CFP last date
20 April 2026
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 20 April 2026

Submit your paper
Know more
Random Articles
Reseach Article

A Rights-Centered Cyber Resilience Framework for Higher Education Institutions

by Ali Munhaimin, Jerome Ofori-Kyeremeh, Leo Ofori-Kyeremeh, Richard Kyereh, Enock Gyabaa, Angela Nyame-Tabiri, Bright Osei Amankwatia, Victor Twene Dapaah, Francis Dartey
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 187 - Number 88
Year of Publication: 2026
Authors: Ali Munhaimin, Jerome Ofori-Kyeremeh, Leo Ofori-Kyeremeh, Richard Kyereh, Enock Gyabaa, Angela Nyame-Tabiri, Bright Osei Amankwatia, Victor Twene Dapaah, Francis Dartey
10.5120/ijca2026926523

Ali Munhaimin, Jerome Ofori-Kyeremeh, Leo Ofori-Kyeremeh, Richard Kyereh, Enock Gyabaa, Angela Nyame-Tabiri, Bright Osei Amankwatia, Victor Twene Dapaah, Francis Dartey . A Rights-Centered Cyber Resilience Framework for Higher Education Institutions. International Journal of Computer Applications. 187, 88 ( Mar 2026), 9-13. DOI=10.5120/ijca2026926523

@article{ 10.5120/ijca2026926523,
author = { Ali Munhaimin, Jerome Ofori-Kyeremeh, Leo Ofori-Kyeremeh, Richard Kyereh, Enock Gyabaa, Angela Nyame-Tabiri, Bright Osei Amankwatia, Victor Twene Dapaah, Francis Dartey },
title = { A Rights-Centered Cyber Resilience Framework for Higher Education Institutions },
journal = { International Journal of Computer Applications },
issue_date = { Mar 2026 },
volume = { 187 },
number = { 88 },
month = { Mar },
year = { 2026 },
issn = { 0975-8887 },
pages = { 9-13 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume187/number88/a-rights-centered-cyber-resilience-framework-for-higher-education-institutions/ },
doi = { 10.5120/ijca2026926523 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2026-03-20T22:55:20.783973+05:30
%A Ali Munhaimin
%A Jerome Ofori-Kyeremeh
%A Leo Ofori-Kyeremeh
%A Richard Kyereh
%A Enock Gyabaa
%A Angela Nyame-Tabiri
%A Bright Osei Amankwatia
%A Victor Twene Dapaah
%A Francis Dartey
%T A Rights-Centered Cyber Resilience Framework for Higher Education Institutions
%J International Journal of Computer Applications
%@ 0975-8887
%V 187
%N 88
%P 9-13
%D 2026
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The rapid digitalisation of Higher Education Institutions (HEIs) has fundamentally transformed how universities deliver instruction, manage research outputs, store sensitive data, and participate in global academic networks. Cloud-based platforms, learning management systems, digital libraries, biometric authentication, and AI-driven administrative tools now underpin modern academic ecosystems. While these technologies enhance accessibility, efficiency, and pedagogical innovation, they also expose institutions to sophisticated cybersecurity threats and ethical challenges. Increasingly frequent attacks, including ransomware, data breaches, intrusive monitoring, algorithmic bias, and opaque third-party data policies, threaten institutional credibility, operational continuity, and user trust. This paper presents a rights-centred cyber resilience framework designed to strengthen HEI cybersecurity while safeguarding digital rights. The framework integrates strong institutional leadership, participatory governance, risk-informed decision-making, capacity-building programs, curricular integration, and robust oversight mechanisms. It emphasises that cybersecurity and digital-rights protection are mutually supportive priorities. By addressing technical, ethical, cultural, and pedagogical dimensions, the framework provides a comprehensive approach to resilience, ensuring privacy, autonomy, and academic freedom across the university community.

