<font face="Default Sans Serif,Verdana,Arial,Helvetica,sans-serif" size="2"><span class="Apple-style-span" style="font-family: 'Default Sans Serif', Verdana, Arial, Helvetica, sans-serif; font-size: small; ">Please consider submitting a paper to the Special Issue of the Journal of Information Technology  for Development on <i>Cyber-Security for Development</i>. </span><div><font class="Apple-style-span" face="'Default Sans Serif', Verdana, Arial, Helvetica, sans-serif" size="2"><br></font><div><font class="Apple-style-span" face="'Default Sans Serif', Verdana, Arial, Helvetica, sans-serif" size="2">http://itd.ist.unomaha.edu/IT4D%20-%20Cyber-Security%20for%20Development%20-%20Call%20for%20Papers.pdf <br></font><div><font class="Apple-style-span" face="'Default Sans Serif', Verdana, Arial, Helvetica, sans-serif" size="2">________________________________________________________________________________________________________________________________________</font></div><div><p class="MsoNormal" align="center" style="font-family: 'Default Sans Serif', Verdana, Arial, Helvetica, sans-serif; font-size: small; text-align: center; "><b style="mso-bidi-font-weight:
normal"><span style="font-size:16.0pt;mso-bidi-font-size:12.0pt;font-family:
Cambria;mso-ascii-theme-font:minor-latin;mso-hansi-theme-font:minor-latin"><o:p> </o:p></span></b></p>

<p class="MsoNormal" align="center" style="font-family: 'Default Sans Serif', Verdana, Arial, Helvetica, sans-serif; font-size: small; text-align: center; "><b style="mso-bidi-font-weight:
normal"><span style="font-size:16.0pt;mso-bidi-font-size:12.0pt;font-family:
Cambria;mso-ascii-theme-font:minor-latin;mso-hansi-theme-font:minor-latin">Call
for Papers: Special Issue on <o:p></o:p></span></b></p>

<p class="MsoNormal" align="center" style="font-family: 'Default Sans Serif', Verdana, Arial, Helvetica, sans-serif; font-size: small; text-align: center; line-height: 150%; "><b style="mso-bidi-font-weight:normal"><span style="font-size:16.0pt;mso-bidi-font-size:
12.0pt;line-height:150%;font-family:Cambria;mso-ascii-theme-font:minor-latin;
mso-hansi-theme-font:minor-latin">Cyber-Security for Development<o:p></o:p></span></b></p>

<p class="MsoNormal" align="left" style="font-family: 'Default Sans Serif', Verdana, Arial, Helvetica, sans-serif; font-size: small; text-align: left; "><span style="font-size:
11.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-hansi-theme-font:
major-latin;mso-bidi-font-family:Arial">Modern societies have become
increasingly dependent on Information & Communication Technologies (ICTs),
technologies that offer both opportunities & challenges with respect to
improvements in the quality of life of people and the communities in which they
live. </span><span style="font-size:11.0pt;mso-bidi-font-size:12.0pt;
font-family:Calibri;mso-ascii-theme-font:major-latin;mso-hansi-theme-font:major-latin">For
although the use of ICTs offer several potential benefits including
improvements in efficiency & reduction in costs, and wide-spread access to
information and services, they also expose individuals, organizations &
nations to new risks including those that result from Internet-related security
breaches and misuse of cyber-power. Inadequate understanding of the security
implications of ICT acquisition, implementation, maintenance & retirement
decisions can lead to significant negative impacts on individuals,
organizations, and nations. While the exploration of organizational-related
Cyber-Security issues has attracted the attention of researchers, less
attention has been paid to Cyber-Security and National Development particularly
within the context of developing countries. Thus there is the need for rigorous
research that provides guidance to individuals, organization, planners and
other government officials in developing countries, particularly those with
limited financial, technical and other resources.</span></p>

<p class="MsoNormal" align="left" style="font-family: 'Default Sans Serif', Verdana, Arial, Helvetica, sans-serif; font-size: small; text-align: left; "><span style="font-size:
11.0pt;mso-bidi-font-size:12.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;
mso-fareast-font-family:Cambria;mso-fareast-theme-font:minor-latin;mso-hansi-theme-font:
major-latin;mso-bidi-font-family:Times">Cyber-security</span><span style="font-size:11.0pt;mso-bidi-font-size:12.0pt;font-family:Calibri;
mso-ascii-theme-font:major-latin;mso-fareast-font-family:Cambria;mso-fareast-theme-font:
minor-latin;mso-hansi-theme-font:major-latin"> has been defined by the
International Communications Union (ITU) to mean <i style="mso-bidi-font-style:
normal">the collection of tools, policies, security concepts, security
safeguards, guidelines, risk management approaches, actions, training, best
practices, assurance and technologies that can be used to protect the cyber
environment and organization and user‘s assets</i>. It can be considered to
involve several major threats including: espionage, cyber-crime, cyber-war,
cyber-terrorism, and dis-information campaigns. </span><span style="font-size:
11.0pt;mso-bidi-font-size:12.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;
mso-hansi-theme-font:major-latin">For example a Cyber-Security breach could
involve </span><span style="font-size:11.0pt;mso-bidi-font-size:12.0pt;
font-family:Calibri;mso-ascii-theme-font:major-latin;mso-fareast-font-family:
Cambria;mso-fareast-theme-font:minor-latin;mso-hansi-theme-font:major-latin">remotely
corrupting the information/knowledge space of people and/or organizations or
disrupting the flow of data/information between people and/or organizations. Important
elements of a cyber-security culture include: awareness, responsibility,
response, ethics, democracy, risk assessment, security design and
implementation, security management, and reassessment.</span></p>

