Information Security Functions Readiness Amidst COVID-19 in Higher Education in South Africa
Abstract
:1. Introduction
2. Materials and Methods
3. Results
3.1. Influence of Digital Transformation
3.2. Key Challenges Identified
3.3. Benefits Observed
3.4. Strategies for Improvement to Overcome the Identified Challenges
3.5. Interpretation of the Feedback
3.6. Recommendations Based on the Feedback
4. Discussion
4.1. Influence of Digital Transformation on Information Security Alignment Discussion
4.2. Challenges and Opportunities Discussion
4.3. Underpinning Theories Discussion
4.4. Conclusion of the Feedback Discussion
4.5. Limitations of the Study
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Appendix A
References
- Al-Nuaimi, M.N. Human and contextual factors influencing cyber-security in organizations, and implications for higher education institutions: A systematic review. Glob. Knowl. Mem. Commun. 2024, 73, 1–23. [Google Scholar] [CrossRef]
- Ajani, O.A.; Dlomo, S. Comparative analysis of digital transformation’s impact on higher education institutions: A systematic literature analysis of public versus private sector. J. Res. High Educ. 2024, 8, 72–96. [Google Scholar] [CrossRef]
- Őri, D.; Szabó, Z. A systematic literature review on business-IT misalignment research. Inf. Syst. E-Bus. Manag. 2024, 22, 139–169. [Google Scholar] [CrossRef]
- Metin, B.; Duran, S.; Telli, E.; Mutlutürk, M.; Wynn, M. IT risk management: Towards a system for enhancing objectivity in asset valuation that engenders a security culture. Information 2024, 15, 55. [Google Scholar] [CrossRef]
- Al Hadad, R.S.; Maulana, H. A comprehensive review of COBIT and ISO 27001: Approaches to auditing credit bureau automation system (CBAS) at PT XYZ. ICSPIS 2023. In Proceedings of the ICSPIS 2023—9th International Conference on Signal Processing and Intelligent Systems, Bandung, Indonesia, 14–15 December 2023; pp. 1–8. [Google Scholar] [CrossRef]
- Tornatzky, G.L.; Fleischer, M. The Processes of Technological Innovation; Lexington Books: Lexington, KY, USA, 1990; pp. 1–298. [Google Scholar]
- Davis, F.D. Perceived usefulness, perceived ease of use, and user acceptance of information technology. Manag. Inf. Syst. Res. Cent. 1989, 13, 319–339. [Google Scholar] [CrossRef]
- Barney, J. Firm resources and sustained competitive advantage. J. Manag. 1991, 17, 99–120. [Google Scholar] [CrossRef]
- Alenezi, A. Cybersecurity risks and strategies in learning services of higher education institutions (HEIs) in developing and emerging countries—A critical scoping review. Egypt J. Bus. Stud. 2024, 48, 480–506. [Google Scholar] [CrossRef]
- Mizrak, F. Integrating cybersecurity risk management into strategic management: A comprehensive literature review. Res. J. Bus. Manag. 2023, 10, 98–108. [Google Scholar] [CrossRef]
- Siphambili, N. Exploring cybersecurity implications in higher education. In Proceedings of the 23rd European Conference on Cyber Warfare and Security (ECCWS 2024), Jyvaskyla, Finland, 27–28 June 2024; pp. 526–531. [Google Scholar] [CrossRef]
- Jonathan, G.M.; Gebremeskel, B.K. Information security and organisational agility in the digital era: Exploring the role of IT alignment. In Proceedings of the 11th Annual IEEE Information Technology, Electronics and Mobile Communication Conference, IEMCON 2020, Vancouver, BC, Canada, 4–7 November 2020; IEEE: Piscataway, NJ, USA; pp. 831–836. [Google Scholar] [CrossRef]
- Mohamed Hashim, M.A.; Tlemsani, I.; Matthews, R. Higher education strategy in digital transformation. Educ. Inf. Technol. 2022, 27, 3171–3195. [Google Scholar] [CrossRef]
- Fernández, A.; Gómez, B.; Binjaku, K.; Meçe, E.K. Digital transformation initiatives in higher education institutions: A multivocal literature review. In Education and Information Technologies; Springer: New York, NY, USA, 2023; Volume 28, pp. 12351–12382. [Google Scholar] [CrossRef]
- Gkrimpizi, T.; Peristeras, V.; Magnisalis, I. Classification of barriers to digital transformation in higher education institutions: Systematic literature review. Educ. Sci. 2023, 13, 746. [Google Scholar] [CrossRef]
- Alaali, M. COVID-19 Challenges to University Information Technology Governance, 1st ed.; Alaali, M., Ed.; Springer Nature: Cham, Switzerland, 2022; pp. 1–375. [Google Scholar] [CrossRef]
- Nadkarni, S.; Prügl, R. Digital transformation: A review, synthesis and opportunities for future research. In Management Review; Springer International Publishing: New York, NY, USA, 2021; Volume 71, pp. 233–341. [Google Scholar] [CrossRef]
- Pihir, I.; Tomičić-Pupek, K.; Furjan, M.T. Digital transformation insights and trends. In Central European Conference on Information and Intelligent Systems; Faculty of Organization and Informatics: Varazdin, Croatia, 2018; pp. 141–149. Available online: https://www.proquest.com/docview/2125639934 (accessed on 8 March 2024).
