Volume 7, Issue 3, June 2018, Page: 23-27
Examining the Effects and Challenges of Cybercrime and Cyber Security Within the Cyberspace of Sierra Leone
Ibrahim Abdulai Sawaneh, Department of Computer Science, Institute of Advanced Management and Technology (IAMTECH), Freetown, Sierra Leone
Received: Sep. 16, 2018;       Accepted: Sep. 29, 2018;       Published: Oct. 24, 2018
DOI: 10.11648/j.ijiis.20180703.11      View  224      Downloads  10
Abstract
The use of information is increasing everyday with the advent of more applications of social media platform that utilizes millions of data per second globally. These data include sensitive information such as trade secret, privacy and security issues. Most importantly, some organizations, both private and public use this medium to disseminate messages among colleagues especially in Africa. Also, the emergence of smart-phone has accelerated more problems with having little knowledge on security matters. Furthermore, cybercrimes use this opportunity to launch more cyber-attacks by invading people's privacy and steal sensitive information such as credit card details, online shopping information of customers, online ticket booking. Government official's details have being hacked or eavesdropped over the years when using their smart-phones for communications. Emails of prominent people have also being hacked or disrupted, causing huge financial lose. These attacks are on the increase and therefore, countermeasures are vital to combat cybercrimes and cyber warfare in this hostile cyberspace. The research study the sociological and technological issues that impact cybercrime and cyber-security within the boundary of Sierra Leone, as a national security threats. The study provides answers to the issues highlighted in the research. An extensive survey was conducted, which highlighted the need for a robust and proactive approach to mitigate the frequency on which cybercrime is carried out in the country and its neighbors. Data amassed were subjected to relevant questionnaires issued and collected from the respondents in the state security apparatus, based on the conventional approaches or methods of investing crime in Sierra Leone. The research shows that the state has weak laws regarding cybercrime and cyber security, and most people working in these departments or agencies have little knowledge in cyber security and cybercrime. In fact, most are on political appointment rather than on merit-base that supposed to be the right procedure that will accelerate and achieve the goals of these institutions.
Keywords
Cybercrime, Cyber Security, Internet of Thing
To cite this article
Ibrahim Abdulai Sawaneh, Examining the Effects and Challenges of Cybercrime and Cyber Security Within the Cyberspace of Sierra Leone, International Journal of Intelligent Information Systems. Vol. 7, No. 3, 2018, pp. 23-27. doi: 10.11648/j.ijiis.20180703.11
Copyright
Copyright © 2018 Authors retain the copyright of this article.
This article is an open access article distributed under the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/) which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Reference
[1]
Brenner S (2007). Law in an Era of Smart Technology, Oxford: Oxford University Press p. 374.
[2]
Longe OB, Chiemeke SC (2008). Cybercrime and criminality in Nigeria – What roles are internet access points in playing? Eur. J. Soc. Sci. 6 (4): 133-139.
[3]
Aluko M (2004). 17 ways of stopping financial corruption in Nigeria. www. comcast. net. April 5, 2010.
[4]
Erhabor IM (2008). Cybercrime and the Youths (PGDE Thesis), Department of Education, Ambrose Alli University, Ekpoma, Nigeria, p. 37.
[5]
Awe J (2004). Nigeria, South Africa, Ghana top Cybercrime in Africa. www. davidajao. com. 25th June 2010.
[6]
Yar M (2005). The novelty of cybercrime: An assessment in light of routine activity theory. Eur. J. Criminol. 2 (4): 407-427.
[7]
Smith RG, Grabosky P, Urbas G (2004). Cyber Criminals on Trial. Cambridge (UK): Cambridge UP.
[8]
Maat S (2004). Cybercrime: A Comparative Law Analysis (Doctoral thesis), University of South Africa, Pretoria, South Africa p. 239.
[9]
Wall DS (2001). Maintaining order and law on the internet. In: Wall DS (Ed.), Crime and the internet. London: Routledge pp. 167-183.
[10]
Sharmila Subudhi, Suvasini Panigraphi (2017). Quarter-Sphere Support Vector Machine for Fraud Detection in Mobile Telecommunication Networks. December 2015 Procedia Computer Science 48: 353-359. DOI: 10.1016/j.procs.2015.04.193.
[11]
Zhao et al (2017). Detecting telecommunication fraud by understanding the contents of a call. DOI: 10.1186/s42400-018-0008-5
[12]
https://www.researchgate.net/publication/327356991_Detecting_telecommunication_fraud_by_understanding_the_contents_of_a_call/fulltext/5b8a6e15299bf1d5a7363752/327356991_Detecting_telecommunication_fraud_by_understanding_the_contents_of_a_call.pdf?origin=publication_detail
[13]
https://www.coe.int/en/web/cybercrime/-/glacy-improving-international-cooperation-on-cybercrimeand-electronic-evidence-in-west-africa.
[14]
http://www.au.int/en/sites/default/files/treaties/29560slafrican_union_convention_on_cyber_security_and_personal_data_protection.pdf
Browse journals by subject