1,040
Views
1
CrossRef citations to date
0
Altmetric
Articles

African governments and the influence of corruption on the proliferation of cybercrime in Africa: wherein lies the rule of law?

ORCID Icon & ORCID Icon
Pages 131-161 | Received 29 Sep 2020, Accepted 07 Jan 2021, Published online: 17 Feb 2021

References

  • Adeniran, A. 2008. “The Internet and Emergence of Yahoo Boys Sub-culture in Nigeriaï.” International Journal of Cyber Criminology 2 (2): 368–381.
  • Adogame, A. 2007. ‘The 419 Code as Business Unusual: Youth and the Unfolding of the Advance Fee Fraud Online Discourse’ International Sociological Association E-bulletin. http://www.isasociology.org/publ/e-bulletin/E-bulletin_7.pdf.
  • African Union Convention on Cybersecurity and Personal Data Protection. 2014. art. 36.
  • Aiezza, M. C. 2020. “Too Good to be True. A Discourse Analysis of the Australian Online Scam Prevention Website.” In The Content and Media of Legal Discourse, edited by Girolamo Tessuto, Vijay K. Bhatia, Ruth Breeze, Nicholas Brownlees, and Martin Solly, 77–99. Cambridge, UK: Cambridge Scholars Publishing.
  • Akande, O., and B. R. Shadare. 2020. “Why has it Been Difficult to Counteract Cybercrime in Nigeria? Evidence from Ethnographic Study.” International Journal of Cyber Criminology 14 (1): 30.
  • Aransiola, J., and S. Asindemade. 2011. “Understanding Cyber Crime Perpetrators and the Strategies They Employ in Nigeria.” Cyberpsychology, Behavior, and Social Networking 14 (12): 759–763.
  • Asongwe, P. N. 2012. “E Government and the Cameroon Cybersecurity Legislation 2010: Opportunities and Challenges.” The African Journal of Information and Communication 12 (159): 161–162.
  • Asongwe, P. 2019. “Government Leadership and the Protection of Critical Information Infrastructures: Social Security a Critical Analysis of Cameroon’s Cyber Code.” Arts and Social Sciences Journal 10 (2): 1.
  • Bande, Lewis C. 2011. “A Case for Cybercrime Legislation in Malawi.” Malawi Law Journal 5 (2): 93–114.
  • Bande, Lewis C. 2018. “Legislating Against Cyber Crime in Southern African Development Community: Balancing International Standards with Country-Specific Specificities.” International Journal of Cyber Criminology 12 (1): 9–23.
  • Baylon, Caroline, and Albert Antwi-Boasiako. 2016. ‘Increasing Internet Connectivity While Combatting Cybercrime: Ghana as a Case Study’ Centre for International Governance Innovation and Chatham House, Paper Series: No. 44 – November, 9.
  • Beek, Jan. 2016. “Cybercrime, Police Work and Storytelling in West Africa.” Africa: The Journal of the International African Institute 86 (2): 309–310.
  • Borainea, A., and N. L. Doris. 2019. “Global Society of Scientific Research and Researchers The Fight Against Cybercrime in Cameroon.” International Journal of Computer (IJC) 35 (1): 92–93. http://ijcjournal.org/.
  • Breakthrough Attorneys. 2015. ‘Cybercrimes Act 2015 Tanzania; The Challenge in the Hands of Both Corporates and Individuals’. 4. http://www.breakthroughattorneys.co.tz/cybercrimes-act-2015-tanzania/.
  • Brody, R. G., S. Kern, and K. Ogunade 2019. “An Insider’s Look at the Rise of Nigerian 419 Scams.” Journal of Financial Crime. doi:10.1108/JFC-12-2019-0162.
  • Burrows, Tracy. 2014. Jason Jordaan: Hacking: No Tools Required. Accessed 12 July 2020. https://www.itweb.co.za/content/KwbrpO7gXVaMDLZn/pXnWJadMba7bjO1e.
  • Calandro, Enrico, and Nils Berglund. 2019. ‘Unpacking Cyber-Capacity Building in Shaping Cyberspace Governance: the SADC case’, 1–2. Accesssed 29 December 2020. www.google.com/search?q.
  • Caron, C. 2017. ‘Louisiana man charged in Nigerian prince scheme, The New York Times, Accessed 10 September 2020. https://www.nytimescom/2017/12/31/us/nigerian-prince-fraud.html.
  • Cassim, Fawzia. 2011. “Addressing the Growing Spectre of Cyber-Crime in Africa: Evaluating Measures Adopted by South Africa and Other Regional Role Players.” The Comparative and International Law Journal of Southern Africa 44 (1): 133.
