Advertisement

Cybercrime and Legislation in an African Context

  • Philip N. NdubuezeEmail author
Living reference work entry
  • 17 Downloads

Abstract

There is an exponential growth in cybercrime incidences and victimization in the African continent. This is perhaps the fall-out of the upsurge in the Internet usage population in Africa. Arguably, there is a correlation between the number of Internet users and the rates of cybercrime victimization in Africa. Despite the growing concerns about the spate of crime and deviance in the cyberspace, Africa as a continent has not been swift in responding to the burgeoning problem of crime and disorder in the cyberspace. Many African countries are yet to establish a comprehensive legislation on cybercrime, while only a few have signed the African Union Convention on Cyber Security and Personal Data Protection. This chapter interrogates the problem of cybercrime and its legislation in the African context. It discusses the problem of the digital divide and efforts made to bridge it. The factors that make Africans vulnerable to cyber victimizations as well as the cyber offenders’ practices in Africa are explored. Finally, the chapter examines the impediments to the effective establishment and enforcement of cybercrime legislations in Africa.

Keywords

Africa Cybercrime Cyber victimization Legislation Policing 

References

  1. Adeya, N. (1996). Beyond borders: The Internet for Africa. Convergence, 2(2), 23–27.CrossRefGoogle Scholar
  2. African Union. (2014). African Union convention on cyber security and personal data protection. Retrieved 2 June 2019 from https://au.int/en/treaties/african-union-convention-cyber-security-and-personal-data-protection.
  3. African Union. (2019). List of countries which have signed, ratified and acceded to African convention on cyber security and personal data protection. Retrieved from https://au.int/en/treaties/african-union-convention-cyber-security-and-personal-data-protection
  4. Aikins, S. K. (2019). Determinants of digital divide in Africa and policy implications. International Journal of Public Administration in the Digital Age, 6(1), 64–79.  https://doi.org/10.4018/UPADA.2019010104.CrossRefGoogle Scholar
  5. Airo-Farulla, G. (2001). Regulating the Internet; strategies for control. Media International Australia Incorporating Culture and Policy, 101, 5–7.CrossRefGoogle Scholar
  6. Antonescu, M., & Birau, R. (2015). Financial and non-financial implications of cybercrimes in emerging countries. Procedia Economics and Finance, 32, 618–621.CrossRefGoogle Scholar
  7. Astier, S. (2005). Ethical regulation of the Internet: The challenges of global governance. International Review of Administrative Sciences, 71(1), 133–150.CrossRefGoogle Scholar
  8. Bande, L. C. (2018). Legislating against cyber crime in Southern African Development community: Balancing international standards with country-specific specifications. International Journal of Cyber Criminology, 12(1), 9–26.  https://doi.org/10.5281/zenodo.1467632.CrossRefGoogle Scholar
  9. Ben-Jacob, M. G. (2017). Internet ethics for users and providers. Journal of Educational Technology Systems, 46(2), 252–258.  https://doi.org/10.1177/0047239517697967.CrossRefGoogle Scholar
  10. Black, J. (2001). Decentering regulation: Understanding the role of regulation and self-regulation in a “post-regulatory” world. Current Legal Problems, 54(1), 103–146.CrossRefGoogle Scholar
  11. Brenner, S. W. (2012). Cybercrime and the law: Challenges, issues, and outcomes. Boston: Northwestern University Press.Google Scholar
