Corlane Barclay

Corlane Barclay
Smart Projects 360

PhD(Info Sys), LLB, PMP
Cybersecurity; Data protection and Privacy; Project Management; and Education

About

60
Publications
28,746
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
456
Citations
Citations since 2017
20 Research Items
256 Citations
201720182019202020212022202301020304050
201720182019202020212022202301020304050
201720182019202020212022202301020304050
201720182019202020212022202301020304050
Introduction
I am an Attorney-at-law , project management practitioner and consultant specializing in diverse areas including data privacy, protection and cybersecurity. My current focus is on GDPR and other data protection laws, particularly in the Caribbean. Research interests are data privacy, information/cyber security, project management, project success, KDD, ICT4D, education, Internet, Technology & Telecoms Law.
Additional affiliations
August 2013 - present
Position
  • Researcher
Description
  • Cybsersec research and development that matters to developing economies.
September 2009 - March 2016
University of Technology, Jamaica
Position
  • Lecturer
Description
  • Experience includes teaching at the undergraduate and graduate levels in a wide range of subjects including project management, information technology, software engineering and research methods
September 2009 - March 2016
University of Technology, Jamaica
Position
  • Lecturer
Education
January 2018 - August 2019
Athabasca University
Field of study
  • Legislative Drafting
August 2013 - August 2015
Norman Manley Law School
Field of study
  • Law
August 2009 - September 2012

