In most developing countries, governments attempt to enforce the movement from analogue to digital for all their sectors, from public to private. These technological advancements have been noted to bring necessary and...In most developing countries, governments attempt to enforce the movement from analogue to digital for all their sectors, from public to private. These technological advancements have been noted to bring necessary and unavoidable changes to businesses and learning environments. Higher learning institutions have adopted various e-learning systems to support learning, research, and publication activities to stay competitive in global academic systems. However, most public higher learning institutions in Tanzania lag behind in the adoption of these systems. Thus, research shows a failure of these institutions in utilising the full benefit that today’s Information and Communication Technology (ICT) can offer in learning environments. Thus, this study examines factors affecting the adoption of such a system in developing countries like Tanzania, taking the Institute of Accountancy Arusha (IAA) as a case study. The study used a mixed methodology where thematic and descriptive analysis was used to analyse both qualitative and quantitative research data. The study population was 187 teaching staff, a sample size of 126 was obtained, and 157 study participants were involved in the study. The study found that factors affecting the adoption of e-learning systems in public higher learning institutions in Tanzania include lack of ICT infrastructure, lack of technical and managerial support and lack of computers and e-learning knowledge among facilitators. Thus, the study recommended investments in adequate and reliable ICT facilities, high intermate speed and bandwidth, and policies that support e-learning and training programs about e-learning knowledge and use. Also, this study recommends the use of the Multi-Factors Adoption Model (MFAM11) for the successful adoption of an e-learning system in public higher learning institutions in Tanzania.展开更多
along with the implementation of national intellectual property strategy and the construction of an innovative country, institutions of higher learning pay more and more attention to patent. By elaborating the roles o...along with the implementation of national intellectual property strategy and the construction of an innovative country, institutions of higher learning pay more and more attention to patent. By elaborating the roles of patent protection management from five aspects and sunmarizing Sichuan Agricultural University' s status quo of patent management, patent policies and patent licensing in recent years, this paper discusses four problems existing in universities ' patent protection management and proposes corresponding countermeasures.展开更多
With the deepening of China's reform and opening up, China's private higher education has got rapid development. The expanding of the scale and the updating of the educational philosophy makes the financial manageme...With the deepening of China's reform and opening up, China's private higher education has got rapid development. The expanding of the scale and the updating of the educational philosophy makes the financial management of private higher learning institutions can't meet the developing needs of them. Through summing up the current defects existed in the financial management activities of the private higher learning institutions, this paper tries to advise the private higher learning institutions to set out their efforts on financial management foundation, financing management, investment management, budget management, financial analysis and financial supervision six aspects, standardize and optimize the financial management activities to promote the healthy development of China's private higher learning institutions.展开更多
This paper adopts the research methods such as literature material method, questionnaire investigation method, expert interview method and mathematical statistics to investigate and study the conditions of fancy rope ...This paper adopts the research methods such as literature material method, questionnaire investigation method, expert interview method and mathematical statistics to investigate and study the conditions of fancy rope skipping curriculum in 22 universities in Sichuan. The research shows that the university teachers highly recognize the fancy rope skipping curriculum; construction of teaching resources should be strengthened; cultivation of the professional teaching staffs should be strengthened; in terms of teaching materials, more premium teaching materials with high pertinence and professionalism are needed; the promotion and implementation of the curriculum system of fancy rope skipping should be boosted in different steps and stages; cultivation of the professional teachers should be enlarged; related scientific research of the curriculum system of fancy rope skipping should be strengthened.展开更多
The ideological situation of the art majors in institutions, of higher learning has its own characteristics and needs educators to adopt the targeted ideological education and management measures, so as to promote the...The ideological situation of the art majors in institutions, of higher learning has its own characteristics and needs educators to adopt the targeted ideological education and management measures, so as to promote the healthy growth and comprehensive development of the art majors. In this paper, the ideological education and managemenl model for the art majors in institutions of higher learning in the new oeriod are studied, hooing to attract more scholars to focus on this tooic.展开更多
