Open Science Research Excellence

Open Science Index

Commenced in January 2007 Frequency: Monthly Edition: International Publications Count: 30526

Select areas to restrict search in scientific publication database:
Cybersecurity Protection Structures: The Case of Lesotho
The Internet brings increasing use of Information and Communications Technology (ICT) services and facilities. Consequently, new computing paradigms emerge to provide services over the Internet. Although there are several benefits stemming from these services, they pose several risks inherited from the Internet. For example, cybercrime, identity theft, malware etc. To thwart these risks, this paper proposes a holistic approach. This approach involves multidisciplinary interactions. The paper proposes a top-down and bottom-up approach to deal with cyber security concerns in developing countries. These concerns range from regulatory and legislative areas, cyber awareness, research and development, technical dimensions etc. The main focus areas are highlighted and a cybersecurity model solution is proposed. The paper concludes by combining all relevant solutions into a proposed cybersecurity model to assist developing countries in enhancing a cyber-safe environment to instill and promote a culture of cybersecurity.
Digital Object Identifier (DOI):


[1] O. Szumski, “Cybersecurity best practices among Polish students,” Procedia Comput. Sci., vol. 126, pp. 1271–1280, Jan. 2018W.-K. Chen, Linear Networks and Systems (Book style). Belmont, CA: Wadsworth, 1993, pp. 123–135.
[2] “Difference Between Cyber Security and Computer Science.” (Online). Available: (Accessed: 02-Feb-2019). B. Smith, “An approach to graphs of linear forms (Unpublished work style),” unpublished.
[3] M. Bada and A. Sasse, “Cyber security awareness campaigns: Why do they fail to change behaviour?,” 2014.
[4] “Lesotho Bureau of Statistics.” (Online). Available: (Accessed: 15-Feb-2019).
[5] “Lesotho cyber-wellness profile.” (Online). Available: PROFILE.pdf. (Accessed: 15-Feb-2019).
[6] R. Chandarman and B. Van Niekerk, “Students’ cybersecurity awareness at a private tertiary educational institution,” Afr. J. Inf. Commun., vol. 2017, no. 20, pp. 133–155, 2017.
[7] M. J. Z. de Barros and H. Lazarek, “A Cyber Safety Model for Schools in Mozambique,” 2018.
[8] E. Sutherland, “Digital Privacy in Africa: Cybersecurity, Data Protection & Surveillance,” Social Science Research Network, Rochester, NY, SSRN Scholarly Paper ID 3201310, Jun. 2018.
[9] “Investigating the efficacy of cybersecurity awareness training programs -ProQuest.” (Online). Available: (Accessed: 15-Feb-2019).
[10] S. Kouttis, “Improving security knowledge, skills and safety,” Comput. Fraud Secur., vol. 2016, no. 4, pp. 12–14, Apr. 2016.
[11] N. Ben-Asher and C. Gonzalez, “Effects of cyber security knowledge on attack detection,” Comput. Hum. Behav., vol. 48, pp. 51–61, Jul. 2015.
[12] C. McIntosh, “Cybersecurity: who will provide protection?,” Comput. Fraud Secur., vol. 2015, no. 12, pp. 19–20, Dec. 2015.
[13] J. Srinivas, A. K. Das, and N. Kumar, “Government regulations in cyber security: Framework, standards and recommendations,” Future Gener. Comput. Syst., Oct. 2018.
[14] “ICT Research,” (Online). Available: (Accessed: 21-Feb-2019).
[15] “Lack of cyber security awareness cause of persistent online scams – Minister.” (Online). Available: (Accessed: 24-Feb-2019).
[16] S. Kabanda, M. Tanner, and C. Kent, “Exploring SME cybersecurity practices in developing countries,” J. Organ. Comput. Electron. Commer., vol. 28, no. 3, pp. 269–282, 2018.
[17] “Lesotho Internet Users.” (Online). Available: (Accessed: 24-Feb-2019).
