Abstract
Disasters in developing nations are typically caused by frequent and intense climate changes, which contribute to the socio-economic vulnerabilities of such nations. It is important to be strategic in the management of disasters in such regions in order to minimize their impact on thriving communities. There is therefore the need for effective disaster response that allows for access, analysis, and integration of information from varied sources. This Chapter presents architecture for managing knowledge on disaster in Sub-Saharan African nations. This architecture captures the critical contextual variables using process view of knowledge management to assist citizens who are less knowledgeable about disaster management to understand the various forms of knowledge on disaster response while developing extensive knowledge and building capability necessary to address disaster response and management. It also addresses issues with building IT expertise on disaster response in developing nations. More importantly, the architecture facilitates the creation, storage/retrieval, transfer, and application of knowledge on disaster response and management especially for ordinary citizens. The architecture also helps overcome issues with lack of collaboration and coordination across disaster response and management agencies.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Akuta, E. A.-M., Ong’oa, I. M., & Jones, C. R. (2011). Combating cyber crime in Sub-Sahara Africa; a discourse on law, policy and practice. Journal of Peace, Gender and Development Studies, 1(4), 129–137.
Alavi, M., & Leidner, D. (1999). Knowledge management systems: Emerging views and practices from the field. Communications of the AIS, 1(5), 1–37.
Alavi, M., & Leidner, D. E. (2001). Review: Knowledge management and knowledge management systems: Conceptual foundations and research issues. MIS Quarterly, 25(1), 107–136.
Allen, K. (2006). Community-based disaster preparedness and climate change adaptation: Local capacity building in the Philippines. Disasters, 30(1), 81–101.
Andoh-Baidoo, F. K., & Osatuyi, B. (2009). Examining online banking initiatives in Nigeria: A value network approach. Electronic Journal of Information Systems in Developing Countries, 1(38), 1–14.
Apikul, C. (2010). Overview. ICT for disaster risk reduction (pp. 9–50). Incheon City, Republic of Korea: APCICT.
Atsu, Y. M., Andoh-Baidoo, F. K., Osatuyi, B., & Amoako-Gyampah, K. (2010). An exploratory study of the contextual factors that influence success of ICT projects in developing nations: A case study of a telecommunications company in Ghana. Journal of Information Technology Case and Application Research, 3(12), 56–81.
Baker, W. E., Sciglimpaglia, D., & Saghaffi, M. (2010). Branding of post-purchase ancillary products and services: An application in the mobile communications industry. European Journal of Marketing, 44(5), 547–566.
Beugré, C. D. (2002). Understanding organizational justice and its impact on managing employees: An African perspective. The International Journal of Human Resource Management, 13(7), 1091–1104.
Blunt, P., & Jones, M. L. (1997). Exploring the limits of Western leadership theory in East Asia and Africa. Personnel Review, 26(1/2), 6–23.
Boateng, V. (2009). Electronic/mobile government in Africa: Building capacity in knowledge management through partnership. In U. N. P. A. Network (Ed.), UN public administration programme. Addis Ababa, Ethiopia: United Nations Public Administration Network.
Boateng, R., Olumide, L., Isabalija, R. S., & Budu, J. (2011). Sakawa—Cybercrime and criminality in Ghana. Journal of Information Technology Impact, 11(2), 85–100.
Cheah, Y. N., & Abidi, S. S. R. (1999). Tacit knowledge creation in a knowledge management context. In Fourteenth International Symposium on Computer and Information Sciences, Kusadasi, Turkey.
Christoplos, I., Mitchell, J., & Liljelund, A. (2001). The changing context of disaster mitigation and preparedness. Disaster, 25(3), 185–198.
Coyle, D., & Meier, P. (2009). New technologies in emergencies and conflict. The role of information and social networks. Washington, DC: UN Foundation-Vodafone Foundation Partnership.
D’arcy, J., Hovav, A., & Galletta, D. (2009). User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach. Information Systems Research, 20(1), 79–98.
