Exploring Cybercrime: An Emerging Phenomenon and Associated Challenges in Africa
Abstract
This study traces the emergence, highlights the trends, strategies and associated challenges of policing cybercrime in Africa. The researcher also displayed the evolving complexities and escalations of related criminal activities. This qualitative study employed a non-empirical research design: Systematic review methodology to analyse grey literature and primary research studies peer-reviewed and published, restricted from 2002-2021, with non-sequential preference adoption considered. The Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) and Critical Appraisal Skill Programme (CASP) were employed to ensure the trustworthiness of the findings of this study based on reviewed conventional and seminal literature studies on this subject. This study revealed that for a long time in Africa, this crime existed and remains uncoded; however, relevant stakeholders paid limited attention in terms of offering strategies to effectively prevent, combat and investigate this crime, while the documented nature, effects and effects were at maximum scale. Moreover, the associated challenges for policing cybercrime in Africa are currently uncontrollable, as this crime is presently rising beyond unacceptable levels in the cited African countries. The opportunistic organised criminal networks are taking advantage of these existing loopholes. This study concludes and recommends that African countries should realise the importance of efficiently responding to this scourge in the affected countries, the envisaged strategies should be geared towards the African landscape, within a larger global context, while strongly introducing the use of technological advances and improvements, among others. This can aid in the correct usage of computers; staging of the database system; proper facilitation of cybercrime trends; and, surveillance, to eradicate increasing incidences of this crime in African countries. The relevant stakeholders should have access to, and share, information, irrespective of African geographical locations.
References
Adams, A. (2013). Cybercrime puts the drugs business in the shade. Without Prejudice Forensics, December, 28-29.
Atta-Asamoah, A. (2009). Understanding the West African cybercrime process. Africa Security Review, Institute of Security Studies, 18 (4), 106-114.
Baken, DN & Mantzikos, I. (2012). The cyber terrorism shadow networks in Africa: AQIM and Boko Haram. African Renaissance, 9(1), 27‐45.
Basdeo, VM., Montesh, M & Lekubu, BK. (2014). Search for and seizure of evidence in cyber environments: a law-enforcement dilemma in South African criminal procedure. 2014. Journal of Law, Society and Development, 1(1), 48-67.
Bob-Felton, FE. (2006). Automation outlook - Cyber security breaches threaten, smarter factories and engineering talent base. Siviele Ingenieurswese, Januarie 2006, 26-28.
Budhram, T & Geldenhuys, N. (2017). A losing battle? Assessing the detection rate of commercial crime. South African Crime Quarterly No. 61, September, 7-18.
Bwanga, O. (2020). How to conduct a qualitative systematic review to guide evidence-based practice in Radiography? International Journal of Sciences: Basic and Applied Research, 52 (1):205-213.
Cassim, F. (2010). Addressing the challenges posed by cybercrime: A South African perspective. Journal of International Commercial Law and Technology, 5 (3), 118-123.
Cassim, F. (2011). Addressing the growing spectre of cybercrime in Africa: evaluating measures adopted by South Africa and other regional role players. Paper presented at the First International Conference of the South Asian Society of Criminology and Victimology at Jaipur, India, 15-17 January, 123-138.
Cassim, F. (2012). Addressing the spectre of cyber terrorism: a comparative perspective. Potchefstroom Electronic Law Journal, 15(2), 381-415.
Correia, R. (2011). Angola’s cyber overkill. Media Freedom, Rhodes Journalism Review No. 31, 69-70.
Crane, C. (2019). 33 Alarming Cybercrime Statistics You Should Know in 2019. Retrieved from: https://www.thesslstore.com/blog/33-alarming-cybercrime-statistics-you-should-know/.
Curtin, K. (2019). Cyber Risk 101: What every business needs to know? Risk, 31 January, 26.
Cyber risk [Online]. (2015). Cyber risk and regulation rank as top risks for insurers. Retrieved from: https://www.pwc.co.za/en/press-room/cyber-risk-and-regulation-rank-as-top-risks-for-insurers.html.\
Dan, V. (2017). Empirical and non-empirical methods. Retrieved from: https://www.ls1.ifkw.uni-muenchen.de/personen/wiss_ma/dan_viorela/ .... accessed on 08 August 2021.
Davies, W. (2018). Short cuts. London Review of Books, 5 April, 40 (7): 20-21.
Desai, A. (2018). Cybercrime, cyber surveillance and state surveillance in South Africa. Acta Criminologica: Southern African Journal of Criminology, Special Edition: Cybercrime, 31(3), 149-160.
Dlamini, S & Mbambo, C. (2019). Understanding policing of cybercrime in South Africa: The phenomena, challenges and effective responses Cogent Social Sciences, 5: 1675404.
Ezeji, CL., Olutola, AA & Bello, PO. (2018). Cyber-related crime in South Africa: extent and perspectives of state’s roleplayers. Acta Criminologica: Southern African Journal of Criminology Special Edition: Cybercrime, 31(3), 93-110.
Food Review. (2018). Breaches in cyber security. Plant Security and Software, February, 23.
Goga, K. (2014). Taking stock of the last 20 years - Responses to organised crime in a democratic South Africa. South African Crime Quarterly No. 48, June, 63-73.
Govender, D. (2012). Information management strategies to combat crime and prevent losses. Acta Criminologica Southern African Journal of Criminology, 25(1), 79-96.
Halder, D & Jaishankar, K. (2011). Cyber-crime and the victimisation of women. Carnegie, United Kingdom: IPR/Business books.
International Criminal Police Organisation (INTERPOL). (2021). African cyberthreat assessment report: INTERPOL’s key insight into cybercrime in Africa. Singapore: International Police.