- Juma, A.H.; Arman, A.A.; Hidayat, F. Cybersecurity assessment framework: A systematic review. In Proceedings of the 10th International Conference on ICT for Smart Society, ICISS 2023—Proceeding, Bandung, Indonesia, 6–7 September 2023; pp. 1–6. [Google Scholar] [CrossRef]
- Herath, T.C.; Herath, H.S.B.; Cullum, D. An Information Security Performance Measurement Tool for Senior Managers: Balanced Scorecard Integration for Security Governance and Control Frameworks. In Information Systems Frontiers; Springer: New York, NY, USA, 2022; Volume 25, pp. 681–721. [Google Scholar] [CrossRef]
- Hielscher, J.; Menges, U.; Parkin, S.; Kluge, A.; Sasse, M.A. “Employees who don’t accept the time security takes are not aware enough”: The CISO view of human-centred security. In Proceedings of the 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, 9–11 August 2023; pp. 2311–2328. Available online: https://www.usenix.org/conference/usenixsecurity23/presentation/hielscher (accessed on 11 April 2024).
- Hassandoust, F.; Johnston, A.C. Peering through the lens of high-reliability theory: A competencies driven security culture model of high-reliability organisations. Inf. Syst. J. 2023, 33, 1212–1238. [Google Scholar] [CrossRef]
- Bisri, A.; Putri, A.; Rosmansyah, Y. A systematic literature review on digital transformation in higher education: Revealing key success factors. Int. J. Emerg. Technol. Learn. 2023, 18, 164–187. [Google Scholar] [CrossRef]
- Akello, O.B. Organizational information security threats: Status and challenges. World J. Adv. Eng. Technol. Sci. 2024, 11, 148–162. [Google Scholar] [CrossRef]
- Ngalim, B. Integrating NIST and ISO cybersecurity audit and risk assessment frameworks into Cameroonian law. J. Cybersecur. Educ. Res. Pract. 2023, 2024, 4. [Google Scholar] [CrossRef]
- Mukherjee, M.; Le, N.T.; Chow, Y.W.; Susilo, W. Strategic approaches to cybersecurity learning: A study of educational models and outcomes. Information 2024, 15, 117. [Google Scholar] [CrossRef]
- Venkatesh, V.; Davis, F.D. Theoretical extension of the Technology Acceptance Model: Four longitudinal field studies. Manag. Sci. 2000, 46, 186–204. [Google Scholar] [CrossRef]
- Mlangeni, T.C. Analysis of Data Governance in Higher Education Institutions: Case of a University of Technology in South Africa Cape Peninsula University of Technology. Ph.D. Thesis, Cape Peninsula University of Technology, Cape Town, South Africa, 2015. Available online: https://etd.cput.ac.za/handle/20.500.11838/2418 (accessed on 4 April 2024).
- Maxwell, J.A. Designing a qualitative study. In Qualitative Research Design: An Interactive Approach; SAGE Publications: Thousand Oaks, CA, USA, 2012. [Google Scholar]
- Saunders, M.; Lewis, P.; Thornhill, A. Research Methods for Business Students, 8th ed.; Pearson: London, UK, 2019. [Google Scholar]
- Saunders, M.; Lewis, P.; Thornhill, A. Research Methods for Business Students, 4th ed.; Pearson: London, UK, 2007. [Google Scholar]
- Hennink, M.; Kaiser, B.N. Sample sizes for saturation in qualitative research: A systematic review of empirical tests. Soc. Sci. Med. 2022, 292, 114523. [Google Scholar] [CrossRef]
- Hoover, L.; Grand Canyon University. Qualitative Research Designs and Research Methods. 2021, pp. 1–5. Available online: https://www.gcu.edu/blog/doctoral-journey/5-qualitative-research-designs-and-research-methods (accessed on 2 April 2024).
- Takahashi, A.R.W.; Araujo, L. Case study research: Opening up research opportunities. RAUSP Manag. J. 2020, 55, 100–111. [Google Scholar] [CrossRef]
- Wojnowska-Heciak, M.; Suchocka, M.; Błaszczyk, M.; Muszyńska, M. Urban parks as perceived by city residents with mobility difficulties: A qualitative study with in-depth interviews. Int. J. Environ. Res. Public Health 2022, 19, 2018. [Google Scholar] [CrossRef]
- Morgan, H. Conducting a qualitative document analysis. Qual. Rep. 2022, 27, 64–77. [Google Scholar] [CrossRef]
- Williams, M.; Moser, T. The art of coding and thematic exploration in qualitative research. Int. Manag. Rev. 2019, 15, 45. [Google Scholar]
- Braun, V.; Clarke, V. Using thematic analysis in psychology. Qual. Res. Psychol. 2006, 3, 77–101. [Google Scholar] [CrossRef]
- Aldaihani, F.M. Justification for Adopting Qualitative Research Method, Research Approaches, Sampling Strategy, Sample Size, Interview Method, Saturation, and Data Analysis. J. Int. Bus. Manag. 2021, 5, 1–11. [Google Scholar]
- Vidhya, D.P.; Mohan, D.T. Building a cognitive enterprise through AI-powered transformation: A digital paradigm for societal and tribunal success in rural areas. In BCom-Corporate Secretaryship Seminar (NIRF 2023); Department of B. Com Corporate Secretaryship Sri Ramakrishna College of Arts & Science: Coimbatore, India, 2024; p. 1. [Google Scholar] [CrossRef]
- University of Johannesburg. QA Report on the Transition to Remote Teaching and Learning Johannesburg. 2020. Available online: https://www.uj.ac.za/wp-content/uploads/2021/12/uj-qa-report-on-teaching-and-learning-final-16-sept-2020.pdf (accessed on 19 April 2024).