[18] “Cyber security under spotlight,” Lesotho Times, 07-Apr-2017. (Online). Available: (Accessed: 24-Feb-2019).
[19] J. C. Jansen van Vuuren, M. Grobler, L. Leenen, and J. Phahlamohlaka, “Proposed Model for a Cybersecurity Centre of Innovation for South Africa,” 2014, pp. 293–306.
[20] “Africa CyberSecurity Report 2016.” (Online). Available: (Accessed: 24-Feb-2019).
[21] B. Pretorius and B. van Niekerk, “Cybersecurity for ICS/SCADA: A South African Perspective,” Int. J. Cyber Warf. Terror. IJCWT, vol. 6, no. 3, pp. 1–16, Jul. 2016.
[22] “What Role Should ISPs Play in Cybersecurity?,” Dark Reading. (Online). Available: (Accessed: 24-Feb-2019).
[23] L. P. Muller, “Cyber Security Capacity Building in Developing Countries,” p. 4, 2015.
[24] R. Sabillon, V. Cavaller, and J. Cano, “National Cyber Security Strategies: Global Trends in Cyberspace,” vol. 5, no. 5, p. 15, 2016.
[25] M. D. Mahlobo, “National Cybersecurity Policy Framework,” p. 30, 2015.
[26] G. Killcrece. “Steps for Creating National CSIRTs”. Coordination Center, 2018 (Online). (Available: (Accessed: 22-Feb-2019).
Vol:14 No:07 2020Vol:14 No:06 2020Vol:14 No:05 2020Vol:14 No:04 2020Vol:14 No:03 2020Vol:14 No:02 2020Vol:14 No:01 2020
Vol:13 No:12 2019Vol:13 No:11 2019Vol:13 No:10 2019Vol:13 No:09 2019Vol:13 No:08 2019Vol:13 No:07 2019Vol:13 No:06 2019Vol:13 No:05 2019Vol:13 No:04 2019Vol:13 No:03 2019Vol:13 No:02 2019Vol:13 No:01 2019
Vol:12 No:12 2018Vol:12 No:11 2018Vol:12 No:10 2018Vol:12 No:09 2018Vol:12 No:08 2018Vol:12 No:07 2018Vol:12 No:06 2018Vol:12 No:05 2018Vol:12 No:04 2018Vol:12 No:03 2018Vol:12 No:02 2018Vol:12 No:01 2018
Vol:11 No:12 2017Vol:11 No:11 2017Vol:11 No:10 2017Vol:11 No:09 2017Vol:11 No:08 2017Vol:11 No:07 2017Vol:11 No:06 2017Vol:11 No:05 2017Vol:11 No:04 2017Vol:11 No:03 2017Vol:11 No:02 2017Vol:11 No:01 2017
Vol:10 No:12 2016Vol:10 No:11 2016Vol:10 No:10 2016Vol:10 No:09 2016Vol:10 No:08 2016Vol:10 No:07 2016Vol:10 No:06 2016Vol:10 No:05 2016Vol:10 No:04 2016Vol:10 No:03 2016Vol:10 No:02 2016Vol:10 No:01 2016
Vol:9 No:12 2015Vol:9 No:11 2015Vol:9 No:10 2015Vol:9 No:09 2015Vol:9 No:08 2015Vol:9 No:07 2015Vol:9 No:06 2015Vol:9 No:05 2015Vol:9 No:04 2015Vol:9 No:03 2015Vol:9 No:02 2015Vol:9 No:01 2015
Vol:8 No:12 2014Vol:8 No:11 2014Vol:8 No:10 2014Vol:8 No:09 2014Vol:8 No:08 2014Vol:8 No:07 2014Vol:8 No:06 2014Vol:8 No:05 2014Vol:8 No:04 2014Vol:8 No:03 2014Vol:8 No:02 2014Vol:8 No:01 2014
Vol:7 No:12 2013Vol:7 No:11 2013Vol:7 No:10 2013Vol:7 No:09 2013Vol:7 No:08 2013Vol:7 No:07 2013Vol:7 No:06 2013Vol:7 No:05 2013Vol:7 No:04 2013Vol:7 No:03 2013Vol:7 No:02 2013Vol:7 No:01 2013
Vol:6 No:12 2012Vol:6 No:11 2012Vol:6 No:10 2012Vol:6 No:09 2012Vol:6 No:08 2012Vol:6 No:07 2012Vol:6 No:06 2012Vol:6 No:05 2012Vol:6 No:04 2012Vol:6 No:03 2012Vol:6 No:02 2012Vol:6 No:01 2012
Vol:5 No:12 2011Vol:5 No:11 2011Vol:5 No:10 2011Vol:5 No:09 2011Vol:5 No:08 2011Vol:5 No:07 2011Vol:5 No:06 2011Vol:5 No:05 2011Vol:5 No:04 2011Vol:5 No:03 2011Vol:5 No:02 2011Vol:5 No:01 2011
Vol:4 No:12 2010Vol:4 No:11 2010Vol:4 No:10 2010Vol:4 No:09 2010Vol:4 No:08 2010Vol:4 No:07 2010Vol:4 No:06 2010Vol:4 No:05 2010Vol:4 No:04 2010Vol:4 No:03 2010Vol:4 No:02 2010Vol:4 No:01 2010
Vol:3 No:12 2009Vol:3 No:11 2009Vol:3 No:10 2009Vol:3 No:09 2009Vol:3 No:08 2009Vol:3 No:07 2009Vol:3 No:06 2009Vol:3 No:05 2009Vol:3 No:04 2009Vol:3 No:03 2009Vol:3 No:02 2009Vol:3 No:01 2009
Vol:2 No:12 2008Vol:2 No:11 2008Vol:2 No:10 2008Vol:2 No:09 2008Vol:2 No:08 2008Vol:2 No:07 2008Vol:2 No:06 2008Vol:2 No:05 2008Vol:2 No:04 2008Vol:2 No:03 2008Vol:2 No:02 2008Vol:2 No:01 2008
Vol:1 No:12 2007Vol:1 No:11 2007Vol:1 No:10 2007Vol:1 No:09 2007Vol:1 No:08 2007Vol:1 No:07 2007Vol:1 No:06 2007Vol:1 No:05 2007Vol:1 No:04 2007Vol:1 No:03 2007Vol:1 No:02 2007Vol:1 No:01 2007