With the great changes in China's economic mechanism, the present running modes of equipment management at most institutions of higher learning are becoming less and less effective and efficient. Being fully aware...With the great changes in China's economic mechanism, the present running modes of equipment management at most institutions of higher learning are becoming less and less effective and efficient. Being fully aware of the common problems and their characteristics, this paper proposes a new running mode which aims at these problems' permanent resolution. It involves (1) Systems such as renting, competition and paid services are to be introduced to the campus, in order to effectively associate duty with interest. (2) The present managerial pattern is to be replaced by a new running network, in which all the links cooperate with as well as restrain each other. Such a mode focuses on the “two mechanisms and four patterns,”that is, to rely on the stimulative mechanism and restraint mechanism, and to enforce such patterns as centralized management and application centralized management and common application, opening to public use, and renting and borrowing. Through persistent exploration of the inner potential of the institutions, the ratio of investment and economic efficiency will accordingly be elevated.展开更多
Doubtlessly, the term "human rights" has become a world language in the 21st century. China has written "The state respects and protects human rights" into its constitution, thus opening up a new period of constit...Doubtlessly, the term "human rights" has become a world language in the 21st century. China has written "The state respects and protects human rights" into its constitution, thus opening up a new period of constitutional construction and human rights cause. This great term "human rights" does not only contain specific rights that can be put into practice but also carry dignity, equality, freedom and other value systems and moral requirements.展开更多
Education 4.0 is being authorized more and more by the design of artificial intelligence(AI)techniques.Higher education institutions(HEI)have started to utilize Internet technologies to improve the quality of the serv...Education 4.0 is being authorized more and more by the design of artificial intelligence(AI)techniques.Higher education institutions(HEI)have started to utilize Internet technologies to improve the quality of the service and boost knowledge.Due to the unavailability of information technology(IT)infrastructures,HEI is vulnerable to cyberattacks.Biometric authentication can be used to authenticate a person based on biological features such as face,fingerprint,iris,and so on.This study designs a novel search and rescue optimization with deep learning based learning authentication technique for cybersecurity in higher education institutions,named SRODLLAC technique.The proposed SRODL-LAC technique aims to authenticate the learner/student in HEI using fingerprint biometrics.Besides,the SRODLLACtechnique designs a median filtering(MF)based preprocessing approach to improving the quality of the image.In addition,the Densely Connected Networks(DenseNet-77)model is applied for the extraction of features.Moreover,search and rescue optimization(SRO)algorithm with deep neural network(DNN)model is utilized for the classification process.Lastly,template matching process is done for fingerprint identification.A wide range of simulation analyses is carried out and the results are inspected under several aspects.The experimental results reported the effective performance of the SRODL-LAC technique over the other methodologies.展开更多
With the continuous development of national‘reforms and opening-up’policy and development of economic globalization,learning and application of foreign languages are becoming increasingly important.Society needs a l...With the continuous development of national‘reforms and opening-up’policy and development of economic globalization,learning and application of foreign languages are becoming increasingly important.Society needs a large number of professional linguistic workers.Therefore,there are higher requirements for new era higher learning institutes which serve as training base for cultivating linguistic talents.Linguistic talents must possess very strong overall quality and skill to meet these requirements.In this context,this study carried out an in-depth analysis and research on translation method commonly used in German language teaching,and communicative method which is increasingly popular in recent years,to contribute to cultivation of German linguistic talents in higher learning institutes of China.展开更多
with the vigorous development of education, the requirement to the higher education, especially to the improving college students’ physical quality, should be higher and strict in the new stage. In the improvement of...with the vigorous development of education, the requirement to the higher education, especially to the improving college students’ physical quality, should be higher and strict in the new stage. In the improvement of Sunshine Sports background, the institutes of higher learning began to spread Tai Chi widely, inheriting Chinese traditional culture and in the meanwhile, to improve students’ physical quality and healthy. However, according to their cognitive level and participation of Tai Chi, the limits still wide, which need a further improvement. Thus, this article will do analysis on the cognitive level and participation of Tai Chi in the institutes of higher learning, the main target people is these students. According to the reality, through various analysis method and calibration, we investigate the cognitive level and participation of Tai Chi in the higher education learners and confirm the defects and deficiency within. From this, we can see that cognitive level is not that high, and their participation is not enough, and the positivity to it is not so active. In a word, the wide and deep spread of Tai Chi will help their physical and metal both healthy,firming a base for the future.展开更多
