References
- African Union. 2014. “African Union Convention on Cyber Security and PersonalData Protection.” https://au.int/en/treaties/african-union-convention-cyber-security-and-personal-data-protection.
- Al-Monitor. 2022. “Ethiopia Faces New Cyberattacks on its Nile Dam.” Al-Monitor, May 17.https://www.al-monitor.com/originals/2022/05/ethiopia-faces-new-cyberattacks-its-nile-dam.
- Allen, Nathaniel. 2021. “The Promises and Perils of Africa’s Digital Revolution.” Brookings, March 11. https://www.brookings.edu/articles/the-promises-and-perils-of-africas-digital-revolution/.
- Allen, Nate, and Abdul-Hakeem Ajijola. 2022. “African Lessons in Cyber Strategy.” Africa Center for Strategic Studies, March 8. https://africacenter.org/spotlight/african-lessons-in-cyber-strategy.
- Allen, Nathaniel, and Matthew La Lime. 2021. “How Digital Espionage Tools Exacerbate Authoritarianism Across Africa.” Brookings Techstream Blog, November 19. https://www.brookings.edu/techstream/how-digital-espionage-tools-exacerbate-authoritarianism-across-africa/.
- Allen, Nathaniel, and Noëlle van der Waag-Cowling. 2021. “How African States Can Tackle State-backed Cyber threats.” Brookings Techstream Blog, July 15.https://www.brookings.edu/techstream/how-african-states-can-tackle-state-backed-cyber-threats/.
- Augustine, Abraham. 2022. “How Cybercriminals Target Africa’s 500 Million Mobile Subscribers.” TechCabal, July 5.https://techcabal.com/2022/07/05/how-cybercriminals-target-africas-500-million-mobile-subscribers/.
- Bailey, Bunmi. 2022. “Mobile Money Adoption Drives Nigeria’s Banking Penetration to Record High.” Business Day, July 6. https://businessday.ng/financial-inclusion/article/mobile-money-adoption-drives-nigerias-banking-penetration-to-record-high/.
- Baynes, Chis. 2018. “Entire Country Taken Offline for Two Days After Undersea Internet Cable Cut.” Independent, April 11.https://www.independent.co.uk/tech/mauritiana-Internet-cut-underwater-cable-offline-days-west-africa-a8298551.html.
- Browdie, Brian. 2020. “South Africans Under Lockdown Have to Deal with Slow Internet After Another Undersea Cable Break.” Quartz, March 30. https://qz.com/africa/1828436/lockdown-south-africa-Internet-slows-as-submarine-cable-snaps.
- Brown, Shelby, and Attila Tomaschek. 2022. “Learn Cybersecurity Skills with These 4 Online Courses.” cent, Aug 1. https://www.cnet.com/tech/services-and-software/learn-cybersecurity-skills-with-these-4-online-courses/.
- Burgess, Matt. 2022. “The Most Vulnerable Place on the Internet.” Wired, November 2. https://www.wired.com/story/submarine-Internet-cables-egypt/.
- Bursztynsky, Jessica. 2021. “Bank of America Spends over $1 Billion per Year on Cybersecurity, CEO Brian Moynihan Says” CNBC, June 14. https://www.cnbc.com/2021/06/14/bank-of-america-spends-over-1-billion-per-year-on-cybersecurity.html.
- Center for Strategic and International Studies. 2022. “Significant Cyber Incidents Since 2006.” https://csis-website-prod.s3.amazonaws.com/s3fs-public/221212_Significant_Cyber_Events.pdf?5RVe0CglJK0dJqGjblIJeHORD95oJ_QW.
- Chainalysis. 2022. “Global Crypto Adoption Index.” Chainalysis, September 14. https://www.chainalysis.com/blog/2022-global-crypto-adoption-index/#top-20.
- CIA. 2023. The World Factbook. https://www.cia.gov/the-world-factbook/countries/egypt/#economy.
- ClearSky Cyber Security. 2021. “‘Lebanese Cedar’ APT.” January. https://www.clearskysec.com/wp-content/uploads/2021/01/Lebanese-Cedar-APT.pdf.
- Council on Foreign Relations. 2022. “Cyber Operations Tracker.” https://www.cfr.org/cyber-operations/.
- Daily News Egypt. 2022. “More than Half of Egypt’s Users Encountered Phishing Attempts During Electronic Payments: Kaspersky.” Daily News Egypt, July 28.https://dailynewsegypt.com/2022/07/28/more-than-half-of-egypts-users-encountered-phishing-attempts-during-electronic-payments-kaspersky.
