Digital Gaps and Cyber Risks: Strategies to Ensure Equal Opportunities and Digital Education Security
الملخص
This research aims to explore strategies for bridging the digital divide that affects equal opportunities in digital education, while ensuring a safe learning environment protected from cyber risks. The study addresses the challenges faced by students in remote and underserved areas in accessing digital resources, along with the growing cybersecurity risks in educational systems. It also seeks to provide technological solutions and educational policies aimed at ensuring the continuity of digital education and protecting the personal data of students and educators. The research relies on a descriptive analytical approach to analyze the impact of digital gaps and cybersecurity risks on the educational process. It also uses a systems approach to study the relationship between improving digital infrastructure and data security. The results show that digital gaps pose a significant challenge to fair access to digital education, while cybersecurity remains a continuous threat to educational institutions, exposing them to risks such as data breaches or cyberattacks. The study also indicates that strategies focusing on improving access to technology and educating students and educators about cybersecurity risks contribute to bridging these gaps and creating a safe learning environment. The research highlights the importance of bridging digital gaps by enhancing digital infrastructure in underserved areas and stresses the need for collaboration between the public and private sectors to provide effective technological solutions. It also emphasizes the necessity of implementing advanced security policies to protect personal data and maintain the confidentiality of academic information amidst growing cybersecurity risks.
المراجع
- Abbadi, D., &Lachkar, A. (2024).Cyber threats in the age of artificial intelligence: Exploiting advanced technologies and strengthening cybersecurity. International Journal of Science and Research Archive, 13(01), 2576–2588.Retrieved from: https://doi.org/10.30574/ijsra.2024.13.1.1961
- Abrahams, et al., (2024). Cybersecurity awareness and education programs: A review of employee engagement and accountability. Computer Science & IT Research Journal, 5(1), 100-119. https://doi.org/10.51594/csitrj.v5i1.708
- Adam, T. (2025). Towards more justice-oriented digital education. In B. Bachmann & A. Sander (Eds.), Short informative paper. The European Digital Education Hub (EDEH). https://www.daad-brussels.eu/files/2025/02/Justice-Oriented-Digital-Education.pdf
- Adhikari, J., Mathrani, A., & Scogings, C. (2016). Bring Your Own Devices classroom: Exploring the issue of digital divide in the teaching and learning contexts. Interactive Technology and Smart Education, 13(4), 323-343. https://doi.org/10.1108/ITSE-04-2016-0007
- Akhyadov, E. S.-M., et al., (2019). Digital economy: Investing in digital learning technologies. International Journal of Engineering and Advanced Technology, 9(1), 6570-6576. https://doi.org/10.35940/ijeat.A1829.109119.
- Ally, M. (2008).Foundations of educational theory for online learning.In T. Anderson (Ed.).The theory and practice of online learning (pp.15-44).Athabasca, AB: Athabasca University Press. Retrieved from: https://tinyurl.com/24m7ach7
- Alsaadi, A. H., & Bamasoud, D. M. (2021). Blockchain technology in education system. International Journal of Advanced Computer Science and Applications, 12(5). https://doi.org/10.14569/IJACSA.2021.0120585.
- Arishi, A. et al., (2024). Cybersecurity awareness in schools: A systematic review of practices, challenges, and target audiences. International Journal of Advanced Computer Science and Applications, 15(12), 467.
- Azhagiri, M., et al. (2015). Intrusion detection and prevention system: Technologies and challenges. International Journal of Applied Engineering Research, 10(87), 1.Retrieved from: https://tinyurl.com/mrya8zak
- Bada, M., et al., (2015). Cyber security awareness campaigns: Why do they fail to change behaviour? In Proceedings of the International Conference on Cyber Security for Sustainable Society. Retrieved from:https://tinyurl.com/3txdp5ss
- Barlet, G., (2024, July 18). K-12 Cybersecurity: Why federal-education partnerships are critical for cybersecurity. Illumio. Retrieved from:https://tinyurl.com/43z947na
- Chin, K., (2024, November 18). How colleges & universities can prevent data breaches. Retrieved from: https://tinyurl.com/3yjft9xu
- CISA. (n.d.). Educational institutions. Cybersecurity and Infrastructure Security Agency. https://www.cisa.gov/audiences/educational-institutions
- DATUREX GmbH., (2024, August 7). Data protection in education: Protecting student and teacher data. Privacy. Retrieved from:https://tinyurl.com/tttync87
- DiMaggio, P., &Hargittai, E., (2001). From the “digital divide” to “digital inequality”: Studying internet use as penetration increases. Princeton University, 1–39, retrieved from:https://tinyurl.com/mj95re2n
- Hilbert, M. (2015). Digital Divide(s). In The International Encyclopedia of Digital Communication and Society. (pp. 1-9). John Wiley & Sons, Inc. https://doi.org/10.1002/9781118767771.wbiedcs012
- Igbokwe, I. C. (2024). Cyber security in the era of digitalization: Implications for educational management. UNIZIK Journal of Educational Research and Policy Studies, 6(2), 71-77. https://tinyurl.com/3bpz8a7d
- James, S. (2025, February 14). Digital transformation in education. Education Walkthrough. https://educationwalkthrough.com/digital-transformation-in-education/
- Jawaid, S. A., (2023).Cybersecurity threats to educational institutes: A growing concern for the new era of cybersecurity. International Journal of Data Science and Big Data Analytics, 2(2), 11-17. https://doi.org/10.51483/IJDSBDA.2.2.2022.11-17
- Jelen, S., (2024, August 8). Education sector common breaches and cyber threats.Retrieved from: https://tinyurl.com/46a4uncb
- Khader, M., et al., (2021).Cybersecurity Awareness Framework for Academia.Information, 12(10), 417, pp. 1-2. Retrieved from:https://doi.org/10.3390/info12100417
- Kifaru, F., Kavuta, K., &Semlambo, A. A., (2023). Assessment of the impacts of cyber security on student information management systems: A case of Ruaha Catholic University. The Journal of Information Technology and Innovation, 3(1).Retrieved from:https://doi.org/10.59645/tji.v3i1.127.
- Kruhlov, V., et al., (2019).Public-private partnership in cybersecurity.Conference Paper. Retrieved from:https://tinyurl.com/2snertm2
- Liotta, L. A., (2023). Digitalization and social inclusion: Bridging the digital divide in underprivileged communities. Global International Journal of Innovative Research, 1(1), 7-14. Retrieved from:https://doi.org/10.59613/global.v1i1.2
- Matsieli, M., &Mutula, S., (2024). COVID-19 and digital transformation in higher education institutions: Towards inclusive and equitable access to quality education. Education Sciences, 14(8), 819.Retrieved from: https://doi.org/10.3390/educsci14080819
- Mouheb, D., et al., (2019). Cybersecurity curriculum design: A survey. In Transactions on Edutainment XV (Lecture Notes in Computer Science). https://doi.org/10.1007/978-3-662-59351-6_9
- Okafor, U. O., et al. (n.d.).Impact of digital divide on learning. Federal College of Education (Technical) Umunze. https://www.fcetumunze.edu.ng/publications
- OECD. (2019). The Future of Education and Skills: Education 2030. OECD Publishing, Retreived from: https://tinyurl.com/4n9zmftv
- OECD. (2021). OECD digital education outlook 2021: Pushing the frontiers with artificial intelligence, blockchain, and robots. OECD Publishing. retreivedfrom:https://doi.org/10.1787/589b283f-en
- Rohman, H., et al. (2022).Collaboration of ministries/institutions and the private sector in handling cyber threats through the establishment of Computer Security Incident Response Team (CSIRT).Technium Social Sciences Journal, 38, 87-102. Retrieved from:https://www.techniumscience.com
- Selwyn, N. (2016).Education and Technology: Key Issues and Debates. Bloomsbury Publishing.
- Smith, R. F., (2023, August 29). The digital divide in education: Navigating learning inequities. Retrieved from:https://tinyurl.com/3mpur7z7
- Sood, K., et al. (Eds.). (2022). Blockchain technology in corporate governance: Transforming business and industries. Wiley.
- Tahmasebi, F. (2023). The digital divide: A qualitative study of technology access in rural communities. AI and Tech in Behavioral and Social Sciences, 1(2), Serial Number 2. https://doi.org/10.61838/kman.aitech.1.2.6
- Ucar, A., (2024, June 13). The critical importance of cybersecurity awareness training.LinkedIn, retreived from: https://tinyurl.com/2bnktk2h
- UNESCO. (2020). Education: From disruption to recovery. United Nations Educational, Scientific and Cultural Organization.Retrieved from :https://tinyurl.com/3fe2jkxf
- UNESCO. (2022). Minding the data: Protecting learners' privacy and security. https://doi.org/10.54675/NNAA4843. ISBN 978-92-3-100525-1.
- UNESCO. (2023). Global Education Monitoring Report 2023: Technology in education – A tool on whose terms? Paris, UNESCO. https://doi.org/10.54676/UZQV8501
- Uzelac, A., &Cvjetièanin, B. (Eds.). (2008). Digital culture: The changing dynamics. Institute for International Relations. UNESCO-BRESCE.
- Van Dijk, J. A. G. M., (n.d.).Digital divide: Impact of access (p. 1). University of Twente, Netherlands. Retrieved from:https://tinyurl.com/2v6cvmhj
- Walsh, C., et al., (2020). A public-private partnership to transform online education through high levels of academic student support. Australasian Journal of Educational Technology, 36(5), 30-45. https://doi.org/10.14742/ajet.6107
- Yankson, B., et al. (2024). The role of industry-academia partnerships can play in cybersecurity: Exploring collaborative approaches to address cybercrime. International Conference on Cyber Warfare and Security, 19(1), 26-33. https://doi.org/10.34190/iccws.19.1.2169.
- Williamson, J., & Curran, K., (2021).The role of multi-factor authentication for modern day security.Semiconductor Science and Information Devices, 3(1), 16.Retrieved from:https://doi.org/10.30564/ssid.v3i1.3152
- Younis, M., & Al-Gharib, S. (2021). The digital divide in higher education: A socio-cultural study from an educational perspective on students of the Faculty of Education at Tanta University. Journal of Scientific Research in Education, 22(3), 30. https://doi.org/10.21608/jsre.2021.59542.1258. [translated from Arabic]
- Younus, M., et al, (2024). Public-private collaboration to overcome the digital divide in digital transformation of government. Digital Zone Jurnal Teknologi Informasi dan Komunikasi, 15(1). https://doi.org/10.31849/digitalzone.v15i1.17027
- Younus, Z. S., &Alanezi, M., (2023). A survey on network security monitoring: Tools and functionalities. Mustansiriyah Journal of Pure and Applied Sciences, 1(2), 60.Retrieved from:https://doi.org/10.47831/mjpas.v1i2.33
التنزيلات
المؤلفات المشابهة
- Driss Abbadi, Morocco's cybersecurity strategy between challenges and aspirations , International Journal of Information & Digital Security: مجلد 2 عدد 1 (2024): International Journal of Information & Digital Security
- Nabih Abdelmajid, The Necessity of Cybersecurity for Community Safety The Proposal of the Safe Family Program for Educating the Gulf Arab Community on Information Security for Both Students and Parents , International Journal of Information & Digital Security: مجلد 1 عدد 1 (2023): International Journal of Information & Digital Security
- Firas Habbal, Impact of Information Security on National Digital Investment , International Journal of Information & Digital Security: مجلد 1 عدد 1 (2023): International Journal of Information & Digital Security
- Driss Abbadi , Cyber Threats and Risk Mitigation Strategies for Cloud Systems and the Internet of Things , International Journal of Information & Digital Security: مجلد 3 عدد 2 (2025): International Journal of Information & Digital Security
- Saher Hassan, Mohamed Abdallatif, Mahmoud Atia, The Role of Cryptography in Securing Blockchain Networks , International Journal of Information & Digital Security: مجلد 3 عدد 1 (2025): International Journal of Information & Digital Security
- Nasser Jarallah Al-Ghamdi, Mousa Al-Akhras, Fuad Alhosban, Forensic Analysis of Health and Fitness Applications on Android , International Journal of Information & Digital Security: مجلد 2 عدد 1 (2024): International Journal of Information & Digital Security
- Wael Badawy, Protocols, Technologies, and Global Deployment Challenges for Quantum Key Distribution , International Journal of Information & Digital Security: مجلد 3 عدد 1 (2025): International Journal of Information & Digital Security
يمكنك أيضاً إبدأ بحثاً متقدماً عن المشابهات لهذا المؤلَّف.
الأعمال الأكثر قراءة لنفس المؤلف/المؤلفين
- Driss Abbadi, Morocco's cybersecurity strategy between challenges and aspirations , International Journal of Information & Digital Security: مجلد 2 عدد 1 (2024): International Journal of Information & Digital Security
- Driss Abbadi , Cyber Threats and Risk Mitigation Strategies for Cloud Systems and the Internet of Things , International Journal of Information & Digital Security: مجلد 3 عدد 2 (2025): International Journal of Information & Digital Security