A Critical Governance Infrastructure Framework at ODL Institutions and Best Practices for its Protection during and beyond New Normal
DOI:
https://doi.org/10.31305/rrijm.2023.v08.n10.005Keywords:
Governance, Open and distance learning, Critical governance infrastructure, New normal, Pandemic, Cyber threatsAbstract
The outbreak of Covid-19 has forced us to extend distance education beyond territorial boundaries, mainly due to limitations caused by pandemic conditions. A critical governance infrastructure (CGI) for open and distance learning (ODL) institutions is presented to manage the "new normal" institutional governance activities quite efficiently and effectively. The CGI is supplemented with control systems to efficiently monitor critical information and control critical parts of institutional centres and associated services. Its vulnerabilities to basic attacks (such as cyber attacks and physical attacks) have been analysed. The emerging new challenges and risks for ODL governance, the cyber security crises, and its protection management are presented. Lastly, best practices for protecting and managing the CGI are recommended so as to achieve a safe, robust, and resilient CGI for the ODL institutions. It is inferred that the incorporation of such a CGI into the institutional education system would play a prominent role in establishing an uninterrupted and efficient governance system that is necessary for the sustainable development and growth of the ODL institution concerned during and beyond the "new normal".
References
R Abhishta, A., Junger, M., Joosten, R., & Nieuwenhuis, L. J. (2019). Victim routine influences the number of DDoS attacks: Evidence from Dutch educational network. In 2019 IEEE Security and Privacy Workshops (SPW) (pp. 242-247). IEEE.
AISHE. (2022). All India Survey on Higher Education report for the year 2020–21. Ministry of Education, Government of India. (29 January, 2023). Retrieved from https://pib.gov.in/PressReleseDetailm.aspx?PRID=1894517
Biddle, S. (2017).Three of the Biggest Cybersecurity Challenges Facing the Education Sector. Fortinet - Business & Technology. Retrieved from https://www.fortinet.com/blog/business-and-technology/three-of-the-biggest-cybersecurity-challenges-facing-the-education-sector.html
Brandis, G. (2014). Opening Address of the Critical Infrastructure Resilience Conference Melbourne, Victoria. Retrieved from www.attorneygeneral.gov.au/Speeches/Pages/2014/Second%20Quarter%202014/6June2014-Opening AddressOfTheCriticalInfrastructureResilienceConference.aspx
Cybersecurity. In The Merriam-Webster.com Dictionary. Retrieved from https://www.merriam-webster.com/dictionary/cybersecurity
Daugherty, P., Banerjee, P., Negm, W., & Alter, A. E. (2015). Driving unconventional growth through the industrial internet of things. Accenture technology. Retrieved from https://www.accenture.com/us-en/_acnmedia/Accenture/next-gen/reassembling-industry/pdf/Accenture-Driving-Unconventional-Growth-through-IIoT.pdf
EY. (2013). Security Operations: Centers against cybercrime. Ernst & Young Global Limited. Retrieved from http://www.ey.com/Publication/vwLUAssets/EY_-_Security_Operations_Centers_against_cybercrime/$FILE/EY-SOC-Oct-2013.pdf
G8. (2003). G8 Principles for Protecting Critical Information Infrastructures. Retrieved from http://www.cybersecuritycooperation.org/documents/G8_CIIP_Principles.pdf
Hayden, E., Assante, M., & Conway, T. (2014). An Abbreviated History of Automation & Industrial Controls Systems and Cybersecurity. A SANS Analyst Whitepaper. Retrieved from https://ics.sans.org/media/An-Abbreviated-History-of-Automation-and-ICSCybersecurity.pdf
Harris, C. E., & Hammargren, L. R. (2016). Higher education’s vulnerability to cyber attacks. University Business Magazine. Retrieved from https://www.universitybusiness.com/article/0816-wisp
Humayun, M., Niazi, M., Jhanjhi, N. Z., Alshayeb, M., & Mahmood, S. (2020). Cyber Security Threats and Vulnerabilities: A Systematic Mapping Study. Arabian Journal for Science and Engineering, 1-19.
