
Jackie Phahlamohlaka- PhD
- Manager at Council for Scientific and Industrial Research, South Africa
Jackie Phahlamohlaka
- PhD
- Manager at Council for Scientific and Industrial Research, South Africa
About
37
Publications
37,598
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
229
Citations
Introduction
Current institution
Publications
Publications (37)
Cyber threats pose a growing risk to national security for all nations; cyberpower is consequently becoming an increasingly prominent driver in the attainment of national security for any state. This paper investigates the national cyberpower environment by analysing the elements of cyberspace as part of national security. David Jablonsky (1997) di...
Good governance from an ethical perspective in cyberdefence policy has been seen in terms of duty and consequentialism. Yet the negotiated view of virtue ethics can also address how nation states mitigate the risks of a cyber attack to their national interests and to prepare for a cyber offence in response to an attack. A discourse analysis of the...
Cyber threats pose a growing risk to national security for all nations; cyberpower is consequently becoming an increasingly prominent driver in the attainment of national security for any state. This paper investigates the national cyberpower environment by analysing the elements of cyberspace as part of national security. David Jablonsky (1997) di...
This paper identifies and describes five economic activities through which ICT could effectively be used to open global markets for rural and marginalized communities. The activities are identified in contexts where there are no industries, there is limited or no access to markets, no access to capital, effectively leveraging and optimizing what al...
With the advancement of technology and proliferation of mobile and computing devices through all levels of society, cyber power is becoming an increasingly prominent driver in the attainment of national security for any state. This paper investigates the national cyberpower environment by analyzing the elements of cyberspace as part of national sec...
Good governance from an ethical perspective in cyberdefence policy has been seen in terms of duty and consequentialism. Yet the negotiated view of virtue ethics can also address how nation states mitigate the risks of a cyber attack to their national interests and to prepare for a cyber offence in response to an attack. A discourse analysis of the...
A government has the responsibility to provide, regulate and maintain national security, which includes human security for its citizens. Recent declarations from the UK and USA governments about setting up cybersecurity organisations and the appointment of cyber czars reflect a global recognition that the Internet is part of the national critical i...
South African communities are constantly being developed through new ICT projects which are initiated by individuals, government and private organisations. The problem with these developments is that they are implemented in isolation. This isolation causes limited sharing of resources, duplication, poor-governance of the resources and in worse-case...
Most communications in the new era are dependent on Information and Communication Technology (ICT). In addition, infrastructure is becoming increasingly interconnected. This not only makes lives easier, but also leaves technology users more vulnerable. Cybercrime, digital espionage and other cyber disturbances dictate the news reports on a daily ba...
This book constitutes the refereed proceedings of the 11th IFIP TC 9 International Conference on Human Choice and Computers, HCC11 2014, held in Turku, Finland, in July/August 2014. The 29 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are based on both academic research and the professional...
A government has the responsibility to provide, regulate and maintain national security, which includes human security for its citizens. Recent declarations from the UK and USA governments about setting up cybersecurity organisations and the appointment of cyber czars reflect a global recognition that the Internet is part of the national critical i...
This paper addresses the challenge of assessing an ICT for development (ICT4D) project’s contribution to the socio-economic development of the broader community where it is implemented. It argues for using a systems approach to deal with this challenge, since systems thinking is concerned with the performance of the total system. Systems thinking i...
National governments have the responsibility to provide, regulate and maintain national security, which includes cybersecurity for their citizens. Although South Africa has recently published its first draft cybersecurity policy, the implementation of the policy is still in its very early stages. In this paper, the authors propose and describe a po...
For 40 years, the academics and business executives who have attended the Human Choice and Computers international conference series have discussed human choices and social responsibility in relation to information and communication technology (ICT). At this 2012 conference, the focus is on ICT critical infrastructures, and the challenges they pose...
The greater number of government efforts to stimulate participative governance in communities using Information and Communication Technology (ICT) often fall short of expectations. In South Africa extending e-government to communities has been in the form of more and/or better equipped ICT-enabled community centres, called Thusong Service Centres....
This book constitutes the refereed proceedings of the 10th IFIP TC 9 International Conference on Human Choice and Computers, HCC10 2012, held in Amsterdam, The Netherlands, in September 2012. The 37 revised full papers presented were carefully reviewed and selected for inclusion in the volume. The papers are organized in topical sections on nationa...