<p class="MsoNormal" align="left" style="font-family: 'Default Sans Serif', Verdana, Arial, Helvetica, sans-serif; font-size: small; text-align: left; "><span style="font-size:
11.0pt;mso-bidi-font-size:12.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;
mso-hansi-theme-font:major-latin">In this special issue our focus is on
Cyber-Security within the context of Developing Countries. Of particular
relevance are papers that offer theoretical or design science contributions
that relate to the concepts of Cyber-Security within the context of National
Development agendas. </span><span style="font-size:11.0pt;mso-bidi-font-size:
12.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-fareast-font-family:
Cambria;mso-fareast-theme-font:minor-latin;mso-hansi-theme-font:major-latin">The
related concept of Cyber-Power (i.e. <i style="mso-bidi-font-style:normal">the
ability to use cyberspace to create advantages and influence events within
& outside of cyberspace</i>) is also relevant to this special issue</span><span style="font-size:11.0pt;mso-bidi-font-size:12.0pt;font-family:Calibri;
mso-ascii-theme-font:major-latin;mso-hansi-theme-font:major-latin">.</span></p><p class="MsoNormal" align="left" style="font-family: 'Default Sans Serif', Verdana, Arial, Helvetica, sans-serif; font-size: small; text-align: left; "><span style="font-size:11.0pt;mso-bidi-font-size:12.0pt;font-family:Calibri;
mso-ascii-theme-font:major-latin;mso-hansi-theme-font:major-latin"><br></span></p>

<p class="MsoNormal" align="left" style="font-family: 'Default Sans Serif', Verdana, Arial, Helvetica, sans-serif; font-size: small; text-align: left; "><span style="font-size:
11.0pt;mso-bidi-font-size:12.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;
mso-hansi-theme-font:major-latin">Topics of relevance to this special issue
include but are not limited to the following:</span> </p>

