Welcome To My Publication

Be The First  To Know

The Mediating Role of Disaster Policy Implementation in Disaster Risk Reduction and Sustainable Development in Sierra Leone

This research reports the role of disaster policy implementation achieving disaster risk reduction (DRR) and sustainable development (SD) in Sierra Leone. The factors were highlighted to help policymakers measure disaster risk perception (DRP), disaster adaptation (DA), community participation (CP), and disaster policy implementation (DPI) towards achieving disaster risk reduction and sustainable development. A questionnaire was administered to collect data from the respondents in six disaster-prone communities (Dwarzarck, Portee-Rokupa, Kroobay, Susan’s Bay, Moyiba, and Colbot) in Freetown, Sierra Leone. Employing the structural equation model approach, we found that all the disaster risk reduction factors (DRP, CP, DA, and DPI) directly influence SD. Furthermore, disaster policy implementation serves as a channel through which disaster risk reduction influences sustainable development. This study suggests to policymakers to use the factors mentioned earlier to design effective disaster policy implementation to achieve disaster risk reduction and sustainable development in Sierra Leone.

KEYWORDS: disaster risk perception; disaster adaptation; community participation; disaster policy implementation; sustainable development


  1. Sierra Leone Disaster Management Policy (final DRAFT Copy). 2006. Available online: https://ifrc.org/docs/idrl/671EN.pdf (accessed on 30 August 2020).
  2. Cutter, S.L.; Barnes, L.; Berry, M.; Burton, C.; Evans, E.; Tate, E.; Webb, J. A place-based model for understanding community resilience to natural disasters. Glob. Environ. Chang. 200818, 598–606. [Google Scholar] [CrossRef]
  3. IPCC. Summary for policymakers. In Climate Change: Impacts, Adaptation, and Vulnerability; Part A: Global and Sectoral Aspects. Contribution of Working Group II to the Fifth Assessment Report of the Intergovernmental Panel on Climate Change; Cambridge University Press: Cambridge, UK, 2014; pp. 1–32. [Google Scholar]
  4. UNDRR. Global Assessment Report on Disaster Risk Reduction; United Nations Office for Disaster Risk Reduction (UNDRR): Geneva, Switzerland, 2019. [Google Scholar]
  5. Sierra Leone: Rapid Damage and Loss Assessment of August 14th, 2017 Landslide and Floods in the Western Area; Report No. 121120. 2017. Available online: https://reliefweb.int/sites/reliefweb.int/files/resources/19371_Sierra_Leone_DaLA_Web-forprinting.pdf (accessed on 15 January 2021).
  6. UNDP. International Consultant to Further Review and Update National DRM Policy and Develop National DRM Strategy and Action Plan. 2013. Available online: https://jobs.undp.org/cj_view_job.cfm?cur_job_id=39439 (accessed on 13 January 2021).
  7. Rajput, S.; Xu, R. Sierra Leone: Climate, Disaster, and Crisis Financing for Shock-Responsive Safety Nets. 2020. Available online: https://preventionweb.net/news/view/73109 (accessed on 13 January 2021).
  8. Tuladhar, G.; Yatabe, R.; Dahal, R.K.; Bhandary, N.P. Disaster risk reduction knowledge of local people in Nepal. GEOENVIRON DISASTERS 2, 5. 2015. Available online: https://doi.org/10.1186/s40677-014-0011-4 (accessed on 9 December 2020).
  9. Fouad Bendimerad. Disaster Risk Reduction and Sustainable Development. 2005. Available online: https://pdfs.semanticscholar.org/7219/29932392f6b5d9bd4861f615d8554dade5e1.pdf (accessed on 30 August 2020).
  10. Maxwell, S.; Buchanan-Smith, M. Linking relief and development: Introduction and overview. IDS Bull. 199425, 1–19. [Google Scholar] [CrossRef]
  11. Bendimerad, F.; Disaster Risk Reduction and Sustainable Development. World Bank Seminar on the Role of Local Governments in Reducing the Risk of Disasters, Held in Istanbul, Turkey, 2003, 57–75. Available online: https://info.worldbank.org/etools/docs/library/114715/istanbul03/docs/istanbul03/05bendimerad3-n (accessed on 15 September 2020).
  12. Kameda, H. Networking disaster risk reduction technology and knowledge through Disaster Reduction Hyperbase (DRH). In Proceedings of the Disaster Reduction Hyperbase (DRH) Contents Meeting, Kobe, Japan, 12–13 March 2007. [Google Scholar]
  13. Onstad, P.A.; Danes, S.M.; Hardman, A.M.; Olson, P.D.; Marczak, M.S.; Heins, R.K.; Croymans, S.R.; Coffee, K.A. The road to recovery from a natural disaster: Voices from the community. Community Dev. 20123, 566–580. [Google Scholar] [CrossRef]
  14. Klein, R.J.T.; Adams, K.M.; Dzebo, A.; Davis, M.; Siebert, C.K. Advancing Climate Adaptation Practices and Solutions: Emerging Research Priorities; Stockholm Environment Institute: Stockholm, Sweden, 2017. [Google Scholar]
  15. Karali, E.; Mattern, K. Communicating climate change adaptation information using web-based platforms. Adv. Appl. Sci. Res. 201714, 241–245. [Google Scholar] [CrossRef]
  16. Calliari, E.; Michetti, M.; Farnia, L.; Ramieri, E. A network approach for moving from planning to implementation in climate change adaptation: Evidence from southern Mexico. Environ. Sci. Policy 201994, 146–157. [Google Scholar] [CrossRef]
  17. International Institute for Sustainable Development (IISD). 2020. Available online: https://iisd.org/mission-and-goals (accessed on 22 December 2020).
  18. Uitto, J.I.; Shaw, R. Sustainable development and disaster risk reduction: Introduction. Sustain. Dev. Disaster Risk Reduct. 2016. [Google Scholar] [CrossRef]
  19. Barrie, A. SL Tops China in Fastest-Growing Economics World Bank. Sierra Leone. 2012. Available online: https://awoko.org/2013/04/26/sl-tops-china-in-fastest-growing-economies-world-bank/ (accessed on 25 December 2020).
  20. Bell, B.P.; Damon, I.K.; Jernigan, D.B.; Kenyon, T.A.; Nicol, S.T.; O’Connor, J.P.; Tappero, J.W. Overview, control strategies, and lessons learned in the CDC response to the 2014–2016 ebola epidemic. Morb. Mortal. Wkly. Rep. 201665, 4–11. [Google Scholar] [CrossRef] [PubMed]
  21. The World Bank. Summary on the Ebola Recovery Plan: Sierra Leone External Icon. 2015. Available online: https://www.reliefweb.int/report/sierra-leone/summary-ebola-recovery-plan-sierra-leone (accessed on 20 August 2020).
  22. WHO. Ebola in Sierra Leone: A Slow Start to an Outbreak That Eventually Outpaced All Others. 2016. Available online: https://who.int/csr/disease/ebola/one-year-report/sierra-leone/en/ (accessed on 20 August 2020).
  23. World Bank: Social, Urban, Rural and Resilience Global Practice Africa Region. 2018. Available online: http://documents1.worldbank.org/curated/en/796841519527638944/pdf/SIERRA-LEONE-PAD-02122018.pdf (accessed on 14 January 2021).
  24. Government of Sierra Leone Project Fiduciary Management Unit: Hiring of Disaster Risk Management Policy Consultant. 2019. Available online: https://mof.gov.sl/wp-content/uploads/2020/01/Hiring-of-Disaster-Risk-Management-Policy-Consultant-FERP.pdf (accessed on 13 January 2021).
  25. UNISDR (United Nations International Strategy for Disaster Reduction). The Sendai Framework for Disaster Risk Reduction 2015–2030; United Nations, Ed.; UNDRR: Sendai, Japan, 2015. [Google Scholar]
  26. The World Bank: Freetown Emergency Recovery Project (P166075). 2017. Available online: https://documents1.worldbank.org/curated/en/796841519527638944/pdf/SIERRA-LEONE-PAD-02122018.pdf (accessed on 15 December 2020).
  27. Emergency Plan of Action Operation Update Sierra Leone: Floods. 2015. Available online: https://reliefweb.int/sites/reliefweb.int/files/resources/MDRSL00601.pdf (accessed on 20 August 2020).
  28. FAO Flooding in Sierra Leone Situation Report 2. 2015. Available online: https://reliefweb.int/report/sierra-leone/flooding-sierra-leone-situation-report-2 (accessed on 19 August 2020).
  29. Sierra Leone Mudslide Response. C4D in Humanitarian Action Case Study: Using Digital Platforms to Place Affected Populations at the Heart of the Response. 2017. Available online: https://unicef.org/innovation/sites/unicef.org.innovation/files/2019-04/Sierra%20Leone%20case%20study_20%20March%202019.pdf (accessed on 18 August 2020).
  30. Govt. Sierra Leone, UNICEF, WHO. The Emergency Cholera Vaccination Campaign Kicks Off in Sierra Leone. 2017. Available online: https://reliefweb.int/report/sierra-leone/emergency-cholera-vaccination-campaign-kicks-sierra-leone (accessed on 12 August 2020).
  31. UNCT Sierra Leone, UNDP. Sierra Leone: Landslide and Floods Recovery Bulletin #1. 12 September 2017. Available online: https://reliefweb.int/report/sierra-leone/sierra-leone-landslide-and-floods-recovery-bulletin-1-12-september-2017 (accessed on 1 August 2020).
  32. Takeuchi, Y.; Mulyasari, F.; Shaw, R. Chapter 4 roles of family and community in disaster education. In Community, Environment, and Disaster Risk Management; Shaw, R., Takeuchi, K.S.Y., Eds.; Disaster education; Emerald Publisher: Bingley, UK, 2011; Volume 7, pp. 77–94. [Google Scholar]
  33. Birkmann, J.; von Teichman, K. Integrating disaster risk reduction and climate change adaptation: Key challenges—Scales, knowledge, and norms. Sustain. Sci. 20105, 171–184. [Google Scholar] [CrossRef]
  34. Walshe, R.A.; Nunn, P.D. Integration of indigenous knowledge and disaster risk reduction: A case study from Baie Martelli, Pentecost Island, Vanuatu. Int. J. Disaster Risk Sci. 20123, 185–194. [Google Scholar] [CrossRef]
  35. UN General Assembly. The Sendai Framework for Disaster Risk Reduction 2015–2030; UN General Assembly: Geneva, Switzerland, 2015. [Google Scholar]
  36. Bruce, I. A Preventable Disaster: Landslides and Flooding Disaster in Freetown, Sierra Leone. 2019. Available online: https://blogs.worldbank.org/sustainablecities/preventable-disaster-landslides-and-flooding-disaster-freetown-sierra-leone?CID=SURR_TT_WBGCities_EN_EXT (accessed on 14 January 2021).
  37. UNICEF. Emergencies: UNICEF’s Emergency Preparedness and Response in Sierra Leone. 2019. Available online: https://unicef.org/sierraleone/emergencies (accessed on 11 January 2021).
  38. UNGA (United Nations General Assembly). Report of the Open-Ended Intergovernmental Expert Working Group on Indicators and Terminology Relating to Disaster Risk Reduction. 2017. Available online: https://unisdr.org/archive/51767 (accessed on 18 August 2020).
  39. Agrawal, N. Disaster Risk Evaluation–Qualitative Methods. In Natural Disasters and Risk Management in Canada; Springer: Geneva, Switzerland, 2018. [Google Scholar]
  40. Alfieri, L.; Feyen, L.; Dottori, F.; Bianchi, A. Ensemble flood risk assessment in Europe under high-end climate scenarios. Glob. Environ. Chang. 201535, 199–212. [Google Scholar] [CrossRef]
  41. Wright, K. Resilient communities? Experiences of risk and resilience in a time of austerity. Int. J. Disaster Risk Reduct. 201618, 154–161. [Google Scholar] [CrossRef]
  42. Driessen, P.; Hegger, D.; Van Rijswick, H.; Kundzewicz, Z.W. Toward more resilient flood risk governance: Guest editorial, part of a special feature on toward more resilient flood risk governance. Ecol. Soc. 201621, 53. [Google Scholar] [CrossRef]
  43. Kurian, M.; Ardakanian, R.; Veiga, L.G.; Meyer, K. Disaster risk, political decentralization and the use of indices for evidence-based decision making. In Resources, Services, and Risks; Springer: Cham, Switzerland, 2016. [Google Scholar]
  44. Wu, W.N.; Chang, K.; Tso, Y.E. If only we knew what we know: Factors for mobilizing citizen participation in community-based emergency preparedness. Chin. Public Adm. Rev. 20167, 77–109. [Google Scholar]
  45. Schipper, L.; Pelling, M. Disaster risk, climate change, and international development: Scope for, and challenges to, integration. Disasters 200630, 19–38. [Google Scholar] [CrossRef] [PubMed]
  46. Mercer, J. Disaster risk reduction or climate change adaptation: Are we reinventing the wheel? J. Int. Dev. 201022, 247–264. [Google Scholar] [CrossRef]
  47. Walter, J. World Disasters Report 2005: Focus on Information in Disasters; Stylus Publishing: Sterling, VA, USA, 2005. [Google Scholar]
  48. Kappes, M.S.; Keiler, M.; von Elverfeldt, K.; Glade, T. Challenges of analyzing multi-hazard risk: A review. Nat. Hazards 201264, 1925–1958. [Google Scholar] [CrossRef]
  49. Maslen, S.; Hayes, J. Preventing black swans: Incident reporting systems as collective knowledge management. J. Risk Res. 201619, 1246–1260. [Google Scholar] [CrossRef]
  50. The Association of Chartered Certified Accountants (ACCA). Reporting Risk: The Association of Chartered Certified Accountants; The Association of Chartered Certified Accountants: London, UK, 2014. [Google Scholar]
  51. Bubeck, P.; Botzen, W.J.W.; Aerts, J.C.J.H. A review of risk perceptions and other factors that influence flood mitigation behavior. Risk Anal. 201232, 1481–1495. [Google Scholar] [CrossRef] [PubMed]
  52. Birkholz, S.; Muro, M.; Jeffrey, P.; Smith, H.M. Rethinking the relationship between flood risk perception and flood management. Sci. Total Environ. 2014478, 12–20. [Google Scholar] [CrossRef] [PubMed]
  53. Murphy, B.L.; McBean, G.; Dolan, H.; Falkiner, L.; Kovacs, P. Enhancing Local Level Emergency Management: The Influence of Disaster Experience and the Role of Households and Neighbourhoods; Institute for Catastrophic Loss Reduction: Toronto, ON, Canada, 2005; Available online: MicrosoftWord-finalreport_2.rtf(iclr.org) (accessed on 11 November 2020).
  54. Guha-Sapir, D.; Below, R.; Hoyois, P. EM-DAT: The CRED/OFDA International Disaster Database. 2015. Available online: https://emdat.be/database (accessed on 28 December 2020).
  55. Munich Re Worst Natural Disasters Statistics. 2016. Available online: https://munichre.com/en/reinsurance/business/non-life/natcatservice/significant-naturalcatastrophes/index.html (accessed on 28 December 2020).
  56. Adikari, Y.; Yoshitani, J. Global Trends in Water-Related Disasters: An Insight for Policymakers; Under the Auspices of UNESCO at the Public Works Research Institute (PWRI): Tsukuba, Japan, 2009. [Google Scholar]
  57. UNISDR (United Nations Office for Disaster Risk Reduction) and CRED (Centre for Research on the Epidemiology of Disasters). 2015 Disasters in Numbers. 2016. Available online: https://unisdr.org/files/47804_2015disastertrendsinfographic.pdf (accessed on 20 November 2020).
