Cybersecurity as a response to combating cybercrime

Demystifying the prevailing threats and offering recommendations to the African regions

Authors

  • Mandlenkosi Richard Mphatheni
  • Witness Maluleke Senior lecturer, Dr, Department of Criminology and Criminal Justice, University of Limpopo https://orcid.org/0000-0002-6228-1640

DOI:

https://doi.org/10.20525/ijrbs.v11i4.1714

Keywords:

African regions, Combating, Cybercrime, Cybersecurity, South Africa

Abstract

Cybercrime is touted as any harmful behaviour that is in some way related to a computer but does not have a specific legal reference. Therefore, the objective of this study was to explore cybersecurity as a response to combating cybercrime, focusing on demystifying the prevailing threats, while offering recommendations to the African regions. Moreover, this qualitative study employed a non-empirical research design: Systematic review methodology to analyse grey literature and primary research studies peer-reviewed and published, restricted from 2010-2022, not following yearly sequential consideration. The Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) and Critical Appraisal Skill Programme (CASP) were employed to ensure the trustworthiness of the findings of this study based on reviewed conventional and seminal literature studies on this subject. The main findings of this study rest on a lack of a common universal definition of cybercrime, this has an impact on its prevention and ignores enormous economic value associated with the commission of this crime across the world, African regions included. It was also observed that this criminal act is presently committed with internet usage, consisting of copyright infringements, computer-related fraud, child or adult pornography, and network security violations, amongst others. Equally, addressing this scourge in African regions requires advanced skills and knowledge; exceeding the average computer and internet user.  It is also critical to recognise the importance of implementing efficient cybersecurity methods, as policing this crime remains an important component of the Law Enforcement Agencies (LEA), and more innovative strategies are required and a globally coordinated response to this problem is urgently sought.

Downloads

Download data is not yet available.

References

Africa Tech. (2020). South Africa has the third-highest number of cybercrime victims globally report. Retrieved from: https://africabusinesscommunities.com/tech/tech-news/south-africa-has-third-highest-number-of-cybercrime-victims-globally-report/.

Aishwarya, K., Pratiksha, S., Hule, P & Sayli, M. (2018). Survey on Network security. International Journal of Current Trends in Science and Technology, 8(1), 47-53.

Barosy, W. (2019). Successful operational cyber security strategies for small businesses. Unpublished Doctoral Business Administration Thesis. Minneapolis, Minnesota: Walden University.

Bunga, D. (2019). Legal Response to Cybercrime in Global and National Dimensions. Padjadjaran Journal of Law, 6(1), 69-89.

Business Ghana. (2018). Bank of Ghana launches cyber security directive for financial institutions. Retrieved from: https://www.businessghana.com/site/news/business ....

Bwanga, O. (2020). How to conduct a qualitative systematic review to guide evidence-based practice in Radiography? International Journal of Sciences: Basic and Applied Research, 52 (1):205-213.

Calvo, S.G. (2010). The global financial crisis of 2008-10: A view from the social sectors. Retrieved from: http://hdr.undp.org/en/content/global-financial-crisis-2008,10?utm ...

Cassim, F. (2011). Addressing the growing spectre of cybercrime in Africa: evaluating measures adopted by South Africa and other regional role players. The Comparative and International Law Journal of Southern Africa, 123-138.

Clark, R.M & Hakim, S. (Editors). (2016). Cyber-physical security: protecting critical infrastructure at the state and local level (Vol. 3). London: Springer.

Cyberattack forces a shutdown of a top USA pipeline [Online]. (2020). Cyberattack. Retrieved from: https://www.nytimes.com/2021/05/08/us/politics/cyberattack-colonial-pipeline.html.

Cybersecurity Exposure Index [Online]. (2020). Cybersecurity Index shows the most exposed countries. Retrieved from: https://www.securitymagazine.com/articles/92614-cyber ...

Dan, V. (2017). Empirical and non-empirical methods. Retrieved from: https://www.ls1.ifkw.uni-muenchen.de/personen/wiss_ma/dan_viorela/.

Detica [Online]. (2011). The cost of cybercrime. Retrieved from: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/60943/the-cost-of-cyber-crime-full-report.pdf.

Du Toit, R., Hadebe, P.N & Mphatheni, M. (2018). Public perceptions of Cybersecurity: a South African context. Acta Criminologica: African Journal of Criminology and Victimology, 31(3), 111-131.

Farahbod, K., Shayo, C & Varzandeh, J. (2020). Cybersecurity Indices and Cybercrime Annual loss and economic impacts. Journal of Business and Behavioural Sciences, 63.

