{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T12:24:12Z","timestamp":1761740652976,"version":"3.40.3"},"publisher-location":"Cham","reference-count":46,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031203152"},{"type":"electronic","value":"9783031203169"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-20316-9_26","type":"book-chapter","created":{"date-parts":[[2022,11,24]],"date-time":"2022-11-24T18:52:04Z","timestamp":1669315924000},"page":"339-351","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Cyber4Dev Security Culture Model"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0009-8311","authenticated-orcid":false,"given":"Morena Abiel","family":"Tsoeu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9777-8721","authenticated-orcid":false,"given":"Ad\u00e9le","family":"da Veiga","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,25]]},"reference":[{"issue":"87","key":"26_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/info12020087","volume":"12","author":"M Lombardi","year":"2021","unstructured":"Lombardi, M., Pascale, F., Santaniello, D.: Internet of Things: a general overview between architectures, protocols and applications. Inf. 12(87), 1\u201321 (2021). https:\/\/doi.org\/10.3390\/info12020087","journal-title":"Inf."},{"key":"26_CR2","doi-asserted-by":"publisher","first-page":"156114","DOI":"10.1109\/ACCESS.2021.3129697","volume":"9","author":"EA Shammar","year":"2021","unstructured":"Shammar, E.A., Zahary, A.T., Al-Shargabi, A.A.: A survey of IoT and blockchain integration: security perspective. IEEE Access. 9, 156114\u2013156150 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3129697","journal-title":"IEEE Access."},{"key":"26_CR3","doi-asserted-by":"publisher","unstructured":"Elkhannoubi, H., Belaissaoui, M.: Assess developing countries\u2019 cybersecurity capabilities through a social influence strategy. In: 7th International Conference on Science Electronic and Technological Information. Telecommun. SETIT 2016. pp. 19\u201323 (2017). https:\/\/doi.org\/10.1109\/SETIT.2016.7939834","DOI":"10.1109\/SETIT.2016.7939834"},{"key":"26_CR4","unstructured":"Cyber4d \u2013 Cyber Resilience for Development \u2013 A European Union project designed to protect public and private enterprises across countries in Asia and Africa"},{"key":"26_CR5","doi-asserted-by":"publisher","unstructured":"Peters, M.D.J., et al.: Updated methodological guidance for the conduct of scoping reviews. JBI Evid. Synth. 18, 2119\u20132126 (2020). https:\/\/doi.org\/10.11124\/JBIES-20-00167","DOI":"10.11124\/JBIES-20-00167"},{"key":"26_CR6","doi-asserted-by":"crossref","unstructured":"Mutemwa, M.: Developing a cyber threat intelligence sharing platform for South African Organisations. In:\u00a02017 Conference on Information Communication Technology and Society (ICTAS), pp.\u00a0\u00a01\u20136 (2020)","DOI":"10.1109\/ICTAS.2017.7920657"},{"key":"26_CR7","unstructured":"BusinessTech: TransUnion cyber attack \u2013 hackers demand R225 million ransom, https:\/\/businesstech.co.za\/news\/cloud-hosting\/569658\/transunion-cyber-attack-hackers-demand-r225-million-ransom\/"},{"key":"26_CR8","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1080\/19393555.2019.1643956","volume":"28","author":"A Nasir","year":"2019","unstructured":"Nasir, A., Abdullah Arshah, R., Ab Hamid, M.R.: A dimension-based information security culture model and its relationship with employees\u2019 security behavior: a case study in Malaysian higher educational institutions. Inf. Secur. J. 28, 55\u201380 (2019). https:\/\/doi.org\/10.1080\/19393555.2019.1643956","journal-title":"Inf. Secur. J."},{"key":"26_CR9","doi-asserted-by":"publisher","unstructured":"Alnatheer, M.A.: Information security culture critical success factors. In: 12th Interanational Conference in Information Technology of New Generation. ITNG 2015. 