  58. UNISDR. UNISDR Terminology on Disaster Risk Reduction, United Nations International Strategy on Disaster Risk Reduction (UNISDR). 2020, p. 31. Available online: https://unisdr.org/files/7817_UNISDRTerminologyEnglish.pdf (accessed on 15 May 2020).
  59. Russell, L.A.; Goltz, J.D.; Bourque, L.B. Preparedness and hazard mitigation actions before and after two earthquakes. Environ. Behav. 199527, 744–770. [Google Scholar] [CrossRef]
  60. Hoffmann, R.; Muttarak, R. Learn from the past, prepare for the future: Impacts of education and experience on disaster preparedness in the Philippines and Thailand. World Dev. 201796, 32–51. [Google Scholar] [CrossRef]
  61. Field, C.B.; Barros, V.; Stocker, T.F.; Dahe, Q.; Jon Dokken, D.; Ebi, K.L.; Mastrandrea, M.D.; Mach, K.J.; Plattner, G.K.; Allen, S.K.; et al. Managing the Risks of Extreme Events and Disasters to Advance Climate Change Adaptation; Cambridge University Press: Cambridge, UK, 2012; ISBN 9781139177245. [Google Scholar]
  62. Wisner, B.; Blaikie, P.; Cannon, T.; Davis, I. At Risk: Natural Hazards, People’s Vulnerability, and Disasters; Routledge: London, UK, 2004; p. 471. [Google Scholar]
  63. Glade, T.; Anderson, M.; Crozier, M.J. Landslide Hazard, and Risk; John Wiley & Sons, Inc.: West Sussex, UK, 2005; p. 801. [Google Scholar]
  64. Zagheni, E.; Muttarak, R.; Striessnig, E. Differential mortality patterns from hydro-meteorological disasters: Evidence from cause-of-death data by age and sex. Vienna Yearb. Popul. Res. 201513, 47–70. [Google Scholar]
  65. Winterhalder, G. Environmental analysis in human evolution and adaptation research. Hum. Ecol. 19808, 135–170. [Google Scholar] [CrossRef]
  66. Stakhiv, E. Evaluation of IPCC Adaptation Strategies; Institute for Water Resources, U.S. Army Corps of Engineers: Fort Belvoir, VA, USA, 1993; pp. 1–200. [Google Scholar]
  67. Denevan, W.M. Adaptation, variation and cultural geography. Prof. Geogr. 198335, 399–406. [Google Scholar] [CrossRef]
  68. Bogardi, J.J. Hazards, risks and vulnerabilities in a changing environment: The unexpected onslaught on human security? Glob. Environ. Chang. 200414, 361–365. [Google Scholar] [CrossRef]
  69. Shaw, R.; Pulhin, J.M.; Pereira, J.J. Climate Change Adaptation and Disaster Risk Reduction: Issues and Challenges; Emerald: Bingley, UK, 2010; pp. 1–19. [Google Scholar]
  70. Shaw, R.; Pulhin, J.M.; Pereira, J.J. Climate Change Adaptation and Disaster Risk Reduction: An Asian Perspective; Emerald: Bingley, UK, 2010; pp. 1–18. [Google Scholar]
  71. Lei, Y.; Wang, J.; Yue, Y.; Zhou, H.; Yin, W. Rethinking the relationships of vulnerability, resilience, and adaptation from a disaster risk perspective. Nat. Hazards 201470, 609–627. [Google Scholar] [CrossRef]
  72. Cutter, S.L.; Ash, K.D.; Emrich, C.T. The geographies of community disaster resilience. Glob. Environ. Chang. 201429, 65–77. [Google Scholar] [CrossRef]
  73. Wegscheider, S.; Post, J.; Zosseder, K.; Mück, M.; Strunz, G.; Riedlinger, T.; Muhari, A.; Anwar, H.Z. Generating tsunami risk knowledge at community level as a base for planning and implementation of risk reduction strategies. Nat. Hazardsd Earth Syst. Sci. 201111, 249–258. [Google Scholar] [CrossRef]
  74. Aldrich, D.P.; Meyer, M.A. Social capital, and community resilience. Am. Behav. Sci. 201559, 254–269. [Google Scholar] [CrossRef]
  75. Kapucu, N. Interagency communication networks during emergencies: Boundary spanners in multiagency coordination. Am. Rev. Public Adm. 200536, 207–225. [Google Scholar] [CrossRef]
  76. Kapucu, N. Interorganizational coordination in dynamic context: Networks in emergency response management. Connections 200526, 33–48. [Google Scholar]
  77. Guarino, M.; Mashiko, T.; Franz, G.; Satoh, S. Collaborative planning for post-disaster reconstruction in Italy: Focus on community participation in the town of Novi di Modena. In Proceedings of the 18th International Planning History Society Conference, Yokohama, Japan, 9 July 2018. [Google Scholar]
  78. The Associated Press—NORC, Center for Public Affairs Research. Two years after Superstorm Sandy: Resilience in Twelve Neighborhoods; The Associated Press—NORC: New York, NY, USA, 2014; Available online: https://apnorc.org/PDFs/Sandy/SandyPhase2Report_Final.pdf (accessed on 2 August 2020).
  79. Shreve, C.M.; Kelman, I. Does mitigation save? Reviewing cost-benefit analyses of disaster risk reduction. Int. J. Disaster Risk Reduct. 201410, 213–235. [Google Scholar] [CrossRef]
  80. Muttarak, R.; Lutz, W.; Jiang, L. Introduction: What can demographers contribute to the study of vulnerability? Vienna Yearb. Popul. Res. 201513, 1–13. [Google Scholar]
  81. Gray, B.; Hanna, F.; Reifels, L. The integration of mental health and psychosocial support and disaster risk reduction: A mapping and review. Int. J. Environ. Res. Public Health 202017, 1900. [Google Scholar] [CrossRef] [PubMed]
  82. Okorodudu, C.; Kuriansky, J. Integrating psychosocial and mental health principles into policy and planning for the prevention and management of epidemics and disasters. In Psychosocial Aspects of a Deadly Epidemic: What Ebola Has Taught Us about Holistic Healing: What Ebola Has Taught Us about Holistic Healing; Kuriansky, J., Ed.; ABC-CLIO: Santa Barbara, CA, USA, 2016; pp. 375–394. [Google Scholar]
  83. UNFCCC, United Nations Framework Convention on Climate Change. Paris Agreement; UNFCCC: New York, NY, USA, 2015; Available online: https://unfccc.int/files/essential_background/convention/application/pdf/english_paris_agreement.pdf (accessed on 29 July 2020).
  84. ACP-EU Natural Disaster Risk Reduction Program—Global Facility for Disaster Reduction and Recovery (GFDRR)—The World Bank. 2017. Available online: https://www.gfdrr.org/en/acp-eu (accessed on 10 December 2020).
  85. UN, United Nations. Resolution Adopted by the General Assembly on September 25 2015 70/1. Transforming Our World: The 2030 Agenda for Sustainable Development; UN: New York, NY, USA, 2015; Available online: https://un.org/ga/search/view_doc.asp?symbol=A/RES/70/1&Lang=E (accessed on 28 July 2020).
  86. EC, European Commission. Communication from the Commission to the European Parliament, the Council, the European Economic, and Social Committee and the Committee of the Regions—An EU Strategy on Adaptation to Climate Change; (COM (2013) 216 Final, Brussels, 16.04.2013); European Commission: Brussels, Belgium, 2013. [Google Scholar]
  87. ETC/CCA, European Topic Centre on Climate Change Impacts, Vulnerability, and Adaptation. Monitoring, Reporting, and Evaluation of National Level Adaptation in Europe: Lessons and Experiences from Other Policy Domains; ETC/CCA Working Paper, No 1/2017. Available online: https://cca.eionet.europa.eu/docs/WP_1-2017 (accessed on 25 July 2020).
  88. ETC/CCA, European Topic Centre on Climate Change Impacts, Vulnerability, and Adaptation. Indicators for Adaptation to Climate Change at National Level—Lessons from Emerging Practice in Europe; ETC/CCA Technical Paper 2018/3. Available online: https://cca.eionet.europa.eu/reports/TP_3-2018 (accessed on 26 July 2020).
  89. EEA, European Environment Agency. Climate Change Adaptation and Disaster Risk Reduction in Europe. Enhancing Coherence of the Knowledge Base, Policies and Practices; EEA Report No 15/2017; EEA, European Environment Agency: København, Denmark, 2017; ISSN 1977-8449. [Google Scholar]
  90. Mysiak, J.; Castellari, S.; Kurnik, B.; Swart, R.; Pringle, P.; Schwarze, R.; Wolters, H.; Jeuken, A.; van der Linden, P. Brief communication: Strengthening coherence between climate change adaptation and disaster risk reduction. Nat. Hazards Earth Syst. Sci. 201818, 3137–3143. [Google Scholar] [CrossRef]
  91. Hildén, M.; Boteler, B.; Capriolo, A.; Castellari, S.; Giordano, F.; Jensen, A.; Karali, E.; McGlade, K.; Mäkinen, K.; Nielsen, H.; et al. Policy Integration and Knowledge Use in the EU Adaptation Strategy. (BASE-WP2, D 2.1). 2013. Available online: https://base-adaptation.eu/sites/default/files/Deliverable_2_1.pdf (accessed on 30 July 2020).
  92. Aldrich, D.; Page, C.; Paul, C.J. Social Capital, and Climate Change Adaptation. 2016. Available online: https://climatescience.oxfordre.com/view/10.1093/acrefore/9780190228620.001.0001/acrefore9780190228620-e-342 (accessed on 2 August 2020).
  93. Joseph, O.; Fred, M.I.; Philip, N.; William, O.; Gerald, M. Applying social network analysis, centrality measures in identification of climate change adaptation opinion leaders. IJARIT 20166, 1–7. [Google Scholar] [CrossRef]
  94. Reifels, L. Disaster mental health risk reduction: An upstream paradigm shift for disaster mental health. In Proceedings of the UNDRR Science and Technology Conference on the Implementation of the Sendai Framework for Disaster Risk Reduction 2015–2030, Geneva, Switzerland, 27–29 January 2016. [Google Scholar]
  95. Reifels, L. Reducing the future risk of trauma: On the integration of global disaster policy within specific health domains and established fields of practice. Int. J. Environ. Res. Public Health 201815, 1932. [Google Scholar] [CrossRef] [PubMed]
  96. Hanna, F. Reducing the Mental Health and Psychosocial risks: Who is Doing What, Why and What’s Next? MHPSS.net Network Webinar. 2018. Available online: https://www.mhpss.net/ (accessed on 2 November 2020).
  97. International Council of Nurses. Nurses and Disaster Risk Reduction, Response and Recovery, Position Statement; International Council of Nurses: Geneva, Switzerland, 2019. [Google Scholar]
  98. Reifels, L. Reducing the future risk of trauma: Harnessing EU policy strategies and international treaties to advance population and disaster mental health. In Proceedings of the International Society of Traumatic Stress Studies (ISTSS) 32nd Annual Meeting, Dallas, TX, USA, 10–12 November 2016. [Google Scholar]
  99. Reifels, L.; Arbon, P.; Capon, A.; Handmer, J.; Humphrey, A.; Murray, V.; Spencer, C.; Wong, D.F. Health and disaster risk reduction regarding the Sendai Framework. Aus. J. Emerg. Manag. 201833, 16–18. [Google Scholar]
  100. Reifels, L. Reducing Mental Health Risks in Emergencies: MHPSS through a Disaster Risk Reduction Lens. MHPSS.net Network Webinar. 2018. Available online: https://www.researchgate.net/publication/323420709_Reducing_Mental_Health_Risks_in_Emergencies_MHPSS_through_a_Disaster_Risk_Reduction_Lens (accessed on 18 December 2020).
  101. United Nations University. United Nations Expert Group Meeting on Mental Well-Being, Disability and Disaster Risk Reduction; United Nations University Headquarters: Tokyo, Japan, 2014. [Google Scholar]
  102. National Research Council. Disaster Resilience: A National Imperative; The National Academies Press: Washington, DC, USA, 2012; Available online: https://doi.org/10.17226/13457 (accessed on 20 December 2020).
  103. Biasutti, M.; Frate, S. A validity and reliability study of the attitudes toward sustainable development scale. Environ. Educ. Res. 201723, 214–230. [Google Scholar] [CrossRef]
  104. Doolittle, A.; Anna, C. Faul 2, 3. Civic engagement scale: A validation study. SAGE 20133, 2158244013495542. [Google Scholar]
  105. IFMSA Policy Document—Disaster and Emergency Management. Proposed by the Team of Officials, Adopted at the IFMSA General Assembly August Meeting in Arusha, Tanzania. 2017. Available online: https://ifmsa.org/wp-content/uploads/2017/08/GS_2017AM_Policy_Disaster-and-Emergency-Management.pdf (accessed on 28 September 2020).
  106. Hair, J.F.; Black, W.C.; Babin, B.J.; Anderson, R.E.; Tatham, R.L. Multivariate Data Analysis; Prentice-Hall: Upper Saddle River, NJ, USA, 2006. [Google Scholar]
  107. Brusset, X. Does supply chain visibility enhance agility? Int. J. Prod. Econ. 2016171, 46–59. [Google Scholar] [CrossRef]
  108. Bagozzi, R.P.; Yi, Y. On the evaluation of structural equation models. J. Acad. Mark. Sci. 198816, 74–94. [Google Scholar] [CrossRef]
  109. Fornell, C.; Larcker, D.F. Evaluating structural equation models with unobservable variables and measurement error. J. Mark. Res. 198118, 39–50. [Google Scholar] [CrossRef]
  110. Baron, R.M.; Kenny, D.A. The moderator-mediator variable distinction in social psychological research: Conceptual, strategic, and statistical considerations. J. Pers. Soc. Psychol. 198651, 1173–1182. [Google Scholar] [CrossRef] [PubMed]
  111. Sobel, M.E. Asymptotic intervals for indirect effects in structural equations models. In Sociological Methodology, 2nd ed.; Leinhart, S., Ed.; Jossey-Bass: San Francisco, CA, USA, 1982; pp. 290–312. [Google Scholar]
  112. MacKinnon, D.P.; Fairchild, A.J. Current directions in mediation analysis. Curr. Dir. Psychol. Sci. 200918, 16–20. [Google Scholar] [CrossRef] [PubMed]
  113. Tofighi, D.; MacKinnon, D.P. R Mediation: An R package for mediation analysis confidence intervals. Behav. Res. Methods. 201143, 692–700. [Google Scholar] [CrossRef] [PubMed]
  114. MacKinnon, D.P.; Coxe, S.; Baraldi, A.N. Guidelines for the investigation of mediating variables in business research. J. Bus. Psychol. 201227, 1–14. [Google Scholar] [CrossRef] [PubMed]
  115. MacKinnon, D.P.; Warsi, G.; Dwyer, J.H. A simulation study of mediated effect measures. Multivar. Behav. Res. 199530, 41–62. [Google Scholar] [CrossRef] [PubMed]
  116. Kates, R.W. Natural hazard in human ecological perspective: Hypotheses and models. Econ. Geogr. 197147, 438–451. [Google Scholar] [CrossRef]
  117. Douglas, M.; Wildavsky, A. Risk and Culture: An Essay on the Selection of Technological and Environmental Dangers, 1st ed.; University of California Press: Berkeley, CA, USA, 1982; Available online: https://www.jstor.org/stable/10.1525/j.ctt7zw3mr (accessed on 25 December 2020).
  118. Pidgeon, N.; Hood, C.; Jones, D.; Turner, B.; Gibson, R. Risk perception, in report of a Royal Society Study Group. In Risk: Analysis, Perception and Management; The Royal Society: London, UK, 1992; pp. 89–134. [Google Scholar]
  119. Van Der Keur, P.; Van Bers, C.; Henriksen, H.J.; Nibanupudi, H.K.; Yadav, S.; Wijaya, R.; Subiyono, A.; Mukerjee, N.; Hausmann, H.J.; Hare, M.; et al. Identification and analysis of uncertainty in disaster risk reduction and climate change adaptation in South and Southeast Asia. Int. J. Disaster Risk Reduct. 201616, 208–214.

