Factors affecting cyber-security in Kenya – A Case of Small Medium Enterprises
Computer systems have translated data to be world’s new basis for competitive advantage, a platform threatened by cyber-crime. With increased cyber-threats, cyber-security is no longer frivolous and requires attention from both large and small enterprises. Small Medium Enterprises (SMEs) are worse hit by cyber-crimes due to limited resources addressing emerging cyber-threats. Economics place challenges facing cyber-security into perspective better than pure technical approaches, with studies indicating cyber-security responsibilities and liabilities heavily plagued by leadership and legislation. This study sought to explore coherent factors influencing business strategies across different SME industries trying to fix cyber-insecurity. In pursuing this goal, the study assessed economic factors considered critical for creating a safe and secure cyber-space business environment for SMEs including leadership and government policies. The researcher hopes the research results will provide better understanding of SME cyber behaviors and guide the development of appropriate solutions to SMEs cyber-space challenges. The study is a descriptive research with surveys on components showing cyber-security factors contributing, or not contributing to reduced cyber-threat effects. Analysis was done using the statistical software-SPSS. The study targeted a 95% confidence interval for the analyzed sample. Further, a Cronbach Alpha test was used to assess reliability and correlational analysis while testing for significant relationships from data collected.
Showing items related by title, author, creator and subject.
A Case of incapacity: the interrogation of international humanitarian law as a satisfactory regulator of cyber warfare. Maonga, Sharon Kerubo (Strathmore University, 2017-01)Cyber warfare for it is a new concept in the conduct of war and is thus not properly understood hence considered a grey area with inadequate legislation. This dissertation seeks to bring to light the emergence and steady ...
Owino, Michael Ogada; Koome, Ian; Oyuga, Victor (Strathmore University, 2018)Hackers build trust to gain access to information systems. It takes more time to build trust. Attack vectors –vishing, tailgating, pre-texting (making a situation happen so the victim initiates contact)