You are on page 1of 14

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/319878633

Promoting cybersecurity awareness and resilience approaches, capabilities and


actions plans against cybercrimes and frauds in Africa

Article in International Journal of Cyber-Security and Digital Forensics · September 2017


DOI: 10.17781/P002278

CITATIONS READS

5 1,759

2 authors:

Ernest Tambo Adama Kazienga


University of the Witwatersrand CRUN
173 PUBLICATIONS 1,828 CITATIONS 16 PUBLICATIONS 43 CITATIONS

SEE PROFILE SEE PROFILE

All content following this page was uploaded by Ernest Tambo on 18 September 2017.

The user has requested enhancement of the downloaded file.


International Journal of Cyber-Security and Digital Forensics (IJCSDF) 6(3): 126-138
The Society of Digital Information and Wireless Communications (SDIWC), 2017 ISSN: 2305-0012

Promoting cybersecurity awareness and resilience approaches, capabilities and actions


plans against cybercrimes and frauds in Africa

Ernest Tambo1,2* , Kazienga Adama3


1
Africa Disease Intelligence and Surveillance, Communication and Response (Africa DISCoR)
Institute, Yaoundé, Cameroon

2Higher Institute of Health Sciences, Université des Montagnes, Bangangté, Cameroun

3 Department of ehealth and Telemedicine Management, Rome Business School, Rome, Italy

*Corresponding author: tambo0711@gmail.com

Abstract be accountable for cyber-attacks, hacking,


automated frauds and epidemic proportions
The rapidly growing broadband internet and of ransomware worldwide. Here, authors
mobile applications penetration and uptake analyzes cybercrimes and mobile money
provide immense opportunities and frauds activities in most affected African
challenges across Africa. There is an countries and highlights practical and cost-
increasing concern to national and regional effective awareness and capability
security due to incidence and impact (cost)of approaches and strategies in building and
cybercrime emergence and spread, establishing local and regional cooperation
cyberespionage and attack (e.g., hacking, and collaboration for secured,effective and
hijacking or illegitimate and illegal use) of sustainable cyberspace information and data
governments, private and public firms and sharing and business transactions. Moreover,
other stakeholders’ domains endangering promoting personal data and information
healthy business, survival and performance rights and privacy to e-commerce/e-
opportunities in most African countries. Yet, transaction legislations and regulations best
only 11 (20.3%) out of 54 countries has practice is crucial against cyber-attacks and
implemented cybersecurity (CS) laws and its impact, in increasing productivity and
regulations. Promoting cybersecurity and sustainable economic prosperity in Africa.
cyberspace preparedness and rapid response
initiatives, preventive and protective Key words: Mobile money, cybersecurity,
countermeasures are vital and imperative. cybercrime, rights, privacy, cyber-
The rise of the digital economy is not just legislation, surveillance, data, evidence,
changing how organizations conduct monitoring, Africa
business. Cybersecurity is a strategic
decision by governments, industries,
businesses and consumers driving this Introduction
change need to step up their capabilities and

126
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 6(3): 126-138
The Society of Digital Information and Wireless Communications (SDIWC), 2017 ISSN: 2305-0012

Cyber-security (CS) is a major concern to boosting personal and organizations data


