[1] | Symantec (2016) Cyber Crime and Cybersecurity Trends in Africa.
|
[2] | IFC & Google (2020) Economy Africa 2020: Africa’s $180 Billion Internet Economy Future.
|
[3] | Adegoke, A., Boakye, B. and Garson, M. (2022) Cybersecurity in Africa: What Should African Leaders Do to Strengthen Teh Digital Economy? Tony Balir Institute for Global Change. https://institute.global/policy/how-rethink-cybersecurity-africa-strengthen-digital-economy
|
[4] | Accenture (2020) Insights into the Cyberthreat Landscape in South Africa.
|
[5] | Okeowo, Y. (2021) Mobile Malware Epidemic Hits Nigeria; 1 in 9 Android Phones Now Infected.
|
[6] | Xinhua (2021) Cyber Attack Attempts More than Double in Ethiopia This Year. https://africa.cgtn.com/2021/09/07/cyber-attack-attempts-more-than-double-in-ethiopia-this-year
|
[7] | KPMG (2022) Africa Cybersecurity Outlook.
|
[8] | Ndenda, A. and Collins, O. (2019) Cyber Threats and Cybersecurity in Kenyan Business Context. Global Scientific Journal, 7, 576-582.
|
[9] | Kagwiria, C. (2020) Cybersecuirty Skills Gap in Africa. AFRALTI. https://www.afralti.org/cybersecurity-skills-gap-in-africa
|
[10] | Mwenda, E. (2022) Demand for Cybersecurity Experts Grows on Attacks. Business Daily.
|
[11] | Waithaka, S. (2016) Factors Affecting Cyber Security in National Government Ministries in Kenya. University of Nairobi, Nairobi.
|
[12] | Serianu (2018) Kenya Cybersecurity Report 2018.
|
[13] | Kanali, N. (2022) New Cyber Hujaa Program Bridges Country’s Cybersecurity Skills. African Business Community.
|
[14] | Gitahiga, G., Kapiyo, V., Kivuva, M., et al. (2022) A Study Paper on Human-Centred Cybersecurity: Kenyan Fintech Sector.
|
[15] | Kshetri, N. (2019) Cybercrime and Cybersecurity in Africa. Journal of Global Information Technology Management, 22, 77-81. https://doi.org/10.1080/1097198X.2019.1603527
|
[16] | Government of Kenya (2014) National Cybersecurity Strategy 2014. Ministry of Information and Communication Technology.
|
[17] | Serianu (2017) Demystifying Africa’s Cybersecurity Poverty Line.
|
[18] | BHEF (2017) Understanding Cybersecurity Talent Needs Findings from Surveys of Business Executives and College Presidents. GULLUP. https://www.bhef.com/sites/default/files/bhef_2017_cybersecurity.pdf
|
[19] | ASTD (2012) Bridging the Skill Gap: Help Wanted, Skills Lacking: Why the Mismatch in Today’s Economy?
|
[20] | Seamus, M. and Luis, O. (2015) Skill Gaps in the Workplace: Measurement, Determinants and Impacts. EconStor. https://www.econstor.eu/bitstream/10419/114146/1/dp9278.pdf
|
[21] | (ISC)2 (2022) A Critical Need for Cybersecurity Professionals Persists amidst a Year of Cultural and Workplace Evolution. (ISC)2 Cybersecurity Workforce Study.
|
[22] | Serianu (2016) Achieving Cyber Security Resilience: Enhancing Visibility and Increasing Awareness. Serianu, Kenya Cyber Security Report 2016.
