Multilateral Responses to Cybercrimes in the SADC Region: The Case of Zimbabwe and South Africa
Abstract
This study sought to understand the multilateral responses to cyber crimes in the SADC region with specific reference to Zimbabwe and South Africa. The research examined the concept of cybercrimes, its causes, motivations, and implications. The research further examined mechanisms and legislative frameworks available to curb cybercrimes. The qualitative research methodologies were used for the study. Data was purposively collected from information technology experts, academia, the security sector, lawyers, law enforcement agencies, journalists, and diplomats. The key findings of the research revealed that the understanding of cybercrimes is not consistent as the term has no specific referent in law. The study deduced that although cyber espionage, extortion, fame and entertainment are some of the motivations behind cybercrimes in the SADC region are attributed to high unemployment rates, especially among educated ICT graduates and poverty in general. The study also established that SADC countries lack a comprehensive legal framework to combat cyber crimes.
Keywords
Full Text:
PDFReferences
Agba, P. C. (2002). International communication principles, concepts and issues. In C. S. Okunna (Ed.) (2010). Techniques of Mass Communication: A Multi-dimentional Approach. Enugu: New Generation Books.
Baken, D. N., & Mantzikos, I. (2013). Exploring Nigeria’s Vulnerability in cyber warfare, modern diplomacy.Retrieved from www.moderndiplomacy.eu
Capeller, W. (2001). Not such a neat net: Some comments on virtual criminality. Social & Legal Studies, 10, 229-42.
Castells, M. (2002). The internet galaxy: Reflections on the internet, business, and society. Oxford: Oxford University Press.
Clarke, R., & Felson, M. (Eds). (1993). Routine activity and rational choice. London: Transaction Press.
Clough, B., & Mungo, P. (1992). Approaching zero: Data crime and the computer underworld. London: Faber & Faber.
Cohen, L., & Felson, M. (1979). Social change and crime rate trends: A routine activity approach. American Sociological Review, 44, 588-608.
Cohen, L., Felson, M., & Land, K. (1980). Property crime rates in the United States: A macro dynamic analysis, 1947-1977; with ex ante forecasts for the mid-1980s. American Journal of Sociology, 86, 90-118.
Cohen, L., Kluegel, J., & Land, K. (1981). Social inequality and predatory criminal victimization: An exposition and a test of a formal theory. American Sociological Review, 46, 505-24.
Dodge, M., & Kitchin, R. (2001). Mapping cyberspace. London: Routledge.
Ehimen, O. R., & Bola, A. (2010). Cybercrime in Nigeria. Business Intelligence Journal, 3(1), 35-45.
Felson, M. (1986). Routine activities, social controls, rational decisions and criminal outcomes. In D. Cornish and R. Clarke (Eds.), The reasoning criminal. New York: Springer Verlag.
Felson, M. (1998). Crime and everyday life. Thousand Oaks, CA: Pine Forge Press.
Felson, M. (2000). The routine activity approach as a general social theory. In S. Simpson (Ed.). Of crime and criminality: The use of theory in everyday life. Thousand Oaks, CA: Sage.
Felson, R. (1996). Big people hit little people: Sex differences in physical power and Inter-personal violence. Criminology, 34, 433-52.
Furnell, S. (2002). Cybercrime: Vandalizing the information society. London: Addison Wesley.
Grabosky, P. (2001). Virtual criminality: Old wine in new bottles? Social & Legal Studies, 10, 243-9.
Grabosky, P., & Smith, R. (2001). Telecommunication fraud in the digital age: The convergence of technologies. In D. Wall (Ed.), Crime and the internet. London: Routledge.
Harvey, D. (1989). The condition of post-modernity. Oxford: Blackwell.
Hollis, M. (1987). The cunning of reason. Cambridge: Cambridge University Press.
Jacobs, J. (1961). The life and death of great American cities. New York: Random House.
Johnston, N. (2003). Plan approved to save U.S. digital history. Washington Post, 15 February, 2003.
Joseph, J. (2003). Cyberstalking: An international perspective. In J. Jewkes (Ed.), Dot.cons: Crime, deviance and identity on the internet. Cullompton: Willan Press.
