<font face="Default Sans Serif,Verdana,Arial,Helvetica,sans-serif" size="2"><div><blockquote style="padding-right:0px;padding-left:5px;margin-left:5px;border-left:solid black 2px;margin-right:0px"><font face="Default Sans Serif,Verdana,Arial,Helvetica,sans-serif" size="2"><div><blockquote style="padding-right:0px;padding-left:5px;margin-left:5px;border-left:solid black 2px;margin-right:0px"><font face="Default Sans Serif,Verdana,Arial,Helvetica,sans-serif" size="2"><span class="Apple-style-span" style="font-family: 'Default Sans Serif', Verdana, Arial, Helvetica, sans-serif; font-size: small; ">Please consider submitting a paper to the Special Issue of the Journal of Information Technology  for Development on <i>Cyber-Security for Development</i>. </span><div><font class="Apple-style-span" face="'Default Sans Serif', Verdana, Arial, Helvetica, sans-serif" size="2"><br></font><div><font class="Apple-style-span" face="'Default Sans Serif', Verdana, Arial, Helvetica, sans-serif" size="2">http://itd.ist.unomaha.edu/IT4D%20-%20Cyber-Security%20for%20Development%20-%20Call%20for%20Papers.pdf <br></font><div><font class="Apple-style-span" face="'Default Sans Serif', Verdana, Arial, Helvetica, sans-serif" size="2">________________________________________________________________________________________________________________________________________</font></div><div><p class="MsoNormal" align="center" style="font-family: 'Default Sans Serif', Verdana, Arial, Helvetica, sans-serif; font-size: small; text-align: center; "><b style="mso-bidi-font-weight:normal"><span style="font-size:16.0pt;mso-bidi-font-size:12.0pt;font-family:Cambria;mso-ascii-theme-font:minor-latin;mso-hansi-theme-font:minor-latin"><o:p> </o:p></span></b></p> <p class="MsoNormal" align="center" style="font-family: 'Default Sans Serif', Verdana, Arial, Helvetica, sans-serif; font-size: small; text-align: center; "><b style="mso-bidi-font-weight:normal"><span style="font-size:16.0pt;mso-bidi-font-size:12.0pt;font-family:Cambria;mso-ascii-theme-font:minor-latin;mso-hansi-theme-font:minor-latin">Call for Papers: Special Issue on <o:p></o:p></span></b></p> <p class="MsoNormal" align="center" style="font-family: 'Default Sans Serif', Verdana, Arial, Helvetica, sans-serif; font-size: small; text-align: center; line-height: 150%; "><b style="mso-bidi-font-weight:normal"><span style="font-size:16.0pt;mso-bidi-font-size:12.0pt;line-height:150%;font-family:Cambria;mso-ascii-theme-font:minor-latin;mso-hansi-theme-font:minor-latin">Cyber-Security for Development<o:p></o:p></span></b></p> <p class="MsoNormal" align="left" style="font-family: 'Default Sans Serif', Verdana, Arial, Helvetica, sans-serif; font-size: small; text-align: left; "><span style="font-size:11.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-hansi-theme-font:major-latin;mso-bidi-font-family:Arial">Modern societies have become increasingly dependent on Information & Communication Technologies (ICTs), technologies that offer both opportunities & challenges with respect to improvements in the quality of life of people and the communities in which they live. </span><span style="font-size:11.0pt;mso-bidi-font-size:12.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-hansi-theme-font:major-latin">For although the use of ICTs offer several potential benefits including improvements in efficiency & reduction in costs, and wide-spread access to information and services, they also expose individuals, organizations & nations to new risks including those that result from Internet-related security breaches and misuse of cyber-power. Inadequate understanding of the security implications of ICT acquisition, implementation, maintenance & retirement decisions can lead to significant negative impacts on individuals, organizations, and nations. While the exploration of organizational-related Cyber-Security issues has attracted the attention of researchers, less attention has been paid to Cyber-Security and National Development particularly within the context of developing countries. Thus there is the need for rigorous research that provides guidance to individuals, organization, planners and other government officials in developing countries, particularly those with limited financial, technical and other resources.</span></p> <p class="MsoNormal" align="left" style="font-family: 'Default Sans Serif', Verdana, Arial, Helvetica, sans-serif; font-size: small; text-align: left; "><span style="font-size:11.0pt;mso-bidi-font-size:12.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-fareast-font-family:Cambria;mso-fareast-theme-font:minor-latin;mso-hansi-theme-font:major-latin;mso-bidi-font-family:Times">Cyber-security</span><span style="font-size:11.0pt;mso-bidi-font-size:12.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-fareast-font-family:Cambria;mso-fareast-theme-font:minor-latin;mso-hansi-theme-font:major-latin"> has been defined by the International Communications Union (ITU) to mean <i style="mso-bidi-font-style:normal">the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user‘s assets</i>. It can be considered to involve several major threats including: espionage, cyber-crime, cyber-war, cyber-terrorism, and dis-information campaigns. </span><span style="font-size:11.0pt;mso-bidi-font-size:12.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-hansi-theme-font:major-latin">For example a Cyber-Security breach could involve </span><span style="font-size:11.0pt;mso-bidi-font-size:12.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-fareast-font-family:Cambria;mso-fareast-theme-font:minor-latin;mso-hansi-theme-font:major-latin">remotely corrupting the information/knowledge space of people and/or organizations or disrupting the flow of data/information between people and/or organizations. Important elements of a cyber-security culture include: awareness, responsibility, response, ethics, democracy, risk assessment, security design and implementation, security management, and reassessment.