Combatting Cybercrime in West Africa: Assessing the Role of the Economic Community of West African States (ECOWAS) as a Capable Guardian

  • Tahir Ijaiya Nigerian Institute of Social and Economic Research (NISER)
Keywords: ECOWAS, Cybercrime, West Africa, Routine Activity Theory

Abstract

Abstract Views: 0

The study examines the role of the Economic Community of West African
States (ECOWAS) as a capable guardian in combating cybercrime within
West Africa. To do this, the study adopts routine activity theory (RAT) as a
theoretical framework. RAT states that crime can only occur when likely
offenders and potential targets converge in place and time without a
capable guardian, underscoring the vital role of a capable guardian in
crime prevention. Relying on secondary data, the study reveals that the
ECOWAS has initiated various measures (legislation, workshops, regional
meetings, capacity-building programmes, and partnerships) in its bid to
play the role of a capable guardian. Furthermore, ECOWAS’s efforts to
combat cybercrime have been hampered by several challenges, including
poor commitment and inadequate funding for cybercrime and
cybersecurity initiatives. The study thus suggests that the ECOWAS ought
to invest in improving cybersecurity expertise and cyber law
harmonisation within the sub-region.

Downloads

Download data is not yet available.

References

Adelaja, O. (n.d.). Catching up with the rest of the world: The legal framework of cybercrime in Africa. Retrieved July 22, 2020, from http://afsaap.org.au/assets/Adelaja.pdf

African Union Commission & Symantec. (2016). Cybercrime and cybersecurity trends in Africa. Symantec. https://securitydelta.nl/media/com_hsd/report/135/document/Cyber-security-trends-report-Africa-en.pdf

Alkaabi, A., Mohay, G., McCullagh, A., & Chantler, N. (2010, October 4–6). Dealing with the problem of cybercrime [Paper presentation]. Proceedings of International Conference on Digital Forensics and Cyber Crime. Abu Dhabi, United Arab Emirates.

Atta-Asamoah, A. (2009). Understanding the West African cybercrime process. African Security Review, 18(4), 106–114. https://doi.org/10.1080/10246029.2009.9627562

Calderoni, F. (2010). The European legal framework on cybercrime: Striving for an effective implementation. Crime, Law and Social Change, 54(5), 339–357. https://doi.org/10.1007/s10611-010-9261-6

Cerezo, A. I., Lopez, J., & Patel, A. (2007, August 27–28). International cooperation to fight transnational cybercrime [Paper presentation]. Proceedings of Second International Workshop on Digital Forensics and Incident Analysis. Karlovassi, Greece.

Clough, J. (2012). The council of Europe convention on cybercrime: Defining crime in a digital world. Criminal Law Forum, 23(4), 363–391. https://doi.org/10.1007/s10609-012-9183-3

Council of Europe. (n.d.). Chart of signatures and ratifications of treaty 185. Retrieved June 5, 2020, from https://www.coe.int/en/web/conventions/full-list/-/conventions/treaty/185/signatures?desktop=tru

Digwatch. (2011). Directive C/DIR.1/1/08/11: The directive on fighting cybercrime within ECOWAS. https://dig.watch/resource/directive-fighting-cybercrime-within-ecowas

Duah, F. A., & Kwabena, A. M. (2015). The impact of cybercrime on the development of electronic business in Ghana. European Journal of Business and Social Sciences, 4(1), 22–34

Economic Community of West African States. (2015, May 31). ECOWAS, GPEN, COE host cybercrimes training. https://tit.comm.ecowas.int/?p=10660

Economic Community of West African States. (2017). ECOWAS ICT ministers approve free roaming for west Africa. https://old22.ecowas.int/24641/

Economic Community of West African States. (2019, May 15). ECOWAS Commission urges harmonised strategies and collective expertise to tackle regional security. https://www.ecowas.int/ecowas-commission-urges-harmonised-strategies-and-collective-expertise-to-tackle-regionalsecurity/

Economic Community of West African States. (2020, July 29). ECOWAS encourages engagement and cooperation towards the development of a digital economy at the 12th West Africa Internet Governance Forum (WAIGF). https://www.ecowas.int/ecowas-encourages-engagement-and-cooperation-towards-the-development-of-a-digital-economy-at-the-12th-west-africa-internet-governance-forum-waigf/

Economic Community of West African States. (2021, March 28). Official handover Ceremony for the digital investigation laboratory equipment in Burkina Faso and launch of the cybersecurity awareness campaign. https://www.ecowas.int/official-handover-ceremony-for-the-digital-investigation-laboratory-equipment-in-burkina-faso-and-launch-of-the-cybersecurity-awareness-campaign/

ECOWAS Parliament. (2021). ECOWAS Parliament issues favourable opinion on the adoption for of six community acts. https://www.parl.ecowas.int/ecowas-parliament-adopts-six-community-acts/

European Commission (2020, December 18). EU budget 2021: A kick-start of the European recovery. https://ec.europa.eu/commission/presscorner/detail/en/IP_20_2489

European Union. (2017, September 11–13). ECOWAS and the Council of Europe join forces to help west African countries in the fight against cybercrime. https://www.ecowas.int/ecowas-and-the-council-of-europe-join-forces-to-help-westafrican-countries-in-the-fight-against-cybercrime/

Felson, M., & Cohen, L. E. (1980). Human ecology and crime: A routine activity approach. Human Ecology, 8, 389–406.

