This document discusses cybersecurity challenges in Africa. It notes that while Africa has experienced strong economic growth in recent decades, increased technology and internet usage has also increased vulnerabilities to cybercrime. Cybercrime is growing rapidly in Africa and costs economies millions annually. The document recommends that African countries strengthen policy and legal frameworks around cybersecurity, harmonize laws and standards across countries, increase coordination and cooperation between governments and organizations, and invest in cybersecurity infrastructure to help address these challenges.
Revenue from Digital Technologies to Fund SDGs in AfricaLyla Latif
This presentation focused on how to mobilise additional funds from digital technologied to finance development and also identifed the areas from which illicit finance is moved.
Cybercrime is a growing threat in Macedonia. The number of cybercrimes committed in Macedonia doubled from 2012 to 2013, costing Macedonian companies hundreds of thousands of euros. As more business and citizens conduct activities online, they become more vulnerable to cyberattacks like hacking, phishing, and identity theft. While law enforcement works to combat cybercrime, criminals are often located internationally and face low risks of getting caught. Preventive measures like increasing cybersecurity awareness, employee training, and strengthening legal frameworks can help address this growing issue.
Building a digital Nigeria is an Economist Intelligence Unit report. The findings are based on desk research, interviews and fieldwork in Nigeria conducted by The Economist Intelligence Unit. The research was sponsored by Accenture.
Cybersecurity Context in African Continent - Way ForwardGokul Alex
The slides from the presentation session by Gokul Alex on the Enigmatic Economy of Cyber Crimes and Cyber Attacks across the globe with the specific focus on African Continent ravaging countries such as South Africa, Nigeria, Kenya, etc. Cybersecurity issues are looming large and assuming larger significance in the post pandemic political economies. This presentation was delivered to the TAFFD Virtual Conference on Cybersecurity in July 2020 together with Red Team Hacker Academy and BeyondIdentity.
This document provides an overview of the potential markets for renewable energy in sub-Saharan Africa. It notes that 76% of the population in sub-Saharan Africa does not have access to a central grid system. The region is expected to experience a fourfold increase in energy consumption by 2040. However, the current energy infrastructure is insufficient to meet growing demands. The document evaluates sub-Saharan Africa's energy sector and identifies opportunities for renewable energy sources like solar, wind, hydroelectric, and others to help address the region's energy needs.
The document is the 2019 Africa Visa Openness Index report published by the African Union and African Development Bank. It measures how open African countries are to visitors from other African nations by examining visa requirements. The report found that 47 countries improved or maintained their visa openness scores in 2019. For the first time, Africans now have liberal access to 51% of the continent, up from only 20% in 2016. Countries with more open visa policies tend to see greater foreign investment and economic growth. While progress has been made, more work remains to fully achieve the goal of free movement of people across Africa as outlined in the African Union's Agenda 2063.
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)PwC France
http://bit.ly/Cybersecurite-sept14
Etude mondiale de PwC, CIO et CSO réalisée en ligne du 27 mars 2014 au 25 mai 2014. Les résultats présentés ici sont fondés sur les réponses de plus de 9700 CEO, CFO, CIO, RSSI, les OSC, les vice-présidents et des directeurs de l'information et des pratiques de sécurité de plus de 154 pays.
35 % des répondants sont d'Amérique du Nord, 34 % d'Europe, 14 % d'Asie-Pacifique, 13 % en Amérique du Sud, et 4 % du Moyen-Orient et d’Afrique.
Reference
e-Conomy SEA is a multi-year research program launched by Google and Temasek in 2016. Bain & Company joined the program as lead research partner in 2019. The research leverages Bain analysis, Google Trends, Temasek research, industry sources and expert interviews to shed light on the Internet economy in Southeast Asia. The information included in this report is sourced as “Google & Temasek / Bain, e-Conomy SEA 2019” except from third parties specified otherwise.
Disclaimer
The information in this report is provided on an “as is” basis. This document was produced by and the opinions expressed are those of Google, Temasek, Bain and other third parties involved as of the date of writing and are subject to change. It has been prepared solely for information purposes over a limited time period to provide a perspective on the market. Projected market and financial information, analyses and conclusions contained herein should not be construed as definitive forecasts or guarantees of future performance or results. Google, Temasek, Bain or any of their affiliates or any third party involved makes no representation or warranty, either expressed or implied, as to the accuracy or completeness of the
information in the report and shall not be liable for any loss arising from the use hereof. Google does not provide market analysis or financial projections. Google internal data was not used in the development of this report.
Revenue from Digital Technologies to Fund SDGs in AfricaLyla Latif
This presentation focused on how to mobilise additional funds from digital technologied to finance development and also identifed the areas from which illicit finance is moved.
Cybercrime is a growing threat in Macedonia. The number of cybercrimes committed in Macedonia doubled from 2012 to 2013, costing Macedonian companies hundreds of thousands of euros. As more business and citizens conduct activities online, they become more vulnerable to cyberattacks like hacking, phishing, and identity theft. While law enforcement works to combat cybercrime, criminals are often located internationally and face low risks of getting caught. Preventive measures like increasing cybersecurity awareness, employee training, and strengthening legal frameworks can help address this growing issue.
Building a digital Nigeria is an Economist Intelligence Unit report. The findings are based on desk research, interviews and fieldwork in Nigeria conducted by The Economist Intelligence Unit. The research was sponsored by Accenture.
Cybersecurity Context in African Continent - Way ForwardGokul Alex
The slides from the presentation session by Gokul Alex on the Enigmatic Economy of Cyber Crimes and Cyber Attacks across the globe with the specific focus on African Continent ravaging countries such as South Africa, Nigeria, Kenya, etc. Cybersecurity issues are looming large and assuming larger significance in the post pandemic political economies. This presentation was delivered to the TAFFD Virtual Conference on Cybersecurity in July 2020 together with Red Team Hacker Academy and BeyondIdentity.
