Developing A Cybersecurity Leadership Model for Educational Organizations in Malaysia: A Grounded Theory Study

Authors

Zul Afida Binti Abdullah

Department of Technology Development & Management centre National Institute of Educational Management & Leadership, Institute Aminuddin Baki (Malaysia)

Rokiah Binti Mohd Nazir

Department of Technology Development & Management centre National Institute of Educational Management & Leadership, Institute Aminuddin Baki (Malaysia)

Kumaran Sekar

Department of Technology Development & Management centre National Institute of Educational Management & Leadership, Institute Aminuddin Baki (Malaysia)

Shanti Ramanlingam PhD

Department of Technology Development & Management centre National Institute of Educational Management & Leadership, Institute Aminuddin Baki (Malaysia)

Zizi'Azniza Binti Mohd

SMK Pelong, Terengganu (Malaysia)

Roshafiza binti Hassan PhD

University of Putra (Malaysia)

Article Information

DOI: 10.47772/IJRISS.2026.10200139

Subject Category: Cybersecurity

Volume/Issue: 10/2 | Page No: 1822-1834

Publication Timeline

Submitted: 2026-02-11

Accepted: 2026-02-16

Published: 2026-02-26

Abstract

The digital transformation of education has intensified organizational dependence on connected platforms, cloud systems, and data-driven learning environments, thereby increasing exposure to cybersecurity risks such as ransomware, phishing, identity compromise, and data breaches. While educational cybersecurity research has predominantly focused on technical controls, cybersecurity in education is increasingly recognized as a leadership and governance challenge requiring institutional direction, cultural change, and strategic capabilitybuilding. In Malaysia, national initiatives such as MyDIGITAL, the Malaysia Education Blueprint (2013–2025), and the Digital Education Policy highlight the importance of digital readiness; however, there remains limited empirical understanding of how educational leaders enact cybersecurity leadership in complex organisational contexts. This study aims to develop a Cybersecurity Leadership Model for educational organizations in Malaysia, using grounded theory to capture leadership practices and governance mechanisms from practitioner perspectives. Semi-structured interviews were conducted with N=26 participants comprising education leaders, ICT coordinators, cybersecurity officers, and policy stakeholders across key educational settings. Data were analyzed through constant comparative analysis using open, axial, and selective coding, leading to the emergence of six core leadership dimensions such as strategic cyber governance, risk-informed decisionmaking, cyber-resilient culture and awareness, capability development and professional learning, incident leadership and crisis communication, and ethical compliance and data stewardship. The resulting model positions cybersecurity leadership as a socio-technical and governance-driven function that integrates institutional values with initiative-taking risk management and sustainable capacity-building. The study contributes a context-sensitive framework for guiding cybersecurity readiness and leadership development in Malaysia’s educational ecosystem and offers actionable implications for leadership training institutions such as Institute Aminuddin Baki in strengthening cyber governance and organizational resilience.

Keywords

cybersecurity leadership, grounded theory, educational organizations, governance, resilience, digital leadership, Malaysia

Downloads

References

1. Argyris, C., & Schön, D. A. (1996). Organizational learning II: Theory, method, and practice. AddisonWesley. [Google Scholar] [Crossref]

2. Bada, M., & Nurse, J. R. C. (2019). Developing cybersecurity education and awareness programs for small-and-medium-sized enterprises (SMEs). Information and Computer Security, 27(3), 393–410. [Google Scholar] [Crossref]

3. Baxter, G., & Sommerville, I. (2011). Socio-technical systems: From design methods to systems engineering. Interacting with Computers, 23(1), 4–17. [Google Scholar] [Crossref]

4. Charmaz, K. (2014). Constructing grounded theory (2nd ed.). SAGE Publications. [Google Scholar] [Crossref]

5. Creswell, J. W., & Poth, C. N. (2018). Qualitative inquiry and research design: Choosing among five approaches (4th ed.). SAGE Publications. [Google Scholar] [Crossref]

6. Duchek, S. (2020). Organizational resilience: A capability-based conceptualization. Business Research, 13, 215–246. [Google Scholar] [Crossref]

7. ENISA. (2023). ENISA threat landscape 2023. European Union Agency for Cybersecurity. [Google Scholar] [Crossref]

8. Floridi, L., Cowls, J., Beltrametti, M., Chatila, R., Chazerand, P., Dignum, V., Luetge, C., Madelin, R., Pagallo, U., Rossi, F., Schafer, B., Valcke, P., & Vayena, E. (2022). AI4People.An ethical framework for a good AI society: Opportunities, risks, principles, and recommendations. Minds and Machines, 28(4), 689–707. [Google Scholar] [Crossref]

9. Glaser, B. G., & Strauss, A. L. (1967). The discovery of grounded theory: Strategies for qualitative research. Aldine. [Google Scholar] [Crossref]

10. Hollnagel, E. (2014). Safety-I and Safety-II: The past and future of safety management. Ashgate. [Google Scholar] [Crossref]

11. ISO. (2018). ISO 31000:2018 risk management—Guidelines. International Organization for Standardization. [Google Scholar] [Crossref]

12. Lincoln, Y. S., & Guba, E. G. (1985). Naturalistic inquiry. SAGE Publications. [Google Scholar] [Crossref]

13. OECD. (2023). Cybersecurity policy-making in the education sector: An overview. OECD Publishing. [Google Scholar] [Crossref]

14. UNESCO. (2021). Recommendation on the ethics of artificial intelligence. UNESCO Publishing. [Google Scholar] [Crossref]

15. von Solms, R., & von Solms, S. (2018). Cybersecurity and information security—What goes where? Information & Computer Security, 26(1), 2–9. [Google Scholar] [Crossref]

Metrics

Views & Downloads

Similar Articles