The primary contribution of this study was the 
designing and validation of an African information 
security awareness and compliance model.  
Fundamentally, this model and its theoretical 
foundations extended the body of existing knowledge 
and also assisted in proving that indeed an African 
philosophy based awareness campaign will produce 
better results in Africa as compared to the Western 
philosophy based.   
ACKNOWLEDGEMENTS 
I would like to thank ABSA bank for a research grant 
that made this research possible. 
REFERENCES 
Afro-centric Alliance, A. (2001). Indigenising organisational 
change: Localisation in Tanzania and Malawi. Journal of 
Managerial Psychology, 16(1), 59–78. 
Ajzen, I. (2011). The theory of planned behaviour: 
Reactions and reflections. Taylor & Francis. 
Allam, S., Flowerday, S. V., & Flowerday, E. (2014). 
Smartphone information security awareness: A victim of 
operational pressures. Computers & Security, 42, 56–65. 
Alshboul, Y., & Streff, K. (2017). Beyond Cybersecurity 
Awareness: Antecedents and Satisfaction. Proceedings 
of the 2017 International Conference on Software and 
E-Business, 85–91. https://doi.org/10.1145/3178212. 
3178218 
Bauer, S., Bernroider, E. W. N., & Chudzikowski, K. 
(2017). Prevention is better than cure! Designing 
information security awareness programs to overcome 
users’ non-compliance with information security 
policies in banks. Computers & Security, 68, 145–159. 
https://doi.org/10.1016/j.cose.2017.04.009 
Broodryk, J. (2005). Ubuntu management philosophy: 
Exporting ancient African wisdom into the global 
world. Knowres Publishing. 
Chitumba, W. (2013). University education for personhood 
through ubuntu philosophy. International Journal of 
Asian Social Science, 3(5), 1268–1276. 
Chua, H. N., Wong, S. F., Low, Y. C., & Chang, Y. (2018). 
Impact of employees’ demographic characteristics on 
the awareness and compliance of information security 
policy in organizations. Telematics and Informatics, 
35(6), 1770–1780. https://doi.org/10.1016/j.tele.2018. 
05.005 
Davison, R., Martinsons, M. G., & Kock, N. (2004). 
Principles of canonical action research. Information 
Systems Journal, 14(1), 65–86. 
Dearden, J., & Miller, A. (2006). Effective multi-agency 
working: A grounded theory of ‘high profile’ casework 
that resulted in a positive outcome for a young person 
in public care. Educational and Child Psychology, 
23(4), 91–103. https://doi.org/10.4314/sajpem.v26i4. 
31495 
Fraser-Moleketi, G. (2009). Towards a common 
understanding of corruption in Africa. Public Policy 
and Administration, 24(3), 331–338. 
Gianan, N. (2011). Delving into the ethical dimension of 
Ubuntu philosophy. Cultura, 8(1), 63–82. 
Gianan, N. A. (2010). Valuing the emergence of Ubuntu 
philosophy.  Cultura International Journal of 
Philosophy of Culture and Axiology, 7(1), 86–96. 
Gundu, T. (2019a). Acknowledging and Reducing the 
Knowing and Doing gap in Employee Cybersecurity 
Compliance—ProQuest.  International Conference on 
Cyber Warfare and Security
. Presented at the 
International Conference on Cyber Warfare and Security, 
Stellenbosch. Retrieved from https://search.proquest. 
com/openview/e99648655450412b824882dd31b16e8b/
1?pq-origsite=gscholar&cbl=396500 
Gundu, T. (2019b). Big Data, Big Security, and Privacy 
Risks: Bridging Employee Knowledge and Actions 
Gap | Journal of Information Warfare. Journal of 
Information Warfare, 18(2), 15–30. 
Gundu, T., Maronga, M., & Boucher, D. (2019). Industry 
4.0 Businesses Environments: Fostering Cyber Security 
Culture in a Culturally Diverse workplace. Kalpa 
Publications in Computing,  12, 85–94. 
https://doi.org/10.29007/r64x 
Gundu, T., & Maronga, V. (2019). IoT Security and 
Privacy: Turning on the Human Firewall in Smart 
Farming.  Kalpa Publications in Computing,  12, 95–
104. https://doi.org/10.29007/j2z7 
Herath, T., & Rao, H. R. (2009). Encouraging information 
security behaviors in organizations: Role of penalties, 
pressures and perceived effectiveness. Decision 
Support Systems, 47(2), 154–165. 
Ifinedo, P. (2014). Information systems security policy 
compliance: An empirical study of the effects of 
socialisation, influence, and cognition. Information & 
Management, 51(1), 69–79. 
Khomba, J. K., & Kangaude-Ulaya, E. C. (2013). 
Indigenisation of corporate strategies in Africa: 
Lessons from the African ubuntu philosophy. China-
USA Business Review, 12(7). 
Kruger, H. A., & Kearney, W. D. (2005). Measuring 
information security awareness: A West Africa gold 
mining environment case study. 
Mangaliso, M. P., Mangaliso, Z., Knipes, B. J., Jean-Denis, 
H., & Ndanga, L. (2018). Invoking Ubuntu Philosophy 
as a Source of Harmonious Organizational 
Management.  Academy of Management Proceedings, 
2018(1), 15007. https://doi.org/10.5465/AMBPP.2018. 
15007abstract 
McCormac, A., Calic, D., Parsons, K., Butavicius, M., 
Pattinson, M., & Lillie, M. (2018). The effect of 
resilience and job stress on information security 
awareness. Information and Computer Security, 26(3), 
277–289. https://doi.org/10.1108/ICS-03-2018-0032 
Moorman, R. H., & Blakely, G. L. (1995). Individualism-
collectivism as an individual difference predictor of 
organizational citizenship behavior. Journal of