  12. Burton, P. F. (1995). Regulation and control of the Internet: Is it feasible? Is it necessary? Journal of Information Science, 21(6), 413–428.CrossRefGoogle Scholar
  13. Carr, M. (2015). Power plays in global Internet governance. Millennium: Journal of International Studies, 43(2), 640–659.  https://doi.org/10.1177/0305829814562655.CrossRefGoogle Scholar
  14. Cassim, F. (2011). Addressing the growing spectre of cybercrime in Africa: Evaluating measures adopted by South Africa and other regional role players. XLIV CILSA. Retrieved 20 Jan 2019 from https://core.ac.uk/download/pdf/79170924.pdf
  15. Chisala-Tempelhoff, S., & Kirya, M. T. (2016). Gender, law and revenge porn in Sub-Saharan Africa: A review of Malawi and Uganda. Palgrave Communications. Retrieved 4 June 2019 from https://www.nature.com/articles/palcomms201669
  16. Cotterrell, R. (2015). The concept of crime and transnational networks of community. In V. Mitsilegas, P. Alldridge, & L. Cheliots (Eds.), Globalisation, criminal law and criminal justice: Theoretical, comparative and transnational perspectives (pp. 7–23). Oxford: Hart Publishing.Google Scholar
  17. Goggin, G., & Griff, C. (2001). Regulating for content on the Internet: Meeting cultural and social objectives for broadband. Media International Australia Incorporating Culture and Policy, 101, 19–31.CrossRefGoogle Scholar
  18. Graham, M. (2011). Time machines and virtual portals: The spatialities of the digital divide. Progress in Development Studies, 11(3), 211–227.CrossRefGoogle Scholar
  19. Grobler, M. & Vuuren, J. J. V. (2010). Broadband broadens scope for cyber crime in Africa. In: Information Security for South Africa (ISSA) Conference.  https://doi.org/10.1109/ISSA.2010.5588287.
  20. Hakmeh, J. (2017). Cybercrime and the digital economy in the GCC countries. Retrieved 20 Jan 2019 from https://www.chathamhouse.org/publication/cybercrime-and-digital-economy-gcc-countries
  21. Herrington, L., & Aldrich, R. (2013). The future of cyber-resilience in an age of global complexity. Politics, 33(4), 299–310.  https://doi.org/10.1111/1467-9256.12035.CrossRefGoogle Scholar
  22. Heuser, A. (2016). Charting African prosperity gospel economies. HTS Theological Studies. Retrieved 3 June 2019 from www.scielo.org.za/pdf/hts/v72n4/103.pdf
  23. Huey, L., Nhan, J., & Broll, R. (2012). ‘Uppity civilians’ and ‘cyber-vigilantes’: The role of the general public in policing cyber-crime. Criminology & Criminal Justice, 13(3), 81–97.Google Scholar
  24. Infocyte Report. (2017). The threat of malware in Africa. Retrieved 4 June 2019 from https://infocyte.com/wp-content/uploads/security_brief-malware_in_africa.pdf
  25. International Telecommunication Union. (2012). Understanding cybercrime: Phenomenon, challenges and legal response. Retrieved 14 Jan 2019 from www.itu.int/ITU-D/cyb/cybersecurity/docs/Cybercrime%20legislation%20EV6.pdf
  26. Kigerl, A. (2012). Routine activity theory and the determinants of high cybercrime countries. Social Science Computer Review, 30(4), 470–486.  https://doi.org/10.1117/0894439311422689.CrossRefGoogle Scholar
  27. Kshetri, N. (2019). Cybercrime and cybersecurity in Africa. Journal of Global Information Technology Management, 22(2), 77–81.  https://doi.org/10.1080/1097198X.2019.1603527.CrossRefGoogle Scholar
  28. Leppanen, A., Kiravuo, T., & Kajantie, S. (2016). Policing the cyber-physical space. Police Journal: Theory, Practice and Principles, 89(4), 290–310.  https://doi.org/10.1177/0032258X16647420.CrossRefGoogle Scholar
  29. Leukfeldt, E. R., & Yar, M. (2016). Applying routine activity theory to cybercrime: A theoretical and empirical analysis. Deviant Behaviour, 37(3), 263–289.  https://doi.org/10.1080/01639625.2015.1012409.CrossRefGoogle Scholar