national and regional security in most and information security, awareness and risk
African countries, governments and communication on potential inside and
investors since the adoption of CS outside vulnerabilities or attacks and impact.
declaration by African Head of states at the Our data showed that there is a growing
“Africa Union (AU) convention on internet penetration and users in Africa
cybersecurity and personal data protections” ranging from Kenya (69.07%), Mauritius
in June 2014, Malabo, Equatorial Guinea. (62.7%), South Africa (52%), Nigeria
Thus far, only 11 (20.3%) out of 54 (47.9%), Algeria and Egypt shared 40%
countries has implemented their CS laws each. The most commonly incidents or
and regulations [1]. The CS aims at cyber-crime cases ranged from web
protecting personal and public/private firms’ applications attacks and malwares, hackers
data and database intellectual property rights and hijackers spread of ransonware, user
(IPR), computer and data sharing network names and passwords to pins, modify log in
standards and benchmarks. It also seeks to and social security number to spam
harmonize cyber legislations on ecommerce, emailsand social media abuse among others.
data protections and CS promotion from any South Africa and Morocco topped the
incidence of cyber-crimes, cyberespionage incident count list followed by Uganda,
and terrorism, hacking, hijacking or Egypt and Mauritius with estimated costs of
illegitimate and illegal use of private and cybercrime impact of US dollars $573, 25,
public domains [1,2]. Contemporary, the 35, 172 and 30 million respectively in 2016.
rapidly growing broadband internet and Moreover it is documented that Kenya and
mobile applications penetration and uptake Algeria have had huge economic loss on
across Africa has been challenged by the their GDP of $175 and $225 million with
increasing emergence and spread impact of relatively incident of 27,172 and 10,790
cybercrime/attacks on governments, private incident cases in 2016 compared to top
and stakeholders firms endangering healthy listed African countries. The impact of
business, survival and performance incident of cybercrime or cyber-attacks
opportunities [1,2]. At the same time, there including malwares is colossal including
is an increasing cybercrime incidence and huge financial lossestimated at
impact (cost) in Africa due to lack of approximately US $2 billion dollars in 2016
cybersecurity initiatives, lack of only in Africa [3,4]. In general the rate of
preparedness and countermeasures to deal global cybersecurity index (GCI) at country-
with information security threats and cyber level was relatively weak with low global
criminality strategies (forecasting, detection, ranking index on cybersecurity readiness
response and control/containment) based on legal measures, technical
[3].Optimizing standards applications, data measures, organizational measures, capacity
protection and privacy and lack of building and international cooperation
regulations and policies is crucial in assessment(Table 1)

127
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 6(3): 126-138
The Society of Digital Information and Wireless Communications (SDIWC), 2017 ISSN: 2305-0012

Table 1: Pattern of cybercrimes and mobile money frauds activities in most affected
African countries
Countr Pop GDP Instit Inte Mobil Inte Incide Estim Common Common CS and
y ulati per ution rnet e r nt ated mobile money mobile money
on capita (Ban user mone cou count cost transactions in transactions
(mill ($PPP) k) s y ntry (cases) of Africa challenges and
ion) accou (%) accou mob cyberc issues
nt nt ile rime
(%) (2016 mon ($milli
) ey on)
South 54.9 13,179 70 52 27- Yes 220,72 573 Cash in / Cash Lack of technical
Africa 5 35% ( 7 out know-how
5-7 Airtime top up/ inability to monitor
millio e-top-up and defend national
n Digital networks
Morocc 33.3 8,360 41 34.1 Yes 106,14 25 merchant rising incidence of
o 3 4 payment and cyberespionage and
Uganda 34.8 2,067 44 28.6 51%( Yes 63,234 35 bill payment cyberterrorism
5 7.7 (utilities, Malware and
millio transportation, malicious
n) school fees, applications
Egypt 92.8 12,137 14 40.2 Yes 57,204 172 hospital bills, targeted banks and
3 utility and other firms
Mauritu 1.26 20,525 82 62.7 Yes 52,974 30 media bills, e- CS unpreparedness
s commerce or and reliance on
Kenya 45.5 3,360 75 69.0 >70% Yes 27,172 175 retail service traditional fraud
3 7 (26.7 payments, detection
millio hospital bills) unpatched systems
n) Payments of and insecure
Tunisia 10.9 11,657 27 28.6 Yes 25,665 NA salary and applications
8 pension,
Nigeria 173. 5,930 44 47.9 43% Yes 20,158 50 taxation and
0 (53.9 insurance
millio payments).
n) Other bulk
Zimbab 13.0 1,953 32 41.4 Yes 19,319 35 payment
we 6 P2P/G2P and
Algeria 40.1 14,950 50 36.5 Yes 10,790 225 third-parties
and signing
partnerships
with other
players such as:
banks,
insurance
companies,

128
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 6(3): 126-138
The Society of Digital Information and Wireless Communications (SDIWC), 2017 ISSN: 2305-0012

hotel booking
and travel
agencies,
filling stations,
super markets,
Microfinance
Institutions, etc