This document provides an overview of the potential markets for renewable energy in sub-Saharan Africa. It notes that 76% of the population in sub-Saharan Africa does not have access to a central grid system. The region is expected to experience a fourfold increase in energy consumption by 2040. However, the current energy infrastructure is insufficient to meet growing demands. The document evaluates sub-Saharan Africa's energy sector and identifies opportunities for renewable energy sources like solar, wind, hydroelectric, and others to help address the region's energy needs.
The document is the 2019 Africa Visa Openness Index report published by the African Union and African Development Bank. It measures how open African countries are to visitors from other African nations by examining visa requirements. The report found that 47 countries improved or maintained their visa openness scores in 2019. For the first time, Africans now have liberal access to 51% of the continent, up from only 20% in 2016. Countries with more open visa policies tend to see greater foreign investment and economic growth. While progress has been made, more work remains to fully achieve the goal of free movement of people across Africa as outlined in the African Union's Agenda 2063.
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)PwC France
http://bit.ly/Cybersecurite-sept14
Etude mondiale de PwC, CIO et CSO réalisée en ligne du 27 mars 2014 au 25 mai 2014. Les résultats présentés ici sont fondés sur les réponses de plus de 9700 CEO, CFO, CIO, RSSI, les OSC, les vice-présidents et des directeurs de l'information et des pratiques de sécurité de plus de 154 pays.
35 % des répondants sont d'Amérique du Nord, 34 % d'Europe, 14 % d'Asie-Pacifique, 13 % en Amérique du Sud, et 4 % du Moyen-Orient et d’Afrique.
Reference
e-Conomy SEA is a multi-year research program launched by Google and Temasek in 2016. Bain & Company joined the program as lead research partner in 2019. The research leverages Bain analysis, Google Trends, Temasek research, industry sources and expert interviews to shed light on the Internet economy in Southeast Asia. The information included in this report is sourced as “Google & Temasek / Bain, e-Conomy SEA 2019” except from third parties specified otherwise.
Disclaimer
The information in this report is provided on an “as is” basis. This document was produced by and the opinions expressed are those of Google, Temasek, Bain and other third parties involved as of the date of writing and are subject to change. It has been prepared solely for information purposes over a limited time period to provide a perspective on the market. Projected market and financial information, analyses and conclusions contained herein should not be construed as definitive forecasts or guarantees of future performance or results. Google, Temasek, Bain or any of their affiliates or any third party involved makes no representation or warranty, either expressed or implied, as to the accuracy or completeness of the
information in the report and shall not be liable for any loss arising from the use hereof. Google does not provide market analysis or financial projections. Google internal data was not used in the development of this report.
e-Conomy SEA 2019 report (from Google and Temasek)Duy Hoang
The Internet economy in Southeast Asia has grown rapidly in recent years, surpassing $100 billion in gross merchandise value for the first time in 2019. This represents a nearly 40% increase from 2018 and more than triple the size in 2015. Powered by increasing mobile internet adoption and changing consumer behavior, sectors like e-commerce and ride hailing have seen especially strong growth, becoming integral parts of daily life for many in the region. If growth continues at its current pace, the Internet economy is projected to reach $300 billion by 2025.
This document discusses the growing cyber threats facing organizations today. It notes that as organizations increasingly operate online and digitize their services and information, cyber attacks have risen in scale and sophistication. The document outlines the main types of cyber attacks, including financial crime, espionage, warfare, terrorism, and activism. It emphasizes that effective cyber security requires looking outward beyond organizational boundaries and increasing collaboration between businesses and government. However, the document notes that public-private collaboration on cyber security has not been fully effective so far. Overall, the document argues that as threats in cyberspace escalate, secure information has become a key source of power, and cyber security is a major risk issue that organizations must address.
The document discusses the growing threat of cyber attacks facing all organizations. It notes that no organization is safe from attacks, which are increasing in scale and sophistication. Some key points made include:
- Cyber attacks range from financially motivated crime to espionage to activism and warfare, with financial crime being the most commonly experienced by organizations.
- The boundary-less nature of cyber space and low costs of attacks relative to their impact make threats unpredictable and difficult to defend against.
- Effective cyber security requires looking outward beyond organizational boundaries and increasing collaboration both within sectors and between public and private sectors. However, collaboration is still not working effectively.
- Understanding online business models and protecting the data that represents organizational value are both critical
The document provides an overview of Kenya, including its demographics, economy, trade, and government finances. Some key points:
1) Kenya has a population of over 47 million people, with the majority living in rural areas and belonging to one of the five largest ethnic groups.
2) The economy has grown at an average of 5.5% annually in recent years, led by the services sector. Agriculture remains important, contributing a third of GDP and employing half the population.
3) Exports are led by tea, horticulture, and oil seeds. Imports are dominated by machinery, transportation equipment, and petroleum products. The trade deficit was over $13 billion in 2018.
4) Government debt
This document discusses trends in cybercrime and argues that global cyberspace is safer than commonly believed. It analyzes data on the size of cyberspace, vectors of cyber attacks, occurrence of attacks, and costs of attacks. When normalized for the growing size of cyberspace, the security situation improves rather than deteriorates. Absolute numbers often incorrectly indicate things are getting worse, but normalized numbers show improvements, or slower rates of deterioration. Overall, cybercrime statistics normalized for the expanding online environment show that global cyberspace is far safer than portrayed by media reports and security firms.
Cyberwarfare, also known as cyberterrorism, refers to politically motivated attacks on computer systems and networks. The document discusses various methods of cyberwarfare such as espionage, sabotage, and attacks on critical infrastructure networks. Specific examples of cyberattacks between nations are provided, such as attacks from Russia on Estonia in 2007 and cyber operations between the US and Iran in 2012. The document also examines cybercrime trends in Greece and strategies for improving cybersecurity defenses.