  30. Lindgren, S. (2018). A ghost in the machine: Tracing the role of ‘the digital’ in discursive processes of cybervictimization. Discourse & Communication, 12(5), 517–534.  https://doi.org/10.1177/1750481318766936.CrossRefGoogle Scholar
  31. Losavio, M. M., Shutt, J. E., & Keeling, D. W. (2011). The information polity: Social and legal frameworks for critical cyber infrastructure protection. In T. Saadwal & L. Jordan (Eds.), Cyber infrastructure protection (pp. 129–158). Carlisle: The Strategic Study Institute.Google Scholar
  32. Maillart, J.-B. (2018). The limits of subjective territorial jurisdiction in the context of cybercrime. ERA-Forum.  https://doi.org/10.1007/s12027-018-0527-2.CrossRefGoogle Scholar
  33. Marcum, C. D. (2014). Cyber crime. New York: Wolters Kluwer law & Business.Google Scholar
  34. Marshall, A. M., & Clarkson, A. C. (2008). Future crimes and detection methods in cyberspace. Measurement + Control, 41(8), 248–251.CrossRefGoogle Scholar
  35. McCabe, K. A., & Lee, M. D. (1997). Users’ perception of Internet regulation: An exploratory study. Social Science Computer Review, 15(3), 237–241.CrossRefGoogle Scholar
  36. McMurdie, C. (2016). The cybercrime landscape and our policing response. Journal of Cyber Policy, 1(1), 85–93.  https://doi.org/10.1080/23738871.2016.1168607.CrossRefGoogle Scholar
  37. Mutula, S. M. (2003). Cyber café industry in Africa. Journal of Information Science, 29(6), 489–497.CrossRefGoogle Scholar
  38. Na, S. H., Hwang, J., & Kim, H. (2018). Digital content as a fast Internet diffusion factor: Focusing on the fixed broadband Internet. Information Development, 1–15.  https://doi.org/10.1177/026666918811878.
  39. Ndubueze, P. N. (2016a). Cyber criminology and the quest for social order in Nigerian Cyberspace. The Nigerian Journal of Sociology and Anthropology, 14(1), 32–48.Google Scholar
  40. Ndubueze, P. N. (2016b). Generation y and online victimization in Nigeria: How vulnerable are younger Internet users. In K. Jaishankar (Ed.), Interpersonal criminology: Revisiting interpersonal crimes and victimization (pp. 203–214). Boca Raton: CRC Press, Taylor & Francis Group.Google Scholar
  41. Ndubueze, P. N., Hussien, M. D., & Sarki, Z. M. (2017). Cyberstalking awareness among undergraduates in Federal University Dutse. Dutse Journal of Humanities and Social Sciences, 2(2), 244–272.Google Scholar
  42. Nhan, J., & Bachmann, M. (2015). Developments in cyber criminology. In M. Maguire & D. Okada (Eds.), Critical issues in crime and justice: Thought, policy and practice (2nd ed., pp. 209–228). Los Angeles: Sage.Google Scholar
  43. Nwokeoma, B. N., Ndubueze, P. N., & Igbo, E. U. M. (2017). Precursors of online advance fee fraud in South-East Nigeria. In P. N. Ndubueze (Ed.), Cyber criminology and technology-assisted crime control: A reader (pp. 195–218). Zaria: Ahmadu Bello University Press.Google Scholar
  44. Obayan, A. O. I. (1995). Changing perspectives in the extended family system in Nigeria: Implications for family dynamics and counseling. Psychology Quarterly, 8(3), 253–257.Google Scholar
  45. Punch Newspaper. (2018, February 3). More attacks on FG over social media monitoring. Retrieved 2 June 2019 from https://punchng.com/more-attacks-on-fg-over-social-media-monitoring/
  46. Quarshie, H. O., & Martin-Odoom, A. (2012). Fighting cybercrime in Africa. Computer Science and Engineering, 2(6), 98–100.  https://doi.org/10.5923/j.computer.20120206.03.CrossRefGoogle Scholar
  47. Ridings, C. M., Gefen, D., & Arinze, B. (2002). Some antecedents and effects of trust in virtual communities. Journal of Strategic Information Systems, 11, 271–298.CrossRefGoogle Scholar