Flores. R., Matsukawa, B., Remorin, A., Sancho, D., Yamakazi, T., & Wong, A. (2017). Cybercrime in West Africa: Poised for an underground market. Trend Micro. https://documents.trendmicro.com/assets/wp/wp-cybercrime-in-west-africa.pdf

Global Initiative. (2016). Cybercrime in West Africa: Poised for an underground market by Trend Micro and Interpol. https://globalinitiative.net/cybercrime-in-west-africapoised-for-an-underground-market/

Hill, J. B., & Marion, N. A. (2016). Introduction to cybercrime: Computer crimes, laws, policing in the 21st century. Praeger Publisher.

Holt, T. J., & Bossler, A. M. (2015). Cybercrime in progress: Theory and prevention of technology-enabled offences. Routledge.

Hove, K. (n.d.). The SADC model law on computer crime and cybercrime: A harmonised assault on the right to privacy? Retrieved November 17, 2020, from https://www.veritaszim.net/node/1787

International Telecommunication Union. (2013). Cybercrime directive: An explanatory notice. Geneva: ITU. https://www.itu.int/en/ITU-D/Projects/ITU-EC-ACP/HIPSSA/Documents/FINAL%20DOCUMENTS/FINAL%20DOCS%20ENGLISH/cybercrime_directive-explanatory_notice.pdf

International Telecommunication Union. (2015). ECOWAS. https://www.itu.int/en/ITU-D/Cybersecurity/Pages/gpECOWAS.aspx

International Telecommunication Union. (2019). Global cybersecurity index 2018. https://www.itu.int/dms_pub/itu-d/opb/str/D-STR-GCI.01-2018-PDF-E.pdf

Internet Governance Forum. (n.d.). About us. Retrieved July 22, 2020, from https://waigf.ecowas.int/about-us/

Interpol. (2015, September 30). INTERPOL launches first national electronic police information system for West African countries. https://www.interpol.int/en/News-andEvents/News/2015/INTERPOL-launches-first-national-electronic-police-informationsystem-for-West-African-countries

Interpol. (2020). West Africa police information system (WAPIS). https://www.interpol.int/en/How-we-work/Capacity-building/WAPIS-Programme

Interpol. (n.d.). Cybercrime. Retrieved July 22, 2024, from https://www.interpol.int/Crimes/Cybercrime

Jamil, Z. (2012). Global fight against cybercrime: Undoing the paralysis. Georgetown Journal of International Affairs, 109–120. https://www.jstor.org/stable/43134344

Kaimba, B. (2017). Africa cybersecurity report 2017. Serianu. https://www.serianu.com/downloads/NigeriaCyberSecurityReport2017.pdf

Kshetri, N. (2019). Cybercrime and cybersecurity in Africa. Journal of Global Information Technology Management, 22(2), 77–81.

Leukfeldt, E. R., & Yar, M. (2016). Applying routine activity theory to cybercrime: A theoretical and empirical analysis. Deviant Behavior, 37(3), 263–280. https://doi.org/10.1080/01639625.2015.1012409

Madero-Hernandez, A., & Fisher, B. S. (2012). Routine activity theory. In F. T. Cullen & P Wilcox (Eds.), The oxford handbook of criminological theory. Oxford Academic. https://doi.org/10.1093/oxfordhb/9780199747238.013.0027

Malby, S., Mace, R., Holterhof, A., Brown, C., Kascherus, S., & Ignatuschtschenko, E. (2013). Comprehensive Study on Cybercrime. United Nations. https://www.unodc.org/documents/organized-crime/UNODC_CCPCJ_EG.4_2013/CYBERCRIME_STUDY_210213.pdf

Miró, F. (2014). Routine activity theory. In J. M. Miller (Ed.), The encyclopedia of theoretical criminology (pp. 1–7). Wiley Online Library.

Musuva-Kigen, P., Ekpeke, M., Inkoom, E., Inkoom, B., Masesa, D., Kaimba, B., Kimani, K., Mwangi, M., Munyendo, B., Mueni, F., Ndegwa, D., Wanjuki, S., Rishad, N., Keige, S., Karanja, J., Soita, H., Ngari, A. N., Nturibi, B. M., Ndegwa, D., … Mbae, K. (2016). Africa cybersecurity report 2016. Serianu. https://www.serianu.com/downloads/AfricaCyberSecurityReport2016.pdf

Ndubueze, P. N. (2020). Cybercrime and legislation in an African context. In T. J. Holt & A. M. Bossler (Eds.), The palgrave handbook of international cybercrime and cyberdeviance (pp. 345–364). Springer.