Publications

Publications (60)
Article
Determining the contribution of information system (IS) projects is a difficult endeavour. This research presents a framework for evaluating and measuring IS project performance that seek to address this problem while moving away from the reliance on the traditional assessment method (time, cost, specifications). When IS projects fail or succeed is...
Article
Providing sound legislative measure is a critical part of the national and international responses to cybercrime. The primary objective of this research is to raise awareness of the recently enacted Cybercrimes Act, 2015 of Jamaica, which is examined through the lens of the Convention on Cybercrime. The substantive law provisions are explored and i...
Article
The evolving sophistication of threats and the impact of security breaches have caused managers to continually grapple with strategies to reduce these risks. One common security control is the adoption of information security policies (ISPs) geared at improving employees’ compliance behaviour. However, there is mounting empirical evidence that sho...
Book
Full-text available
The Global South is recognized as one of the fastest growing regions in terms of Internet population as well as the region that accounts for the majority of Internet users. However, It cannot be overlooked that with increasing connectivity to and dependence on Internet-based platforms and services, so too is the potential increased for information...
Article
Online learning has grown as a key method in education management over the last couple of decades. Studies have shown that significant investments in this technology are being made by universities, yet the full benefits expected have not been realized due to issues and challenges experienced by stakeholders such as learners and instructors in adopt...
Chapter
The chapter presents the Cybersecurity Capability Maturity Model (CCMM), a six-step process of progressive development of cybersecurity maturity and knowledge integration that ranges from a state of limited awareness and application of security controls to pervasive optimization of the protection of critical assets. It represents an adaptation of e...
Chapter
The cybersecurity/IS-security decision problem is a complex one that involves multiple concerns of multiple stakeholders that must be taken into consideration. A useful resource to consider in addressing this problem is the Value-Focused Thinking (VFT) methodology as at a minimum it can be used to elicit and structure the relevant solution objectiv...
Chapter
Micro small and medium enterprises (MSMEs) are crucial drivers of economic activities, particularly for developing countries. Thus, there is little doubt that the continued high incidences of cyber incidents and crimes experienced by these businesses have had a significant economic impact both on these businesses and the economy. Adopting good cybe...
Chapter
In recent years, there has been an increase in cybercrimes and its negative impacts on the lives of individuals, organizations and governments. It has been argued that a better understanding of cybercrime is a necessary condition to develop appropriate legal and policy responses to cybercrime. While a universally agreed-upon classification scheme w...
Chapter
The transnational nature of cybercrime makes it increasingly difficult to effectively enforce these escalating crimes. The increased Internet penetration creates an environment that foments the risks of escalating threats and cybercrimes such as sexual exploitation of vulnerable groups, ransomware, phishing and lottery scams. This research examines...
Chapter
The Global South is not only recognized as one of the fastest-growing regions in terms of Internet population but also as the region that accounts for the majority of Internet users. For instance, it was reported that one region of the Global South, Latin America and the Caribbean (LAC), had the fastest-growing Internet population in the world with...
Chapter
Cybercrime and security breaches affect everyone, whether directly or indirectly. Small businesses (MSMEs/SMEs) and government agencies, particularly those in developing economies, are often burdened with these escalating security risks and dwindling resources and know-how. Without proper attention and leadership, these risks can lead to additional...
Chapter
In order to adequately address a given problem, it is important to know where you are and where you need to go. Global indices (e.g. Global Cybersecurity Index, Human Development Index), though neither perfect in design nor implementation, offer the opportunity for a given country to assess its current situation and to plan for improvements. Assess...
Chapter
Global South (GS) or developing countries, like other countries in the Global North (i.e. developed countries), are experiencing increased digitalization of many businesses and services, especially during the COVID-19 pandemic. While this increased digitalization has engendered numerous opportunities for many countries, cyber threats have equally e...
Chapter
Recent information and cybersecurity research have focused on improving individuals’ security compliance behaviour. However, improved security performance remains a challenge since individuals often fail to comply with security best practices. In this study, we investigate a new individual cybersecurity compliance behaviour model proposed by Donald...
Chapter
The data protection landscape has been radically transformed since the passing of the European Union’s General Data Protection Regulation (GDPR). Many countries (e.g. Jamaica, Barbados, Brazil and several states in the US) have since developed laws that are closely similar to the GDPR. The purpose of the chapter is to examine some of the notable fi...
Chapter
It has been observed by various researchers and practitioners that employees are the weakest link in the chain of system security. Various discretionary extrinsic variables (e.g. General Security Awareness) and non-discretionary intrinsic variables (e.g. General Security Orientation) have been identified as being statistically significant predictor...
Data
This supplemental material includes the following: Table A1: This table presents some empirical studies grounded in deterrence theory, protection motivation theory, theory of planned behaviour and information security awareness that focus on information security (InfoSec) related behaviours and information security policy compliance (ISPC) behavio...
Article
Full-text available
The article discusses an approach to devise appropriate privacy and data protection strategy as a means to effective manage privacy programs as privacy officers and organizations grapple with growing regulatory demands. https://www.isaca.org/resources/isaca-journal/issues/2021/volume-2/what-is-your-privacy-and-data-protection-strategy
Article
Full-text available
The increased obligations placed on organizations that are controllers or processors, irrespective of the size of these enterprises, suggest that a structured and systematic approach to compliance must be undertaken. (Article can be found here - http://www.isacajournal-digital.org/isacajournal/2019_volume_1/MobilePagedArticle.action?articleId=1453...