Danquah, P., & Longe, O. B. (2011). An empirical test of the space transition theory of cyber criminality: Investigating cybercrime causation factors in Ghana. African Journal of Computing & ICT, 2(1), 37–48.
Denning, P. J. (2006). Hastily formed networks. Communications of the ACM, 49(4), 15–20.
Dinev, T., Goo, J., Hu, Q., & Nam, K. (2009). User behaviour towards protective information technologies: The role of national cultural differences. Information Systems Journal, 19(4), 391–412.
Drabek, T. E., & Key, W. H. (1976). The Impact of Disasters on Primary Groups Mass Emergencies, 1, 89–105.
European Network and Information Security Agency. (2006). A users’ guide: How to raise information security awareness. e ENISA. Retrieved from http://www.enisa.europa.eu/act/ar/deliverables/2006/ar-guide/en
Foster, W., Goodman, S., Osiakwan, E., & Bernstein, A. (2004). Global diffusion of the internet IV: The internet in Ghana. Communications of the AIS, 13, 47.
Furnell, S., Valleria, T., & Phippen, D. (2008). Security beliefs and barriers for novice internet users. Computers & Security, 27, 235–240.
Goldman, G. (1990). The tacit dimension of clinical judgment. The Yale Journal of Biology and Medicine, 63(1), 47–61.
Grant, R. M. (1996). Toward a knowledge-based theory of the firm. Strategic Management Journal, 17, 109–122.
Grant, E., & Gregory, M. (1997). Tacit knowledge, the life cycle and international manufacturing transfer. Technology Analysis & Strategic Management, 9(2), 149–161.
Hay, R. (1986). Food aid and relief-development strategies. Disasters: Relief-Development Strategies of Africa, 10(4), 273–287.
Hewitt, K. (1983). The idea of calamity in a technocratic age. In K. Hewitt (Ed.), Interpretations of calamity (pp. 3–32). London, England: Unwin-Hyman.
Hofstede, G. (1980). Culture’s consequences: International differences in work related values. London, England: Sage Publishing.
Hofstede, G. (1983). The cultural relativity of organizational practices and theories. Journal of International Business Studies, 14, 75–89.
Hofstede, G. (1984). The cultural relativity of the quality of life concept. The Academy of Management Review, 9(3), 389–398.
Hofstede, G. (1993). Cultural constraints in management theories. The Executive, 7(1), 81–94.
Howells, J. (1995). Tacit knowledge and technology transfer. Cambridge, England: University of Cambridge.
IFRC. (2009). World disasters report. Focus on early warning, early action. Geneva, Switzerland: IFRC.
Kalas, P., & Finlay, A. (Eds.). (2009). Planting the knowledge seed. Adapting to climate change using ICTs. Geneva, Switzerland: BCO.
Kritzinger, E., & von Solms, S. H. (2010). Cyber security for home users: A new way of protection through awareness enforcement. Computers & Security, 29, 840–847.
Kumar, R. M. L., Park, S., & Subramaniam, C. (2008). Understanding the value of countermeasure portfolios in information systems security. Journal of Management Information Systems, 25(2), 241–280.
Mirza, M. Q. (2003). Climate change and extreme weather events: Can developing countries adapt? Climate Policy, 3(3).
Moses-Òkè, R. O. (2012). Cyber capacity without cyber security: A case study of Nigeria’s national policy for information technology (NPFIT). The Journal of Philosophy, Science & Law, 12, 1–14.
Muriithi, N., & Crawford, L. (2003). Approaches to project management in Africa: Implications for international development projects. International Journal of Project Management, 21(5), 309–319.
Ngwenyama, O., Andoh-Baidoo, F. K., Bollou, R., & Morawczynski, O. (2006). Is there a relationship between ICT, health, education and development? An empirical analysis of five West African countries from 1997-2003. The Electronic Journal on Information Systems in Developing Countries, 26(5), 1–11.
