The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Cyberspace Security Threats and Attacks on E-Records Management at Moi University, Eldoret, Kenya
|
Author(s): Carolyne Nyaboke Musembe (University of KwaZulu-Natal, South Africa)and Stephen M. Mutula (University of KwaZulu-Natal, South Africa)
Copyright: 2021
Pages: 21
Source title:
Handbook of Research on Records and Information Management Strategies for Enhanced Knowledge Coordination
Source Author(s)/Editor(s): Collence Takaingenhamo Chisita (Department of Information Science, University of South Africa, South Africa), Rexwhite Tega Enakrire (Department of Information Science, University of South Africa, South Africa), Oluwole Olumide Durodolu (Department of Information Science, University of South Africa, South Africa), Vusi Wonderboy Tsabedze (Department of Information Science, University of South Africa, South Africa)and Joseph M. Ngoaketsi (Department of Information Science, University of South Africa, South Africa)
DOI: 10.4018/978-1-7998-6618-3.ch020
Purchase
|
Abstract
The digital revolution and internet connectivity are the power behind digital-based models in organizations. The broader reach and impact of cyberspace which is accelerating across Moi University seems to be generating complex challenge to address issues of e-records at Moi University. This chapter emanated from a thesis on e-records security management, and therefore investigates cyberspace security threats and attacks on e-records management at Moi University with a view to offering practical and policy interventions to address this challenge. Data was collected from Moi University staff using interviews and questionnaires and was analysed thematically and using Statistical Package for Social Sciences (SPSS) version 24. Findings revealed cyberspace as an e-records security challenge. Cybercriminals (hackers and crackers), when new technologies emerge, concurrently invent and discover new ways to tap in the new technologies with the intention to steal and corrupt e-records for their benefit, thus hurting the veracity of e-records and university's reputation. Cyber-attacks including an attempted attack on the network, viruses, and worms were widely mentioned in the findings as a threat to both the e-records, and the computer system that host them and storage devices. The chapter recommends that the university should set dynamic security strategy and vision, developing and implementing policies and adopting standards, threat analysis and assessment, integrated and intelligent cybersecurity management service, and investing in e-records security awareness campaigns and training for employees, among others.
Related Content
Christine Kosmopoulos.
© 2022.
22 pages.
|
Melkamu Beyene, Solomon Mekonnen Tekle, Daniel Gelaw Alemneh.
© 2022.
21 pages.
|
Rajkumari Sofia Devi, Ch. Ibohal Singh.
© 2022.
21 pages.
|
Ida Fajar Priyanto.
© 2022.
16 pages.
|
Murtala Ismail Adakawa.
© 2022.
27 pages.
|
Shimelis Getu Assefa.
© 2022.
17 pages.
|
Angela Y. Ford, Daniel Gelaw Alemneh.
© 2022.
22 pages.
|
|
|