A Critical Governance Infrastructure Framework at ODL Institutions and Best Practices for its Protection during and beyond New Normal

Authors

DOI:

https://doi.org/10.31305/rrijm.2023.v08.n10.005

Keywords:

Governance, Open and distance learning, Critical governance infrastructure, New normal, Pandemic, Cyber threats

Abstract

The outbreak of Covid-19 has forced us to extend distance education beyond territorial boundaries, mainly due to limitations caused by pandemic conditions. A critical governance infrastructure (CGI) for open and distance learning (ODL) institutions is presented to manage the "new normal" institutional governance activities quite efficiently and effectively. The CGI is supplemented with control systems to efficiently monitor critical information and control critical parts of institutional centres and associated services. Its vulnerabilities to basic attacks (such as cyber attacks and physical attacks) have been analysed. The emerging new challenges and risks for ODL governance, the cyber security crises, and its protection management are presented. Lastly, best practices for protecting and managing the CGI are recommended so as to achieve a safe, robust, and resilient CGI for the ODL institutions. It is inferred that the incorporation of such a CGI into the institutional education system would play a prominent role in establishing an uninterrupted and efficient governance system that is necessary for the sustainable development and growth of the ODL institution concerned during and beyond the "new normal".

Author Biography

Dr. Pankaj Khanna, Indira Gandhi National Open University, New Delhi, India

Dr. Pankaj Khanna obtained his PhD (Management) from IGNOU and also working as Deputy Director at the Planning and Development Division, Indira Gandhi National Open University (IGNOU), New Delhi. His academic and research interests include Decision Support Systems, Massive Open Online Courses (MOOCs), Open Educational Resources (OERs), Good Governance, Operations Management and Quality Management. His work has led to a number of published articles in renowned conferences and academic journals, including the Open learning, Routledge, Taylor & Francis, UK; Growing Science, Canada; IRRODL-Athabasca, Canada; JITI, USA; Turkish Online Journal Distance Education (TOJDE); PCF-6 Commonwealth of Learning (CoL); International Council for Open and Distance Education (ICDE); Education and Information Technologies, Springer US.

References

R Abhishta, A., Junger, M., Joosten, R., & Nieuwenhuis, L. J. (2019). Victim routine influences the number of DDoS attacks: Evidence from Dutch educational network. In 2019 IEEE Security and Privacy Workshops (SPW) (pp. 242-247). IEEE.

AISHE. (2022). All India Survey on Higher Education report for the year 2020–21. Ministry of Education, Government of India. (29 January, 2023). Retrieved from https://pib.gov.in/PressReleseDetailm.aspx?PRID=1894517

Biddle, S. (2017).Three of the Biggest Cybersecurity Challenges Facing the Education Sector. Fortinet - Business & Technology. Retrieved from https://www.fortinet.com/blog/business-and-technology/three-of-the-biggest-cybersecurity-challenges-facing-the-education-sector.html

Brandis, G. (2014). Opening Address of the Critical Infrastructure Resilience Conference Melbourne, Victoria. Retrieved from www.attorneygeneral.gov.au/Speeches/Pages/2014/Second%20Quarter%202014/6June2014-Opening AddressOfTheCriticalInfrastructureResilienceConference.aspx

Cybersecurity. In The Merriam-Webster.com Dictionary. Retrieved from https://www.merriam-webster.com/dictionary/cybersecurity

Daugherty, P., Banerjee, P., Negm, W., & Alter, A. E. (2015). Driving unconventional growth through the industrial internet of things. Accenture technology. Retrieved from https://www.accenture.com/us-en/_acnmedia/Accenture/next-gen/reassembling-industry/pdf/Accenture-Driving-Unconventional-Growth-through-IIoT.pdf

EY. (2013). Security Operations: Centers against cybercrime. Ernst & Young Global Limited. Retrieved from http://www.ey.com/Publication/vwLUAssets/EY_-_Security_Operations_Centers_against_cybercrime/$FILE/EY-SOC-Oct-2013.pdf

G8. (2003). G8 Principles for Protecting Critical Information Infrastructures. Retrieved from http://www.cybersecuritycooperation.org/documents/G8_CIIP_Principles.pdf

Hayden, E., Assante, M., & Conway, T. (2014). An Abbreviated History of Automation & Industrial Controls Systems and Cybersecurity. A SANS Analyst Whitepaper. Retrieved from https://ics.sans.org/media/An-Abbreviated-History-of-Automation-and-ICSCybersecurity.pdf

Harris, C. E., & Hammargren, L. R. (2016). Higher education’s vulnerability to cyber attacks. University Business Magazine. Retrieved from https://www.universitybusiness.com/article/0816-wisp

Humayun, M., Niazi, M., Jhanjhi, N. Z., Alshayeb, M., & Mahmood, S. (2020). Cyber Security Threats and Vulnerabilities: A Systematic Mapping Study. Arabian Journal for Science and Engineering, 1-19.

