<font face="Default Sans Serif,Verdana,Arial,Helvetica,sans-serif" size="2">Please consider submitting a paper to the Special Issue of the Journal of Information Technology for Development on <i>Cyber-Security for Development</i>.<div><br></div><div><!--StartFragment-->
<p class="MsoNormal" align="left" style="text-align:left"><span style="font-size:
11.0pt;mso-bidi-font-size:12.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;
mso-hansi-theme-font:major-latin">In this special issue our focus is on
Cyber-Security within the context of Developing Countries. Of particular
relevance are papers that offer theoretical or design science contributions
that relate to the concepts of Cyber-Security within the context of National
Development agendas. </span><span style="font-size:11.0pt;mso-bidi-font-size:
12.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-fareast-font-family:
Cambria;mso-fareast-theme-font:minor-latin;mso-hansi-theme-font:major-latin">The
related concept of Cyber-Power (i.e. <i style="mso-bidi-font-style:normal">the
ability to use cyberspace to create advantages and influence events within
& outside of cyberspace</i>) is also relevant to this special issue</span><span style="font-size:11.0pt;mso-bidi-font-size:12.0pt;font-family:Calibri;
mso-ascii-theme-font:major-latin;mso-hansi-theme-font:major-latin">. <o:p></o:p></span></p>
<p class="MsoNormal" align="left" style="text-align:left"><span class="Apple-style-span" style="font-family: Calibri, helvetica, arial, sans-serif; font-size: 21px; ">Topics of relevance to this special issue
include but are not limited to the following:</span></p><p class="MsoNormal"><o:p><table class="MsoTableGrid" border="0" cellspacing="0" cellpadding="0" style="border-collapse:collapse;mso-yfti-tbllook:191;mso-padding-alt:0in 5.4pt 0in 5.4pt"><tbody><tr style="mso-yfti-irow:0;mso-yfti-firstrow:yes"><td width="239" valign="top" style="width:239.4pt;padding:0in 5.4pt 0in 5.4pt"><p class="MsoListParagraphCxSpFirst" align="left" style="margin-left:.25in;
mso-add-space:auto;text-align:left;text-indent:-.25in;mso-list:l0 level1 lfo1"><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";
mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">
</span></span></span><span style="font-size:11.0pt;mso-bidi-font-size:
10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-hansi-theme-font:
major-latin">Norms for Cyber-Security in Developing Countries<o:p></o:p></span></p><p class="MsoListParagraphCxSpMiddle" align="left" style="margin-left:.25in;
mso-add-space:auto;text-align:left;text-indent:-.25in;mso-list:l0 level1 lfo1"><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";
mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">
</span></span></span><span style="font-size:11.0pt;mso-bidi-font-size:
10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-hansi-theme-font:
major-latin">Cyber-Warfare & National Development;<o:p></o:p></span></p><p class="MsoListParagraphCxSpMiddle" align="left" style="margin-left:.25in;
mso-add-space:auto;text-align:left;text-indent:-.25in;mso-list:l0 level1 lfo1"><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";
mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">
</span></span></span><span style="font-size:11.0pt;mso-bidi-font-size:
10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-hansi-theme-font:
major-latin">Cyber-Peace & National Development<o:p></o:p></span></p><p class="MsoListParagraphCxSpMiddle" align="left" style="margin-left:.25in;
mso-add-space:auto;text-align:left;text-indent:-.25in;mso-list:l0 level1 lfo1"><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";
mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">
</span></span></span><span style="font-size:11.0pt;mso-bidi-font-size:
10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-hansi-theme-font:
major-latin">Cyber-Power & Destabilization<o:p></o:p></span></p><p class="MsoListParagraphCxSpMiddle" align="left" style="margin-left:.25in;
mso-add-space:auto;text-align:left;text-indent:-.25in;mso-list:l0 level1 lfo1"><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";
mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">
</span></span></span><span style="font-size:11.0pt;mso-bidi-font-size:
10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-hansi-theme-font:
major-latin">National Security, Disinformation & National Development<o:p></o:p></span></p><p class="MsoListParagraphCxSpMiddle" align="left" style="margin-left:.25in;