  • Chapman, Catherine. 2018. ‘How Africa is tackling its Cybersecurity skills gap’ 22 August 2018, The Daily Swig, Accessed 15 September 2020. https://portswigger.net/daily-swig/how-africa-is-tackling-its-cybersecurity-skills-gaps.
  • Chart of Signatures and Ratification of Treaty 185: Convention on Cybercrime Status as of 28/12/2020. 2020. Council of Europe Portal. https://www.coe.int/en/web/conventions/full-list/-/conventions/treaty/185/signatures.
  • Chimuka, Tarisayi Andrea, and Mashumba- Paki Lesedi. 2016. “Understanding Cyber Scams: An Assessment of the Challenges of Law Enforcement in Botswana.” Journal of Sustainable Development in Africa Volume 18 (2): 1–14.
  • CIPESA. 2000. State of Internet Freedom in Botswana 2019 Mapping Trends in Government Internet Controls, 1999–2019, January 2000. 39.
  • CIPESA. 2019. Digital Rights in The Gambia Submission to the 34th session of the Universal Periodic Review, The Gambia, 2019. 3.
  • Corruption Watch. 2014. Corruption Fuels Cyber-Crime in SA’29 May. Accessed 12 July 2020. https://www.corruptionwatch.org.za/corruption-fuels-cyber-crime-in-sa.
  • Cybercrimes Bill in South Africa. Accessed 12 July 2020. https://www.michalsons.com/focus-areas/cybercrime- law/cybercrimes-bill-south-africa.
  • Department of Justice. 2018. ‘Nigerian National Indicted for Internet Fraud Scheme’ 13 November, Accessed 14 June 2020. https://www.justice.gov/usao-wdmo/pr/nigerian-national-indicted-internet-fraud-scheme.
  • Eboibi, F. E. 2017. “Cybercrime in a Technological Era: Definitional Controversies and Nigeria’s Historical Antecedents.” NSUK Law Commentaries 2 (1): 43–64.
  • Eboibi, F. E. 2018. “Introduction to Law & Cybercrime.” In Handbook on Nigerian Cybercrime Law, edited by F. E. Eboibi, 9–36. Benin: Justice Jeco Printing and Publishing Global.
  • Eboibi, F. E. 2020b. “Cybercriminals and Coronavirus Cybercrimes in Nigeria, the United States of America and the United Kingdom: Cyber Hygiene and Preventive Enforcement Measures.” Commonwealth Law Bulletin, 21–30. doi:10.1080/03050718.2020.1834424.
  • Eboibi, F. E. 2020. “Concerns of Cyber Criminality in South Africa, Ghana, Ethiopia and Nigeria: Rethinking Cybercrime Policy Implementation and Institutional Accountability.” Commonwealth Law Bulletin 46 (1): 85.
  • Eboibi, F. E., and N. U. Richards. 2019. “Electronic Taxation and Cybercrimes in Nigeria, Kenya and South Africa: Lessons from Europe and the United States of America.” Commonwealth Law Bulletin 45 (4): 740.
  • ECOWAS. ECOWAS 66th Ordinary Session of the Council of Ministers (Directive C/DIR.1/08/11).
  • Edokwe, Bridget. 2020. Buhari Writes South African President, Laments Huge Corruption in Govt. Accessed 12 July 2020. https://www.barristerng.com.
  • Ennin, Daniel. 2015. “Cybercrime in Ghana: A Study of Offenders, Victims and the Law.” (M Phil Thesis). University of Ghana, 114, Accessed 8 August 2020. ugspace.ug.edu.gh.
  • Ezeji, C. L., et al. 2018. “‘Cyber-Related Crime in South Africa: Extent and Perspectives of State’s Role Players’.” Acta Criminologica: Southern African Journal of Criminology 31 (3): 99.
  • FBI. 2019. ‘Scams and safety: Common fraud schemes.’ Accessed 22 September. https://www.fbi.gov/scams-and-safety/common-fraud-schemes/internet-fraud.
  • Federal Bureau of Investigation, Internet Crime Complaint Center. 2019. Internet Crime Report, 5. Accessed 8 August 2020. https://pdf.ic3.gov/2019_IC3Report.pdf.
  • Finnan, Daniel. 2019. ‘Lack of Laws Governing Cybercrime making Africa a safe haven for cybercriminals’ Interview16 February. Last accessed 9 September 2020 http://en,rfi.fr/africa/20150215-lack-laws-governing-cybercrime-making-africa-safe-haven-cybercriminals-interview.
