Cyber Security Concerns and Competitiveness for Selected Medium Scale Manufacturing Enterprises in the Context of Covid-19 Pandemic in Kenya
International Journal of Computer Science and Engineering |
© 2021 by SSRG - IJCSE Journal |
Volume 8 Issue 8 |
Year of Publication : 2021 |
Authors : Evans Mwasiaji, Kenneth Iloka |
How to Cite?
Evans Mwasiaji, Kenneth Iloka, "Cyber Security Concerns and Competitiveness for Selected Medium Scale Manufacturing Enterprises in the Context of Covid-19 Pandemic in Kenya," SSRG International Journal of Computer Science and Engineering , vol. 8, no. 8, pp. 1-7, 2021. Crossref, https://doi.org/10.14445/23488387/IJCSE-V8I8P101
Abstract:
This study hence sought to establish data security concerns for selected medium scale manufacturing enterprises in Kenya. Descriptive research design was adopted in obtaining data from 76 senior executives. The study recorded 63.33% response rate with 67% of the enterprises reporting having experienced a cyber related incident within the last one year. Theft of intellectual property was the most cited cyber security threat at 38%, followed by phishing (24%) and malware (22%). Despite this, only about 6% of the executives are conversant with the applicable data security laws in the country, while 50% are not sure whether their enterprises’ cyber risk management program and capabilities are aligned to industry standards. The study concluded that cybercrime is a global problem that exposes businesses to legal suits by customers due to data breach, and may inhibit a firm’s competitiveness due to loss of customer confidence, stolen business strategies and intellectual property. There is need therefore for governments globally to collaborate in facilitating capacity building for entrepreneurs and partner in providing policy solutions to address cyber security. This would enhance contributions by e-commerce compliant businesses towards global sustainable development.
Keywords:
Cyber Security, Medium Scale Manufacturing Enterprises.
References:
[1] Bartik, A.W., Bertrand, M., Cullen, Z., Glaeser, E.L., Luca, M. & Stanton, C. (2020).The impact of COVID-19 on small business outcomes and expectations. Proceedings of the National Academy of Sciences of the United States of America. PNAS 117 (30) 17656-17666.
[2] Alvarez, G., & Sinde-Cantorna, A. I. (2014). Self-employment and job satisfaction: An empirical analysis. International Journal of Manpower, 35(5) 688–702.
[3] Bigliardi, B., Colacino, P., & Dormio, A. I. (2011). Management & Innovation: Innovative Characteristics of Small and Medium Enterprises, Butterworth-Heinemann, Amsterdam. [4] Abor, J. and Quartey, P. (2010) Issues in SME Development in Ghana and South Africa. International Research Journal of Finance and Economics, 39, 218-228. [5] International Monetary fund (2021). Economic Outlook Report. Retrieved on April 2, 2021 from https://www.imf.org/en/Publications/WEO/Issues/2021/01/26/2021-world-economic-outlook-update [6] OECD (2019). OECD Digital Economy Outlook 2020. OECD Publishing, Paris. Retrieved on 2nd April 2021 from http://www.oecd.org/digital/oecd-digital-economy-outlook-2020-bb167041-en.htm
[7] Kongmanila, X. & Kimbara, T. (2011). Corporate Financing and Performance of SMEs: The Moderating Effects of Ownership Types and Management Styles
[8] UNIDO (2013) Sustaining Employment Growth: The Role of Manufacturing and Structural Change. Industrial Development Report, UNIDO, Vienna
[9] Mwasiaji, E.. The Effect of Government Policy on the Performance of Selected Manufacturing Enterprises in Kenya: International Journal of Economics, Business and Management Research, 3(12) (2019) 198-210. ISSN: 2456-7760
[10] Government of Kenya (2020). Economic Survey 2020. Kenya National Bureau of Statistics. Nairobi, Kenya: Government printer.
[11] Wechuli A. Cyber Security Assessment Framework: Case of government Ministries in Kenya; International Journal of Technology in Computer Science and Engineering, 1(3)(2014).
[12] Kenya Manufacturers Association (2019). Survey of the Manufacturing Sector in Kenya. Kenya Association of Manufacturers, Nairobi.
