International Journal of Intelligent Information Systems

| Peer-Reviewed |

Examining the Effects and Challenges of Cybercrime and Cyber Security Within the Cyberspace of Sierra Leone

Received: 16 September 2018    Accepted: 29 September 2018    Published: 24 October 2018
Views:       Downloads:

Share This Article

Abstract

The use of information is increasing everyday with the advent of more applications of social media platform that utilizes millions of data per second globally. These data include sensitive information such as trade secret, privacy and security issues. Most importantly, some organizations, both private and public use this medium to disseminate messages among colleagues especially in Africa. Also, the emergence of smart-phone has accelerated more problems with having little knowledge on security matters. Furthermore, cybercrimes use this opportunity to launch more cyber-attacks by invading people's privacy and steal sensitive information such as credit card details, online shopping information of customers, online ticket booking. Government official's details have being hacked or eavesdropped over the years when using their smart-phones for communications. Emails of prominent people have also being hacked or disrupted, causing huge financial lose. These attacks are on the increase and therefore, countermeasures are vital to combat cybercrimes and cyber warfare in this hostile cyberspace. The research study the sociological and technological issues that impact cybercrime and cyber-security within the boundary of Sierra Leone, as a national security threats. The study provides answers to the issues highlighted in the research. An extensive survey was conducted, which highlighted the need for a robust and proactive approach to mitigate the frequency on which cybercrime is carried out in the country and its neighbors. Data amassed were subjected to relevant questionnaires issued and collected from the respondents in the state security apparatus, based on the conventional approaches or methods of investing crime in Sierra Leone. The research shows that the state has weak laws regarding cybercrime and cyber security, and most people working in these departments or agencies have little knowledge in cyber security and cybercrime. In fact, most are on political appointment rather than on merit-base that supposed to be the right procedure that will accelerate and achieve the goals of these institutions.

DOI 10.11648/j.ijiis.20180703.11
Published in International Journal of Intelligent Information Systems (Volume 7, Issue 3, June 2018)
Page(s) 23-27
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2024. Published by Science Publishing Group

Keywords

Cybercrime, Cyber Security, Internet of Thing

References
[1] Brenner S (2007). Law in an Era of Smart Technology, Oxford: Oxford University Press p. 374.
[2] Longe OB, Chiemeke SC (2008). Cybercrime and criminality in Nigeria – What roles are internet access points in playing? Eur. J. Soc. Sci. 6 (4): 133-139.
[3] Aluko M (2004). 17 ways of stopping financial corruption in Nigeria. www. comcast. net. April 5, 2010.
[4] Erhabor IM (2008). Cybercrime and the Youths (PGDE Thesis), Department of Education, Ambrose Alli University, Ekpoma, Nigeria, p. 37.
[5] Awe J (2004). Nigeria, South Africa, Ghana top Cybercrime in Africa. www. davidajao. com. 25th June 2010.
[6] Yar M (2005). The novelty of cybercrime: An assessment in light of routine activity theory. Eur. J. Criminol. 2 (4): 407-427.
[7] Smith RG, Grabosky P, Urbas G (2004). Cyber Criminals on Trial. Cambridge (UK): Cambridge UP.
[8] Maat S (2004). Cybercrime: A Comparative Law Analysis (Doctoral thesis), University of South Africa, Pretoria, South Africa p. 239.
[9] Wall DS (2001). Maintaining order and law on the internet. In: Wall DS (Ed.), Crime and the internet. London: Routledge pp. 167-183.
[10] Sharmila Subudhi, Suvasini Panigraphi (2017). Quarter-Sphere Support Vector Machine for Fraud Detection in Mobile Telecommunication Networks. December 2015 Procedia Computer Science 48: 353-359. DOI: 10.1016/j.procs.2015.04.193.
[11] Zhao et al (2017). Detecting telecommunication fraud by understanding the contents of a call. DOI: 10.1186/s42400-018-0008-5
[12] https://www.researchgate.net/publication/327356991_Detecting_telecommunication_fraud_by_understanding_the_contents_of_a_call/fulltext/5b8a6e15299bf1d5a7363752/327356991_Detecting_telecommunication_fraud_by_understanding_the_contents_of_a_call.pdf?origin=publication_detail
[13] https://www.coe.int/en/web/cybercrime/-/glacy-improving-international-cooperation-on-cybercrimeand-electronic-evidence-in-west-africa.
[14] http://www.au.int/en/sites/default/files/treaties/29560slafrican_union_convention_on_cyber_security_and_personal_data_protection.pdf
Author Information
  • Department of Computer Science, Institute of Advanced Management and Technology (IAMTECH), Freetown, Sierra Leone

Cite This Article
  • APA Style

    Ibrahim Abdulai Sawaneh. (2018). Examining the Effects and Challenges of Cybercrime and Cyber Security Within the Cyberspace of Sierra Leone. International Journal of Intelligent Information Systems, 7(3), 23-27. https://doi.org/10.11648/j.ijiis.20180703.11

