DISRUPTIVE TECHNOLOGIES FOR EDUCATIONAL INNOVATION IN DELTA STATE AND ITS CYBER SECURITY IMPLICATIONS: A POST COVID-19 ASSESSMENT

  • Abugor Ejaita Okpako
  • Nkechi Isitor
  • Deborah Voke Ojie
  • Destiny Ukadike
Keywords: Cyber security, Covid 19, Disruptive Technology, Education, E-learning

Abstract

Technology is everywhere and it’s changing the way things work, hence it is disruptive depending on its application and context. Disruptive technology introduces new markets and modifies existing ones, providing end users with better access, convenience, empowerment, choice, and value as well as competing with established models and practically transforming products and services. The COVID-19 pandemic necessitated a rapid shift to remote learning and the adoption of disruptive technologies in educational institutions worldwide, including Nigeria. Despite this, there is limited evidence investigating how different disruptive technologies and configurations associate with cyber security within the educational sector. This research work examines the association of disruptive technology and cyber security implications in the Delta State educational system during the post COVID 19 pandemic period. A cross sectional approach was used for data collection through questionnaires where 55 responses out of 80 respondents from some selected schools in Delta State were used. The results confirm some cyber threats on using disruptive technology in e-learning as phishing and identity theft. The respondent’s level of online satisfaction, cyber security awareness and performance was significantly associated with various independent variables such as e-learning platforms, online interaction, and privacy concerns. An understanding of these relationships will help educators and other stakeholders to prioritize legislation and regulations that will address such developments. The aim should not to over-regulate and consequently strangle them, but to envisage change, prepare for it, and set up appropriate regulatory frameworks to ensure societal balance.

References

Adanikin, Adeoye, Itunuoluwa Adanikin, Ayobami &Ariyo. (2020). COVID-19 and E-Learning: Nigeria Tertiary Education System Experience. 5. 28-31.

Adesina, R, & Ingirige, B (2019). Dismantling barriers to effective disaster management in Nigeria. 14th International Postraduate research conference 2019: Contemporary and Future Directions in the Built Environment.

Akazue I. Maureen, Geofrey A. Nwokolo, Okpako A. Ejaita, Ogeh Emmanuel Ufiofio(2023). Machine Learning Survival Analysis Model for Diabetes Mellitus. International Journal of Innovative Science and Research Technology. Vol. 8(4).

Bukhari, B. (2018). Effects of Security Protocols on Cybercrime in Ahmadu Bello University, Zaria [Academic Masters, University of KwaZulu Natal, South Africa].

Demers, G, Harrington, S, Cianci, M., & Green ,N.(2017). Protecting Colleges & Universities Against Losses in a Virtual World.. The John Marshall Journal of Information Technology & Privacy Law., 33(2),3

De Paoli, S., Johnstone, J., Coull, N., Ferguson, I., Sinclair, G., Tomkins, P., Brown, M., & Martin, R. (2020). A Qualitative Exploratory Study of the Knowledge, Forensic, and Legal Challenges from the Perspective of Police Cybercrime Specialists. Policing: A Journal of Policy and Practice.

Egbunike, N(2019). Nigerian Students face cybercrime charges for criticising their university online. https://globalvoices.org/2019/07/11/nigerian-students-face-cybercrime-charges-for-criticising-their-university-online/

G.G James, A.E Okpako, C. Ituma & J.E. Asuquo.(2022). Development of hybrid intelligent based information retrieval technique. Int J. Comput. Appl, 184(2022), 13. https://doi.org/10.5120/ijca2022922401

Hedge and Hayword (2004). The Status Information and Communication Technology (ICT) in Secondary Schools in Ondo State. (unpublished M.Ed. Thesis.).

Howard, W.R.(2009), "Schneier on Security",Kybernetes, Vol. 38 No. 9, pp. 16361637. https://doi.org/10.1108/03684920910991603

Hunton, P. (2011). A rigorous approach to formalising the technical investigation stages of cybercrime and criminality within a UK law enforcement environment. Digital investigation, 7(3-4), 105-113.

Krejcie, R.V., & Morgan, D.W., (1970). Determining Sample Size for Research Activities. Educational and Psychological Measurement.

Krönke, Matthias. (2020). Africa's_digital_divide_and_the_promise_of_e-learning/citations https://www.researchgate.net/publication/342165040

Li, F., Li, Z., Han, W., Wu, T., Chen, L., Guo, Y., & Chen, J. (2018). Cyberspace-oriented access control: A cyberspace characteristics-based model and its policies. IEEE Internet of Things Journal, 6(2), 1471-1483.

Mary , L.(2016). IT Security and Privacy

Mojeed, M.(2020). How Nigeria University Launched Massive Cyber attacks Against Premium Times. https://allafric.COM/STORIES/202007280025.html

Morgan, S. (2020). Cybercrime To Cost The World $10.5 Trillion Annually By 2025 Cybercrime Magazine. In. Lucky Ojobo Ogheneruemu & Okpako Abugor Ejaita(2023). An evaluation of smartphone usage and social interaction of Delta State University Students, Abraka. Journal of Information Engineering and Applications. Vol. 13(1)

Ojobo, O. L, Okpako ,A.E, Ivwighren ,H.E(2022). Covid-19 Pandemic Misinformation and Disinformation on Social Media: A study of Abraka Metropolis. Innovations, Number 70

Okpako A.E, Oghoodi D & Ako, R.E (2020). The triadic interplay of culture, globalization and cybercrime trajectory in Nigeria through a sociological lens. Researchjournali’s Journal of Computer Science.(5).4

Okpako Abugor Ejaita, Bridget O. Malasowe, F.O Mormah, & Stella C. Chiemeke (2023). Analysis of emerging Cybercrime Entrepreneurship and its implication in Nigeria. Covenant Journal of Entrepreneurship. Vol. 7(1)

Osuji Catherine U. Nwoke, Bright Ihechukwu (2019), Pre-service teachers’ perception towards role of e-learning in science education in teacher training institutions | International Journal of Science and Technology . Vol. 8(1). 40-49,2019

Sanoo, J. (2018). Cyber Security Tutorials. Retrieved 26/06/2020 from https://www.javatpoint.com/cyber-security-introduction

Soomro , T.R, & Hussain , M. (2019). Social Media-related cybercrimes and techniques for their prevention. Applied Computer Systems, 24(1), 9-17

Tabassum, L and Baker, S. (2020). Cybersecurity and Safety Measures. International Research Journal of Modernization in Engineering Technology and Science. Vol 02, Issue:06. June2020. Available at SSRN: https://ssrn.com/abstract=3641388

Taylor, L. (2017). What is data justice? The case for connecting digital rights and freedoms globally. Big Data & Society, 4(2), 2053951717736335.

U-EENI, (2022). E-learning as a disruptive innovation. U-EENI. Retrieved from http://www.u-eeni.edu.es.com

Published
2024-11-17
How to Cite
Okpako A. E., IsitorN., OjieD. V., & UkadikeD. (2024). DISRUPTIVE TECHNOLOGIES FOR EDUCATIONAL INNOVATION IN DELTA STATE AND ITS CYBER SECURITY IMPLICATIONS: A POST COVID-19 ASSESSMENT. FUDMA JOURNAL OF SCIENCES, 8(6), 36 - 43. https://doi.org/10.33003/fjs-2024-0806-2906