In different historical periods, the institutions of higher learning are endowed with dltlerent social tunctlons, wnlcn also experience some changes with the social development.The addition of cultural inheritance and...In different historical periods, the institutions of higher learning are endowed with dltlerent social tunctlons, wnlcn also experience some changes with the social development.The addition of cultural inheritance and innovation function, makes the institutions of higher learning must assume their obligations in accounting integrity construction.This article, through interpreting the essence and significance of accounting integrity, further expound the functions and integrity construction. responsibilities of the institutions of higher learning in accounting展开更多
As higher education institutions(HEIs)go online,several benefits are attained,and also it is vulnerable to several kinds of attacks.To accomplish security,this paper presents artificial intelligence based cybersecurit...As higher education institutions(HEIs)go online,several benefits are attained,and also it is vulnerable to several kinds of attacks.To accomplish security,this paper presents artificial intelligence based cybersecurity intrusion detection models to accomplish security.The incorporation of the strategies into business is a tendency among several distinct industries,comprising education,have recognized as game changer.Consequently,the HEIs are highly related to the requirement and knowledge of the learner,making the education procedure highly effective.Thus,artificial intelligence(AI)and machine learning(ML)models have shown significant interest in HEIs.This study designs a novel Artificial Intelligence based Cybersecurity Intrusion Detection Model for Higher Education Institutions named AICIDHEI technique.The goal of the AICID-HEI technique is to determine the occurrence of distinct kinds of intrusions in higher education institutes.The AICID-HEI technique encompassesmin-max normalization approach to preprocess the data.Besides,the AICID-HEI technique involves the design of improved differential evolution algorithm based feature selection(IDEA-FS)technique is applied to choose the feature subsets.Moreover,the bidirectional long short-term memory(BiLSTM)model is utilized for the detection and classification of intrusions in the network.Furthermore,the Adam optimizer is applied for hyperparameter tuning to properly adjust the hyperparameters in higher educational institutions.In order to validate the experimental results of the proposed AICID-HEI technique,the simulation results of the AICIDHEI technique take place by the use of benchmark dataset.The experimental results reported the betterment of the AICID-HEI technique over the other methods interms of different measures.展开更多
Education acts as an important part of economic growth and improvement in human welfare.The educational sectors have transformed a lot in recent days,and Information and Communication Technology(ICT)is an effective pa...Education acts as an important part of economic growth and improvement in human welfare.The educational sectors have transformed a lot in recent days,and Information and Communication Technology(ICT)is an effective part of the education field.Almost every action in university and college,right from the process fromcounselling to admissions and fee deposits has been automated.Attendance records,quiz,evaluation,mark,and grade submissions involved the utilization of the ICT.Therefore,security is essential to accomplish cybersecurity in higher security institutions(HEIs).In this view,this study develops an Automated Outlier Detection for CyberSecurity in Higher Education Institutions(AOD-CSHEI)technique.The AOD-CSHEI technique intends to determine the presence of intrusions or attacks in the HEIs.The AOD-CSHEI technique initially performs data pre-processing in two stages namely data conversion and class labelling.In addition,the Adaptive Synthetic(ADASYN)technique is exploited for the removal of outliers in the data.Besides,the sparrow search algorithm(SSA)with deep neural network(DNN)model is used for the classification of data into the existence or absence of intrusions in the HEIs network.Finally,the SSA is utilized to effectually adjust the hyper parameters of the DNN approach.In order to showcase the enhanced performance of the AOD-CSHEI technique,a set of simulations take place on three benchmark datasets and the results reported the enhanced efficiency of the AOD-CSHEI technique over its compared methods with higher accuracy of 0.9997.展开更多
In the wake of increased cybercrime against insufficient cybersecurity professionals, there is an urgent need to bridge the skill-gap. The demand for skilled and experienced (approximately 40,000 to 50,000) cybersecur...In the wake of increased cybercrime against insufficient cybersecurity professionals, there is an urgent need to bridge the skill-gap. The demand for skilled and experienced (approximately 40,000 to 50,000) cybersecurity professionals in Kenya is soaring all-time high. This demand is against the available 1700 certified professionals. Therefore, this paper seeks to bring to fore interventions put in place to address the skill gap through curriculum interventions. In order to get a clear understanding, the paper sought to determine the status of cybersecurity skill gap in Kenya and what universities are doing to address the gap. The paper also sought to propose the way forward to close the skill gap. This is a seminal review paper in