</span></p> <p class="MsoNormal" align="left" style="font-family: 'Default Sans Serif', Verdana, Arial, Helvetica, sans-serif; font-size: small; text-align: left; "><span style="font-size:11.0pt;mso-bidi-font-size:12.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-hansi-theme-font:major-latin">In this special issue our focus is on Cyber-Security within the context of Developing Countries. Of particular relevance are papers that offer theoretical or design science contributions that relate to the concepts of Cyber-Security within the context of National Development agendas. </span><span style="font-size:11.0pt;mso-bidi-font-size:12.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-fareast-font-family:Cambria;mso-fareast-theme-font:minor-latin;mso-hansi-theme-font:major-latin">The related concept of Cyber-Power (i.e. <i style="mso-bidi-font-style:normal">the ability to use cyberspace to create advantages and influence events within & outside of cyberspace</i>) is also relevant to this special issue</span><span style="font-size:11.0pt;mso-bidi-font-size:12.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-hansi-theme-font:major-latin">.</span></p><p class="MsoNormal" align="left" style="font-family: 'Default Sans Serif', Verdana, Arial, Helvetica, sans-serif; font-size: small; text-align: left; "><span style="font-size:11.0pt;mso-bidi-font-size:12.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-hansi-theme-font:major-latin"><br></span></p> <p class="MsoNormal" align="left" style="font-family: 'Default Sans Serif', Verdana, Arial, Helvetica, sans-serif; font-size: small; text-align: left; "><span style="font-size:11.0pt;mso-bidi-font-size:12.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-hansi-theme-font:major-latin">Topics of relevance to this special issue include but are not limited to the following:</span> </p> <table class="MsoTableGrid" border="0" cellspacing="0" cellpadding="0" style="font-family: 'Default Sans Serif', Verdana, Arial, Helvetica, sans-serif; font-size: small; border-collapse: collapse; ">  <tbody><tr style="mso-yfti-irow:0;mso-yfti-firstrow:yes">   <td width="239" valign="top" style="width:239.4pt;padding:0in 5.4pt 0in 5.4pt">   <p class="MsoListParagraphCxSpFirst" align="left" style="margin-left:.25in;  mso-add-space:auto;text-align:left;text-indent:-.25in;mso-list:l1 level1 lfo1"><!--[if !supportLists]--><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";   mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">     </span></span></span><!--[endif]--><span style="font-size:11.0pt;mso-bidi-font-size:   10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-hansi-theme-font:   major-latin">Norms for Cyber-Security in Developing Countries<o:p></o:p></span></p>   <p class="MsoListParagraphCxSpMiddle" align="left" style="margin-left:.25in;   mso-add-space:auto;text-align:left;text-indent:-.25in;mso-list:l1 level1 lfo1"><!--[if !supportLists]--><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";   mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">     </span></span></span><!--[endif]--><span style="font-size:11.0pt;mso-bidi-font-size:   10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-hansi-theme-font:   major-latin">Cyber-Warfare & National Development;<o:p></o:p></span></p>   <p class="MsoListParagraphCxSpMiddle" align="left" style="margin-left:.25in;   mso-add-space:auto;text-align:left;text-indent:-.25in;mso-list:l1 level1 lfo1"><!--[if !supportLists]--><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";   mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">     </span></span></span><!--[endif]--><span style="font-size:11.0pt;mso-bidi-font-size:   10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-hansi-theme-font:   major-latin">Cyber-Peace & National Development<o:p></o:p></span></p>   <p class="MsoListParagraphCxSpMiddle" align="left" style="margin-left:.25in;   mso-add-space:auto;text-align:left;text-indent:-.25in;mso-list:l1 level1 lfo1"><!--[if !supportLists]--><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";   mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">     </span></span></span><!--[endif]--><span style="font-size:11.0pt;mso-bidi-font-size:   10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-hansi-theme-font:   major-latin">Cyber-Power & Destabilization<o:p></o:p></span></p>   <p class="MsoListParagraphCxSpMiddle" align="left" style="margin-left:.25in;   mso-add-space:auto;text-align:left;text-indent:-.25in;mso-list:l1 level1 lfo1"><!--[if !supportLists]--><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";   mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">     </span></span></span><!--[endif]--><span style="font-size:11.0pt;mso-bidi-font-size:   10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-hansi-theme-font:   major-latin">National Security, Disinformation & National Development<o:p></o:p></span></p>   <p class="MsoListParagraphCxSpMiddle" align="left" style="margin-left:.25in;   mso-add-space:auto;text-align:left;text-indent:-.25in;mso-list:l1 level1 lfo1"><!--[if !supportLists]--><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";   mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">     </span></span></span><!--[endif]--><span style="font-size:11.0pt;mso-bidi-font-size:   10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-hansi-theme-font:   major-latin">Cyber-Security and the Protection of Children<o:p></o:p></span></p>   <p class="MsoListParagraphCxSpMiddle" align="left" style="margin-left:.25in;   mso-add-space:auto;text-align:left;text-indent:-.25in;mso-list:l1 level1 lfo1"><!--[if !supportLists]--><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";   mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">     </span></span></span><!--[endif]--><span style="font-size:11.0pt;mso-bidi-font-size:   10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-hansi-theme-font:   major-latin">Cyber-Security Impact Assessment for ICT<o:p></o:p></span></p>   <p class="MsoListParagraphCxSpMiddle" align="left" style="margin-left:.25in;   mso-add-space:auto;text-align:left"><span style="font-size:11.0pt;mso-bidi-font-size:   10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-hansi-theme-font:   major-latin"><o:p> </o:p></span></p>   </td>   <td width="239" valign="top" style="width:239.4pt;padding:0in 5.4pt 0in 5.4pt">   <p class="MsoListParagraphCxSpMiddle" align="left" style="margin-left:.25in;   mso-add-space:auto;text-align:left;text-indent:-.25in;mso-pagination:none;   mso-list:l1 level1 lfo1;mso-layout-grid-align:none;text-autospace:none"><!