mso-add-space:auto;text-align:left;text-indent:-.25in;mso-list:l0 level1 lfo1"><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";
mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">
</span></span></span><span style="font-size:11.0pt;mso-bidi-font-size:
10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-hansi-theme-font:
major-latin">Cyber-Security and the Protection of Children<o:p></o:p></span></p><p class="MsoListParagraphCxSpMiddle" align="left" style="margin-left:.25in;
mso-add-space:auto;text-align:left;text-indent:-.25in;mso-list:l0 level1 lfo1"><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";
mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">
</span></span></span><span style="font-size:11.0pt;mso-bidi-font-size:
10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-hansi-theme-font:
major-latin">Cyber-Security Impact Assessment for ICT<o:p></o:p></span></p><p class="MsoListParagraphCxSpMiddle" align="left" style="margin-left:.25in;
mso-add-space:auto;text-align:left"><span style="font-size:11.0pt;mso-bidi-font-size:
10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-hansi-theme-font:
major-latin"><o:p> </o:p></span></p></td><td width="239" valign="top" style="width:239.4pt;padding:0in 5.4pt 0in 5.4pt"><p class="MsoListParagraphCxSpMiddle" align="left" style="margin-left:.25in;
mso-add-space:auto;text-align:left;text-indent:-.25in;mso-pagination:none;
mso-list:l0 level1 lfo1;mso-layout-grid-align:none;text-autospace:none"><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";
mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">
</span></span></span><span style="font-size:11.0pt;mso-bidi-font-size:
10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-fareast-font-family:
Cambria;mso-fareast-theme-font:minor-latin;mso-hansi-theme-font:major-latin;
mso-bidi-font-family:Helvetica">Cloud Computing & the Protection of
Critical National Assets<o:p></o:p></span></p><p class="MsoListParagraphCxSpMiddle" align="left" style="margin-left:.25in;
mso-add-space:auto;text-align:left;text-indent:-.25in;mso-pagination:none;
mso-list:l0 level1 lfo1;mso-layout-grid-align:none;text-autospace:none"><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";
mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">
</span></span></span><span style="font-size:11.0pt;mso-bidi-font-size:
10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-fareast-font-family:
Cambria;mso-fareast-theme-font:minor-latin;mso-hansi-theme-font:major-latin;
mso-bidi-font-family:Helvetica">Trust and Data Security <o:p></o:p></span></p><p class="MsoListParagraphCxSpMiddle" align="left" style="margin-left:.25in;
mso-add-space:auto;text-align:left;text-indent:-.25in;mso-pagination:none;
mso-list:l0 level1 lfo1;mso-layout-grid-align:none;text-autospace:none"><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";
mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">
</span></span></span><span style="font-size:11.0pt;mso-bidi-font-size:
10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-fareast-font-family:
Cambria;mso-fareast-theme-font:minor-latin;mso-hansi-theme-font:major-latin;
mso-bidi-font-family:Helvetica">Cyber-Security Infrastructure for Developing
Countries<o:p></o:p></span></p><p class="MsoListParagraphCxSpMiddle" align="left" style="margin-left:.25in;
mso-add-space:auto;text-align:left;text-indent:-.25in;mso-pagination:none;
mso-list:l0 level1 lfo1;mso-layout-grid-align:none;text-autospace:none"><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";
mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">
</span></span></span><span style="font-size:11.0pt;mso-bidi-font-size:
10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-fareast-font-family:
Cambria;mso-fareast-theme-font:minor-latin;mso-hansi-theme-font:major-latin;
mso-bidi-font-family:Helvetica">Designing Effective & Efficient
Cyber-Security Solutions for Developing Countries<o:p></o:p></span></p><p class="MsoListParagraphCxSpMiddle" align="left" style="margin-left:.25in;
mso-add-space:auto;text-align:left;text-indent:-.25in;mso-pagination:none;
mso-list:l0 level1 lfo1;mso-layout-grid-align:none;text-autospace:none"><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";
mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">
</span></span></span><span style="font-size:11.0pt;mso-bidi-font-size:
10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-fareast-font-family:
Cambria;mso-fareast-theme-font:minor-latin;mso-hansi-theme-font:major-latin;