  • Gillespie, Alisdair A, and Samantha Magor. 2019. Tackling online fraud’ Europäische Rechtsakademie (ERA) Forum, https://doi.org/10.1007/s12027-019-00580-y.
  • Global Cyber Security Capacity Centre. Oxford Martin School, University of Oxford an World Bank. Cybersecurity Capacity Review: The Gambia April 2019, 8–10, 533.
  • Gumbi, Dumisani. ‘Understanding the threat of cybercrime: A comparative study of cybercrime and the ICT legislative frameworks of South Africa, Kenya, India, the United States and the United Kingdom’Being an LLM Dissertation Presented to the University of Capetown, 2018, 90.
  • Handongwe, Mainza Siamubayi. ‘Challenges and Successes in the Zambian’ ICT Security Sector ITU Workshop on “ICT Security Standardization for Developing Countries” Geneva, Switzerland, 15–16 September 2014, 11–17.
  • Hassan, A. B., F. D. Lass, and J. Makinde. 2012. “Cybercrime in Nigeria: Causes, Effects and the way out.” Journal of Science and Technology 2 (7): 626–631.
  • Hinduja, Sameer. ‘Computer Crime Investigations in the United States: Leveraging Knowledge from the Past to Address the Future’ 2007, 2.
  • Holt, T. J., and J. P. Kennedy. 2020. “Section VI - Emerging White-Collar Crime Issues.” In The Handbook of White-Collar Crime, edited by M. L. Rorie, 459. New Jersey: John Wiley & Sons, Inc.
  • ITWeb. 2014. ‘Security Summit 2014 wrap-up: rebuilding trust’ 27-29 May, Sandton Convention Centre, Johannesburg, South Africa, Accessed 12 July 2020. https://v2.itweb.co.za/index.php?option = comcontent&view = article&id=68611.
  • Jallow. Momodou Alieu Cybercrime Legislation in The Gambia -.Cyber EU-COE Webinar Africa July 2020, 6–8.
  • Jansen van Vuuren, J. C., L. Leenen, and P. Pieterse. 2019. “Framework for the Development and Implementation of a Cybercrime Strategy in Africa.” In Proceedings of the 14th International Conference on Cyber Warfare and Security, Stellenbosch University, South Africa, February 28–March 1, edited by Noelle van der Waag-Cowling and Louise Leenen.
  • Kader, S., and A. Minnaar. 2015. “Cybercrime Investigations: Cyber-Processes for Detecting of Cybercriminal Activities, Cyber-Intelligence and Evidence Gathering.” Acta Criminologica: Southern African Journal of Criminology 5: 70.
  • Kamary, Joseph Rutto. ‘Cyber Technology and Insecurity in Africa: A Case study of Kenya’ A Research Presented to the Institute of Diplomacy and International Studies, University of Nairobi, October 2018. 52–53.
  • Khan, Fawzia. 2018. ‘Cybercrime Law in South Africa’. Accessed 15 January 2018. https://www.findanattorney.co.za/contentcybercrime-law.
  • Kshetri, Nir. 2019. “Cybercrime and Cybersecurity in Africa.” Journal of Global Information Technology Management 22 (2): 77.
  • Longe, O. B., and S. Chiemeke. 2008. “Mediated Cyber-Crime: An Investigation of the Role of Internet Access Points in the Facilitation of Cybercrime in South West Nigeria.” European Journal of Social Sciences 6: 466–472.
  • Lusthaus, Jonathan. 2020. “Cybercrime in Southeast Asia: Combating a Global Threat Locally.” Australian Strategic Policy Institute: International Cyber Policy Center, Policy Brief Report No. 29/2020, 7.
  • Makanda, K., T. F. Vallent, and H. Kim. 2017. “Remarks on National Cyber Security for Under Developed and Developing Countries: Focused on Malawi.” American Journal of Engineering Research (AJER) 6 (7): 257–260.
  • Matengu, Town Sinka. 2012. ‘Cybercrime Awareness and Reporting in the Public Sector In Botswana’ A Dissertation Presented to the Department of Information Systems, University of Cape, November 2012, in Partial Fulfilment of the Requirements for Masters of Commerce (Information Systems) 33–34.
  • Mbembela, J. E. Assessment Of Factors Affecting Cybercrimes Management In Tanzania: The Case Of The Tanzania Police Force’ A Dissertation Submitted in Partial Fulfillment of the Requirements for the Degree of Business Administration in Corporate Management of Mzumbe University, 2019. 7, 67.
  • Mills, Greg. 2020. ‘The African Security Intersection: Pathways to partnership’ Discussion Paper 01/2020, (South Africa: The Brenthurst Foundation,), 6,15, Accessed 16 June 2020. https://www.ditchley.com/sites/default/files/2020-01/Discussion%20Paper%2001-2020%20-%20%27The%20African%20Security%20Intersection%27.pdf.