--[if !supportLists]--><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";   mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">     </span></span></span><!--[endif]--><span style="font-size:11.0pt;mso-bidi-font-size:   10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-fareast-font-family:   Cambria;mso-fareast-theme-font:minor-latin;mso-hansi-theme-font:major-latin;   mso-bidi-font-family:Helvetica">Cloud Computing & the Protection of   Critical National Assets<o:p></o:p></span></p>   <p class="MsoListParagraphCxSpMiddle" align="left" style="margin-left:.25in;   mso-add-space:auto;text-align:left;text-indent:-.25in;mso-pagination:none;   mso-list:l1 level1 lfo1;mso-layout-grid-align:none;text-autospace:none"><!--[if !supportLists]--><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";   mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">     </span></span></span><!--[endif]--><span style="font-size:11.0pt;mso-bidi-font-size:   10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-fareast-font-family:   Cambria;mso-fareast-theme-font:minor-latin;mso-hansi-theme-font:major-latin;   mso-bidi-font-family:Helvetica">Trust and Data Security <o:p></o:p></span></p>   <p class="MsoListParagraphCxSpMiddle" align="left" style="margin-left:.25in;   mso-add-space:auto;text-align:left;text-indent:-.25in;mso-pagination:none;   mso-list:l1 level1 lfo1;mso-layout-grid-align:none;text-autospace:none"><!--[if !supportLists]--><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";   mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">     </span></span></span><!--[endif]--><span style="font-size:11.0pt;mso-bidi-font-size:   10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-fareast-font-family:   Cambria;mso-fareast-theme-font:minor-latin;mso-hansi-theme-font:major-latin;   mso-bidi-font-family:Helvetica">Cyber-Security Infrastructure for Developing   Countries<o:p></o:p></span></p>   <p class="MsoListParagraphCxSpMiddle" align="left" style="margin-left:.25in;   mso-add-space:auto;text-align:left;text-indent:-.25in;mso-pagination:none;   mso-list:l1 level1 lfo1;mso-layout-grid-align:none;text-autospace:none"><!--[if !supportLists]--><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";   mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">     </span></span></span><!--[endif]--><span style="font-size:11.0pt;mso-bidi-font-size:   10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-fareast-font-family:   Cambria;mso-fareast-theme-font:minor-latin;mso-hansi-theme-font:major-latin;   mso-bidi-font-family:Helvetica">Designing Effective & Efficient   Cyber-Security Solutions for Developing Countries<o:p></o:p></span></p>   <p class="MsoListParagraphCxSpMiddle" align="left" style="margin-left:.25in;   mso-add-space:auto;text-align:left;text-indent:-.25in;mso-pagination:none;   mso-list:l1 level1 lfo1;mso-layout-grid-align:none;text-autospace:none"><!--[if !supportLists]--><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";   mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">     </span></span></span><!--[endif]--><span style="font-size:11.0pt;mso-bidi-font-size:   10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-fareast-font-family:   Cambria;mso-fareast-theme-font:minor-latin;mso-hansi-theme-font:major-latin;   mso-bidi-font-family:Helvetica">Capacity Building for Cyber-Security for   Developing Countries<o:p></o:p></span></p>   <p class="MsoListParagraphCxSpLast" align="left" style="margin-left:.25in;   mso-add-space:auto;text-align:left;mso-pagination:none;mso-layout-grid-align:   none;text-autospace:none"><span style="font-size:11.0pt;mso-bidi-font-size:   10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-fareast-font-family:   Cambria;mso-fareast-theme-font:minor-latin;mso-hansi-theme-font:major-latin;   mso-bidi-font-family:Helvetica"><o:p> </o:p></span></p>   </td>  </tr>  <tr style="mso-yfti-irow:1;mso-yfti-lastrow:yes">   <td width="239" valign="top" style="width:239.4pt;padding:0in 5.4pt 0in 5.4pt">   <p class="MsoListParagraphCxSpFirst" align="left" style="margin-left:.25in;   mso-add-space:auto;text-align:left;text-indent:-.25in;mso-list:l1 level1 lfo1"><!--[if !supportLists]--><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";   mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">     </span></span></span><!--[endif]--><span style="font-size:11.0pt;mso-bidi-font-size:   10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-fareast-font-family:   Cambria;mso-fareast-theme-font:minor-latin;mso-hansi-theme-font:major-latin;   mso-bidi-font-family:Helvetica">Security, Trust and Privacy</span><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:Calibri;   mso-ascii-theme-font:major-latin;mso-hansi-theme-font:major-latin"><o:p></o:p></span></p>   <p class="MsoListParagraphCxSpMiddle" align="left" style="margin-left:.25in;   mso-add-space:auto;text-align:left;text-indent:-.25in;mso-pagination:none;   mso-list:l1 level1 lfo1;mso-layout-grid-align:none;text-autospace:none"><!--[if !supportLists]--><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";   mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">     </span></span></span><!--[endif]--><span style="font-size:11.0pt;mso-bidi-font-size:   10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-fareast-font-family:   Cambria;mso-fareast-theme-font:minor-latin;mso-hansi-theme-font:major-latin;   mso-bidi-font-family:Helvetica">Best Practice Model for Cyber-Security for   Development<o:p></o:p></span></p>   <p class="MsoListParagraphCxSpMiddle" align="left" style="margin-left:.25in;   mso-add-space:auto;text-align:left;text-indent:-.25in;mso-pagination:none;   mso-list:l1 level1 lfo1;mso-layout-grid-align:none;text-autospace:none"><!