Strategic Database Security Management and Cybercrime Reduction among Youths ...ijtsrd
The purpose of this study is to investigate the relationship between strategic database security management and cybercrime reduction among youth in Information Technology sector in Nigeria. Cross sectional survey design was used for this study. The population of the study comprises 32 information and technology companies in Rivers state. The method of data collection was questionnaire. Data from the distributed questionnaire was further analyzed, using the spearman rank order Correlation Coefficient. The hypotheses of the study were tested through the help of Statistical Package for Social Science SPSS , version 20. Findings revealed that strategic database security management have a significant relationship between the measures cybercrime reduction among youth in information technology companies in Nigeria. Therefore, we recommend that Management of information technology companies should ensure that proper computer security measures are put in place in order to fortify their database from unauthorized persons. Agbeche, Aaron | Elechi, Bobby Chime | Okechukwu, Prince Jumbo "Strategic Database Security Management and Cybercrime Reduction among Youths in Information Technology Companies in Nigeria" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-6 , October 2021, URL: https://www.ijtsrd.com/papers/ijtsrd47643.pdf Paper URL : https://www.ijtsrd.com/management/strategic-management/47643/strategic-database-security-management-and-cybercrime-reduction-among-youths-in-information-technology-companies-in-nigeria/agbeche-aaron
Improving the Information System of Tourist Destinations in the Context of th...ijtsrd
This article discusses how Uzbekistan may improve its smart tourism and tourism information infrastructure of tourist destinations. Because of the technological services supplied to passengers before, during, and after their journey, smart tourism is a terrific way to save not only money, but also nerves and valuable time. The authors remarks, conclusions, and recommendations are included in the paper, as well as an analysis of the pertinent data. Nosirova U. M. "Improving the Information System of Tourist Destinations in the Context of the Digitalization of the Economy" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-6 , October 2021, URL: https://www.ijtsrd.com/papers/ijtsrd47690.pdf Paper URL : https://www.ijtsrd.com/economics/other/47690/improving-the-information-system-of-tourist-destinations-in-the-context-of-the-digitalization-of-the-economy/nosirova-u-m
2009 10 21 Rajgoel Trends In Financial CrimesRaj Goel
The document summarizes trends in various types of financial crimes including data breaches, identity theft, mortgage fraud, and other cybercrimes from 2005 to 2009. It discusses specific cases like the Sony rootkit scandal and fraud involving forged deeds and stolen identities that resulted in people losing their homes. The document also mentions the large economic impact of crimes like telemarketing fraud and the growing problem of botnets and zombie computers being used to steal data and money.
Face Recognition Using ML in Public Transportsijtsrd
Modernization of railways has forever been an issue focused on the development of the fundamental infrastructure of a nation. Since the railways represent one of the most effective modes of transport offered to the people, It is important to keep a check on the security issues that are arising in todays world. According to the need there must be an upgradation in systems we use. One such upgradation is that the role of Artificial Intelligence and e ticketing that is achieved with the assistance of face recognition technology. This technology has been extensively employed as a biometric method and hence can be used for passenger verification. Mangal Kotkar | Shubham Gawade | Shubham Mandavkar | Prathamesh Gujar "Face Recognition Using ML in Public Transports" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-6 , October 2021, URL: https://www.ijtsrd.com/papers/ijtsrd47656.pdf Paper URL : https://www.ijtsrd.com/engineering/information-technology/47656/face-recognition-using-ml-in-public-transports/mangal-kotkar
This document provides an overview of digital trends in India in 2019, including:
- India has a population of 1.361 billion people with 560 million internet users as of January 2019.
- Mobile subscriptions have grown 2.8% annually to reach 1.190 billion, representing 87% of the population.
- Social media usage has increased substantially, with 310 million active users as of January 2019, up 24% from the previous year.
This document provides an overview of the Internet Organised Crime Threat Assessment (IOCTA) for 2015. Some key findings include:
- Cybercrime is becoming more aggressive and confrontational, often using extortion techniques that require little technical skill. This suggests changes in offender profiles.
- Malware such as ransomware and banking Trojans remain significant threats for both individuals and businesses.
- Data breaches led to a large amount of stolen data being used for payment fraud and identity theft in 2014. However, better cooperation between law enforcement and the private sector is helping to address cybercrime challenges.
This document discusses the growing threat of cyber crime and terrorism posed by the internet. It provides statistics showing a rapid rise in internet-related criminal complaints and losses. Specifically, the US saw a 22% increase in complaints from 2008-2009, with losses rising from $264.6 million to $559.7 million. Other countries like Belgium, South Korea, and European/East Asian nations also saw large increases in cyber crime. The document examines how critical infrastructure systems are vulnerable, citing examples of attacks on Iran's nuclear power plant and Chinese hacking of Taiwanese government computers, representing the emergence of online warfare. It argues the internet poses a serious and growing threat to national security worldwide.
Money laundering is a global problem that threatens national economies. Criminals exploit differences in anti-money laundering laws across jurisdictions to move illicit funds. Estimates suggest $1-2 trillion is laundered annually, though only 1% is seized. Casinos are vulnerable to money laundering due to their large cash transactions and financial services. The gaming industry has shifted focus to Asia, particularly Macau and Latin America is also a growing market. International organizations like FATF issue guidance on combating money laundering, including for casinos. A risk-based approach assesses the inherent and residual risks of money laundering threats based on a casino's activities, geography, clients, and products.
Taking advantage of african growth opportunities geo expansionLynn Gunning
Frost & Sullivan is a Growth consulting firm with offices in 40 locations around the globe
–Local understanding with global context
Facilitates expansion across all the stages of the growth cycle through:
–Strategy consulting services
–Strategic business intelligence
60 people strong African operation exclusively focussed on the continent
Direct and indirect presence in 16 locations across the African continent
Symantec Intelligence Report - Oct 2015CheapSSLUSA
Explore this PDF to know Symantec intelligence report for OCT 2015 from Symantec Global Intelligence Network.
