ijact-book-coverT

A Systematic Review of Artificial Intelligence and Cyber Security in Higher Education Space

© 2024 by IJACT

Volume 2 Issue 1

Year of Publication : 2024

Author : Anubhav Seth

:10.56472/25838628/IJACT-V2I1P104

Citation :

Anubhav Seth, 2024. "A Systematic Review of Artificial Intelligence and Cyber Security in Higher Education Space" ESP International Journal of Advancements in Computational Technology (ESP-IJACT)  Volume 2, Issue 1: 26-31.

Abstract :

The essential need for security of information in higher education will remain to expand. Professional details offence has happened before and there is a possibility to occur again without correct management of risk. This research survey utilizes the concepts of Comprehensive Literature Review (CLR) approach to integrate researches within AI and cyber security issue by analyzing the already available literature well known vulnerabilities, actors of threat, events of threat and assets in higher education institution. This review paper combines the issued publication studies for the past thirteen years and the key point to extend our investigation of critical issues of cyber security. The basic detection area is the research of empirical on AI and cyber security factors of risk in HEI and there is a big space in the literature. Due to this problem, our investigation detects a big agreement level based on the cyber security problems among the reviewed sources. This research paper integrates the overall assets of critical mission, events of threats, suggested a common threat approach, and concludes the normal vulnerabilities of AI and cyber security. The result of this paper provides the input for security practitioners in HEI, and this research consists of many ways for further process. It may provide the details to start security related researches for the developer.

References :

[1] Ncube, C.; Garrison, C. Lessons learned from university data breaches. Palmetto Bus. Econ. Rev. 2010, 13, 27–37.

[2] Beaudin, K. The Legal Implications of Storing Student Data: Preparing for and Responding to Data Breaches. New Dir. Institutional Res. 2017, 2016, 37–48.

[3] Beaudin, K. College and university data breaches: Regulating higher education cybersecurity under state and federal law. J. Coll.Univ. Law 2015, 41, 657–693.

[4] Hussain, H.S.; Din, R.; Khidzir, N.Z.; Daud, K.A.M.; Ahmad, S. Risk and Threat via Online Social Network among Academia at Higher Education. J. Physics: Conf. Ser. 2018, 1018, 012008.

[5] Liu, C.W.; Huang, P.; Lucas, H.C. Centralized IT Decision Making and Cybersecurity Breaches: Evidence from U.S. Higher Education Institutions. SSRN Scholarly Paper ID 2850178; Social Science Research Network: Rochester, NY, USA, 2019.

[6] Liu, C.W.; Huang, P.; Lucas, H. IT Centralization, Security Outsourcing, and Cybersecurity Breaches: Evidence from the US Higher Education 2017. Available online: http://penghuang.com/WordPress/wp-content/uploads/2021/01/IT-Centralization- Security-Outsourcing-and-Cybersecurity-Breach.pdf (accessed on 28 January 2022).

[7] Dar, W.M. Cyber Security Challenges on Academic Institutions and Need For Security Framework Towards Institutional Sustainability Growth and Development. i-Manag. J. Inf. Technol. 2015, 5, 1.

[8] Onwuegbuzie, A.J.; Frels, R. Seven Steps to a Comprehensive Literature Review: A Multimodal and Cultural Approach; Sage: Thousand Oaks, CA, USA, 2016; pp. 48–64.

[9] Ballard, P.J. Measuring Performance Excellence: Key Performance Indicators for Institutions Accepted into the Academic Quality Improvement Program (AQIP). PhD Thesis, Western Michigan University, Kalamazoo, MI, USA, 2013.

[10] Asif, M.; Searcy, C. A composite index for measuring performance in higher education institutions. Int. J. Qual. Reliab. Manag. 2014.Available online: https://www.emerald.com/insight/content/doi/10.1108/IJQRM-02-2013-0023/full/html?fullSc=1&fullSc=1(accessed on 28 January 2021).

[11] Itradat, A.; Sultan, S.; Al-Junaidi, M.; Qaffaf, R.; Mashal, F.; Daas, F. Developing an ISO27001 Information Security Management System for an Educational Institute: Hashemite University as a Case Study. Jordan J. Mech. Ind. Eng. 2014, 8, 102–118.

[12] Mello, S. Data Breaches in Higher Education Institutions. In Honors Theses and Capstones; University of New Hampshire: Durham,NH, USA, 2018.

[13] Grama, J. Just in Time Research: Data Breaches in Higher Education. EDUCAUSE 2014. Available online: https://library.educause.edu/~/media/files/library/2014/5/ecp1402-pdf.pdf (accessed on 28 January 2021).

[14] Group, C. 2019 Cyberthreat Defense Report. White Paper, 2019. Library Catalog. Available online: https://www.imperva.com/resources/reports/CyberEdge-2019-CDR-Report-v1.1.pdf (accessed on 28 January 2021).

[15] Wangen, G.; Brodin, E.Ø.; Skari, B.H.; Berglind, C. Unrecorded Security Incidents at NTNU 2018 (Mørketallsundersøkelsen vedNTNU 2018). Bachelor’s Thesis, NTNU Open Gjøvik, Trondheim, Sweden, 2019.

[16] Verizon. 2017 Data Breach Investigations Report. White Paper, 2017. Library Catalog. Available online: https://www.ictsecuritymagazine.com/wp-content/uploads/2017-Data-Breach-Investigations-Report.pdf (accessed on 28 January 2021).

[17] Verizon. 2018 Data Breach Investigations Report. White Paper, 2018. Library Catalog. Available online: https://admin.govexec.com/media/vz_assets/2018_dbir_public_sector_final.pdf (accessed on 28 January 2021).

[18] Verizon. 2019 Data Breach Investigations Report. White Paper, 2019. Library Catalog. Available online: https://www.key4biz.it/wp-content/uploads/2019/05/2019-data-breach-investigations-report.pdf (accessed on 28 January 2021).

[19] Verizon. 2020 Data Breach Investigations Report. White Paper, 2020. Library Catalog. Available online: https://itb.dk/wpcontent/uploads/2020/07/verizon-data-breach-investigations-report-2020.pdf (accessed on 28 January 2021).

[20] Hackmageddon. 2018: A Year of Cyber Attacks, 2019. Library Catalog. Available online: www.hackmageddon.com (accessed on 28 January 2021).

[21] Hackmageddon. 2019 Cyber Attacks Statistics, 2020. Library Catalog. Available online: www.hackmageddon.com (accessed on 28 January 2021).

[22] James, J.G.; Dominic, A.; Paluzzi, S.A.K. Pass or Fail? Data Privacy and Cybersecurity Risks in Higher Education; White Paper;McDonald Hopkins: Chicago, IL, USA, 2016.

[23] James, J.G.; Dominic, A.; Paluzzi, S.A.K. Pass or Fail? Data Privacy and Cybersecurity Risks in Higher Education; White Paper;McDonald Hopkins: Chicago, IL, USA, 2016.

[24] Wangen, G. The Role of Malware in Reported Cyber Espionage: A Review of the Impact and Mechanism. Information 2015,6, 183–211.

[25] Potter, B. Practical Threat Modeling. Login 2016, 41, 59–63. Available online: https://www.usenix.org/system/files/login/articles/login_fall16_11_potter.pdf (accessed on 28 January 2021).

Keywords :

AI, Cyber Security, Review Vulnerability, Threat, Assert, Risk, Review, Higher Education Institution.