Assessing citizens’ behavior towards blockchain cryptocurrency adoption in the Mano River Union States: Mediation, moderation role of trust and ethical issues

Digital transformation and technologies have drastically channeled innovative global market trends from conventional commerce to digital currency. Therefore, this study examined the influence of trust on citizens’ behavior (CB) in decision-making towards blockchain cryptocurrency. The study employed a quantitative method to collect data from Africans in the diaspora of the Mano River Union sub-region. We combined SPSS and Smart PLS for data analysis. The proportion of males in the population was 52%, females were 48%. The analysis outcome found that citizen’s behavior R2 = 43% and trust in cryptocurrency R2 = 45% variance were explained
by the study model. Results also show a positive relationship between technology attachment and citizen’s behavior (r2 = 25%), blockchain transparency (BT) on trust crypto (r2 = 68%), BT on CB (r2 = 38%) as well as trust in Crypto on CB (r2 = 25%). Meanwhile, the moderation effects of ethical issues negate the relationship between trust and consumer’s behaviors, while the mediation of trust supports the association between cryptocurrency and citizen’s behavior (68%). The development of BT should entail an inclusive approach; as such, the Mano River Union must not be left behind. “The internet is central to data transfer, but the blockchain is central to value transfer,” hence the ethical issues and trust in crypto-enabler will ensure easy adaptability across the globe and Africa in particular.

KEYWORDS: Technology attachment, Blockchain transparency, Trust in cryptocurrency, Ethical issues, Citizens’ behaviour

[1] K. Siau, F. Nah, Development of a framework for trust in mobile commerce.
Proceedings of the second annual Workshop on HCI research, February (2003) 85–89.
[2] T.S.H. Teo, J. Liu, Consumer trust in e-commerce in the United States, Singapore and China, Omega 35 (1) (2007) 22–38, https://doi.org/10.1016/j. omega.2005.02.001.
[3] Kesa, O., & Mahoro, V. (n.d.). Rwandacoin : Prospects and Challenges of Developing a Cryptocurrency for Transactions in Rwanda.
[4] B.A. Tama, B.J. Kweka, Y. Park, K. Rhee, A Critical Review of Blockchain and its Current Applications, 2017, pp. 109–113.
[5] S.J. Hughes, S.T. Middlebrook, Advancing a framework for regulating cryptocurrency payments intermediaries, Yale J. Regul. 32 (2) (2015) 495–559. htt p://login.library.sheridanc.on.ca/login?url=https://search.proquest.com/docvi ew/1749961488?accountid=3455%0Ahttp://qg3yr4sv8z.search.serialssolutions. com?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&rfr_id=info:sid/ProQ% 3Aaccountingtaxbanking&rft_val.
[6] J.T. Gathii, Agreement establishing the african continental free trade area, Int. Leg. Mater. 58 (5) (2019) 1028–1083, https://doi.org/10.1017/ilm.2019.41.
[7] G. Soderberg, What Is Money and what Type of Money Would an E-Krona Be, 2018,¨ pp. 17–28.
[8] M.A. Ismail, N.S. Safa, Trust, satisfaction, and loyalty formation in electronic commerce, Journal of Industrial and Intelligent Information 2 (3) (2014) 228–232, https://doi.org/10.12720/jiii.2.3.228-232.
[9] M. Nilashi, O. Ibrahim, V. Reza Mirabi, L. Ebrahimi, M. Zare, The role of Security, Design and Content factors on customer trust in mobile commerce, J. Retailing Consum. Serv. 26 (2015) 57–69, https://doi.org/10.1016/j. jretconser.2015.05.002.
[10] T. Oliveira, M. Alhinho, P. Rita, G. Dhillon, Modelling and testing consumer trust dimensions in e-commerce, Comput. Hum. Behav. 71 (2017) 153–164, https://doi. org/10.1016/j.chb.2017.01.050.
[11] E. Prasad, I. Agarwal, R. Shinde, K. Wang, E. Wu, E. Zhang, Y. Zhang, Central
Banking in a Digital Age: Stock-Taking and Preliminary Thoughts C e n t r a l B a n k i n g i n a D i g i t a l A g e : S t o c k -T a k i n g a n d P r e l i m i n a r y T h o u g h t s C e n t r a l B a n k i n g i n a D i g i t a l A g e : S t, 2018, pp. 1–52.
[12] M.-N. Muhayiddin, E. Ahmed, H. Ismail, Consumer acceptance of an electronic dinar payment system in Malaysia, J. Electron. Bank. Syst. (2011) 1–13, https:// doi.org/10.5171/2011.463185, 2011.

[13] K. Mothokoa, Regulating Crypto-Currencies in South Africa : the Need for an Effective Legal Framework to Mitigate the Associated Risks, 2017.
[14] Sveriges Riksbank, Sveriges Riksbank Economic Review: Special Issue on the E- Krona, 2018.
[15] S. Kethineni, Y. Cao, The rise in popularity of cryptocurrency and associated criminal activity, Int. Crim. Justice Rev. 30 (3) (2020) 325–344, https://doi.org/ 10.1177/1057567719827051.
[16] L.C. Schaupp, M. Festa, Cryptocurrency adoption and the road to regulation, ACM International Conference Proceeding Series (2018) 1–9, https://doi.org/10.1145/ 3209281.3209336.
[17] S. Bibi, Student research abstract: cryptocurrency world identification and public concerns detection via social media, Proceedings of the ACM Symposium on Applied Computing, Part F1477 (2019) 550–552, https://doi.org/10.1145/ 3297280.3297644.
[18] H.M. Gazali, C.M.H.B.C. Ismail, T. Amboala, Exploring the intention to invest in cryptocurrency: the case of bitcoin, in: Proceedings – International Conference on Information and Communication Technology for the Muslim World 2018, ICT4M, 2018, pp. 64–68, https://doi.org/10.1109/ICT4M.2018.00021, 2018.
[19] J. Liang, L. Li, D. Zeng, Y. Zhao, Correlation-based dynamics and systemic risk measures in the cryptocurrency market, in: 2018 IEEE International Conference on Intelligence and Security Informatics, ISI, 2018, pp. 43–48, https://doi.org/ 10.1109/ISI.2018.8587395, 2018, April.
[20] S. Shalini, H. Santhi, A survey on various attacks in bitcoin and cryptocurrency, in: Proceedings of the 2019 IEEE International Conference on Communication and Signal Processing, ICCSP, 2019, pp. 220–224, https://doi.org/10.1109/ ICCSP.2019.8697996, 2019.
[21] M. Wimalagunaratne, G. Poravi, A predictive model for the global cryptocurrency market: a holistic approach to predicting cryptocurrency prices, in: Proceedings – International Conference on Intelligent Systems, Modelling and Simulation, ISMS, 2018-May, 2018, pp. 78–83, https://doi.org/10.1109/ISMS.2018.00024.
[22] A. Gasc, A.N. B, S.S. B, T. Fr, D. Steven, S.D.S.L.S. Moreira, A.C. França, W. W. Rocha, E.S.R. Tibaes, E.N. Júnior, S.C.V.C.V. Martins, W.L. Araújo, T. Tohge, A. ˜
R. Fernie, F.M. DaMatta, J.M. Hibberd, A.P.M. Weber, M. Tokumura, A. Ohta,
R. Suleria, No 主観的健康感を中心とした在宅高齢者における 健康関連指標に関
する共分散構造分析Title, F. F. M. F. M. F. M. F. M. Photosynthetica 2 (1) (2018) 1–13, https://doi.org/10.1007/978-3-319-76887-8%0A. http://link.springer. com/10.1007/978-3-319-93594-2%0Ahttps://doi.org/10.1016/B978-0-12- 409517-5.00007-3%0Ahttps://doi.org/10.1016/j.jff.2015.06.018%0Ahttps://doi. org/10.1038/s41559-019-0877-3%0Aht
[23] D. Difranzo, S.H. Taylor, F. Kazerooni, O.D. Wherry, N.N. Bazarova, Upstanding by design: bystander intervention in cyberbullying, in: Conference on Human Factors in Computing Systems – Proceedings, 2018-April, 2018, pp. 1–12, https://doi.org/ 10.1145/3173574.3173785.
[24] P. Greenberg, D. Bugden, Energy consumption boomtowns in the United States: community responses to a cryptocurrency boom, Energy Res. Social Sci. 50 (December 2018) (2019) 162–167, https://doi.org/10.1016/j.erss.2018.12.005.
[25] M. Hudson, Raising the Stakes : the Use and Future Adoption of Cryptocurrency within Online Gambling in Ireland Master of Science in Finance Dissertation, 2020 (August).
[26] K.E. Calhoun, L.A. Yale, M.E. Whipple, S. Allen, D.E. Wood, R. Tatum, The impact of COVID-19 on medical student surgical education: implementing extreme pandemic response measures in a widely distributed surgical clerkship experience, Am. J. Surg. (2020), https://doi.org/10.1016/j.amjsurg.2020.04.024.
[27] R. Al-Amri, N.H. Zakaria, A. Habbal, S. Hassan, Cryptocurrency adoption: current stage, opportunities, and open challenges, Int. J. Adv. Comput. Res. 9 (44) (2019) 293–307, https://doi.org/10.19101/ijacr.pid43.
[28] C. Nolasco Braaten, M.S. Vaughn, Convenience theory of cryptocurrency crime: a content analysis of U.S. Federal court decisions, Deviant Behav. (2019) 1–21, https://doi.org/10.1080/01639625.2019.1706706, 00(00).
[29] S. Bibi, S. Hussain, M.I. Faisal, Public perception based recommendation system for cryptocurrency, in: Proceedings of 2019 16th International Bhurban Conference on Applied Sciences and Technology, IBCAST, 2019, pp. 661–665, https://doi.org/ 10.1109/IBCAST.2019.8667123. 2019, July.
[30] S. Corbet, C.J. Larkin, B.M. Lucey, A. Meegan, L. Yarovaya, The volatility generating effects of macroeconomic news on cryptocurrency returns, SSRN Electron. J. (2018), https://doi.org/10.2139/ssrn.3141986.
[31] A.I.S. Al-hussaini, A.A. Ibrahim, M. Fauzan, H.M. Mohadis, Users perception of cryptocurrency system Application from the islamic views, International Journal on Islamic Applications in Computer Science And Technology 7 (1) (2019) 13–25. https://www.academia.edu/download/61158809/Users_Perception_of_Crypto currency_System_Application_from_the_Islamic_Views20191107-107826-1shgnol. pdf.
[32] R.M. Baron, D.A. Kenny, The moderator–mediator vari- able distinction in social psychological research: conceptual, strategic, and statistical considerations, J. Pers. Soc. Psychol. 51 (1986) 1173–1182.
[33] S. Abu-Bader, T.V. Jones, Statistical mediation analysis using the sobel test and and hayes SPSS process macro, International Journal of Quantitative and Qualitative Research Methods 9 (1) (2021) 42–61.
[34] X. Li, P. Jiang, T. Chen, X. Luo, Q. Wen, A survey on the security of blockchain systems, Future Generat. Comput. Syst. 107 (2020) 841–853, https://doi.org/ 10.1016/j.future.2017.08.020.
[35] N. Wang, X.L. Shen, Y. Sun, Transition of electronic word-of-mouth services from web to mobile context: a trust transfer perspective, Decis. Support Syst. 54 (3) (2013) 1394–1403, https://doi.org/10.1016/j.dss.2012.12.015.
[36] K.J. Stewart, Trust transfer on the world wide web, Organ. Sci. 14 (1) (2003) 5–17, https://doi.org/10.1287/orsc.

