Next Article in Journal
Raw Water Main Flow Conditioning to Manage Material Load and Treatment Capacity
Previous Article in Journal
Monolithic and Decomposition Methods for Optimal Scheduling of Dynamically Adaptive Water Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Proceeding Paper

Constructing Cyber Resilience: A Focus on Cybersecurity Measures in the South African Construction Sector †

cidb Centre for Excellence & Sustainable Human Settlement and Construction Research Centre, Faculty of Engineering and the Built Environment, University of Johannesburg, Johannesburg 524, South Africa
*
Author to whom correspondence should be addressed.
Presented at the 1st International Conference on Industrial, Manufacturing, and Process Engineering (ICIMP-2024), Regina, Canada, 27–29 June 2024.
Eng. Proc. 2024, 76(1), 3; https://doi.org/10.3390/engproc2024076003
Published: 15 October 2024

Abstract

:
In addressing the challenges of cyber threats in the South African construction sector, the study employed a quantitative methodology involving a questionnaire retrieved from 86 of the study’s respondents. It employed tools like mean item score (MIS), standard deviation (SD), and the pattern matrix of exploratory factor analysis (EFA). The findings revealed critical cybersecurity measures, including adherence to international information security standards such as the General Data Protection Regulation (GDPR), ISO 27001, or the Cybersecurity Framework by NIST, two-factor authentication, and strategic planning. The implications of these findings underscore the importance of robust cybersecurity frameworks and heightened awareness. This research contributes insights for enhancing cyber resilience in the construction industry, urging stakeholders to prioritize protective measures against cyber risks.

1. Introduction

The construction sector is increasingly dependent on technology for project management, financial operations, and communication, rendering it an appealing target for cyber threats [1]. Cybersecurity breaches within the construction industry can result in significant consequences, such as financial losses, reputational harm, and the erosion of clients’ trust. Additionally, these cyberattacks can disrupt project timelines, causing delays and escalating costs. This insight is reinforced by [2], 2019, who advocate for the integration of cybersecurity into the corporate governance strategy of the construction and infrastructure industry. They argue that this approach fosters trust among stakeholders and investors.
The South African construction industry is increasingly becoming a target of cyberattacks owing to its lack of proper cybersecurity measures [3,4,5]. It was stated that the industry is vulnerable to cyberattacks because of the sensitive and confidential information it handles, such as project designs, financial information, and the personal data of employees and clients. A cyberattack on the construction industry can result in significant data loss, project completion delays, and financial losses for companies and clients [6]. This study investigated and proposed effective cybersecurity measures for enhancing cyber resilience within the South African construction sector, mitigating the risks associated with cyber threats and safeguarding critical infrastructure projects.

2. Literature Review

2.1. Security Tools Used to Counter Cyberattacks

These security tools can be utilized to combat cyberattacks in various industries, including construction. As outlined in the study conducted by Eunice et al., [7], these tools include the following.

2.1.1. Firewalls

Firewalls are network security systems designed to oversee and regulate traffic proficiently, encompassing both inbound and outbound data, by adhering to predefined security protocols and regulations [7]. They are positioned at the border of two networks and monitor traffic between them. Modern firewalls are robust and feature-rich, capable of matching incoming traffic against complex rules to protect networks from threats and malicious actors [8]. It is important to ensure no traffic bypasses the firewall and to ensure comprehensive inspection of the communication process [7,8].

2.1.2. Intrusion Detection System (IDS)

An intrusion detection system (IDS) can be either a hardware device or a software application employed to scrutinize networks or systems for signs of malevolent actions [7]. Upon detecting any such malicious activity, it initiates a notification or alert. In information security, a network-based IDS (NIDS) is crucial to identifying security violations such as unauthorized access or the alteration, duplication, or destruction of information systems [9]. The NIDS works alongside other security tools, such as firewalls and antivirus software.

2.1.3. Digital Certificates

Digital certificates are attachments to electronic messages used to verify the sender’s identity [10]. They employ public-key cryptography, utilizing widely disseminated and privately held private keys. Public-key infrastructure (PKI) is a system that facilitates the creation, storage, and distribution of digital certificates to verify the association of a specific public key with a particular entity [11].

2.1.4. One-Time Password (OTP)

A one-time password is a password that remains valid for a single login session or transaction [12]. Time-based one-time password (TOTP) algorithms generate unique passwords using a shared key and the current time. A TOTP is commonly used in two-factor authentication processes, where users provide their username, password, and a generated TOTP to complete the login process [10].

