This narrative review article problematises cybersecurity in the higher education sector. It highlights the importance of fostering a continuous training and awareness culture to reduce cyber incidents and threats. Post-COVID-19, universities face increased cyberattack frequency globally, necessitating urgent and effective responses. This study provides an understanding of the role of continuous training and awareness in effectively combating and mitigating cyber threats in higher education institutions (HEIs). This article highlights the pivotal role of user education in cybersecurity. Establishing formal processes to educate students and staff about digital risks and safe information technology practices is crucial. This education extends beyond awareness; it encompasses actionable strategies to secure institutional cyberspace. The findings reveal that although technology can help fight cybercrime, the most effective way to combat these threats lies in comprehensive training and...
Category - Tichaona Buzy MUSIKAVANHU
Boston City Campus, South Africa
Internal control systems are an essential component of every organisation, as they are known for their impact on prevention and risk mitigation. However, limited studies examine the nexus between internal control systems and small and medium enterprises (SMEs). Although SMEs play a crucial role in enabling the country’s financial stability, SME owners and managers in developing countries are perceived to lack knowledge of internal control systems. This conceptual paper aims to bring a broader understanding of SME leaders and managers on knowledge of implementation of quality internal controls systems towards SMEs’ survival and impact on the country’s economy. This paper analyses the relevant literature on internal controls’ implementation, the knowledge of SME leaders and owners on quality implementation of internal control systems, SMEs’ survival and impact on the economy of the country. An existing and persisting perception that internal control systems can only be implemented by...