<table class="MsoTableGrid" border="0" cellspacing="0" cellpadding="0" style="font-family: 'Default Sans Serif', Verdana, Arial, Helvetica, sans-serif; font-size: small; border-collapse: collapse; ">
 <tbody><tr style="mso-yfti-irow:0;mso-yfti-firstrow:yes">
  <td width="239" valign="top" style="width:239.4pt;padding:0in 5.4pt 0in 5.4pt">
  <p class="MsoListParagraphCxSpFirst" align="left" style="margin-left:.25in;
  mso-add-space:auto;text-align:left;text-indent:-.25in;mso-list:l1 level1 lfo1"><!--[if !supportLists]--><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";
  mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">  
  </span></span></span><!--[endif]--><span style="font-size:11.0pt;mso-bidi-font-size:
  10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-hansi-theme-font:
  major-latin">Norms for Cyber-Security in Developing Countries<o:p></o:p></span></p>
  <p class="MsoListParagraphCxSpMiddle" align="left" style="margin-left:.25in;
  mso-add-space:auto;text-align:left;text-indent:-.25in;mso-list:l1 level1 lfo1"><!--[if !supportLists]--><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";
  mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">  
  </span></span></span><!--[endif]--><span style="font-size:11.0pt;mso-bidi-font-size:
  10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-hansi-theme-font:
  major-latin">Cyber-Warfare & National Development;<o:p></o:p></span></p>
  <p class="MsoListParagraphCxSpMiddle" align="left" style="margin-left:.25in;
  mso-add-space:auto;text-align:left;text-indent:-.25in;mso-list:l1 level1 lfo1"><!--[if !supportLists]--><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";
  mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">  
  </span></span></span><!--[endif]--><span style="font-size:11.0pt;mso-bidi-font-size:
  10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-hansi-theme-font:
  major-latin">Cyber-Peace & National Development<o:p></o:p></span></p>
  <p class="MsoListParagraphCxSpMiddle" align="left" style="margin-left:.25in;
  mso-add-space:auto;text-align:left;text-indent:-.25in;mso-list:l1 level1 lfo1"><!--[if !supportLists]--><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";
  mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">  
  </span></span></span><!--[endif]--><span style="font-size:11.0pt;mso-bidi-font-size:
  10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-hansi-theme-font:
  major-latin">Cyber-Power & Destabilization<o:p></o:p></span></p>
  <p class="MsoListParagraphCxSpMiddle" align="left" style="margin-left:.25in;
  mso-add-space:auto;text-align:left;text-indent:-.25in;mso-list:l1 level1 lfo1"><!--[if !supportLists]--><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";
  mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">  
  </span></span></span><!--[endif]--><span style="font-size:11.0pt;mso-bidi-font-size:
  10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-hansi-theme-font:
  major-latin">National Security, Disinformation & National Development<o:p></o:p></span></p>
  <p class="MsoListParagraphCxSpMiddle" align="left" style="margin-left:.25in;
  mso-add-space:auto;text-align:left;text-indent:-.25in;mso-list:l1 level1 lfo1"><!--[if !supportLists]--><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";
  mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">  
  </span></span></span><!--[endif]--><span style="font-size:11.0pt;mso-bidi-font-size:
  10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-hansi-theme-font:
  major-latin">Cyber-Security and the Protection of Children<o:p></o:p></span></p>
  <p class="MsoListParagraphCxSpMiddle" align="left" style="margin-left:.25in;
  mso-add-space:auto;text-align:left;text-indent:-.25in;mso-list:l1 level1 lfo1"><!--[if !supportLists]--><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";
  mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">  
  </span></span></span><!--[endif]--><span style="font-size:11.0pt;mso-bidi-font-size:
  10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-hansi-theme-font:
  major-latin">Cyber-Security Impact Assessment for ICT<o:p></o:p></span></p>
  <p class="MsoListParagraphCxSpMiddle" align="left" style="margin-left:.25in;
  mso-add-space:auto;text-align:left"><span style="font-size:11.0pt;mso-bidi-font-size:
  10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-hansi-theme-font:
  major-latin"><o:p> </o:p></span></p>
  </td>
  <td width="239" valign="top" style="width:239.4pt;padding:0in 5.4pt 0in 5.4pt">
  <p class="MsoListParagraphCxSpMiddle" align="left" style="margin-left:.25in;
  mso-add-space:auto;text-align:left;text-indent:-.25in;mso-pagination:none;
  mso-list:l1 level1 lfo1;mso-layout-grid-align:none;text-autospace:none"><!--[if !supportLists]--><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";
  mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">  
  </span></span></span><!--[endif]--><span style="font-size:11.0pt;mso-bidi-font-size:
  10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-fareast-font-family:
  Cambria;mso-fareast-theme-font:minor-latin;mso-hansi-theme-font:major-latin;
  mso-bidi-font-family:Helvetica">Cloud Computing & the Protection of
  Critical National Assets<o:p></o:p></span></p>
  <p class="MsoListParagraphCxSpMiddle" align="left" style="margin-left:.25in;
  mso-add-space:auto;text-align:left;text-indent:-.25in;mso-pagination:none;
  mso-list:l1 level1 lfo1;mso-layout-grid-align:none;text-autospace:none"><!--[if !supportLists]--><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";
  mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">  
  </span></span></span><!--[endif]--><span style="font-size:11.0pt;mso-bidi-font-size:
  10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-fareast-font-family:
  Cambria;mso-fareast-theme-font:minor-latin;mso-hansi-theme-font:major-latin;
  mso-bidi-font-family:Helvetica">Trust and Data Security <o:p></o:p></span></p>
  <p class="MsoListParagraphCxSpMiddle" align="left" style="margin-left:.25in;
  mso-add-space:auto;text-align:left;text-indent:-.25in;mso-pagination:none;
  mso-list:l1 level1 lfo1;mso-layout-grid-align:none;text-autospace:none"><!--[if !supportLists]--><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";
  mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">  
  </span></span></span><!--[endif]--><span style="font-size:11.0pt;mso-bidi-font-size:
  10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-fareast-font-family:
  Cambria;mso-fareast-theme-font:minor-latin;mso-hansi-theme-font:major-latin;
  mso-bidi-font-family:Helvetica">Cyber-Security Infrastructure for Developing
  Countries<o:p></o:p></span></p>
  <p class="MsoListParagraphCxSpMiddle" align="left" style="margin-left:.25in;
  mso-add-space:auto;text-align:left;text-indent:-.25in;mso-pagination:none;
  mso-list:l1 level1 lfo1;mso-layout-grid-align:none;text-autospace:none"><!--[if !supportLists]--><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";
  mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">  
  </span></span></span><!--[endif]--><span style="font-size:11.0pt;mso-bidi-font-size:
  10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-fareast-font-family:
  Cambria;mso-fareast-theme-font:minor-latin;mso-hansi-theme-font:major-latin;
  mso-bidi-font-family:Helvetica">Designing Effective & Efficient
  Cyber-Security Solutions for Developing Countries<o:p></o:p></span></p>
  <p class="MsoListParagraphCxSpMiddle" align="left" style="margin-left:.25in;
  mso-add-space:auto;text-align:left;text-indent:-.25in;mso-pagination:none;
  mso-list:l1 level1 lfo1;mso-layout-grid-align:none;text-autospace:none"><!--[if !supportLists]--><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";
  mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">  
  </span></span></span><!--[endif]--><span style="font-size:11.0pt;mso-bidi-font-size:
  10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-fareast-font-family:
  Cambria;mso-fareast-theme-font:minor-latin;mso-hansi-theme-font:major-latin;
  mso-bidi-font-family:Helvetica">Capacity Building for Cyber-Security for
  Developing Countries<o:p></o:p></span></p>
  <p class="MsoListParagraphCxSpLast" align="left" style="margin-left:.25in;
  mso-add-space:auto;text-align:left;mso-pagination:none;mso-layout-grid-align:
  none;text-autospace:none"><span style="font-size:11.0pt;mso-bidi-font-size:
  10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-fareast-font-family:
  Cambria;mso-fareast-theme-font:minor-latin;mso-hansi-theme-font:major-latin;
  mso-bidi-font-family:Helvetica"><o:p> </o:p></span></p>
  </td>
 </tr>
 <tr style="mso-yfti-irow:1;mso-yfti-lastrow:yes">
  <td width="239" valign="top" style="width:239.4pt;padding:0in 5.4pt 0in 5.4pt">
  <p class="MsoListParagraphCxSpFirst" align="left" style="margin-left:.25in;
  mso-add-space:auto;text-align:left;text-indent:-.25in;mso-list:l1 level1 lfo1"><!--[if !supportLists]--><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";
  mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">  
  </span></span></span><!--[endif]--><span style="font-size:11.0pt;mso-bidi-font-size:
  10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-fareast-font-family:
  Cambria;mso-fareast-theme-font:minor-latin;mso-hansi-theme-font:major-latin;
  mso-bidi-font-family:Helvetica">Security, Trust and Privacy</span><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:Calibri;
  mso-ascii-theme-font:major-latin;mso-hansi-theme-font:major-latin"><o:p></o:p></span></p>
  <p class="MsoListParagraphCxSpMiddle" align="left" style="margin-left:.25in;
  mso-add-space:auto;text-align:left;text-indent:-.25in;mso-pagination:none;
  mso-list:l1 level1 lfo1;mso-layout-grid-align:none;text-autospace:none"><!--[if !supportLists]--><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";
  mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">  
  </span></span></span><!--[endif]--><span style="font-size:11.0pt;mso-bidi-font-size:
  10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-fareast-font-family:
  Cambria;mso-fareast-theme-font:minor-latin;mso-hansi-theme-font:major-latin;
  mso-bidi-font-family:Helvetica">Best Practice Model for Cyber-Security for
  Development<o:p></o:p></span></p>
  <p class="MsoListParagraphCxSpMiddle" align="left" style="margin-left:.25in;
  mso-add-space:auto;text-align:left;text-indent:-.25in;mso-pagination:none;
  mso-list:l1 level1 lfo1;mso-layout-grid-align:none;text-autospace:none"><!--[if !supportLists]--><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";
  mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">  
  </span></span></span><!--[endif]--><span style="font-size:11.0pt;mso-bidi-font-size:
  10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-fareast-font-family:
  Cambria;mso-fareast-theme-font:minor-latin;mso-hansi-theme-font:major-latin;
  mso-bidi-font-family:Helvetica">Effective E-Government & Cyber Security<o:p></o:p></span></p>
  <p class="MsoListParagraphCxSpMiddle" align="left" style="margin-left:.25in;
  mso-add-space:auto;text-align:left;text-indent:-.25in;mso-pagination:none;
  mso-list:l1 level1 lfo1;mso-layout-grid-align:none;text-autospace:none"><!--[if !supportLists]--><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";
  mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">  
  </span></span></span><!--[endif]--><span style="font-size:11.0pt;mso-bidi-font-size:
  10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-fareast-font-family:
  Cambria;mso-fareast-theme-font:minor-latin;mso-hansi-theme-font:major-latin;
  mso-bidi-font-family:Helvetica">Social Media/Networks & Cyber Security<o:p></o:p></span></p>
  <p class="MsoListParagraphCxSpMiddle" align="left" style="margin-left:.25in;
  mso-add-space:auto;text-align:left;text-indent:-.25in;mso-pagination:none;
  mso-list:l1 level1 lfo1;mso-layout-grid-align:none;text-autospace:none"><!--[if !supportLists]--><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";
  mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">  
  </span></span></span><!--[endif]--><span style="font-size:11.0pt;mso-bidi-font-size:
  10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-fareast-font-family:
  Cambria;mso-fareast-theme-font:minor-latin;mso-hansi-theme-font:major-latin;
  mso-bidi-font-family:Helvetica">Cellular and broadband wireless nets<span style="mso-spacerun: yes">  </span><o:p></o:p></span></p>
  <p class="MsoListParagraphCxSpMiddle" align="left" style="margin-left:.25in;
  mso-add-space:auto;text-align:left;text-indent:-.25in;mso-pagination:none;
  mso-list:l1 level1 lfo1;mso-layout-grid-align:none;text-autospace:none"><!--[if !supportLists]--><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";
  mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">  
  </span></span></span><!--[endif]--><span style="font-size:11.0pt;mso-bidi-font-size:
  10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-fareast-font-family:
  Cambria;mso-fareast-theme-font:minor-latin;mso-hansi-theme-font:major-latin;
  mso-bidi-font-family:Helvetica">Laws & Regulations for Cyber Security<o:p></o:p></span></p>
  <p class="MsoListParagraphCxSpMiddle" align="left" style="margin-left:.25in;
  mso-add-space:auto;text-align:left;text-indent:-.25in;mso-list:l1 level1 lfo1"><!--[if !supportLists]--><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";
  mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">  
  </span></span></span><!--[endif]--><span style="font-size:11.0pt;mso-bidi-font-size:
  10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-fareast-font-family:
  Cambria;mso-fareast-theme-font:minor-latin;mso-hansi-theme-font:major-latin;
  mso-bidi-font-family:Helvetica">Public Utilities & Cyber-Security</span><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:Calibri;
  mso-ascii-theme-font:major-latin;mso-hansi-theme-font:major-latin"><o:p></o:p></span></p>
  </td>
  <td width="239" valign="top" style="width:239.4pt;padding:0in 5.4pt 0in 5.4pt">
  <p class="MsoListParagraphCxSpMiddle" align="left" style="margin-left:.25in;
  mso-add-space:auto;text-align:left;text-indent:-.25in;mso-pagination:none;
  mso-list:l1 level1 lfo1;mso-layout-grid-align:none;text-autospace:none"><!--[if !supportLists]--><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";
  mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">  
  </span></span></span><!--[endif]--><span style="font-size:11.0pt;mso-bidi-font-size:
  10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-fareast-font-family:
  Cambria;mso-fareast-theme-font:minor-latin;mso-hansi-theme-font:major-latin;
  mso-bidi-font-family:Helvetica">Cyber-Security Readiness Index for Developing
  Countries <o:p></o:p></span></p>
  <p class="MsoListParagraphCxSpMiddle" align="left" style="margin-left:.25in;
  mso-add-space:auto;text-align:left;text-indent:-.25in;mso-list:l1 level1 lfo1"><!--[if !supportLists]--><span style="font-size:11.0pt;font-family:"Courier New";mso-fareast-font-family:
  "Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">   </span></span></span><!--[endif]--><span style="font-size:11.0pt;font-family:Cambria;mso-ascii-theme-font:minor-latin;
  mso-hansi-theme-font:minor-latin">Internet<span style="mso-spacerun:
  yes">  </span>protocols and policies to thwart fraud<o:p></o:p></span></p>
  <p class="MsoListParagraphCxSpMiddle" align="left" style="margin-left:.25in;
  mso-add-space:auto;text-align:left;text-indent:-.25in;mso-pagination:none;
  mso-list:l1 level1 lfo1;mso-layout-grid-align:none;text-autospace:none"><!--[if !supportLists]--><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";
  mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">  
  </span></span></span><!--[endif]--><span style="font-size:11.0pt;mso-bidi-font-size:
  10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-fareast-font-family:
  Cambria;mso-fareast-theme-font:minor-latin;mso-hansi-theme-font:major-latin;
  mso-bidi-font-family:Helvetica">Organizational security implementation<o:p></o:p></span></p>
  <p class="MsoListParagraphCxSpMiddle" align="left" style="margin-left:.25in;
  mso-add-space:auto;text-align:left;text-indent:-.25in;mso-pagination:none;
  mso-list:l1 level1 lfo1;mso-layout-grid-align:none;text-autospace:none"><!--[if !supportLists]--><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";
  mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">  
  </span></span></span><!--[endif]--><span style="font-size:11.0pt;mso-bidi-font-size:
  10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-fareast-font-family:
  Cambria;mso-fareast-theme-font:minor-latin;mso-hansi-theme-font:major-latin;
  mso-bidi-font-family:Helvetica">Identification & Protection of Critical
  Information Infrastructures<o:p></o:p></span></p>
  <p class="MsoListParagraphCxSpMiddle" align="left" style="margin-left:.25in;
  mso-add-space:auto;text-align:left;text-indent:-.25in;mso-pagination:none;
  mso-list:l1 level1 lfo1;mso-layout-grid-align:none;text-autospace:none"><!--[if !supportLists]--><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";
  mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">  
  </span></span></span><!--[endif]--><span style="font-size:11.0pt;mso-bidi-font-size:
  10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-fareast-font-family:
  Cambria;mso-fareast-theme-font:minor-latin;mso-hansi-theme-font:major-latin;
  mso-bidi-font-family:Helvetica">Knowledge Management & Cyber-Crimes<o:p></o:p></span></p>
  <p class="MsoListParagraphCxSpLast" align="left" style="margin-left:.25in;
  mso-add-space:auto;text-align:left;text-indent:-.25in;mso-pagination:none;
  mso-list:l1 level1 lfo1;mso-layout-grid-align:none;text-autospace:none"><!--[if !supportLists]--><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";
  mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">  
  </span></span></span><!--[endif]--><span style="font-size:11.0pt;mso-bidi-font-size:
  10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-fareast-font-family:
  Cambria;mso-fareast-theme-font:minor-latin;mso-hansi-theme-font:major-latin;
  mso-bidi-font-family:Helvetica">Impact of Culture on Cyber-Security<o:p></o:p></span></p>
  </td>
 </tr>
</tbody></table>