2.1.5. Two-Factor Authentication

Two-factor authentication adds an extra layer of security by verifying users’ identities through their mobile devices [13]. It is a form of digital multifactor authentication widely used in various online services, including payments, communications, and access rights management. Users typically need to enter a special code, received through SMS or obtained in advance, in addition to their username and password [14].

2.1.6. Biometrics

Biometrics involves measuring and analyzing the physical and behavioral characteristics of respondents for authentication and authorization purposes [15]. It provides an additional layer of security by protecting password hashes from rainbow table attacks [16].

2.1.7. Digital Signature

A digital signature is an electronic endorsement that secures documents by employing distinctive digital codes that are challenging to replicate [7]. Digital signatures are crucial in terms of countering cyberattacks on IoT systems, ensuring the integrity of messages, verifying the sender’s identity, and preventing message disownment [12].

2.1.8. Vulnerability Scanning Tools

Vulnerability scanning tools aid in identifying system vulnerabilities [12]. Vulnerability assessment and penetration testing (VAPT) assesses the effectiveness of security measures in web applications to safeguard against emerging cyber threats. These tools contribute to developing a versatile mechanism for identifying vulnerabilities in Internet applications [17].

3. Research Methodology

To evaluate the study, we employed a quantitative methodology and questionnaires were disseminated to professionals in the construction field and cybersecurity experts specifically within the Gauteng region of South Africa. This target audience encompassed professionals in architecture, quantity surveying, construction management, building, various engineering disciplines (including civil, mechanical, and electrical), and cybersecurity experts. In total, 150 questionnaires were randomly distributed among these professionals, retrieving 86 completed responses. The questionnaire was designed with two (2) sections. Section A was a demographic questionnaire to gather respondents’ general and background information. Section B is concerned with assessing the best practices for improving cybersecurity in the construction industry. A five-point scale was used in the ranking, where 5 = strongly agree, 4 = agree, 3 = neutral, 2 = disagree and 1 = strongly disagree. The methodology employed descriptive analysis and exploratory factor analysis (EFA) to articulate the findings derived from the administered questionnaires comprehensibly and to analyze the research objective. Analytical data like mean item score (MIS) and standard deviation (SD) were employed by using a statistical package for social sciences (SPSS) as affirmed for such data by [18]. These statistical tools played a pivotal role in presenting a clear and succinct representation of the inferences drawn from the data, providing valuable insights into the study’s outcomes. The core of factor analysis lies in revealing correlation patterns inherent within the dataset and employing these patterns to categorize variables into distinct factor groups, a methodology elucidated by [19].

4. Results (Discussions)

4.1. Practices for Improving Cybersecurity

Table 1 outlines best practices for enhancing cybersecurity in the South African construction industry, covering policy development, organizational strategies, frameworks, approaches, and security tools. Notably, “Two-factor authentication” emerges as the top-rated practice with a mean of 4.55, indicating widespread consensus on its effectiveness. “One-time password”, “Firewalls”, “Biometrics”, and “Utilize threat intelligence” closely follow, all with high mean ratings, suggesting their perceived efficacy. Additionally, practices like “Digital signature”, “Strategic approach”, and “Security tokens” hold considerable importance. Despite variations in opinions reflected in standard deviations, practices like “International information security standards” and “Developing national cybersecurity strategies/agendas” are generally considered effective. The data underscore the diversity in perceptions, guiding organizations to tailor cybersecurity strategies based on respondents’ perceptions of effectiveness and consensus.