  48. Rogers, E. M. (2001). The digital divide convergence. The International Journal of Research into New Media Technologies, 7(4), 96–111.CrossRefGoogle Scholar
  49. Rowe, H., Raylor, W., & Brown, P. (2004). Staying legal: Self-regulation on the Internet. Business Information Review, 21(2), 117–124.  https://doi.org/10.1177/0266382104044728.CrossRefGoogle Scholar
  50. Sarikakis, K., & Winter, L. (2017). Social media users’ legal consciousness about privacy. Social Media – Society, 1–14.  https://doi.org/10.1177/2056305117695325.CrossRefGoogle Scholar
  51. Schermer, B., & Wagemans, T. (2010). Freedom in the days of the Internet: Regulating, legislating and liberating the Internet while producing rights and unlocking potentials. European View, 9, 287–293.  https://doi.org/10.1007/s12290-010-0149-8.CrossRefGoogle Scholar
  52. Smith, R. G. (2014). Transnational cybercrime and fraud. In P. Reichel & J. Albanese (Eds.), Handbook of transnational crime and justice (2nd ed., pp. 119–142). Los Angeles: Sage.CrossRefGoogle Scholar
  53. Sonaike, S. A. (2004). The Internet and the dilemma of Africa’s development. International Communication Gazette, 66(1), 41–61.CrossRefGoogle Scholar
  54. Tade, O. (2013). A spiritual dimension to cybercrime in Nigeria: The ‘Yahoo-Plus’ phenomenon. Human Affairs, 23, 689–705.  https://doi.org/10.2478/s13374-013-0158-9.CrossRefGoogle Scholar
  55. Tade, O., & Adeniyi, O. (2016). On the limit of trust: Characterising automated teller machine fraud in Southwest Nigeria. Journal of Financial Crime, 23(4), 1112–1125.CrossRefGoogle Scholar
  56. Thatcher, A., & Mathews, M. (2012). Comparing software piracy in South Africa and Zambia using social cognitive theory. African Journal of Business Ethics, 6(1), 1–12.CrossRefGoogle Scholar
  57. The Council of Europe/Project Cybercrime@Octopus. (2016). The state of cybercrime legislation in Africa: An overview. Retrieved 4 Jan 2019 from: https://rm.coe.int/16806b8a7
  58. The Internet World Stats. (2018). Internet Usage Statistics. Retrieved 20 Jan 2018 from https://www.Internetworldstats.com/stats.htm
  59. The Nigeria Electronic Fraud Forum, Annual Report. (2016). A challenging payments ecosystem: The security challenge. Abuja: Central Bank of Nigeria.Google Scholar
  60. The United Nations Economic Commission for Africa. (2014). Policy Brief. Tackling the Challenge of Cyber Security in Africa. Retrieved 20 Jan 2019 from https://www.uneca.org/sites/default/files/PublicationFiles/ntis_policy_brief_1.pdf
  61. United Nations Conference on Trade and Development. (2019). Cybercrime Legislation Worldwide. Retrieved 4 Jan 2019 from https://unctad.org/en/Pages/DTL/STI_and_ICTs/ICT4D-Legislation/eCom-Cybercrime-Laws.aspx
  62. Vanguard Newspaper. (2017, June, 15). Greed cause of cybercrime. Retrieved 3 June 2019 from https://www.vanguardngr.com/2017/06/greed-cause-cyber-crime-don/
  63. Wagner, B. (2014). The politics of Internet filtering: The United Kingdom and Germany in a comparative perspective. Politics, 34(1), 58–71.CrossRefGoogle Scholar
  64. Wall, D. S., & Williams, M. L. (2013). Policing cybercrime: Networked and social media technologies and the challenges of policing. Policing and Society, 23(4), 403–412.Google Scholar
  65. Wentworth, S. (2017). Internet multi-stakeholder governance. Journal of Cyber Policy, 2(3), 318–322.CrossRefGoogle Scholar

Copyright information

© The Author(s), under exclusive licence to Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Federal UniversityDutseNigeria

Personalised recommendations