The impact of educational training on improving the vigilance of public officials against cyber-attacks

Astrit Hulaj 1, Artan Dreshaj 2 *
More Detail
1 Faculty of Computer Science and Engineering, University for Business and Technology, Pristina, KOSOVO
2 Faculty of Contemporary Sciences and Technologies, South East European University, Skopje, NORTH MACEDONIA
* Corresponding Author
Online Journal of Communication and Media Technologies, Volume 13, Issue 4, Article No: e202358. https://doi.org/10.30935/ojcmt/13784
OPEN ACCESS   520 Views   298 Downloads   Published online: 17 Oct 2023
Download Full Text (PDF)

ABSTRACT

Cybersecurity today is a phenomenon of global and multidimensional proportions. Protecting against cyber-attacks is a challenge for governments and the private sector. Increasing the security and protection of data and critical infrastructure against cyber-attacks is one of the essential factors of an institution that manages confidential data. The authors first present the findings from the research conducted regarding the skills that public officials have on various risks from cyber-attacks. The authors then present the results from testing the skills of public officials through the simulation of two cyber-attacks and the method applied by one public institution in Kosovo (as case study for this research is used Ministry of Internal Affairs - MIA) to raise the awareness of its officials about the various risks of cyber-attacks. Also, this paper focuses on analyzing the results before and after increasing the skills of MIA officials against cyber-attacks, as well as giving concrete recommendations from the results and analyses made. The presented results show that the applied method for raising the awareness of public officials on the risks of cyber-attacks has given impressive results. The obtained results are supported by statistics obtained from the conducted tests.

CITATION

Hulaj, A., & Dreshaj, A. (2023). The impact of educational training on improving the vigilance of public officials against cyber-attacks. Online Journal of Communication and Media Technologies, 13(4), e202358. https://doi.org/10.30935/ojcmt/13784

REFERENCES

  • Alanezi, A. M. (2022). An efficient framework for intelligent learning based on artificial intelligence and IoT. International Journal of Emerging Technologies in Learning, 17(7), 112-124. https://doi.org/10.3991/ijet.v17i07.27851
  • Alharbi, T., & Tassaddiq, T. (2021). Assessment of cybersecurity awareness among students of Majmaah University. Big Data and Cognitive Computing, 5(2), 23. https://doi.org/10.3390/bdcc5020023
  • AlSobeh, A. M. R., AlAzzam, I., Shatnawi, A. M. J., & Khasawneh, I. (2023). Cybersecurity awareness factors among adolescents in Jordan: Mediation effect of cyber scale and personal factors. Online Journal of Communication and Media Technologies, 13(2), e202312. https://doi.org/10.30935/ojcmt/12942
  • Awajan, N. W. (2023). The effect of implementing technology in formative assessments to ensure student learning in higher education English literature courses after COVID-19. Online Journal of Communication and Media Technologies, 13(2), e202320. https://doi.org/10.30935/ojcmt/13049
  • Bund, J., & Esteve-Gonzalez, P. (2020). Cybersecurity capacity review–Republic of Kosovo. SSRN Electronic Journal, 3658214. https://doi.org/10.2139/ssrn.3658214
  • Cherdantseva, Y., & Smart, P. (2020). Applied cyber security for applied software engineering undergraduate program. Journal of the Colloquium for Information Systems Security Education, 8(1), 7.
  • Duić, I., Cvrtila, V., & Ivanjko, T. (2017). International cyber security challenges. In Proceedings of the 40th International Convention on Information and Communication Technology, Electronics, and Microelectronics (pp. 1309-1313). https://doi.org/10.23919/MIPRO.2017.7973625
  • Hu, Z., & Gong, X. (2022). The practice of a new maker teaching model in vocational and technical education. International Journal of Emerging Technologies in Learning, 17(9), 241-256. https://doi.org/10.3991/ijet.v17i09.30935
  • Hulaj, A., & Shehu, A. (2018). An efficient algorithm to energy savings for application to the wireless multimedia sensor networks. In L. Barolli, F. Xhafa, N. Javaid, E. Spaho, & V. Kolici (Eds.), Proceedings of the 6th International Conference on Emerging Internet, Data & Web Technologies (pp. 349-358). Springer. https://doi.org/10.1007/978-3-319-75928-9_31
  • Hulaj, A., Bytyçi, E., & Kadriu, V. (2022). An efficient tasks scheduling algorithm for drone operations in the indoor environment. International Journal of Online & Biomedical Engineering, 18(11), 42-57. https://doi.org/10.3991/ijoe.v18i11.29977
  • Hulaj, A., Likaj, R., & Bajrami, X. (2023). Internet of things application for green border surveillance, based on edge detection techniques. International Journal of Intelligent Systems and Applications in Engineering, 11(2), 702-709. https://ijisae.org/index.php/IJISAE/article/view/2792
  • Internet World Stats. (2021). World internet-users statistics and 2021 world population stats. https://www.internetworldstats.com/stats.htm
  • Jang-Jaccard, J., & Nepal, S. (2014). A survey of emerging threats in cybersecurity. Journal of Computer and System Sciences, 80(5), 973-993. https://doi.org/10.1016/j.jcss.2014.02.005
  • Khamcharoen, N., Kantathanawat, T., & Sukkamart, A. (2022). Developing student creative problem-solving skills (CPSS) using online digital storytelling: A training course development method. International Journal of Emerging Technologies in Learning, 17(11), 17-34. https://doi.org/10.3991/ijet.v17i11.29931
  • Li, Y., & Liu, Q. (2021). A comprehensive review study of cyber-attacks and cyber security: Emerging trends and recent developments. Energy Reports, 7, 8176-8186. https://doi.org/10.1016/j.egyr.2021.08.126
  • Matondang, Z., & Sitompul, H. (2021). Evaluation of building education program field practices, International Journal of Education in Mathematics, Science and Technology, 9(4), 684-696. https://doi.org/10.46328/ijemst.2045
  • Nasongkhla, J., & Shieh, C.-J. (2023). Using the technology acceptance model to discuss factors in university employees’ behavior and intention to apply social media. Online Journal of Communication and Media Technologies, 13(2), e202317. https://doi.org/10.30935/ojcmt/13019
  • Venter, M. I., Blignaut, J. R., Renaud, K., & Venter, A. M. (2019). Cyber security education is as essential as the three R’s. Heliyon, 5(12), e02855. https://doi.org/10.1016/j.heliyon.2019.e02855
  • Watney, M. (2022). Cybersecurity threats to and cyberattacks on critical infrastructure: Legal perspective. Proceedings of the European Conference on Cyber Warfare and Security, 21(1), 319-327. https://doi.org/10.34190/eccws.21.1.196
  • Yusif, S., & Hafeez-Baig, A. (2021). Cybersecurity policy compliance in higher education: A theoretical framework. Journal of Applied Security Research, 18(2), 267-288. https://doi.org/10.1080/19361610.2021.1989271