GDP- Gross domestic product, PPP- threatrepresented 32% of overall cost due to
Purchasing power parity (The global cyberattacks while it was 26% and 15% for
cybersecurity index (GCI) is a countrylevel
attacks on computer and social engineering
global ranking index on cybersecurity
readiness based on legal measures, technical respectively. We documented three are three
measures, organizational measures, capacity main types of insider threats such as the
building and international cooperation. The
malicious insiders, the exploited insiders and
GCI does not seek to determine the efficacy
or success of a particular measure, but the careless insiders, while careless insiders
simply the existence of national structures in are those who can accidentally cause
place to implement and promote
damage or delete critical information by
cybersecurity. The index has a low level of
granularity based on country captured pressing wrong key. The smallest security
cybersecurity data and transactions threat by kind of attacks was the online
commitment and preparedness, but not its fraud and scams at 8% of overall cost in
detailed capabilities or possible
vulnerabilities. The GCI ranged from 0 to 2016. Although the malicious insiders are
1.) the least frequent, they have the potential to

In addition, it is evident from the Figure 1 deliberately steal information as well as

that the insider threat is the biggest security cause damage due to their insider access. In

concern in African organizations and contrast, the exploited insiders could provide

followed by attacks on computers and social sensitive data or password to external parties

engineering and utility theft in 2016. Insider aimed at attacking the system (Figure 1).

129
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 6(3): 126-138
The Society of Digital Information and Wireless Communications (SDIWC), 2017 ISSN: 2305-0012

35
30

Percentage (%)
25
20
15
10
5
0

Type of cyber attacks

Figure 1: Distribution of the cyber-attacks cost per type of attacks in 2016 in Africa

Moreover, Figure 2 illustrated thepercent attacks, while it was website defacements,


economic cost or loss due to cyber-attacks in ransom demands and tax fraud for African
Africa per industryin 2016. The Banking government. In addition, the online fraud,
and Finance service, Government services the credit card fraud, we noted that the
and the E-commerce were the most affected insider fraud and engineering malpractices
and have been facing the greatest number of were the type of cyber-attacks that caused
incidents cost list were 23%, 19%and 16% significantdamages and losses in E-
respectively.In banking sector, the banking commerce and mobile base transaction
malware, the ATM skimming and insider sectors.
threat were the most common type of

130
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 6(3): 126-138
The Society of Digital Information and Wireless Communications (SDIWC), 2017 ISSN: 2305-0012

25

20
Percentage (%)

15

10

Type of industry

Figure 2: Distribution of the cyber-attacks cost per industry in Africa in 2016

There is an urgent need to reinforce regional malwares impact in fostering regional CS


and international comprehensive, context and cyber-wellness (CW) in member-
specific and integrated CS approaches and countries [5]. Nurturing national CS and
measures implementation, multi- CW engagement, leadership commitment,
stakeholders cooperation and collaboration resource mobilization and investment
including technical assistance in African approaches and strategies is needed in
countries. This is crucial in accelerating the establishing local context CS enabling
implementation of the Malabo CS policies and laws. This is essential in
declaration policy, secured legislative formulating evidence-based cyberspace
framework and actions plans priorities and initiatives in ensuring digital
implementation [5]. Moreover, defining key technology and mobile applications security,
CS terminologies, cyber legislation, policies CS and CW research and development
and regulations) against cybercrimes and innovations in accelerating local/global

131
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 6(3): 126-138
The Society of Digital Information and Wireless Communications (SDIWC), 2017 ISSN: 2305-0012

financial security and economic prosperity. empowerment approaches is of significance


