Combatting Cybercrime in West Africa: Assessing the Role of the Economic Community of West African States (ECOWAS) as a Capable Guardian
Abstract

The study examines the role of the Economic Community of West African
States (ECOWAS) as a capable guardian in combating cybercrime within
West Africa. To do this, the study adopts routine activity theory (RAT) as a
theoretical framework. RAT states that crime can only occur when likely
offenders and potential targets converge in place and time without a
capable guardian, underscoring the vital role of a capable guardian in
crime prevention. Relying on secondary data, the study reveals that the
ECOWAS has initiated various measures (legislation, workshops, regional
meetings, capacity-building programmes, and partnerships) in its bid to
play the role of a capable guardian. Furthermore, ECOWAS’s efforts to
combat cybercrime have been hampered by several challenges, including
poor commitment and inadequate funding for cybercrime and
cybersecurity initiatives. The study thus suggests that the ECOWAS ought
to invest in improving cybersecurity expertise and cyber law
harmonisation within the sub-region.
Downloads
References
Adelaja, O. (n.d.). Catching up with the rest of the world: The legal framework of cybercrime in Africa. Retrieved July 22, 2020, from http://afsaap.org.au/assets/Adelaja.pdf
African Union Commission & Symantec. (2016). Cybercrime and cybersecurity trends in Africa. Symantec. https://securitydelta.nl/media/com_hsd/report/135/document/Cyber-security-trends-report-Africa-en.pdf
Alkaabi, A., Mohay, G., McCullagh, A., & Chantler, N. (2010, October 4–6). Dealing with the problem of cybercrime [Paper presentation]. Proceedings of International Conference on Digital Forensics and Cyber Crime. Abu Dhabi, United Arab Emirates.
Atta-Asamoah, A. (2009). Understanding the West African cybercrime process. African Security Review, 18(4), 106–114. https://doi.org/10.1080/10246029.2009.9627562
Calderoni, F. (2010). The European legal framework on cybercrime: Striving for an effective implementation. Crime, Law and Social Change, 54(5), 339–357. https://doi.org/10.1007/s10611-010-9261-6
Cerezo, A. I., Lopez, J., & Patel, A. (2007, August 27–28). International cooperation to fight transnational cybercrime [Paper presentation]. Proceedings of Second International Workshop on Digital Forensics and Incident Analysis. Karlovassi, Greece.
Clough, J. (2012). The council of Europe convention on cybercrime: Defining crime in a digital world. Criminal Law Forum, 23(4), 363–391. https://doi.org/10.1007/s10609-012-9183-3
Council of Europe. (n.d.). Chart of signatures and ratifications of treaty 185. Retrieved June 5, 2020, from https://www.coe.int/en/web/conventions/full-list/-/conventions/treaty/185/signatures?desktop=tru
Digwatch. (2011). Directive C/DIR.1/1/08/11: The directive on fighting cybercrime within ECOWAS. https://dig.watch/resource/directive-fighting-cybercrime-within-ecowas
Duah, F. A., & Kwabena, A. M. (2015). The impact of cybercrime on the development of electronic business in Ghana. European Journal of Business and Social Sciences, 4(1), 22–34
Economic Community of West African States. (2015, May 31). ECOWAS, GPEN, COE host cybercrimes training. https://tit.comm.ecowas.int/?p=10660
Economic Community of West African States. (2017). ECOWAS ICT ministers approve free roaming for west Africa. https://old22.ecowas.int/24641/
Economic Community of West African States. (2019, May 15). ECOWAS Commission urges harmonised strategies and collective expertise to tackle regional security. https://www.ecowas.int/ecowas-commission-urges-harmonised-strategies-and-collective-expertise-to-tackle-regionalsecurity/
Economic Community of West African States. (2020, July 29). ECOWAS encourages engagement and cooperation towards the development of a digital economy at the 12th West Africa Internet Governance Forum (WAIGF). https://www.ecowas.int/ecowas-encourages-engagement-and-cooperation-towards-the-development-of-a-digital-economy-at-the-12th-west-africa-internet-governance-forum-waigf/
Economic Community of West African States. (2021, March 28). Official handover Ceremony for the digital investigation laboratory equipment in Burkina Faso and launch of the cybersecurity awareness campaign. https://www.ecowas.int/official-handover-ceremony-for-the-digital-investigation-laboratory-equipment-in-burkina-faso-and-launch-of-the-cybersecurity-awareness-campaign/
ECOWAS Parliament. (2021). ECOWAS Parliament issues favourable opinion on the adoption for of six community acts. https://www.parl.ecowas.int/ecowas-parliament-adopts-six-community-acts/
European Commission (2020, December 18). EU budget 2021: A kick-start of the European recovery. https://ec.europa.eu/commission/presscorner/detail/en/IP_20_2489
European Union. (2017, September 11–13). ECOWAS and the Council of Europe join forces to help west African countries in the fight against cybercrime. https://www.ecowas.int/ecowas-and-the-council-of-europe-join-forces-to-help-westafrican-countries-in-the-fight-against-cybercrime/
Felson, M., & Cohen, L. E. (1980). Human ecology and crime: A routine activity approach. Human Ecology, 8, 389–406.
