Abstract

Humans' growing desire to continuously interact with each other through the internet has both negative and positive consequences, especially if users tend to use it maliciously. The advent of social networking sites has broken the traditional barriers to communication. It is a cost-effective way of communicating using text-messages, video-messages, and voice-notes as it happens from a source (sender) to the audience (receivers). Anyone can participate if they have a mobile phone with internet facilities, and now, everyone is an online journalist and a reporter. Unfortunately, although social media platforms have numerous merits, these platforms still face critical challenges, especially in controlling and policing content post by users. The revolution in information technology and social networking platforms have provided a NEW NORMAL for online fraudsters and criminals. Fake news, hate speech, and political propaganda/rhetoric has created a confusing world, especially during the Covid-19 pandemic situation. Therefore, our paper presented some of the challenges and solutions to cybercrime.

Keywords

Cybersecurity, Information Age, Cybercrime, Fake News,

Metrics

Metrics Loading ...

References

  1. Alex Scroxton, (2020). Top 10 Cybercrime Stories of 2020. Available online: https://computerweekly.com/news/252493515/Top-10-cyber-crime-stories-of-2020 (accessed on 5 February 2021)
  2. Amankwa, E., Loock, M. & Kritzinger, E., (2014), A Conceptual Analysis of Information Security Education, Information Security Training and Information Security Awareness Definitions, In The 9th International Conference for Internet Technology and Secured Transactions (ICITST -2014). London: IEEE, pp. 248–252. https://doi.org/10.1109/ICITST.2014.7038814
  3. Anand Kumar Shrivastav, Ekata, (2013). ICT Penetration and Cybercrime in India: A Review, International Journal of Advanced Research in Computer Science and Software Engineering, 3: 414-419.
  4. Antwi-bekoe, E. & Nimako, S.G., (2012), Computer Security Awareness and Vulnerabilities: An Exploratory Study for Two Public Higher Institutions in Ghana, International Journal of Science and Technology, 1(7), pp.358–375.
  5. Arora, A., Nandkumar, A., & Telang, R., (2006). Does information security attack frequency increase with vulnerability disclosure? An empirical analysis. Information Systems Frontiers, 8(5), 350–362. https://doi.org/10.1007/s10796-006-9012-5
  6. Azeez Nureni Ayofe, & Barry Irwin, (2010). Cybersecurity: Challenges and the Way Forward, GESJ: Computer Science and Telecommunications, 6 (29): 56-69.
  7. Berkley Joseph P, Liu, (2003). The DMCA and the regulation of scientific research, Technology Law Journal, 18(2):501-537.
  8. Bulgurcu, B., Cavusoglu, H. & Benbasat, I. (2010), "Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness", MIS Quarterly, 34(3), 523.
  9. Cyber Crime and Punishment? Archaic Laws Threaten Global Information. Pg. 1 December 2000. http://www.iwar.org.uk/law/resources/cybercrime/mcconnell/CyberCrime.pdf
  10. Daniel J. Solove and Chris Jay Hoofnagle (2002). A model regime of privacy protection. University of Illinois Law Review, 7:1083-1167.
  11. Dinesh Thakur. (2020) What is the difference between Data and Information? Available online: https://ecomputernotes.com/fundamental/information-technology/what-do-you-mean-by-data-and-information
  12. Goodman Symour E and Herbert S. (2007) National Research Council and National Academy of Engineering, Toward a Safer and More Secure Cyberspace, Washington, DC: The National Academies Press. https://doi.org/10.17226/11925
  13. Hans de Bruijin, Marijn Janssen (2017). Building cybersecurity awareness: The need for evidence-based framing strategies. Government Information Quarterly, 34(1), 1- 7. https://doi.org/10.1016/j.giq.2017.02.007
  14. Ibikunle Frank, Eweniyi Odunayo (2013). Approach to cyber security issues in Nigeria: challenges and solution. International Journal of Cognitive Research in Science, Engineering and Education 1(1).
  15. Internet World Stats (2020). Usage and Population Statistics. https://internetworldstats.com/ (accessed on 5 February 2021)
  16. Iwarimie-Jaja (2012). Criminology: The Study of Crime. Owerri: Springfield Publishers.
