{"title":"非洲农村服务不足社区的网络安全实践:来自纳米比亚北部的案例研究","authors":"G. Nhinda, Fungai Bhunu Shava","doi":"10.1109/icABCD59051.2023.10220449","DOIUrl":null,"url":null,"abstract":"Globally, Information Communication Technology (ICT) device usage has seen a steep rise over the last few years. This also holds in developing countries, which have embarked on connecting the unconnected or previously disadvantaged parts of their populations. This connectivity enables people to interact with cyberspace, which brings opportunities and challenges. Opportunities such as the ability to conduct business online, attend online education, and perform online banking activities. Challenges experienced are the cost of Internet access and more worrying cyber-risks and potential for exploitation. There remain pockets of communities that experience sporadic connectivity to cyberspace, these communities tend to be more susceptible to cyber-attacks due to issues of lack/limited awareness of cyber secure practices, an existent culture that might be exploited by cybercriminals, and overall, a lackluster approach to their cyber-hygiene. We present a qualitative study conducted in rural Northern Namibia. Our findings indicate that both secure and insecure cybersecurity practices exist. However, through the Ubuntu and Uushiindaism Afrocentric lenses, practices such as sharing mobile devices without passwords among the community mirror community unity. Practices such as this in mainstream research can be considered insecure. We also propose interrogating “common” secure cybersecurity practices in their universality of applicability.","PeriodicalId":2,"journal":{"name":"ACS Applied Bio Materials","volume":null,"pages":null},"PeriodicalIF":4.6000,"publicationDate":"2023-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Cybersecurity Practices of Rural Underserved Communities in Africa: A Case Study from Northern Namibia\",\"authors\":\"G. Nhinda, Fungai Bhunu Shava\",\"doi\":\"10.1109/icABCD59051.2023.10220449\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Globally, Information Communication Technology (ICT) device usage has seen a steep rise over the last few years. This also holds in developing countries, which have embarked on connecting the unconnected or previously disadvantaged parts of their populations. This connectivity enables people to interact with cyberspace, which brings opportunities and challenges. Opportunities such as the ability to conduct business online, attend online education, and perform online banking activities. Challenges experienced are the cost of Internet access and more worrying cyber-risks and potential for exploitation. There remain pockets of communities that experience sporadic connectivity to cyberspace, these communities tend to be more susceptible to cyber-attacks due to issues of lack/limited awareness of cyber secure practices, an existent culture that might be exploited by cybercriminals, and overall, a lackluster approach to their cyber-hygiene. We present a qualitative study conducted in rural Northern Namibia. Our findings indicate that both secure and insecure cybersecurity practices exist. However, through the Ubuntu and Uushiindaism Afrocentric lenses, practices such as sharing mobile devices without passwords among the community mirror community unity. Practices such as this in mainstream research can be considered insecure. We also propose interrogating “common” secure cybersecurity practices in their universality of applicability.\",\"PeriodicalId\":2,\"journal\":{\"name\":\"ACS Applied Bio Materials\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":4.6000,\"publicationDate\":\"2023-08-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"ACS Applied Bio Materials\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://doi.org/10.1109/icABCD59051.2023.10220449\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"MATERIALS SCIENCE, BIOMATERIALS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACS Applied Bio Materials","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1109/icABCD59051.2023.10220449","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"MATERIALS SCIENCE, BIOMATERIALS","Score":null,"Total":0}
Cybersecurity Practices of Rural Underserved Communities in Africa: A Case Study from Northern Namibia
Globally, Information Communication Technology (ICT) device usage has seen a steep rise over the last few years. This also holds in developing countries, which have embarked on connecting the unconnected or previously disadvantaged parts of their populations. This connectivity enables people to interact with cyberspace, which brings opportunities and challenges. Opportunities such as the ability to conduct business online, attend online education, and perform online banking activities. Challenges experienced are the cost of Internet access and more worrying cyber-risks and potential for exploitation. There remain pockets of communities that experience sporadic connectivity to cyberspace, these communities tend to be more susceptible to cyber-attacks due to issues of lack/limited awareness of cyber secure practices, an existent culture that might be exploited by cybercriminals, and overall, a lackluster approach to their cyber-hygiene. We present a qualitative study conducted in rural Northern Namibia. Our findings indicate that both secure and insecure cybersecurity practices exist. However, through the Ubuntu and Uushiindaism Afrocentric lenses, practices such as sharing mobile devices without passwords among the community mirror community unity. Practices such as this in mainstream research can be considered insecure. We also propose interrogating “common” secure cybersecurity practices in their universality of applicability.