Flores. R., Matsukawa, B., Remorin, A., Sancho, D., Yamakazi, T., & Wong, A. (2017). Cybercrime in West Africa: Poised for an underground market. Trend Micro. https://documents.trendmicro.com/assets/wp/wp-cybercrime-in-west-africa.pdf
Global Initiative. (2016). Cybercrime in West Africa: Poised for an underground market by Trend Micro and Interpol. https://globalinitiative.net/cybercrime-in-west-africapoised-for-an-underground-market/
Hill, J. B., & Marion, N. A. (2016). Introduction to cybercrime: Computer crimes, laws, policing in the 21st century. Praeger Publisher.
Holt, T. J., & Bossler, A. M. (2015). Cybercrime in progress: Theory and prevention of technology-enabled offences. Routledge.
Hove, K. (n.d.). The SADC model law on computer crime and cybercrime: A harmonised assault on the right to privacy? Retrieved November 17, 2020, from https://www.veritaszim.net/node/1787
International Telecommunication Union. (2013). Cybercrime directive: An explanatory notice. Geneva: ITU. https://www.itu.int/en/ITU-D/Projects/ITU-EC-ACP/HIPSSA/Documents/FINAL%20DOCUMENTS/FINAL%20DOCS%20ENGLISH/cybercrime_directive-explanatory_notice.pdf
International Telecommunication Union. (2015). ECOWAS. https://www.itu.int/en/ITU-D/Cybersecurity/Pages/gpECOWAS.aspx
International Telecommunication Union. (2019). Global cybersecurity index 2018. https://www.itu.int/dms_pub/itu-d/opb/str/D-STR-GCI.01-2018-PDF-E.pdf
Internet Governance Forum. (n.d.). About us. Retrieved July 22, 2020, from https://waigf.ecowas.int/about-us/
Interpol. (2015, September 30). INTERPOL launches first national electronic police information system for West African countries. https://www.interpol.int/en/News-andEvents/News/2015/INTERPOL-launches-first-national-electronic-police-informationsystem-for-West-African-countries
Interpol. (2020). West Africa police information system (WAPIS). https://www.interpol.int/en/How-we-work/Capacity-building/WAPIS-Programme
Interpol. (n.d.). Cybercrime. Retrieved July 22, 2024, from https://www.interpol.int/Crimes/Cybercrime
Jamil, Z. (2012). Global fight against cybercrime: Undoing the paralysis. Georgetown Journal of International Affairs, 109–120. https://www.jstor.org/stable/43134344
Kaimba, B. (2017). Africa cybersecurity report 2017. Serianu. https://www.serianu.com/downloads/NigeriaCyberSecurityReport2017.pdf
Kshetri, N. (2019). Cybercrime and cybersecurity in Africa. Journal of Global Information Technology Management, 22(2), 77–81.
Leukfeldt, E. R., & Yar, M. (2016). Applying routine activity theory to cybercrime: A theoretical and empirical analysis. Deviant Behavior, 37(3), 263–280. https://doi.org/10.1080/01639625.2015.1012409
Madero-Hernandez, A., & Fisher, B. S. (2012). Routine activity theory. In F. T. Cullen & P Wilcox (Eds.), The oxford handbook of criminological theory. Oxford Academic. https://doi.org/10.1093/oxfordhb/9780199747238.013.0027
Malby, S., Mace, R., Holterhof, A., Brown, C., Kascherus, S., & Ignatuschtschenko, E. (2013). Comprehensive Study on Cybercrime. United Nations. https://www.unodc.org/documents/organized-crime/UNODC_CCPCJ_EG.4_2013/CYBERCRIME_STUDY_210213.pdf
Miró, F. (2014). Routine activity theory. In J. M. Miller (Ed.), The encyclopedia of theoretical criminology (pp. 1–7). Wiley Online Library.
Musuva-Kigen, P., Ekpeke, M., Inkoom, E., Inkoom, B., Masesa, D., Kaimba, B., Kimani, K., Mwangi, M., Munyendo, B., Mueni, F., Ndegwa, D., Wanjuki, S., Rishad, N., Keige, S., Karanja, J., Soita, H., Ngari, A. N., Nturibi, B. M., Ndegwa, D., … Mbae, K. (2016). Africa cybersecurity report 2016. Serianu. https://www.serianu.com/downloads/AfricaCyberSecurityReport2016.pdf
Ndubueze, P. N. (2020). Cybercrime and legislation in an African context. In T. J. Holt & A. M. Bossler (Eds.), The palgrave handbook of international cybercrime and cyberdeviance (pp. 345–364). Springer.