--[if !supportLists]--><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";   mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">     </span></span></span><!--[endif]--><span style="font-size:11.0pt;mso-bidi-font-size:   10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-fareast-font-family:   Cambria;mso-fareast-theme-font:minor-latin;mso-hansi-theme-font:major-latin;   mso-bidi-font-family:Helvetica">Effective E-Government & Cyber Security<o:p></o:p></span></p>   <p class="MsoListParagraphCxSpMiddle" align="left" style="margin-left:.25in;   mso-add-space:auto;text-align:left;text-indent:-.25in;mso-pagination:none;   mso-list:l1 level1 lfo1;mso-layout-grid-align:none;text-autospace:none"><!--[if !supportLists]--><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";   mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">     </span></span></span><!--[endif]--><span style="font-size:11.0pt;mso-bidi-font-size:   10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-fareast-font-family:   Cambria;mso-fareast-theme-font:minor-latin;mso-hansi-theme-font:major-latin;   mso-bidi-font-family:Helvetica">Social Media/Networks & Cyber Security<o:p></o:p></span></p>   <p class="MsoListParagraphCxSpMiddle" align="left" style="margin-left:.25in;   mso-add-space:auto;text-align:left;text-indent:-.25in;mso-pagination:none;   mso-list:l1 level1 lfo1;mso-layout-grid-align:none;text-autospace:none"><!--[if !supportLists]--><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";   mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">     </span></span></span><!--[endif]--><span style="font-size:11.0pt;mso-bidi-font-size:   10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-fareast-font-family:   Cambria;mso-fareast-theme-font:minor-latin;mso-hansi-theme-font:major-latin;   mso-bidi-font-family:Helvetica">Cellular and broadband wireless nets<span style="mso-spacerun: yes">  </span><o:p></o:p></span></p>   <p class="MsoListParagraphCxSpMiddle" align="left" style="margin-left:.25in;   mso-add-space:auto;text-align:left;text-indent:-.25in;mso-pagination:none;   mso-list:l1 level1 lfo1;mso-layout-grid-align:none;text-autospace:none"><!--[if !supportLists]--><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";   mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">     </span></span></span><!--[endif]--><span style="font-size:11.0pt;mso-bidi-font-size:   10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-fareast-font-family:   Cambria;mso-fareast-theme-font:minor-latin;mso-hansi-theme-font:major-latin;   mso-bidi-font-family:Helvetica">Laws & Regulations for Cyber Security<o:p></o:p></span></p>   <p class="MsoListParagraphCxSpMiddle" align="left" style="margin-left:.25in;   mso-add-space:auto;text-align:left;text-indent:-.25in;mso-list:l1 level1 lfo1"><!--[if !supportLists]--><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";   mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">     </span></span></span><!--[endif]--><span style="font-size:11.0pt;mso-bidi-font-size:   10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-fareast-font-family:   Cambria;mso-fareast-theme-font:minor-latin;mso-hansi-theme-font:major-latin;   mso-bidi-font-family:Helvetica">Public Utilities & Cyber-Security</span><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:Calibri;   mso-ascii-theme-font:major-latin;mso-hansi-theme-font:major-latin"><o:p></o:p></span></p>   </td>   <td width="239" valign="top" style="width:239.4pt;padding:0in 5.4pt 0in 5.4pt">   <p class="MsoListParagraphCxSpMiddle" align="left" style="margin-left:.25in;   mso-add-space:auto;text-align:left;text-indent:-.25in;mso-pagination:none;   mso-list:l1 level1 lfo1;mso-layout-grid-align:none;text-autospace:none"><!--[if !supportLists]--><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";   mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">     </span></span></span><!--[endif]--><span style="font-size:11.0pt;mso-bidi-font-size:   10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-fareast-font-family:   Cambria;mso-fareast-theme-font:minor-latin;mso-hansi-theme-font:major-latin;   mso-bidi-font-family:Helvetica">Cyber-Security Readiness Index for Developing   Countries <o:p></o:p></span></p>   <p class="MsoListParagraphCxSpMiddle" align="left" style="margin-left:.25in;   mso-add-space:auto;text-align:left;text-indent:-.25in;mso-list:l1 level1 lfo1"><!--[if !supportLists]--><span style="font-size:11.0pt;font-family:"Courier New";mso-fareast-font-family:   "Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">   </span></span></span><!--[endif]--><span style="font-size:11.0pt;font-family:Cambria;mso-ascii-theme-font:minor-latin;   mso-hansi-theme-font:minor-latin">Internet<span style="mso-spacerun:   yes">  </span>protocols and policies to thwart fraud<o:p></o:p></span></p>   <p class="MsoListParagraphCxSpMiddle" align="left" style="margin-left:.25in;   mso-add-space:auto;text-align:left;text-indent:-.25in;mso-pagination:none;   mso-list:l1 level1 lfo1;mso-layout-grid-align:none;text-autospace:none"><!--[if !supportLists]--><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";   mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">     </span></span></span><!--[endif]--><span style="font-size:11.0pt;mso-bidi-font-size:   10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-fareast-font-family:   Cambria;mso-fareast-theme-font:minor-latin;mso-hansi-theme-font:major-latin;   mso-bidi-font-family:Helvetica">Organizational security implementation<o:p></o:p></span></p>   <p class="MsoListParagraphCxSpMiddle" align="left" style="margin-left:.25in;   mso-add-space:auto;text-align:left;text-indent:-.25in;mso-pagination:none;   mso-list:l1 level1 lfo1;mso-layout-grid-align:none;text-autospace:none"><!--[if !supportLists]--><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";   mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">     </span></span></span><!