Jansen, JH. 2002. A new era for e-commerce in South Africa. De Rebus, October, 17-21.
Jegede, AE., Olowookere, EI & Elegbeleye, AO. (2016). Youth identity, peer influence and internet crime participation in Nigeria: A Reflection. Ife PsychologIA, 24(1), 37-47.
Kader, S & Minaar, A. (2015). Cybercrime investigations: Cyber-process for detecting cybercriminal activities, cyber-intelligence and evidence gathering. Acta Criminologica: Southern African Journal of Criminology Special Edition No 5/2015: Criminology in democratic South Africa: Coming of age, 4(6), 123–134.
Kortjan, N & von Solms, R. (2014). A conceptual framework for cyber-security awareness and education in SA. SACJ No. 52, July, 29-41.
Kritzinger, E. (2019). Cyber safety for all school learners. Servamus Community-based Safety and Security Magazine, October, 27-29.
Kritzinger, E & von Solms, SH. (2012). A Framework for cyber security in Africa. Journal of Information Assurance and Cybersecurity, 1-10.
Kshetri, N. (2019). Cybercrime and Cybersecurity in Africa. Journal of Global Information Technology Management, 22(2), 77-81.
Kshetri, N. (2010). Diffusion and effects of cyber-crime in developing economies. Third World Quarterly, 31 (7), 1057-1079.
Lautier, J. (2013). Southern Africa and cyber security. Africa Conflict Monthly Monitor, Consultancy Africa Intelligence (Pty) Ltd: Braamfontein, Johannesburg.
Liquid Cyber Security [Online]. (2021). The evolving cyber Security threat in Africa: IT and financial decision makers respond to critical developments in South Africa, Kenya and Zimbabwe. Retrieved from: https://liquid.tech/wps/wcm/connect/corp/00d614b5-e6cf-4552-9085_c12e47b6246c ...
Lucks, BD. (2004). Cyberstalking: Identifying and examining electronic crime in cyberspace. Unpublished Doctor of Philosophy Thesis. California: Alliant International University.
Maluleke, W. (2020). The African scare of Fall Armyworm: Are South African farmers immune? International Journal of Social Sciences and Humanity Studies, 12 (1), 207-221.
Mangena, D. (2016). Will legislation protect your virtual space? Discussing the draft cybercrime and cyber security bill. De Rebus – January/February, 33-34.
Mbanaso, UM. (2016). Cyber warfare: African research must address emerging reality. The African Journal of Information and Communication, 18, 157-164.
Moneyweb’s Personal Finance. (2006). Technology – Beware of cyber-crooks. 10 August, 10-11.
Mpuru, L. (2017). Cyber security concerns in South Africa: Current legislative framework. Servamus, December, 44-45.
Nnanwube, EF. Ani, KJ & Ojakorotu, V. (2019). Emerging issues around cybercrimes in Nigeria. Ubuntu: Journal of Conflict and Social Transformation Special Issue, March, 55-71.
Olayemi, OJ. (2014). A socio-technological analysis of cybercrime and cyber security in Nigeria. International Journal of Sociology and Anthropology. 6(3), 116-125.
Quarshie, HO & Martin- Odoom, A. (2012). Fighting cybercrime in Africa. Computer Science and Engineering, 2(6): 98-100.
Rossouw, A. (2010). Cyber crooks crack the code. Occupational Risk - Safety, June, 4-5.
Schell, BH & Martin, C. 2004. Cybercrime: A reference book. California: ABC-Clio.
SciDev.Net [Online]. (2020). Cybercrime in Africa: Facts and figures. Retrieved from: https://www.scidev.net/sub-saharan-africa/icts/feature/cybercrime-africa-facts-figures.html?__cf_chl_jschl_tk_ …
Siljeur, N. (2016). Protecting children against cyber-sex in South Africa. Child Abuse Research: A South African Journal, 17(2):95-102.
Sissing, S & Prinsloo, J. (2013). Contextualising the phenomenon of cyber stalking and protection from harassment in Aouth Africa. Acta Criminologica: Southern African Journal of Criminology, 26(2), 15-29.
Snail, S. (2015). Cybercrime in the context of the ECT Act - Hacking, cracking, and other unlawful online activities. Volume 16 Part 2, 63-69.
Snail, SL & Matanzima, S. (2014). Cyber security in Africa. Without Prejudice Cyber law, October, 88-89.
South African Banking Risk Information Centre. (2020). Banking-related crime and how to respond to it. Servamus Community-based Safety and Security Magazine, February, 55.
Van Niekerk, B. (2017). An analysis of cyber-incidents in South Africa. The African Journal of Information and Communication (AJIC), 20 (1), 113-132.
Visser, B. (2015). Cyber security risks – just as relevant locally as internationally. Retrieved from: https://www.psg.co.za/news/cyber-security-risks.
Widsup, S., Spitter, M., Hylender, D., & Basset, G. (2018). Verizon data breach. Investigations report. Retrieved from: https/www.researchgate.net.publication/32445340_2018-verizon-data-breach-investigationreport.
Yannascoli, S.M., Schenker, M.I and Baldwin, K. (2013). How to write a systematic review: A step-by-step guide? Retrieved from: https://www.semanticscholar.org/paper ... accessed on 10 November 2021.
Yingying, X & Zhengqing, Y. (2016). A primary exploration on cyber security governance in Africa. West Asia and Africa, 03: 121-137.
Young, R. (2016). Cyber security today and beyond. Human Resources Future Net - Digital cyber security, 32-33.
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Copyright for this article is retained by the author(s), with first publication rights granted to the journal. This is an open-access article distributed under the terms and conditions of the Creative Commons Attribution license (https://creativecommons.org/licenses/by-nc-nd/4.0/).