the field of cybersecurity in Kenya focusing on institutions of higher learning and the interventions to address the cybersecurity skill gap. This research is significant to the general institutions of higher learning in both private and public universities. Results show that the cybersecurity skill gap is very high in Kenya. Interventions being offered by universities include partnerships with private cybersecurity organizations, offering cybersecurity certification training hackathons, and degree programs. However, it was established that only 13.2% of registered universities that offer cybersecurity degree programs in Kenya. The paper therefore strongly recommends launch of cybersecurity programs at the levels of undergraduate and graduate in many universities. This can therefore be augmented with other interventions such as certifications, hackathons and partnerships. Further research can be conducted to establish factors affecting the launch of cybersecurity programs in institutions of higher learning in Kenya. A further research can also be conducted to determine the effect of supplementary cybersecurity trainings such as hackathons and certifications.展开更多
文摘In most developing countries, governments attempt to enforce the movement from analogue to digital for all their sectors, from public to private. These technological advancements have been noted to bring necessary and unavoidable changes to businesses and learning environments. Higher learning institutions have adopted various e-learning systems to support learning, research, and publication activities to stay competitive in global academic systems. However, most public higher learning institutions in Tanzania lag behind in the adoption of these systems. Thus, research shows a failure of these institutions in utilising the full benefit that today’s Information and Communication Technology (ICT) can offer in learning environments. Thus, this study examines factors affecting the adoption of such a system in developing countries like Tanzania, taking the Institute of Accountancy Arusha (IAA) as a case study. The study used a mixed methodology where thematic and descriptive analysis was used to analyse both qualitative and quantitative research data. The study population was 187 teaching staff, a sample size of 126 was obtained, and 157 study participants were involved in the study. The study found that factors affecting the adoption of e-learning systems in public higher learning institutions in Tanzania include lack of ICT infrastructure, lack of technical and managerial support and lack of computers and e-learning knowledge among facilitators. Thus, the study recommended investments in adequate and reliable ICT facilities, high intermate speed and bandwidth, and policies that support e-learning and training programs about e-learning knowledge and use. Also, this study recommends the use of the Multi-Factors Adoption Model (MFAM11) for the successful adoption of an e-learning system in public higher learning institutions in Tanzania.
文摘along with the implementation of national intellectual property strategy and the construction of an innovative country, institutions of higher learning pay more and more attention to patent. By elaborating the roles of patent protection management from five aspects and sunmarizing Sichuan Agricultural University' s status quo of patent management, patent policies and patent licensing in recent years, this paper discusses four problems existing in universities ' patent protection management and proposes corresponding countermeasures.
文摘With the deepening of China's reform and opening up, China's private higher education has got rapid development. The expanding of the scale and the updating of the educational philosophy makes the financial management of private higher learning institutions can't meet the developing needs of them. Through summing up the current defects existed in the financial management activities of the private higher learning institutions, this paper tries to advise the private higher learning institutions to set out their efforts on financial management foundation, financing management, investment management, budget management, financial analysis and financial supervision six aspects, standardize and optimize the financial management activities to promote the healthy development of China's private higher learning institutions.
文摘This paper adopts the research methods such as literature material method, questionnaire investigation method, expert interview method and mathematical statistics to investigate and study the conditions of fancy rope skipping curriculum in 22 universities in Sichuan. The research shows that the university teachers highly recognize the fancy rope skipping curriculum; construction of teaching resources should be strengthened; cultivation of the professional teaching staffs should be strengthened; in terms of teaching materials, more premium teaching materials with high pertinence and professionalism are needed; the promotion and implementation of the curriculum system of fancy rope skipping should be boosted in different steps and stages; cultivation of the professional teachers should be enlarged; related scientific research of the curriculum system of fancy rope skipping should be strengthened.
文摘The ideological situation of the art majors in institutions, of higher learning has its own characteristics and needs educators to adopt the targeted ideological education and management measures, so as to promote the healthy growth and comprehensive development of the art majors. In this paper, the ideological education and managemenl model for the art majors in institutions of higher learning in the new oeriod are studied, hooing to attract more scholars to focus on this tooic.
