Assessment of the Impacts of Cyber Security on Student Information Management Systems: A Case of Ruaha Catholic University

Authors

  • Frowin Kifaru Faculty of Informatics, Institute of Accountancy Arusha
  • Karisha Kavuta Faculty of Informatics, Institute of Accountancy Arusha
  • Adam Semlambo Faculty of Informatics, Institute of Accountancy Arusha

DOI:

https://doi.org/10.59645/tji.v3i1.127

Keywords:

Cybersecurity, Student Information Management System, Ruaha Catholic University, Education technology, Data security

Abstract

The pervasive use of technology in education has posed a security challenge that could jeopardise student data and educational institutions' reputations, necessitating a thorough investigation. This study explores the impact of cybersecurity on Ruaha Catholic University's Student Information Management System. The research mainly employed a quantitative approach, with data collected through questionnaires administered to a diverse sample of 374 individuals, encompassing students and staff. In addition, a qualitative method was used to acquire data on the organisation's readiness to prevent cybersecurity threats from key informants, including system administrators and top management personnel. The Statistical Package for the Social Sciences (SPSS) software analysed the quantitative data using descriptive analysis. The study's results underscore the pressing need to develop effective cybersecurity mechanisms in the education sector, specifically focusing on enhancing the security of Ruaha Catholic University's Student Information Management System. The study recommends formulating and implementing robust cybersecurity strategies to safeguard student information, fortify system resilience, and bolster the institution's overall cybersecurity posture.

References

Alexei, A. (2021) 'Cyber Security Threat Analysis in Higher Education Institutions As A Result of Distance Learning', International Journal of Scientific and Technology Research, 128-129.

Araka, J. (2016) Fundamentals of Communication Research in Africa: A Contemporary View, University of Dar es Salaam Library Journal, 14(1), 134-136.

Arina, A. (2021) 'Cyber security strategies for Higher Education. Journal of Engineering Science', Journal of Engineering Science Fascicle, 74 – 92.

Bhandari, P. (2022) Ethical Considerations in Research | Types & Examples. Available at: https://www.scribbr.com/methodology/research-ethics/ [Accessed 9 February 2023].

Bresnick, P. (2021) 4 Reasons Cyber Criminals Are Targeting Higher Education: Part 1. Available at: https://www.fierceeducation.com/best-practices/4-reasons-cyber-criminals-are- targeting-higher-education-part-1 [Accessed 2 January 2023].

Campbell, S. (2020) Cybersecurity in Higher Education: Problems and Solutions. Available at: https://www.toptal.com/insights/innovation/cybersecurity-in-higher-education [Accessed 24 January 2023].

Chandarman, R. & Niekerk, B. (2017) 'Students' cybersecurity awareness at a private tertiary educational institution', The African Journal of Information and Communication, 138- 144.

Chin, K. (2022) How Colleges & Universities Can Prevent Ransomware Attacks. Available at: https://www.upguard.com/blog/how-colleges-and-universities-can-prevent-ransomware-attacks (Accessed 2 January 2023).

Chizanga, M. K., Angola, J. & Rodrigues, A. (2022) 'Factors Affecting Cyber Security Awareness'. International Research Journal of Innovations in Engineering and Technology (IRJIET), 54-55.

Cisco (2020) Network Readiness Index 2021, Venezuela: Portulans Institute. Available at: https://www.cisco.com/c/m/en_us/about/corporate-social-responsibility/research-resources/digital-readiness-index.html#/country/TZA (Accessed 23 January 2023).

Cyber Management (2022) Cybersecurity for Higher Education Institutes: Impact & Solutions. A vailable at: https://www.cm-alliance.com/cybersecurity-blog/cybersecurity-for-higher-education-institutes-impact-solutions (Accessed 2 January 2023).

Eker. C H., Zhuang, J. & Upadhyaya, S. (2016) ''Deception-Based Game Theoretical Approach to Mitigate DoS Attacks'. Springer International Publishing, 1 (10), 20-22.

Ekran, S. (2020) Cybersecurity Compliance in the Education Industry: How to Protect Students' Data. Available at: https://www.ekransystem.com/en/blog/cybersecurity-in-educational-institutions (Accessed 10 December 2022).

ESDC (2018) Education sector development plan (2016/17 – 2020/21), Dar es Salaam: MEST. Available at: https://www.globalpartnership.org/sites/default/files/2019-04-gpe-tanzania-esp.pdf

Fouad, N, (2021) Securing higher education against cyber threats: from an institutional risk to a national policy challenge, Journal of Cyber Policy, 6(2), 137-154, DOI: 10.1080/23738871.2021.1973526

Gupi, M. (2022) 'Human factors in Cybersecurity: Risks and impacts'. Institute for Electronic Business, pp. 57-58.