--[endif]--><span style="font-size:11.0pt;mso-bidi-font-size:   10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-fareast-font-family:   Cambria;mso-fareast-theme-font:minor-latin;mso-hansi-theme-font:major-latin;   mso-bidi-font-family:Helvetica">Identification & Protection of Critical   Information Infrastructures<o:p></o:p></span></p>   <p class="MsoListParagraphCxSpMiddle" align="left" style="margin-left:.25in;   mso-add-space:auto;text-align:left;text-indent:-.25in;mso-pagination:none;   mso-list:l1 level1 lfo1;mso-layout-grid-align:none;text-autospace:none"><!--[if !supportLists]--><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";   mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">     </span></span></span><!--[endif]--><span style="font-size:11.0pt;mso-bidi-font-size:   10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-fareast-font-family:   Cambria;mso-fareast-theme-font:minor-latin;mso-hansi-theme-font:major-latin;   mso-bidi-font-family:Helvetica">Knowledge Management & Cyber-Crimes<o:p></o:p></span></p>   <p class="MsoListParagraphCxSpLast" align="left" style="margin-left:.25in;   mso-add-space:auto;text-align:left;text-indent:-.25in;mso-pagination:none;   mso-list:l1 level1 lfo1;mso-layout-grid-align:none;text-autospace:none"><!--[if !supportLists]--><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:"Courier New";   mso-fareast-font-family:"Courier New";mso-bidi-font-family:"Courier New""><span style="mso-list:Ignore">o<span style="font:7.0pt "Times New Roman"">     </span></span></span><!--[endif]--><span style="font-size:11.0pt;mso-bidi-font-size:   10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-fareast-font-family:   Cambria;mso-fareast-theme-font:minor-latin;mso-hansi-theme-font:major-latin;   mso-bidi-font-family:Helvetica">Impact of Culture on Cyber-Security<o:p></o:p></span></p>   </td>  </tr> </tbody></table> <p class="MsoNormal" style="font-family: 'Default Sans Serif', Verdana, Arial, Helvetica, sans-serif; font-size: small; "><o:p> </o:p></p> <p class="MsoNormal" style="font-family: 'Default Sans Serif', Verdana, Arial, Helvetica, sans-serif; font-size: small; "><o:p> </o:p></p> <p class="MsoNormal" style="font-family: 'Default Sans Serif', Verdana, Arial, Helvetica, sans-serif; font-size: small; "><b style="mso-bidi-font-weight:normal"><i style="mso-bidi-font-style:normal"><span style="font-size:11.0pt;mso-bidi-font-family:Arial">Paper Submission Instructions<o:p></o:p></span></i></b></p> <p class="MsoNormal" style="font-family: 'Default Sans Serif', Verdana, Arial, Helvetica, sans-serif; font-size: small; "><span style="font-size:11.0pt;mso-bidi-font-family:Arial"><o:p> </o:p></span></p> <p class="MsoNormal" style="font-family: 'Default Sans Serif', Verdana, Arial, Helvetica, sans-serif; font-size: small; "><span style="font-size: 11pt; font-family: Calibri; "><font color="#12243e">Authors are invited to submit original papers using the journal submission and reviewing web site </font></span><a href="https://mc.manuscriptcentral.com/itd"><span style="font-size: 11pt; font-family: Calibri; text-decoration: none; "><font color="#001bff">https://mc.manuscriptcentral.com/itd</font></span></a><b><span style="font-size: 11pt; font-family: Calibri; "><font color="#12243e">. </font></span></b><span style="font-size:11.0pt;mso-bidi-font-size: 19.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-fareast-font-family: Cambria;mso-fareast-theme-font:minor-latin;mso-hansi-theme-font:major-latin; mso-bidi-font-family:Times">The papers should follow the authorħ instructions at the site and indicate ■i style="mso-bidi-font-style:normal">Cyber Security for Development¨special issue when uploading their papers. Submissions to the special issue should be full research papers (maximum 21 pages or 9000 words) or practice papers of about (4000 words). After initial screening, papers are reviewed by selected members of the editorial board and peers from an international pool for quality, consistency and research contribution. Authors are welcome to nominate one of the special issue editors or preferred reviewers when submitting their paper. Particular attention is paid to the use of the chosen research method. Papers submitted to this journal must contain original results and must not be submitted elsewhere while being evaluated for the Journal of Information Technology for Development.</span><span style="font-size: 11pt; font-family: Calibri; "><font color="#12243e"> Detailed submission guidelines can be found at</font></span><span style="font-size:11.0pt;mso-bidi-font-size:12.0pt;font-family:Calibri; mso-ascii-theme-font:major-latin;mso-hansi-theme-font:major-latin">: </span><a href="http://www.tandf.co.uk/journals/journal.asp?issn=0268-1102&linktype=44"><span style="font-size:11.0pt;mso-bidi-font-size:12.0pt;font-family:Calibri; mso-ascii-theme-font:major-latin;mso-hansi-theme-font:major-latin">http://www.tandf.co.uk/journals/journal.asp?issn=0268-1102&linktype=44</span></a><span style="font-size:11.0pt;mso-bidi-font-size:12.0pt;font-family:Calibri; mso-ascii-theme-font:major-latin;mso-hansi-theme-font:major-latin">. </span><span style="font-size: 11pt; font-family: Calibri; "><font color="#12243e"><o:p></o:p></font></span></p> <p class="MsoNormal" style="font-family: 'Default Sans Serif', Verdana, Arial, Helvetica, sans-serif; font-size: small; "><span style="font-size: 11pt; font-family: Calibri; "><font color="#12243e"> </font></span><span style="font-size:11.0pt;mso-bidi-font-size:23.0pt;font-family:"Times New Roman"; mso-fareast-font-family:Cambria;mso-fareast-theme-font:minor-latin"><o:p></o:p></span></p> <p class="MsoNormal" style="font-family: 'Default Sans Serif', Verdana, Arial, Helvetica, sans-serif; font-size: small; "><span style="font-size:11.0pt;mso-bidi-font-family:Arial"><o:p> </o:p></span></p> <table class="MsoTableGrid" border="0" cellspacing="0" cellpadding="0" style="font-family: 'Default Sans Serif', Verdana, Arial, Helvetica, sans-serif; font-size: small; border-collapse: collapse; ">  <tbody><tr style="mso-yfti-irow:0;mso-yfti-firstrow:yes">   <td width="230" valign="top" style="width:3.2in;padding:0in 5.4pt 0in 5.4pt">   <p