{"title":"Cybersecurity Practices of Rural Underserved Communities in Africa: A Case Study from Northern Namibia","authors":"G. Nhinda, Fungai Bhunu Shava","doi":"10.1109/icABCD59051.2023.10220449","DOIUrl":null,"url":null,"abstract":"Globally, Information Communication Technology (ICT) device usage has seen a steep rise over the last few years. This also holds in developing countries, which have embarked on connecting the unconnected or previously disadvantaged parts of their populations. This connectivity enables people to interact with cyberspace, which brings opportunities and challenges. Opportunities such as the ability to conduct business online, attend online education, and perform online banking activities. Challenges experienced are the cost of Internet access and more worrying cyber-risks and potential for exploitation. There remain pockets of communities that experience sporadic connectivity to cyberspace, these communities tend to be more susceptible to cyber-attacks due to issues of lack/limited awareness of cyber secure practices, an existent culture that might be exploited by cybercriminals, and overall, a lackluster approach to their cyber-hygiene. We present a qualitative study conducted in rural Northern Namibia. Our findings indicate that both secure and insecure cybersecurity practices exist. However, through the Ubuntu and Uushiindaism Afrocentric lenses, practices such as sharing mobile devices without passwords among the community mirror community unity. Practices such as this in mainstream research can be considered insecure. We also propose interrogating “common” secure cybersecurity practices in their universality of applicability.","PeriodicalId":51314,"journal":{"name":"Big Data","volume":null,"pages":null},"PeriodicalIF":2.6000,"publicationDate":"2023-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Big Data","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1109/icABCD59051.2023.10220449","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS","Score":null,"Total":0}
引用次数: 0
Abstract
Globally, Information Communication Technology (ICT) device usage has seen a steep rise over the last few years. This also holds in developing countries, which have embarked on connecting the unconnected or previously disadvantaged parts of their populations. This connectivity enables people to interact with cyberspace, which brings opportunities and challenges. Opportunities such as the ability to conduct business online, attend online education, and perform online banking activities. Challenges experienced are the cost of Internet access and more worrying cyber-risks and potential for exploitation. There remain pockets of communities that experience sporadic connectivity to cyberspace, these communities tend to be more susceptible to cyber-attacks due to issues of lack/limited awareness of cyber secure practices, an existent culture that might be exploited by cybercriminals, and overall, a lackluster approach to their cyber-hygiene. We present a qualitative study conducted in rural Northern Namibia. Our findings indicate that both secure and insecure cybersecurity practices exist. However, through the Ubuntu and Uushiindaism Afrocentric lenses, practices such as sharing mobile devices without passwords among the community mirror community unity. Practices such as this in mainstream research can be considered insecure. We also propose interrogating “common” secure cybersecurity practices in their universality of applicability.
Big DataCOMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS-COMPUTER SCIENCE, THEORY & METHODS
CiteScore
9.10
自引率
2.20%
发文量
60
期刊介绍:
Big Data is the leading peer-reviewed journal covering the challenges and opportunities in collecting, analyzing, and disseminating vast amounts of data. The Journal addresses questions surrounding this powerful and growing field of data science and facilitates the efforts of researchers, business managers, analysts, developers, data scientists, physicists, statisticians, infrastructure developers, academics, and policymakers to improve operations, profitability, and communications within their businesses and institutions.
Spanning a broad array of disciplines focusing on novel big data technologies, policies, and innovations, the Journal brings together the community to address current challenges and enforce effective efforts to organize, store, disseminate, protect, manipulate, and, most importantly, find the most effective strategies to make this incredible amount of information work to benefit society, industry, academia, and government.
Big Data coverage includes:
Big data industry standards,
New technologies being developed specifically for big data,
Data acquisition, cleaning, distribution, and best practices,
Data protection, privacy, and policy,
Business interests from research to product,
The changing role of business intelligence,
Visualization and design principles of big data infrastructures,
Physical interfaces and robotics,
Social networking advantages for Facebook, Twitter, Amazon, Google, etc,
Opportunities around big data and how companies can harness it to their advantage.