Hunt, T. (2016) Cyber Security Awareness in Higher Education. Central Washington University, 1-14.

IBM & Ponemon Institute (2019) Cost of a Data Breach Report. Available at: https://www.ibm.com/security/digital-assets/cost-data-breach-report (Accessed 7 2 2023).

Jisc (2020). 'The Impact of Cyber Security Incidents on the UK's Further and Higher Education and Research Sectors. 12-18

Kaspersky (2018). Top 5 Most Notorious Cyberattacks. [Online] Available at: https://www.ibm.com/security/digital-assets/cost-data-breach-report [Accessed 25 January 2023].

Kaspersky, 2022. Resource Center. [Online] Available at: https://www.kaspersky.com/resource-center/definitions/data-breach

Kavuta, K and Nyamanga, S. (2018) The factors affecting the implementation of students’ records management system to higher learning institutions in Tanzania: A case of the institute of Accountancy Arusha, International Journal of Scientific & Technology Research, 7(2), 150-156.

Kothari, C. P. (2014) Research Methodology: Methods and Techniques. 3 Ed. New Delhi: New Age International (P) Limited.

Kumar, D. K. (2018) 'Impact of modern technology in'. Academia, Volume 381.164, pp. 33-34.

Kundy, E. D. & Lyimo, B. J. (2019) ''Cyber security threats in higher learning Institutions in Tanzania', A case of the University of Arusha and Tumaini University Makumira. Olva Academy –School of Researchers, 2(3).

Lakshmanan, A. (2019) 'Literature review on Cyber Crimes and its Prevention Mechanisms'. researchgate, Volume 6, p. 1.

Lymo, B. J. (2019) 'Assess the cyber security threats in higher learning Institutions in Tanzania, A case of the University of Arusha and Tumaini University Makumira. Olva Academy School of Researcher, pp. 4-5.

Maraj, A., Sutherland, C. & Butler, W. (2021) The Challenges to Cybersecurity Education in Developing Countries. Academic Conferences International Limited, p. 260.

Matandiko, K. (2017) ‘Wahalifu wa kimtandao wavamia tovuti ya Chuo Kikuu Huria’. Daily Nation, 24 October, 2017.

McGlinchey, S., Waters, R. & Scheinpflug, C. (2021) ‘Securitisation Theory. The LibreTexts Libraries', p. 14.

Merrigan, G. & Huston, C. L. (2004) Communication research methods. Belmont. CA: Thomson Wadsworth, pp. 10-15.

Mohamed, S. T. (2014) 'Security of Multifactor Authentication Model to Improve Authentication Systems'. IISTE, 4(6), pp. 81-82.

Naden, C. (2019). Stronger data protection with updated guidelines on assessing information security controls. Available at: https://www.iso.org/news/ref2367.html (Accessed: 11 February 2023).

Patil, A. P., Bharath, S. & Annigeri, M. N. (2018) 'Applications of Game Theory for Cyber Security System'. A Survey. Ripublication, 13(17), pp. 12987-12988.

Pickin, M. (2020) 'What is the securitization of cyberspace? Is it a problem?'. Academia, pp. 8-9.

Semlambo, A. A., Mfoi, D. M. & Sangula, Y. (2022) 'Information Systems Security Threats and Vulnerabilities: A Case of the Institute of Accountancy Arusha (IAA)'. Journal of Computer and Communications, pp. 26-43.

Lubua, E. W., Semlambo, A. A.,& Mkude, C. G. (2022) ‘Factors affecting the security of Information Systems in Africa. University of Dar es Salaam Library Journal, Vol 17, No 2 (2022), pp 94-114.

Tassaddiq, A. & Alharbi, T. (2021) 'Assessment of Cybersecurity Awareness among Students of Majmaah University'. Big data and cognitive computers, pp. 8-15.

Uakarn, C., Chaokromthong, K. & Sintao, N. (2021). Sample Size Estimation using Yamane Cochran and Krejcie. Apheit International Journal, pp. 78-79.

Downloads

Published

2023-12-05

How to Cite

Kifaru, F., Kavuta, K. ., & Semlambo, A. (2023). Assessment of the Impacts of Cyber Security on Student Information Management Systems: A Case of Ruaha Catholic University. The Journal of Informatics, 3(1). https://doi.org/10.59645/tji.v3i1.127