4.2. Exploratory Factor Analysis of the Best Practices for Improving Cybersecurity

Table 2 presents the pattern matrix resulting from Principal Component Analysis (PCA) with Oblimin rotation and Kaiser normalization and identifies five distinct clusters related to cybersecurity measures.
CLUSTER 1, characterized as cybersecurity frameworks and standards, with variables such as “International information security standards” (85.70%), “Digital certificate” (74.20%), “Cyber liability insurance” (71.10%), “Developing national cybersecurity strategies/agendas” (65.70%), “Frameworks for implementing national cybersecurity initiatives” (65.30%), “Private sector-initiated cybersecurity implementation frameworks” (64.90%), “Country-initiated cybersecurity implementation frameworks” (64.10%), “Picking the plan that is right for you” (53.20%), and “One-time password” (49.60%), suggests a focus on global and national policy frameworks and standards. This cluster is associated with a broad concept of cybersecurity frameworks and standards regarding best practices for enhancing cybersecurity in the South African construction industry, with a total variance of 46.282%. Implementing cybersecurity frameworks and standards is pivotal in advancing the best practices for enhancing cybersecurity within the South African construction industry [20]. These frameworks and standards, such as International Standard Organisation 27001 or the National Institute of Standards and Technology (NIST) Cybersecurity Framework, provide a well-defined structure and guidelines that organizations can adopt to fortify their security posture [21]. They serve as a reference point for companies in the construction sector, offering a comprehensive blueprint to identify, assess, and mitigate cybersecurity risks effectively.
CLUSTER 2, characterized as security and authentication factor, with high positive loadings, includes variables like “Two-factor authentication” (85.00%), “Vulnerability scanning tool” (74.90%), “Security tokens” (72.70%), “Digital signature” (68.10%), “Focus on compliance” (51.80%), “Biometrics” (50.80%), “Intrusion detection system” (49.50%), and “The role of the private sector in cybersecurity” (40.90%), highlighting technical measures for user authentication and data protection. All these factors are related to security and authentication factors, which are seen as best practices for enhancing cybersecurity in the South African construction industry, with a total variance of 52.074%. This is in correlation to the study by Olofinbiyi [15], which stated that integrating strong security and authentication factors is a cornerstone in advancing the best practices for bolstering cybersecurity within the South African construction industry. Robust security measures, including multifactor authentication (MFA) and biometric verification, bolster the defense against unauthorized access and data breaches, thus safeguarding sensitive information and critical systems. In addition, Grobler and Bryk [22] encouraged users to authenticate their identity through multiple means, such as passwords, biometrics, or smart cards, construction firms can significantly reduce the risk of credential-based attacks by implementing these practices.
CLUSTER 3, characterized as strategic planning and collaboration, includes “Strategic approach” (81.70%), “Personal data protection (PDP)” (78.90%), “National cybersecurity framework” (65.70%), “Capacity building and awareness” (62.80%), “Strengthening regional and international cooperation” (61.80%), “Firewalls” (61.70%), and “Building a team of trusted advisors” (38.00%), emphasizing strategic planning and collaboration at the national and international levels. All these are related to strategic and awareness aspects of cybersecurity with a total variance of 57.485%. The strategic and awareness aspects of cybersecurity are paramount in propelling the best practices for bolstering cybersecurity within the South African construction industry. Developing a strategic cybersecurity plan that aligns with the specific needs and risks of the construction sector is imperative. This involves conducting regular risk assessments, setting clear security objectives, and establishing incident response plans as postulated by De Lanerolle [23]. Equally important is fostering a culture of cybersecurity awareness among employees, from the construction site to the boardroom, as education and training programs help workers recognize potential threats and understand their role in safeguarding the organization’s digital assets [24].
CLUSTER 4, characterized as operational compliance includes “Collaborate and report” (62.00%), “Be prepared for when, not if” (52.40%), and “Evaluating risks so it is properly allocated through contract” (44.10%), indicating a focus on operational measures, risk assessment, and reporting. All these are related to compliance and international collaboration in the cybersecurity domain, with a total variance of 61.959%. Compliance and international collaboration in cybersecurity hold immense potential to propel the best practices for enhancing cybersecurity within the South African construction industry. Adhering to international standards and compliance requirements, such as GDPR, ISO 27001, or the Cybersecurity Framework by NIST, ensures that construction firms meet critical security benchmarks and bolsters their overall resilience against cyber threats, as stated by [1,21]. These standards provide a well-established framework for mitigating risks and safeguarding sensitive data, aligning the industry’s practices with globally recognized cybersecurity protocols.
CLUSTER 5, characterized as proactive measures, includes “Adopt a defence-in-depth approach” (58.40%), “Utilize threat intelligence” (39.90%), and “Promote a security-focused cyberculture” (37.10%), emphasizing a layered defense approach, threat intelligence utilization, and fostering a cybersecurity culture. The successful convergence of the rotation through 31 iterations indicates a stable and meaningful grouping of variables within these five components, offering insights into the diverse aspects of cybersecurity measures. All these are related to proactive measures as best practices for enhancing cybersecurity in the South African construction industry, with a total variance of 65.948%. Proactive measures are instrumental in propelling the best practices for elevating cybersecurity within the South African construction industry. Instead of a reactive approach that responds to incidents after they occur, a proactive stance involves preemptively identifying and mitigating potential threats. This strategy includes conducting regular security assessments and vulnerability scans, staying current with emerging cyber threats, and deploying advanced intrusion detection and prevention systems [24]. García de Soto et al., [25] added that by being proactive, construction companies can identify vulnerabilities and weaknesses in their cybersecurity defenses before malicious actors can exploit them, thus reducing the likelihood of successful cyberattacks.