731\u2013735 (2015). https:\/\/doi.org\/10.1109\/ITNG.2015.124","DOI":"10.1109\/ITNG.2015.124"},{"key":"26_CR10","doi-asserted-by":"publisher","unstructured":"Govender, S., Kritzinger, E., Loock, M.: The influence of national culture on information security culture. In: IST-Africa Week Conference, pp. 1\u20139 (2016). https:\/\/doi.org\/10.1109\/ISTAFRICA.2016.7530607","DOI":"10.1109\/ISTAFRICA.2016.7530607"},{"key":"26_CR11","doi-asserted-by":"publisher","unstructured":"Alkalabi, W., Simpson, L., Morarji, H.: Barriers and incentives to cybersecurity threat information sharing in developing countries: a case study of Saudi Arabia. In: ACM International Conference Proceeding Series (2021). https:\/\/doi.org\/10.1145\/3437378.3437391","DOI":"10.1145\/3437378.3437391"},{"key":"26_CR12","doi-asserted-by":"publisher","unstructured":"Reid, R., Van Niekerk, J.: From information security to cyber security cultures. In: Inforamation Security South Africa - Proceedings of the ISSA 2014 Conference, pp. 1\u20137 (2014). https:\/\/doi.org\/10.1109\/ISSA.2014.6950492","DOI":"10.1109\/ISSA.2014.6950492"},{"key":"26_CR13","unstructured":"Babate, I., Musa, A., Kida, M., Saidu, K.: State of cyber security: emerging threats landscape. Int. J. Adv. Res. Comput. Sci. Technol. (IJARCST 2015). 3, 113\u2013119 (2015)"},{"key":"26_CR14","doi-asserted-by":"publisher","unstructured":"Sayoc, V.R., Dolores, T.K., Lim, M.C., Sophia, L., Miguel, S.: Computer systems in analytical applications. Int J. Adv. Trends Comp. Sci. Eng.\u00a08(3), 195\u2013200 (2019).\u00a0https:\/\/doi.org\/10.30534\/ijatcse\/2019\/68832019","DOI":"10.30534\/ijatcse\/2019\/68832019"},{"key":"26_CR15","doi-asserted-by":"publisher","unstructured":"Mahfuth, A., Yussof, S., abu bakar, A., Ali, N.B., Abdallah, W.: A conceptual model for exploring the factors influencing information security culture. Int. J. Secur. Its Appl. 11, 15\u201326 (2017). https:\/\/doi.org\/10.14257\/ijsia.2017.11.5.02","DOI":"10.14257\/ijsia.2017.11.5.02"},{"key":"26_CR16","doi-asserted-by":"publisher","first-page":"9","DOI":"10.3390\/s21093267","volume":"21","author":"A Georgiadou","year":"2021","unstructured":"Georgiadou, A., Mouzakitis, S., Askounis, D.: Assessing mitre attack risk using a cyber-security culture framework. Sensors. 21, 9 (2021). https:\/\/doi.org\/10.3390\/s21093267","journal-title":"Sensors."},{"key":"26_CR17","unstructured":"Heerden, R. Van, Solms, S. Von, Vorster, J., Solms, S. Von, Vorster, J.: Major security incidents since 2014: an African perspective. In: IST-Africa Week Conference, pp. 1\u201311 (2018)"},{"key":"26_CR18","unstructured":"Allen, B.N.: Africa\u2019s evolving cyber threats, pp. 1\u20136. https:\/\/africacenter.org\/spotlight\/africa-evolving-cyber-threats\/ (2021)"},{"key":"26_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4102\/sajim.v23i1.1277","volume":"23","author":"J Chigada","year":"2021","unstructured":"Chigada, J., Madzinga, R.: Cyberattacks and threats during COVID-19: a systematic literature review. S. Afr. J. Inf. Manag. 23, 1 (2021). https:\/\/doi.org\/10.4102\/sajim.v23i1.1277","journal-title":"S. Afr. J. Inf. Manag."},{"key":"26_CR20","unstructured":"Dolley, C.: Cyberattacks: South Africa, you\u2019ve been hacked, Dailymaveric.\u00a0https:\/\/www.dailymaverick.co.za\/article\/2021-11-06-cyberattacks-south-africa-youve-been-hacked\/ (2021)"},{"key":"26_CR21","unstructured":"Interpol: INTERPOL report identifies top cyberthreats in Africa.\u00a0https:\/\/www.interpol.int\/en\/News-and-Events\/News\/2021\/INTERPOL-report-identifies-top-cyberthreats-in-Africa (2021)"},{"key":"26_CR22","doi-asserted-by":"publisher","unstructured":"Da Veiga, A.: A cybersecurity culture research philosophy and approach to develop a valid and reliable measuring instrument. Comput. Conf. SAI 2016. pp. 1006\u20131015 (2016). https:\/\/doi.org\/10.1109\/SAI.2016.7556102","DOI":"10.1109\/SAI.2016.7556102"},{"key":"26_CR23","doi-asserted-by":"crossref","unstructured":"Da Veiga, A., Astakhova, L.V., Botha, A., Herselman, M.: Defining organisational information security culture - perspectives from academia and industry. Comput. Secur. 