Enjoy this report and feel free to contact us with any comments or feedback.
Important points you have to note down from this report:
- The number of new malware
- Spam have been increasing over the last few month
- Finance, Insurance, & Real Estate sector was the most targeted sector in OCT month
Ashton Global maintains long-standing relationships based on trust. We seek to be the best emerging manager platform in the world and we are dedicated to exceeding the expectations of our investors.
Ashton Global seeks to identify emerging portfolio managers that generate alpha by investing in non-traditional equities and special opportunities.
https://www.ashtonglobal.com/
https://twitter.com/ashtonglobal
https://www.facebook.com/ashtonglobal?ref=hl
IAD Summit review from the conference chairAdrian Hall
Digital technology is enabling sectors across Africa from education to business. Many African countries are poised to move from an emergent to scaled stage of digital adoption. The 2016 Innovation Africa Digital Summit in Abuja saw speakers and attendees debate national ICT policies, infrastructure, and business models to support this transition. Internet and smartphone penetration in Africa is growing but still lags global averages, demonstrating opportunities to expand access and spur socioeconomic development through innovative models. Success will require addressing challenges like skills gaps, while harnessing opportunities in areas such as health, education, and entrepreneurship.
The document estimates the annual global cost of cybercrime to be between $375 billion and $575 billion. It notes that estimating this cost is challenging due to incomplete data and underreporting of cybercrime incidents. The cost includes direct losses as well as indirect costs like additional security spending and lost productivity. Countries with more IP-intensive economies tend to lose more. While developed countries face higher losses, developing countries are also increasingly at risk as internet access grows. The lack of standardized data means the estimate has significant uncertainty, but the overall impact of cybercrime on the global economy is substantial.
This document provides an overview of digital infrastructure in Nigeria. It finds that while internet and mobile access has improved, a digital divide still exists between urban and rural areas due to challenges in physical infrastructure and regulations. Digital technology is seen as important for diversifying Nigeria's economy beyond oil. The mobile sector is a major contributor to GDP and government revenues. Improving digital access across Nigeria could help drive further economic growth and development.
e-Conomy SEA 2019 report (from Google and Temasek)Duy Hoang
The Internet economy in Southeast Asia has grown rapidly in recent years, surpassing $100 billion in gross merchandise value for the first time in 2019. This represents a nearly 40% increase from 2018 and more than triple the size in 2015. Powered by increasing mobile internet adoption and changing consumer behavior, sectors like e-commerce and ride hailing have seen especially strong growth, becoming integral parts of daily life for many in the region. If growth continues at its current pace, the Internet economy is projected to reach $300 billion by 2025.
This document discusses the growing cyber threats facing organizations today. It notes that as organizations increasingly operate online and digitize their services and information, cyber attacks have risen in scale and sophistication. The document outlines the main types of cyber attacks, including financial crime, espionage, warfare, terrorism, and activism. It emphasizes that effective cyber security requires looking outward beyond organizational boundaries and increasing collaboration between businesses and government. However, the document notes that public-private collaboration on cyber security has not been fully effective so far. Overall, the document argues that as threats in cyberspace escalate, secure information has become a key source of power, and cyber security is a major risk issue that organizations must address.
The document discusses the growing threat of cyber attacks facing all organizations. It notes that no organization is safe from attacks, which are increasing in scale and sophistication. Some key points made include:
- Cyber attacks range from financially motivated crime to espionage to activism and warfare, with financial crime being the most commonly experienced by organizations.
- The boundary-less nature of cyber space and low costs of attacks relative to their impact make threats unpredictable and difficult to defend against.
- Effective cyber security requires looking outward beyond organizational boundaries and increasing collaboration both within sectors and between public and private sectors. However, collaboration is still not working effectively.
- Understanding online business models and protecting the data that represents organizational value are both critical
The document provides an overview of Kenya, including its demographics, economy, trade, and government finances. Some key points:
1) Kenya has a population of over 47 million people, with the majority living in rural areas and belonging to one of the five largest ethnic groups.
2) The economy has grown at an average of 5.5% annually in recent years, led by the services sector. Agriculture remains important, contributing a third of GDP and employing half the population.
3) Exports are led by tea, horticulture, and oil seeds. Imports are dominated by machinery, transportation equipment, and petroleum products. The trade deficit was over $13 billion in 2018.
4) Government debt
This document discusses trends in cybercrime and argues that global cyberspace is safer than commonly believed. It analyzes data on the size of cyberspace, vectors of cyber attacks, occurrence of attacks, and costs of attacks. When normalized for the growing size of cyberspace, the security situation improves rather than deteriorates. Absolute numbers often incorrectly indicate things are getting worse, but normalized numbers show improvements, or slower rates of deterioration. Overall, cybercrime statistics normalized for the expanding online environment show that global cyberspace is far safer than portrayed by media reports and security firms.
Cyberwarfare, also known as cyberterrorism, refers to politically motivated attacks on computer systems and networks. The document discusses various methods of cyberwarfare such as espionage, sabotage, and attacks on critical infrastructure networks. Specific examples of cyberattacks between nations are provided, such as attacks from Russia on Estonia in 2007 and cyber operations between the US and Iran in 2012. The document also examines cybercrime trends in Greece and strategies for improving cybersecurity defenses.