class="MsoNormal" align="left" style="margin-top:0in;margin-right:-11.7pt;   margin-bottom:0in;margin-left:-4.5pt;margin-bottom:.0001pt;text-align:left"><b style="mso-bidi-font-weight:normal"><span style="font-size:14.0pt">Guest   Editors:</span></b><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;   font-family:Calibri;mso-ascii-theme-font:major-latin;mso-hansi-theme-font:   major-latin"><o:p></o:p></span></p>   </td>   <td width="243" valign="top" style="width:243.0pt;padding:0in 5.4pt 0in 5.4pt">   <p class="MsoNormal" align="center" style="text-align:center"><strong><o:p> </o:p></strong></p>   </td>  </tr>  <tr style="mso-yfti-irow:1">   <td width="230" valign="top" style="width:3.2in;padding:0in 5.4pt 0in 5.4pt">   <p class="MsoNormal" align="left" style="margin-top:0in;margin-right:-11.7pt;   margin-bottom:0in;margin-left:.25in;margin-bottom:.0001pt;text-align:left"><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:Calibri;   mso-ascii-theme-font:major-latin;mso-hansi-theme-font:major-latin"><o:p> </o:p></span></p>   </td>   <td width="243" valign="top" style="width:243.0pt;padding:0in 5.4pt 0in 5.4pt">   <p class="MsoNormal" align="center" style="text-align:center"><strong><o:p> </o:p></strong></p>   </td>  </tr>  <tr style="mso-yfti-irow:2">   <td width="230" valign="top" style="width:3.2in;padding:0in 5.4pt 0in 5.4pt">   <p class="MsoNormal" align="left" style="margin-top:0in;margin-right:-11.7pt;   margin-bottom:0in;margin-left:.25in;margin-bottom:.0001pt;text-align:left"><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:Calibri;   mso-ascii-theme-font:major-latin;mso-hansi-theme-font:major-latin">Kweku-Muata   Osei-Bryson<o:p></o:p></span></p>   <p class="MsoNormal" align="left" style="margin-top:0in;margin-right:-11.7pt;   margin-bottom:0in;margin-left:.25in;margin-bottom:.0001pt;text-align:left"><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:Calibri;   mso-ascii-theme-font:major-latin;mso-hansi-theme-font:major-latin">Department   of Information Systems <o:p></o:p></span></p>   <p class="MsoNormal" align="left" style="margin-top:0in;margin-right:-11.7pt;   margin-bottom:0in;margin-left:.25in;margin-bottom:.0001pt;text-align:left"><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:Calibri;   mso-ascii-theme-font:major-latin;mso-hansi-theme-font:major-latin">Virginia   Commonwealth University<o:p></o:p></span></p>   <p class="MsoNormal" align="left" style="margin-top:0in;margin-right:-11.7pt;   margin-bottom:0in;margin-left:.25in;margin-bottom:.0001pt;text-align:left"><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:Calibri;   mso-ascii-theme-font:major-latin;mso-hansi-theme-font:major-latin">Richmond,   VA 23284, USA<o:p></o:p></span></p>   <p class="MsoNormal" align="left" style="margin-top:0in;margin-right:-11.7pt;   margin-bottom:0in;margin-left:.25in;margin-bottom:.0001pt;text-align:left"><span style="mso-bidi-font-size:10.0pt"><a href="mailto:KMOsei@VCU.Edu"><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:Calibri;   mso-ascii-theme-font:major-latin;mso-hansi-theme-font:major-latin;color:windowtext">KMOsei@VCU.Edu</span></a></span><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:Calibri;   mso-ascii-theme-font:major-latin;mso-hansi-theme-font:major-latin"><o:p></o:p></span></p>   </td>   <td width="243" valign="top" style="width:243.0pt;padding:0in 5.4pt 0in 5.4pt">   <p class="MsoNormal" style="margin-top:0in;margin-right:-11.7pt;margin-bottom:   0in;margin-left:.25in;margin-bottom:.0001pt"><span style="font-size:11.0pt;   mso-bidi-font-size:10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;   mso-hansi-theme-font:major-latin">Doug Vogel<o:p></o:p></span></p>   <p class="MsoNormal" style="margin-top:0in;margin-right:-11.7pt;margin-bottom:   0in;margin-left:.25in;margin-bottom:.0001pt"><span style="font-size:11.0pt;   mso-bidi-font-size:10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;   mso-hansi-theme-font:major-latin">Department of Information Systems<o:p></o:p></span></p>   <p class="MsoNormal" style="margin-top:0in;margin-right:-11.7pt;margin-bottom:   0in;margin-left:.25in;margin-bottom:.0001pt"><span style="font-size:11.0pt;   mso-bidi-font-size:10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;   mso-hansi-theme-font:major-latin">City University of Hong Kong<o:p></o:p></span></p>   <p class="MsoNormal" style="margin-top:0in;margin-right:-11.7pt;margin-bottom:   0in;margin-left:.25in;margin-bottom:.0001pt"><span lang="FI" style="font-size:   11.0pt;mso-bidi-font-size:10.0pt;font-family:Calibri;mso-ascii-theme-font:   major-latin;mso-hansi-theme-font:major-latin;mso-ansi-language:FI">Kowloon,   Hong Kong</span><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;   font-family:Calibri;mso-ascii-theme-font:major-latin;mso-hansi-theme-font:   major-latin"><o:p></o:p></span></p>   <p class="MsoNormal" style="margin-top:0in;margin-right:-11.7pt;margin-bottom:   0in;margin-left:.25in;margin-bottom:.0001pt"><span style="mso-bidi-font-size:   10.0pt"><a href="mailto:isdoug@cityu.edu.hk"><span lang="FI" style="font-size:   11.0pt;mso-bidi-font-size:10.0pt;font-family:Calibri;mso-ascii-theme-font:   major-latin;mso-hansi-theme-font:major-latin;color:windowtext;mso-ansi-language:   FI">isdoug@cityu.edu.hk</span></a></span><span style="font-size:11.0pt;   mso-bidi-font-size:10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;   mso-hansi-theme-font:major-latin"><o:p></o:p></span></p>   <p class="MsoNormal" align="left" style="text-align:left"><strong><o:p> </o:p></strong></p>   </td>  </tr>  <tr style="mso-yfti-irow:3">   <td width="230" valign="top" style="width:3.2in;padding:0in 5.4pt 0in 5.4pt">   <p class="MsoNormal" align="center" style="text-align:center"><b style="mso-bidi-font-weight:normal"><span style="mso-bidi-font-size:10.0pt"><o:p> </o:p></span></b></p>   </td>   <td width="243" valign="top" style="width:243.0pt;padding:0in 5.4pt 0in 5.4pt">   <p class="MsoNormal" align="center" style="text-align:center"><strong><o:p> </o:p></strong></p>   </td>  </tr>  <tr style="mso-yfti-irow:4">   <td width="473" colspan="2" valign="top" style="width:473.4pt;padding:0in 