The primary contribution of this study was the
designing and validation of an African information
security awareness and compliance model.
Fundamentally, this model and its theoretical
foundations extended the body of existing knowledge
and also assisted in proving that indeed an African
philosophy based awareness campaign will produce
better results in Africa as compared to the Western
philosophy based.
ACKNOWLEDGEMENTS
I would like to thank ABSA bank for a research grant
that made this research possible.
REFERENCES
Afro-centric Alliance, A. (2001). Indigenising organisational
change: Localisation in Tanzania and Malawi. Journal of
Managerial Psychology, 16(1), 59–78.
Ajzen, I. (2011). The theory of planned behaviour:
Reactions and reflections. Taylor & Francis.
Allam, S., Flowerday, S. V., & Flowerday, E. (2014).
Smartphone information security awareness: A victim of
operational pressures. Computers & Security, 42, 56–65.
Alshboul, Y., & Streff, K. (2017). Beyond Cybersecurity
Awareness: Antecedents and Satisfaction. Proceedings
of the 2017 International Conference on Software and
E-Business, 85–91. https://doi.org/10.1145/3178212.
3178218
Bauer, S., Bernroider, E. W. N., & Chudzikowski, K.
(2017). Prevention is better than cure! Designing
information security awareness programs to overcome
users’ non-compliance with information security
policies in banks. Computers & Security, 68, 145–159.
https://doi.org/10.1016/j.cose.2017.04.009
Broodryk, J. (2005). Ubuntu management philosophy:
Exporting ancient African wisdom into the global
world. Knowres Publishing.
Chitumba, W. (2013). University education for personhood
through ubuntu philosophy. International Journal of
Asian Social Science, 3(5), 1268–1276.
Chua, H. N., Wong, S. F., Low, Y. C., & Chang, Y. (2018).
Impact of employees’ demographic characteristics on
the awareness and compliance of information security
policy in organizations. Telematics and Informatics,
35(6), 1770–1780. https://doi.org/10.1016/j.tele.2018.
05.005
Davison, R., Martinsons, M. G., & Kock, N. (2004).
Principles of canonical action research. Information
Systems Journal, 14(1), 65–86.
Dearden, J., & Miller, A. (2006). Effective multi-agency
working: A grounded theory of ‘high profile’ casework
that resulted in a positive outcome for a young person
in public care. Educational and Child Psychology,
23(4), 91–103. https://doi.org/10.4314/sajpem.v26i4.
31495
Fraser-Moleketi, G. (2009). Towards a common
understanding of corruption in Africa. Public Policy
and Administration, 24(3), 331–338.
Gianan, N. (2011). Delving into the ethical dimension of
Ubuntu philosophy. Cultura, 8(1), 63–82.
Gianan, N. A. (2010). Valuing the emergence of Ubuntu
philosophy. Cultura International Journal of
Philosophy of Culture and Axiology, 7(1), 86–96.
Gundu, T. (2019a). Acknowledging and Reducing the
Knowing and Doing gap in Employee Cybersecurity
Compliance—ProQuest. International Conference on
Cyber Warfare and Security
. Presented at the
International Conference on Cyber Warfare and Security,
Stellenbosch. Retrieved from https://search.proquest.
com/openview/e99648655450412b824882dd31b16e8b/
1?pq-origsite=gscholar&cbl=396500
Gundu, T. (2019b). Big Data, Big Security, and Privacy
Risks: Bridging Employee Knowledge and Actions
Gap | Journal of Information Warfare. Journal of
Information Warfare, 18(2), 15–30.
Gundu, T., Maronga, M., & Boucher, D. (2019). Industry
4.0 Businesses Environments: Fostering Cyber Security
Culture in a Culturally Diverse workplace. Kalpa
Publications in Computing, 12, 85–94.
https://doi.org/10.29007/r64x
Gundu, T., & Maronga, V. (2019). IoT Security and
Privacy: Turning on the Human Firewall in Smart
Farming. Kalpa Publications in Computing, 12, 95–
104. https://doi.org/10.29007/j2z7
Herath, T., & Rao, H. R. (2009). Encouraging information
security behaviors in organizations: Role of penalties,
pressures and perceived effectiveness. Decision
Support Systems, 47(2), 154–165.
Ifinedo, P. (2014). Information systems security policy
compliance: An empirical study of the effects of
socialisation, influence, and cognition. Information &
Management, 51(1), 69–79.
Khomba, J. K., & Kangaude-Ulaya, E. C. (2013).
Indigenisation of corporate strategies in Africa:
Lessons from the African ubuntu philosophy. China-
USA Business Review, 12(7).
Kruger, H. A., & Kearney, W. D. (2005). Measuring
information security awareness: A West Africa gold
mining environment case study.
Mangaliso, M. P., Mangaliso, Z., Knipes, B. J., Jean-Denis,
H., & Ndanga, L. (2018). Invoking Ubuntu Philosophy
as a Source of Harmonious Organizational
Management. Academy of Management Proceedings,
2018(1), 15007. https://doi.org/10.5465/AMBPP.2018.
15007abstract
McCormac, A., Calic, D., Parsons, K., Butavicius, M.,
Pattinson, M., & Lillie, M. (2018). The effect of
resilience and job stress on information security
awareness. Information and Computer Security, 26(3),
277–289. https://doi.org/10.1108/ICS-03-2018-0032
Moorman, R. H., & Blakely, G. L. (1995). Individualism-
collectivism as an individual difference predictor of
organizational citizenship behavior. Journal of