User:Ngwanaelisha/Choose an Article

Article Selection
Please list articles that you're considering for your Wikipedia assignment below. Begin to critique these articles and find relevant sources.

Option 1

 * Article title: "Bridging Africa's digital divide" (NEW)
 * Article Evaluation: Think tank, UN, peer-review and US policy articles focusing on bridging Africa's digital divide
 * Sources
 * Gebremichael, M. D., & Jackson, J. W. (2006). Bridging the gap in Sub-Saharan Africa: A holistic look at information poverty and the region's digital divide. Government Information Quarterly, 23(2), 267-280.
 * Lavery, M. P., Abadi, M. M., Bauer, R., Brambilla, G., Cheng, L., Cox, M. A., ... & Forbes, A. (2018). Tackling Africa’s digital divide. Nature Photonics, 12(5), 249-252.
 * Mutula, S. M. (2008). Digital divide and economic development: case study of sub‐Saharan Africa. The Electronic Library.
 * Igun, S. E. (2011). Bridging of digital divide in Africa. International Journal of Information and Communication Technology Education (IJICTE), 7(1), 11-20.
 * Mutula, S. M. (2008). Digital divide and economic development: case study of sub‐Saharan Africa. The Electronic Library.
 * Igun, S. E. (2011). Bridging of digital divide in Africa. International Journal of Information and Communication Technology Education (IJICTE), 7(1), 11-20.

Option 2

 * Article title: "Ransomware as a Service" (RaaS)
 * Article Evaluation: The evolution of ransomware attacks whereby less tech-savvy individuals can purchase and deploy plug-and-play ready-made ransomware software.
 * Sources
 * Meland, P. H., Bayoumy, Y. F. F., & Sindre, G. (2020). The Ransomware-as-a-Service economy within the darknet. Computers & Security, 92, 101762.
 * Karapapas, C., Pittaras, I., Fotiou, N., & Polyzos, G. C. (2020, May). Ransomware as a Service using Smart Contracts and IPFS. In 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC) (pp. 1-5). IEEE.
 * Tuttle, H. (2016). Ransomware attacks pose growing threat. Risk Management, 63(4), 4.
 * Salvi, M. H. U., & Kerkar, M. R. V. (2016). Ransomware: A cyber extortion. Asian journal for convergence in technology (ajct), 2.
 * Tuttle, H. (2016). Ransomware attacks pose growing threat. Risk Management, 63(4), 4.
 * Salvi, M. H. U., & Kerkar, M. R. V. (2016). Ransomware: A cyber extortion. Asian journal for convergence in technology (ajct), 2.

Option 3

 * Article title: "Cybercrimes and National Security impacts"
 * Article Evaluation: Analyze how cybercrimes impact our daily lives, regional and national security.
 * Sources
 * Tabansky, L. (2012). Cybercrime: A national security issue?. Military and Strategic Affairs, 4(3), 117-136.
 * Brewster, B., Kemp, B., Galehbakhtiari, S., & Akhgar, B. (2015). Cybercrime: attack motivations and implications for big data and national security. In Application of Big Data for National Security (pp. 108-127). Butterworth-Heinemann.
 * Tropina, T. (2015). Public–private collaboration: Cybercrime, cybersecurity and national security. In Self-and co-regulation in Cybercrime, cybersecurity and national security (pp. 1-41). Springer, Cham.
 * Grabosky, P. (2015). Organized cybercrime and national security. In Cybercrime Risks and Responses (pp. 67-80). Palgrave Macmillan, London.
 * Tropina, T. (2015). Public–private collaboration: Cybercrime, cybersecurity and national security. In Self-and co-regulation in Cybercrime, cybersecurity and national security (pp. 1-41). Springer, Cham.
 * Grabosky, P. (2015). Organized cybercrime and national security. In Cybercrime Risks and Responses (pp. 67-80). Palgrave Macmillan, London.

Option 4:

 * Article title
 * Article Evaluation
 * Sources
 * Sources
 * Sources

Option 5

 * Article title
 * Article Evaluation
 * Sources
 * Sources
 * Sources