5.4pt 0in 5.4pt">   <p class="MsoNormal" align="left" style="text-align:left"><b style="mso-bidi-font-weight:   normal"><span style="mso-bidi-font-size:10.0pt;mso-bidi-font-family:Arial">Background   of special issue editor(s)</span></b><strong><o:p></o:p></strong></p>   </td>  </tr>  <tr style="mso-yfti-irow:5">   <td width="230" valign="top" style="width:3.2in;padding:0in 5.4pt 0in 5.4pt">   <p class="MsoNormal" align="center" style="text-align:center"><b style="mso-bidi-font-weight:normal"><span style="mso-bidi-font-size:10.0pt"><o:p> </o:p></span></b></p>   </td>   <td width="243" valign="top" style="width:243.0pt;padding:0in 5.4pt 0in 5.4pt">   <p class="MsoNormal" align="center" style="text-align:center"><strong><o:p> </o:p></strong></p>   </td>  </tr>  <tr style="mso-yfti-irow:6">   <td width="230" valign="top" style="width:3.2in;padding:0in 5.4pt 0in 5.4pt">   <p class="MsoNormal" align="center" style="text-align:center"><b style="mso-bidi-font-weight:normal"><span style="font-size:11.0pt;mso-bidi-font-size:   10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-hansi-theme-font:   major-latin">Kweku-Muata Osei-Bryson<o:p></o:p></span></b></p>   </td>   <td width="243" valign="top" style="width:243.0pt;padding:0in 5.4pt 0in 5.4pt">   <p class="MsoNormal" align="center" style="text-align:center"><strong><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:Calibri;   mso-ascii-theme-font:major-latin;mso-hansi-theme-font:major-latin">Doug Vogel</span></strong><b style="mso-bidi-font-weight:normal"><span style="font-size:11.0pt;mso-bidi-font-size:   10.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-hansi-theme-font:   major-latin"><o:p></o:p></span></b></p>   </td>  </tr>  <tr style="mso-yfti-irow:7;mso-yfti-lastrow:yes">   <td width="230" valign="top" style="width:3.2in;padding:0in 5.4pt 0in 5.4pt">   <p><span style="font-size:11.0pt">Kweku-Muata Osei-Bryson is Professor of </span><span style="font-size:11.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;   mso-hansi-theme-font:major-latin">Information Systems at </span><span style="mso-bidi-font-size:10.0pt"><a href="http://www.vcu.edu/"><span style="font-size:11.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;   mso-hansi-theme-font:major-latin;color:windowtext">Virginia Commonwealth   University</span></a></span><span style="font-size:11.0pt;font-family:Calibri;   mso-ascii-theme-font:major-latin;mso-hansi-theme-font:major-latin">, where he   also served as the Coordinator of the Ph.D. program in Information Systems   during 2001-2003. Previously he was Professor of Information Systems & Decision   Sciences in the School of Business at </span><span style="mso-bidi-font-size:   10.0pt"><a href="http://www.howard.edu/"><span style="font-size:11.0pt;   font-family:Calibri;mso-ascii-theme-font:major-latin;mso-hansi-theme-font:   major-latin;color:windowtext">Howard University</span></a></span><span style="font-size:11.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;   mso-hansi-theme-font:major-latin">, Washington, DC, U.S.A. He has also worked   as an Information Systems practitioner in both industry and government. He   holds a Ph.D. in Applied Mathematics (Management Science & Information   Systems) from the University of Maryland at College Park.<o:p></o:p></span></p>   <p class="MsoNormal" align="left" style="text-align:left"><span style="font-size:   11.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;mso-hansi-theme-font:   major-latin">His current research areas include: Data Mining, IS Security,   Data &Knowledge Management, Expert & Decision Support Systems,   e-Commerce, IT for Development. His papers have been published in various   journals including<i style="mso-bidi-font-style:normal">: IT for Development,   Decision Support Systems</i>, <i style="mso-bidi-font-style:normal">IEEE   Security</i>& Privacy, <i style="mso-bidi-font-style:normal">Information   Systems Journal, European Journal of Information Systems, Journal of the   Association for Information Systems, Expert Systems with Applications, Omega,   Computers& Operations Research, European Journal of Operational Research,   Journal of the Operational Research Society</i>. Currently he serves as   Vice-Chair for Research of the AIS SIG on ICT in Global Development, as an   Associate Editor of the </span><span style="mso-bidi-font-size:10.0pt"><a href="http://joc.pubs.informs.org/"><span style="font-size:11.0pt;font-family:   Calibri;mso-ascii-theme-font:major-latin;mso-hansi-theme-font:major-latin;   color:windowtext">INFORMS Journal on Computing</span></a></span><span style="font-size:11.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;   mso-hansi-theme-font:major-latin">, and on the Editorial Board of the </span><span style="mso-bidi-font-size:10.0pt"><a href="http://www.elsevier.com/homepage/sae/orms/cor/menu.htm"><span style="font-size:11.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;   mso-hansi-theme-font:major-latin;color:windowtext">Computers & Operations   Research journal</span></a></span><span style="font-size:11.0pt;font-family:   Calibri;mso-ascii-theme-font:major-latin;mso-hansi-theme-font:major-latin">,   and the International Advisory Board of the Journal of the Operational   Research Society.</span><span style="mso-bidi-font-size:10.0pt"><o:p></o:p></span></p>   </td>   <td width="243" valign="top" style="width:243.0pt;padding:0in 5.4pt 0in 5.4pt">   <p class="MsoNormal" align="left" style="text-align:left;tab-stops:103.5pt"><span style="font-size:11.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;   mso-hansi-theme-font:major-latin">Doug Vogel is Professor of Information   Systems (IS) at the City University of Hong Kong and Acting Management   Department Head as well as an Association for Information Systems (AIS)   Fellow and AIS President-elect. He received his M.S. in Computer Science from   U.C.L.A. and his Ph.D. in Management Information Systems from the University   of Minnesota where he was also research coordinator for the MIS Research   Center.