{"id":"https://openalex.org/W1448762856","doi":"https://doi.org/10.4018/ijcwt.2015010101","title":"A Strategic Framework for a Secure Cyberspace in Developing Countries with Special Emphasis on the Risk of Cyber Warfare","display_name":"A Strategic Framework for a Secure Cyberspace in Developing Countries with Special Emphasis on the Risk of Cyber Warfare","publication_year":2015,"publication_date":"2015-01-01","ids":{"openalex":"https://openalex.org/W1448762856","doi":"https://doi.org/10.4018/ijcwt.2015010101","mag":"1448762856"},"language":"en","primary_location":{"id":"doi:10.4018/ijcwt.2015010101","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijcwt.2015010101","pdf_url":null,"source":{"id":"https://openalex.org/S4210168647","display_name":"International Journal of Cyber Warfare and Terrorism","issn_l":"1947-3435","issn":["1947-3435","1947-3443"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Cyber Warfare and Terrorism","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020501805","display_name":"Victor Jaquire","orcid":"https://orcid.org/0000-0002-8856-9466"},"institutions":[{"id":"https://openalex.org/I24027795","display_name":"University of Johannesburg","ror":"https://ror.org/04z6c2n17","country_code":"ZA","type":"education","lineage":["https://openalex.org/I24027795"]}],"countries":["ZA"],"is_corresponding":true,"raw_author_name":"Victor Jaquire","raw_affiliation_strings":["University of Johannesburg, Johannesburg, South Africa"],"affiliations":[{"raw_affiliation_string":"University of Johannesburg, Johannesburg, South Africa","institution_ids":["https://openalex.org/I24027795"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5113458128","display_name":"Basie von Solms","orcid":null},"institutions":[{"id":"https://openalex.org/I24027795","display_name":"University of Johannesburg","ror":"https://ror.org/04z6c2n17","country_code":"ZA","type":"education","lineage":["https://openalex.org/I24027795"]}],"countries":["ZA"],"is_corresponding":false,"raw_author_name":"Basie von Solms","raw_affiliation_strings":["University of Johannesburg, Johannesburg, South Africa"],"affiliations":[{"raw_affiliation_string":"University of Johannesburg, Johannesburg, South Africa","institution_ids":["https://openalex.org/I24027795"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5020501805"],"corresponding_institution_ids":["https://openalex.org/I24027795"],"apc_list":null,"apc_paid":null,"fwci":1.7377,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.87348309,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":"5","issue":"1","first_page":"1","last_page":"18"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9689000248908997,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cyberspace","display_name":"Cyberspace","score":0.9383549094200134},{"id":"https://openalex.org/keywords/developing-country","display_name":"Developing country","score":0.7118203639984131},{"id":"https://openalex.org/keywords/cybercrime","display_name":"Cybercrime","score":0.6155792474746704},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.608009397983551},{"id":"https://openalex.org/keywords/cyberwarfare","display_name":"Cyberwarfare","score":0.5016322135925293},{"id":"https://openalex.org/keywords/national-security","display_name":"National security","score":0.48308494687080383},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.4097147583961487},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.31616902351379395},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.29093068838119507},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.22252041101455688},{"id":"https://openalex.org/keywords/economic-growth","display_name":"Economic growth","score":0.1975862681865692},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.1575099527835846},{"id":"https://openalex.org/keywords/economics","display_name":"Economics","score":0.1570741832256317}],"concepts":[{"id":"https://openalex.org/C2781241145","wikidata":"https://www.wikidata.org/wiki/Q204606","display_name":"Cyberspace","level":3,"score":0.9383549094200134},{"id":"https://openalex.org/C83864248","wikidata":"https://www.wikidata.org/wiki/Q177323","display_name":"Developing country","level":2,"score":0.7118203639984131},{"id":"https://openalex.org/C2779390178","wikidata":"https://www.wikidata.org/wiki/Q29137","display_name":"Cybercrime","level":3,"score":0.6155792474746704},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.608009397983551},{"id":"https://openalex.org/C171769113","wikidata":"https://www.wikidata.org/wiki/Q849340","display_name":"Cyberwarfare","level":2,"score":0.5016322135925293},{"id":"https://openalex.org/C528167355","wikidata":"https://www.wikidata.org/wiki/Q258307","display_name":"National