[13] Parliament Budget Office (2020). Available: http://www.parliament.go.ke/sites/default /files/2020-03/Unpacking%20of%20BPS%202020%20final.pdf [Accessed: 4-7-2021].
[14] Mwasiaji, E., Jagongo A.O. & Ogutu J.O. (2020). Coronavirus Disease Outbreak and the Supply Chain of Selected Small and Medium Manufacturing Enterprises in Kenya: International Journal of Business and Social Science, 11(4) 7-16. ISSN: 2219-6021. DOI: 10.30845/ijbss.v11n4a2
[15] Tam, T., Rao, A. & Hall, J. (2020). The Invisible COVID-19 Small Business Risks: Dealing with the Cyber-Security Aftermath. Digit. Gov.: Res. Pract., 2(2) (2020), Article 23, DOI: https://doi.org/10.1145/3436807
[16] Laura, H., (2020). Small Businesses Drive China's Economy: The Coronavirus Outbreak Could Be Fatal for Many. (February 2020) Retrieved on March 29, 2021 from https://edition.cnn.com/2020/02/14/economy/coronavirus-china-economy-small-businesses/index.html.
[17] Khan, N. A., Brohi, S. N. & Jhanjhi, N.Z, (2019). “UAV’s Applications Architecture Security issues and Attack Scenarios: A Survey,” in 1st International Conference on Technology Innovation and Data Sciences (ICTIDS).
[18] Interpol, COVID-19 cyberthreats, [Online]. Available: https://www.interpol.int/en/Crimes/Cybercrime/COVID-19- cyber threats. [Accessed: 4/4/2021] (2020).
[19] GEM (2020). Diagnosing COVID-19 Impacts on Entrepreneurship. Global Entrepreneurship Research Association, London Business School, Regents Park, London NW1 4SA, UK ISBN (print): 978-1-9160178-4-9 ISBN (ebook): 978-1-9160178-5-6
[20] Peterson, P.,. Business Email Compromise (BEC): Coronavirus a Costly New Strain of Email Attack, Available: https://www.agari.com/email-security-blog/business-emailcompromise-bec-coronavirus-covid-19/. [Accessed: 07-July-2021] (2020).
[21] Sokobe O.E. (2015). ‘Factors influencing adoption of electronic payment by small and medium hotel enterprises in Kisii town, Kisii County, Kenya’.
[22] Paula, E. A.,. Kenya Cyber Security Report 2014, Rethinking Cybersecurity, “An Integrated Approach: Processes, Intelligence and Monitoring.”. Nairobi: Serianu Limited(2014).
[23] Kreicberga, L.. Internal Threat to Information Security Countermeasures and human factor within SME. Kiruna: Lulea University of Technology(2010).
[24] World Health Organization. Coronavirus disease (COVID-19) pandemic. Geneva, Switzerland. https://www.who.int/emergencies/diseases/novel-coronavirus-2019(2020).
[25] Mwasiaji, E., Kandiri, J.M. & Minja, D.M. Policy Framework for Cyber Security Concerns and Performance of Small and Medium Enterprises for Global Economic Recovery amidst Covid-19. The International Journal of Business Management and Technology, 5(3) (2021) 51-59. ISSN: 2581-3889. 51-59.
[26] Communications Authority of Kenya. Cyber Threats on the Rise with increased reliance on ICTs in the Mitigation of COVID-19 Pandemic, [Online]. Available: https://ca.go.ke/cyber-threats-on-the-rise-with-increased-reliance-on-icts-in-the-mitigation-of-covid-19-pandemic/ [Accessed: 08-April-2021](2021). [27] Longbottom, J. Coronavirus Forces Businesses to Adapt to Survive the COVID-19 Pandemic. (March 2020) Retrieved on March 22, 2020 from https://www.abc.net.au/news/2020-03-19/how-businesses-adapting-to-survive-covid-19-coronavirus/12068696(2020). [28] Redrup, Y., (2020). Beverage maker Lion hit by cyberattack. Finance. Rev. (Jun. 2020). Retrieved on March 29, 2021 from https://www.afr.com/politics/federal/super-early-access-frozen-amid-afp-fraud-investigation-20200508-p54r1z.