<span style="mso-spacerun: yes">  </span>In a ten-year   relationship with a Colorado electronics manufacturer he served in virtually   every technical and managerial capacity including Director of Engineering,   General Manager and member of the Board of Directors. <o:p></o:p></span></p>   <p class="MsoNormal" align="left" style="text-align:left;tab-stops:103.5pt"><span style="font-size:11.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;   mso-hansi-theme-font:major-latin"><o:p> </o:p></span></p>   <p class="MsoNormal" align="left" style="text-align:left;tab-stops:103.5pt"><span style="font-size:11.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin;   mso-hansi-theme-font:major-latin">Professor Vogel has published widely and   been recognized as the most cited IS author in Asia Pacific. His teaching and   research interests bridge the business and academic communities in addressing   issues of information system creation and impact on aspects of interpersonal   communication, group problem solving, cooperative learning, and   multi-cultural team productivity in security-enabled contexts. His interests   reflect a concern for encouraging efficient and effective utilization of   computer systems in an atmosphere conducive to enhancing the quality of life.   He is especially active in introducing group support technology into   enterprises and educational systems. His particular focus emphasizes   security-sensitive integration of audio, video, and data in interactive   distributed group support. Additional detail can be found at   http://www.is.cityu.edu.hk/staff/isdoug/cv/. <o:p></o:p></span></p>   </td>  </tr> </tbody></table> <p class="MsoNormal" style="font-family: 'Default Sans Serif', Verdana, Arial, Helvetica, sans-serif; font-size: small; "><span style="mso-bidi-font-family:Arial"><o:p> </o:p></span></p> <p class="MsoNormal" style="font-family: 'Default Sans Serif', Verdana, Arial, Helvetica, sans-serif; font-size: small; "><span style="mso-bidi-font-family:Arial"><o:p> </o:p></span></p> <p class="MsoNormal" style="font-family: 'Default Sans Serif', Verdana, Arial, Helvetica, sans-serif; font-size: small; "><b style="mso-bidi-font-weight:normal"><span style="font-size:12.0pt;font-family: Calibri;mso-ascii-theme-font:major-latin;mso-hansi-theme-font:major-latin; mso-bidi-font-family:Arial">Timeline and Review Guidelines</span></b><span style="font-size:12.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin; mso-hansi-theme-font:major-latin;mso-bidi-font-family:Arial"><o:p></o:p></span></p> <p class="MsoNormal" style="font-family: 'Default Sans Serif', Verdana, Arial, Helvetica, sans-serif; font-size: small; "><span style="mso-bidi-font-family:Arial"><o:p> </o:p></span></p> <p class="MsoNormal" align="left" style="font-family: 'Default Sans Serif', Verdana, Arial, Helvetica, sans-serif; font-size: small; margin-left: 0.5in; text-align: left; "><span style="font-size:11.0pt; mso-bidi-font-size:12.0pt;font-family:Calibri;mso-ascii-theme-font:major-latin; mso-hansi-theme-font:major-latin">Deadline for manuscripts:<span style="mso-spacerun: yes">        </span><span style="mso-tab-count:1">                  </span>September 15, 2012<br> Preliminary notice to authors:<span style="mso-spacerun: yes">  </span><span style="mso-tab-count:1">                  </span>December 15, 2012<br> Revision Due:<span style="mso-spacerun: yes">  </span><span style="mso-tab-count:1">                  </span><span style="mso-tab-count:1">                  </span><span style="mso-tab-count:1">                  </span>February 15, 2013<br> Final Manuscript Due:<span style="mso-spacerun: yes">               </span><span style="mso-tab-count:1">                  </span>April 30, 2013</span><span style="font-size:11.0pt;mso-bidi-font-size:12.0pt; font-family:Calibri;mso-ascii-theme-font:major-latin;mso-hansi-theme-font:major-latin; mso-bidi-font-family:Arial"><o:p></o:p></span></p> <p class="MsoNormal" style="font-family: 'Default Sans Serif', Verdana, Arial, Helvetica, sans-serif; font-size: small; "><span style="font-size:11.0pt;mso-bidi-font-size:12.0pt;font-family:Calibri; mso-ascii-theme-font:major-latin;mso-hansi-theme-font:major-latin;mso-bidi-font-family: Arial"><o:p> </o:p></span></p> <p class="MsoNormal" style="font-family: 'Default Sans Serif', Verdana, Arial, Helvetica, sans-serif; font-size: small; "><span style="font-size:11.0pt;mso-bidi-font-size:12.0pt; font-family:Calibri;mso-ascii-theme-font:major-latin;mso-hansi-theme-font:major-latin">Each submitted paper will be peer-reviewed in the same manner as other submissions to Journal of IT for Development. Relevance, Quality and originality of the contribution are the major acceptance criteria for each submission. Due to the tight deadline, papers for which the outcome is ■i style="mso-bidi-font-style: normal">Major Revision¨will not be accepted for this focused issue, but may be put into the journalħ regular review process and, after revision is complete, be considered for a regular issue of the journal<o:p></o:p></span></p> <p class="MsoNormal" style="font-family: 'Default Sans Serif', Verdana, Arial, Helvetica, sans-serif; font-size: small; "><o:p> </o:p></p> <!--EndFragment--><div><font class="Apple-style-span" face="'Default Sans Serif', Verdana, Arial, Helvetica, sans-serif" size="2"><br></font></div><div><font class="Apple-style-span" face="'Default Sans Serif', Verdana, Arial, Helvetica, sans-serif" size="2"><br></font><div><span class="Apple-style-span" style="font-family: 'Default Sans Serif', Verdana, Arial, Helvetica, sans-serif; font-size: small; "><br></span></div><div><span class="Apple-style-span" style="font-family: 'Default Sans Serif', Verdana, Arial, Helvetica, sans-serif; font-size: small; "><br></span></div></div></div></div></div><div></div></font> <div id="MIMEAttachInfoDiv" style="display:none" title="pdf|IT4D - Cyber-Security for Development - Call for Papers.pdf"></div> </blockquote></div><div></div></font> <div id="MIMEAttachInfoDiv" style="display:none" title="pdf|IT4D - Cyber-Security for Development - Call for Papers.pdf"></div> </blockquote></div><div></div></font>