- Davison, Robert, Doug Vogel, Roger Harris, and Noel Jones. 2000. “Technology Leapfrogging in Developing Countries–An Inevitable Luxury?” The Electronic Journal of Information Systems in Developing Countries 1 (1): 1–10.
- de-Jong-Chen, Jing, and Bobby O’Brien. 2017. “A Comparative Study: The Approach to Critical Infrastructure Protection in the U.S., E.U., and China.” The Wilson Center. https://www.wilsoncenter.org/publication/comparative-study-the-approach-to-critical-infrastructure-protection-the-us-eu-and-china.
- ECOWAS. 2021. ECOWAS Regional Critical Infrastructure Protection Policy. https://www.ocwarc.eu/wp-content/uploads/2021/02/ECOWAS-Regional-Critical-Infrastructure-Protection-Policy-EN.pdf.
- Egypt Ministry of Communications and Information Technology. 2023. ICT Indicators Quarterly Bulletin. https://mcit.gov.eg/Upcont/Documents/Publications_832023000_ICT_Indicators_Quarterly_Bulletin_Q4_2023.pdf.
- El Sherif, Hisham, and Omar El Sawy. 1988. “Issue-based Decision Supports Systems for the Egyptian Cabinet.” MIS Quarterly 12 (4): 551–569. Management Information Systems Research Center: MN-USA.
- Elemide, Ada. 2021. “Nigeria: Energy Sector Prone to Cyber Attacks.” The Electricity Hub, October 27. https://theelectricityhub.com/nigeria-energy-sector-prone-to-cyber-attacks-monguno/.
- Ellefsen, Ian, and Sebastian von Solms. 2010. “Critical Information Infrastructure Protection in the Developing World.” In International Conference on Critical Infrastructure Protection. Berlin, Heidelberg: Springer. https://link.springer.com/chapter/10.1007978-3-642-16806-2_3.
- ESCC (Egypt Supreme Cybersecurity Council). 2017. Egypt National Cybersecurity Strategy 2017-2021. Arab Republic of Egypt. http://www.escc.gov.eg/.
- Fidler, Mailyn. 2018. “African Union Bugged by China: Cyber Espionage as Evidence of Strategic Shifts.”Council on Foreign Relations Net Politics Blog, March 7. https://www.cfr.org/blog/african-union-bugged-china-cyber-espionage-evidence-strategic-shifts.
- Fidler, Mailyn. 2023. “Infrastructure, Law, and Cyber Stability: An African Case Study.” In Cyberspace and Instability, edited by James Shires, Robert Chesney, and Max Smeets, 281–288. Edinburgh University Press.
- Fong, Michelle. 2009. “Technology Leapfrogging for Developing Countries.” In Encyclopedia of Information Science and Technology. 2nd ed., 3707–3713. IGI Global.
- GFCE (Global Forum on Cyber Expertise), and Meridian. 2017. The GFCE-Meridian Good Practice Guide on Critical Information Infrastructure Protection for Governmental Policy-makers. https://thegfce.org/wp-content/uploads/2020/06/gfce-meridian-gpg-to-ciip-1.pdf.
- Gosh, Agamoni, and India Ashok. 2017. “WannaCry: List of Major Companies and Networks Hit by Ransomware Around the Globe.” International Business Times, April 15. https://www.ibtimes.co.uk/wannacry-list-major-companies-networks-hit-by-deadly-ransomware-around-globe-1621587.
- Gupta, Sakshi. 2022. “How to Learn Cybersecurity on Your Own [get started guide].” Springboard, July 19, https://www.springboard.com/blog/cybersecurity/how-to-learn-cybersecurity/.
- Hashem, Sherif. 2017. “Establishing a National CERT/CISRT in Egypt.” The Proceedings of the 23rd World Multi-Conference on Systemics, Cybernetics and Informatics. WMSCI 2019 II:38-43. International Institute of Informatics and Systemics.
- Hashem, Sherif. 2019. “Towards a National Cybersecurity Strategy: The Egyptian Case.” Journal of Systemics, Cybernetics and Informatics 17 (3): 88–94. https://doaj.org/article/bdb9fd2cdd214f56aee0490355dcc37f.