文摘With the great changes in China's economic mechanism, the present running modes of equipment management at most institutions of higher learning are becoming less and less effective and efficient. Being fully aware of the common problems and their characteristics, this paper proposes a new running mode which aims at these problems' permanent resolution. It involves (1) Systems such as renting, competition and paid services are to be introduced to the campus, in order to effectively associate duty with interest. (2) The present managerial pattern is to be replaced by a new running network, in which all the links cooperate with as well as restrain each other. Such a mode focuses on the “two mechanisms and four patterns,”that is, to rely on the stimulative mechanism and restraint mechanism, and to enforce such patterns as centralized management and application centralized management and common application, opening to public use, and renting and borrowing. Through persistent exploration of the inner potential of the institutions, the ratio of investment and economic efficiency will accordingly be elevated.
文摘Doubtlessly, the term "human rights" has become a world language in the 21st century. China has written "The state respects and protects human rights" into its constitution, thus opening up a new period of constitutional construction and human rights cause. This great term "human rights" does not only contain specific rights that can be put into practice but also carry dignity, equality, freedom and other value systems and moral requirements.
基金The authors extend their appreciation to the Deputyship for Research&Innovation,Ministry of Education in Saudi Arabia for funding this research work through the project number(IFPRC-154-611-2020)and King Abdulaziz University,DSR,Jeddah,Saudi Arabia.
文摘Education 4.0 is being authorized more and more by the design of artificial intelligence(AI)techniques.Higher education institutions(HEI)have started to utilize Internet technologies to improve the quality of the service and boost knowledge.Due to the unavailability of information technology(IT)infrastructures,HEI is vulnerable to cyberattacks.Biometric authentication can be used to authenticate a person based on biological features such as face,fingerprint,iris,and so on.This study designs a novel search and rescue optimization with deep learning based learning authentication technique for cybersecurity in higher education institutions,named SRODLLAC technique.The proposed SRODL-LAC technique aims to authenticate the learner/student in HEI using fingerprint biometrics.Besides,the SRODLLACtechnique designs a median filtering(MF)based preprocessing approach to improving the quality of the image.In addition,the Densely Connected Networks(DenseNet-77)model is applied for the extraction of features.Moreover,search and rescue optimization(SRO)algorithm with deep neural network(DNN)model is utilized for the classification process.Lastly,template matching process is done for fingerprint identification.A wide range of simulation analyses is carried out and the results are inspected under several aspects.The experimental results reported the effective performance of the SRODL-LAC technique over the other methodologies.
文摘With the continuous development of national‘reforms and opening-up’policy and development of economic globalization,learning and application of foreign languages are becoming increasingly important.Society needs a large number of professional linguistic workers.Therefore,there are higher requirements for new era higher learning institutes which serve as training base for cultivating linguistic talents.Linguistic talents must possess very strong overall quality and skill to meet these requirements.In this context,this study carried out an in-depth analysis and research on translation method commonly used in German language teaching,and communicative method which is increasingly popular in recent years,to contribute to cultivation of German linguistic talents in higher learning institutes of China.
文摘with the vigorous development of education, the requirement to the higher education, especially to the improving college students’ physical quality, should be higher and strict in the new stage. In the improvement of Sunshine Sports background, the institutes of higher learning began to spread Tai Chi widely, inheriting Chinese traditional culture and in the meanwhile, to improve students’ physical quality and healthy. However, according to their cognitive level and participation of Tai Chi, the limits still wide, which need a further improvement. Thus, this article will do analysis on the cognitive level and participation of Tai Chi in the institutes of higher learning, the main target people is these students. According to the reality, through various analysis method and calibration, we investigate the cognitive level and participation of Tai Chi in the higher education learners and confirm the defects and deficiency within. From this, we can see that cognitive level is not that high, and their participation is not enough, and the positivity to it is not so active. In a word, the wide and deep spread of Tai Chi will help their physical and metal both healthy,firming a base for the future.
文摘In different historical periods, the institutions of higher learning are endowed with dltlerent social tunctlons, wnlcn also experience some changes with the social development.The addition of cultural inheritance and innovation function, makes the institutions of higher learning must assume their obligations in accounting integrity construction.This article, through interpreting the essence and significance of accounting integrity, further expound the functions and integrity construction. responsibilities of the institutions of higher learning in accounting
基金The authors extend their appreciation to the Deputyship for Research&Innovation,Ministry of Education in Saudi Arabia for funding this research work through the Project Number(IFPRC-154-611-2020)and King Abdulaziz University,DSR,Jeddah,Saudi Arabia.