Strategic Database Security Management and Cybercrime Reduction among Youths ...ijtsrd
The purpose of this study is to investigate the relationship between strategic database security management and cybercrime reduction among youth in Information Technology sector in Nigeria. Cross sectional survey design was used for this study. The population of the study comprises 32 information and technology companies in Rivers state. The method of data collection was questionnaire. Data from the distributed questionnaire was further analyzed, using the spearman rank order Correlation Coefficient. The hypotheses of the study were tested through the help of Statistical Package for Social Science SPSS , version 20. Findings revealed that strategic database security management have a significant relationship between the measures cybercrime reduction among youth in information technology companies in Nigeria. Therefore, we recommend that Management of information technology companies should ensure that proper computer security measures are put in place in order to fortify their database from unauthorized persons. Agbeche, Aaron | Elechi, Bobby Chime | Okechukwu, Prince Jumbo "Strategic Database Security Management and Cybercrime Reduction among Youths in Information Technology Companies in Nigeria" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-6 , October 2021, URL: https://www.ijtsrd.com/papers/ijtsrd47643.pdf Paper URL : https://www.ijtsrd.com/management/strategic-management/47643/strategic-database-security-management-and-cybercrime-reduction-among-youths-in-information-technology-companies-in-nigeria/agbeche-aaron
Improving the Information System of Tourist Destinations in the Context of th...ijtsrd
This article discusses how Uzbekistan may improve its smart tourism and tourism information infrastructure of tourist destinations. Because of the technological services supplied to passengers before, during, and after their journey, smart tourism is a terrific way to save not only money, but also nerves and valuable time. The authors remarks, conclusions, and recommendations are included in the paper, as well as an analysis of the pertinent data. Nosirova U. M. "Improving the Information System of Tourist Destinations in the Context of the Digitalization of the Economy" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-6 , October 2021, URL: https://www.ijtsrd.com/papers/ijtsrd47690.pdf Paper URL : https://www.ijtsrd.com/economics/other/47690/improving-the-information-system-of-tourist-destinations-in-the-context-of-the-digitalization-of-the-economy/nosirova-u-m
2009 10 21 Rajgoel Trends In Financial CrimesRaj Goel
The document summarizes trends in various types of financial crimes including data breaches, identity theft, mortgage fraud, and other cybercrimes from 2005 to 2009. It discusses specific cases like the Sony rootkit scandal and fraud involving forged deeds and stolen identities that resulted in people losing their homes. The document also mentions the large economic impact of crimes like telemarketing fraud and the growing problem of botnets and zombie computers being used to steal data and money.
Face Recognition Using ML in Public Transportsijtsrd
Modernization of railways has forever been an issue focused on the development of the fundamental infrastructure of a nation. Since the railways represent one of the most effective modes of transport offered to the people, It is important to keep a check on the security issues that are arising in todays world. According to the need there must be an upgradation in systems we use. One such upgradation is that the role of Artificial Intelligence and e ticketing that is achieved with the assistance of face recognition technology. This technology has been extensively employed as a biometric method and hence can be used for passenger verification. Mangal Kotkar | Shubham Gawade | Shubham Mandavkar | Prathamesh Gujar "Face Recognition Using ML in Public Transports" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-6 , October 2021, URL: https://www.ijtsrd.com/papers/ijtsrd47656.pdf Paper URL : https://www.ijtsrd.com/engineering/information-technology/47656/face-recognition-using-ml-in-public-transports/mangal-kotkar
This document provides an overview of digital trends in India in 2019, including:
- India has a population of 1.361 billion people with 560 million internet users as of January 2019.
- Mobile subscriptions have grown 2.8% annually to reach 1.190 billion, representing 87% of the population.
- Social media usage has increased substantially, with 310 million active users as of January 2019, up 24% from the previous year.
This document provides an overview of the Internet Organised Crime Threat Assessment (IOCTA) for 2015. Some key findings include:
- Cybercrime is becoming more aggressive and confrontational, often using extortion techniques that require little technical skill. This suggests changes in offender profiles.
- Malware such as ransomware and banking Trojans remain significant threats for both individuals and businesses.
- Data breaches led to a large amount of stolen data being used for payment fraud and identity theft in 2014. However, better cooperation between law enforcement and the private sector is helping to address cybercrime challenges.
This document discusses the growing threat of cyber crime and terrorism posed by the internet. It provides statistics showing a rapid rise in internet-related criminal complaints and losses. Specifically, the US saw a 22% increase in complaints from 2008-2009, with losses rising from $264.6 million to $559.7 million. Other countries like Belgium, South Korea, and European/East Asian nations also saw large increases in cyber crime. The document examines how critical infrastructure systems are vulnerable, citing examples of attacks on Iran's nuclear power plant and Chinese hacking of Taiwanese government computers, representing the emergence of online warfare. It argues the internet poses a serious and growing threat to national security worldwide.
Money laundering is a global problem that threatens national economies. Criminals exploit differences in anti-money laundering laws across jurisdictions to move illicit funds. Estimates suggest $1-2 trillion is laundered annually, though only 1% is seized. Casinos are vulnerable to money laundering due to their large cash transactions and financial services. The gaming industry has shifted focus to Asia, particularly Macau and Latin America is also a growing market. International organizations like FATF issue guidance on combating money laundering, including for casinos. A risk-based approach assesses the inherent and residual risks of money laundering threats based on a casino's activities, geography, clients, and products.
Taking advantage of african growth opportunities geo expansionLynn Gunning
Frost & Sullivan is a Growth consulting firm with offices in 40 locations around the globe
–Local understanding with global context
Facilitates expansion across all the stages of the growth cycle through:
–Strategy consulting services
–Strategic business intelligence
60 people strong African operation exclusively focussed on the continent
Direct and indirect presence in 16 locations across the African continent
Symantec Intelligence Report - Oct 2015CheapSSLUSA
Explore this PDF to know Symantec intelligence report for OCT 2015 from Symantec Global Intelligence Network.
Enjoy this report and feel free to contact us with any comments or feedback.
Important points you have to note down from this report:
- The number of new malware
- Spam have been increasing over the last few month
- Finance, Insurance, & Real Estate sector was the most targeted sector in OCT month
Ashton Global maintains long-standing relationships based on trust. We seek to be the best emerging manager platform in the world and we are dedicated to exceeding the expectations of our investors.