[37] L. Xiao, Y. Zhang, B. Fu, Exploring the moderators and causal process of trust transfer in online-to-offline commerce, J. Bus. Res. 98 (February) (2019) 214–226, https://doi.org/10.1016/j.jbusres.2019.01.069.
[38] D. Belanche, L.V. Casalo, C. Flavi´ an, J. Schepers, Trust transfer in the continued ´ usage of public e-services, Inf. Manag. 51 (6) (2014) 627–640, https://doi.org/ 10.1016/j.im.2014.05.016.
[39] Y. Zhang, X. Chen, X. Liu, N. Zhu, Exploring trust transfer between internet enterprises and their affiliated internet-only banks: an adoption study of internet- only banks in China, Chin. Manag. Stud. 12 (1) (2018) 56–78, https://doi.org/ 10.1108/CMS-06-2017-0148.
[40] X. Cao, L. Yu, Z. Liu, M. Gong, L. Adeel, Understanding mobile payment users’ continuance intention: a trust transfer perspective, Internet Res. 28 (2) (2018) 456–476, https://doi.org/10.1108/IntR-11-2016-0359.
[41] H. Han, C. Koo, N. Chung, Implication of the fit between Airbnb and host characteristics: a trust-transfer perspective, in: ACM International Conference Proceeding Series, 17-19-Augu, 2016, https://doi.org/10.1145/ 2971603.2971613.
[42] H. Treiblmaier, H. Treiblmaier, C. Sillaber, The impact of blockchain on e- commerce : a framework for salient research topics Electronic Commerce Research and Applications the impact of blockchain on e-commerce : a framework for salient research topics, Electron. Commer. Res. Appl. 48 (June) (2021) 101054, https:// doi.org/10.1016/j.elerap.2021.101054.
[43] V. Paliwal, S. Chandra, S. Sharma, Blockchain Technology for Sustainable Supply Chain Management : A Blockchain Technology for Sustainable Supply Chain Management : A Systematic Literature Review and a Classification Framework, 2020, https://doi.org/10.3390/su12187638. September.
[44] N. Biddle, Tax and Transfer Policy Institute October 2019, 2019 (October).
[45] H. Hu, D. Zhang, C. Wang, Impact of social media influencers’ endorsement on application adoption: a trust transfer perspective, SBP (Soc. Behav. Pers.) 47 (11) (2019), https://doi.org/10.2224/sbp.8518.
[46] C. Sillaber, B. Waltl, H. Treiblmaier, U. Gallersdorfer, Laying the Foundation for ¨ Smart Contract Development : an Integrated Engineering Process Model, Information Systems and E-Business Management, 2020, 0123456789, https://doi. org/10.1007/s10257-020-00465-5.
[47] J. Pre-proof, L. Peng, W. Feng, Z. Yan, Y. Li, X. Zhou, S. Shimizu, Privacy Preservation in Permissionless Blockchain : a Survey. Digital Communications And Networks, 2020, https://doi.org/10.1016/j.dcan.2020.05.008.
[48] Z. Shao, X. Li, Y. Guo, L. Zhang, Electronic Commerce Research and Applications Influence of service quality in sharing economy : understanding customers ’ continuance intention of bicycle sharing, Electron. Commer. Res. Appl. 40 (October 2019) (2020) 100944, https://doi.org/10.1016/j.elerap.2020.100944.
[49] C. Mueller-bloch, C. Müller-bloch, Governance in the blockchain economy : a framework and research agenda governance in the blockchain economy : a framework and research agenda, March, https://doi.org/10.17705/1jais.00518, 2018.
[50] F. Hawlitschek, B. Notheisen, T. Teubner, Electronic Commerce Research and Applications the limits of trust-free systems : a literature review on blockchain technology and trust in the sharing economy, Electron. Commer. Res. Appl. 29 (2018) 50–63, https://doi.org/10.1016/j.elerap.2018.03.005.
[51] G. Soderberg, Are Bitcoin and other crypto-assets money? Sveriges Riksbank:¨ Economic Commentaries 5 (2018) 1–14.
[52] S. Lee, C. Ahn, K.M. Song, H. Ahn, Trust and Distrust in E-Commerce, 2018, https://doi.org/10.3390/su10041015. October 2017.
[53] T.K. Tsang, P. Wu, Y. Lin, E.H.Y. Lau, G.M. Leung, B.J. Cowling, Effect of changing case definitions for COVID-19 on the epidemic curve and transmission parameters in mainland China: a modelling study, Lancet Public Health 2667 (20) (2020) 1–8, https://doi.org/10.1016/S2468-2667(20)30089-X.
[54] C. Can, Technology in Society Examination of trust and sustainability concerns in autonomous vehicle adoption 63 (2020), https://doi.org/10.1016/j. techsoc.2020.101361. February.
[55] L. Zavolokina, G. Schwabe, Blockchain Technologies from the Consumers ’
Perspective : what Is There and Why Should Who Care ? Blockchain Technologies from the Consumers ’ Perspective : what Is There, 2018, https://doi.org/10.24251/ HICSS.2018.441. January.
[56] M. Ahmad, K. Salah, IoT security : review , blockchain solutions , and open challenges, Future Generat. Comput. Syst. 82 (2018) 395–411, https://doi.org/ 10.1016/j.future.2017.11.022.
[57] M. Sharma, R. Antony, R. Sehrawat, A. Contreras, T.U. Daim, Technology in Society Exploring post-adoption behaviors of e-service users : evidence from the hospitality sector/online travel services, Technol. Soc. 68 (2022) 101781, https:// doi.org/10.1016/j.techsoc.2021.101781. July 2021.
[58] C. Dierksmeier, P. Seele, Cryptocurrencies and business ethics, J. Bus. Ethics 152
(1) (2018), https://doi.org/10.1007/s10551-016-3298-0.
[59] F. Shahzad, G.Y. Xiu, J. Wang, M. Shahbaz, An empirical investigation on the adoption of cryptocurrencies among the people of mainland China, Technol. Soc.
55 (June) (2018) 33–40, https://doi.org/10.1016/j.techsoc.2018.05.006.
[60] N. Isaeva, K. Gruenewald, M.N.K. Saunders, Trust theory and customer services research : theoretical review and synthesis, Serv. Ind. J. (2020) 1–33, https://doi.
org/10.1080/02642069.2020.1779225, 0(0).
[61] N. Antonakakis, I. Chatziantoniou, D. Gabauer, Cryptocurrency market contagion: market uncertainty, market complexity, and dynamic portfolios, J. Int. Financ.
Mark. Inst. Money 61 (2019) 37–51, https://doi.org/10.1016/j. intfin.2019.02.003.

[62] H.S. Sætra, Technology in Society the ethics of trading privacy for security : the multifaceted effects of privacy on liberty and security, Technol. Soc. 68 (January) (2022) 101854, https://doi.org/10.1016/j.techsoc.2021.101854.
[63] A. Leguina, A primer on partial least squares structural equation modeling (PLS- SEM), Int. J. Res. Method Educ. 38 (2) (2015) 220–221, https://doi.org/10.1080/ 1743727X.2015.1005806.
[64] Z. Awang, A. Afthanorhan, M. Mamat, N. Aimran, Modeling structural model for higher order constructs (HOC) using marketing model, World Appl. Sci. J. 35 (8) (2017) 1434–1444, https://doi.org/10.5829/idosi.wasj.2017.1434.1444.
[65] Cohen & Cohen, Applied Multiple Regression/Correlation Analyses for the Behavioral Sciences, third ed., Routledge, 1983. August 1, 2002, https://www.
[66] O. Bentahar, R. Cameron, Design and implementation of a mixed method research study in project management, Electron. J. Bus. Res. Methods 13 (1) (2015) 3–15. [67] M.B. Miles, A.M. Huberman, J. Saldana, Qualitative Data Analysis: A Methods Sourcebook, in: The SAGE Handbook of Applied Social Research Methods, third ed., 2014.
[68] Zainudin Awang, Asyraf Afthanorhan, Mustafa Mamat, The Likert scale analysis using parametric based Structural Equation Modeling (SEM), Comput. Methods Soc. Sci. 4 (1) (2016) 13–21, https://doi.org/10.5539/mas.v9n9p58.
[69] J.F. Hair, C.M. Ringle, M. Sarstedt, Partial least squares structural equation modeling: rigorous applications, better results and higher acceptance, Long. Range Plan. 46 (1–2) (2013) 1–12, https://doi.org/10.1016/j.lrp.2013.01.001.
[70] J. Cohen, Statistical Power Analysis for the Behavioral Sciences Second Edition, STATISTICAL POWER ANALYSIS for the BEHAVIORAL SCIENCES, second ed., vol. 148, Jacob Cohen Department of Psychology New York University, New York, New York, 2013 (LAWRENCE ERLBAUM ASSOCIATES, PUBLISHERS).
[71] J. Henseler, Discriminant Validity : Check Out How to Use the New HTMT Criterion ! A Primer on Partial Least Squares Structural Equation Modeling, , PLS-SEM), 2015.
[72] M. Sarstedt, C.M. Ringle, J.F. Hair, Handbook of market research, in: Handbook Of Market Research (Issue September), 2020, https://doi.org/10.1007/978-3-319- 05542-8.
[73] C.M. Voorhees, M.K. Brady, R. Calantone, E. Ramirez, Discriminant validity testing in marketing: an analysis, causes for concern, and proposed remedies, J. Acad.
Market. Sci. 44 (1) (2016) 119–134, https://doi.org/10.1007/s11747-015-0455-4. [74] M.R. Ab Hamid, W. Sami, M.H. Mohmad Sidek, Discriminant validity assessment: use of fornell & larcker criterion versus HTMT criterion, J. Phys. Conf. 890 (1) (2017), 012163, https://doi.org/10.1088/1742-6596/890/1/012163.
[75] S. Jung, J.H. Park, Consistent partial least squares path modeling via regularization, Front. Psychol. 9 (FEB) (2018), https://doi.org/10.3389/ fpsyg.2018.00174.
[76] J. Cohen, A power primer, Psychol. Bull. 112 (1) (1992) 155, https://doi.org/
[77] D. Barijan, E.P. Ariningsih, F. Rahmawati, The influence of brand trust, brand familiarity, and brand experience on brand attachments, Journal of Digital Marketing and Halal Industry (2021), https://doi.org/10.21580/ jdmhi.2021.3.1.7440.
[78] O.H. Chi, S. Jia, Y. Li, D. Gursoy, Developing a formative scale to measure consumers’ trust toward interaction with artificially intelligent (AI) social robots in service delivery, Comput. Hum. Behav. (2021), https://doi.org/10.1016/j. chb.2021.106700.
[79] A.I. Alzahrani, H. Al-samarraie, A. Eldenfria, J.E. Dodoo, Jo Ur Na L P Re of, Technology in Society, 2022, p. 101862, https://doi.org/10.1016/j. techsoc.2022.101862.
[80] F. Sartipi, Publicizing construction firms by cryptocurrency, Journal of Construction Materials 2 (3) (2021) 1–8, https://doi.org/10.36756/jcm.v2.3.1. [81] P. Xu, J. Lee, J.R. Barth, R.G. Richey, Blockchain as supply chain technology: considering transparency and security, Int. J. Phys. Distrib. Logist. Manag. (2021), https://doi.org/10.1108/IJPDLM-08-2019-0234.
[82] X. Yang, M. Li, H. Yu, M. Wang, D. Xu, C. Sun, A Trusted Blockchain-Based Traceability System for Fruit and Vegetable Agricultural Products, IEEE Access, 2021, https://doi.org/10.1109/ACCESS.2021.3062845.
[83] N. Kshetri, Blockchain technology for improving transparency and citizen’s trust, Advances in Intelligent Systems and Computing (2021), https://doi.org/10.1007/ 978-3-030-73100-7_52.
[84] H.S. Bae, The interaction effect of information systems of shipping and logistics firms and managers’ support for blockchain technology on cooperation with shippers for sustainable value creation, Sustainability (2021), https://doi.org/ 10.3390/su13084493.