This paper aims at providing an overview of on internet technology and mobile
CS and CW opportunities and challenges in applications services delivery on local and
promoting public and communities CS and regional economy growth. Likewise,
CW awareness campaigns and capacity increasing community or citizenry
development on information and technology awareness and education strategies on
risks including malware incidents, cybersecurity vulnerabilities and threats is
cyberattacks and ransomware, fraudulent paramount through online programs, media
transactions prevention and control (Radio, TV) or trusted and reliable social
capabilities en masse. media guidelines and instructions,
comprehensive preparedness programs
First, there is an urgent need to promote
[1,2,5]. Moreover, cyberspace technical
CS and CW awareness campaigns on
assistance and technology transfer training
data and information security, citizen
workshops and forums among government,
rights data informed consent and privacy,
private sector and stakeholders including
data sharing and monitoring of
community is important towards supporting
contextual performance and effectiveness
risk management and decisions choice (s).
management against cyber-attacks and
Investing in cybersecurity capabilities
malware threats and impact. Moreover,
development and implementation of is vital
evaluation of current CS preparedness
only after detecting an attack or reactive
capabilities is important in moving forward
response, but mainly building organization
economic stability and sustainable
cybersecurity information systems and
development goals (SDGs) in Africa [1,2].
monitoring tools.
Fostering local and national Malabo CS
frameworks, policies and regulations Proactive and strategic local and regional CS
implementation at all levels is paramount to policy, priority direction and access to
build and scale up resource mobilization, resources is imperative for early threat
increases the risk of cyber-attacks awareness hazard identification and threat analysis of
and social mobilization outreach, and all types of vulnerability of cyber/computer
citizenry education. Promoting CS and CW software and hardware attacks and life-
solid foundation of knowledge and lessons threatening hazards. Moreover, enhancing
learned, skills development and knowledge CS resilience and expertise capacity

132
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 6(3): 126-138
The Society of Digital Information and Wireless Communications (SDIWC), 2017 ISSN: 2305-0012

development to prevent, protect against, Third, investing in CS and CW system is


mitigate, respond to and recover from all needed in developing and implementing
cyber-attacks and hazards that affect the effectively cybercrime approaches and
safety, wellbeing and economic security. investment in Africa and globally. It's
crucial to put in place cybercrime laws and
Second, local and international multi-
regulation that transcends all boundaries
stakeholders commitment and
aimed at ensuring confidence and trust in the
initiative(s)is critical in establishing
use of internet including online transactions
country cybersecurity index (CCI)
[1,3,6]. Furthermore, Genuine and
readiness based on assessment of context
sustainable governments, private industries
specific technical and organizational
and stakeholders efforts establishing a
requirements, local/national structures,
national leadership commitment and
regulations and legal measures, international
resource mobilization in integrated
technical cooperation, assistance and
cybersecurity and cyber emergency response
exchanges, capacity building and
approaches and strategies capacity
capabilities. CCI is of great value in
development degree programs, trainingand
cybersecurity surveillance data and
workshops seminars series to technical
transactions collection and analysis for
assistance for empowerment and resilience
timely cyber vulnerabilities assessment and
is also of crucial importance. Likewise,
early warning alert, promoting preparedness
fostering national and regional CS
and evidence based response
collaboration and synergy in scaling up
implementation [1,6]. Furthermore,
efforts in reducing and/or combating
implementing CS and CW monitoring and
indiscriminate cybercrimes/-attacks at
evaluation systems actions to determine the
personal, private, public organizations and
efficacy/performance or success to further
international levels [1,5] (Table 2).
improve local, regional and global security
is vital.

Table 2: Summary of key cybersecurity core capabilities and activities

Cybersecurity Core Capabilities Activities and Opportunities


Policy, regulations and frameworks planning

133
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 6(3): 126-138
The Society of Digital Information and Wireless Communications (SDIWC), 2017 ISSN: 2305-0012

Public information screening, detection and early warning


Preparedness Operational coordination, access Control and identity verification
and Prevention Cybersecurity intelligence and Information Sharing
Risk management for protection programs
Supply chain integrity and security and physical protective measures
Mitigate existing and potential CS incident impact
Public Community social mobilization ad awareness
Mitigation Long-term CS Community resilience and vulnerability reduction
CS risk and disaster resilience assessment
CS threats and hazards capacity building and trainings
Critical response, health data and information safety
Respond to CS incidents, cybercrimes and attacks or internet frauds
Response CS infrastructure systems and workforce management
Supply chain management logistics and public CS operations
Laws enforcement and operational Communications
Public healthcare and emergency services situational assessment
Economic recovery health and social Services
Recovery Housing and infrastructure systems
Natural and cultural resources