Fassassi, A & Akoussan C.F. (2016). Cybercrime in Africa: Facts and figures. Retrieved from: https://www.scidev.net/sub-saharan-africa/features/cybercrime-africa-facts-figures/.

Geneva Internet Platform [Online]. (2022). Retrieved from: Cybercrime. https://dig.watch/topics/cybercrime.

Jahankhani, H., Al-Nemrat, A & Hosseinian-Far, A. (2014). Cybercrime classification and characteristics. In: Cyber Crime and Cyber Terrorism Investigator's Handbook (Pp. 149-164). Amsterdam: Elsevier Science.

Jenalda, M & Kurebwa, J. (2020). Multilateral Responses to Cybercrimes in the SADC Region: The Case of Zimbabwe and South Africa. Canadian Social Science, 16(12), 1-10.

Jurgens, J. (2022). Preface. Cologny, Switzerland: World Economic Forum.

Kshetri, N. (2013). Cybercrime and Cybersecurity in the global South. Basingstoke. United Kingdom: Palgrave Macmillan: Houndmills.

Lallie, H.S., Shepherd, L.A., Nurse, J.R., Erola, A., Epiphaniou, G., Maple, C & Bellekens, X., (2021). Cyber security in the age of covid-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Computers and Security, 105, 102248.

Larnyoh, M.T. (2021). Ranked: Top 10 African countries in Global Cybersecurity Index: The International Telecommunication Union (ITU) has released the latest Global Cybersecurity Index (GCI). July 01, Business Insider Africa [Online]. Retrieved from: https://africa.businessinsider.com/local/markets/ranked-top-10-african-countries-in-global-cybersecurity-index/bfrmkgk.

Malby, S., Mace, R., Holterhof, A., Brown, C., Kascherus, S & Ignatuschtschenko, E. (2013). Comprehensive study on cybercrime. United States of America: United Nations Office on Drugs and Crime.

Maluleke, W. (2020). The African scare of Fall Armyworm: Are South African farmers immune? International Journal of Social Sciences and Humanity Studies, 12 (1), 207-221.

Mcanyana, W., Brindley., C., 2020. Accenture. Insight into the cyberthreat landscape in South Africa. Retrieved from: https://www.accenture.com/_acnmedia/PDF-125/Accenture-Insight-Into-The-Threat-Landscape-Of-South-Africa-V5.pdf.

McGuire, M & Dowling, S. (2013). Cybercrime: A review of the evidence. Summary of key findings and implications. Home Office Research report, No. 75.

Morgan, S. (2020). Cybercrime to cost the world $10.5 trillion annually by 2025. Cybercrime Magazine, 13.

Museba, T.J., Ranganai, E & Gianfrate, G. (2021). Customer perception of adoption and use of digital financial services and mobile money services in Uganda. Journal of Enterprising Communities: People and Places in the Global Economy, No. 1.

Nwankwo, W & Ukaoha, K.C. (2019). Socio-Technical perspectives on Cybersecurity: Nigeria’s Cybercrime Legislation in Review. International Journal of Scientific and Technology Research, 8(9), 47-58.

Ogwueleka, F.N & Aniche, A.D. 2021. Information and communication technology, cyber-security and counterterrorism in Africa. In The Routledge Handbook of Counterterrorism and Counterinsurgency in Africa (Pp. 129-151). United Kingdom: Routledge.

Pavlova, P. (2020). Human Rights-based Approach to Cybersecurity: Addressing the Security Risks of Targeted Groups. Peace Human Rights Governance, 4(3).

Peter, A.S. (2017). Cyber resilience preparedness of Africa’s top-12 emerging economies. International Journal of Critical Infrastructure Protection, 17, 49-59.

Ransomware [Online]. 2021. Retrieved from: https://www.bloomberg.com/subscriptions.

Tsakalidis, G & Vergidis, K. (2017). A systematic approach toward description and classification of cybercrime incidents. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 49(4), 710-729.

World Economic Forum. (2022). Global Cybersecurity outlook 2022: Insight report January 2022. Cologny, Switzerland: World Economic Forum.

Yannascoli, S.M., Schenker, M.I & Baldwin, K. (2013). How to write a systematic review: A step-by-step guide? Retrieved from: https://www.semanticscholar.org/paper ...

Downloads

Published

2022-06-05

How to Cite

Mphatheni, M. R., & Maluleke, W. (2022). Cybersecurity as a response to combating cybercrime: Demystifying the prevailing threats and offering recommendations to the African regions. International Journal of Research in Business and Social Science (2147- 4478), 11(4), 384–396. https://doi.org/10.20525/ijrbs.v11i4.1714

Issue

Section

Legal Issues in Social Science