[29] McGuire M. and Dowling S. Cyber-crime: A review of the evidence Summary of key findings and implications Home Office Research Report 75, Home Office, United Kingdom(2013).
[30] Government of Kenya. Cyber Security Strategy. Ministry of Information Communications and Technology. Nairobi: Government
Press(2014).
[31] Makumbi E. A., An Analysis of Information Technology (IT) Security Practices: A Case Study of Kenyan Small and Medium Enterprises (SMEs) in the Financial Sector. Nairobi: University of Nairobi(2012).
[32] Rogers (1962)Barnett, G.A. Mathematical Model of Diffusion Process. In a Viswanath & G.A. Barnett (Hrsg.). The Diffusion of Innivations – A Communication Science Perspective (S. 103 – 122) New York: Peter Lang Publishing(2011). [33] Venkatesh, V., Thong, J.Y. L. & Xu, X. Unified Theory of Acceptance and Use of Technology: A Synthesis and the Road Ahead, Journal of the Association for Information Systems: 17(5)(2016) Article 1. DOI: 10.17705/1jais.00428 Available at: https://aisel.aisnet.org/jais/vol17/iss5/1 [34] Barney, J.B. , & Tyler, B. 1991. The prescriptive limits and potential for applying strategic management theory, Managerial and Decision Economics, in press.
[35] Peteraf, M.A. The cornerstones of competitive advantage: a resource-based view. Strategic Management Journal, 14(3) (1993) 179-192.
[36] Venkatesh, V., Morris, M., Davis, G., & Davis, F.,. User acceptance of information technology: towards a unified view. MIS Quartely, 27 (3) (2003) 425-478
[37] Powell, W.W., Competitive advantage: logical and philosophical considerations, Strategic Management Journal, 22(9)(2001) 875-888.
[38] Curry, S., Kirda, E., Schwarts, E., Stewart, W.H. and Yoran, A. (2013). Big Data Fuels Intelligence-Driven Security, RSA Security Brief, Jan. 2013.
[39] Njiru, S. W. A Framework to Guide Information Security Initiatives for Banking Information Systems, Kenyan Banking Sector Case Study. Nairobi (2013).
[40] Ndeda, L.A. and Collins Otieno Odoyo, C.O. Cyber Threats and Cyber Security in the Kenyan Business Context. GSJ: 7(9) (2019) Online: ISSN 2320-9186
[41] Government of Kenya (2012). Kenya Vision 2030: Ministry of State for Planning, National Development and Vision 2030. Sessional paper no. 10 of 2012. Nairobi: Government printer.
[42] Zhu, K. The complementarity of information technology infrastructure and e-commerce capability: A resource based assessment of their business value. Journal of management information systems, 21(1)(2004) 167-202.
[43] Shah, M.N., Khan, S, and Xu, M.. A survey of critical success factors in e-banking. In European, Mediteranean and Middle Eastern Conference on Information Systems, (2007) 7-8.
[44] Merono-Cerda and Soto-Acosta, (2007)
[45] Gandhi, R., Sharma, A., Mahoney, W., Sousan, W., Zhu, Q., and Laplante, P. Dimensions of Cyber-Attacks: Cultural, Social, Economic and Political, IEEE Technology and Society Magazine, 30(1) (2011) 28-38.
[46] Jethwani and Surbhi (2015)
[47] Ackerman Jr. R.,. The Cyber Skills Shortage Continues to Balloon—And Think Tanks Aren't Helping. (2019) Retrieved from https://www.rsaconference.com/industry-topics/blog/the-cyber-skills-shortage-continues-to-balloon-and-think-tanks-arent-helping
[48] Roy, A. Top Ten Security and Privacy Challenges for Big Data and Smartgrids, Fujitsu Laboratories of America
[49] Government of Kenya (2013). MSC Act 2012. Kenya Gazette Supplement 219(2013)(Acts No. 55). Available at https://www.industrialization.go.ke/images/downloads/policies/Micro-and-Small-Enterprises-No-55-of-2012.PDF [Accessed: 04-July-2021].
[50] KNBS, Economic Survey, Kenya National Bureau of Statistics, Nairobi, Government Printers(2019).