Ashton Global seeks to identify emerging portfolio managers that generate alpha by investing in non-traditional equities and special opportunities.
https://www.ashtonglobal.com/
https://twitter.com/ashtonglobal
https://www.facebook.com/ashtonglobal?ref=hl
IAD Summit review from the conference chairAdrian Hall
Digital technology is enabling sectors across Africa from education to business. Many African countries are poised to move from an emergent to scaled stage of digital adoption. The 2016 Innovation Africa Digital Summit in Abuja saw speakers and attendees debate national ICT policies, infrastructure, and business models to support this transition. Internet and smartphone penetration in Africa is growing but still lags global averages, demonstrating opportunities to expand access and spur socioeconomic development through innovative models. Success will require addressing challenges like skills gaps, while harnessing opportunities in areas such as health, education, and entrepreneurship.
The document estimates the annual global cost of cybercrime to be between $375 billion and $575 billion. It notes that estimating this cost is challenging due to incomplete data and underreporting of cybercrime incidents. The cost includes direct losses as well as indirect costs like additional security spending and lost productivity. Countries with more IP-intensive economies tend to lose more. While developed countries face higher losses, developing countries are also increasingly at risk as internet access grows. The lack of standardized data means the estimate has significant uncertainty, but the overall impact of cybercrime on the global economy is substantial.
This document provides an overview of digital infrastructure in Nigeria. It finds that while internet and mobile access has improved, a digital divide still exists between urban and rural areas due to challenges in physical infrastructure and regulations. Digital technology is seen as important for diversifying Nigeria's economy beyond oil. The mobile sector is a major contributor to GDP and government revenues. Improving digital access across Nigeria could help drive further economic growth and development.
This document discusses cybercrime and its economic impacts. It reports that the global cost of cybercrime is estimated to be $445 billion annually, and that over 800 million people were affected by cyber espionage and theft in 2013. Financial losses from cybertheft could cause up to 150,000 job losses in Europe. Cybercrime damages trade, competitiveness, innovation and global economic growth by slowing the pace of innovation. Governments are called on to systematically collect and publish cybercrime data to help countries and companies assess risks and policies.
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sDr Lendy Spires
While progress has been made in cybersecurity education, reducing spam, and increasing secure online transactions and incident response capabilities, international cooperation remains fragmented and several challenges remain. Key ongoing challenges include the evolution of technologies and applications, weaknesses in user authentication like passwords, securing the growing Internet of Things, improving detection and response to cyber incidents, developing metrics to measure cybersecurity effectiveness, issues with cloud computing, ensuring child online safety, strengthening the capabilities of national CERT teams, and having more countries develop national cybersecurity strategies. Addressing these challenges will be important for continuing to build confidence and security in ICT use globally.
The document discusses the growing cyber threats facing organizations from both private and state actors. It notes that cyber attacks are increasing in scale and sophistication, with no organization considered completely safe. Effective cyber security requires an outward-looking approach that crosses organizational and national boundaries through increased collaboration between both public and private sectors. However, many organizations still face barriers to effective cyber security including a need for new skills, integrating security into business operations, and a lack of board-level understanding and prioritization of the issues.
State of Cyber Crime Safety and Security in BankingIJSRED
The document discusses cybercrime threats facing the banking system, including online fraud, malware, and hacking. These threats have grown significantly over the past 20 years, costing banks billions annually. Common cybercrimes impacting banks are phishing, identity theft, ransomware, and money laundering. To improve security, banks need better authentication systems, employee training, and integrated cybercrime laws. Overall, the rising costs of cybercrime pose a major risk to banks that must be addressed through increased security efforts.
The document discusses cyber security challenges for smart communities. It notes that cyber threats are becoming more sophisticated and pose risks to critical infrastructure. Establishing effective cooperation between public and private sectors is important for developing strategies to address cyber challenges in smart communities. As communities become more connected through information and communication technologies, demand for robust cyber security will continue to grow.
The Threat of Counterfeit Devices: Complicity vs VigilanceWaqas Tariq
Challenges that arise as a result of high mobile phone penetration in developing countries such as counterfeiting and increasing product complexity, have largely been tackled from the supply side. This study explores this issue from the demand side by investigating the relationship between socio-demographic characteristics and levels of Intellectual property vigilance as well as brand and quality awareness among urban mobile technology consumers in Botswana. Implications for both corporate and public policy are discussed at the end of this paper.
1) Finland topped Sweden as the best country for embracing information technology according to the World Economic Forum's 2013 Networked Readiness Index, due to its business-friendly environment and top education system.
2) Digitization has boosted economic growth and job creation globally, and increasing digitization in emerging markets could lift over 500 million people out of poverty in the next decade.
3) The Nordic countries and Asian Tigers like Singapore and South Korea dominated the rankings, while the BRICS countries lagged behind and need more investment in ICT, skills, and innovation to sustain rapid economic growth.
This document provides an overview of computer security, cybercrimes, and legal responses. It discusses how computer infrastructure and the internet have advantages but also risks like cybercrimes. Common cybercrimes include illegal access, data interference, fraud, and more. Statistics show cybercrimes are increasing significantly year-over-year. The document also outlines strategies to enhance cyber security and prevent cybercrimes through technical protection, education, and legal frameworks.
This document provides an overview of cybercrime, including definitions, types, impacts, and challenges. It notes that while cybercrime poses significant threats, there are major evidence gaps regarding its nature, scale, and costs. It recommends improving measurement and the evidence base to better inform policy responses. A socio-ecological framework is proposed to understand cybercrime at individual, relationship, community, and societal levels to guide multi-tiered prevention efforts.