Johnson, B. (2008). How one clumsy ship cut off the web for 75 million people. The Guardian. Retrieved from www.theguardian.com/business/2008/feb/01/internationalpersonalfinancebusiness.internet

Johnston, E. (2010). Governance infrastructures in 2020. Public Administration Review, 70(s122-128). DOI: https://doi.org/10.1111/j.1540-6210.2010.02254.x

Johnston, E. W., & Hansen, D. L. (2011). Design lessons for smart governance infrastructures. Transforming American governance: Rebooting the public square, 197-212. Retrieved from https://s3.amazonaws.com/academia.edu.documents/30941690/Johnston_Hansen_Gov_3_0_chapter_final.pdf?AWSAccessKeyId=AKIAIWOWYYGZ2Y53UL3A&Expires=1525684778&Signature=avQUSM0KQtTRhAQbhqBqoQaqo9c%3D&response-content-disposition=inline%3B%20filename%3DDesign_Lessons_for_Smart_Governance_Infr.pdf

Khanna, P. (2017). A conceptual framework for achieving good governance at open and distance learning institutions. Open Learning: The Journal of Open, Distance and E-Learning, 32(1), 21-35. DOI: 10.1080/02680513.2016.1246246

Khanna, P. (2019). A governance operating model for open and distance learning institutions. Education and Information Technologies, 24(1), 531-547. DOI: 10.1007/s10639-018-9790-7

Kulkarni, P., & Akhilesh, K. B. (2020). Role of Cyber Security in Public Services. In Smart Technologies (pp. 67-77). Springer, Singapore.

Kwikkers, P. (2005). Governing governance: organisation law and network – process – design, International Journal for Education Law and Policy. 1, 73. Retrieved from http://heinonline.org/HOL/LandingPage?handle=hein.journals/ijelp1&div=11&id=&page=

Luiijf, H. A. M., van Schie, T. C. C., van Ruijven, T. W. J., & Huistra, A. W. W. (2016). The GFCE-MERIDIAN good practice guide on critical information infrastructure protection for governmental policy-makers. Retrieved from https://www.meridianprocess.org/siteassets/meridian/gfce-meridian-gpg-to-ciip.pdf

Morag, N.(2014). Cybercrime, Cyberespionage and Cybersabotage: Understanding Emerging Threats. Colorado Technical University. Retrieved from https://www.coloradotech.edu/media/default/CTU/documents/resources/cybercrime-white-paper.pdf

O’Halloran, D., & Kvochko, E. (2015). Industrial internet of things: unleashing the potential of connected products and services. In World Economic Forum (Vol. 40). Retrieved from http://www3.weforum.org/docs/WEFUSA_IndustrialInternet_Report2015.pdf

OECD. (2007). Working Party on Information Security and Privacy, Development of Policies for Protection of Critical Information Infrastructures: Ministerial Background Report DSTI/ICCP/REG(2007)20/FINAL. OECD. Retrieved from http://www.oecd.org/sti/40761118.pdf

OECD. (2008). ICCP Committee: OECD Recommendation of the Council on the Protection of Critical Information Infrastructures. OECD Council. Retrieved from http://www.oecd.org/sti/40825404.pdf

Rouse, M. (2018). Posted - infrastructure (IT infrastructure). Tech Targets Information Technology encyclopedia and learning. Contributor(s): Clive Longbottom and Stephen J. Bigelow. WhatIs.com. Retrieved from https://searchdatacenter.techtarget.com/definition/infrastructure

Simon, T. (2017). Critical Infrastructure and the Internet of Things. Retrieved from https://www.cigionline.org/publications/critical-infrastructure-and-internet-things-0 and https://www.cigionline.org/sites/default/files/documents/GCIG%20no.46_0.pdf

Solomon, H. (2018). RightsCon report: Universities should form cyber attribution network. IT WORLD CANADA. Retrieved from https://www.itworldcanada.com/article/rightscon-report-universities-should-form-cyber-attribution-network/405399

UK Parliament (2011). Cyber Security in the UK, Postnote Number 389, Retrieved from http://www.parliament.uk/documents/post/postpn389_cyber-security-in-the-UK.pdf

Union, A. (2014). African Union Convention on Cyber Security and Personal Data Protection. African Union: Addis Ababa, Ethiopia. Doc. EX. CL/846 (XXV). Malabo, 27. Retrieved from https://ccdcoe.org/sites/default/files/documents/AU-270614-CSConvention.pdf

Wenger, A., Metzger, J., & Dunn, M. (2002). International CIIP Handbook 2002: An Inventory of Protection Policies in Eight Countries. Critical Information Infrastructure Protection. International CIIP Handbook. Retrieved from http://www.css.ethz.ch/content/dam/ethz/special-interest/gess/cis/center-forsecurities-studies/pdfs/CIIP_Handbook_2002.pdf

Downloads

Published

13-10-2023

How to Cite

Khanna, P. (2023). A Critical Governance Infrastructure Framework at ODL Institutions and Best Practices for its Protection during and beyond New Normal. RESEARCH REVIEW International Journal of Multidisciplinary, 8(10), 29–39. https://doi.org/10.31305/rrijm.2023.v08.n10.005