Back to top

Exploring the views and perceptions of cybersecurity among South African military officers

Cyberspace is expanding at a rapid pace and extends its reach into the functioning of society. The pervasive nature of cyberthreats poses a significant security challenge to governments, businesses, organisations, and individual users. The contribution this study makes to the field of cybersecurity lies in its methodological approach to focusing on South African military officers, which is a hitherto under-researched subject in the South African domain. This study locates itself within the securitisation theory, which suggests that the military is a key tool in orchestrating a “security move”. This research explored perceptions of cybersecurity among South African military officers. Three sample groups were selected from institutions where South African military education, training, and development are provided. The military is often considered a unique population and is therefore frequently overlooked. The overarching aim of this study was to provide an exploration of the perceptions that govern the views of the military officer regarding cybersecurity in the South African National Defence Force. This study utilised a mixed-methods research design, which was conducted in two phases. A sequential design was also used in order to engage in the two phases of the study. Furthermore, this study utilised purposive sampling in Phase 1 of the research. Phase 1 used a qualitative approach by conducting semi-structured interviews at the South African National Defence College. Thereafter, the researcher constructed the Cybersecurity Orientation Questionnaire, which was quantitative. Cluster sampling was used for data collection in Phase 2. The researcher administered the questionnaire at two South African military education, training, and development institutions, namely the South African Military Academy and the South African National War College. In doing so, the researcher determined that cybersecurity awareness was a central factor in identifying cyberthreats and that amended security behaviour could play a role in resolving potential vulnerabilities. Furthermore, cybersecurity best practices and policy guidelines in the organisation were identified as requiring greater emphasis across units. Cultivating cybersecurity in the organisation was found to be challenged by the knowledge and experience relating to cyberspace usage. The way technology is viewed was also found to challenge prevailing efforts to develop a digital culture. The study found that a need exists for efficient technology in the organisation.

Full Name
Dr Kyle John Bester
Programme