|
[23] | Serianu (2018) Cyber Security Skills Gap. Serianu, Kenya. https://www.serianu.com/downloads/KenyaCyberSecurityReport2018.pdf
|
[24] | Seck, M., Belai, T. and Nwuke, K. (2014) Tackling the Challenges of Cybersecurity in Africa. United Nation Economic Commission for Africa. https://repository.uneca.org/bitstream/handle/10855/22544/b11079411.pdf?sequence=1&isAllowed=y
|
[25] | EC-Council (2018) EC-Council and Extant Group Work toward Reducing the Huge Talent Gap in the Kenyan Cybersecurity Industry, Which Threatens to Exceed 40,000 Professionals. https://www.eccouncil.org/ec-council-and-extant-group-work-toward-reducing-the-huge-talent-gap-in-the-kenyan-cybersecurity-industry-which-threatens-to-exceed-40000-professionals
|
[26] | Aptantech (2022) Cyber Shujaa Program Aims to Bridge Kenya’s IT Security Skills Gap. https://aptantech.com/2022/07/29/cyber-shujaa-program-aims-to-bridge-kenyas-it-security-skills-gap
|
[27] | Capital Business (2020) Strathmore University to Address Cybersecurity Skills Gap Following New Collaboration. https://www.capitalfm.co.ke/business/2020/07/strathmore-university-to-address-cybersecurity-skills-gap-following-new-collaboration/
|
[28] | KBC (2022) Women in Cyber Security|Stanchart Launch Mentorship Program. https://www.kbc.co.ke/women-in-cyber-security-stanchart-launch-mentorship-program/
|
[29] | Mukiibi, H. (2019) Cyber Security in Africa: The Boring Technology Story That Matters. XRDS: Crossroads, The ACM Magazine for Students, 26, 56-59. https://doi.org/10.1145/3368077
|
[30] | BHEF (2017) Invest to Improve the Cyber Security Talent Deficit. Business Higher Education Forum. https://files.eric.ed.gov/fulltext/ED580862.pdf
|
[31] | Moore, M. (2022) Cybersecurity Hiring: Why Employer and Higher Ed Collaboration Is Key. INFOSEC. https://resources.infosecinstitute.com/topic/cybersecurity-hiring-why-employer-and-higher-ed-collaboration-is-key/
|
[32] | Zurkus, K. (2018) How Can Industry Leaders and Academia Help Improve Cybersecurity Education? Security Intelligence. https://securityintelligence.com/how-can-industry-leaders-and-academia-help-improve-cybersecurity-education/
|
[33] | C4DLab (2022) Cybersecurity Training. http://c4dlab.uonbi.ac.ke/training/cybersecurity/
|
[34] | SmartInvestor (2020) Strathmore University Joins Fortinet Security Academy to Tackle Cybersecurity Skills Gap in Kenya. SmartInvestor. https://smartinvestor.co.ke/4315/strathmore-university-joins-fortinet-security-academy-to-tackle-cybersecurity-skills-gap-in-kenya/
|
[35] | USIU-Africa (2022) Launch of the CyberShujaa Program. https://www.usiu.ac.ke/2541/launch-cybershujaa-program/
|
[36] | Serianu (2017) Demystifying Africa’s Cyber Security Poverty Line. Serianu, Kenya Cyber Security Report 2017.
|
[37] | Chad, K. (2018) The Benefits of Cybersecurity Certifications. SBS Cybersecurity. https://sbscyber.com/resources/the-benefits-of-cybersecurity-certifications
|
[38] | Zorz, M. (2019) Exploring the Benefits of Cybersecurity Certification. HelpNetSecurity. https://www.helpnetsecurity.com/2019/10/29/cybersecurity-certification/
|
[39] | Kenyaplex (2022) Colleges and Universities Offering Certified Ethical Hacker (CEH) in Kenya. https://www.kenyaplex.com/courses/3576-certified-ethical-hacker-ceh.aspx
|
[40] | Kenyatta University (2022) ICT Professional Training and Certification Center (IPTCC). http://ku.ac.ke/cisco/
|
[41] | Komssi, M., Pichlis, D. and Raatikainen, K. (2015) What Are Hackathons for? IEEE Software, 32, 60-67. https://doi.org/10.1109/MS.2014.78
|
[42] | Uffreduzzi, M., Pellizzoni, E. and Dell, C. (2017) Hackathon as Emerging Innovation Practice: Exploring Opportunities and Challenges through 8 In-Depth Case Studies. Politecnico Milano 1863. https://www.politesi.polimi.it/bitstream/10589/137237/5/Hackathon%20as%20Emerging%20Innovation%20Practice.pdf
|
[43] | Abuya, K. (2019) Strathmore and UoN Top Cybersecurity Hackathon Hosted by the Communications Authority. Techweez. https://techweez.com/2019/10/28/communications-authority-hackathon-nairobi/
|
[44] | Opera, N. (2022) Cybersecurity Awareness Month: Kenya on Good Track on Matters of Cyber Attacks Prevention. Opera News. https://ke.opera.news/ke/en/digital-technology/6e09224cc1ead9dadaef5e6c0a3b0555
|
[45] | Crumpler, W. and Lewis, J. (2019) The Cybersecurity Workforce Gap. Center for Strategic and International Studies, Washington DC. https://csis-website-prod.s3.amazonaws.com/s3fs-public/publication/190129_Crumpler_Cybersecurity_FINAL.pdf
|
[46] | Burning Glass Technologies (2014) Job Market Intelligence: Report on the Growth of Cybersecurity Jobs. Burning Glass Technologies.
|
[47] | Burning Glass Technologies (2019) Recruiting Watchers for the Virtual Walls: The State of Cybersecurity Hiring. Burning Glass Technologies.
|