Nogueira, J. H. M., & De Vasconcelos, W. W. P. (2007). Ontology for complex mission scenarios in forensic computing. In 2nd International Conference of Forensic Computer Science, Guarujá, Brazil.
Nonaka, I., Takeuchi, H., & Umemoto, K. (1996). A theory of organizational knowledge creation. International Journal of Technology Management, 11(7–8), 833–845.
O’Leary, D. E. (1998). Using AI in knowledge management: Knowledge bases and ontologies. IEEE Intelligent Systems and their Applications, 13(3), 34–39.
Ospina, A. V., & Heeks, R. (2010). Unveiling the links between ICTs and climate change in developing countries: A scoping study. Centre for Development Informatics, Institute for Development Policy and Management, SED. Retrieved from http://www.manchester.ac.uk/cdi
Paton, D., & Johnson, D. (2001). Disasters and communities: Vulnerability, resilience and preparedness. Disaster Prevention and Management, 10(4), 270–277.
Pylyshyn, Z. W. (1981). The imagery debate—Analog media versus tacit knowledge. Psychological Review, 88(1), 16–45.
Quarantelli, E. L. (1989). Conceptualizing disasters from a sociological perspective. International Journal of Mass Emergencies and Disasters, 7(3), 243–251.
Quarantelli, E. L. (1998). Major criteria for judging disaster planning and managing and their applicability in developing countries. Paper presented at the International Seminar on the Quality of Life and Environmental Risks, 10–11 October, Rio de Janeiro, Brazil.
Ross, J., Maxwell, S., & Buchanan-Smith, M. (1994). Linking relief and development. Discussion paper. Sussex, England: Institute of Development Studies.
Roztocki, N., & Weistroffer, H. R. (2011). Information technology success factors and models in developing and emerging economies. Information Technology for Development, 17(3), 163–167.
Siddiqui, S. (2008). Post disaster rehabilitation of livelihoods in the upper Siran valley of Pakistan after the earthquake. Guelph, Ontario, Canada: MSc University of Guelph.
Stein, E. W., & Zwass, V. (1995). Actualizing organizational memory with information systems. Information Systems Research, 6(2), 85–117.
Tan, S. S., Teo, H. H., Tan, B. C., & Wei, K. K. (1998). Developing a preliminary framework for knowledge management in organizations. In E. Hoadley, & I. Benbasat (Eds.), Fourth Americas Conference on Information Systems (pp. 629–631), Baltimore, MD.
Tobin, G. A. (1999). Sustainability and community resilience: The holy grail of hazards planning? Environmental Hazards, 1, 13–25.
UNESCAP. (2008). Information and communication technology-enabled disaster risk reduction in Asia and the Pacific. Bangkok, Thailand: UNESCAP.
Uschold, M., & Gruninger, M. (1996). Ontologies: Principles, methods and applications. Knowledge Engineering Review, 11, 96–137.
Walsh, J. P., & Ungson, G. R. (1991). Organization memory. Academy of Management Review, 16(1), 57–91.
Wisner, B., Blaikie, P., Cannon, T., & Davis, I. (2003). At risk. Natural hazards, people’s vulnerability and disasters. London, England: Routledge.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer Science+Business Media New York
About this chapter
Cite this chapter
Osatuyi, B., Andoh-Baidoo, F.K. (2014). Towards a Community-Centered Knowledge Management Architecture for Disaster Management in Sub-Saharan Africa. In: Osei-Bryson, KM., Mansingh, G., Rao, L. (eds) Knowledge Management for Development. Integrated Series in Information Systems, vol 35. Springer, Boston, MA. https://doi.org/10.1007/978-1-4899-7392-4_2
Download citation
DOI: https://doi.org/10.1007/978-1-4899-7392-4_2
Published:
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4899-7391-7
Online ISBN: 978-1-4899-7392-4
eBook Packages: Business and EconomicsBusiness and Management (R0)