5. Conclusions and Recommendations

The study delves into enhancing cybersecurity within the South African construction industry, emphasizing a comprehensive approach beyond technical solutions. It highlights the need for strategic planning, risk assessments, and employee training to address organizational and human factors alongside technical measures. Embracing global cybersecurity standards and fostering international collaboration is crucial for compliance and staying informed about emerging threats. Urging a shift from reactive to proactive measures, the study advocates for regular security assessments and a proactive mindset to mitigate vulnerabilities before exploitation. The recommendations are vital in terms of fortifying digital defenses, emphasizing tailored approaches and regular risk assessments, and adaptability to evolving cyber threats within the construction sector.
In constructing cyber resilience within the South African construction sector, stakeholders should focus on implementing a multifaceted approach, incorporating training programs to enhance their personnel’s understanding of cybersecurity threats, awareness campaigns to foster a culture of vigilance, and best practices for deploying specific measures such as two-factor authentication, firewalls, and intrusion detection systems. Additionally, the adoption of digital certificates and utilization of threat intelligence can bolster defenses against evolving cyber threats. Collaboration among stakeholders, along with reporting mechanisms, is crucial for timely response and mitigation efforts. Moreover, emphasizing compliance with international information security standards and national cybersecurity frameworks is paramount. By embracing a defense-in-depth strategy and promoting security-focused cyberculture, the sector can better navigate the complex landscape of cyber threats and ensure the resilience of critical infrastructure projects. The study’s potential limitations include the need for further exploration into the challenges and vulnerabilities unique to the South African construction sector and the necessity for ongoing adaptation of cybersecurity measures to address evolving threats in the digital landscape.

Author Contributions

Conceptualization, S.S., C.A. and A.O.; methodology, S.S., C.A., A.O. and O.A.; software, S.S. and O.A.; validation, S.S., C.A. and A.O.; formal analysis, S.S. and O.A.; investigation, O.A. and A.I.; resources, S.S., O.A. and A.I.; data curation, S.S. and O.A.; writing—original draft preparation, S.S.; writing—review and editing, S.S., C.A. and A.O.; visualization, S.S. and C.A.; supervision, C.A., A.O. and O.A.; project administration, S.S., C.A., A.O. and O.A.; funding acquisition, C.A. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

The study was conducted in accordance with the Declaration of Ethics and approved by the Ethics and Plagiarism Committee (FEPC) of the Faculty of Engineering and the Built Environment at the University of Johannesburg (UJ_FEBE_FEPC_00928 on 7 August 2023) for studies involving humans.

Informed Consent Statement

Informed consent was obtained from all subjects involved in the study.