mso-bidi-font-family:Helvetica">Capacity Building for Cyber-Security for
Developing Countries<o:p></o:p></span></p><p class="MsoListParagraphCxSpLast" align="left" style="margin-left:.25in;
mso-add-space:auto;text-align:left;mso-pagination:none;mso-layout-grid-align:
none;text-autospace:none"><span style="font-size:11.0pt;mso-bidi-font-size:
10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-fareast-font-family:
Cambria;mso-fareast-theme-font:minor-latin;mso-hansi-theme-font:major-latin;
mso-bidi-font-family:Helvetica"><o:p> </o:p></span></p></td></tr><tr style="mso-yfti-irow:1;mso-yfti-lastrow:yes"><td width="239" valign="top" style="width:239.4pt;padding:0in 5.4pt 0in 5.4pt"><p class="MsoListParagraphCxSpFirst" align="left" style="margin-left:.25in;
mso-add-space:auto;text-align:left;text-indent:-.25in;mso-list:l0 level1 lfo1"><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";
mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">
</span></span></span><span style="font-size:11.0pt;mso-bidi-font-size:
10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-fareast-font-family:
Cambria;mso-fareast-theme-font:minor-latin;mso-hansi-theme-font:major-latin;
mso-bidi-font-family:Helvetica">Security, Trust and Privacy</span><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:Calibri;
mso-ascii-theme-font:major-latin;mso-hansi-theme-font:major-latin"><o:p></o:p></span></p><p class="MsoListParagraphCxSpMiddle" align="left" style="margin-left:.25in;
mso-add-space:auto;text-align:left;text-indent:-.25in;mso-pagination:none;
mso-list:l0 level1 lfo1;mso-layout-grid-align:none;text-autospace:none"><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";
mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">
</span></span></span><span style="font-size:11.0pt;mso-bidi-font-size:
10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-fareast-font-family:
Cambria;mso-fareast-theme-font:minor-latin;mso-hansi-theme-font:major-latin;
mso-bidi-font-family:Helvetica">Best Practice Model for Cyber-Security for
Development<o:p></o:p></span></p><p class="MsoListParagraphCxSpMiddle" align="left" style="margin-left:.25in;
mso-add-space:auto;text-align:left;text-indent:-.25in;mso-pagination:none;
mso-list:l0 level1 lfo1;mso-layout-grid-align:none;text-autospace:none"><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";
mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">
</span></span></span><span style="font-size:11.0pt;mso-bidi-font-size:
10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-fareast-font-family:
Cambria;mso-fareast-theme-font:minor-latin;mso-hansi-theme-font:major-latin;
mso-bidi-font-family:Helvetica">Effective E-Government & Cyber Security<o:p></o:p></span></p><p class="MsoListParagraphCxSpMiddle" align="left" style="margin-left:.25in;
mso-add-space:auto;text-align:left;text-indent:-.25in;mso-pagination:none;
mso-list:l0 level1 lfo1;mso-layout-grid-align:none;text-autospace:none"><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";
mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">
</span></span></span><span style="font-size:11.0pt;mso-bidi-font-size:
10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-fareast-font-family:
Cambria;mso-fareast-theme-font:minor-latin;mso-hansi-theme-font:major-latin;
mso-bidi-font-family:Helvetica">Social Media/Networks & Cyber Security<o:p></o:p></span></p><p class="MsoListParagraphCxSpMiddle" align="left" style="margin-left:.25in;
mso-add-space:auto;text-align:left;text-indent:-.25in;mso-pagination:none;
mso-list:l0 level1 lfo1;mso-layout-grid-align:none;text-autospace:none"><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";
mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">
</span></span></span><span style="font-size:11.0pt;mso-bidi-font-size:
10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-fareast-font-family:
Cambria;mso-fareast-theme-font:minor-latin;mso-hansi-theme-font:major-latin;
mso-bidi-font-family:Helvetica">Cellular and broadband wireless nets<span style="mso-spacerun: yes"> </span><o:p></o:p></span></p><p class="MsoListParagraphCxSpMiddle" align="left" style="margin-left:.25in;
mso-add-space:auto;text-align:left;text-indent:-.25in;mso-pagination:none;
mso-list:l0 level1 lfo1;mso-layout-grid-align:none;text-autospace:none"><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";
mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">
</span></span></span><span style="font-size:11.0pt;mso-bidi-font-size:
