650
Views
5
CrossRef citations to date
0
Altmetric
Articles

Architecture for Managing Knowledge on Cybersecurity in Sub-Saharan Africa

, &

References

  • African Business. (2005). Cake is bigger but the slices are smaller. Ghana Profile Page. Retrieved from http://www.questia.com/library/1G1-139213483/cake-is-bigger-but-the-slices-are-smaller-good-cocoa
  • Akhavan, P., Jafari, M. (2006). Critical issues for knowledge management implementation at a national level. VINE, 36(1), 52–66. doi: 10.1108/03055720610667372
  • Akuta, E. A.-M., Ong'oa, I. M., Jones, C. R. (2011). Combating cyber crime in Sub-Sahara Africa; a discourse on law, policy and practice. Journal of Peace, Gender and Development Studies, 1(4), 129–137.
  • Alavi, M., Leidner, D. (1999). Knowledge management systems: Emerging views and practices from the field. Communications of the AIS, 1(5), 1–37.
  • Alavi, M., Leidner, D. E. (2001). Review: Knowledge management and knowledge management systems: Conceptual foundations and research issues. MIS Quarterly, 25(1), 107–136. doi: 10.2307/3250961
  • Anandarajan, M., Igbaria, M., Anakwe, U. P. (2000). Technology acceptance in the banking industry: A perspective from a less developed country. Information Technology & People, 13(4), 298–312. doi: 10.1108/09593840010359491
  • Andoh-Baidoo, F. K., Baker, E. W., Susarapu, S. R., Kasper, G. M. (2007). A review of IS research activities and outputs using Pro forma abstracts. Information Resources Management, 20(4), 65–67. doi: 10.4018/irmj.2007100105
  • Andoh-Baidoo, F. K., Osatuyi, B. (2009). Examining online banking initiatives in Nigeria: A value network approach. Electronic Journal of Information Systems in Developing Countries, 1(38), 1–14.
  • Andoh-Baidoo, F. K., Osatuyi, B., Kunene, K. N. (2013). ICT capacity as the investment and use of ICT: Exploring its Anteceedents in Africa. Information Technology for Development doi:10.1080/02681102.2013.804399
  • Atsu, Y. M., Andoh-Baidoo, F. K., Osatuyi, B., Amoako-Gyampah, K. (2010). An exploratory study of the contextual factors that influence success of ICT projects in developing nations: A case study of a telecommunications company in Ghana. Journal of Information Technology Case and Application Research, 3(12), 56–81.
  • Balkin, J., Grimmelmann, J., Katz, E., Kozlovski, N., Wagman, S., Zarsky, T. (2006). Cybercrime: Digital cops in a networked environment, New York, NY: New York University Press.
  • Blunt, P., Jones, M. L. (1997). Exploring the limits of Western leadership theory in East Asia and Africa. Personnel Review, 26(1/2), 6–23. doi: 10.1108/00483489710157760
  • Boateng, R., Olumide, L., Isabalija, R. S., Budu, J. (2011). Sakawa – cybercrime and criminality in Ghana. Journal of Information Technology Impact, 11(2), 85–100.
  • Brechbühl, H., Bruce, R., Dynes, S., & Johnson, M. E. (2010). Protecting critical information infrastructure: Developing cybersecurity policy. Information Technology for Development, 16(1), 83–91.
  • Cheah, Y. N., & Abidi, S. S. R. (1999). Tacit knowledge creation in a knowledge management context. Paper presented at the Fourteenth International Symposium on Computer and Information Sciences, Paris, France.
  • Coomson, J. (2006, October 4). Cyber crimes in Ghana, Ghanaian Chronicle. Retrieved from http://allafrica.com/stories/200610040856.html
  • Cukier, W. L., Nesselroth, E. J., & Cody, S. (2007). Genre, narrative and the "Nigerian Letter" in electronic mail. Paper presented at the 40th Annual Hawaii International Conference on System Sciences, Waikoloa, Hawaii.
  • Danquah, P., Longe, O. B. (2011). An empirical test of the space transition theory of cyber criminality: Investigating cybercrime causation factors in Ghana. African Journal of Computing & ICT, 2(1), 37–48.
  • Dewan, S., Ganley, D., Kraemer, K. L. (2005). Across the digital divide: A cross-country multi-technology analysis of the determinants of IT penetration. Journal of the Association for Information Systems, 6(12), 409–432.
