Please use this identifier to cite or link to this item: https://cris.library.msu.ac.zw//handle/11408/1755
Full metadata record
DC FieldValueLanguage
dc.contributor.authorMusungwini, Samuel-
dc.contributor.authorMahlangu, Gilbert-
dc.contributor.authorMugoniwa, Beauty-
dc.contributor.authorFurusa, Samuel S.-
dc.date.accessioned2016-08-12T10:15:38Z-
dc.date.available2016-08-12T10:15:38Z-
dc.date.issued2016-
dc.identifier.issn1694-2507-
dc.identifier.urihttp://www.ijcsbi.org/index.php/ijcsbi/article/view/650-
dc.identifier.urihttp://hdl.handle.net/11408/1755-
dc.description.abstractThe purpose of this study was analyse threats that are inherent in the prepaid electricity meter system and to propose a framework for threat modelling. This framework can be effectively used by power utilities power utilities in particular and other prepaid meter system organisations to achieve end-to-end actionable insights on prepaid electricity metering infrastructure. The study used a qualitative case research methodology with a single unit of analysis. A purposive sampling technique was used to select suitable participants. Data was collected from power utility engineers and security experts using semi-structured interviews and focus group in order to triangulate the research findings. The findings of the study indicated that at the present moment there are very few frameworks that can be explicitly used to model threat to prepaid electricity infrastructure. This has exposed the infrastructure to various attacks such as physical bypass, cyber-attack and mechanically induced attack. We therefore recommend the adoption of an explicit framework for modelling threat in prepaid metering infrastructure.en_US
dc.language.isoenen_US
dc.relation.ispartofseriesInternational Journal of Computer Science and Business Informatics;Vol. 16, No. 1; p.-
dc.subjectThreat modelling, cyber attack, electricity theft, framework, ICTs, Mobile technologies.en_US
dc.titleFramework for threat modelling for a power utility: case of Zimbabwe Power Utility Companyen_US
dc.typeArticleen_US
item.languageiso639-1en-
item.cerifentitytypePublications-
item.fulltextWith Fulltext-
item.grantfulltextopen-
item.openairetypeArticle-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
Appears in Collections:Research Papers
Files in This Item:
File Description SizeFormat 
FRAMEWORK FOR THREAT MODELLING FOR A POWER UTILITY.pdfAbstract5.2 kBAdobe PDFThumbnail
View/Open
Show simple item record

Page view(s)

52
checked on Nov 22, 2024

Download(s)

24
checked on Nov 22, 2024

Google ScholarTM

Check


Items in MSUIR are protected by copyright, with all rights reserved, unless otherwise indicated.