Article
The continued growth of Social Networking Services (SNS) has significant implications for computer and cybercrime management. In exploring the human side of security, studies have shown that any security response requires more than technical solutions. This is even more so as users are often seen as the main point of vulnerabilities for computer sy...
Conference Paper
Full-text available
Over the Top (OTT) content has seen unprecedented growth in recent years that has disrupted the traditional telecommunication business model. As a consequence, countries have offered different regulatory responses. The Caribbean market has seen similar evolution in OTT content which has transformed the telecommunication market and has influenced th...
Book
Full-text available
Based on expert practitioners’ contributions from across the globe including Brazil, Jamaica, Malaysia, Pakistan, Thailand, the United Kingdom, and the United States, Strategic Project Management: Contemporary Issues and Strategies for Developing Economies offers modern experiences, best practices, and tools for individuals and teams working in pro...
Chapter
Project success has always been an important topic in the project management discipline. This is no surprise since projects are the main vehicle in achieving and maintaining competitive operations. In short, a successful project is likely to lead to a successful business. However, the perception of success continues to mean different things to diff...
Chapter
Performance objectives are those key considerations or requirements of the stakeholders that form the basis or lens through which they view the temporary organization (i.e., a project, portfolio, or program). The ability to identify and agree on the key indicators to determine how well the temporary organization is performing or executing to expect...
Chapter
This chapter provides an overview of the project performance scorecard, a project performance evaluation technique. Growing trends in project management demand alternative performance evaluation techniques that extend the boundaries of the traditional triple constraints or iron triangle method. A key principle of measure is that what you measure is...
Chapter
Recent reports have stated that a large percentage of data mining (DM) projects including big data projects fail. This, therefore, calls for the investigation of assessment methods to analyze success or failure of these initiatives to help contribute to organizational learning, the heart of these types of projects. It is posited that the identifica...
Chapter
It is hard to imagine an organization that is not engaged in some kind of project activity. Over the past decade, organizations have been turning from operations to project management as part of their competitive advantage strategy (PWC, 2004). This is also true for other types of structures such as government, charities, and nonprofits and agencie...
Chapter
Many, if not all, organizations engage projects to deliver their products and services. However, fewer apply formal project management techniques to aid in executing their strategy. This has implications for the efficiency of performance and maximization of benefits to the organizations and their clients. Within the legal sphere, the multidisciplin...
Chapter
This chapter covers a project management study that empirically applies multiple performance evaluation techniques, including traditional approaches, to assess the performance of government projects. Studies have shown that while there is an increase in improved project management methods, tools, and techniques, including performance evaluation tec...
Chapter
Projects typically involve a complex set of skills and resources that have to be coordinated to deliver business value. It has been suggested that the manner in which a project manager makes decisions can significantly influence his or her effectiveness. Decision styles refer to the manner in which an individual makes decisions, reacts to problems,...
Chapter
The ability to manage a project’s knowledge is a key indicator of project success and impacts project capabilities and maturity. This chapter discusses the importance of project knowledge, highlights the challenges experienced by organizations in fully harnessing this asset, and demonstrates these issues through an examination of a project manageme...
Chapter
Projects are change agents. Reports and anecdotal evidence suggest that billions of dollars have been invested in these ventures at the national and organizational levels to help effect some change, transformation, or development. Projects have played and continue to play an important role in societies, groups, and organizations from the premodern...
Research
Full-text available
A short white paper on the value of data in organizations, basic steps and strategies that can be adopted to maximize the value of data.
Book
Full-text available
The book consists of 17 chapters from multiple contributors and presents that although the terms "data mining" and "knowledge discovery and data mining" (KDDM) are sometimes used interchangeably, data mining is actually just one step in the KDDM process. Data mining is the process of extracting useful information from data, while KDDM is the coordi...
Chapter
The interest in knowledge discovery and data mining (KDDM) has grown especially with the current hype surrounding “big data.” These types of projects provide unique challenges especially in terms of the demand for multidisciplinary skills throughout the KDDM process. It is therefore important to appreciate the set of critical success factors (CSFs)...
Chapter
Knowledge discovery through data mining facilitates deeper insights into understanding an organization’s operations and environment. An analysis of the literature revealed the limited use and application of knowledge discovery or data mining techniques in small economies despite the advanced development and reporting of this technology in other eco...
Chapter
Projects typical involve multiple participants, each with his/her own decision style. Given that projects involve group work in which it is important that group members cooperate in a manner that avoids the ‘group think’ and other value-depreciating phenomena. It is important that groups be carefully constituted and one factor to consider is set of...
Chapter
This chapter reports on the application of the CRISP-DM methodology to manage the data mining (DM) project on education in Jamaica. The RapidMiner open-source software was used to extract knowledge from data on high school students’ examination performance, particularly in the English language and mathematics, and the results from the use of the de...
Chapter
Educational data mining (EDM), an emerging sub-discipline is the process of discovering hidden patterns and knowledge within data from educational repositories (e.g. primary, secondary and tertiary institutions) and making predictions. The study applies the CRISP-DM methodology to undertake the set of coordinated steps toward discovering hidden pat...