<p class="MsoNormal" style="font-family: 'Default Sans Serif', Verdana, Arial, Helvetica, sans-serif; font-size: small; "><o:p> </o:p></p>

<p class="MsoNormal" style="font-family: 'Default Sans Serif', Verdana, Arial, Helvetica, sans-serif; font-size: small; "><o:p> </o:p></p>

<p class="MsoNormal" style="font-family: 'Default Sans Serif', Verdana, Arial, Helvetica, sans-serif; font-size: small; "><b style="mso-bidi-font-weight:normal"><i style="mso-bidi-font-style:normal"><span style="font-size:11.0pt;mso-bidi-font-family:Arial">Paper Submission
Instructions<o:p></o:p></span></i></b></p>

<p class="MsoNormal" style="font-family: 'Default Sans Serif', Verdana, Arial, Helvetica, sans-serif; font-size: small; "><span style="font-size:11.0pt;mso-bidi-font-family:Arial"><o:p> </o:p></span></p>

<p class="MsoNormal" style="font-family: 'Default Sans Serif', Verdana, Arial, Helvetica, sans-serif; font-size: small; "><span style="font-size: 11pt; font-family: Calibri; "><font color="#12243e">Authors are invited to submit
original papers using the journal submission and reviewing web site </font></span><a href="https://mc.manuscriptcentral.com/itd"><span style="font-size: 11pt; font-family: Calibri; text-decoration: none; "><font color="#001bff">https://mc.manuscriptcentral.com/itd</font></span></a><b><span style="font-size: 11pt; font-family: Calibri; "><font color="#12243e">. </font></span></b><span style="font-size:11.0pt;mso-bidi-font-size:
19.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-fareast-font-family:
Cambria;mso-fareast-theme-font:minor-latin;mso-hansi-theme-font:major-latin;
mso-bidi-font-family:Times">The papers should follow the author’s instructions
at the site and indicate “<i style="mso-bidi-font-style:normal">Cyber Security
for Development</i>” special issue when uploading their papers. Submissions to
the special issue should be full research papers (maximum 21 pages or 9000
words) or practice papers of about (4000 words). After initial screening,
papers are reviewed by selected members of the editorial board and peers from
an international pool for quality, consistency and research contribution.
Authors are welcome to nominate one of the special issue editors or preferred
reviewers when submitting their paper. Particular attention is paid to the use
of the chosen research method. Papers submitted to this journal must contain
original results and must not be submitted elsewhere while being evaluated for
the Journal of Information Technology for Development.</span><span style="font-size: 11pt; font-family: Calibri; "><font color="#12243e"> Detailed submission guidelines can be found at</font></span><span style="font-size:11.0pt;mso-bidi-font-size:12.0pt;font-family:Calibri;
mso-ascii-theme-font:major-latin;mso-hansi-theme-font:major-latin">: </span><a href="http://www.tandf.co.uk/journals/journal.asp?issn=0268-1102&linktype=44"><span style="font-size:11.0pt;mso-bidi-font-size:12.0pt;font-family:Calibri;
mso-ascii-theme-font:major-latin;mso-hansi-theme-font:major-latin">http://www.tandf.co.uk/journals/journal.asp?issn=0268-1102&linktype=44</span></a><span style="font-size:11.0pt;mso-bidi-font-size:12.0pt;font-family:Calibri;
mso-ascii-theme-font:major-latin;mso-hansi-theme-font:major-latin">. </span><span style="font-size: 11pt; font-family: Calibri; "><font color="#12243e"><o:p></o:p></font></span></p>

<p class="MsoNormal" style="font-family: 'Default Sans Serif', Verdana, Arial, Helvetica, sans-serif; font-size: small; "><span style="font-size: 11pt; font-family: Calibri; "><font color="#12243e"> </font></span><span style="font-size:11.0pt;mso-bidi-font-size:23.0pt;font-family:"Times New Roman";
mso-fareast-font-family:Cambria;mso-fareast-theme-font:minor-latin"><o:p></o:p></span></p>

<p class="MsoNormal" style="font-family: 'Default Sans Serif', Verdana, Arial, Helvetica, sans-serif; font-size: small; "><span style="font-size:11.0pt;mso-bidi-font-family:Arial"><o:p> </o:p></span></p>