security","level":2,"score":0.48308494687080383},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.4097147583961487},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.31616902351379395},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.29093068838119507},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.22252041101455688},{"id":"https://openalex.org/C50522688","wikidata":"https://www.wikidata.org/wiki/Q189833","display_name":"Economic growth","level":1,"score":0.1975862681865692},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.1575099527835846},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.1570741832256317},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.4018/ijcwt.2015010101","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijcwt.2015010101","pdf_url":null,"source":{"id":"https://openalex.org/S4210168647","display_name":"International Journal of Cyber Warfare and Terrorism","issn_l":"1947-3435","issn":["1947-3435","1947-3443"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Cyber Warfare and Terrorism","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:igg:jcwt00:v:5:y:2015:i:1:p:1-18","is_oa":false,"landing_page_url":"http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJCWT.2015010101","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals","score":0.5199999809265137}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":2,"referenced_works":["https://openalex.org/W1567474684","https://openalex.org/W2286041318"],"related_works":["https://openalex.org/W2770815270","https://openalex.org/W2224562903","https://openalex.org/W645184114","https://openalex.org/W1738949543","https://openalex.org/W598182546","https://openalex.org/W57599683","https://openalex.org/W2990859193","https://openalex.org/W2579695776","https://openalex.org/W1448762856","https://openalex.org/W4242749501"],"abstract_inverted_index":{"The":[0,227],"objective":[1],"of":[2,20,35,86,111,143,147,201,213,284],"this":[3,237,260],"paper":[4],"is":[5,101,114,176,239],"to":[6,30,62,90,128,157,185,188,204,222,278,281,301],"provide":[7],"a":[8,12,26,95,105,122,137,182,214,242],"strategic":[9,183,296],"framework":[10,184,297],"for":[11,57,72,79,107,230,265,298,313],"secure":[13,186,302],"cyberspace":[14,304],"in":[15,60,99,220,236],"developing":[16,27,42,58,80,96,141,164,215,257,285,299],"countries,":[17,286],"taking":[18],"cognisance":[19],"the":[21,33,91,112,144,158,202,231,261,282,290],"realities":[22,93,162],"and":[23,29,38,52,77,109,126,161,173,195,234,251,256,269,287,292,322],"constraints":[24],"within":[25,47,94,163],"milieu;":[28],"discuss":[31,189],"if":[32],"risk":[34],"cyber":[36,66,145,190],"warfare":[37],"related":[39,53,67],"techniques":[40],"against":[41,65],"countries":[43,59,81,88,118,142,300,316],"should":[44],"be":[45,153,310],"addressed":[46],"\u2018The":[48],"Framework'.":[49],"Cybersecurity":[50],"policies":[51,76,125,250,268,321],"strategies":[54,78,252,270],"are":[55],"required":[56],"order":[61],"effectively":[63],"safeguard":[64],"threats":[68],"(the":[69],"same":[70],"as":[71,104,167,199,211],"developed":[73,87,148,255],"countries).":[74],"These":[75,273],"will":[82,150,309],"differ":[83],"from":[84,253],"those":[85,314],"due":[89,156],"unique":[92,159],"world.":[97],"Africa":[98],"specific":[100],"presently":[102],"seen":[103],"hotbed":[106],"cybercrime,":[108],"one":[110],"reasons":[113],"that":[115,136],"many":[116],"African":[117,315],"do":[119],"not":[120,151],"have":[121],"proper":[123],"framework,":[124],"procedures":[127],"properly":[129],"protect":[130,205],"cyberspace.":[131],"Experience":[132],"has":[133],"also":[134,177],"shown":[135],"pure":[138],"adoption":[139],"by":[140],"frameworks":[146],"nations":[149],"always":[152],"effective,":[154],"especially":[155],"requirements":[160,283],"worlds,":[165],"such":[166],"limited":[168],"resources,":[169],"infrastructure,":[170],"technologies,":[171],"skills":[172],"experience.":[174],"It":[175],"necessary":[178],"when":[179],"talking":[180],"about":[181],"cyberspace,":[187],"warfare,":[191],"its":[192,196],"general":[193],"application":[194],"possible":[197],"utilisation":[198],"part":[200,212],"strategy":[203,219],"national":[206,217,266],"critical":[207],"information":[208],"infrastructure.":[209],"This,":[210],"country's":[216],"security":[218],"addition":[221],"traditional":[223],"cybersecurity":[224,249,267],"defence":[225],"measures.":[226],"approach":[228],"taken":[229],"research":[232],"program,":[233],"discussed":[235],"paper,":[238],"based":[240],"on":[241,246],"comprehensive":[243],"literature":[244],"study":[245],"several":[247],"existing":[248],"both":[254],"countries.":[258],"From":[259],"drivers":[262,274],"/":[263],"elements":[264],"were":[271,275],"identified.":[272],"than":[276],"adapted":[277,293],"specifically":[279],"relate":[280],"then,":[288],"utilising":[289],"identified":[291],"drivers,":[294],"our":[295],"their":[303],"was":[305],"developed.":[306],"This":[307],"document":[308],"very":[311],"useful":[312],"venturing":[317],"into":[318],"defining":[319],"relevant":[320],"procedures.":[323]},"counts_by_year":[{"year":2020,"cited_by_count":2},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
