2018 Open Innovations Conference (OI) 2018
DOI: 10.1109/oi.2018.8535939
|View full text |Cite
|
Sign up to set email alerts
|

Adoption of Cloud-Cyber Security: Challenges and Perceptions Within Resource Constrained Higher Education Institutions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 13 publications
0
2
0
Order By: Relevance
“…To protect students' privacy, each student is only able to see their own performance, but the instructor has access to all student performance data. This system of information storage and protection is common among higher education institutions, but unfortunately, it is also common for universities and colleges to get hacked (Maranga and Nelson, 2019). With a device that is designed to fully rely on servers and cloud data backups, it is critical to highlight the importance of cybersecurity.…”
Section: Ethical Aspects Of Denteachmentioning
confidence: 99%
“…To protect students' privacy, each student is only able to see their own performance, but the instructor has access to all student performance data. This system of information storage and protection is common among higher education institutions, but unfortunately, it is also common for universities and colleges to get hacked (Maranga and Nelson, 2019). With a device that is designed to fully rely on servers and cloud data backups, it is critical to highlight the importance of cybersecurity.…”
Section: Ethical Aspects Of Denteachmentioning
confidence: 99%
“…These tools had the ability in doing training in terms of cyber-security issues that can face cloud based web applications. At the other hand in [26,27], different methods had been proposed to ensure the security of education systems form cyber-attacks. The aims were to mitigate the effects of cyber-attacks with different types to cover the information safe delivery.…”
Section: Introductionmentioning
confidence: 99%