  • Donalds, C. M., & Osei-Bryson, K.-M. (2012). The construction of A domain ontology for criminal investigation: The case of the Jamaican constabulary force. Paper presented at the SIG ICT in Global Development, 5th Annual Pre-ICIS Workshop, Orlando, FL.
  • The Economist. (2013, March 2). Afria rising, a hopeful continent. Retrieved from http://www.economist.com/news/special-report/21572377-african-lives-have-already-greatly-improved-over-past-decade-says-oliver-august
  • European Network and Information Security Agency. (2006). A users’ guide: How to raise information security awareness. Heraklion, Greece: ENISA.
  • Foster, W., Goodman, S., Osiakwan, E., Bernstein, A. (2004). Global diffusion of the Internet IV: The Internet in Ghana. Communications of the AIS, 13(38), 1–47
  • Furnell, S., Valleria, T., Phippen, D. (2008). Security beliefs and barriers for novice Internet users. Computers & Security, 27, 235–240. doi: 10.1016/j.cose.2008.01.001
  • Garcia-Murillo, M. (2010). The effect of Internet access on government corruption. Electronic Government, an International Journal, 7(1), 22–40. doi: 10.1504/EG.2010.029889
  • Gebremichael, M. D., Jackson, J. W. (2006). Bridging the gap in Sub-Saharan Africa: A holistic look at information poverty and the region's digital divide. Government Information Quarterly, 23(2), 267–280. doi: 10.1016/j.giq.2006.02.011
  • Goldman, G. (1990). The tacit dimension of clinical judgment. The Yale Journal of Biology and Medicine, 63(1), 47–61.
  • Grabosky, P., Smith, R. (2001). In GraboskyP.SmithR. (Ed.), Telecommunication fraud in the digital age: The convergence of technologies, London: Routledge.
  • Grant, E., Gregory, M. (1997). Tacit knowledge, the life cycle and international manufacturing transfer. Technology Analysis & Strategic Management, 9(2), 149–161. doi: 10.1080/09537329708524276
  • Grant, R. M. (1996). Toward a knowledge-based theory of the firm. Strategic Management Journal, 17, 109–122. doi: 10.1002/(SICI)1097-0266(199602)17:2<109::AID-SMJ796>3.0.CO;2-P
  • Hevner, A. R., March, S. T., Park, J., Ram, S. (2004). Design science in information systems research. MIS Quarterly, 28, 75–105.
  • Hinson, R. E., Sorensen, O., Buatsi, S. (2007). Internet use patterns amongst internationalizing Ghanaian exporters. The Electronic Journal of Information Systems in Developing Countries, 29(3), 1–14
  • Hofstede, G. (1980). Culture's consequences: International differences in work related values, London: Sage.
  • Hofstede, G. (1983). The cultural relativity of organizational practices and theories. Journal of International Business Studies, 14, 75–89. doi: 10.1057/palgrave.jibs.8490867
  • Hofstede, G. (1984). The cultural relativity of the quality of life concept. The Academy of Management Review, 9(3), 389–398.
  • Hofstede, G. (1985). The interaction between national and organizational value systems. Journal of Management Studies, 22(4), 347–357. doi: 10.1111/j.1467-6486.1985.tb00001.x
  • Hofstede, G. (1993). Cultural constraints in management theories. The Executive, 7(1), 81–94.
  • Howells, J. (1995). Tacit knowledge and technology transfer, Cambridge: Cambridge University.
  • Kasusse, M. (2005). Bridging the digital divide in Sub-Saharan Africa: The rural challenge in Uganda. The International Information & Library Review, 37(3), 147–158. doi: 10.1016/j.iilr.2005.07.001
  • Kebede, G. (2004). The information needs of end-users of Sub-Saharan Africa in the digital information environment. The International Information & Library Review, 36(3), 273–279. doi: 10.1016/j.iilr.2003.10.011
  • Kiggundu, M. N. (1989). Managing organizations in developing countries: An operational and strategic approach, West Hartford, CT: Kumarian Press.
  • Kritzinger, E., von Solms, S. H. (2010). Cyber security for home users: A new way of protection through awareness enforcement. Computers & Security, 29, 840–847. doi: 10.1016/j.cose.2010.08.001
  • Kumar, R. M. L., Park, S., Subramaniam, C. (2008). Understanding the value of countermeasure portfolios in information systems security. Journal of Management Information Systems, 25(2), 241–280. doi: 10.2753/MIS0742-1222250210
  • Lawal, L. S., & Chatwin, C. R. (2012). The future of wireless communications in Africa. Future wireless networks and information systems (pp. 243–251). Berlin: Springer.