    Copy | Download

    ACS Style

    Ibrahim Abdulai Sawaneh. Examining the Effects and Challenges of Cybercrime and Cyber Security Within the Cyberspace of Sierra Leone. Int. J. Intell. Inf. Syst. 2018, 7(3), 23-27. doi: 10.11648/j.ijiis.20180703.11

    Copy | Download

    AMA Style

    Ibrahim Abdulai Sawaneh. Examining the Effects and Challenges of Cybercrime and Cyber Security Within the Cyberspace of Sierra Leone. Int J Intell Inf Syst. 2018;7(3):23-27. doi: 10.11648/j.ijiis.20180703.11

    Copy | Download

  • @article{10.11648/j.ijiis.20180703.11,
      author = {Ibrahim Abdulai Sawaneh},
      title = {Examining the Effects and Challenges of Cybercrime and Cyber Security Within the Cyberspace of Sierra Leone},
      journal = {International Journal of Intelligent Information Systems},
      volume = {7},
      number = {3},
      pages = {23-27},
      doi = {10.11648/j.ijiis.20180703.11},
      url = {https://doi.org/10.11648/j.ijiis.20180703.11},
      eprint = {https://download.sciencepg.com/pdf/10.11648.j.ijiis.20180703.11},
      abstract = {The use of information is increasing everyday with the advent of more applications of social media platform that utilizes millions of data per second globally. These data include sensitive information such as trade secret, privacy and security issues. Most importantly, some organizations, both private and public use this medium to disseminate messages among colleagues especially in Africa. Also, the emergence of smart-phone has accelerated more problems with having little knowledge on security matters. Furthermore, cybercrimes use this opportunity to launch more cyber-attacks by invading people's privacy and steal sensitive information such as credit card details, online shopping information of customers, online ticket booking. Government official's details have being hacked or eavesdropped over the years when using their smart-phones for communications. Emails of prominent people have also being hacked or disrupted, causing huge financial lose. These attacks are on the increase and therefore, countermeasures are vital to combat cybercrimes and cyber warfare in this hostile cyberspace. The research study the sociological and technological issues that impact cybercrime and cyber-security within the boundary of Sierra Leone, as a national security threats. The study provides answers to the issues highlighted in the research. An extensive survey was conducted, which highlighted the need for a robust and proactive approach to mitigate the frequency on which cybercrime is carried out in the country and its neighbors. Data amassed were subjected to relevant questionnaires issued and collected from the respondents in the state security apparatus, based on the conventional approaches or methods of investing crime in Sierra Leone. The research shows that the state has weak laws regarding cybercrime and cyber security, and most people working in these departments or agencies have little knowledge in cyber security and cybercrime. In fact, most are on political appointment rather than on merit-base that supposed to be the right procedure that will accelerate and achieve the goals of these institutions.},
     year = {2018}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - Examining the Effects and Challenges of Cybercrime and Cyber Security Within the Cyberspace of Sierra Leone
    AU  - Ibrahim Abdulai Sawaneh
    Y1  - 2018/10/24
    PY  - 2018
    N1  - https://doi.org/10.11648/j.ijiis.20180703.11
    DO  - 10.11648/j.ijiis.20180703.11
    T2  - International Journal of Intelligent Information Systems
    JF  - International Journal of Intelligent Information Systems
    JO  - International Journal of Intelligent Information Systems
    SP  - 23
    EP  - 27
    PB  - Science Publishing Group
    SN  - 2328-7683
    UR  - https://doi.org/10.11648/j.ijiis.20180703.11
    AB  - The use of information is increasing everyday with the advent of more applications of social media platform that utilizes millions of data per second globally. These data include sensitive information such as trade secret, privacy and security issues. Most importantly, some organizations, both private and public use this medium to disseminate messages among colleagues especially in Africa. Also, the emergence of smart-phone has accelerated more problems with having little knowledge on security matters. Furthermore, cybercrimes use this opportunity to launch more cyber-attacks by invading people's privacy and steal sensitive information such as credit card details, online shopping information of customers, online ticket booking. Government official's details have being hacked or eavesdropped over the years when using their smart-phones for communications. Emails of prominent people have also being hacked or disrupted, causing huge financial lose. These attacks are on the increase and therefore, countermeasures are vital to combat cybercrimes and cyber warfare in this hostile cyberspace. The research study the sociological and technological issues that impact cybercrime and cyber-security within the boundary of Sierra Leone, as a national security threats. The study provides answers to the issues highlighted in the research. An extensive survey was conducted, which highlighted the need for a robust and proactive approach to mitigate the frequency on which cybercrime is carried out in the country and its neighbors. Data amassed were subjected to relevant questionnaires issued and collected from the respondents in the state security apparatus, based on the conventional approaches or methods of investing crime in Sierra Leone. The research shows that the state has weak laws regarding cybercrime and cyber security, and most people working in these departments or agencies have little knowledge in cyber security and cybercrime. In fact, most are on political appointment rather than on merit-base that supposed to be the right procedure that will accelerate and achieve the goals of these institutions.
    VL  - 7
    IS  - 3
    ER  - 

    Copy | Download

  • Sections