IDEAS home Printed from https://ideas.repec.org/a/ibn/cisjnl/v14y2021i2p10.html
   My bibliography  Save this article

Cyber Security amid COVID-19

Author

Listed:
  • Hussin J. Hejase
  • Hasan F. Fayyad-Kazan
  • Ale J. Hejase
  • Imad A. Moukadem

Abstract

COVID-19 pandemic obliged thousands of companies pertaining to all economic sectors to undergo the transformation from on-board work to working from home. Along such rush, the probability for companies being hacked incremented many folds. According to VMware cybersecurity strategist Tom Kellermann, quoted in Menn (2020), “There is a digitally historic event occurring in the background of this pandemic, and that is there is a cybercrime pandemic that is occurring” (para 5). In fact, Software and security company VMware Carbon Black declared during April, “that ransomware attacks it monitored jumped 148% in March from the previous month, as governments worldwide curbed movement to slow the spread of the novel corona virus” (Para 4). On the other hand, Anft (2020) reported that “more than 500 educational institutions, including colleges and K-12 schools, faced ransom attacks in 2019” (para 2). This paper uses a descriptive qualitative approach to shed light on the aforementioned subject depending on reported secondary literature about the topic, and offers an analysis to pinpoint weaknesses and barriers, as well as best practices to counterattack the breaches to cybersecurity in organizations. The outcomes serve as an eye opener for security officers in charge of the safety of organizational intellectual properties and stimulates organizations to adopt protection systems and safety practices.

Suggested Citation

  • Hussin J. Hejase & Hasan F. Fayyad-Kazan & Ale J. Hejase & Imad A. Moukadem, 2021. "Cyber Security amid COVID-19," Computer and Information Science, Canadian Center of Science and Education, vol. 14(2), pages 1-10, May.
  • Handle: RePEc:ibn:cisjnl:v:14:y:2021:i:2:p:10
    as

    Download full text from publisher

    File URL: http://www.ccsenet.org/journal/index.php/cis/article/download/0/0/44880/47483
    Download Restriction: no

    File URL: http://www.ccsenet.org/journal/index.php/cis/article/view/0/44880
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Teodor Sommestad & Henrik Karlzén & Jonas Hallberg, 2015. "A Meta-Analysis of Studies on Protection Motivation Theory and Information Security Behaviour," International Journal of Information Security and Privacy (IJISP), IGI Global, vol. 9(1), pages 26-46, January.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Simon Trang & Benedikt Brendel, 2019. "A Meta-Analysis of Deterrence Theory in Information Security Policy Compliance Research," Information Systems Frontiers, Springer, vol. 21(6), pages 1265-1284, December.
    2. Rodríguez-Priego, Nuria & Porcu, Lucia & Kitchen, Philip J., 2022. "Sharing but caring: Location based mobile applications (LBMA) and privacy protection motivation," Journal of Business Research, Elsevier, vol. 140(C), pages 546-555.
    3. Samiha Hamdi Sayed & Mohammed Al-Mohaithef & Wafaa Taha Elgzar, 2022. "Effect of Digital-Based Self-Learned Educational Intervention about COVID-19 Using Protection Motivation Theory on Non-Health Students’ Knowledge and Self-Protective Behaviors at Saudi Electronic Univ," IJERPH, MDPI, vol. 19(22), pages 1-15, November.

    More about this item

    JEL classification:

    • R00 - Urban, Rural, Regional, Real Estate, and Transportation Economics - - General - - - General
    • Z0 - Other Special Topics - - General

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:ibn:cisjnl:v:14:y:2021:i:2:p:10. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Canadian Center of Science and Education (email available below). General contact details of provider: https://edirc.repec.org/data/cepflch.html .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.