  17. Jama, A.Y., Siraj, M., & Kadir, R., (2014), Towards Metamodel - based Approach for Information Security Awareness Management, In 2014 International symposium on biometrics and security technologies (ISBAST). pp. 316–321.
  18. Julian Jang-Jaccard, S. Nepal (2014). A survey of emerging threats in cybersecurity, Journal of Computer and System Sciences, 80: 973–993. https://doi.org/10.1016/j.jcss.2014.02.005
  19. Kamini, D., (2011). Cyber Crime in the Society: Problems and Preventions, Journal of Alternative Perspectives in the Social Sciences 3(1): 240-259.
  20. Kaspersky, (2020) Tips on how to protect yourself against cybercrime. Available online: https://me-en.kaspersky.com/resource-center/threats/what-is-cybercrime (accessed on 5 February 2021)
  21. Kortjan, N., & von Solms, R. (2014). A conceptual framework for cyber-security awareness and education in SA, SACJ No. 52, pp. 29- 41. Available at: https://sacj.cs.uct.ac.za/index.php/sacj/article/download/201/95 (accessed on: 14/07/2015).
  22. Laura, A., (1995): Cyber Crime and National Security: The Role of the Penal and Procedural Law, Research Fellow, Nigerian Institute of Advanced Legal Studies., Retrieved from https://nials-nigeria.org/pub/lauraani.pdf (accessed on 5 February 2021)
  23. Lee, M., (2015). The evolution of Cybercrime: From Julius Caesar and Prince Philip to state-sponsored malware, International Business Times. https://ibtimes.co.uk/evolution-cybercrime-julius-caesar-prince-philip-state-sponsored-malware-1514552 (accessed on 5 February 2021)
  24. Mejias, R. J., & Harvey, M. (2012). A case for information security awareness programs to protect global information, innovation and knowledge resources, International Journal of Transitions and Innovation Systems, 2, 302–324.
  25. O'Brien, J.A. & Marakas, G.M., (2011). Management Information System, tenth edition, McGraw-Hill Company Inc, ISBN: 978-0-07- 122109-2.
  26. Oleg Kupreev, Ekaterina Badovskaya, Alexander Gutnikov (2020). DDoS attacks in Q1 2020 https://securelist.com/ddos-attacks-in-q1-2020/96837/ (accessed on 5 February 2021)
  27. PCI Security Standards Council (2014). Information Supplement: Best Practices for implementing a Security Awareness Program, Security Awareness Program Special Interest Group PCI Security Standards Council. Available at: https://pcisecuritystandards.org/documents/PCI_DSS_V1.0_Best_ Practices_for_Implementing_Security_Awareness_Program.pdf (accessed on 5 February 2021)
  28. Richard Donegan (2012). Bullying and Cyberbullying: History, Statistics, Law, Prevention, and Analysis, The Elon Journal of Undergraduate Research in Communications, 3: 33-42.
  29. Saroj Mehta & Vikram Singh, (2013), Study of Awareness about Cyber Laws in the Indian Society, International Journal of Computing and Business Research, 4(1).
  30. Shang, Y., (2013). Discrete-time epidemic dynamics with awareness in random networks, International Journal of Biomathematics, 6(2):13500071-7. https://doi.org/10.1142/S1793524513500071
  31. Shipra, R.K, Sumam, A.Y., Smita, S., & Akansha, S., (2016). Recommendations for Effective Cyber Security Execution. 2016 1st International Conference on Innovation and Challenges in Cyber Security (ICICCS 2016).
  32. Steven Morgan, (2020). Cybercrime to cost the world $10.5 Trillion annually by 2025. https://cybersecurityventures.com/hackerpocalypse-original-cybercrime-report-2016/ (accessed on 5 February 2021)
  33. Tahir Hussain Bhat & Afaq Alam Khan (2015). Cybercrimes, Security and Challenges, Published in International Journal of Advanced Research in Computer and Communication Engineering, 4(5): 2319-5940. https://doi.org/10.17148/IJARCCE.2015.45108
  34. Taylor, R.W., Fritsch, E.J., & Liederbach, J., (2015). Digital crime and digital terrorism. (3rd ed.). Upper Saddle River, NJ: Pearson.
  35. UNODC (United Nations Office on Drugs and Crime). Available online: https://unodc.org/documents/Advocacy-Section/UNODC_-_CYBERCRIME_AND_COVID19_-_Risks_and_Responses_v1.2_-_14-04-2020_-_CMLS-COVID19-CYBER1_-_UNCLASSIFIED_BRANDED.pdf
  36. Zhao, J. J., Zhao, S. Y., & Zhao, S. Y. (2010). Opportunities and threats: A security assessment of state e-government websites. Government Information Quarterly, 27(1), 49–56. http://dx.doi.org/10.1016/j.giq.2009.07.004.