<table class="MsoTableGrid" border="0" cellspacing="0" cellpadding="0" style="font-family: 'Default Sans Serif', Verdana, Arial, Helvetica, sans-serif; font-size: small; border-collapse: collapse; ">
 <tbody><tr style="mso-yfti-irow:0;mso-yfti-firstrow:yes">
  <td width="230" valign="top" style="width:3.2in;padding:0in 5.4pt 0in 5.4pt">
  <p class="MsoNormal" align="left" style="margin-top:0in;margin-right:-11.7pt;
  margin-bottom:0in;margin-left:-4.5pt;margin-bottom:.0001pt;text-align:left"><b style="mso-bidi-font-weight:normal"><span style="font-size:14.0pt">Guest
  Editors:</span></b><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;
  font-family:Calibri;mso-ascii-theme-font:major-latin;mso-hansi-theme-font:
  major-latin"><o:p></o:p></span></p>
  </td>
  <td width="243" valign="top" style="width:243.0pt;padding:0in 5.4pt 0in 5.4pt">
  <p class="MsoNormal" align="center" style="text-align:center"><strong><o:p> </o:p></strong></p>
  </td>
 </tr>
 <tr style="mso-yfti-irow:1">
  <td width="230" valign="top" style="width:3.2in;padding:0in 5.4pt 0in 5.4pt">
  <p class="MsoNormal" align="left" style="margin-top:0in;margin-right:-11.7pt;
  margin-bottom:0in;margin-left:.25in;margin-bottom:.0001pt;text-align:left"><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:Calibri;
  mso-ascii-theme-font:major-latin;mso-hansi-theme-font:major-latin"><o:p> </o:p></span></p>
  </td>
  <td width="243" valign="top" style="width:243.0pt;padding:0in 5.4pt 0in 5.4pt">
  <p class="MsoNormal" align="center" style="text-align:center"><strong><o:p> </o:p></strong></p>
  </td>
 </tr>
 <tr style="mso-yfti-irow:2">
  <td width="230" valign="top" style="width:3.2in;padding:0in 5.4pt 0in 5.4pt">
  <p class="MsoNormal" align="left" style="margin-top:0in;margin-right:-11.7pt;
  margin-bottom:0in;margin-left:.25in;margin-bottom:.0001pt;text-align:left"><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:Calibri;
  mso-ascii-theme-font:major-latin;mso-hansi-theme-font:major-latin">Kweku-Muata
  Osei-Bryson<o:p></o:p></span></p>
  <p class="MsoNormal" align="left" style="margin-top:0in;margin-right:-11.7pt;
  margin-bottom:0in;margin-left:.25in;margin-bottom:.0001pt;text-align:left"><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:Calibri;
  mso-ascii-theme-font:major-latin;mso-hansi-theme-font:major-latin">Department
  of Information Systems <o:p></o:p></span></p>
  <p class="MsoNormal" align="left" style="margin-top:0in;margin-right:-11.7pt;
  margin-bottom:0in;margin-left:.25in;margin-bottom:.0001pt;text-align:left"><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:Calibri;
  mso-ascii-theme-font:major-latin;mso-hansi-theme-font:major-latin">Virginia
  Commonwealth University<o:p></o:p></span></p>
  <p class="MsoNormal" align="left" style="margin-top:0in;margin-right:-11.7pt;
  margin-bottom:0in;margin-left:.25in;margin-bottom:.0001pt;text-align:left"><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:Calibri;
  mso-ascii-theme-font:major-latin;mso-hansi-theme-font:major-latin">Richmond,
  VA 23284, USA<o:p></o:p></span></p>
  <p class="MsoNormal" align="left" style="margin-top:0in;margin-right:-11.7pt;
  margin-bottom:0in;margin-left:.25in;margin-bottom:.0001pt;text-align:left"><span style="mso-bidi-font-size:10.0pt"><a href="mailto:KMOsei@VCU.Edu"><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:Calibri;
  mso-ascii-theme-font:major-latin;mso-hansi-theme-font:major-latin;color:windowtext">KMOsei@VCU.Edu</span></a></span><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:Calibri;
  mso-ascii-theme-font:major-latin;mso-hansi-theme-font:major-latin"><o:p></o:p></span></p>
  </td>
  <td width="243" valign="top" style="width:243.0pt;padding:0in 5.4pt 0in 5.4pt">
  <p class="MsoNormal" style="margin-top:0in;margin-right:-11.7pt;margin-bottom:
  0in;margin-left:.25in;margin-bottom:.0001pt"><span style="font-size:11.0pt;
  mso-bidi-font-size:10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;
  mso-hansi-theme-font:major-latin">Doug Vogel<o:p></o:p></span></p>
  <p class="MsoNormal" style="margin-top:0in;margin-right:-11.7pt;margin-bottom:
  0in;margin-left:.25in;margin-bottom:.0001pt"><span style="font-size:11.0pt;
  mso-bidi-font-size:10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;
  mso-hansi-theme-font:major-latin">Department of Information Systems<o:p></o:p></span></p>
  <p class="MsoNormal" style="margin-top:0in;margin-right:-11.7pt;margin-bottom:
  0in;margin-left:.25in;margin-bottom:.0001pt"><span style="font-size:11.0pt;
  mso-bidi-font-size:10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;
  mso-hansi-theme-font:major-latin">City University of Hong Kong<o:p></o:p></span></p>
  <p class="MsoNormal" style="margin-top:0in;margin-right:-11.7pt;margin-bottom:
  0in;margin-left:.25in;margin-bottom:.0001pt"><span lang="FI" style="font-size:
  11.0pt;mso-bidi-font-size:10.0pt;font-family:Calibri;mso-ascii-theme-font:
  major-latin;mso-hansi-theme-font:major-latin;mso-ansi-language:FI">Kowloon,
  Hong Kong</span><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;
  font-family:Calibri;mso-ascii-theme-font:major-latin;mso-hansi-theme-font:
  major-latin"><o:p></o:p></span></p>
  <p class="MsoNormal" style="margin-top:0in;margin-right:-11.7pt;margin-bottom:
  0in;margin-left:.25in;margin-bottom:.0001pt"><span style="mso-bidi-font-size:
  10.0pt"><a href="mailto:isdoug@cityu.edu.hk"><span lang="FI" style="font-size:
  11.0pt;mso-bidi-font-size:10.0pt;font-family:Calibri;mso-ascii-theme-font:
  major-latin;mso-hansi-theme-font:major-latin;color:windowtext;mso-ansi-language:
  FI">isdoug@cityu.edu.hk</span></a></span><span style="font-size:11.0pt;
  mso-bidi-font-size:10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;
  mso-hansi-theme-font:major-latin"><o:p></o:p></span></p>
  <p class="MsoNormal" align="left" style="text-align:left"><strong><o:p> </o:p></strong></p>
  </td>
 </tr>
 <tr style="mso-yfti-irow:3">
  <td width="230" valign="top" style="width:3.2in;padding:0in 5.4pt 0in 5.4pt">
  <p class="MsoNormal" align="center" style="text-align:center"><b style="mso-bidi-font-weight:normal"><span style="mso-bidi-font-size:10.0pt"><o:p> </o:p></span></b></p>
  </td>
  <td width="243" valign="top" style="width:243.0pt;padding:0in 5.4pt 0in 5.4pt">
  <p class="MsoNormal" align="center" style="text-align:center"><strong><o:p> </o:p></strong></p>
  </td>
 </tr>
 <tr style="mso-yfti-irow:4">
  <td width="473" colspan="2" valign="top" style="width:473.4pt;padding:0in 5.4pt 0in 5.4pt">
  <p class="MsoNormal" align="left" style="text-align:left"><b style="mso-bidi-font-weight:
  normal"><span style="mso-bidi-font-size:10.0pt;mso-bidi-font-family:Arial">Background
  of special issue editor(s)</span></b><strong><o:p></o:p></strong></p>
  </td>
 </tr>
 <tr style="mso-yfti-irow:5">
  <td width="230" valign="top" style="width:3.2in;padding:0in 5.4pt 0in 5.4pt">
  <p class="MsoNormal" align="center" style="text-align:center"><b style="mso-bidi-font-weight:normal"><span style="mso-bidi-font-size:10.0pt"><o:p> </o:p></span></b></p>
  </td>