Data Availability Statement

The original contributions presented in the study are included in the article, further inquiries can be directed to the corresponding author.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Nyamuchiwa, K.; Lei, Z.; Aranas, C., Jr. Cybersecurity vulnerabilities in off-site construction. Appl. Sci. 2019, 12, 5037. [Google Scholar] [CrossRef]
  2. Klinc, R.; Turk, Ž. Construction 4.0–digital transformation of one of the oldest industries. Econ. Bus. Rev. 2019, 21, 393–410. [Google Scholar] [CrossRef]
  3. Gcaza, N.; von Solms, R. A strategy for a cybersecurity culture: A South African perspective. Electron. J. Inf. Syst. Dev. Ctries. 2017, 80, 1–17. [Google Scholar] [CrossRef]
  4. Barrett, M. Path Forward to Support Adoption and Adoption of Cybersecurity Framework the Framework for Improving Critical Infrastructure Cybersecurity. 2018. Available online: https://www.nist.gov/system/files/documents/2018/02/06/session_iii_-_barrett_csf.pdf (accessed on 2 February 2024).
  5. Beckage, J.A.; Parziale, D.J. Why the Construction Industry Is Being Impacted by Cyberattacks, and What to Do about It. 2021. Available online: https://www.agc.org/sites/default/files/Galleries/enviro_members_file/CLE%20Paper_%20Cyber%20Attacks%20and%20the%20Construction%20Industry.pdf (accessed on 14 December 2023).
  6. Pieterse, H. The cyber threat landscape in South Africa: A 10-year review. Afr. J. Inf. Commun. 2021, 28, 1–21. [Google Scholar] [CrossRef]
  7. Eunice, A.D.; Gao, Q.; Zhu, M.Y.; Chen, Z.; Na, L.V. Network anomaly detection technology based on deep learning. In Proceedings of the 2021 IEEE 3rd International Conference on Frontiers Technology of Information and Computer (ICFTIC), Greenville, SC, USA, 12–14 November 2021. [Google Scholar]
  8. Kortjan, N.; von Solms, R. Cybersecurity education in developing countries: A South African perspective. In e-Infrastructure and e-Services for Developing Countries; Springer: London, UK, 2013; pp. 289–297. [Google Scholar]
  9. Luiijf, E.; Besseling, K.; De Graaf, P. Nineteen national cyber security strategies. Int. J. Crit. Infrastruct. 2013, 9, 3–31. [Google Scholar] [CrossRef]
  10. Mallik, A.; Ahsan, A.; Shahadat, M.; Tsou, J. Man-in-the-middle-attack: Understanding in simple words. Int. J. Data Netw. Sci. 2019, 3, 77–92. [Google Scholar] [CrossRef]
  11. Mantha, B.R.; Garcia de Soto, B. Cybersecurity Challenges and Vulnerability Assessment in the Construction Industry. 2019. Available online: https://www.semanticscholar.org/paper/Cyber-security-challenges-and-vulnerability-in-the-Mantha-Soto/0d76974ae70fd1d58e212347b59925427dbed858 (accessed on 4 February 2024).
  12. Namanya, A.P.; Cullen, A.; Awan, I.U.; Disso, J.P. The world of malware: An overview. In Proceedings of the 2018 IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud), Barcelona, Spain, 6–8 August 2018; pp. 420–427. [Google Scholar]
  13. Nguyen, B.; Buscher, V.; Cavendish, W.; Gerber, D.; Leung, S.; Krzyzaniak, A.; Flapper, T. Blockchain and the Built Environment; Arup: London, UK, 2019. [Google Scholar]
  14. Odlyzko, A. Cybersecurity Is Not Very Important; Ubiquity: New York, NY, USA, 2019; pp. 1–23. [Google Scholar]
  15. Olofinbiyi, S. A reassessment of public awareness and legislative framework on cybersecurity in South Africa. Jurid. Sci. 2022, 2, 1–12. [Google Scholar] [CrossRef]
  16. Priyadarshini, I. Introduction to Cybersecurity. 2019. Available online: https://www.researchgate.net/publication/331992988 (accessed on 3 January 2024).
  17. Sharp, R. An Introduction to Malware. 2017. Available online: https://core.ac.uk/download/pdf/24847956.pdf (accessed on 17 January 2024).
  18. Arowoiya, V.A.; Oke, A.E.; Aigbavboa, C.O.; Aliu, J. An appraisal of the adoption internet of things (IoT) elements for sustainable construction. J. Eng. Des. Technol. 2020, 18, 1193–1208. [Google Scholar] [CrossRef]
  19. Yong, A.; Pearce, S. A beginner’s guide to factor analysis: Focusing on exploratory factor analysis (EFA). Tutor. Quant. Methods Psychol. 2013, 9, 79–94. [Google Scholar] [CrossRef]
  20. Kritzinger, E. Cyber-Safety a South African School Perspective. 2014. Available online: http://eagle.unisa.ac.za/elmarie/images/Pdf/r2.pdf (accessed on 3 February 2024).
  21. Grobler, M.; Bryk, H. Common challenges faced during the establishment of a CSIRT. In Proceedings of the 2010 Information Security for South Africa, Johannesburg, South Africa, 2–4 August 2020; pp. 1–6. [Google Scholar]
  22. De Lanerolle, I. Internet Freedom: Why Access Is Becoming a Human Right. 2016. Available online: https://theconversation.com/internet-freedom-why-access-is-becoming-a-human-right-59125 (accessed on 3 February 2024).
