Skip to main content

Cybercrime and Legislation in an African Context

  • Reference work entry
  • First Online:
The Palgrave Handbook of International Cybercrime and Cyberdeviance

Abstract

There is an exponential growth in cybercrime incidences and victimization in the African continent. This is perhaps the fall-out of the upsurge in the Internet usage population in Africa. Arguably, there is a correlation between the number of Internet users and the rates of cybercrime victimization in Africa. Despite the growing concerns about the spate of crime and deviance in the cyberspace, Africa as a continent has not been swift in responding to the burgeoning problem of crime and disorder in the cyberspace. Many African countries are yet to establish a comprehensive legislation on cybercrime, while only a few have signed the African Union Convention on Cyber Security and Personal Data Protection. This chapter interrogates the problem of cybercrime and its legislation in the African context. It discusses the problem of the digital divide and efforts made to bridge it. The factors that make Africans vulnerable to cyber victimizations as well as the cyber offenders’ practices in Africa are explored. Finally, the chapter examines the impediments to the effective establishment and enforcement of cybercrime legislations in Africa.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 499.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 649.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Adeya, N. (1996). Beyond borders: The Internet for Africa. Convergence, 2(2), 23–27.

    Google Scholar 

  • African Union. (2014). African Union convention on cyber security and personal data protection. Retrieved 2 June 2019 from https://au.int/en/treaties/african-union-convention-cyber-security-and-personal-data-protection.

  • African Union. (2019). List of countries which have signed, ratified and acceded to African convention on cyber security and personal data protection. Retrieved from https://au.int/en/treaties/african-union-convention-cyber-security-and-personal-data-protection

  • Aikins, S. K. (2019). Determinants of digital divide in Africa and policy implications. International Journal of Public Administration in the Digital Age, 6(1), 64–79. https://doi.org/10.4018/UPADA.2019010104.

    Google Scholar 

  • Airo-Farulla, G. (2001). Regulating the Internet; strategies for control. Media International Australia Incorporating Culture and Policy, 101, 5–7.

    Google Scholar 

  • Antonescu, M., & Birau, R. (2015). Financial and non-financial implications of cybercrimes in emerging countries. Procedia Economics and Finance, 32, 618–621.

    Google Scholar 

  • Astier, S. (2005). Ethical regulation of the Internet: The challenges of global governance. International Review of Administrative Sciences, 71(1), 133–150.

    Google Scholar 

  • Bande, L. C. (2018). Legislating against cyber crime in Southern African Development community: Balancing international standards with country-specific specifications. International Journal of Cyber Criminology, 12(1), 9–26. https://doi.org/10.5281/zenodo.1467632.

    Google Scholar 

  • Ben-Jacob, M. G. (2017). Internet ethics for users and providers. Journal of Educational Technology Systems, 46(2), 252–258. https://doi.org/10.1177/0047239517697967.

    Google Scholar 

  • Black, J. (2001). Decentering regulation: Understanding the role of regulation and self-regulation in a “post-regulatory” world. Current Legal Problems, 54(1), 103–146.

    Google Scholar 

  • Brenner, S. W. (2012). Cybercrime and the law: Challenges, issues, and outcomes. Boston: Northwestern University Press.

    Google Scholar 

  • Burton, P. F. (1995). Regulation and control of the Internet: Is it feasible? Is it necessary? Journal of Information Science, 21(6), 413–428.

    Google Scholar 

  • Carr, M. (2015). Power plays in global Internet governance. Millennium: Journal of International Studies, 43(2), 640–659. https://doi.org/10.1177/0305829814562655.