  • Luftman, J., Ben-Zvi, T. (2010). Key issues for IT executives 2010: Judicious IT investments continue post- recession. MIS Quarterly Executive, 8(4), 263–273.
  • Luftman, J., Ben-Zvi, T. (2011). Key issues for IT executives 2011: Cautious optimism in uncertain economic times. MIS Quarterly Executive, 10(4), 203–212.
  • Luftman, J., Derksen, B. (2012). Key issues for IT executives 2012: Doing more with less. MIS Quarterly Executive, 11(4), 207–218.
  • Luftman, J., Kempaiah, R., Rigoni, E. H. (2009). Key issues for IT executives 2008. MIS Quarterly Executive, 8(3), 151–159.
  • Magnier-Watanabe, R., Senoo, D. (2010). Shaping knowledge management: Organization and national culture. Journal of Knowledge Management, 14(2), 214–227. doi: 10.1108/13673271011032364
  • March, S. T., Smith, G. F. (1995). Design and natural science research on information technology. Decision Support Systems, 15(4), 251–266. doi: 10.1016/0167-9236(94)00041-2
  • Mbarika, V., Jensen, M., Meso, P. (2002). Cyberspace across Sub-Saharan Africa. Communications of the ACM, 45(12), 17–21. doi: 10.1145/585597.585610
  • McKinsey Global Institute. (2012). The rise of Africa consumer. Retrieved from http://www.mckinsey.com/insights/consumer_and_retail/the_rise_of_the_african_consumer
  • Meso, P., Musa, P., Mbarika, V. (2005). Towards a model of consumer use of mobile information and communication technology in LDCs: The case of sub-Saharan Africa. Information Systems Journal, 15(2), 119–146. doi: 10.1111/j.1365-2575.2005.00190.x
  • Moses-Òkè, R. O. (2012). Cyber capacity without cyber security: A case study of Nigeria's National Policy for Information Technology (NPFIT). The Journal of Philosophy, Science & Law, 12, 1–14.
  • Muriithi, N., Crawford, L. (2003). Approaches to project management in Africa: Implications for international development projects. International Journal of Project Management, 21(5), 309–319. doi: 10.1016/S0263-7863(02)00048-0
  • Ngwenyama, O., Andoh-Baidoo, F. K., Bollou, R., Morawczynski, O. (2006). Is there a relationship between ICT, Health, education and development? An empirical analysis of five West African countries from 1997–2003. The Electronic Journal on Information Systems in Developing Countries, 26(5), 1–11.
  • Nogueira, J. H. M., & De Vasconcelos, W. W. P. (2007). Ontology for complex mission scenarios in forensic computing. Paper presented at the 2nd International Conference of Forensic Computer Science, Guarujá, Brazil.
  • Nonaka, I., Takeuchi, H. (1995). The knowledge-creating company: How Japanese companies create the dynamics of innovation, New York, NY: Oxford University Press.
  • Nonaka, I., Takeuchi, H., Umemoto, K. (1996). A theory of organizational knowledge creation. International Journal of Technology Management, 11(7–8), 833–845.
  • Odedra, M., Bennett, M., Goodman, S., Lawrie, M. (1993). Sub-Saharan Africa: A technological desert. Communications of the ACM, 36(2), 25–29. doi: 10.1145/151220.151222
  • O'Leary, D. E. (1998). Using AI in knowledge management: Knowledge bases and ontologies. IEEE Intelligent Systems and Their Applications, 13(3), 34–39. doi: 10.1109/5254.683180
  • Oyelaran-Oyeyinka, B., Lal, K. (2005). Internet diffusion in sub-Saharan Africa: A cross-country analysis. Telecommunications policy, 29(7), 507–527. doi: 10.1016/j.telpol.2005.05.002
  • Pylyshyn, Z. W. (1981). The imagery debate – analog media versus tacit knowledge. Psychological Review, 88(1), 16–45. doi: 10.1037/0033-295X.88.1.16
  • Qureshi, S., Keen, P., & Kamal, M. (2007). Knowledge networking for development: Building bridges across the digital divide. Paper presented at the System Sciences, HICSS 2007. 40th Annual Hawaii International Conference on System Sciences : 3–6 January, 2007, Big Island, Hawaii (pp. 226c–226c). IEEE.