References
  1. Aggarwal, A., & Srivastava, S. K. (2024). Synthesizing Information Security Policy Compliance And Non-compliance: A Comprehensive Study And Unified Framework. Journal of Organizational Computing and Electronic Commerce, 34(4), 338-369.
  2. Alguacil, M., Herranz-Zarzoso, N., Pernías, J.C. et al. Academic dishonesty and monitoring in online exams: a randomized field experiment. J Comput High Educ 36, 835–851 (2024). https://doi.org/10.1007/s12528-023-09378-x
  3. Alharthi, M., & Alhussain, T. (2024). Cybersecurity governance strategies in higher education: Balancing innovation and risk. Journal of Information Security and Applications, 77, 104612. https://doi.org/10.1016/j.jisa.2024.104612
  4. Alhussain, T., Alruwaili, M., & Alshammari, F. (2023). Leadership commitment and cybersecurity governance in higher education institutions. Journal of Information Security and Applications, 71, 103264. https://doi.org/10.1016/j.jisa.2023.103264
  5. Alsadi, A., Kadhim, K., & Abbas, S. (2023). Participatory governance for cybersecurity in universities. International Journal of Cybersecurity and Education, 5(2), 45–59. https://doi.org/10.1016/j.ijce.2023.05.003
  6. Alshahrani, F., Alyami, S., & Alqhatani, A. (2025). Exploring cybersecurity challenges of digital transformation in higher education. In IHSI 2025: Intelligent Human Systems Integration.
  7. Arumugam, K. J. (2024). Behind the Cloud: Uncovering Critical Security Threats. Available at SSRN 5160686.
  8. Balash, D. G., Kim, D., Shaibekova, D., Fainchtein, R. A., Sherr, M., & Aviv, A. J. (2021). Examining the examiners: Students’ privacy and security perceptions of online proctoring services. https://arxiv.org/abs/2106.05917
  9. Chantal, M., Shengnan, H., Olga, V., & Cerratto-Pargman, T. (2023). Privacy as contextual integrity in online proctoring systems in higher education: A scoping review. https://arxiv.org/abs/2310.18792
  10. David, A., et al. (2025). Privacy in online proctoring systems in higher education: Stakeholders’ perceptions, awareness, and responsibility. Journal of Computing in Higher Education. https://link.springer.com/article/10.1007/s12528-025-09461-5
  11. Feng, H., & Wang, Y. (2024). Embedding digital ethics and cybersecurity awareness in university curricula. Computers in Human Behavior, 155, 108002. https://doi.org/10.1016/j.chb.2024.108002
  12. Feng, H., Liu, Y., & Zhang, S. (2024). Embedding cybersecurity education into university curricula: A longitudinal study. Computers in Human Behavior, 147, 107936. https://doi.org/10.1016/j.chb.2023.107936
  13. Gupta, S. L., Kishor, N., Mishra, N., Mathur, S., & Gupta, U. (2022). Digitalization of Higher Education using Cloud Computing: Implications, Risk, and Challenges. Chapman & Hall / Routledge.
  14. Hassan, S., & Verma, R. (2023). Promoting institutional trust through comprehensive cyber resilience. International Journal of Educational Technology, 21(2), 78–95. https://doi.org/10.1007/s40692-023-00215-7
  15. Heinrich, E. (2025). A systematic-narrative review of online proctoring systems and a case for open standards. Open Praxis, 17(3), 485-499.
  16. Hughes, C., & Robinson, N. (2024). Effective vulnerability management: managing risk in the vulnerable digital ecosystem. John Wiley & Sons
  17. Ilori, O., Nwosu, N., & Naiho, H. N. (2024). Third-party vendor risks in IT security: A comprehensive audit review and mitigation strategies. World Journal of Advanced Research and Reviews, 22(3), 213–224. https://www.researchgate.net/publication/381844798
  18. Kaur, P., & Farooq, A. (2023). Participatory oversight in digital governance for universities. Education and Information Technologies, 28, 3670–3685. https://doi.org/10.1007/s10639-023-11755-8
  19. Kaur, P., & Singh, R. (2023). Oversight, transparency, and accountability in institutional cybersecurity governance. International Journal of Information Management, 71, 102670. https://doi.org/10.1016/j.ijinfomgt.2023.102670