Improving and sustaining current CS and CS intelligence and information sharing and
mobile money services capabilities requires support necessary physical, technological,
ongoing preparedness and response capacity and cyber measures. It is needed for
development, trainings and exercises (drills continuous CS public forensic tracing or
scenario) activities important to ensure sensor technologies analysis, digital, and/or
effective emergency response as well as biometric evidence within 24 hours of an
promoting prevention to recovery or attack to identify the perpetrator(s) and
restoration programs for socio-economic and prevent or gathering priorities in response to
financial activities power and growth. There a dynamic threat or future attacks follow-on
is need for Africa institutions and acts and/or swiftly develop counter-options.
governments to promote and strengthening This is important in providing timely,

134
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 6(3): 126-138
The Society of Digital Information and Wireless Communications (SDIWC), 2017 ISSN: 2305-0012

accurate, and actionable information dissemination, evaluation, and feedback in


resulting from CS and CW planning, order to develop innovative initiatives to
direction, collection, exploitation, mitigate the effects of future incidents and
processing, analysis, production, cyber-threats (Table 2).

Fourth, strengthening capacity negative consequences and economic losses


development in CS and CW across Africa and worldwide.
implementation framework in securing
cyber space is crucial for states to harness Fifth, fostering research and development
information and communication in CS, digital forensic and monitoring and
technology (ICT), mobile health services, evaluation is crucial towards achievement
mobile money and social media advantages of a secured and reliable cyberspacein
and benefits in increasing economic, Africa. Such operational CS research will
political and social productivity spheres provide local financial organizations,
[1,2,6,7]. There is an urgent need to fill the universities and organizations opportunities
gap of CS experts or certified professionals to develop a robust cyber and mobile money
shortage, lack of knowledge about the type ecosystem policy, a vibrant digital and ICT
and range of uncertainties, a high level of security, privacy, accountability and
complexity, the nature of connections transparency. Likewise, strengthening
between entities, and little opportunity to African institutions capabilities to protect,
predict future events by investing in prevent and defend their infrastructure,
universities and organizations related to coordinated, prompt, reliable and actionable
research and development in security by information and services against internal or
creating of new degree programs in security external cyber-attacks, e transactions and
in Africa (Table1). Ensuring stable and internet frauds crimes. Preventing cyber-
consistent secure cyber space needs attacks and frauds involves intelligence and
development of new cyberspace knowledge deterrence operations; heightened
and know-how capacity, building consistent inspections; improved surveillance and
data and effective metrics related to cyber- security operations; investigations;
attacks, CS degree programs educationaland education and training; enhanced advanced
trainingprogramsinuniversities,and digital technology detection capabilities;
empowerment both students and Financial and public health technologies
professional careers development as well as surveillance, and testing processes; and law
supporting ICT and social media platform enforcement operations is core through
resources [1,2,5,7]. There is an urgent need implementation and reviewing constantly
to build sustainable capacity and capability risk-informed guidelines consistent with
in digital security intelligence and analytics national and international standards to
that empowerment to rapidly detect, respond maintain compliance, regulations and
to and neutralize cybercrimes/attacks standards. But also, to ensure resilient and
reliable public and financial institutions

135
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 6(3): 126-138
The Society of Digital Information and Wireless Communications (SDIWC), 2017 ISSN: 2305-0012

security, reliability, integrity and availability mobility and heterogeneity of devices,