    Google Scholar 

  • Cassim, F. (2011). Addressing the growing spectre of cybercrime in Africa: Evaluating measures adopted by South Africa and other regional role players. XLIV CILSA. Retrieved 20 Jan 2019 from https://core.ac.uk/download/pdf/79170924.pdf

  • Chisala-Tempelhoff, S., & Kirya, M. T. (2016). Gender, law and revenge porn in Sub-Saharan Africa: A review of Malawi and Uganda. Palgrave Communications. Retrieved 4 June 2019 from https://www.nature.com/articles/palcomms201669

  • Cotterrell, R. (2015). The concept of crime and transnational networks of community. In V. Mitsilegas, P. Alldridge, & L. Cheliots (Eds.), Globalisation, criminal law and criminal justice: Theoretical, comparative and transnational perspectives (pp. 7–23). Oxford: Hart Publishing.

    Google Scholar 

  • Goggin, G., & Griff, C. (2001). Regulating for content on the Internet: Meeting cultural and social objectives for broadband. Media International Australia Incorporating Culture and Policy, 101, 19–31.

    Google Scholar 

  • Graham, M. (2011). Time machines and virtual portals: The spatialities of the digital divide. Progress in Development Studies, 11(3), 211–227.

    Google Scholar 

  • Grobler, M. & Vuuren, J. J. V. (2010). Broadband broadens scope for cyber crime in Africa. In: Information Security for South Africa (ISSA) Conference. https://doi.org/10.1109/ISSA.2010.5588287.

  • Hakmeh, J. (2017). Cybercrime and the digital economy in the GCC countries. Retrieved 20 Jan 2019 from https://www.chathamhouse.org/publication/cybercrime-and-digital-economy-gcc-countries

  • Herrington, L., & Aldrich, R. (2013). The future of cyber-resilience in an age of global complexity. Politics, 33(4), 299–310. https://doi.org/10.1111/1467-9256.12035.

    Google Scholar 

  • Heuser, A. (2016). Charting African prosperity gospel economies. HTS Theological Studies. Retrieved 3 June 2019 from www.scielo.org.za/pdf/hts/v72n4/103.pdf

  • Huey, L., Nhan, J., & Broll, R. (2012). ‘Uppity civilians’ and ‘cyber-vigilantes’: The role of the general public in policing cyber-crime. Criminology & Criminal Justice, 13(3), 81–97.

    Google Scholar 

  • Infocyte Report. (2017). The threat of malware in Africa. Retrieved 4 June 2019 from https://infocyte.com/wp-content/uploads/security_brief-malware_in_africa.pdf

  • International Telecommunication Union. (2012). Understanding cybercrime: Phenomenon, challenges and legal response. Retrieved 14 Jan 2019 from www.itu.int/ITU-D/cyb/cybersecurity/docs/Cybercrime%20legislation%20EV6.pdf

  • Kigerl, A. (2012). Routine activity theory and the determinants of high cybercrime countries. Social Science Computer Review, 30(4), 470–486. https://doi.org/10.1117/0894439311422689.

    Google Scholar 

  • Kshetri, N. (2019). Cybercrime and cybersecurity in Africa. Journal of Global Information Technology Management, 22(2), 77–81. https://doi.org/10.1080/1097198X.2019.1603527.

    Google Scholar 

  • Leppanen, A., Kiravuo, T., & Kajantie, S. (2016). Policing the cyber-physical space. Police Journal: Theory, Practice and Principles, 89(4), 290–310. https://doi.org/10.1177/0032258X16647420.

    Google Scholar 

  • Leukfeldt, E. R., & Yar, M. (2016). Applying routine activity theory to cybercrime: A theoretical and empirical analysis. Deviant Behaviour, 37(3), 263–289. https://doi.org/10.1080/01639625.2015.1012409.

    Google Scholar 

  • Lindgren, S. (2018). A ghost in the machine: Tracing the role of ‘the digital’ in discursive processes of cybervictimization. Discourse & Communication, 12(5), 517–534. https://doi.org/10.1177/1750481318766936.

    Google Scholar 

  • Losavio, M. M., Shutt, J. E., & Keeling, D. W. (2011). The information polity: Social and legal frameworks for critical cyber infrastructure protection. In T. Saadwal & L. Jordan (Eds.), Cyber infrastructure protection (pp. 129–158). Carlisle: The Strategic Study Institute.