Johnson, B. (2008). How one clumsy ship cut off the web for 75 million people. The Guardian. Retrieved from www.theguardian.com/business/2008/feb/01/internationalpersonalfinancebusiness.internet
Johnston, E. (2010). Governance infrastructures in 2020. Public Administration Review, 70(s122-128). DOI: https://doi.org/10.1111/j.1540-6210.2010.02254.x
Johnston, E. W., & Hansen, D. L. (2011). Design lessons for smart governance infrastructures. Transforming American governance: Rebooting the public square, 197-212. Retrieved from https://s3.amazonaws.com/academia.edu.documents/30941690/Johnston_Hansen_Gov_3_0_chapter_final.pdf?AWSAccessKeyId=AKIAIWOWYYGZ2Y53UL3A&Expires=1525684778&Signature=avQUSM0KQtTRhAQbhqBqoQaqo9c%3D&response-content-disposition=inline%3B%20filename%3DDesign_Lessons_for_Smart_Governance_Infr.pdf
Khanna, P. (2017). A conceptual framework for achieving good governance at open and distance learning institutions. Open Learning: The Journal of Open, Distance and E-Learning, 32(1), 21-35. DOI: 10.1080/02680513.2016.1246246
Khanna, P. (2019). A governance operating model for open and distance learning institutions. Education and Information Technologies, 24(1), 531-547. DOI: 10.1007/s10639-018-9790-7
Kulkarni, P., & Akhilesh, K. B. (2020). Role of Cyber Security in Public Services. In Smart Technologies (pp. 67-77). Springer, Singapore.
Kwikkers, P. (2005). Governing governance: organisation law and network – process – design, International Journal for Education Law and Policy. 1, 73. Retrieved from http://heinonline.org/HOL/LandingPage?handle=hein.journals/ijelp1&div=11&id=&page=
Luiijf, H. A. M., van Schie, T. C. C., van Ruijven, T. W. J., & Huistra, A. W. W. (2016). The GFCE-MERIDIAN good practice guide on critical information infrastructure protection for governmental policy-makers. Retrieved from https://www.meridianprocess.org/siteassets/meridian/gfce-meridian-gpg-to-ciip.pdf
Morag, N.(2014). Cybercrime, Cyberespionage and Cybersabotage: Understanding Emerging Threats. Colorado Technical University. Retrieved from https://www.coloradotech.edu/media/default/CTU/documents/resources/cybercrime-white-paper.pdf
O’Halloran, D., & Kvochko, E. (2015). Industrial internet of things: unleashing the potential of connected products and services. In World Economic Forum (Vol. 40). Retrieved from http://www3.weforum.org/docs/WEFUSA_IndustrialInternet_Report2015.pdf
OECD. (2007). Working Party on Information Security and Privacy, Development of Policies for Protection of Critical Information Infrastructures: Ministerial Background Report DSTI/ICCP/REG(2007)20/FINAL. OECD. Retrieved from http://www.oecd.org/sti/40761118.pdf
OECD. (2008). ICCP Committee: OECD Recommendation of the Council on the Protection of Critical Information Infrastructures. OECD Council. Retrieved from http://www.oecd.org/sti/40825404.pdf
Rouse, M. (2018). Posted - infrastructure (IT infrastructure). Tech Targets Information Technology encyclopedia and learning. Contributor(s): Clive Longbottom and Stephen J. Bigelow. WhatIs.com. Retrieved from https://searchdatacenter.techtarget.com/definition/infrastructure
Simon, T. (2017). Critical Infrastructure and the Internet of Things. Retrieved from https://www.cigionline.org/publications/critical-infrastructure-and-internet-things-0 and https://www.cigionline.org/sites/default/files/documents/GCIG%20no.46_0.pdf
Solomon, H. (2018). RightsCon report: Universities should form cyber attribution network. IT WORLD CANADA. Retrieved from https://www.itworldcanada.com/article/rightscon-report-universities-should-form-cyber-attribution-network/405399
UK Parliament (2011). Cyber Security in the UK, Postnote Number 389, Retrieved from http://www.parliament.uk/documents/post/postpn389_cyber-security-in-the-UK.pdf
Union, A. (2014). African Union Convention on Cyber Security and Personal Data Protection. African Union: Addis Ababa, Ethiopia. Doc. EX. CL/846 (XXV). Malabo, 27. Retrieved from https://ccdcoe.org/sites/default/files/documents/AU-270614-CSConvention.pdf
Wenger, A., Metzger, J., & Dunn, M. (2002). International CIIP Handbook 2002: An Inventory of Protection Policies in Eight Countries. Critical Information Infrastructure Protection. International CIIP Handbook. Retrieved from http://www.css.ethz.ch/content/dam/ethz/special-interest/gess/cis/center-forsecurities-studies/pdfs/CIIP_Handbook_2002.pdf
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
This is an open access article under the CC BY-NC-ND license Creative Commons Attribution-Noncommercial 4.0 International (CC BY-NC 4.0).