92 (2020)","DOI":"10.1016\/j.cose.2020.101713"},{"key":"26_CR24","doi-asserted-by":"publisher","unstructured":"Nasir, A., Arshah, R.A., Ab Hamid, M.R.: Information security policy compliance behavior based on comprehensive dimensions of information security culture: aconceptual framework. In: ACM International Confernce Proceeding Ser. Part F1282, 56\u201360 (2017). https:\/\/doi.org\/10.1145\/3077584.3077593","DOI":"10.1145\/3077584.3077593"},{"key":"26_CR25","doi-asserted-by":"publisher","unstructured":"Alshaikh, M.: Developing cybersecurity culture to influence employee behavior: a practice perspective. Comput. Secur. 98 (2020). https:\/\/doi.org\/10.1016\/j.cose.2020.102003","DOI":"10.1016\/j.cose.2020.102003"},{"issue":"2","key":"26_CR26","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1111\/j.1471-1842.2009.00848.x","volume":"26","author":"MJ Grant","year":"2009","unstructured":"Grant, M.J., Booth, A.: A typology of reviews: an analysis of 14 review types and associated methodologies. Health Info. Libr. J. 26(2), 91\u2013108 (2009). https:\/\/doi.org\/10.1111\/j.1471-1842.2009.00848.x","journal-title":"Health Info. Libr. J."},{"key":"26_CR27","doi-asserted-by":"publisher","unstructured":"Moher, D., Liberati, A., Tetzlaff, J., Altman, D.G.: Preferred reporting Items for systematic reviews and meta-analyses: the PRISMA statement. PLoS Med 6(7) e1000097 (2009). https:\/\/doi.org\/10.1371\/journal.pmed.1000097","DOI":"10.1371\/journal.pmed.1000097"},{"key":"26_CR28","doi-asserted-by":"crossref","unstructured":"Hassan, N.H.: Information Security Culture in Health Informatics Environment\u202f: A Qualitative Approach. In: International Conference on Research and Innovation in Information Systems (ICRIIS), IEEE, pp. 1\u20136 (2017)","DOI":"10.1109\/ICRIIS.2017.8002450"},{"key":"26_CR29","doi-asserted-by":"crossref","unstructured":"Nasir, A., Rashid, M., Hamid, A.: Information Security Culture for Guiding Employee\u2019s Security Behaviour: A Pilot Study. In: 6th International Conference on Information Management (ICIM), IEEE, 205\u2013209 (2020)","DOI":"10.1109\/ICIM49319.2020.244699"},{"key":"26_CR30","unstructured":"Ikenwe, I.J., Igbinovia, O.M., Elogie, A.A.: Information Security in the Digital Age: The Case of Developing Countries. Chinese Librariansh. Int. Electron. J. 42, 16\u201324 (2016)"},{"issue":"3","key":"26_CR31","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1080\/10919392.2018.1484598","volume":"28","author":"S Kabanda","year":"2018","unstructured":"Kabanda, S., Tanner, M., Kent, C.: Exploring SME cybersecurity practices in developing countries. J. Organ. Comput. Electron. Commer. 28(3), 269\u2013282 (2018). https:\/\/doi.org\/10.1080\/10919392.2018.1484598","journal-title":"J. Organ. Comput. Electron. Commer."},{"key":"26_CR32","doi-asserted-by":"publisher","unstructured":"Uchendu, B., Nurse, J.R.C., Bada, M., Furnell, S.: Developing a cyber security culture: Current practices and future needs. Comput. Secur. 109, 102387 (2021). https:\/\/doi.org\/10.1016\/j.cose.2021.102387","DOI":"10.1016\/j.cose.2021.102387"},{"key":"26_CR33","unstructured":"Tolah, A., Furnell, S.M., Papadaki, M.: A Comprehensive Framework for Cultivating and Assessing Information Security Culture. In:\u00a011th International Symposium on Human Aspects of Information Security & Assurance, pp.\u00a0\u00a052\u201364 (2017)"},{"key":"26_CR34","unstructured":"Martins, N., Da Veiga, A.: An Information security culture model validated with structural equation modelling. In:\u00a0Human Aspects of Information Security & Assurance\u00a0HAISA, pp.\u00a011\u201321 (2015)"},{"key":"26_CR35","doi-asserted-by":"crossref","unstructured":"Reeg\u00e5rd, K.: The Concept of Cybersecurity Culture The Concept of Cybersecurity Culture. In: 29th\u00a0European Safety and Reliability Conference, pp. 4036\u20134043 (2019)","DOI":"10.3850\/978-981-11-2724-3_0761-cd"},{"key":"26_CR36","doi-asserted-by":"crossref","unstructured":"Ioannou, M., Stavrou, E., Bada, M.: Cybersecurity Culture in Computer Security Incident Response Teams. In: International Conference on Cyber Security and Protection of Digital Services (Cyber Security), pp. 1\u20134. IEEE (2019)","DOI":"10.1109\/CyberSecPODS.2019.8885240"},{"key":"26_CR37","doi-asserted-by":"publisher","unstructured":"Huang, K., Pearlson, K.: For what technology can\u2019t fix: Building a model of organizational cybersecurity culture. In: Annual Hawaii International Conference System Scince -Janua, pp. 6398\u20136407 (2019). https:\/\/doi.org\/10.24251\/hicss.2019.769","DOI":"10.24251\/hicss.2019.769"},{"key":"26_CR38","unstructured":"Van Niekerk, J., Von Solms, R.: Understanding Information Security Culture: A Conceptual Framework. In: Information Security South Africa - Proceedings ISSA, pp.