The Impact and Application of Smart Grid on Global Energy Delivery

This paper presents a detailed survey of global energy delivery and smart grid approaches. Particularly in the sense that shows the impacts on the production of energy resources globally. How can energy losses be reduced, primarily by implementing smart grid approaches? Power transfers and reduction of energy sources can be made by smart grids with information technology (I.T) such as sensors digital meters and communication networks. Energy from photovoltaic and wind power are some of the energy delivery systems that have gained attention since they are cheap and environment friendly and do not emit greenhouse gas. Presently available grid is insufficient to serve future systems. For this reason, an intelligent grid system
is required to support future needs for society. This paper expounds on the impacts of the existing power delivery system and suggests a smart grid for global energy delivery on a better management system.


Conti, J.J., Holtberg, P.D., Beamon, J.A., Schaal, A.M., Ayoub, J.C., & Turnure, J.T., (2014). Annual energy outlook 2014. US Energy Information Administration, 2.
Shen, Z. Y., Chen, L., Chen, T., & Di Baldassarre, G., (2012). Analysis of parameter uncertainty in hydrological and sediment modeling using GLUE method: a case study of SWAT model applied to Three Gorges Reservoir Region, China, Hydrology & Earth System Sciences, 16(1) 121-132.
Fadaeenejad, M., Saberian, A. M., Fadaee, M., Radzi, M. A. M., Hizam, H., & AbKadir, M. Z. A. (2014). The present and future of smart power grid in developing countries. Renewable and Sustainable Energy Reviews, 29, 828-834.
Kar, S. K., Sharma, A., & Roy, B. (2016). Solar energy market developments in India. Renewable and sustainable energy reviews, 62, 121-133.
Zareen, N., Mustafa, M. W., Al Gizi, A. J., & Alsaedi, M. A. (2012). Worldwide technological revolutions and its challenges under smart grid paradigm: A comprehensive study. Int. J. Sci. Eng. Res, 3(11).
Kumar, A., Kumar, K., Kaushik, N., Sharma, S., & Mishra, S. (2010). Renewable energy in India:
current status and future potentials. Renewable and sustainable energy reviews, 14(8), 24342442.
Kaplan, S. M. (2009). Smart Grid: Modernizing electric power transmission and distribution; Energy independence, Storage and security; Energy independence and security act of 2007 (EISA); Improving electrical grid efficiency, communication, reliability, and resiliency; integrating new and renewable energy sources. The Capitol Net Inc.
Kaplan, S. M. (2009, April). Electric power transmission: background and policy issues. Library of Congress, Congressional Research Service.
Fang, X., Misra, S., Xue, G., & Yang, D. (2011). Smart grid—The new and improved power grid: A survey. IEEE communications surveys & tutorials, 14(4), 944-980.
Amin, S. M., & Wollenberg, B. F. (2005). Toward a smart grid: power delivery for the 21st century. IEEE power and energy magazine, 3(5), 34-41.
Alagoz, B. B., Kaygusuz, A. S. İ. M., & Karabiber, A. (2012). A user-mode distributed energy management architecture for smart grid applications. Energy, 44(1), 167-177.
Gellings, C. W. (2009). The smart grid: enabling energy efficiency and demand response. The Fairmont Press, Inc..
Popescu, G. H. (2015). Sustainable Development and the Implementation of Citizen-oriented Services. Journal of Self-Governance and Management Economics, 3(4), 70-78.
Al-Ali, A. R., Zualkernan, I. A., Rashid, M., Gupta, R., & Alikarar, M. (2017). A smart home energy management system using IoT and big data analytics approach. IEEE Transactions on Consumer Electronics, 63(4), 426-434.
Cunjiang, Y., Huaxun, Z., & Lei, Z. (2012). Architecture design for smart grid. Energy Procedia, 17, 1524-1528.
Ejaz, W., Naeem, M., Shahid, A., Anpalagan, A., & Jo, M. (2017). Efficient energy management for the internet of things in smart cities. IEEE Communications Magazine, 55(1), 84-91.
Hall, S., & Foxon, T. J. (2014). Values in the Smart Grid: The co-evolving political economy of smart distribution. Energy Policy, 74, 600-609.
He, Y., Jenkins, N., & Wu, J. (2016). Smart metering for outage management of electric power distribution networks. Energy Procedia, 103, 159-164.
Jenkins, N., Long, C., & Wu, J. (2015). An overview of the smart grid in Great
Britain. Engineering, 1(4), 413-421.
Khan, J., & Arsalan, M. H. (2016). Solar power technologies for sustainable electricity generation–A review. Renewable and Sustainable Energy Reviews, 55, 414-425.
Kwon, D., Hodkiewicz, M. R., Fan, J., Shibutani, T., & Pecht, M. G. (2016). IoT-based prognostics and systems health management for industrial applications. IEEE Access, 4, 3659-3670.
Werner, S., Wiltshire, R., Svendsen, S., Thorsen, J. E., Hvelplund, F., & Mathiesen, B. V. (2014). 4th Generation district heating (4GDH). Energy, 68, 1-11.
Stojkoska, B. L. R., & Trivodaliev, K. V. (2017). A review of Internet of Things for smart home: Challenges and solutions. Journal of Cleaner Production, 140, 1454-1464.
Spencer Jr, B. F., Ruiz‐Sandoval, M. E., & Kurata, N. (2004). Smart sensing technology: opportunities and challenges. Structural Control and Health Monitoring, 11(4), 349-368.
Yu, X., & Xue, Y. (2016). Smart grids: A cyber–physical systems perspective. Proceedings of the IEEE, 104(5), 1058-1070.
Yu, Y., Liu, Y., & Qin, C. (2015). Basic ideas of the smart grid. Engineering, 1(4), 405-408.
Shrouf, F., & Miragliotta, G. (2015). Energy management based on Internet of Things: practices and framework for adoption in production management. Journal of Cleaner Production, 100, 235246.
Smid, J. W., & Nieboer, N. (2008). Energy‐efficient asset management for professional landlords. International Journal of Strategic Property Management, 12(1), 19-34.
Druitt, J., & Früh, W. G. (2012). Simulation of demand management and grid balancing with electric vehicles. Journal of Power Sources, 216, 104-116.

A 4G LTE Evolved packet Core Planning and Deployment in Freetown Sierra Leone

Wireless broadband subscribers have tripled in the past two decades in the world. It subsequently adds more burden on the network traffic, thereby pressuring the current 2G / 3G wireless network infrastructural development in Freetown, Sierra Leone. The existing 2G / 3G network infrastructures in Freetown offer limited resources for download and upload speed of 12.54Mbps and 2.59Mbps, respectively, to active subscribers.
The exponential increase in the country’s population has adverse effects on the subscriber’s database. Therefore, a considerable task is faced by the country’s telecommunication network infrastructures to devise an improvement and efficient technologies to augment the current system to handle the numerous issues. Three active private mobile network operators (X, Y, & Z) and one Government-owned operator (W) exist in the country. The only operator that runs across the country is operator X, and it has the highest number of subscribers. The country has just rollout it Long Term Evolution (LTE) by the private MNOs.
The research is to encourage the Sierra Leone National Telecommunication Commission (NATCOM), a telecommunication regulatory body, to mandate all MNOs in the country to roll out the 4G LTE core network infrastructure in Freetown. ARIMA model is used to analyze the throughputs (kbps) prediction to ascertain 4G LTE rollout using the Python programming language is an effective alternative. Statistical data from operator X for ten years for Freetown municipality from January 2010 – November 2019 was collected.
The research concludes that 4G LTE deployment or upgrade was necessary for
the Freetown municipality.

KEYWORDS: 4G Long Term Evolution (LTE), ARIMA Model, Evolved Packet
Core (EPC), Short-Term, and Long-Term Predictions.

Saleh, A.B., Bulakci, Ö., Hämäläinen, J., Redana, S., and Raaf, B., (2012), Analysis of the Impact of Site
Planning on the Performance of Relay Deployments, IEEE Transactions on Vehicular
Technology, vol. 61, no. 7, pp. 3139–3150.
Alfin Hikmaturokhman et al. (2018), 4G LTE Evolved Packet Core Planning with Call Switch
Fallback Technology, Journal of Telecommunication, Electronic, and Computer Engineering.,
Pg. 134, Vol. 10 No. 1-6
Bjerke, B. A., (2011), LTE-advanced and the evolution of LTE deployments, IEEE Wireless
Communications, Vol. 18, no. 5, pp. 4–5.
Bharti Kalra and D.K Chauhan (2014), A Comparative Study of Mobile Wireless Communication
Network: 1G to 5G. Ph.D. Scholar (CSE), Noida International University, Greater Noida, India.
International Journal of Computer Science and Information Technology Research. Vol. 2,
Issue 3, P.P.: 430-433.
Bin Yang and Mingyan Jiang (2016), A Forecasting Model for Data Center Bandwidth Utilization. SAI
Intelligent Systems Conference, Conference on IEEE: 3039/3046.
Dababneh, D., St-Hilaire, M., and Makaya, C., (2013), Traffic model for long term evolution networks,
2013 Int. Conf. Sel. Top. Mob. Wirel. Networking, MoWNeT, pp. 13– 18, 2013.
Dima Dababneh (2013). LTE Traffic Generation and Evolved Packet Core (EPC) Network Planning.
Ottawa-Carleton Institute for Electrical and Computer Engineering (OCIECE), Canada. Pg. 41.
Feng Huifang and Yantai Shu (2013), Network traffic analysis and prediction based on AMP.
Pervasive computing and Application (ICPCA), 6th International Conference on IEEE, P275-
Park, J., Raza, S.M, Thorat .P, and Kim D.S (2015), Network Traffic Prediction Model Based on
Training Data. Computational Science and Its Applications, International Conference on
Springer, 117/127.
Jian Kuang et al. (2013). A Network Traffic Prediction Model using Two-Dimensional Correlation
and Single Exponential Smoothing Communication Technology (ICCT), International
Conference on IEEE, P403-406
Hanzo, L., Haas, H., Imre, S., O’Brien, D., Rupp, M., and Gyongyosi, L., (2012), Wireless Myths,
Realities, and Futures: From 3G/4G to Optical and Quantum Wireless, Proceedings of the
IEEE, vol. 100, no. Special Centennial Issue, pp. 1853–1888.
Lun Zhang, Qiuchen Liu, Wenchen Yang, Nai Wei, and Decun Dong (2013). An Improved K-nearest
Neighbor Model for Short-term Traffic Flow Prediction. International Conference of
Transportation Professionals, 13th COTA Conference on Elsevier, 654/660.
Jaber, M., Dawy, Z., Akl, N., and Yaacoub, E., (2016), Tutorial on LTE/LTE-A Cellular Network
Dimensioning Using Iterative Statistical Analysis, IEEE Communications Surveys and
Tutorials, vol. 18, no. 2, pp. 1355–1383,
Qubati, M., LTE Network Planning and Optimization, Taiz University F, 2014.
Poo KuanHoong, Ian K.T, Tan, and Chee-YikKeong (2012), BitTorrent Network Traffic Forecasting
With ARIMA. International Journal of Computer Networks and Communications (IJCNC):
Teleco, S.L., “Research and Markets: Sierra Leone – Telecoms,” 2018. [Online]. Available:
Samar Raza Talpur, Tahar Kechadi (2016), Ensemble of Flexible Neural Tree and Ordinary
Differential Equations for Small-time Scale Network Traffic Prediction, International Journal
of Computer, 12: 195/201.
Tao Peng, Zhoujin Tang (2015), A Small Scale Forecasting Algorithm for Network Traffic based on
Relevant Local Least Squares Support Vector Machine Regression Model. International
Journal of Applied Mathematics and Information Sciences, 9: 653(659).
The State of LTE, Global LTE Deployment Open Signal. 2017.
Review, W.P., Population of Cities in Sierra Leone, 2018. [Online]. Available:

The Effects of Social Media on Public Emergency Response Mechanisms in Sierra Leone

The use of social media in a public emergency is dated back to the terrorist attacks (2001) in the United States. Since then, it is has been used to effectively manage critical happenings in public emergency or disaster events and also for managing future public emergencies. Unfortunately, the underdeveloped countries are far behind in the race to enhance infrastructures that would mitigate or avert critical events from happening.
The effects of social media are keyed to public emergencies as it allows the instant flow of communication to a broader population, helps government or organizations locate those affected by the disaster, and to help further those organizations to manage the available resources allocated to that public emergencies effectively. It can be exploiting the appropriate social media tools focusing on the use of ICT before, during, or after the emergency crisis.
Furthermore, the exponential increase in fake news of modern times is a concern for government and organizations handling the public emergency crisis. The politicization of national issues is another limitation, as they help to spread fake news and unfounded rumors to score political gain during a public emergency crisis. The research concludes that social media is a valuable tool  to mitigate or avert public emergency if there are enhanced infrastructures backed with strong laws that would punish fake news/rumors perpetrators and future potentials of social media.

