Cybersecurity is a combination of technologies, processes and operations that are designed to protect information systems, computers, devices, programs, data and networks from internal or external threats, harm, damage, attacks or unauthorized access1.The research was purposed to develop a cybersecurity culture framework which ensures that grassroot users of cyberspace are secured from cyber threats. Literature review showed that in Zimbabwe, no research had attempted to come up with a cybersecurity culture framework for grassroot users of cyberspace.The research was guided by the interpretivist paradigm and employed a qualitative methodology. A descriptive research design was used to answer the research questions and unstructured interviews were done to ascertain the cybersecurity needs and challenges of grassroot users of cyberspace. A cybersecurity culture framework was then crafted based on the research findings. The researchers recommended that Zimbabwe should have a cybersecurity vision and strategy that cascades to the grassroot users of cyberspace. Furthermore, the education curricula should be revised so that it incorporates cybersecurity courses at primary and secondary school level .This will then ensure that ICT adoption is matched with cyber hygiene and responsible use of cyberspace.
The adoption of virtual reality (VR) and augmented reality (AR) headsets in futuristic and science fiction has made it possible for the Metaverse to exist as a single, universal, immersive virtual universe. By extending technology outside of our physical reality, the Metaverse alters the human experience. The four categories we use to categorize metaverse definitions are environment, interface, interaction, and social value. Currently, it is unclear what the metaverse's structure and elements are. A cybersecurity framework for these devices is necessary as the world grows more interconnected and immersive technologies are increasingly widely used in business, government, and consumer markets. Used was a literature review. The goal of the study is to create a cybersecurity model for a Roblox-based Metaverse architecture framework that can be applied to internationalization, the value chain of education, and the delivery of online and e-learning education. The research is conducted using the Interpretivist Paradigm, which is characterized by a subjectivist epistemology, a relativist ontology, a naturalist methodology, and a balanced axiology. Both the qualitative methodology and the quantitative methodology with an experimental research design were applied. A systematic literature review was conducted on the metaverse, AR and VR. By describing each aspect of the metaverse, we categorized definitions of the metaverse into four categories: environment, interface, interaction, and social value. The interface is based on the level of immersion and there are physical, immersive, and 3D interface options available. There are realistic, unreal, and blended environments in the metaverse. Social networking, teamwork, and persona discourse are the three categories used to describe interaction in the metaverse. A major advantage of 6G is that it facilitates instant communication in phones, computers, wearable devices, robotics, and more. The Cybersecurity model for a Roblox-based Metaverse architecture framework developed is a Bayesian Network, which is a directed acyclic graph that has an associated probability distribution function that can be used for multivariate analysis.
This research was on the cybersecurity challenges and needs of grassroot users of cyberspace in Zimbabwe. A qualitative research methodology was used and was guided by the Interpretivist philosophy. Judgmental sampling was used to select the participants in the study based on their knowledge on cybersecurity matters. The sample was drawn from people from Murewa District of Zimbabwe. A descriptive research design was used to answer the research questions. Both unstructured and structured interviews as well as observations were used to collect data on the cybersecurity needs and challenges of grassroot users of cyberspace. The findings revealed that the challenges that grassroot users are facing include identity theft, poor internet connectivity and infrastructure problems. The research also exposed the need for stronger physical security of ICT assets and cybersecurity legislation. The researcher recommended the use of solar systems as an alternative source of energy and continuous review and alignment of cybersecurity legislation in line with the changing cyber threat landscape.
Reinforcement learning (RL) is a type of ML, which involves learning from interactions with the environment to accomplish certain long-term objectives connected to the environmental condition. RL takes place when action sequences, observations, and rewards are used as inputs, and is hypothesis-based and goal-oriented. The key asynchronous RL algorithms are Asynchronous one-step Q learning, Asynchronous one-step SARSA, Asynchronous n-step Q-learning and Asynchronous Advantage Actor-Critic (A3C). The paper ascertains the Reinforcement Learning (RL) paradigm for cybersecurity education and training. The research was conducted using a largely positivism research philosophy, which focuses on quantitative approaches of determining the RL paradigm for cybersecurity education and training. The research design was an experiment that focused on implementing the RL Q-Learning and A3C algorithms using Python. The Asynchronous Advantage Actor-Critic (A3C) Algorithm is much faster, simpler, and scores higher on Deep Reinforcement Learning task. The research was descriptive, exploratory and explanatory in nature. A survey was conducted on the cybersecurity education and training as exemplified by Zimbabwean commercial banks. The study population encompassed employees and customers from five commercial banks in Zimbabwe, where the sample size was 370. Deep reinforcement learning (DRL) has been used to address a variety of issues in the Internet of Things. DRL heavily utilizes A3C algorithm with some Q-Learning, and this can be used to fight against intrusions into host computers or networks and fake data in IoT devices.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.