\u00a01\u201310 (2006)"},{"key":"26_CR39","unstructured":"Schein, E.H.: Organisation Culture and Leadership. 3rd edn, p. 458. Wiley (2010)"},{"issue":"1","key":"26_CR40","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/s10551-017-3680-6","volume":"157","author":"M Woermann","year":"2017","unstructured":"Woermann, M., Engelbrecht, S.: The Ubuntu Challenge to Business: from Stakeholders to Relationholders. J. Bus. Ethics 157(1), 27\u201344 (2017). https:\/\/doi.org\/10.1007\/s10551-017-3680-6","journal-title":"J. Bus. Ethics"},{"key":"26_CR41","doi-asserted-by":"publisher","unstructured":"Adeleye, I., Luiz, J., Muthuri, J., Amaeshi, K.: J. Bus. Ethics 161(4), 717\u2013729 (2019). https:\/\/doi.org\/10.1007\/s10551-019-04338-x","DOI":"10.1007\/s10551-019-04338-x"},{"key":"26_CR42","doi-asserted-by":"crossref","unstructured":"Van Pinxteren, B.: Language of instruction in education in Africa: how new questions help generate new answers. Int. J. Educ. Dev. 88, 102524  (2022)","DOI":"10.1016\/j.ijedudev.2021.102524"},{"key":"26_CR43","first-page":"4","volume":"10","author":"J Ndiege","year":"2018","unstructured":"Ndiege, J., Okello, G.: Information security awareness amongst students joining higher academic institutions in developing countries: evidence from Kenya. African J. Inf. Syst. 10, 4 (2018)","journal-title":"African J. Inf. Syst."},{"key":"26_CR44","doi-asserted-by":"publisher","unstructured":"Al Hogail, A.: Cultivating and assessing an organizational information security culture; an empirical study. Int. J. Secur. its Appl. 9, 163\u2013178 (2015). https:\/\/doi.org\/10.14257\/ijsia.2015.9.7.15","DOI":"10.14257\/ijsia.2015.9.7.15"},{"key":"26_CR45","unstructured":"Aitchison, J.: South Africa's reading crisis is a cognitive catastrophe. The Conversation (2018). https:\/\/theconversation.com\/south-africas-reading-crisis-is-a-cognitive-catastrophe-89052"},{"key":"26_CR46","unstructured":"Stats SA South Africa\u2019s youth continues to bear the burden of unemployment (2022) https:\/\/www.statssa.gov.za\/?p=15407#:~:text=According%20to%20the%20Quarterly%20Labour,stands%20at%2034%2C5%25"}],"container-title":["Communications in Computer and Information Science","Advanced Research in Technologies, Information, Innovation and Sustainability"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-20316-9_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,24]],"date-time":"2022-11-24T19:22:01Z","timestamp":1669317721000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-20316-9_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031203152","9783031203169"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-20316-9_26","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"25 November 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ARTIIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Research in Technologies, Information, Innovation and Sustainability","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Santiago de Compostela","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 September 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 September 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"artiis2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/artiis.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easy chair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"191","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"72","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"38% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}