KEYWORDS: Public Emergency, Fake News, Social Media.

Cheng-Min Huang, Edward Chan, and Adam Hyder (2010), BMC Medical Informatics and Decision
Making article “Web 2.0 and Internet Social Networking: A New tool for Disaster
Management? – Lessons from Taiwan.
Chertoff: Katrina scenario did not exist at https://www.cnn.com/2005/US/09/03/katrina.chertoff/
Denef, S., Bayerl, P. S., & Kaptein, N. (2013), Social media and the police —Tweeting practices of
British police forces during the August 2011 Riots, In Proceedings of the 31st international
conference on human factors in computing systems (pp. 3471–3480).
Eric T. White (2014), The Application of Social Media in Disasters, How can Social Media Support an
Effective Disaster Response? Page 16.
Hagar, C. (2007), The information needs of farmers and the use of ICTs. In B. Nerlich, & M. Doring
(Eds.), From Mayhem to meaning: Assessing the social and cultural impact of the 2001 foot
and mouth outbreak in the UK, Manchester, United Kingdom: Manchester University Press.
Harrald, J. R., Egan, D. M., & Jefferson, T. (2002), Web-enabled disaster and crisis response: What
have we learned from September 11. In Proceedings of the Bled eConference (pp. 69–83).
Hiltz, S. R., Diaz, P., & Mark, G. (2011), Introduction: Social media and collaborative systems for
crisis management. ACM Transactions on Computer-Human Interaction (ToCHI), 18(4), 1–6
Hughes, A. L., Denis, L. A. S., Palen, L., & Anderson, K. M. (2014), Online public communications by
police & fire services during the 2012 Hurricane Sandy. Proceedings of the conference on
human factors in Computing Systems (CHI) (pp. 1505–1514). Toronto, Canada: ACM.
Ibrahim Abdulai Sawaneh (2020): A survey on “The Effects of Social Media on Public Emergency
Response Mechanisms in Sierra Leone” at
Kaner, Jolie, and Sarah Schaack, (2016). Understanding Ebola: the 2014 epidemic, Globalization and
health, (12.1) 1-7.
Mari Saito (2012), Reuters article “Born from Japan disasters, Line app, sets sights on US, China.”
Palen, L., & Liu, S. B. (2007), Citizen communications in crisis: Anticipating a future of ICTsupported public participation. The conference on Human Factors in Computing Systems
(CHI) (pp. 727– 736). San Jose, USA: ACM Press.
Palen, L., Vieweg, S., Liu, S. B., & Hughes, A. L. (2009), Crisis in a networked world: Features of
computer-mediated communication on April 16, 2007, Virginia Tech Event. Social Science
Computer Review, 27(4), 467–480. https://doi.org/10.1177/0894439309332302.
Pipek, V., Liu, S. B., & Kerne, A. (2014), Special issue: Crisis informatics and collaboration. Computer
Supported Cooperative Work (CSCW), 23 (4–6), 339–345.
Reuter C, Kaufhold M-A. Fifteen years of social media in emergencies: A retrospective review and
future directions for crisis Informatics. J Contingencies and Crisis Management. 2017;00:1–
Reuter, C., Ludwig, T., Friberg, T., Pratzler-Wanczura, S., & Gizikis, A. (2015), Social media and
emergency services? Interview study on current and potential use in 7 European countries.
International Journal of Information Systems for Crisis Response and Management
(IJISCRAM), 7(2).
Reuter, C., Ludwig, T., Kaufhold, M.-A., & Pipek, V. (2015), XHELP: Design of a cross-platform socialmedia application to support volunteer moderators in disasters. In B. Begole, J. Kim, K.
Inkpen & W. Woo (Eds.), Proceedings of the conference on Human Factors in Computing
Systems (CHI). Seoul, Korea: ACM Press
Semple, E. (2009), Update your crisis comms plan with social media, Strategic Communication
Management, 13(5), 7.
Social Media Statistics 2020: Top Networks by the Numbers at https://dustinstout.com/socialmedia-statistics/#google-plus-stats.
Statement on the second meeting of the International Health Regulations (2005) Emergency
Committee regarding the outbreak of novel coronavirus (Covid-19) in Geneva (2020) at https://www.who.int/news-room/detail/30-01-2020-statement-on-the-second-meeting-ofthe-international-health-regulations-(2005)-emergency-committee-regarding-the-outbreakof-novel-coronavirus-(2019-ncov)
Steff, T (2013), National Defense Magazine article “Social Media Changing the Way FEMA Responds
to Disaster.”
Taro Kaji (2013), Covario article “Introducing LINE, an Emerging Social Network for Mobile in
The 7 Top Social Media Sites you need to care about in 2020:
The World Bank (2017), Sierra Leone (PDF). Rapid Damage and Loss Assessment of August 14, A
Report on the Landslides and Floods in the Western Area, Sierra Leone in the International
Bank for Reconstruction and Development / International Development Association.
Wright, D., & Hinson, M. (2009), An Updated Look at the Impact of Social Media on Public Relations
Practice. Public Relations Journal, 3(2), 27.

Cybercrimes - Threats, Challenges, Awareness, and Solutions in Sierra Leone

The internet hosts all online activities either for public or private usage. It is a powerful online podium where people socialize, make new friends, conduct academic research, perform online business transactions, share sensitive data, communication over the internet, surveillance purpose by security agencies, monitor climatic condition, used in e-healthcare system, online banking, online pay, e-commerce, defense system, and host of others critical infrastructures are the new order of the day. This has attracted online criminals to diverse numerous malicious techniques to invade people’s privacy and also exploit those data. A new game has resulted in these online malicious activities are known as “cybercrime or internet crime” which is a rewarding business as of today. Therefore, it has become difficult to protect those online activities as cybercrimes are growing daily, which suggests that effective and appropriate countermeasures are needed to combat those threats and make online activities more secure. The research paper presents the various types of cybercrime activities, countermeasures, and suggestions for online users.

KEYWORDS: Cybercrime, Cyber-Law, Cybercriminals, Cyberspace, Hacking

Anand Kumar Shrivastav, Ekata, (2013) ICT Penetration and Cybercrime in India: A Review, International Journal of
Advanced Research in Computer Science and Software Engineering, 3, 414-419. 
Harpreet Singh Dalla, Geeta, (2013) Cyber Crime – A Threat to Persons, Property, Government, and Societies, International Journal of Advanced Research in Computer Science and Software Engineering, 3.
Hemraj Saini, Yerra Shankar Rao, Panda, T.C., (2012) Cyber-Crimes and their Impacts: A Review, International Journal of Engineering Research and Applications, 2, 202-209
Lee, M. (2015). The evolution of cybercrime: From Julius Caesar and Prince Philip to state-sponsored malware. International Business Times. Retrieved from: http://ibtimes.co.uk.
Prince, Mathew (2016). Empty DDoS Threats: Meet the Armada Collective”. Cloudflare.
Richard Donegan, (2012) Bullying and Cyberbullying: History, Statistics, Law, Prevention, and Analysis, The Elon Journal of Undergraduate Research in Communications. 3, 33-42.
Romagna, M., Van Den Hout, N.J., (2017). “Hacktivism and Website Defacement: Motivations, Capabilities and Potential Threats”. Proceedings of the 27th Virus Bulletin International Conference: 41 – 50.
Saroj Mehta & Vikram Singh, (2013) Study of Awareness about Cyber Laws in the Indian Society, International Journal of Computing and Business Research, 4.
Taylor, R. W., Fritsch, E. J., & Liederbach, J. (2015). Digital crime and digital terrorism. (3rd ed.). Upper Saddle River,
NJ: Pearson.
Taylor, R. W., Fritsch, E. J., & Liederbach, J. (2015). Digital crime and digital terrorism. (3rd ed.). Upper Saddle River, NJ: Pearson.
Vineet Kandpal and Singh, R.K., (2013) Latest Face of Cybercrime and Its Prevention In India, International Journal of Basic and Applied Sciences, 2, 150-156.

A Computerized Patient’s Database Management System

Healthcare in Sierra Leone faces major dilemma when it comes to recording keeping with high demand for medical treatment and services. The medical records must appropriately have all of the patients’ medical history. Healthcare professionals should always find a way to maintain the physiological parameters that can be referenced when the need arises as it can be used for several purposes. This study on patient’s database management system is design to transform the manual way of searching, sorting, keeping and accessing patient medical information (files) into electronic medical record (EMR) thereby eliminating the traditional system. Existing platforms (manual systems) have been critically examined and hence a computer based system is essential for optimal result. The computer-based platform produces patient’s records that enhances medical practioner’s to constantly monitor their patients daily in and out of the hospital. The research looks for a more reliable and efficient scheme via computer technology to process patient health record ensuring proficient outcome that is costeffective, save time and speed-up treatment. The research proposed patient database as an alternative solution to the growing world population especially third world nations. The system will serves as a communication tool thereby easing an efficient transfer of patient medical data to healthcare professionals for effective supervision within and outside the hospital. Furthermore, it also accelerates the transfer of patient healthcare data to healthcare medical servers or individual such as insurance company or employer. Efficient storage of medical records renders accuracy diagnosis that enhances reliable and detail prescriptions which can be referenced as it is needed.

KEYWORDS: Data; Database; Patient; Hospital; Medical Record; Electronic Medical Record.

[1] Fellegi, A and mooney, S. (1998). Population and higher individual standard for the quality of life.
[2] Miller, R. J. (1994). “Modernizing Health care through Electronic Medical Record “information system http://www.clinictools.org
[3] Brown, P.J. (2000). Evaluation of the quality of information retrieval of clinics finding from a computerized patient database using a semantic technological.
[4] Laubbel, A. (1998) “Define medical health care, or medical documentation of a patient history and care.
[5] Schneider, K., & Wagner, I. (1993). Constructing the Dossier Representative. Computer-Based Information Sharing in French Hospitals. In: Computer Supported Cooperation Work, NO 1. Kluwer Academic Publishers.
[6] Laing K. (2002). The benefits and challenges of the computerized electronic Medical record (Web page retrieved February 20, 2007 from the world wide web. http;//en wikipedia.org/wiki/medical prescription. http://en.wikipedia.org/wiki/laboratory
[7] Hunt, Dereck, L. Hayners, R.B. Hanna S.C, Smith and kristia (1999). Effects of computer based clinic. Decision system on physician. http//www.va.gov. /133h.
[8] Tumba, I.A (2006) information system development to enhance the work of medical practitioners in hospital/clinics.
[9] Landon, K.C. and London, J.P (2002), Management Information System, Prentice- Hall, New Jersey

Medical Image De-noising and Compression via a 2-D Wavelet Transform

Medical Images generally exhibits high level artefacts called noise. De-noising a medical image is essential in medical field. Transmitting medical image over the internet needs to be compressed and also remove noise to produce excellent result that can be easily viewed and interpreted by medical professionals. Wavelet transform enhances the superiority of an image and reduces noise level that is been transmitted. The image to be process is loaded and decomposed into level 3 using wavelet type known as biorthogonal via 2D wavelet transform. Furthermore, soft threshold is chosen to reduce the noise in the image. Unlike, hard threshold is an opposite of soft thresholding. Soft thresholding minimizes the coefficients above the threshold value. Medical image compression & de-noising using wavelet-based decomposition without discarding image originality describes horizontal, vertical and diagonal details of the image.

KEYWORDS: Discrete Wavelet Transform, Medical Images, De-Noising, 2D Wavelet, Image Compression.

[1] James S. Walker, ―Wavelets Based Image Processing,‖ Department of Mathematics University of Wisconsin, Eau Claire
[2] Said, A., & Pearlman, W. A. (to appear). An image multiresolution representation for Lossless and lossy compression. IEEE Transactions on Image Processing. R. C. Gonzalez, R. E. Woods, S. L. Eddins, ―Digital Image Processing using MATLAB‖.
[4] J. Walker and T. Nguyen. Wavelet-based image compression [J]. 2001
[5] S. Grgic, M. Grgic, B. Zovko-Cihlar. Performance analysis of image compression using wavelets [J].2001, 48(3), 682–695
[6] Z. Zhang and B. D. Rao, “Extension of SBL algorithms for the recovery of block sparse signals with intrablock correlation,” IEEE Trans. on Signal Processing, vol. 61, no. 8, pp. 2009–2015, 2013.
[7] S. Bhavani, K. Thanushkodi, “A Survey on Coding Algorithms in Medical Image Compression”, International Journal on Computer Science and Engineering, Vol. 02, No. 05, pp. 1429-1434, 2010.
[8] Kanwaljot Singh Sidhu, Baljeet Singh Khaira, Ishpreet Singh Virk, Medical Image Denoising In The Wavelet Domain Using Haar And DB3 Filtering, International Refereed Journal of Engineering and Science (IRJES).
[9] Y.Sukanya1, J.Preethi, ―Analysis of Image Compression Algorothms Using Wavelet Transform with GUI in MATLAB‖, IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308.