  • Minnaar, Anthony. 2014. ‘Crackers, Cyberattacks and Cybersecurity Vulnerabilities: The Difficulties in Combating The ‘New’ Cybercriminals’ Acta riminological:Southern African Journal of Criminology, Special Edition No. 2/: Research and Application in Criminology and Criminal Justice, 130.
  • Monsurat, Isiaka. 2020. “African Insurance (Spiritualism) and the Success Rate of Cybercriminals in Nigeria: A Case Study of Yahoo Boys in Ilorin, Nigeria.” International Journal of Cyber Criminology 14 (1): 301.
  • Mwila, Kingstone Ali. An Assessment of Cyber Attacks Preparedness Strategy for Public and Private Sectors in Zambia being a Dissertation Submitted to the University of Zambia in Partial Fulfilment of the Requirements for the Degree of Master of Engineering in Information and Communication Technology Security, University of Zambia Lusaka 2020, 42.
  • National Deposit Insurance Corporation. 2018. NDIC 2018 Annual Report, 13.
  • Ntingi, Andile. 2016. ‘SA Firms Magnets for Online Fraudsters,’ 6 April, Accessed 11 September 2020. https://www.africanindy.com/business/cameroons-dilemma-in-fighting-cybercrime-5073265.
  • Oluwaniyi, O. O. 2011. “Police and the Institution of Corruption in Nigeria.” Policing and Society: An International Journal of Research and Policy 21 (1): 67–83.
  • Premium Times. 2018. ‘Internet connectivity triples in Africa amid rising cybercrime– AU.’(16 October). Accessed 13 November 2018. https://www.premiumtimesng.com/news/top-news/290814-internet-connectivity-triples-in-africa-amid-rising-cybercrime-au.html.
  • Pulse. ‘IGP disbands SARS Nationwide’. https://www.pulse.ng/news/local/igp-disbands-sars-nationwide/186hxre.
  • Staff Writer. 2018. ‘Cost of Cybercrime in Africa in 2017 estimated at $3.5 billion’ 10 April. Last accessed 9 September 2020. https://www.cio.co.ke/africacybersecurityreport2017-cost-of-cyber-crime-in-africa-2017-estimated-at-3-5-billion.
  • Suleiman, A. O. 2019. “The Impulsive Upsurge of Yahoo-Yahoo in The 21st Century in Nigeria: Islamic Perspective.” African Journal of Criminology and Justice Studies 12 (1): 91–104.
  • Tade, O. 2013. “A Spiritual Dimension to Cybercrime in Nigeria: The ‘yahoo plus’ Phenomenon.” Human Affairs 23: 689–705.
  • Tade, O., and I. Aliyu. 2011. “Social Organisation of Cybercrime among University Undergraduates in Nigeria.” International Journal of Cyber Criminology 5: 860–875.
  • Transparency International. 2019. ‘Corruption perceptions index 2018’. Accessed 5 December 2019. www.transparency.org/cpi2018.
  • United States District Court, District Court of Oregon, Medford Division, 1:15-CR- 00172-AA, Indictment (Under Seal). Accessed 25 July 2019. Available at https://www.justice.gov/usao-or/press-release/file/432966/download.
  • United States District Court for the Central District of California Case No.2:20-mj-02992. Accessed 4 July 2020. https://www.justice.gov/usao-cdca/press-release/file/1292066/download.
  • United States District Court For The Western District Of Washington At Seattle, NO. CRl 7-0290RSL,Filed 03/01/18. Accessed 18 September 2020. https://www.justice.gov/opa/press-release/file/1191196/download.
  • US District Court, Central District of California - CR No.190R00380 FMO Indictment 2019. Accessed 22 September 2019. https://www.justice.gov/usao-cdca/press-release/file/1197341/download.
  • Whitty, Monica T. 2018. “419 – It’s Just a Game: Pathways to CyberFraud Criminality Emanating from West Africa.” International Journal of Cyber Criminology 12 (1): 97.
  • Whitty, M. T., and N. Magdalene. 2017. ‘Literature review for underware: Understanding West African culture to prevent cybercrime, March 3. Accessed 19 June 2020. https://minervaaccess.unimelb.edu.au/bitstream/handle/11343/198264/underwareliteraturereview_whitty.pdf?sequence=1&isAllowed=y.
  • Yilma, Kinfe Micheal. 2016. “Ethiopia’s new Cybercrime Legislation: Some Reflections.” Computer Law & Security Review 3-4: 17.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.