education: A Survey Study. Computers & Security, 105, 1021886.Jones, L., & Green, M. (2019). Cybersecurity: The Ins and Outs of Higher Education Cybersecurity Regulations and Compliance. Journal of Education for Business, 94(6), 420-428.7.Pfeffer, J., & Bace, R. (2019). Cybersecurity in Higher Education: The New Barbarians at the Gates. Journal of Cybersecurity Research, 4(1), 21-33.8.Smith, D., Lefebvre, E., & Hermann, J. (2018). Current Threats to Higher Education Cybersecurity: A Survey of Current and Past Threats. Journal of Information Security, 9(2), 109-123.9.Stokes, G., & Rubenstein, H. (2018). The State of Cybersecurity in Higher Education: An EDUCAUSE QuickPoll Study. EDUCAUSE Review. Retrieved from https://er.educause.edu/articles/2018/1/the-state-of-cybersecurity-in-higher-education
В ожидании