  <td width="243" valign="top" style="width:243.0pt;padding:0in 5.4pt 0in 5.4pt">
  <p class="MsoNormal" align="center" style="text-align:center"><strong><o:p> </o:p></strong></p>
  </td>
 </tr>
 <tr style="mso-yfti-irow:6">
  <td width="230" valign="top" style="width:3.2in;padding:0in 5.4pt 0in 5.4pt">
  <p class="MsoNormal" align="center" style="text-align:center"><b style="mso-bidi-font-weight:normal"><span style="font-size:11.0pt;mso-bidi-font-size:
  10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-hansi-theme-font:
  major-latin">Kweku-Muata Osei-Bryson<o:p></o:p></span></b></p>
  </td>
  <td width="243" valign="top" style="width:243.0pt;padding:0in 5.4pt 0in 5.4pt">
  <p class="MsoNormal" align="center" style="text-align:center"><strong><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:Calibri;
  mso-ascii-theme-font:major-latin;mso-hansi-theme-font:major-latin">Doug Vogel</span></strong><b style="mso-bidi-font-weight:normal"><span style="font-size:11.0pt;mso-bidi-font-size:
  10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-hansi-theme-font:
  major-latin"><o:p></o:p></span></b></p>
  </td>
 </tr>
 <tr style="mso-yfti-irow:7;mso-yfti-lastrow:yes">
  <td width="230" valign="top" style="width:3.2in;padding:0in 5.4pt 0in 5.4pt">
  <p><span style="font-size:11.0pt">Kweku-Muata Osei-Bryson is Professor of </span><span style="font-size:11.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;
  mso-hansi-theme-font:major-latin">Information Systems at </span><span style="mso-bidi-font-size:10.0pt"><a href="http://www.vcu.edu/"><span style="font-size:11.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;
  mso-hansi-theme-font:major-latin;color:windowtext">Virginia Commonwealth
  University</span></a></span><span style="font-size:11.0pt;font-family:Calibri;
  mso-ascii-theme-font:major-latin;mso-hansi-theme-font:major-latin">, where he
  also served as the Coordinator of the Ph.D. program in Information Systems
  during 2001-2003. Previously he was Professor of Information Systems & Decision
  Sciences in the School of Business at </span><span style="mso-bidi-font-size:
  10.0pt"><a href="http://www.howard.edu/"><span style="font-size:11.0pt;
  font-family:Calibri;mso-ascii-theme-font:major-latin;mso-hansi-theme-font:
  major-latin;color:windowtext">Howard University</span></a></span><span style="font-size:11.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;
  mso-hansi-theme-font:major-latin">, Washington, DC, U.S.A. He has also worked
  as an Information Systems practitioner in both industry and government. He
  holds a Ph.D. in Applied Mathematics (Management Science & Information
  Systems) from the University of Maryland at College Park.<o:p></o:p></span></p>
  <p class="MsoNormal" align="left" style="text-align:left"><span style="font-size:
  11.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-hansi-theme-font:
  major-latin">His current research areas include: Data Mining, IS Security,
  Data &Knowledge Management, Expert & Decision Support Systems,
  e-Commerce, IT for Development. His papers have been published in various
  journals including<i style="mso-bidi-font-style:normal">: IT for Development,
  Decision Support Systems</i>, <i style="mso-bidi-font-style:normal">IEEE
  Security</i>& Privacy, <i style="mso-bidi-font-style:normal">Information
  Systems Journal, European Journal of Information Systems, Journal of the
  Association for Information Systems, Expert Systems with Applications, Omega,
  Computers& Operations Research, European Journal of Operational Research,
  Journal of the Operational Research Society</i>. Currently he serves as
  Vice-Chair for Research of the AIS SIG on ICT in Global Development, as an
  Associate Editor of the </span><span style="mso-bidi-font-size:10.0pt"><a href="http://joc.pubs.informs.org/"><span style="font-size:11.0pt;font-family:
  Calibri;mso-ascii-theme-font:major-latin;mso-hansi-theme-font:major-latin;
  color:windowtext">INFORMS Journal on Computing</span></a></span><span style="font-size:11.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;
  mso-hansi-theme-font:major-latin">, and on the Editorial Board of the </span><span style="mso-bidi-font-size:10.0pt"><a href="http://www.elsevier.com/homepage/sae/orms/cor/menu.htm"><span style="font-size:11.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;
  mso-hansi-theme-font:major-latin;color:windowtext">Computers & Operations
  Research journal</span></a></span><span style="font-size:11.0pt;font-family:
  Calibri;mso-ascii-theme-font:major-latin;mso-hansi-theme-font:major-latin">,
  and the International Advisory Board of the Journal of the Operational
  Research Society.</span><span style="mso-bidi-font-size:10.0pt"><o:p></o:p></span></p>
  </td>
  <td width="243" valign="top" style="width:243.0pt;padding:0in 5.4pt 0in 5.4pt">
  <p class="MsoNormal" align="left" style="text-align:left;tab-stops:103.5pt"><span style="font-size:11.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;
  mso-hansi-theme-font:major-latin">Doug Vogel is Professor of Information
  Systems (IS) at the City University of Hong Kong and Acting Management
  Department Head as well as an Association for Information Systems (AIS)
  Fellow and AIS President-elect. He received his M.S. in Computer Science from
  U.C.L.A. and his Ph.D. in Management Information Systems from the University
  of Minnesota where he was also research coordinator for the MIS Research
  Center.<span style="mso-spacerun: yes">  </span>In a ten-year
  relationship with a Colorado electronics manufacturer he served in virtually
  every technical and managerial capacity including Director of Engineering,
  General Manager and member of the Board of Directors. <o:p></o:p></span></p>
  <p class="MsoNormal" align="left" style="text-align:left;tab-stops:103.5pt"><span style="font-size:11.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;
  mso-hansi-theme-font:major-latin"><o:p> </o:p></span></p>
  <p class="MsoNormal" align="left" style="text-align:left;tab-stops:103.5pt"><span style="font-size:11.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;
  mso-hansi-theme-font:major-latin">Professor Vogel has published widely and
  been recognized as the most cited IS author in Asia Pacific. His teaching and
  research interests bridge the business and academic communities in addressing
  issues of information system creation and impact on aspects of interpersonal
  communication, group problem solving, cooperative learning, and
  multi-cultural team productivity in security-enabled contexts. His interests
  reflect a concern for encouraging efficient and effective utilization of
  computer systems in an atmosphere conducive to enhancing the quality of life.
  He is especially active in introducing group support technology into
  enterprises and educational systems. His particular focus emphasizes
  security-sensitive integration of audio, video, and data in interactive
  distributed group support. Additional detail can be found at
  http://www.is.cityu.edu.hk/staff/isdoug/cv/. <o:p></o:p></span></p>
  </td>
 </tr>
</tbody></table>