    Google Scholar 

  • Maillart, J.-B. (2018). The limits of subjective territorial jurisdiction in the context of cybercrime. ERA-Forum. https://doi.org/10.1007/s12027-018-0527-2.

  • Marcum, C. D. (2014). Cyber crime. New York: Wolters Kluwer law & Business.

    Google Scholar 

  • Marshall, A. M., & Clarkson, A. C. (2008). Future crimes and detection methods in cyberspace. Measurement + Control, 41(8), 248–251.

    Google Scholar 

  • McCabe, K. A., & Lee, M. D. (1997). Users’ perception of Internet regulation: An exploratory study. Social Science Computer Review, 15(3), 237–241.

    Google Scholar 

  • McMurdie, C. (2016). The cybercrime landscape and our policing response. Journal of Cyber Policy, 1(1), 85–93. https://doi.org/10.1080/23738871.2016.1168607.

    Google Scholar 

  • Mutula, S. M. (2003). Cyber café industry in Africa. Journal of Information Science, 29(6), 489–497.

    Google Scholar 

  • Na, S. H., Hwang, J., & Kim, H. (2018). Digital content as a fast Internet diffusion factor: Focusing on the fixed broadband Internet. Information Development, 1–15. https://doi.org/10.1177/026666918811878.

  • Ndubueze, P. N. (2016a). Cyber criminology and the quest for social order in Nigerian Cyberspace. The Nigerian Journal of Sociology and Anthropology, 14(1), 32–48.

    Google Scholar 

  • Ndubueze, P. N. (2016b). Generation y and online victimization in Nigeria: How vulnerable are younger Internet users. In K. Jaishankar (Ed.), Interpersonal criminology: Revisiting interpersonal crimes and victimization (pp. 203–214). Boca Raton: CRC Press, Taylor & Francis Group.

    Google Scholar 

  • Ndubueze, P. N., Hussien, M. D., & Sarki, Z. M. (2017). Cyberstalking awareness among undergraduates in Federal University Dutse. Dutse Journal of Humanities and Social Sciences, 2(2), 244–272.

    Google Scholar 

  • Nhan, J., & Bachmann, M. (2015). Developments in cyber criminology. In M. Maguire & D. Okada (Eds.), Critical issues in crime and justice: Thought, policy and practice (2nd ed., pp. 209–228). Los Angeles: Sage.

    Google Scholar 

  • Nwokeoma, B. N., Ndubueze, P. N., & Igbo, E. U. M. (2017). Precursors of online advance fee fraud in South-East Nigeria. In P. N. Ndubueze (Ed.), Cyber criminology and technology-assisted crime control: A reader (pp. 195–218). Zaria: Ahmadu Bello University Press.

    Google Scholar 

  • Obayan, A. O. I. (1995). Changing perspectives in the extended family system in Nigeria: Implications for family dynamics and counseling. Psychology Quarterly, 8(3), 253–257.

    Google Scholar 

  • Punch Newspaper. (2018, February 3). More attacks on FG over social media monitoring. Retrieved 2 June 2019 from https://punchng.com/more-attacks-on-fg-over-social-media-monitoring/

  • Quarshie, H. O., & Martin-Odoom, A. (2012). Fighting cybercrime in Africa. Computer Science and Engineering, 2(6), 98–100. https://doi.org/10.5923/j.computer.20120206.03.

    Google Scholar 

  • Ridings, C. M., Gefen, D., & Arinze, B. (2002). Some antecedents and effects of trust in virtual communities. Journal of Strategic Information Systems, 11, 271–298.

    Google Scholar 

  • Rogers, E. M. (2001). The digital divide convergence. The International Journal of Research into New Media Technologies, 7(4), 96–111.