of critical data and information, records and expensive and specialized CS hardware-
communications systems through based tools, big data volume, velocity and
collaborative and coordinated cybersecurity variety of data, reporting and sharing of data
efforts including enforcement agencies to policy and best practice, Moreover, the lack
detect malicious activities. Response of legal and regulatory framework practices
activities include: applying intelligence and to prevent and fight cybercrime, private and
other information to lessen the effects or public security systems consent directives
consequences of an incident; increasing and best practices, audit collection and
security and law enforcement operations; privacy, communication and monitoring in
continuing investigations into the nature and taking effective and trustful counter-
source of the threat; continuing surveillance measures in neutralizing any threat [1,5,8,9].
and testing processes; and allowing Hence, building CS network of cooperative
appropriate and sufficient community relationships, collaboration and community
preparedness and response capabilities. involvement is imperative across Africa.
With the rapid growth of internet and mobile
Sixth, addressing CS and mobile money devices users within and across Africa, there
multiple challenges and issues that is an urgent need to enhance authentication
African countries are facing is crucial due and access control in diverse portals and
to lack of local/regional cyber security networks taking into account factors related
surveillance and monitoring of incidence electronic data fluidity, persistence stress
cyber-attacks (e.g. WannaCry), cyber- and changing environment [1,10,11,12].
espionage and cyber-terrorism know-how This requires new mobile money and
and shortage of skilled cybersecurity internet of things safety and security
professionals. Cyber-attack/crime is the innovations and measures across-industries
fastest growing crime showed that without a strategic approach and intelligence sharing
effective and robust intelligence cyber mechanisms in order to avoid financial and
defense development and implementation, it economic destabilization and fraudulent
is estimated that cyber crime impact will online business transactions impact on hard-
cost over $6 trillion annually by 2021 with won national economic transformations and
over 20 billion online consumers or users gains. However, implementing cybersecurity
worldwide. Accelerating CS resource and best practices across an increasingly
capacity is essential in increasing CS unstructured and decentralized network is
security through infrastructure and human one of the most difficult challenges facing
specialized training and resources companies and governments. Consumer-
strengthening, increasing internet/social driven technology and artificial intelligence
media security and risk assessment, access systems interconnected systems drives new
control monitoring, confidentiality and devices and monitoring organizations are
authentication credential management. losing control of traditional security
Others challenges and drawbacks include methods over online users and social media
societal digitalization and globalization,

136
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 6(3): 126-138
The Society of Digital Information and Wireless Communications (SDIWC), 2017 ISSN: 2305-0012

networks. Cybersecurity R&D on emerging global market and share losses. Strategic CS
landscape and best practices need to and CW innovations on technologies and
reevaluate and establish contextual users tools development and implementation
security and trust capabilities from bottom- needs, and organizational management are
up improvements, device to level capital for societal benefits in Africa. This is
perspective instead of centrally-controlled, crucialin reducing cyber-attacks and
top-down actions [13,14]. Establishing and malwares threats and evolving challenges
strengthening robust, reliable and CS incidence and averting the colossal financial
resilience capabilities across all and socio-economic impact. Robust public
communities in Africa and worldwide is and private big data and cybersecurity
wealth and present multifaceted benefits to partnership and investment efforts are
prevent, protect against, mitigate, respond to crucial in defining optimal and effective CS
and recover from the public cyber-threats and ICT capabilities and requirements (e.g.:
and hazards impact over time [15]. Lastly, indicators, standards ad benchmarks)
Scaling up funding investment and integration, knowledge and skills
collective efforts should be devoted to development against CS intruders and other
establish CS surveillance, resilience mobile money threats. Building public and
indicators and benchmarks in guiding community CS communication and
evidence-based high value information and engagement resilience, readiness and
services assets, monitoring and evaluation of capability is crucial in promoting public and
effectiveness against crippling of computer community CS and CW policy and
machines, outbreak of sophisticated cyber- capabilities, awareness campaigns and
attacks and digital ransom collateral engagement and empowerment in reducing
damages worldwide. cybercrime. Evidence-based event-specific
CS laws and regulations implementation is
also needed in ensuring safe and effective
Conclusions electronic or digital commerce/transaction
cyber emergency implementation, personal
There is an urgent need to increasing data and information rights and privacy
cybersecurity capabilities and cooperation laws. As well as building trusted and reliable
by investing in building secured, reliable cyberspace and cyber-security environment
and sustained cyber space decision making including cyberforensic data sharing,
platforms and frameworks. Unleashing CS research and development agenda in guiding
leadership role and commitment is necessary effective preparedness and best practices
to establish a CS and operating platform of actions including early detection ,timely
all stakeholders including Microsoft, protection and response or countermeasures
Google, Apple, Facebook, Banks, modeling, monitoring and evaluation to
governments, and others private sectors on cybercrimes/attacks consequences on Africa
cyberattacks incidents affecting local and productivity and economic prosperity.
Author contributions