Katz, J. (1988). The seductions of crime. New York: Basic Books.
Kramer, F. (2009). Cyber power and National Security. Washington, D.C: Center for Technology and National Security Policy.
Kshetri, N. (2013). Cybercrime and Cyber security in the Global South. Palgrave Macmillan: London.
Kushner, D. (2013, Mar.). The real story of Stuxnet, IEEE Spectrum, 50(3), 48-53.
Leadbetter, C. (2000). The weightless society. New York: W. W. Norton.
Levy, M. (2015). The role of qualitative approaches to research in CALL contexts: Closing in on the learner’s experience. Calico, 32(3), 554-568.
Lynch, J. (1987). Routine activity and victimization at work. Journal of Quantitative Criminology, 3, 275-82.
Massey, J., Krohn, M., & Bonati, L. (1989). Property crime and the routine activities of individuals. Journal of Research in Crime and Delinquency, 26, 378-400.
Newman, G. & Clarke, R. (2003). Superhighway robbery: Preventing ecommerce crime. Cullompton: Willan Press.
Newsday (2017). Zim-hackable-country. Retrieved from www.newsday.co.zw
NHTCU/NOP (2002 ) Hi-tech crime: The impact on UK business. London: NHTCU.
Ohlin, J.D. ( 2015). Law and ethics for virtual conflicts. Oxford University Press: New York.
Orji, U. J. (2015). Multilateral legal responses to cyber security in Africa: Any hope for effective international cooperation? Paper presented at the Cyber conflict: architectures in cyberspace (CyCon), (pp.105-118). 2015 7th International Conference. IEEE.
Pool, P. (2014). War of the cyber world: The law of cyber warfare. The International Lawyer, 47(2), 299-323.
Poster, M. (1995). The second media age. Oxford: Polity.
Shields, R., (Ed). (1996). Cultures of the internet: Virtual spaces, real histories, and living bodies. London: Sage.
Smith, C., McLaughlin, M., & Osborne, K. (1997). Conduct control on Usenet. Journal of Computer-Mediated Communication, 2(1), 23-43.
Snyder, F. (2001). Sites of criminality and sites of governance. Social & Legal Studies, 10, 251-6.
Thomas, D., & Loader, B. (2000). Introduction to Cybercrime: Law enforcement, security and surveillance in the information age. In D. Thomas and B. Loader (Eds.), Cybercrime: Law enforcement, security and surveillance in the information age. London: Routledge.
Turkle, S. (1995). Life on the screen: Identity in the age of the internet. New York: Simon & Schuster.
United Nations Office on Drugs and Crime. (2012). The use of the Internet for terrorist purposes. Vienna: United Nations.
Wall, D. (2001). Cybercrimes and the internet. In D. Wall (Ed.), Crime and the internet. London: Routledge.
Webster, F. (2002). Theories of the information society. London: Routledge.
Zukin, S. (1988). Loft living: Culture and capital in urban change. London: Radius.
DOI: http://dx.doi.org/10.3968/11946
Refbacks
- There are currently no refbacks.
Copyright (c) 2021 Canadian Social Science
This work is licensed under a Creative Commons Attribution 4.0 International License.
Reminder
- How to do online submission to another Journal?
- If you have already registered in Journal A, then how can you submit another article to Journal B? It takes two steps to make it happen:
Submission Guidelines for Canadian Social Science
We are currently accepting submissions via email only. The registration and online submission functions have been disabled.
Please send your manuscripts to [email protected],or [email protected] for consideration. We look forward to receiving your work.
Articles published in Canadian Social Science are licensed under Creative Commons Attribution 4.0 (CC-BY).
Canadian Social Science Editorial Office
Address: 1020 Bouvier Street, Suite 400, Quebec City, Quebec, G2K 0K9, Canada.
Telephone: 1-514-558 6138
Website: Http://www.cscanada.net; Http://www.cscanada.org
E-mail:[email protected]; [email protected]
Copyright © Canadian Academy of Oriental and Occidental Culture