  23. Tamarkin, E. The AU’s Cybercrime Response: A Positive Start, But Substantial Challenges ahead. 2015. Available online: https://issafrica.org/research/policy-brief/the-aus-cybercrime-response-a-positive-start-but-substantial-challenges-ahead (accessed on 25 January 2024).
  24. Cybersecurity and Infrastructure Security Agency (CISA). Cybersecurity Awareness Month Theme and Schedule. 2021. Available online: https://www.cisa.gov/cybersecurity-awareness-month (accessed on 25 January 2024).
  25. García de Soto, B.; Georgescu, B.R.; Turk, M.Z.; Maciel, A. Construction Cybersecurity and Critical Infrastructure Protection: Significance, Overlaps, and Proposed Action Plan. 2020. Available online: https://www.preprints.org/manuscript/202005.0213/v1 (accessed on 18 January 2024).
Table 1. Practices for improving cybersecurity.
Table 1. Practices for improving cybersecurity.
Practices for Improving CybersecurityMeanSDRank
Two-factor authentication4.550.5971
One-time password4.510.7372
Firewalls4.480.5983
Biometrics4.470.6614
Utilize threat intelligence4.470.6805
Digital signature4.430.5946
Strategic approach4.430.7337
Digital certificate4.400.6548
Be prepared for when, not if4.400.7999
Cyber liability insurance4.400.71210
Security tokens4.390.61011
Vulnerability scanning tool4.390.69112
Focus on compliance4.390.65213
Collaborate and report4.390.74614
Intrusion detection system4.380.58615
Personal data protection (PDP)4.380.72616
Private sector-initiated cybersecurity implementation frameworks4.360.72417
Evaluating risks so it is properly allocated through contract4.360.72418
Capacity building and awareness4.360.64719
Adopt a defense-in-depth approach4.350.70320
Promote a security-focused cyberculture4.350.64421
International information security standards4.340.73622
Developing national cybersecurity strategies/agendas4.320.76823
Picking the plan that is right for you4.310.67424
The role of the private sector in cybersecurity4.310.69325
Country-initiated cybersecurity implementation frameworks4.300.74526
National cybersecurity framework4.300.68927
Strengthening regional and international cooperation4.290.77628
Building a team of trusted advisors4.230.75929
Frameworks for implementing national cybersecurity initiatives4.170.76830
Table 2. Pattern matrix of the study’s clusters.
Table 2. Pattern matrix of the study’s clusters.
Pattern Matrix a
Cybersecurity MeasuresComponent
12345
International information security standards0.857
Digital certificate0.742
Cyber liability insurance0.711
Developing national cybersecurity strategies/agendas0.657
Frameworks for implementing national cybersecurity initiatives0.653
Private sector-initiated cybersecurity implementation frameworks0.649
Country-initiated cybersecurity implementation frameworks0.641
Picking the plan that is right for you0.532
One-time password0.496
Two-factor authentication 0.850
Vulnerability scanning tool 0.749
Security tokens 0.727
Digital signature 0.681
Focus on compliance 0.518
Biometrics 0.508
Intrusion detection system 0.495
The role of the private sector in cybersecurity 0.409
Strategic approach 0.817
Personal data protection (PDP) 0.789
National cybersecurity framework 0.657
Capacity building and awareness 0.628
Strengthening regional and international cooperation 0.618
Firewalls 0.617
Building a team of trusted advisors 0.380
Collaborate and report 0.620
Be prepared for when, not if 0.524
Evaluating risks so it is properly allocated through contract 0.441
Adopt a defense-in-depth approach 0.584
Utilize threat intelligence 0.399
Promote a security-focused cyberculture 0.371
Extraction Method: principal component analysis. Rotation Method: Oblimin with Kaiser Normalization. a Rotation converged through 31 iterations.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Stephen, S.; Aigbavboa, C.; Oke, A.; Akinradewo, O.; Idowu, A. Constructing Cyber Resilience: A Focus on Cybersecurity Measures in the South African Construction Sector. Eng. Proc. 2024, 76, 3. https://doi.org/10.3390/engproc2024076003

AMA Style

Stephen S, Aigbavboa C, Oke A, Akinradewo O, Idowu A. Constructing Cyber Resilience: A Focus on Cybersecurity Measures in the South African Construction Sector. Engineering Proceedings. 2024; 76(1):3. https://doi.org/10.3390/engproc2024076003

Chicago/Turabian Style

Stephen, Seyi, Clinton Aigbavboa, Ayodeji Oke, Opeoluwa Akinradewo, and Ayobami Idowu. 2024. "Constructing Cyber Resilience: A Focus on Cybersecurity Measures in the South African Construction Sector" Engineering Proceedings 76, no. 1: 3. https://doi.org/10.3390/engproc2024076003

APA Style

Stephen, S., Aigbavboa, C., Oke, A., Akinradewo, O., & Idowu, A. (2024). Constructing Cyber Resilience: A Focus on Cybersecurity Measures in the South African Construction Sector. Engineering Proceedings, 76(1), 3. https://doi.org/10.3390/engproc2024076003

Article Metrics

Back to TopTop