Equifax data breach analysis8/13/2023 In this research, an Interpretivist or Constructivist paradigm was used. The research question is “How can a cyber security culture framework be developed to solve cybersecurity problems for grassroot users of cyberspace in Zimbabwe?” In that regard, the contextual nature of the problem that this research seeks to solve can only be addressed from an Interpretivist position. A cybersecurity framework that will support a cybersecurity culture to prevent cyber-attacks in Zimbabwe is therefore required under these circumstances. With no cybersecurity framework in place, dealing with cybersecurity issues becomes problematic as there is no guidance and direction on how to prevent, respond and reduce cybersecurity breaches and risk as well as improve personnel awareness. The lack of a framework to provide direction, focus, guidance and a standardised way of addressing cybersecurity issues in Zimbabwe is one of the challenges being faced in the ICT industry. In Zimbabwe not much has been done in terms of cultivating a culture of cyber security in organisations although giant steps have been taken to adopt and use ICTs. Cybersecurity culture is a set of the attitudes, assumptions, beliefs, values and knowledge that people use in their interaction with the information assets. Some victims have even taken their own lives (Citron & Franks, 2014).Ĭybersecurity is the protection of internet-connected systems, including hardware, software and data, from cyberattacks. For example, some have reported being stalked, harassed and threatened with gang rape because of their personal information was also made public. Victims report a host of negative effects: feelings of humiliation, shame, embarrassment and reputation damage with intimate partners, family, friends, work colleagues and, in public sexual shame, sexual problems and body image issues with intimate partners education and employment disruptions becoming paranoid and hyper-vigilant, and concerned for personal safety. The negative impact it has on victims is significant and profound in terms of physical and psychological health and well-being, as with many other forms of gender and sexual violence and abuse. Although male ex-partners are reported as the main perpetrators, current partners, (ex-)friends of both victims and perpetrators, people known to the victim, people seeking revenge for friends, internet hackers and trolls, amongst others, may also be involved (Tyler, 2016). Violation by way of the distribution of sexual images or imagebased sexual abuse or non-consensual “pornography”, or more colloquially and simply, “revenge porn”, entail the online, at times offline, non-consensual distribution, or sharing, of explicit images of someone else for seeking revenge, entertainment or political motives. Some victims have even taken their own lives (Citron & Franks, 2014). Victims report a host of negative effects: feelings of humiliation, shame, embarrassment and reputation damage with intimate partners, family, friends, work colleagues and, in public sexual shame, sexual problems and body image issues with intimate partners education and employment disruptions becoming paranoid and hyper-vigilant, and concerned for their personal safety. Although male ex-partners are reported as the main perpetrators, current partners, (ex-)friends of both victims and perpetrators, people known to the victim, people seeking revenge for friends, Internet hackers and trolls, amongst others, may also be involved (Tyler, 2016). Violation by way of the distribution of sexual images or image-based sexual abuse or non-consensual “pornography”, or more colloquially and simply, “revenge porn”, entail the online, at times offline, non-consensual distribution, or sharing, of explicit images of someone else seeking revenge, entertainment or political motive.
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |