Cybercrime and Legislation in an African Context
- 17 Downloads
There is an exponential growth in cybercrime incidences and victimization in the African continent. This is perhaps the fall-out of the upsurge in the Internet usage population in Africa. Arguably, there is a correlation between the number of Internet users and the rates of cybercrime victimization in Africa. Despite the growing concerns about the spate of crime and deviance in the cyberspace, Africa as a continent has not been swift in responding to the burgeoning problem of crime and disorder in the cyberspace. Many African countries are yet to establish a comprehensive legislation on cybercrime, while only a few have signed the African Union Convention on Cyber Security and Personal Data Protection. This chapter interrogates the problem of cybercrime and its legislation in the African context. It discusses the problem of the digital divide and efforts made to bridge it. The factors that make Africans vulnerable to cyber victimizations as well as the cyber offenders’ practices in Africa are explored. Finally, the chapter examines the impediments to the effective establishment and enforcement of cybercrime legislations in Africa.
KeywordsAfrica Cybercrime Cyber victimization Legislation Policing
- African Union. (2014). African Union convention on cyber security and personal data protection. Retrieved 2 June 2019 from https://au.int/en/treaties/african-union-convention-cyber-security-and-personal-data-protection.
- African Union. (2019). List of countries which have signed, ratified and acceded to African convention on cyber security and personal data protection. Retrieved from https://au.int/en/treaties/african-union-convention-cyber-security-and-personal-data-protection
- Brenner, S. W. (2012). Cybercrime and the law: Challenges, issues, and outcomes. Boston: Northwestern University Press.Google Scholar
- Cassim, F. (2011). Addressing the growing spectre of cybercrime in Africa: Evaluating measures adopted by South Africa and other regional role players. XLIV CILSA. Retrieved 20 Jan 2019 from https://core.ac.uk/download/pdf/79170924.pdf
- Chisala-Tempelhoff, S., & Kirya, M. T. (2016). Gender, law and revenge porn in Sub-Saharan Africa: A review of Malawi and Uganda. Palgrave Communications. Retrieved 4 June 2019 from https://www.nature.com/articles/palcomms201669
- Cotterrell, R. (2015). The concept of crime and transnational networks of community. In V. Mitsilegas, P. Alldridge, & L. Cheliots (Eds.), Globalisation, criminal law and criminal justice: Theoretical, comparative and transnational perspectives (pp. 7–23). Oxford: Hart Publishing.Google Scholar
- Grobler, M. & Vuuren, J. J. V. (2010). Broadband broadens scope for cyber crime in Africa. In: Information Security for South Africa (ISSA) Conference. https://doi.org/10.1109/ISSA.2010.5588287.
- Hakmeh, J. (2017). Cybercrime and the digital economy in the GCC countries. Retrieved 20 Jan 2019 from https://www.chathamhouse.org/publication/cybercrime-and-digital-economy-gcc-countries
- Heuser, A. (2016). Charting African prosperity gospel economies. HTS Theological Studies. Retrieved 3 June 2019 from www.scielo.org.za/pdf/hts/v72n4/103.pdf
- Huey, L., Nhan, J., & Broll, R. (2012). ‘Uppity civilians’ and ‘cyber-vigilantes’: The role of the general public in policing cyber-crime. Criminology & Criminal Justice, 13(3), 81–97.Google Scholar
- Infocyte Report. (2017). The threat of malware in Africa. Retrieved 4 June 2019 from https://infocyte.com/wp-content/uploads/security_brief-malware_in_africa.pdf
- International Telecommunication Union. (2012). Understanding cybercrime: Phenomenon, challenges and legal response. Retrieved 14 Jan 2019 from www.itu.int/ITU-D/cyb/cybersecurity/docs/Cybercrime%20legislation%20EV6.pdf
- Losavio, M. M., Shutt, J. E., & Keeling, D. W. (2011). The information polity: Social and legal frameworks for critical cyber infrastructure protection. In T. Saadwal & L. Jordan (Eds.), Cyber infrastructure protection (pp. 129–158). Carlisle: The Strategic Study Institute.Google Scholar
- Marcum, C. D. (2014). Cyber crime. New York: Wolters Kluwer law & Business.Google Scholar
- Na, S. H., Hwang, J., & Kim, H. (2018). Digital content as a fast Internet diffusion factor: Focusing on the fixed broadband Internet. Information Development, 1–15. https://doi.org/10.1177/026666918811878.
- Ndubueze, P. N. (2016a). Cyber criminology and the quest for social order in Nigerian Cyberspace. The Nigerian Journal of Sociology and Anthropology, 14(1), 32–48.Google Scholar
- Ndubueze, P. N. (2016b). Generation y and online victimization in Nigeria: How vulnerable are younger Internet users. In K. Jaishankar (Ed.), Interpersonal criminology: Revisiting interpersonal crimes and victimization (pp. 203–214). Boca Raton: CRC Press, Taylor & Francis Group.Google Scholar
- Ndubueze, P. N., Hussien, M. D., & Sarki, Z. M. (2017). Cyberstalking awareness among undergraduates in Federal University Dutse. Dutse Journal of Humanities and Social Sciences, 2(2), 244–272.Google Scholar
- Nhan, J., & Bachmann, M. (2015). Developments in cyber criminology. In M. Maguire & D. Okada (Eds.), Critical issues in crime and justice: Thought, policy and practice (2nd ed., pp. 209–228). Los Angeles: Sage.Google Scholar
- Nwokeoma, B. N., Ndubueze, P. N., & Igbo, E. U. M. (2017). Precursors of online advance fee fraud in South-East Nigeria. In P. N. Ndubueze (Ed.), Cyber criminology and technology-assisted crime control: A reader (pp. 195–218). Zaria: Ahmadu Bello University Press.Google Scholar
- Obayan, A. O. I. (1995). Changing perspectives in the extended family system in Nigeria: Implications for family dynamics and counseling. Psychology Quarterly, 8(3), 253–257.Google Scholar
- Punch Newspaper. (2018, February 3). More attacks on FG over social media monitoring. Retrieved 2 June 2019 from https://punchng.com/more-attacks-on-fg-over-social-media-monitoring/
- The Council of Europe/Project Cybercrime@Octopus. (2016). The state of cybercrime legislation in Africa: An overview. Retrieved 4 Jan 2019 from: https://rm.coe.int/16806b8a7
- The Internet World Stats. (2018). Internet Usage Statistics. Retrieved 20 Jan 2018 from https://www.Internetworldstats.com/stats.htm
- The Nigeria Electronic Fraud Forum, Annual Report. (2016). A challenging payments ecosystem: The security challenge. Abuja: Central Bank of Nigeria.Google Scholar
- The United Nations Economic Commission for Africa. (2014). Policy Brief. Tackling the Challenge of Cyber Security in Africa. Retrieved 20 Jan 2019 from https://www.uneca.org/sites/default/files/PublicationFiles/ntis_policy_brief_1.pdf
- United Nations Conference on Trade and Development. (2019). Cybercrime Legislation Worldwide. Retrieved 4 Jan 2019 from https://unctad.org/en/Pages/DTL/STI_and_ICTs/ICT4D-Legislation/eCom-Cybercrime-Laws.aspx
- Vanguard Newspaper. (2017, June, 15). Greed cause of cybercrime. Retrieved 3 June 2019 from https://www.vanguardngr.com/2017/06/greed-cause-cyber-crime-don/
- Wall, D. S., & Williams, M. L. (2013). Policing cybercrime: Networked and social media technologies and the challenges of policing. Policing and Society, 23(4), 403–412.Google Scholar