  • Rashid, A. T., Elder, L. (2009). Mobile phones and development: An analysis of IDRC-supported projects. Electronic Journal of Information Systems in Developing Countries, 36(2), 1–16.
  • Reitmaier, T., Bidwell, N. J., & Marsden, G. (2010). Field testing mobile digital storytelling software in rural Kenya. Paper presented at the Mobile HCI ’10, Lisbon, Portugal.
  • Roztocki, N., & Weistroffer, H. (2009). Information and communications technology in developing, emerging and transition economies: An assessment of research. Paper presented at the Proceedings of the Fifteenth Americas Conference on Information Systems, San Francisco, CA.
  • Roztocki, N., Weistroffer, H. R. (2011). Information technology success factors and models in developing and emerging economies. Information Technology for Development, 17(3), 163–167. doi: 10.1080/02681102.2011.568220
  • Salifu, A. (2008). Impact of Internet crime on development. Journal of Financial Crime, 15(4), 432–444. doi: 10.1108/13590790810907254
  • Schuppan, T. (2009). E-government in developing countries: Experiences from sub-Saharan Africa. Government Information Quarterly, 26, 118–127. doi: 10.1016/j.giq.2008.01.006
  • Seddon, J. (1985). The development and indigenization of third world business: African perspectives in the workplace. Current research in management, (pp. 115–134). London: Frances Pinter.
  • Sherwani, J., Ali, N., Rose, C. P., Rosenfeld, R. (2009). Orality-grounded HCID: Understanding the oral user. Information Technologies & Development, 5(4), 37–49.
  • Siponen, M., Vance, A. (2010). Neutralization: New insights into the problem of employee information systems security policy violations. MIS Quarterly, 34(3), 487–502.
  • von Solms, B., Kritzinger, E. (2012). Critical Information Infrastructure Protection (CIIP) and cyber security in Africa – has the CIIP and cyber security rubicon been crossed?. In Popescu-ZeletinR. et al. (Eds.), AFRICOMM 2011, (pp. 116–124). 92
  • Stein, E. W., Zwass, V. (1995). Actualizing organizational memory with information systems. Information Systems Research, 6(2), 85–117. doi: 10.1287/isre.6.2.85
  • Symantec. (2007). Trends for January-June 07 (Symantec Internet Security Threat Report), Vol. XII.
  • Tan, S. S., Teo, H. H., Tan, B. C., & Wei, K. K. (1998). Developing a preliminary framework for knowledge management in organizations. Paper presented at the Fourth Americas Conference on Information Systems, Baltimore, MD.
  • Thomas, J. C., Kellogg, W. A., Erickson, T. (2001). The knowledge management puzzle: Human and social factors in knowledge management. IBM Systems Journal, 40(4), 863–884. doi: 10.1147/sj.404.0863
  • Uschold, M., Gruninger, M. (1996a). Ontologies: Principles, methods and applications. Knowledge Engineering Review, 11(2), 96–137. doi: 10.1017/S0269888900007797
  • Uschold, M., Gruninger, M. (1996b). Ontologies: Principles, methods and applications. Knowledge Engineering Review, 11, 96–137. doi: 10.1017/S0269888900007797
  • Valdés-Valdivieso, L., & Penteriani, G. (2012). Sub-Saharan Africa mobile observatory 2012. GSM Association.
  • Von Krogh, G., Ichijo, K., & Nonaka, I. (2000). Enabling knowledge creation: How to unlock the mystery of tacit knowledge and release the power of innovation. Oxford: Oxford University Press.
  • Wall, D. (2001). Crime and the Internet, London: Routledge.
  • Walsh, J. P., Ungson, G. R. (1991). Organization memory. Academy of Management Review, 16(1), 57–91.
  • Whyte, G., Classen, S. (2012). Using storytelling to elicit tacit knowledge from SMEs. Journal of Knowledge Management, 16, 950–962. doi: 10.1108/13673271211276218
  • World Bank. (2012). Regional economic outlook.
  • Zmud, R. (2013). Publishing at top scholarly journals: Battlefield lessons from traversing review processes, Faculty Research Seminars. Louisville, KY: University of Louisville.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.