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSALijcisjournal
This article underscores the urgent need for a global response to cyber threats, discusses the risks
associated with increasing reliance on technology, and sets the stage for a review focused on understanding and mitigating cybercrimes. In summary, the passage discusses the internet's impact on
national development and the growing problem of cybercrime. It calls for a deeper understanding of the
characteristics and motivations of cybercriminals and highlights several questions that need to be
addressed to effectively combat cybercrime and its detrimental effects on society. The classification of cybercrime is summarized into five categories: Cybercrimes against Persons (including cyber
pornography, cyber stalking, financial cybercrimes, phishing, and vishing), Cybercrimes against Property(involving intellectual property violations, data theft, and "Man in the Middle" attacks), Cybercrimes against Government, Denial of Service (DOS) Attacks, and Other Cybercrimes (comprising data diddling,salami attacks, email bombing, email spoofing, logic bombs, internet time theft, and mobile and wireless technology-related cybercrimes).
Final presentation cyber security submit copysmita mitra
The document discusses cyber security issues in New Zealand. It notes that cybercrime affects one in five New Zealanders and the most reported incidents in 2018 were phishing and credential harvesting. New Zealand's cyber security strategy focuses on improving cyber resilience, capability, addressing cybercrime, and international cooperation. The National Cyber Security Centre was established to improve security across sectors and provide guidance on threats. The strategy is based on principles of partnerships, enabling economic growth, upholding national security, and protecting human rights online.
The Institute of Chartered Accountants of the Caribbean (ICAC) and IFAC held a joint workshop on June 21, 2017 in Guyana with representatives from 10 professional accountancy organizations in the region. Participants gathered together with the twin objectives of examining the role of the accountant in a changing world along with the trends (technological, economic, social, etc.) impacting the profession and tomorrow’s accountant as well as to discuss the challenging issues facing the accountancy profession and the future-readiness of today’s accountant and professional accountancy organizations.
Most Arab nations have made significant progress towards becoming knowledge-based economies by making major improvements in ICT diffusion since the mid-1990s
However, the difference in ICT use across the region is so wide that it almost creates a digital divide with the Gulf Cooperation Council (GCC) countries on one side and the rest of the MENA countries standing on the other side of the divide.
Therefore, despite making significant progress towards becoming a knowledge-based economy, a lot needs to be done for expanding broadband capacity and spreading ICT usage in non-GCC Arab nations to create a true Arab Knowledge Economy.
Running Head CYBER SECURITY IN AFRICA .docxtodd271
Running Head: CYBER SECURITY IN AFRICA 1
CYBER SECURITY IN AFRICA 2
Cyber Security in Africa
African countries have lagged behind in the implementation and development of internet connectivity and cyber security measures. Being developing nations, most of the African states have not been able to fully enhance and promote internet connectivity, preferring to put their priorities on providing other basic and necessary social amenities to their people. The governments have, however, ensured that there is provision of telecommunication networks across most parts of the continent, and internet service providers would often ride upon these networks for provision of their services to the people.
It is estimated that almost 170 million people across the continent have at least a mobile phone. Internet penetration in Africa has however remained at 18%, which is way lower than the global average connectivity of 30%. It is estimated that only 1 household out of 10 households is connected to the internet. However, the number of connected internet users in Africa has grown sevenfold since 2000 to 2012. This progress can be attributed to the changes in government policy and regulations.
The cyber space in Africa has been growing at a snail speed compares to other regions due to factors such as the lack of relevant skills and knowledge that would have enabled African nations to develop software’s and applications. There are few professionals in the internet and technology sectors, and thus this limits the ability of African countries to come up with their own internet applications. The introduction of internet in Africa saw some already established mobile telephone countries monopolize the internet service delivery sector. Most of the upcoming and newly-established companies which have tried to venture into the sector have had no space for development. This has greatly limited the internet technological investment, which would have helped the internet access to many people.
In Africa, internet penetration has been greatly experienced in the major urban centers, where the relevant infrastructure has been put in place. The poor transport and communication networks in the rural areas has inhibited the investment into the internet sector by both the private and even governmental organizations. The uneven settlement patterns across the continent also discourages internet and communication investment in the rural areas, given that most of the people residing in the rural areas are not stable financially, and they would thus have to put food at the table at the expense of the internet, which is like a luxury and not a necessity to them. Their financial status also does not allow them to possess the internet-enabled mobile phones, tablets and laptops. The well-to-do people often reside in the major urban centers. The.
Africa will have about 500 million young people by 2030. 157 of the world’s 310 mobile money services in 2021 were in Sub-Saharan Africa. Africa had a US$495bn share of the US$767bn handled by mobile money worldwide. Mobile
phones account for about 75% of all online traffic in Africa. Africa has potential to unlock more than $3 trillion in consumer spending. In the five largest consumer markets alone—Nigeria Egypt, South Africa, Morocco,
and Algeria—the African Development Bank estimates that there will be 56 million middle-class households with disposable incomes of nearly $680 billion.
Analysis Group estimates that the Metaverse could contribute $40 billion to Sub-Saharan Africa’s GDP by 2031.
Research done while in PwC Mexico. A short version was included in the PwC publication "Future of Pacific Alliance", presented at the presidential summit of Chile on July 2016.
Understanding User Behavior with Google Analytics.pdfSEO Article Boost
Unlocking the full potential of Google Analytics is crucial for understanding and optimizing your website’s performance. This guide dives deep into the essential aspects of Google Analytics, from analyzing traffic sources to understanding user demographics and tracking user engagement.
Traffic Sources Analysis:
Discover where your website traffic originates. By examining the Acquisition section, you can identify whether visitors come from organic search, paid campaigns, direct visits, social media, or referral links. This knowledge helps in refining marketing strategies and optimizing resource allocation.
User Demographics Insights:
Gain a comprehensive view of your audience by exploring demographic data in the Audience section. Understand age, gender, and interests to tailor your marketing strategies effectively. Leverage this information to create personalized content and improve user engagement and conversion rates.