    Google Scholar 

  • Rowe, H., Raylor, W., & Brown, P. (2004). Staying legal: Self-regulation on the Internet. Business Information Review, 21(2), 117–124. https://doi.org/10.1177/0266382104044728.

    Google Scholar 

  • Sarikakis, K., & Winter, L. (2017). Social media users’ legal consciousness about privacy. Social Media – Society, 1–14. https://doi.org/10.1177/2056305117695325.

  • Schermer, B., & Wagemans, T. (2010). Freedom in the days of the Internet: Regulating, legislating and liberating the Internet while producing rights and unlocking potentials. European View, 9, 287–293. https://doi.org/10.1007/s12290-010-0149-8.

    Google Scholar 

  • Smith, R. G. (2014). Transnational cybercrime and fraud. In P. Reichel & J. Albanese (Eds.), Handbook of transnational crime and justice (2nd ed., pp. 119–142). Los Angeles: Sage.

    Google Scholar 

  • Sonaike, S. A. (2004). The Internet and the dilemma of Africa’s development. International Communication Gazette, 66(1), 41–61.

    Google Scholar 

  • Tade, O. (2013). A spiritual dimension to cybercrime in Nigeria: The ‘Yahoo-Plus’ phenomenon. Human Affairs, 23, 689–705. https://doi.org/10.2478/s13374-013-0158-9.

    Google Scholar 

  • Tade, O., & Adeniyi, O. (2016). On the limit of trust: Characterising automated teller machine fraud in Southwest Nigeria. Journal of Financial Crime, 23(4), 1112–1125.

    Google Scholar 

  • Thatcher, A., & Mathews, M. (2012). Comparing software piracy in South Africa and Zambia using social cognitive theory. African Journal of Business Ethics, 6(1), 1–12.

    Google Scholar 

  • The Council of Europe/Project Cybercrime@Octopus. (2016). The state of cybercrime legislation in Africa: An overview. Retrieved 4 Jan 2019 from: https://rm.coe.int/16806b8a7

  • The Internet World Stats. (2018). Internet Usage Statistics. Retrieved 20 Jan 2018 from https://www.Internetworldstats.com/stats.htm

  • The Nigeria Electronic Fraud Forum, Annual Report. (2016). A challenging payments ecosystem: The security challenge. Abuja: Central Bank of Nigeria.

    Google Scholar 

  • The United Nations Economic Commission for Africa. (2014). Policy Brief. Tackling the Challenge of Cyber Security in Africa. Retrieved 20 Jan 2019 from https://www.uneca.org/sites/default/files/PublicationFiles/ntis_policy_brief_1.pdf

  • United Nations Conference on Trade and Development. (2019). Cybercrime Legislation Worldwide. Retrieved 4 Jan 2019 from https://unctad.org/en/Pages/DTL/STI_and_ICTs/ICT4D-Legislation/eCom-Cybercrime-Laws.aspx

  • Vanguard Newspaper. (2017, June, 15). Greed cause of cybercrime. Retrieved 3 June 2019 from https://www.vanguardngr.com/2017/06/greed-cause-cyber-crime-don/

  • Wagner, B. (2014). The politics of Internet filtering: The United Kingdom and Germany in a comparative perspective. Politics, 34(1), 58–71.

    Google Scholar 

  • Wall, D. S., & Williams, M. L. (2013). Policing cybercrime: Networked and social media technologies and the challenges of policing. Policing and Society, 23(4), 403–412.

    Google Scholar 

  • Wentworth, S. (2017). Internet multi-stakeholder governance. Journal of Cyber Policy, 2(3), 318–322.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Philip N. Ndubueze .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 The Author(s)

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Ndubueze, P.N. (2020). Cybercrime and Legislation in an African Context. In: Holt, T., Bossler, A. (eds) The Palgrave Handbook of International Cybercrime and Cyberdeviance. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-319-78440-3_74

Download citation

Publish with us

Policies and ethics