10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-fareast-font-family:
Cambria;mso-fareast-theme-font:minor-latin;mso-hansi-theme-font:major-latin;
mso-bidi-font-family:Helvetica">Laws & Regulations for Cyber Security<o:p></o:p></span></p><p class="MsoListParagraphCxSpMiddle" align="left" style="margin-left:.25in;
mso-add-space:auto;text-align:left;text-indent:-.25in;mso-list:l0 level1 lfo1"><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";
mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">
</span></span></span><span style="font-size:11.0pt;mso-bidi-font-size:
10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-fareast-font-family:
Cambria;mso-fareast-theme-font:minor-latin;mso-hansi-theme-font:major-latin;
mso-bidi-font-family:Helvetica">Public Utilities & Cyber-Security</span><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:Calibri;
mso-ascii-theme-font:major-latin;mso-hansi-theme-font:major-latin"><o:p></o:p></span></p></td><td width="239" valign="top" style="width:239.4pt;padding:0in 5.4pt 0in 5.4pt"><p class="MsoListParagraphCxSpMiddle" align="left" style="margin-left:.25in;
mso-add-space:auto;text-align:left;text-indent:-.25in;mso-pagination:none;
mso-list:l0 level1 lfo1;mso-layout-grid-align:none;text-autospace:none"><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";
mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">
</span></span></span><span style="font-size:11.0pt;mso-bidi-font-size:
10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-fareast-font-family:
Cambria;mso-fareast-theme-font:minor-latin;mso-hansi-theme-font:major-latin;
mso-bidi-font-family:Helvetica">Cyber-Security Readiness Index for Developing
Countries <o:p></o:p></span></p><p class="MsoListParagraphCxSpMiddle" align="left" style="margin-left:.25in;
mso-add-space:auto;text-align:left;text-indent:-.25in;mso-list:l0 level1 lfo1"><span style="font-size:11.0pt;font-family:"Courier New";mso-fareast-font-family:
"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman""> </span></span></span><span style="font-size:11.0pt;font-family:Cambria;mso-ascii-theme-font:minor-latin;
mso-hansi-theme-font:minor-latin">Internet<span style="mso-spacerun:
yes"> </span>protocols and policies to thwart fraud<o:p></o:p></span></p><p class="MsoListParagraphCxSpMiddle" align="left" style="margin-left:.25in;
mso-add-space:auto;text-align:left;text-indent:-.25in;mso-pagination:none;
mso-list:l0 level1 lfo1;mso-layout-grid-align:none;text-autospace:none"><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";
mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">
</span></span></span><span style="font-size:11.0pt;mso-bidi-font-size:
10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-fareast-font-family:
Cambria;mso-fareast-theme-font:minor-latin;mso-hansi-theme-font:major-latin;
mso-bidi-font-family:Helvetica">Organizational security implementation<o:p></o:p></span></p><p class="MsoListParagraphCxSpMiddle" align="left" style="margin-left:.25in;
mso-add-space:auto;text-align:left;text-indent:-.25in;mso-pagination:none;
mso-list:l0 level1 lfo1;mso-layout-grid-align:none;text-autospace:none"><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";
mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">
</span></span></span><span style="font-size:11.0pt;mso-bidi-font-size:
10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-fareast-font-family:
Cambria;mso-fareast-theme-font:minor-latin;mso-hansi-theme-font:major-latin;
mso-bidi-font-family:Helvetica">Identification & Protection of Critical
Information Infrastructures<o:p></o:p></span></p><p class="MsoListParagraphCxSpMiddle" align="left" style="margin-left:.25in;
mso-add-space:auto;text-align:left;text-indent:-.25in;mso-pagination:none;
mso-list:l0 level1 lfo1;mso-layout-grid-align:none;text-autospace:none"><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";
mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">
</span></span></span><span style="font-size:11.0pt;mso-bidi-font-size:
10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-fareast-font-family:
Cambria;mso-fareast-theme-font:minor-latin;mso-hansi-theme-font:major-latin;
mso-bidi-font-family:Helvetica">Knowledge Management & Cyber-Crimes<o:p></o:p></span></p><p class="MsoListParagraphCxSpLast" align="left" style="margin-left:.25in;
mso-add-space:auto;text-align:left;text-indent:-.25in;mso-pagination:none;
mso-list:l0 level1 lfo1;mso-layout-grid-align:none;text-autospace:none"><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";
mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">
</span></span></span><span style="font-size:11.0pt;mso-bidi-font-size:
10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-fareast-font-family:
Cambria;mso-fareast-theme-font:minor-latin;mso-hansi-theme-font:major-latin;
mso-bidi-font-family:Helvetica">Impact of Culture on Cyber-Security<o:p></o:p></span></p></td></tr></tbody></table></o:p></p>
<p class="MsoNormal"><o:p> <span class="Apple-style-span" style="font-size: 21px; font-style: italic; font-weight: bold; ">Paper Submission
Instructions</span></o:p></p>
<p class="MsoNormal" style="mso-pagination:none;mso-layout-grid-align:none;
text-autospace:none"><span style="font-size: 11pt; font-family: Calibri; "><font color="#12243e">Authors are invited to submit
original papers using the journal submission and reviewing web site </font></span><a href="https://mc.manuscriptcentral.com/itd"><span style="font-size: 11pt; font-family: Calibri; text-decoration: none; "><font color="#001bff">https://mc.manuscriptcentral.com/itd</font></span></a><b><span style="font-size: 11pt; font-family: Calibri; "><font color="#12243e">. </font></span></b><span style="font-size:11.0pt;mso-bidi-font-size:
19.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-fareast-font-family:
Cambria;mso-fareast-theme-font:minor-latin;mso-hansi-theme-font:major-latin;
mso-bidi-font-family:Times">The papers should follow the author’s instructions
at the site and indicate “<i style="mso-bidi-font-style:normal">Cyber Security
for Development</i>” special issue when uploading their papers. Submissions to
the special issue should be full research papers (maximum 21 pages or 9000
words) or practice papers of about (4000 words). After initial screening,
papers are reviewed by selected members of the editorial board and peers from
an international pool for quality, consistency and research contribution.
Authors are welcome to nominate one of the special issue editors or preferred
reviewers when submitting their paper. Particular attention is paid to the use
of the chosen research method. Papers submitted to this journal must contain
original results and must not be submitted elsewhere while being evaluated for
the Journal of Information Technology for Development.</span><span style="font-size: 11pt; font-family: Calibri; "><font color="#12243e"> Detailed submission guidelines can be found at</font></span><span style="font-size:11.0pt;mso-bidi-font-size:12.0pt;font-family:Calibri;
mso-ascii-theme-font:major-latin;mso-hansi-theme-font:major-latin">: </span><a href="http://www.tandf.co.uk/journals/journal.asp?issn=0268-1102&linktype=44"><span style="font-size:11.0pt;mso-bidi-font-size:12.0pt;font-family:Calibri;
mso-ascii-theme-font:major-latin;mso-hansi-theme-font:major-latin">http://www.tandf.co.uk/journals/journal.asp?issn=0268-1102&linktype=44</span></a><span style="font-size:11.0pt;mso-bidi-font-size:12.0pt;font-family:Calibri;
mso-ascii-theme-font:major-latin;mso-hansi-theme-font:major-latin">. </span><span style="font-size: 11pt; font-family: Calibri; "><font color="#12243e"><o:p></o:p></font></span></p>
<p class="MsoNormal" style="mso-pagination:none;mso-layout-grid-align:none;
text-autospace:none"><span class="Apple-style-span" style="font-family: Calibri, helvetica, arial, sans-serif; font-size: 23px; font-weight: bold; ">Timeline and Review Guidelines</span></p>
<p class="MsoNormal" align="left" style="margin-left:.5in;text-align:left;
mso-layout-grid-align:none;text-autospace:none"><span style="font-size:11.0pt;
mso-bidi-font-size:12.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;
mso-hansi-theme-font:major-latin">Deadline for manuscripts:<span style="mso-spacerun: yes"> </span><span style="mso-tab-count:1"> </span>September
15, 2012<br>
Preliminary notice to authors:<span style="mso-spacerun: yes"> </span><span style="mso-tab-count:1"> </span>December
15, 2012<br>
Revision Due:<span style="mso-spacerun: yes"> </span><span style="mso-tab-count:1"> </span><span style="mso-tab-count:1"> </span><span style="mso-tab-count:1"> </span>February
15, 2013<br>
Final Manuscript Due:<span style="mso-spacerun:
yes">
</span><span style="mso-tab-count:1"> </span>April
30, 2013</span><span style="font-size:11.0pt;mso-bidi-font-size:12.0pt;
font-family:Calibri;mso-ascii-theme-font:major-latin;mso-hansi-theme-font:major-latin;
mso-bidi-font-family:Arial"><o:p></o:p></span></p>
<p class="MsoNormal"><o:p> </o:p></p>
<!--EndFragment-->
</div><div></div></font>