Cyber security in Developing World towards Excellency by 2026 – Opportunities, Policies

Authors

  • N Satheesh Kumar Dept. Of Computing, Adama Science and Technology, Adama, Ethiopia
  • Mihret Z Dept. Of Computing, Adama Science and Technology, Adama, Ethiopia

Keywords:

Cyberspace, ICT, Stakeholders, Cyber security Model 2026

Abstract

Information and communication technology (ICT) is playing a major role in the development of socio economic related issues. Some countries in the globe have taken advantage with the effectiveness of ICT, Cyberspace and are in the process of transforming their economies into knowledge and information based economies. These benefits are being challenged by the increasing cyber threats where there is no global conscious on how to regulate cyberspace even through several countries having their own cyber security policies but without proper measures. The current setup of the internet enables developing countries to work together as a global village. The goal of this paper are to help policy makers, businesses, and societal organizations to better prepare for the technological changes ahead and enable all stakeholders to consider how present day policy choices might influence future outcome. In our paper we propose cyber security 2026 model along with methodology which concentrate on the several components to form a framework for trust and online security.

References

. James Manyika, Michael Chui, Jacques Bughin, “Disruptive Technologies: Advances that will transform life, Business and Global Economy, McKinsey”, Global Institute, May 2013.

. R. E. Crossler, A. C. Johnston, P. B. Lowry, Q. Hu, M. Warkentin, and R. Baskerville, “Future directions for behavioral information security research,” Computers & Security, vol. 32, pp. 90–101, Feb. 2013.

. Greenwald G, MacAskill E., “Boundless Informant: the NSA’s secret tool to track global surveillance data”, The Guardian. 2013 Jun 11;11.

. Cavely, M.D.(2014) Breaking the Cyber Security Dilemma: Aligning Security needs nad Removing Vulnerabilities( Springer Science)

. Laukka, M(2010). "Criteria for privacy support system". Proceedings of the 5th Nordic Workshop on secure IT systems, Raykjavik, Iceland, Oct 12-13.

. DeGusta, Michael. "Are smart phones spreading faster than any technology in human history." Massachusetts Institute of Technology Review (2012). APA

. Manyika J, Bughin J, Lund S, Nottebohm O, Poulter D, Jauch S, Ramaswamy S., “Global flows in a digital age: How trade, finance, people, and data connect the world economy”. McKinsey Global Institute; 2014.

. S.Jayasri, D.Karthika, "Microcontroller Based Traffic and Road Condition Monitoring Alert System Using Internet of Things", International Journal of Computer Sciences and Engineering, Vol.4, Issue.4, pp.272-279, 2016.

. United States. “White House Office, and Barack Obama. International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked Worldr”. White House, 2011. APA

. Gwartney, James, Robert Lawson, and Seth Norton. “Economic freedom of the world 2008 annual report”. The Fraser Institute, 2008. APA

. Organisation for Economic Co-operation and Development (OECD). Better skills, better jobs, better lives: a strategic approach to skills policies. OECD, 2012. APA

. The UK Cyber Security Strategy, 2011, https://www.gov.uk/government/uploads/system/uploads/ attachment_data/file/60961/uk-cyber-security-agency-prism-outline-lyrics#lyric

Downloads

Published

2025-11-11

How to Cite

[1]
N. Satheesh Kumar and Z. Mihret, “Cyber security in Developing World towards Excellency by 2026 – Opportunities, Policies”, Int. J. Comp. Sci. Eng., vol. 5, no. 6, pp. 42–48, Nov. 2025.

Issue

Section

Research Article