- Hassib, Bassant, and James Shires. 2021. “Manipulating Uncertainty: Cybersecurity Politics in Egypt.” Journal of Cybersecurity 7 (1): 1–16. https://doi.org/10.1093/cybsec/tyaa026.
- Hountomey, J., H. Bahsi, U. Tatar, S. Hashem, and E. Dubois. 2022a. “Cyber Incident Management in Low-income Countries - Part 1.” Global Forum for Cyber Expertise and AfricaCERT. https://cybilportal.org/publications/cyber-incident-management-in-low-income-countries-part-1-a-holistic-view-on-csirt-development/.
- Hountomey, J., H. Bahsi, U. Tatar, S. Hashem, and E. Dubois. 2022b. “Cyber Incident Management in Low-income Countries - Part 2.” Global Forum for Cyber Expertise and AfricaCERT. https://cybilportal.org/wp-content/uploads/2022/01/CSIRTs-In-Low-Income-Countries-Final-Report-part-2-v16.pdf.
- Idowu, Bukola, and Royal Ibeh. 2022. “Mass Resignation of Software Engineers Disrupts Banks Digitisation Move.” Leadership. https://leadership.ng/mass-resignation-of-software-engineers-disrupts-banks-digitisation-move/.
- Internet Engineering Task Force (IETF). 2007. Internet Security Glossary, Version 2. https://www.rfc-editor.org/rfc/rfc4949#page-9.
- Internet Society and the African Union. 2017. Internet Infrastructure Security Guidelines for Africa. https://www.internetsociety.org/wp-content/uploads/2017/08/AfricanInternetInfrastructureSecurityGuidelines_May2017.pdf.
- INTERPOL. 2020. Mobile Money and Organized Crime in Africa. INTERPOL/ENACT Analytical Report. https://enact-africa.s3.amazonaws.com/site/uploads/2020-06-23-interpol-mobile-money-in-africa-report.pdf.
- ISC2. 2022. (ISC)2 Cybersecurity Workforce Study. https://www.isc2.org//-/media/ISC2/Research/2022-WorkForce-Study/ISC2-Cybersecurity-Workforce-Study.ashx.
- ITU (International Telecommunications Union). 2008. Report on Best Practices for a National Approach to Cybersecurity: A Management Framework for Organizing National Cybersecurity Efforts. ITU-D Secretariat.https://www.itu.int/ITU-D/cyb/cybersecurity/docs/itu-draft-cybersecurity-framework.pdf.
- ITU (International Telecommunications Union). 2014. Global Cybersecurity Index Results for Arab Region. ITU-D Secretariat. https://www.itu.int/en/ITU-D/Cybersecurity/Documents/GCI_2014_Results_for_Arab_Region.pdf.
- ITU (International Telecommunications Union). 2015. Global Cybersecurity Index and Cyberwellness Profiles. ITU-D Secretariat. http://www.itu.int/dms_pub/itu-d/opb/str/D-STR-SECU-2015-PDF-E.pdf.
- ITU (International Telecommunications Union). 2021. Global Cybersecurity Index (GCI) 2020. ITU-D Secretariat. https://www.itu.int/epublications/publication/D-STR-GCI.01-2021-HTM-E.
- Kamel, Sherif. 2021. “The Potential Impact of Digital Transformation on Egypt.” Economic Research Forum Working Paper. September 2021. https://erf.org.eg/publications/the-potential-impact-of-digital-transformation-on-egypt/.
- Kemp, Simon. 2022. “Digital 2022: Global Overview Report.” We Are Social / Hootsuite. https://datareportal.com/reports/digital-2022-global-overview-report.
- KPMG. 2022. Africa Cyber Security Outlook. KPMG. https://home.kpmg/za/en/home/insights/2022/09/africa-cyber-security-outlook-report-2022.html.
- KuCoin. 2022. “Into the CryptoVerse Report: Nigeria Edition 2022.” KuCoin. https://www.kucoin.com/blog/kucoin-is-into-the-cryptoverse-report-reveals-35-percent-of-nigerian-adults-are-crypto-investors.
- Lopez, Oscar, and Ephrat Livni. 2021. “In Global First, El Salvador Adopts Bitcoin and Currency.” New York Times, September 7. https://www.nytimes.com/2021/09/07/world/americas/el-salvador-bitcoin.html.