- University of Johannesburg. Registrar’s Portfolio ANNUAL REPORT 2023 Johannesburg. 2023. Available online: https://www.uj.ac.za/wp-content/uploads/2024/05/uj_registrars-annual-report-2023.pdf (accessed on 24 January 2024).
- Zeleza, P.T.; Okanda, P.M. Enhancing the digital transformation of African universities: COVID-19 as accelerator. J. High. Educ. Afr. 2022, 19, 1–28. [Google Scholar] [CrossRef]
- Feliciano-Cestero, M.M.; Ameen, N.; Kotabe, M.; Paul, J.; Signoret, M. Is digital transformation threatened? A systematic literature review of the factors influencing firms’ digital transformation and internationalization. J. Bus. Res. 2023, 157, 113546. [Google Scholar] [CrossRef]
- Susanto, P.C.; Yuntina, L.; Saribanon, E.; Soehaditama, J.P.; Liana, E. Qualitative method concepts: Literature review, focus group discussion, ethnography, and grounded theory. Siber J. Adv. Multidiscip. 2024, 2, 262–275. [Google Scholar] [CrossRef]
- Sebastian, S.; Chudra, G.; Yohannis, A. IT strategy themes of higher education institutions: A literature study. In Proceedings of the 2023 International Conference on Networking, Electrical Engineering, Computer Science, and Technology (IConNECT 2023), Bandar Lampung, Indonesia, 25–26 August 2023; pp. 230–235. [Google Scholar] [CrossRef]
- Bryman, A. Social Research Methodology, 5th ed.; Oxford University Press: Oxford, UK, 2016. [Google Scholar]
- Creswell, J.W. Qualitative Inquiry and Research Design: Choosing Among Five Approaches, 2nd ed.; SAGE Publications: Thousand Oaks, CA, USA, 2017. [Google Scholar] [CrossRef]
- Patton, M.Q. Qualitative Research & Evaluation Methods, 4th ed.; SAGE Publications: Thousand Oaks, CA, USA, 2015. [Google Scholar]
Participant | Job Role | Years of Experience | Gender | Age | Qualifications |
---|---|---|---|---|---|
1 | Technical | 10 years | Male | 31 | Diploma, B-Tech, PGDip, CCNA, CCNP, Huawei Datacom, CCNA, AWS |
2 | Technical | 5 years | Male | 27 | Diploma: IT, ITIL v4 Foundation, CompTIA Security+ |
3 | Middle Management | 14 years | Male | 33 | Diploma: IT, Degree: ISM, System Support Management Certificate, Microsoft System Administrator Certifications, pursuing CISSP and an Advanced Diploma: Business Management |
4 | Middle Management | 30 years | Male | 52 | B-tech: IT, Financial Management Certification, CCNA, ITIL v3 Foundation. |
5 | Senior Management | +25 years | Male | 49 | Bachelor of Technology in IT, and pursuing Postgraduate studies |
6 | Senior Management | 21 years | Female | 44 | Masters: Informatics, Pursuing a Master’s in Digital Business and CISM Certificate. |
7 | Senior Management | 32 years | Female | 55 | PhD: IT Management |
8 | Senior Management | ±30 years | Male | 53 | BSc Honours |
9 | Senior Management | +20 years | Male | 50 | Degree: Information Technology |
10 | Senior Management | 15 Years | 39 | BCom Honours Degree, NSE4, ITIL, and N+ Certification |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Teane, L.; Matlala, N. Information Security Functions Readiness Amidst COVID-19 in Higher Education in South Africa. Trends High. Educ. 2025, 4, 23. https://doi.org/10.3390/higheredu4020023
Teane L, Matlala N. Information Security Functions Readiness Amidst COVID-19 in Higher Education in South Africa. Trends in Higher Education. 2025; 4(2):23. https://doi.org/10.3390/higheredu4020023
Chicago/Turabian StyleTeane, Lerato, and Ntswaki Matlala. 2025. "Information Security Functions Readiness Amidst COVID-19 in Higher Education in South Africa" Trends in Higher Education 4, no. 2: 23. https://doi.org/10.3390/higheredu4020023
APA StyleTeane, L., & Matlala, N. (2025). Information Security Functions Readiness Amidst COVID-19 in Higher Education in South Africa. Trends in Higher Education, 4(2), 23. https://doi.org/10.3390/higheredu4020023