Chapter
Knowledge is a key organizational resource and it is, therefore, no surprise that the methods to expose, engage, and harness this key resource have been growing, particularly in the highly competitive and data-rich contexts of recent years. Recently, the Rexer Data Miner 2013 Survey (Rexer 2013) reported that 85% of over 1250 data miners across 75...
Conference Paper
Full-text available
With the rapid advancement in technology and the growing complexities in the interaction of these technologies and networks, it is even more important for countries and organizations to gain sustainable security advantage. Security advantage refers to the ability to manage and respond to threats and vulnerabilities with a proactive security posture...
Article
The cyber-security landscape is continuing to evolve and it is therefore important for countries to understand the dynamic forces and be able to foresee the potential risks and vulnerabilities and stem them. One approach is through the development and implementation of proactive strategies, policies and procedures that is guided by a cyber-security...
Conference Paper
Full-text available
The rate of growth of Social Networking Services (SNS) has significant implications for computer and cyber-crime management. In exploring the human side of security, studies have shown that any security response requires more than technical solutions. This is even more so as users are often seen as the key point of vulnerabilities for computer s...
Conference Paper
Full-text available
This research is a preliminary study that interrogates key stakeholders’ values in the delivery of massive online open courses (MOOCs). MOOCs have received increased attention and prominence particularly within the last couple of years since well-known US universities have been promoting their implementation as a desirable strategy. Its implementat...
Technical Report
Imagine a situation where it is discovered that customer accounts have been breached, a computer virus spreads across the network, or the purported identity of a staff member turns out to be false. These are all significant security breaches that require effective countermeasures to contain damage, bring sanctions, fix issues and prevent future occ...
Chapter
This chapter utilizes the principles of the Value Focused Thinking (VFT) and Goal Question Metric (GQM) to present a tool for managing the foundation processes of projects, programs and portfolios. The Project Performance Development Framework (PPDF) promotes the use of formal steps for identifying project criteria and measures that are used as the...
Chapter
The chapter provides an overview of the value-focused thinking (VFT) methodology. Its main purpose is to introduce the reader to the major concepts of this methodology, particularly those that are relevant to the chapter that involves the use of VFT. It also discusses previous applications of the VFT methodology in information systems research.
Article
Full-text available
Frugal innovation is the process of reducing the complexity and cost of a good or service and the process to deliver benefit to the customers or users. This practice is especially beneficial to developing countries as they actively seek sustainable national development options. The development and implementation of legislations is placed under scru...
Conference Paper
The study seeks to empirically apply multiple performance evaluation techniques, including traditional approach to assess the performance of government projects. Studies have shown that while there is an increase in improved project management methods, tools and techniques, including performance evaluation techniques, organizations including govern...
Conference Paper
This research examines the current knowledge management practices in information technology (IT) projects using three organizations. With mounting pressures to yield more successful IT projects, there is an essential need to build supportive infrastructure to effectively secure and manage the project expertise. Further, more empirical support is ne...
Article
Performance criteria typically reflect the values of the project stakeholders in how they will be viewing their projects. A critical analysis of current research shows that several key challenges being faced in information systems (IS) projects include the lack of clearly defined objectives, mismatched stakeholders' expectations and lack of suffici...
Conference Paper
The effective application of knowledge management (KM) practices is important for the successful delivery of projects especially as the demands of these projects grow. Studies have continued to show that KM enhances organizational processes; therefore there is little doubt that effective application of KM can improve project competencies and engend...
Article
Emerging trends indicate that programs are being used to deliver benefits that may not be fully harnessed from single sets of uncoordinated projects. To support this movement, it is essential to have suitable measurement frameworks to assess the contribution of these activities and supply decision makers with valuable data on whether their objectiv...
Conference Paper
The paper provides a technique to measure the performance of information systems (IS) projects. Several researchers and practitioners have noted that the traditional system of measures (i.e. conformance to time, cost and specifications objectives) are incomplete and as such do not provide an effective means for assessing the performance of many IS...
Conference Paper
Full-text available
Information systems projects play an important strategic role in organisations and are key drivers to the delivery of change. Given this prominence it is essential to find measurement methods that effectively analyse and communicate the performance to its stakeholders. Further, to assure contribution to both research and practice it is essential to...
Conference Paper
Full-text available
The digital divide is a complex and dynamic phenomenon. Despite extensive studies on the digital divide and its impact, developing countries, in particular, are still searching for sustainable solutions to reduce the digital gap in order to leverage their investments in information and communication technologies (ICT) toward the attainment of great...
Article
Full-text available
The information systems (IS) project management profession has been faced with numerous socio-technical challenges. As part of its analysis, research has expressed discontent with the traditional measures used to assess the success or failure of these projects, i.e. conformance to time, schedule and specification requirements espoused by the projec...

Questions

Question (1)
Question
Country and industry specific insights are welcomed. Discussion on the challenges or impediments to the effective leveraging of these solutions would also be helpful.

Network

Cited By

Projects

Projects (2)
Project
Conducting a comparative analysis of cybercrime legislation in the Commonwealth Caribbean