文摘As higher education institutions(HEIs)go online,several benefits are attained,and also it is vulnerable to several kinds of attacks.To accomplish security,this paper presents artificial intelligence based cybersecurity intrusion detection models to accomplish security.The incorporation of the strategies into business is a tendency among several distinct industries,comprising education,have recognized as game changer.Consequently,the HEIs are highly related to the requirement and knowledge of the learner,making the education procedure highly effective.Thus,artificial intelligence(AI)and machine learning(ML)models have shown significant interest in HEIs.This study designs a novel Artificial Intelligence based Cybersecurity Intrusion Detection Model for Higher Education Institutions named AICIDHEI technique.The goal of the AICID-HEI technique is to determine the occurrence of distinct kinds of intrusions in higher education institutes.The AICID-HEI technique encompassesmin-max normalization approach to preprocess the data.Besides,the AICID-HEI technique involves the design of improved differential evolution algorithm based feature selection(IDEA-FS)technique is applied to choose the feature subsets.Moreover,the bidirectional long short-term memory(BiLSTM)model is utilized for the detection and classification of intrusions in the network.Furthermore,the Adam optimizer is applied for hyperparameter tuning to properly adjust the hyperparameters in higher educational institutions.In order to validate the experimental results of the proposed AICID-HEI technique,the simulation results of the AICIDHEI technique take place by the use of benchmark dataset.The experimental results reported the betterment of the AICID-HEI technique over the other methods interms of different measures.
基金The authors extend their appreciation to the Deputyship for Research&Innovation,Ministry of Education in Saudi Arabia for funding this research work through the project number(IFPRC-154-611-2020)and King Abdulaziz University,DSR,Jeddah,Saudi Arabia.
文摘Education acts as an important part of economic growth and improvement in human welfare.The educational sectors have transformed a lot in recent days,and Information and Communication Technology(ICT)is an effective part of the education field.Almost every action in university and college,right from the process fromcounselling to admissions and fee deposits has been automated.Attendance records,quiz,evaluation,mark,and grade submissions involved the utilization of the ICT.Therefore,security is essential to accomplish cybersecurity in higher security institutions(HEIs).In this view,this study develops an Automated Outlier Detection for CyberSecurity in Higher Education Institutions(AOD-CSHEI)technique.The AOD-CSHEI technique intends to determine the presence of intrusions or attacks in the HEIs.The AOD-CSHEI technique initially performs data pre-processing in two stages namely data conversion and class labelling.In addition,the Adaptive Synthetic(ADASYN)technique is exploited for the removal of outliers in the data.Besides,the sparrow search algorithm(SSA)with deep neural network(DNN)model is used for the classification of data into the existence or absence of intrusions in the HEIs network.Finally,the SSA is utilized to effectually adjust the hyper parameters of the DNN approach.In order to showcase the enhanced performance of the AOD-CSHEI technique,a set of simulations take place on three benchmark datasets and the results reported the enhanced efficiency of the AOD-CSHEI technique over its compared methods with higher accuracy of 0.9997.
文摘In the wake of increased cybercrime against insufficient cybersecurity professionals, there is an urgent need to bridge the skill-gap. The demand for skilled and experienced (approximately 40,000 to 50,000) cybersecurity professionals in Kenya is soaring all-time high. This demand is against the available 1700 certified professionals. Therefore, this paper seeks to bring to fore interventions put in place to address the skill gap through curriculum interventions. In order to get a clear understanding, the paper sought to determine the status of cybersecurity skill gap in Kenya and what universities are doing to address the gap. The paper also sought to propose the way forward to close the skill gap. This is a seminal review paper in the field of cybersecurity in Kenya focusing on institutions of higher learning and the interventions to address the cybersecurity skill gap. This research is significant to the general institutions of higher learning in both private and public universities. Results show that the cybersecurity skill gap is very high in Kenya. Interventions being offered by universities include partnerships with private cybersecurity organizations, offering cybersecurity certification training hackathons, and degree programs. However, it was established that only 13.2% of registered universities that offer cybersecurity degree programs in Kenya. The paper therefore strongly recommends launch of cybersecurity programs at the levels of undergraduate and graduate in many universities. This can therefore be augmented with other interventions such as certifications, hackathons and partnerships. Further research can be conducted to establish factors affecting the launch of cybersecurity programs in institutions of higher learning in Kenya. A further research can also be conducted to determine the effect of supplementary cybersecurity trainings such as hackathons and certifications.