<p class="MsoNormal" style="font-family: 'Default Sans Serif', Verdana, Arial, Helvetica, sans-serif; font-size: small; "><span style="mso-bidi-font-family:Arial"><o:p> </o:p></span></p>

<p class="MsoNormal" style="font-family: 'Default Sans Serif', Verdana, Arial, Helvetica, sans-serif; font-size: small; "><span style="mso-bidi-font-family:Arial"><o:p> </o:p></span></p>

<p class="MsoNormal" style="font-family: 'Default Sans Serif', Verdana, Arial, Helvetica, sans-serif; font-size: small; "><b style="mso-bidi-font-weight:normal"><span style="font-size:12.0pt;font-family:
Calibri;mso-ascii-theme-font:major-latin;mso-hansi-theme-font:major-latin;
mso-bidi-font-family:Arial">Timeline and Review Guidelines</span></b><span style="font-size:12.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;
mso-hansi-theme-font:major-latin;mso-bidi-font-family:Arial"><o:p></o:p></span></p>

<p class="MsoNormal" style="font-family: 'Default Sans Serif', Verdana, Arial, Helvetica, sans-serif; font-size: small; "><span style="mso-bidi-font-family:Arial"><o:p> </o:p></span></p>

<p class="MsoNormal" align="left" style="font-family: 'Default Sans Serif', Verdana, Arial, Helvetica, sans-serif; font-size: small; margin-left: 0.5in; text-align: left; "><span style="font-size:11.0pt;
mso-bidi-font-size:12.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;
mso-hansi-theme-font:major-latin">Deadline for manuscripts:<span style="mso-spacerun: yes">        </span><span style="mso-tab-count:1">                  </span>September
15, 2012<br>
Preliminary notice to authors:<span style="mso-spacerun: yes">  </span><span style="mso-tab-count:1">                  </span>December
15, 2012<br>
Revision Due:<span style="mso-spacerun: yes">  </span><span style="mso-tab-count:1">                  </span><span style="mso-tab-count:1">                  </span><span style="mso-tab-count:1">                  </span>February
15, 2013<br>
Final Manuscript Due:<span style="mso-spacerun:
yes">              
</span><span style="mso-tab-count:1">                  </span>April
30, 2013</span><span style="font-size:11.0pt;mso-bidi-font-size:12.0pt;
font-family:Calibri;mso-ascii-theme-font:major-latin;mso-hansi-theme-font:major-latin;
mso-bidi-font-family:Arial"><o:p></o:p></span></p>

<p class="MsoNormal" style="font-family: 'Default Sans Serif', Verdana, Arial, Helvetica, sans-serif; font-size: small; "><span style="font-size:11.0pt;mso-bidi-font-size:12.0pt;font-family:Calibri;
mso-ascii-theme-font:major-latin;mso-hansi-theme-font:major-latin;mso-bidi-font-family:
Arial"><o:p> </o:p></span></p>

<p class="MsoNormal" style="font-family: 'Default Sans Serif', Verdana, Arial, Helvetica, sans-serif; font-size: small; "><span style="font-size:11.0pt;mso-bidi-font-size:12.0pt;
font-family:Calibri;mso-ascii-theme-font:major-latin;mso-hansi-theme-font:major-latin">Each
submitted paper will be peer-reviewed in the same manner as other submissions
to Journal of IT for Development. Relevance, Quality and originality of the
contribution are the major acceptance criteria for each submission. Due to the
tight deadline, papers for which the outcome is “<i style="mso-bidi-font-style:
normal">Major Revision</i>” will not be accepted for this focused issue, but
may be put into the journal’s regular review process and, after revision is
complete, be considered for a regular issue of the journal<o:p></o:p></span></p>

<p class="MsoNormal" style="font-family: 'Default Sans Serif', Verdana, Arial, Helvetica, sans-serif; font-size: small; "><o:p> </o:p></p>

<!--EndFragment--><div><font class="Apple-style-span" face="'Default Sans Serif', Verdana, Arial, Helvetica, sans-serif" size="2"><br></font></div><div><font class="Apple-style-span" face="'Default Sans Serif', Verdana, Arial, Helvetica, sans-serif" size="2"><br></font><div><span class="Apple-style-span" style="font-family: 'Default Sans Serif', Verdana, Arial, Helvetica, sans-serif; font-size: small; "><br></span></div><div><span class="Apple-style-span" style="font-family: 'Default Sans Serif', Verdana, Arial, Helvetica, sans-serif; font-size: small; "><br></span></div></div></div></div></div><div></div></font>