Orji, U. J. (2015). Multilateral legal responses to cyber security in Africa: Any hope for effective international cooperation? [Paper presentation]. Proceedings of 7th International Conference on Cyber Conflict: Architectures in Cyberspace. Tallinn, Estonia.
Orji, U. J. (2019a). A review of the ECOWAS cybercrime directive- analysis of ICT offences with the Budapest convention and key challenges hindering its implementation in member states. Computer Law Review International, 20(2), 40–53.
Orji, U. J. (2019b). An inquiry into the legal status of the ECOWAS cybercrime directive and the implications of its obligations for member states. Computer Law & Security Review, 35(6), Article e105330. https://doi.org/10.1016/j.clsr.2019.06.001
Paoli, L., Visschers, J., & Verstraete, C. (2018). The impact of cybercrime on businesses: A novel conceptual framework and its application to Belgium. Crime, Law and Social Change, 70(4), 397–420.
Pasculli, L. (2020). The global causes of cybercrime and state responsibility: Towards an integrated interdisciplinary theory. Journal of Ethics and Legal Technologies, 2(1), 48–74.
Pratt. T. C., Holtfreter, K., & Reisig, M. D. (2010). Routine online activity and internet fraud targeting: Extending the generality of routine activity theory. Journal of Research in Crime and Delinquency, 47(3), 267–296. https://doi.org/10.1177/0022427810365903
Saravade, N. (2016). International and regional responses to cybersecurity challenges. In C. Samuel & M. Sharma (Eds.), Securing cyberspace: International and Asian perspectives (pp. 244–254). Pentagon Press and Institute for Defence Studies and Analyses
Sasu, D. D. (2024, January 30). Female adult literacy rate in West Africa in 2018, by country. Statista. https://www.statista.com/statistics/1122662/female-adult-literacy-rate-inwest-africa-by-country/
Schjolberg, J. S. (2008). The history of global harmonization on cybercrime legislation–the road to Geneva. Journal of International Commercial Law and Technology, 1(12), 1–19.
Scroxton, A. (2021, March 24). UK faces significant cyber talent shortfall. Computer Weekly. https://www.computerweekly.com/news/252498337/UK-faces-significant-cyber-talent-shortfall
Shaw, M. (2018, January 9). Known unknowns: The threat of cybercrime in Africa. Institute for Security Studies. https://issafrica.org/iss-today/known-unknowns-the-threat-of-cybercrime-in-africa
Shinder, D. L., & Cross, M. (2008). Scene of the cybercrime (2nd ed.). Syngress.
Stalans, L. J., & Donner, C. M. (2018). Explaining why cybercrime occurs: Criminological and psychological theories. In H. Jahankhani (Ed.), Cyber criminology (pp. 25–45). Springer.
Swiatkowska, J. (2020). Tackling cybercrime to unleash developing countries’ digital potential. Pathways for Prosperity Commission. https://pathwayscommission.bsg.ox.ac.uk/node/299/
The Council of Europe. (2018, November 12–15). GLACY+: Second regional training on cybercrime for the ECOWAS countries and Mauritania. https://www.coe.int/en/web/cybercrime/glacyplusactivities/-/asset_publisher/ekq5KxUZwAqU/content/ecowas
The NATO Cooperative Cyber Defence Centre of Excellence [CCDCOE] (n.d.). Economic community of West African States. Retrieved April 30, 2020, from https://ccdcoe.org/organisations/ecowas/
The New Humanitarian. (2009, April 22). Combating world’s lowest literacy rate. https://www.thenewhumanitarian.org/news/2009/04/22/combating-worlds-lowest-literacy-rates
United Nations Trade and Development. (2015). Review of e-commerce legislation harmonization in the Economic Community of West African States. https://unctad.org/publication/review-e-commerce-legislation-harmonization-economic-community-west-african-states
United Nations Trade and Development. (2021, December 14). Cybercrime legislation worldwide. https://unctad.org/page/cybercrime-legislation-worldwide
United Nations Trade and Development. (2019). Cybercrime legislation worldwide. https://unctad.org/en/Pages/DTL/STI_and_ICTs/ICT4D-Legislation/eComCybercrimeLaws.aspx
Vanheukelom, J. (2017). Understanding the economic community of West African States: Political traction with Africa’s oldest regional organization. The European Centre for Development Policy Management. https://ecdpm.org/wp-content/uploads/ECOWAS-Background-Paper-PEDRO-PoliticalEconomy-Dynamics-Regional-Organisations-Africa-ECDPM-2017.pdf
Vogel, J. (2007, November 18–23). Towards a global convention against cybercrime [Paper presentation]. Proceedings of First World Conference of Penal Law. Penal Law in the 21st Century, Guadalajara, Mexico.
Yar, M. (2006). Cybercrime and society. Sage Publication.
Copyright (c) 2024 Tahir Ijaiya

This work is licensed under a Creative Commons Attribution 4.0 International License.