Corporate Policy Integration for Cybersecurity in Education: A Model Structure for Higher Education Institutions

Main Article Content

Serkan Yaman
Ebru Yaman

Abstract

Higher education institutions, standing at the forefront of digital transformation, have become primary targets for cyber attackers on a global scale due to the massive personal data, strategic academic research, financial records, and large-scale network infrastructures they host. Unlike traditional corporate structures, the fact that higher education institutions are founded on the principles of “academic freedom” and “open access to information” brings unique challenges to the construction of cybersecurity architecture. Viewing cybersecurity merely as a technical IT issue in these institutions remains insufficient in today’s complex threat landscape. Therefore, integrating technical measures into corporate governance processes, legal requirements, and academic culture is a necessity. The primary objective of this research is to develop a sustainable and holistic “Cybersecurity in Education” model structure suitable for the dynamic nature of higher education institutions. The study centers on the perspective of Cybersecurity Program students who are in the process of professionalization and are being cultivated within the technical core of this field. Synthesizing the students’ technical vision with institutional needs will ensure that the proposed model is both technologically valid against current threats and practically applicable. The methodological framework of the research is built upon the “case study” design, a qualitative research method. Data was collected through a semi-structured interview form divided into three main categories. As a result of the content analysis of the collected data, it was determined that the greatest risk factor threatening corporate security is “user unawareness.” To ensure the balance between academic freedom and security and to manage BYOD (Bring Your Own Device) risks, the necessity of “Network Access Control (NAC),” “isolated research networks (Sandbox),” and anomaly detection systems was emphasized. Within the scope of emergency and business continuity, redundant server architectures and DDoS protection systems stood out; while it was determined that to spread the cybersecurity culture throughout the institution, policies must be supported by gamification, phishing simulations, and practical laboratory training. In light of these findings, a three-dimensional model proposal consisting of technical, administrative, and human layers has been developed. This model, in which legal obligations such as the KVKK (Personal Data Protection Law) are transparently integrated into technical processes, is expected to guide decision-makers, IT departments, and strategy development units in higher education institutions. This study not only provides a security guide but also presents an original theoretical framework for making cybersecurity an integral part of educational processes.


Keywords: Cybersecurity in Education, Higher Education Institutions, Corporate Policy, Cybersecurity Model, Cyber Resilience.

Downloads

Download data is not yet available.

Article Details

How to Cite
Yaman, S., & Yaman, E. (2026). Corporate Policy Integration for Cybersecurity in Education: A Model Structure for Higher Education Institutions. World Journal on Educational Technology: Current Issues, 18(1), 76–87. https://doi.org/10.18844/wjet.v18i1.9980
Section
Articles