Application of Discrete Wavelet Transform for Compressing Medical Image

There are calls for enhancing present healthcare sectors when it comes to handling huge data size of patients’ records. The huge files contain lots of duplicate copies. Therefore, the ideal of compression comes into play. Image data compression removes redundant copies (multiple unnecessary copies) that increase the storage space and transmission bandwidth. Image data compression is pivotal as it helps reduce image file size and speeds up file transmission rate over the internet through multiple wavelet analytics methods without loss in the transmitted medical image data. Therefore this report presents data compression implementation for healthcare systems using a proposed scheme of discrete wavelet transform (DWT), with capacity of compressing and recovering medical image data without data loss. Healthcare images such as those of human heart and brain need fast transmission for reliable and efficient result. Using DWT which has optimal reconstruction quality greatly improves compression.

KEYWORDS: Discrete Wavelet Transform (DWT), Image Compression Medical Image

[1] Y. Hao and R. Foster, “Wireless body sensor networks for health-monitoring applications,” Phys. Meas., vol.29, pp.R27-R56, Nov. 2008.
[2] K. W. Goh, J. Lavanya, Y. Kim, E. K. Tan, and C. B. Soh, “A PDA-based ECG Beat Detector for Home Cardiac care,” in IEEE Engineering in Medicine and Biology Society, Shanghai, China, 2005, pp.375-378.
[3] P. Bonato, “Advances in Wearable Technology and Applications in Physical Medicine and Rehabilitation,” J. NeuroEng. Rehabil, vol. 2, p. 2, Feb. 2005.
[4] U. Varshney, “Pervasive Healthcare and Wireless Health Monitoring,” Mobile Networks and Applications, vol. 12, pp. 113-127, March 2007.
[5] Liu Bo, Yang Zhaorong, “Image Compression Based on Wavelet Transform”, International Conference on Measurement, Information and Control (MIC), 2012
[6] Remya George, Mrs. Manimekalai, “A Novel Approach for Image Compression Using Zero Tree Coding”, International Conference on Electronics and Communication System (ICECS -2014), Coimbatore, India
[7] S. Bhavani, K. Thanushkodi, “A Survey on Coding Algorithms in Medical Image Compression”, International Journal on Computer Science and Engineering, Vol. 02, No. 05, pp. 1429-1434, 2010.

An Assessment of the Effectiveness of Performance Appraisal System in Educational Institution: IAMTECH Sierra Leone as a Case Study

Human Resource Management (HRM) plays vital role in educational institutions. HRM is an essential ingredient for changing the scope and dynamism in evaluating worker’s performance. Performance appraisal permits institution to supervise their employee’s performance relating to competencies, punctuality, pedigree and potentials. Ignoring effective performance appraisal system results to low work output. Institutional objectives can be achieved by effectively applying performance appraisal system with diverse positive outcomes and diligently monitoring both academic and administrative staff of the Institute of Advanced Management and Technology (IAMTECH) Sierra Leone. Effective performance management and appraisal system has ultimately improved staff performance and influenced their potentials in thinking, and doing work. Importantly, it brings benefits to employer and employee by creating a plain level ground for both parties. Furthermore, performance appraisal system delivers a complete assessment of staff performance at IAMTECH. However the researchers established dissatisfaction with some appraisal processes, such as management not backing the appraisal process, authorities are not questioned for not completing their appraisal process on time, and the absence of performance appraisal workshop/seminar/training provided to the staff at IAMTECH and more importantly, the performance appraisal system is done yearly at IAMTECH. IAMTECH uses rating scale, descriptive system and management by objective methods to evaluate their employees. Noting that management by objective is the most widely used method and hence, our method of effective performance appraisal system has created positive influence on job performance at IAMTECH.

KEYWORDS: Feedback, Theory, HRM, Performance Appraisal System; Prejudice, Perception

[1] Donkor et al (2010), “Teach yourself research methods”: (2nd edn) Kumasi printing press
[2] Murphy, K. R., & Cleveland, J. (1995). Understanding performance appraisal: Social, organizational, and goal-based perspectives. Thousand Oaks, CA:
[3] Patten, T. H. (1977). Pay: Employee compensation and incentive plans. New York: The Free Press.
[4] Lopez, F.M. (1968). Evaluating Employee Performance. Chicago, Illinois: Public Personnel Association.
[5] Murphy, K. R., & Cleveland, J. (1991). Performance appraisal: An organizational perspective. Boston: Allyn and Bacon.
[6] Scott, W. D., Clothier, R. C., & Spriegel, W. R. (1961). Personnel management: Principles, practices, and point of view (6th ed.). New York: McGraw-Hill.
[7] Bellows, R. M., & Estep, M. F. (1954). Employment psychology: The interview. New York: Rinehart.
[8] Fletcher, C. (1994). Performance appraisal in context: Organizational changes and their impact on practice.
[9] Bernardin, H. J., & Beatty, R. W. (1984). Performance appraisal: Assessing human behavior at work. Boston: Kent.
[10] Martin, D. C., Bartol, K. M., & Kehoe, P. E. (2000). The legal ramifications of performance appraisal: The growing significance. Public Personnel Management, 29(3), 379.
[11] Randi, Toler, Sachs (1992). The worksmart series: Productive performance appraisals.
[12] Mani, B. G. (2002). Performance appraisal systems, productivity, and motivation: A case study. Public Personnel Management, 31(2), 141
[13] Einstein, W. O. and LeMere-Labonte, J. (1989).
Performance appraisal: dilemma or desire? Sam Advanced Management Journal, 54 (2): 26-30.
[14] Bue W.L. and Byars L.L. (2005, 11th edition) Management: Skills and Application: McGrawHill/ Irwin Inc.

Financial Management in Party Politics to Enhance Sustainable Development in Developing Nations

Politics in developing countries remain a huge concern in terms of development actualization. The types of politics practiced in this part of the world (global South) tells the type of developmental progress countries make. This article on an analysis in relation to how political parties economically operate try to bring out things that underscore political parties activities focusing on ruling parties and how they manage in handling national economy that which will bring transparency and accountability in party politics that will manifest in the national platform. In doing this, this paper tries to explain how political parties should address and handle issues of financial concerns within political parties activities and if given the chance to govern the country how they can manifest the good parts of handling finances when it comes to public financial management. This article will try to articulate issues that will analyse clear political financial management alongside transparency and accountability within parties which could be easily seen in the three arms of government and other public offices when a political party is being mandated to serve as governing party.
This paper therefore, examines the extant role that the governing parties have played in many developing countries in influencing government policies through public finances in the sustenance of positive democratic governance and release options of sound political management for sustainable democratic growth.

KEYWORDS: Development, Government of Sierra Leone (GoSL), Transparency and Accountability.

[1] Address by Professor PLO Lumumba on corruption in Tanzania 2017
[2] Kargbo, A.H. Governance Process in Sierra Leone from 1799-2009. Vancouver, Canada: Write Room Press, 2009
[3] Kargbo, A. H. Post-conflict Governance in Sierra Leone. Vancouver, Canada: Write Room Press 2011
[4] Gabril, Almond & Powell Jr. Comparative Politics Today: A New World View. Boston: Little Brown and Company,1980.
[5] Principles of Transparency and Accountability, The International Standards of Supreme Audit Institutions, ISSAI, Copenhagen K. Denmark

Student Dissertation Database Management System: IMATECH Sierra Leone as a Case Study.

As a big data technological innovation emerges due to man’s continuous use of data, it has prompted an immediate attention that will provide necessary solutions to cope with the current trend of data usability. Universities and colleges process large datasets in trillions of bytes to the extent that the traditional filling system can no longer handle them. Having thousands of students’ dissertations to process will be huge problem using the traditional filling system that requires large physical storage space with lots of inconsistencies, when it comes to processing, analyzing and archiving records is a big challenge, especially checking for plagiarism. Therefore, this research is designed to eliminate the challenges posed by the traditional platform that incurs huge amount of money and time. The proposed scheme is known as “IAMTECH Dissertation Database Management Platform” which is currently in use at the testing stage as an effective solution for proper record keeping and retrieval with minimal cost. The system has proved effective and efficient as compared to the old system. New functionalities are required to be included in the new system in the near future as the need arises due to intensive advancement in the information and data usage

KEYWORDS: IAMTECH, Database Management Platform, Big Data

[1] Abraham Silberschatz, Henry F. Korth, S. Sudarshan. Database System Concepts. 2001, 4th Edn.
[2] Jeffrey A. Hoffer, Mary B. Prescott, Fred R. McFadden, 2002. Modern Database Management. 6th Edn.
[3] http://www.webopedia.com. (Data Download Date: 3 Nisan 2018).
[4] Shimozono K., Itsukiy M., Harasaka Y. and Furukawa Z., (2010), “User Management in an Educational Computer System: Personal Information Management,” Fukuoka, Japan, pp. 1-6.
[5] Connolly, T. M. and C. E. Begg, 2004. Database System: A Practical Approach to Design, Implementation and Management. 4rd Edn., Addison Wesley; ISBN: 10: 0321210255, pp: 1236.
[6] Adams, C., Beath, C. M, Bolan, R., Branin, J., D’Elia, G., Rhode, N. L. & Straub, D. 1991. Issues Relating to the Implementation and Management of an Integrated Information Centre. Journal of the American Society for Information Science.
[7] Adman, P. & Warren, L. 1996. Information systems management: Perspectives for Higher Education. Lancs: Mir Press.
[8] Angell, I. O. & Smithson, S. 1991. Information Systems management: Opportunities and Risks. London: Macmillan Education Ltd.
[9] Association for the Development of Education in African. 2001. Technology as a Management Tool: A New Approach and Implementation. http//www.technologia.org/ [accessed on 23rd May 2011].
[10] Greenwald, R., R. Stackowiak, G. Dodge, D. Klein, B. Shapiro and C. G. Ghelliah, 2005. Professional Oracle Programming. Wrox, ISBN: 10: 0764574825, pp: 790.
[11] Blaha M Rumbaugh 2005 (2nd ed.) Object-Oriented Modeling and Design with UML. [Basically this is the second edition of Rumbaugh et al 1991]. Prentice Hall.
[12] Fry B. G. 1997. The Family Educational Rights and Privacy Act of 1974. In Student Records Management, edited by M Theresa Ruzicka and Beth Lee WeckMulle. London: Greenwood Press, 43-76.
[13] Higgins, J. C. 1976. Information Systems for Planning and Control: Concepts and Cases. London: Edward Arnold.
[14] Husain, K. M. 1977. Information Systems: Basic Concepts, Management Information Systems for Higher Education.
Paris: The Organization for Economic Co-operation and Development.
[15] Gerald, C. O. 2009. Database Management System. Nigeria National Open University.
[16] Kroenke, D. & Hatach, R. 1994. Management Information Systems, 3rd edition. New York: McGraw-Hill.
[17] Tate, M., Evermann, J., Hope, B. & Barnes, S. 2009. Stakeholder Expectations of Service Quality in a University Web Portal. Self-Service in the Internet Age, 1-21.
[18] Telang, R. &Mukhopadhyay, T. 2005. Drivers of Web portal use. Electronic Commerce research and applications, 4, 49- 65.
[19] Maedche, A., Motik, B., Stojanovic, L., Studer, R. &Volz, R. 2003. Ontologies for enterprise knowledge management. IEEE Intelligent Systems, 26-33.

Examining the Effects and Challenges of Cyber Security within the Cyberspace in Sierra Leone.

The use of information is increasing everyday with the advent of more applications of social media platform that utilizes millions of data per second globally. These data include sensitive information such as trade secret, privacy and security issues. Most importantly, some organizations, both private and public use this medium to disseminate messages among colleagues especially in Africa. Also, the emergence of smart-phone has accelerated more problems with having little knowledge on security matters. Furthermore, cyber-crimes use this opportunity to launch more cyber-attacks by invading people’s privacy and steal sensitive information such as credit card details, online shopping information of customers, online ticket booking. Government official’s details have being hacked or eavesdropped over the years when using their smart-phones for communications. Emails of prominent people have also being hacked or disrupted, causing huge financial lose. These attacks are on the increase and therefore, countermeasures are vital to combat cyber-crimes and cyber warfare in this hostile cyberspace. The research study the sociological and technological issues that impact cyber-crime and cyber-security within the boundary of Sierra Leone, as a national security threats. The study provides answers to the issues highlighted in the research. An extensive survey was conducted, which highlighted the need for a robust and proactive approach to mitigate the frequency on which cyber-crime is carried out in the country and its neighbors. Data amassed were subjected to relevant questionnaires issued and collected from the respondents in the state security apparatus, based on the conventional approaches or methods of investing crime in Sierra Leone. The research shows that the state has weak laws regarding cyber-crime and cyber security, and most people working in these departments or agencies have little knowledge in cyber security and cyber-crime. In fact, most are on political appointment rather than on merit-base that supposed to be the right procedure that will accelerate and achieve the goals of these institutions.

