Have a personal or library account? Click to login
A Phenomenological Study of the Lived Experiences of it and Cybersecurity Professionals in Botswana: Investigating the Perceived Leadership Effect on Supply Chain Cybersecurity  Cover

A Phenomenological Study of the Lived Experiences of it and Cybersecurity Professionals in Botswana: Investigating the Perceived Leadership Effect on Supply Chain Cybersecurity

Open Access
|Aug 2023

References

  1. Bada, M., Solms, B.V., & Agrafiotis, I. (2018). Reviewing National Cybersecurity Awareness in Africa: An Empirical Study, 6.
  2. Boyes, H. (2015). Cybersecurity and Cyber-Resilient Supply Chains. Technology Innovation Management Review.
  3. Central Intelligence Agency. (2023). Botswana. In The World Factbook. Available at: https://www.cia.gov/the-world-factbook/countries/botswana/
  4. Creswell, J.W., & Creswell, J.D. (2018). Research design: Qualitative, quantitative, and mixed methods approaches (5th Edition). SAGE.
  5. Dawson, M. (2017). Hyper-connectivity: intricacies of national and international cyber securities. Doctoral thesis, London Metropolitan University.
  6. Ghadge, A., Weiß, M., Caldwell, N.D., & Wilding, R. (2019). Managing cyber risk in supply chains: A review and research agenda. Supply Chain Management: An International Journal, Vol. 25, Issue 2, 223-240. Available at: https://doi.org/10.1108/SCM-10-2018-0357
  7. International Organization for Standardization. (2023). Iso/iec 27001 standard – information security management systems. ISO. Available at: https://www.iso.org/standard/27001
  8. INTERPOL. (2020). Online African organized crime from surface to dark web.
  9. Joint Task Force. (2020). Security and privacy controls for information systems and organizations (NIST Special Publication (SP) 800-53 Rev. 5). National Institute of Standards and Technology. Available at: https://doi.org/10.6028/NIST.SP.800-53r5
  10. Kabanda, S., Tanner, M., & Kent, C. (2018). Exploring SME cybersecurity practices in developing countries. Journal of Organizational Computing and Electronic Commerce, Vol. 28, Issue 3, 269-282. Available at: https://doi.org/10.1080/10919392.2018.1484598
  11. Kshetri, N. (2019). Cybercrime and Cybersecurity in Africa. Journal of Global Information Technology Management, Vol. 22, Issue 2, 77-81. Available at: https://doi.org/10.1080/1097198X.2019.1603527
  12. Ministry of Transport and Communications. (n.d.). National Cybersecurity Strategy. Republic of Botswana.
  13. Peoples, K. (2021). How to write a phenomenological dissertation: A step-by-step guide. 1st Edition, SAGE Publications, Inc.
  14. Reva, D. (2020). Maritime cyber security: Getting Africa ready. Institute of Security Studies.
  15. Sarefo, S., Dawson, M., & Banyatsang, M. (2023). An exploratory analysis of the cybersecurity threat landscape for Botswana. Procedia Computer Science, Vol. 219, 1012-1022. Available at: https://doi.org/10.1016/j.procs.2023.01.379
  16. Southern African Development Community. (2023). Available at: https://www.sadc.int/
  17. Webster, J., & Watson, R.T. (2002). Analyzing the Past to Prepare for the Future: Writing a Literature Review. MIS Quarterly (26, 2), xiii-xxiii.
DOI: https://doi.org/10.2478/raft-2023-0022 | Journal eISSN: 3100-5071 | Journal ISSN: 3100-5063
Language: English
Page range: 179 - 191
Published on: Aug 28, 2023
Published by: Nicolae Balcescu Land Forces Academy
In partnership with: Paradigm Publishing Services
Publication frequency: 4 times per year

© 2023 Andreas Vassilakos, Ronald Martin, published by Nicolae Balcescu Land Forces Academy
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.