The Repertory Grid (RepGrid) technique has been used extensively in Management Sciences research, including Information Systems
research, in order to reveal the personal views of individual research subjects regarding the issue being studied. These individual
constructs are then used to propose criteria for success amongst other things. This paper...
Information Systems (IS) researchers are increasingly calling for contextual approaches to Information and Communication Technologies
(ICT) innovations [1]. The call proceeds from the realization that ICT and e-government policies are often adopted and developed
with a blind focus on the ICT artifact, and with little reflection on the contribution...
The national security issues most impacted upon by globalisation are generally found to fall into three categories: the nature of security threats in a globalised world, the effects of the phenomenon of globalisation on the pursuit of national security, and the erosion of the exclusivity of the state as a provider of national security. In this chap...
Workshop of the International Federation for Information Processing (IFIP) Working Group: Towards an ICT Research Agenda for African Development, 2008 This paper assesses the quality of the TurnStormer thinkLet as a building block for Collaboration Engineering for the Implementation of the Administrative Justice Act of South Africa. Although a comp...
This paper assesses the quality of the TurnStormer thinkLet as a building block for Collaboration Engineering for the Implementation of the Administrative Justice Act of South Africa. Although a complete research paper on its own, it constitutes a milestone in an ongoing exploratory study that commenced in 2005 and is to end in 2010. An assessment...
We present in this paper the results of three simulation exercises performed as part of a series of field studies whose object is the implementation of the Promotion of Administrative Justice Act. The unit of analysis of the study is the process facilitation, which in the context of the field studies and the research design, took the form of AJA aw...
2006 Proceedings of the conference on Information Technology in Tertiary education Presented in this paper are the results of three simulation exercises performed as part of a series of field studies whose object is the implementation of the Promotion of Administrative Justice Act. The unit of analysis of the study is the process facilitation, whic...
The Government of the Republic of South Africa is committed to establishing a society grounded on democratic ideals, social fairness and fundamental human rights. For this to happen, any decisions to be taken by the government need to be justified, or that for decisions that have been taken, an explanation is made to the affected people if requeste...
The authors describe their experience in using soft OR methods to facilitate a one-day workshop to support the planning processes of a community-based educational trust in South Africa. This workshop brought together the contributions of over 40 people who were involved either in the overall management of the Trust or in the delivery of its courses...
The Universal Service Agency (USA) was established through the Telecommunications Act (103 of 1996) with the specific purpose of promoting access to Information and Communication Technologies (ICTs) for all people in South Africa. It was established on the assumption that ICTs are a basic right and a necessary aspect of social and economic function...
Decision making, whether by an individual or a group, can be substantially enhanced by a "systems thinking" approach. Because groups are often challenged to justify their decisions, it is necessary that they prepare themselves in advance for a possible challenge. We argue in this paper that this can to some extent be achieved through training the g...
Since it was coined in the early eighties following the Maitland commission for worldwide telecommunications development, much has been written about the concept of digital divide. Everything to date in the literature about the subject point to its complexity and dynamism, resulting in efforts aimed at closing the divide contributing to widening it...
South Africa is the entry point to the African continent and with the impending increase in broadband access from 120 Gbps to 12 Tbps over the next 2 years, it could in future be used as a hub for launching cyber warfare type attacks on the rest of the world. In addition, there are arguments that RSA's strong ties with China could place it at high...
The first aim of this short paper is to demonstrate that despite the many constraints facing ICT4D researchers in developing countries, it is possible to conceptualise, design and execute an ICT use study that is well grounded in both theory and practice. This we do by presenting a high level description of the web-based collaboration and thinkLets...
10th International Conference on Social Implications of Computers in Developing Countries: Assessing the Contribution of ICT to Development Goals, Dubai, United Arab Emirates, 26-28 May 2009 The Multiple Perspectives Approach (MPA) of Mitroff and Linstone is presented here as a promising framework to analyse messy social systems in a developing wor...
Online Deliberation: Design, Research, and Practice. Todd Davies and Seeta Peña Gangadharan (eds). Copyright 2009, CSLI Publications. The authors are investigating whether Web-based Group Support System (GSS) tools can support and enhance procedural fairness in administrative decision making in South Africa. They report here on work that emanates f...
10th International Conference on Social Implications of Computers in Developing Countries: Assessing the Contribution of ICT to Development Goals, Dubai, United Arab Emirates, 26-28 May 2009 The road of development through Information and Communication technology (ICT4D) is lined with deep potholes and dead ends since little is done to “accumulate...