- Maglaras, L.Leandros, Ki-Hyung Kim, Helge Janicke, Mohamed Amine Ferrag, Stylianos Rallis, Pavlina Fragkou, Athanasios Maglaras, and Tiago J. Cruz. 2018. “Cyber Security of Critical Infrastructures.” ICT Express 4 (1): 42–45. https://doi.org/10.1016/j.icte.2018.02.001.
- Mazloum, Alaa. 2022. “Expanding Use of E-wallets in Egypt: Strengthening the Social Contract One Transaction at a Time.” Middle East Institute, March 3. https://www.mei.edu/publications/expanding-use-e-wallets-egypt-strengthening-social-contract-one-transaction-time.
- Morgan, Steve. 2019. “Humans on the Internet Will Triple From 2015 to 2022 and Hit 6 Billion.” Cybercrime Magazine, July 18. https://cybersecurityventures.com/how-many-Internet-users-will-the-world-have-in-2022-and-in-2030/.
- Mouton, Jean, and Ian Ellefsen. 2013. “The Identification of Information Sources to Aid with Critical Information Infrastructure Protection.” 2013 Information Security for South Africa, 1–8. IEEE. https://ieeexplore.ieee.org/abstract/document/6641038.
- Musarurwa, Alfred, and Husin Jazri. 2015. “A Proposed Framework to Measure Growth of Critical Information Infrastructure Protection in Africa.” 2015 International Conference on Emerging Trends in Networks and Computer Communications. IEEE. https://ieeexplore.ieee.org/document/7184813.
- Mwai, Peter, and Anita Nkonge. 2023. “Kenya Cyber-attack: Why is eCitizen Down?” BBC, July 28. https://www.bbc.com/news/world-africa-66337573.
- O'Flaherty, Kate. 2018. “The Nigerian Cyber Warfare Command: Waging War in Cyberspace. Forbes, November 26. https://www.forbes.com/sites/kateoflahertyuk/2018/11/26/the-nigerian-cyber-warfare-command-waging-war-in-cyberspace/?sh=6febc38d2fb.
- OECD (Organisation for Economic Cooperation and Development). 2008. OECD Recommendation of the Council on the Protection of Critical Information Infrastructures. https://www.oecd.org/sti/ieconomy/ciip.htm.
- OECD (Organisation for Economic Cooperation and Development). n.d. “Trusted Information Sharing Network for Critical Infrastructure in Australia.” OECD Toolkit for Risk Governance. https://www.oecd.org/governance/toolkit-on-risk-governance/goodpractices/page/trustedinformationsharingnetworkforcriticalinfrastructureinaustralia.htm#tab_results.
- Ogundari, Ibikunle, Funso Otuyemi, Abiodun Momodu, and Leye Salu. 2021. “Cyber Security Assessment of Nigeria’s Electric Power Infrastructure.” African Journal of Science Policy and Innovation Management 1 (2): 87–104. https://ajspim.oauife.edu.ng/index.php/ajspim/article/view/79.
- Onyago, Seth. 2022. “Africa Accounts for 70% of the World’s $1 Trillion Mobile Money Market.” Quartz, May 4. https://qz.com/africa/2161960/gsma-70-percent-of-the-worlds-1-trillion-mobile-money-market-is-in-africa.
- Panetta, Leon. 2012. “Remarks on Cybersecurity to the Business Executives for National Security, New York City.” US Department of Defense News Transcript, October 12.https://www.hsdl.org/?view&did=724128.
- Republic of Nigeria. 2014. National Cybersecurity Strategy. https://www.itu.int/en/ITU-D/Cybersecurity/Documents/National_Strategies_Repository/Nigeria_2014_NATIONAL_CYBESECURITY_STRATEGY.pdf?page=2.
- Republic of Nigeria. 2021. National Cybersecurity Policy and Strategy. https://www.cert.gov.ng/ngcert/resources/NATIONAL_CYBERSECURITY_POLICY_AND_STRATEGY_2021.pdf.
- Reva, Denys. 2021. “Cyber Attacks Expose the Vulnerability of South Africa’s Ports.” Institute for Security Studies, July 29. https://issafrica.org/iss-today/cyber-attacks-expose-the-vulnerability-of-south-africas-ports.
- Seawright, Jason, and John Gerring. 2008. “Case Selection Techniques in Case Study Research: A Menu of Qualitative and Quantitative Options.” Political Research Quarterly 61 (2): 294–308. http://www.jstor.org/stable/20299733.