137
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 6(3): 126-138
The Society of Digital Information and Wireless Communications (SDIWC), 2017 ISSN: 2305-0012

ET conceived the idea and performed the review of modern threats and trends. Technol Health
Care; 25(1):1-10 (2017).
preliminary search and wrote the outline.
AK prepared the table. ET, AK and HFS 7. Mackey TK, Nayyar G. Digital danger: a review of
the global public health, patient safety and
provided additional contextual information
cybersecurity threats posed by illicit online
in Africa. ET thoroughly revised the pharmacies. Br Med Bull; 118(1):110-26 (2016).
manuscript. Authors read and approved the
8. Ropp R, QuammenB. Build your defense! Develop
final version. a strategic plan of action to combat cybercrime.
Health Manag Technol;36(10):8-9 (2015).
Conflict of interest
9. Luna R, Rhine E, Myhra M, Sullivan R, Kruse CS.
Both authors have no competing interests. Cyber threats to health information systems: A
systematic review. Technol Health Care. 24(1):1-9
(2016).
Funding
10. Canetti Daphna, Gross Michael, Waismel-Manor
No funding was received Israel, Levanon Asaf, and Cohen Hagit. How
Cyberattacks Terrorize: Cortisol and Personal
References Insecurity Jump in the Wake of Cyberattacks.
Cyberpsychology, Behavior, and Social Networking;
1. Waldrop MM. How to hack the hackers: The 20(2): 72-77 (2017).
human side of cybercrime. Nature 2016,
11. Aransiola JO, Asindemade SO. Understanding
12;533(7602):164-7. cybercrime perpetrators and the strategies they
2. African Union Directorate of Information and employ in Nigeria. Cyberpsychol Behav Soc Net,
Communication, “Press Release Nº18/23rd AU 14(12):759-63 (2011).
SUMMIT, The 23rd Ordinary Session of the African
12. Yaghoobi A, Mohammadzade S, Chegini AA,
Union ends in Malabo,” press release, 30 June
Yarmohammadi Vasel M, Zoghi PaidarMR. The
2014,http://summits.au.int/en/sites/default/files/PR%
Relationship Between Attachment Styles, Self-
2018%20-%2023rd%20AU%20A...(3).pdf Monitoring and Cybercrimein Social Network Users.
3. African Union, http://au.int/en/cyber Int J High Risk Behav Addict. 5(3):e27785 (2016).
legislation(accessed 12th March 2016) 3. Draft
13. Check Hayden E. Cybercrime fight targets user
African Union Convention on the Establishment of a
error. Nature; 518(7539):282-3 (2015).
credible legal framework for cyber security in Africa.
African Union, http://au.int/en/cyberlegislation (15th 14. Ernest Tambo, Ghislaine Madjou , Christopher
March 2017) Khayeka-Wandabwa , Emmanuel N. Tekwu ,
Oluwasogo A. Olalubi, Nicolas Midzi , Louis
4. Ephram Percy Kenyanito. Africa moves towards a
Bengyella , Ahmed A. Adedeji , Jeanne Y. Ngogang.
common cyber security legal framework.
Can free open access resources strengthen
https://www.accessnow.org/africa-moves-towards-a-
knowledge-based emerging public health priorities,
common-cyber-security-legal-framework/ (accessed
policies and programs in Africa? F1000Research,
27th March 2017)
5:853 (2016).
5. Canetti D, Gross M, Waismel-Manor I, Levanon
15. Tambo Ernest, GhislaineMadjou, Yves Mbous,
A, Cohen H. How Cyberattacks Terrorize: Cortisol
Oluwasogo A Olalubi, Clarence Yah, Ahmed A
and Personal Insecurity Jump in the Wake of
Adedeji and Jeanne YonkeuNgogang. Digital health
Cyberattacks. Cyber psycho Behav Soc Netw;
implications in health systems in Africa. Eur J of
20(2):72-77 (2017). Pharmaceutical and Medical Research 2016,3(1),
6. Kruse CS, Frederick B, Jacobson T, Monticone 91-93
DK. Cybersecurity in healthcare: A systematic

138

View publication stats

You might also like