Orji, U. J. (2015). Multilateral legal responses to cyber security in Africa: Any hope for effective international cooperation? [Paper presentation]. Proceedings of 7th International Conference on Cyber Conflict: Architectures in Cyberspace. Tallinn, Estonia.

Orji, U. J. (2019a). A review of the ECOWAS cybercrime directive- analysis of ICT offences with the Budapest convention and key challenges hindering its implementation in member states. Computer Law Review International, 20(2), 40–53.

Orji, U. J. (2019b). An inquiry into the legal status of the ECOWAS cybercrime directive and the implications of its obligations for member states. Computer Law & Security Review, 35(6), Article e105330. https://doi.org/10.1016/j.clsr.2019.06.001

Paoli, L., Visschers, J., & Verstraete, C. (2018). The impact of cybercrime on businesses: A novel conceptual framework and its application to Belgium. Crime, Law and Social Change, 70(4), 397–420.

Pasculli, L. (2020). The global causes of cybercrime and state responsibility: Towards an integrated interdisciplinary theory. Journal of Ethics and Legal Technologies, 2(1), 48–74.

Pratt. T. C., Holtfreter, K., & Reisig, M. D. (2010). Routine online activity and internet fraud targeting: Extending the generality of routine activity theory. Journal of Research in Crime and Delinquency, 47(3), 267–296. https://doi.org/10.1177/0022427810365903

Saravade, N. (2016). International and regional responses to cybersecurity challenges. In C. Samuel & M. Sharma (Eds.), Securing cyberspace: International and Asian perspectives (pp. 244–254). Pentagon Press and Institute for Defence Studies and Analyses

Sasu, D. D. (2024, January 30). Female adult literacy rate in West Africa in 2018, by country. Statista. https://www.statista.com/statistics/1122662/female-adult-literacy-rate-inwest-africa-by-country/

Schjolberg, J. S. (2008). The history of global harmonization on cybercrime legislation–the road to Geneva. Journal of International Commercial Law and Technology, 1(12), 1–19.

Scroxton, A. (2021, March 24). UK faces significant cyber talent shortfall. Computer Weekly. https://www.computerweekly.com/news/252498337/UK-faces-significant-cyber-talent-shortfall

Shaw, M. (2018, January 9). Known unknowns: The threat of cybercrime in Africa. Institute for Security Studies. https://issafrica.org/iss-today/known-unknowns-the-threat-of-cybercrime-in-africa

Shinder, D. L., & Cross, M. (2008). Scene of the cybercrime (2nd ed.). Syngress.

Stalans, L. J., & Donner, C. M. (2018). Explaining why cybercrime occurs: Criminological and psychological theories. In H. Jahankhani (Ed.), Cyber criminology (pp. 25–45). Springer.

Swiatkowska, J. (2020). Tackling cybercrime to unleash developing countries’ digital potential. Pathways for Prosperity Commission. https://pathwayscommission.bsg.ox.ac.uk/node/299/

The Council of Europe. (2018, November 12–15). GLACY+: Second regional training on cybercrime for the ECOWAS countries and Mauritania. https://www.coe.int/en/web/cybercrime/glacyplusactivities/-/asset_publisher/ekq5KxUZwAqU/content/ecowas

The NATO Cooperative Cyber Defence Centre of Excellence [CCDCOE] (n.d.). Economic community of West African States. Retrieved April 30, 2020, from https://ccdcoe.org/organisations/ecowas/

The New Humanitarian. (2009, April 22). Combating world’s lowest literacy rate. https://www.thenewhumanitarian.org/news/2009/04/22/combating-worlds-lowest-literacy-rates

United Nations Trade and Development. (2015). Review of e-commerce legislation harmonization in the Economic Community of West African States. https://unctad.org/publication/review-e-commerce-legislation-harmonization-economic-community-west-african-states

United Nations Trade and Development. (2021, December 14). Cybercrime legislation worldwide. https://unctad.org/page/cybercrime-legislation-worldwide

United Nations Trade and Development. (2019). Cybercrime legislation worldwide. https://unctad.org/en/Pages/DTL/STI_and_ICTs/ICT4D-Legislation/eComCybercrimeLaws.aspx

Vanheukelom, J. (2017). Understanding the economic community of West African States: Political traction with Africa’s oldest regional organization. The European Centre for Development Policy Management. https://ecdpm.org/wp-content/uploads/ECOWAS-Background-Paper-PEDRO-PoliticalEconomy-Dynamics-Regional-Organisations-Africa-ECDPM-2017.pdf

Vogel, J. (2007, November 18–23). Towards a global convention against cybercrime [Paper presentation]. Proceedings of First World Conference of Penal Law. Penal Law in the 21st Century, Guadalajara, Mexico.

Yar, M. (2006). Cybercrime and society. Sage Publication.

Published
2024-12-24
How to Cite
Ijaiya, T. (2024). Combatting Cybercrime in West Africa: Assessing the Role of the Economic Community of West African States (ECOWAS) as a Capable Guardian. Governance and Society Review, 3(2), 24-51. Retrieved from https://journals.umt.edu.pk/index.php/gsr/article/view/5579
Section
Articles