KEYWORDS: Cybercrime, Cyber Security, Internet of Thing

[1] Brenner S (2007). Law in an Era of Smart Technology, Oxford: Oxford University Press p. 374.
[2] Longe OB, Chiemeke SC (2008). Cybercrime and criminality in Nigeria – What roles are internet access points in playing? Eur. J. Soc. Sci. 6 (4): 133-139.
[3] Aluko M (2004). 17 ways of stopping financial corruption in Nigeria. www. comcast. net. April 5, 2010.
[4] Erhabor IM (2008). Cybercrime and the Youths (PGDE Thesis), Department of Education, Ambrose Alli University, Ekpoma, Nigeria, p. 37.
[5] Awe J (2004). Nigeria, South Africa, Ghana top Cybercrime in Africa. www. davidajao. com. 25th June 2010.
[6] Yar M (2005). The novelty of cybercrime: An assessment in light of routine activity theory. Eur. J. Criminol. 2 (4): 407427.
[7] Smith RG, Grabosky P, Urbas G (2004). Cyber Criminals on Trial. Cambridge (UK): Cambridge UP.
[8] Maat S (2004). Cybercrime: A Comparative Law Analysis (Doctoral thesis), University of South Africa, Pretoria, South Africa p. 239.
[9] Wall DS (2001). Maintaining order and law on the internet. In: Wall DS (Ed.), Crime and the internet. London: Routledge pp. 167-183.
[10] Sharmila Subudhi, Suvasini Panigraphi (2017). QuarterSphere Support Vector Machine for Fraud Detection in Mobile Telecommunication Networks. December 2015 Procedia Computer Science 48: 353-359. DOI: 10.1016/j.procs.2015.04.193.
[11] Zhao et al (2017). Detecting telecommunication fraud by understanding the contents of a call. DOI: 10.1186/s42400018-0008-5
[12] https://www.researchgate.net/publication/327356991_Detectin g_telecommunication_fraud_by_understanding_the_contents_ of_a_call/fulltext/5b8a6e15299bf1d5a7363752/327356991_D etecting_telecommunication_fraud_by_understanding_the_co ntents_of_a_call.pdf?origin=publication_detail
[14] http://www.au.int/en/sites/default/files/treaties/29560slafrican _union_convention_on_cyber_security_and_personal_data_pr otection.pdf

An Effective Method for e-Medical Data Compression using Wavelet Analysis

The continuous utilization of massive patient data via telecommunication medium is raising a concern either in data transmission speed, storage, security and privacy.  The introduction of Informatization, Internet of Things (IoT), Big Data Technology, etc. and others in e-health require an effective data compression techniques that will help solve the numerous challenges evident in the conventional medical image compression schemes. In order to successfully transmit medical data via the network of networks demands an efficient data compression mechanism without reduction in the image quality with reduced size. This mechanism greatly minimize costs, provides mobility and comfort to the users, increase speed in medical file transmission etc.
The research investigates the various medical image compression platforms so, as to derived with the most efficient and effective scheme. Medical image compression require more proactive scheme that maintains vital features of patients. Several compression methods were applied and Discrete Cosine Transform (DCT) proved to have a superior compression ratio as opposed to Discrete Wavelet Transform (DWT) and Huffman coding. The proposed study indicated that the recovered medical images had similar result compared to the original image data.  Finally, the research mitigated the space storage issue of hard disks, reduce transmission time, improved on patient’s mobility and the high cost of medical hardware devices.

KEYWORDS: Wavelet Transform, Discrete Wavelet Transform (DWT), Discrete Cosine Transform (DCT)

[1] STEPHEN WONG, LOREN ZAREMBA, DAVID GOODEN, AND H. K. HUANG” Radiologic Image Compression-A Review [2] S. Hludov, Chr. Meinel Institut of Telematics,” DICOM – image compression. [3] Shen-Chuan Tai, Yung-Gi Wu, and Chang-Wei Lin” An Adaptive 3-D Discrete Cosine Transform Coder for Medical Image Compression” [4] Gloria Menegaz” Trends in Medical Image Compression” Dept. of Information Engineering, University of Siena, Via Roma 56, I-53100 Siena, Italy [5] M. Nadir Kumaz, Zumray Dohr, Tamer Olmez” COMPRESSION OF THE MR AND ULTRASOUND IMAGES BY USING WAVELET TRANSFORM” Department of Electronics and Communication Engineering, Istanbul Technical University, Istanbul, Turkey [6] Ms. Sonam Malik and Mr. Vikram Verma’ Comparative analysis of DCT, Haar and Daubechies Wavelet for Image Compression’ Student,Deptt. Of Electronics & Communication JMIT / Radaur /India, Assistant Professor ,Deptt. Of I.T. JMIT / Radaur, India [7] DCT-BASED IMAGE COMPRESSION by Vision Research and Image Sciences Laboratory. [8] Andrew B. Watson, NASA Ames Research Center, Image Compression Using the Discrete Cosine Transform, Mathematica Journal, 4(1), 1994, p. 81-88.
[10] Compression of Medical Images Using Wavelet Transforms- Ruchika, Mooninder Singh, Anant Raj Singh [11] M. Antonini, et al.: “Image Coding Using Wavelet Transforms” IEEE Trans. Image Processing, vol. 1, no. 2, pp. 205-220, April 1992. [12] Amir Averbuch, et al.: “Image Compression Using Wavelet Transform and Multiresolution Decomposition”, IEEE Trans. Image Processing; vol. 5, no. 1, pp 4-15, January 1996.

The Role of Cyber Security in Minimizing Crime Rate in Post – War Sierra Leone

There are numerous benefits one can get from using technological innovations ranging from comfort to minimal cost in telecommunications, health, aviation, commerce, energy, agriculture, intelligence, education via Internet and Internet of things (IoT). However, criminals have over the past decade accelerated sophisticated techniques to steal billions of sensitive data from private individuals, government and corporations costing billions of US dollars globally. Therefore, the research provides awareness as to how these Cybercrimes can be mitigated especially within the scope of Sierra Leone. It largely focuses on the establishment of the Cybercrime Unit at the Central Intelligence Department (CID), and the Office of National Security (ONS). Both units were created by an act of Parliament to secure and protect citizen’s personal data against imminent cyber criminals within the confirmed of Sierra Leone. These agencies are able to solve some of the crimes, but yet still there exist unsolved problems. This is because of the lack of many indigenous cyber security experts in the country. Also, the study indicates that the laws governing cybercrimes are too weak to tackle all the numerous issues relating to internet crime.

KEYWORDS: Scientific Support Department (SSD), Cyber Security, Office of the National Security (ONS), Cybercrimes.

[1] Eriksson, Johan & Giacomello, Giampiero (2006), The Information Revolution, Security, and International Relations: (IR) relevant Theory? International Political Science Review vol. 27: 221-244
[2] Compete site comparison. http://siteanalytics.compete.com/ facebook.com+myspace.com+twitter.com/
[3] C. Kanich, N. Weaver, D. McCoy, T. Halvorson, C. Kreibich, K. Levchenko, V. Paxson, G. Voelker, and S. Savage. Show Me the Money: Characterizing Spam-advertised Revenue. USENIX Security Symposium, 2011.
[4] B. Stone-Gross, M. Cova, L. Cavallaro, B. Gilbert, M. Szydlowski, R. Kem- merer, C. Kruegel, and G. Vigna. Your Botnet is My Botnet: Analysis of a Bot- net Takeover. In ACM Conference on Computer and Communications Security (CCS), 2009.
[5] B. Stone-Gross, T. Holz, G. Stringhini, and G. Vigna. The Underground Econ- omy of Spam: A Botmaster’s Perspective of Coordinating Large-Scale Spam Campaigns. In USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), 2011.
[6] N. Provos, P. Mavrommatis, M. A. Rajab, and F. Monrose. All your iFRAMEs point to Us. In USENIX Security Symposium, 2008.
[7] C. Grier, K. Thomas, V. Paxson, and M. Zhang. @spam: the underground on 140 characters or less. In ACM Conference on Computer and Communications Security (CCS), 2010.
[8] K.Thomas,D. McCoy, C. Grier, A. Kolcz, and V. Paxson. Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse. In USENIX Security Symposium, 2013.
[9] Buzan, B. & Hansen, L. (2009), The Evolution of International Security Studies, Cambridge University Press, Cambridge Trends in World Military Expenditure, 2017″ (PDF). Stockholm International Peace Research Institute. Retrieved 2 May 2018.
[10] “Data for all countries from 1988–2017 in constant (2016) USD (pdf)” (PDF). SIPRI. Retrieved 2 May 2018.
[11] Dunn, M. (2003), Securing the Digital Age. In Bombs and Bandwidth: The Emerging Relationship between Information Technology and Security, ed. Robert Latham. New York: The New Press, 85-105.
[12] c5franey. (2011). Disaster Recovery Plan. Retrieved March 21, 2012, from Study Mode: http://www.studymode.com/essays/Disaster-Recovery-Plan-809693.html
[13] T. Jagatic, N. Johnson, M. Jakobsson, and T. Jagatif. Social phishing. Commu- nications of the ACM, 2007.
[14] L. Bilge, T. Strufe, D. Balzarotti, and E. Kirda. All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks. In World Wide Web Conference (WWW), 2009.
[15] G. Stringhini, O. Hohlfeld, C. Kruegel, and G. Vigna. The harvester, the botmaster, and the spammer: On the relations between the different actors in the spam landscape. In ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2014.
[16] Lewis, James A. (2014). “National Perceptions of Cyber Threats”. Strategic Analysis, Vol. 38, No. 4
[17] Ibid., 567
[18] Singer & Friedman, 39
[19] Visit report, Sierra Leone Security and Intelligence Service Reform, September 1999.
[20] Hart, Catherine (2011), Mobilizing the Cyberspace Race: the Securitization of the Internet and its Implications for Civil Liberties, Cyber-Surveillance in Everyday Life: An International Workshop, May 12-15, 2011, University of Toronto

Assessing Employees' Motivation in Tertiary Educational Institutions in Sierra Leone: Institution of Advanced Management and Technology (IAMTECH) and Njala University (NU)

Employee motivation is a key element that subsequently achieve organizational blueprint in modern day of organizational operations. On this ground, the researchers assess employees’ motivation in tertiary educational institutions in Sierra Leone. It covers the Institute of Advanced Management and Technology (IAMTECH) and its affiliate institution, Njala University (NU). Differences were drawn between these two institutions, as IAMTECH is private and NU public. Motivation is necessary for effective and efficient organizational dynamism such as room for growth, development, health work environment, feeling of belonging, and achievement of organizational objectives. Motivated employees dedicate their energies and skills to their jobs, thereby implementing and attaining the organizational policies and blueprints. This enhances workplace ethics and accelerates employee motivation and performance in tertiary educational institutions in Sierra Leone. It clearly states that motivation is not only giving financial incentives and rewards, but also makes employees’ feel as if they are part of the organization success. It is evident in the research that, applying effective employees’ motivation either moral or financial helps achieve organizational objectives in both public and private sectors in Sierra Leone. However, there are some constrains in achieving the ultimate goal of the research, as most heads and decision makers in these institutions lack the required skills to motivate employees’ performance in this 19th century culturally society in the west coast of Africa. Therefore, the researchers created room for more innovative techniques that will definitely yield maximal employees’ motivation in tertiary educational institutions in Sierra Leone.

KEYWORDS: Feedback, Theory, HRM, Performance Appraisal System; Prejudice, Perception 

[1] Nelson, D.L. and Quick, J.C. (2003), Organizational Behaviour: Foundation, Realities and Challenges (4th ed.), Australia: Thomson South-Western. 
[2] Arif, M.H. (2003). Human Development and Learning. Majeed Book Depot, Lahore, Pakistan. Pp.163-180.
[3] Robbins, P. Stephen and Decenzo A. David (2008). Fundamentals of Management: Essential Concept and Application (6th edition) Pearson: U.S.A
[4] Lewis, P. S., Goodman, S. H., & Fandt, P. M. (1995).Management: Challenges in the 21stCentury.New York: West Publishing Company.
[5] Akinfolarin, C. A. (2008). Resource utilization in Vocational and Technical Education in Colleges of Education in South-West Nigeria. Unpublished Ph.D Thesis. University of Ado-Ekiti, Ado-Ekiti.
[6] Muhammad (2010). Motivational Issues for Teachers in Higher Education: A Critical Case of IUB Journal of Management Research ISSN 1941-899X 2010, Vol. 2, No. 2: E3
[7] Aluko M.A. (2002): “Assessing State and Universities in Nigeria.” Conference Paper on Brain Drain in Nigeria. Nicon- Hilton Abuja.
[8] Filak, V. F. (2003). Student Psychological Need Satisfaction and College TeacherCourse Evaluations. Educational Psychology , 23(3), 235-247
[9] Photanan, T. (2004). Human Resource Focus. Bangkok: Innographics Ltd.
[10] Memmott, L., & Growers, S. (March 12& 13,2002). Retaining and motivating employees.
[11] Lee, H. and Yu, C. (2010). Effect of relation style on innovation performance. African Journal of Business Management, 4(9), 1703-1708.
[12] Shanks, Nancy H. “Chapter 2.”Management and Motivation. Jones and Barlett.23-35. Print.
[13] Bandele, S. O. (2003). The Universal Basic Education in Perspective, Need for Formative Evaluation. Nigeria. Journal of Educational Research and Evaluation, 1(4), 54-56.

Technical Paper Publication


Success in Mathematics

Basic Computing: An Integral Component of our Everyday Life

ISBN-13: 978-613-8-93197-3
ISBN-10: 6138931971

Thesis Published

A Master Thesis
Topic: DWT Based Image Compression for Health Systems

DOI: 10.13140/RG.2.2.28339.48162
ISSN: 2208-2425

Ph.D Thesis
Topic: The Role of Cyber Security in Minimizing Online Crime Rate in Postwar Sierra Leone: Office of the National Security (ONS), and the Cybercrime Unit at the Criminal Investigation Department (CID)-Ph.D.

Short Articles

Once upon a time in Asia

My Dream Come True

Theses Unpublished


Sierra Leone Freetown