  20. Li, J., et al. (2023). Identification of key factors affecting data breach incidents in higher education. PMC. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10228450/
  21. Li, X., Zhang, J., & Chen, M. (2024). Integrating governance, technical safeguards, and capacity building for HEI resilience. Journal of Cybersecurity Studies, 10(1), 33–50. https://doi.org/10.1080/2573234X.2024.1184970
  22. Mahmoud, H., & Alshammari, F. (2023). Ethical considerations in higher education digital transformation. Computers & Security, 138, 104189. https://doi.org/10.1016/j.cose.2023.104189
  23. Moldstud. (2024). Mitigating cybersecurity risks in university IT operations. https://moldstud.com/articles/p-mitigating-cybersecurity-risks-in-university-it-operations
  24. Moonsamy, A., Ahmed, M., Guidetti, O., & Rashid, B. (2024). The Human Firewall: Mitigating Ransomware Risks in Critical Infrastructures through Human-Centric Approaches. In Ransomware Evolution (pp. 192-207). CRC Press.
  25. Mutimukwe, C., Viberg, O., McGrath, C., & Cerratto-Pargman, T. (2025). Privacy in online proctoring systems in higher education: stakeholders’ perceptions, awareness and responsibility. Journal of Computing in Higher Education, 1-30.
  26. Nwosu, C., Iahad, N., & Rahim, N. (2023). Addressing human-factor vulnerabilities in university cybersecurity. Education and Information Technologies, 28, 3321–3337. https://doi.org/10.1007/s10639-023-11590-2
  27. Pokorny, A., Ballen, C.J., Drake, A.G. “Out of my control”: science undergraduates report mental health concerns and inconsistent conditions when using remote proctoring software. Int J Educ Integr 19, 22 (2023). https://doi.org/10.1007/s40979-023-00141-4
  28. Rahman, T., & Ahmed, S. (2024). Building rights-centered digital ecosystems in universities. International Journal of Cyber Education, 7(1), 45–61. https://doi.org/10.1080/2573234X.2024.1184975
  29. Sadiqzade, Z., & Alisoy, H. (2025). Cybersecurity and online education-Risks and solutions. Luminis Applied Science and Engineering, 2(1)
  30. Saleh, A., Farouk, M., & Malik, A. (2024). Phased implementation strategies for cyber resilience in resource-constrained universities. Education and Information Technologies, 29, 4090–4108. https://doi.org/10.1007/s10639-024-11845-2
  31. Tsai, H., & Chen, M. (2024). Context-sensitive implementation of digital resilience frameworks in higher education. International Journal of Cyber Education, 6(2), 77–95. https://doi.org/10.1080/2573234X.2024.1184935
  32. Ul Hassan, M., Murtaza, A., & Rashid, K. (2025). Redefining higher education institutions (HEIs) in the era of globalisation and global crises: A proposal for future sustainability. European Journal of Education, 60(1), e12822.
  33. Ulven, J. B., & Wangen, G. (2021). A systematic review of cybersecurity risks in higher education. Future Internet, 13(2), 39. https://doi.org/10.3390/fi13020039
  34. WatermarkInsights. (2024). 10 best practices for higher education data security. https://www.watermarkinsights.com/resources/blog/10-best-practices-for-higher-education-data-security
  35. Zhang, J., & Li, X. (2024). Protecting digital rights and academic freedom in HEI cyber resilience initiatives. Computers & Education, 206, 104860. https://doi.org/10.1016/j.compedu.2024.104860
  36. Zhang, J., & Wang, X. (2024). Digital ethics and cybersecurity literacy in higher education programs. Journal of Cyber Education, 9(1), 12–28. https://doi.org/10.1080/2573234X.2024.1184932.
  37. Zhou, L., & Lee, C. (2024). Technical mitigation strategies for cybersecurity risks in higher education. Computers & Security, 123, 102974. https://doi.org/10.1016/j.cose.2024.102974
Index Terms

Computer Science
Information Sciences

Keywords

Cybersecurity Digital Rights Higher Education Risk Management Governance Resilience cloud‑hosted services learning management systems (LMS) biometric authentication AI‑driven administrative tools digital libraries