- Segal, Adam. 2022. “Cyber Week in Review.” Council on Foreign Relations Net Politics, October 7. https://www.cfr.org/blog/cyber-week-review-october-7-2022.
- Sengupta, Caesar. 2020. “Building a More Inclusive Internet Beyond COVID-19.” Google Blog, October 28. https://www.blog.google/technology/next-billion-users/new-Internet-users-covid-19/.
- Shea, Joey. 2021. “Egypt’s Digital Foreign Policy.” Tahrir Institute for Middle East Policy, February 2. https://timep.org/commentary/analysis/egypts-digital-foreign-policy/.
- Shires, James. 2018. “Between Multistakeholderism and Sovereignty: Cyber Norms in Egypt and the Gulf States.” War on the Rocks, October 12. https://warontherocks.com/2018/10/between-multistakeholderism-and-sovereignty-cyber-norms-in-egypt-and-the-gulf-states/.
- Soete, Luc. 1985. “International Diffusion of Technology, Industrial Development and Technological Leapfrogging.” World Development 13 (3): 409–422.
- United Nations. 2015. Report of the Governmental Experts on Developments in the Field of Information and Communications Technology in the Context of International Security UN General Assembly Report A/70/174, July 22. https://daccess-ods.un.org/tmp/8010839.81990814.html.
- United Nations. 2021a. Final Substantive Report of the Open-ended Working Group on Developments in the Field of Information and Telecommunications in the Context of International Security. UN General Assembly Report A/AC/290/2021/CRP.2, March 10. 76/135, July 14. https://front.un-arm.org/wp-content/uploads/2021/03/Final-report-A-AC.290-2021-CRP.2.pdf.
- United Nations. 2021b. Report of the Group of Governmental Experts on Advancing Responsible State Behaviour in Cyberspace in the Context of International Security. UN General Assembly Report A/76/135, July 14. https://front.un-arm.org/wp-content/uploads/2021/08/A_76_135-2104030E-1.pdf.
- United States. 2013. Presidential Policy Directive – Critical Infrastructure Security and Resilience. PDD-21: The White House, February 12. https://obamawhitehouse.archives.gov/the-press-office/2013/02/12/presidential-policy-directive-critical-infrastructure-security-and-resil/.
- United States Department of Homeland Security. 2003. National Strategy to Secure Cyberspace. https://www.cisa.gov/uscert/sites/default/files/publications/cyberspace_strategy.pdf.
- van der Waag-Cowling, Noëlle. 2020. “Living Below the Cyber Poverty Line: Strategic Challenges for Africa.” ICRC Humanitarian Law and Policy Blog, June 11. https://blogs.icrc.org/law-and-policy/2020/06/11/cyber-poverty-line-africa/.
- Vanguard Nigeria. 2021. “Fraud in Banking Sector, Mostly Insider Perpetrated – EFCC.” Vanguard, November 24. https://www.vanguardngr.com/2021/11/fraud-in-banking-sector-mostly-insider-perpetrated-efcc/.
- von Solms, Basie, and Elmarie Kritzinger. 2012. “Critical Information Infrastructure Protection (CIIP) and Cyber Security in Africa – Has the CIIP and Cyber Security Rubicon Been Crossed?” In International Conference on e-Infrastructure and e-Services for Developing Countries, edited by Radu Popescu-Zeletin, Karl Jonas, Idris A. Rai, Roch Glitho, and Adolfo Villafiorita, 116–124. Berlin: Springer. https://link.springer.com/chapter/10.1007978-3-642-29093-0_11.
- Voo, Julia, Irfan Hemani, Simon Jones, Winnona DeSombre, Dan Cassidy, and Anina Schwarzenbach. 2020. “National Cyber Power Index 2020.” https://dash.harvard.edu/handle/1/37372389#:~:text=The%20Belfer%20National%20Cyber%20Power%20Index%20%28NCPI%29%20measures,there%20is%20no%20single%20measure%20of%20cyber%20power.
- World Bank. 2021. “Nigeria to Improve Electricity Access and Services to Citizens.” World Bank Press Release, February 5. https://www.worldbank.org/en/news/press-release/2021/02/05/nigeria-to-improve-electricity-access-and-services-to-citizens.
- World Bank. 2022. “The Global Findex Database 2021: Financial Inclusion, Digital Payments, and Resilience in the Age of COVID-19.” https://www.worldbank.org/en/publication/globalfindex.
- Zuboff, Shoshana. 2019. “The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power.” Public Affairs.