Tracking User Engagement:
Learn how to measure user interaction with your site through key metrics like bounce rate, average session duration, and pages per session. Enhance user experience by analyzing engagement metrics and implementing strategies to keep visitors engaged.
Conversion Rate Optimization:
Understand the importance of conversion rates and how to track them using Google Analytics. Set up Goals, analyze conversion funnels, segment your audience, and employ A/B testing to optimize your website for higher conversions. Utilize ecommerce tracking and multi-channel funnels for a detailed view of your sales performance and marketing channel contributions.
Custom Reports and Dashboards:
Create custom reports and dashboards to visualize and interpret data relevant to your business goals. Use advanced filters, segments, and visualization options to gain deeper insights. Incorporate custom dimensions and metrics for tailored data analysis. Integrate external data sources to enrich your analytics and make well-informed decisions.
This guide is designed to help you harness the power of Google Analytics for making data-driven decisions that enhance website performance and achieve your digital marketing objectives. Whether you are looking to improve SEO, refine your social media strategy, or boost conversion rates, understanding and utilizing Google Analytics is essential for your success.
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
Ready to Unlock the Power of Blockchain!Toptal Tech
Imagine a world where data flows freely, yet remains secure. A world where trust is built into the fabric of every transaction. This is the promise of blockchain, a revolutionary technology poised to reshape our digital landscape.
Toptal Tech is at the forefront of this innovation, connecting you with the brightest minds in blockchain development. Together, we can unlock the potential of this transformative technology, building a future of transparency, security, and endless possibilities.
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
Discover the benefits of outsourcing SEO to Indiadavidjhones387
"Discover the benefits of outsourcing SEO to India! From cost-effective services and expert professionals to round-the-clock work advantages, learn how your business can achieve digital success with Indian SEO solutions.
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfFlorence Consulting
Quattordicesimo Meetup di Milano, tenutosi a Milano il 23 Maggio 2024 dalle ore 17:00 alle ore 18:30 in presenza e da remoto.
Abbiamo parlato di come Axpo Italia S.p.A. ha ridotto il technical debt migrando le proprie APIs da Mule 3.9 a Mule 4.4 passando anche da on-premises a CloudHub 1.0.
1. 1
Policy
Brief
Tackling the challenges of cybersecurity in Africa
1. Introduction
The 2013 Economic Report on Africa, a joint
publication of the Economic Commission for
Africa (ECA) and the African Union Commission
(AUC), states that “following two decades of
near stagnation, Africa’s growth performance
has improved hugely since the start of the 21st
century”.1
Since 2000, the African continent has
experienced a prolonged commodity boom and
a sustained growth trend. The report further
states that “Africa’s medium-term growth
prospects remain strong, too, at for example 4.8
per cent in 2013 and 5.1 per cent in 2014”.2
Also
of note, highly regarded publications, such as
The Economist3
and the International Business
Times4 and organzations, such as the African
Development Bank (AfDB)5, have asserted that
1 African Union Commission and United Nations, Economic
Commission for Africa, Making the Most of Africa’s Commodities:
Industrializing for Growth, Jobs and Economic Transformation: Economic
Report on Africa 2013, (United Nations publication), Sales No. : E.13.IIK.1.,
p.6.
2 Ibid.
3 J. O’S, “Growth and other good things”, The Economist, 1
May 2013. Available from www.economist.com/ blogs/baobab/2013/05/
development-africa.
4 Mike Obel, “Africa poised for unprecedented, long-term economic
growth: Seven drivers that could transform Africa into the world’s economic
powerhouse”, International Business Times, 13 September 2013. Available
from www.ibtimes.com/africa-poised-unprecedented-long-term-economic-
growth-seven-drivers-could-transform-africa-worlds.
5 African Development Bank Group, “Africa is now the fastest
growing continent in the world”, 7 November 2013. Available from www.afdb.
org/en/news-and-events/article/africa-is-now-the-fastest-growing-continent-
in-the-world-12107/.
Africa is home to some of the world’s most
rapidly growing economies.
This newAfrica, captured by the aphorism“Africa
rising”, is reflected in the continent’s expanding
middle class and rapid adoption of mobile
technology. According to recent estimates by
the International Telecommunications Union
(ITU), the number of mobile subscribers
reached 63 per cent in 2013, and more than 16
percent of the African population are now using
the Internet.6
Furthermore, it is estimated that
the global value of web-based retail sales for
2013, amounted to $963 billion,7
while business
to consumer (B2C) e-commerce sales for the
same period totalled $ 1.3 trillion.8
Although the
e-commerce market is dominated by developed
economies, the global share of e-commerce for
the Middle East and Africa is expected to rise
from 1.6 per cent in 2011 to 2.3 per cent by 2016.
However, new challenges arise alongside
growth, and increasing technological exposure
6 International Telecommunications Union, “ICTs facts and
figures 2013”, ITU Telecommunication Development Bureau (Geneva,
2008). Available from www.itu.int/en/ITU-D/Statistics/Documents/facts/
ICTFactsFigures2013-e.pdf.
7 Goldman Sachs, “eCommerce expected to accelerate globally in
2014”, Equity Research, New York: The Goldman Sachs Group, Inc., 5 March
2013. Available from http://boletines.prisadigital.com/Global_ecommerce.pdf.
8 eMarketer, “eMarketer in review – key 2013 trends, coverage areas
and platform growth”, Newsroom, 4 September 2013. Available from www.
emarketer.com/newsroom/index.php/emarketer-review-key-2013-trends-
coverage-areas-platform-growth/#UG1Ch9mS5hMlp1JX.99.
NTIS/002/2014
2. 2
poses its own vulnerabilities and risks. One such
risk that derives from increased technological
exposures and requires urgent policy attention
and action is cybercrime.9
Cybercrime is a growing global phenomenon,
which, according to a report by Symantec,
Corporation10
issued in 2013, is increasing at a
more rapid rate in Africa than in any other area
of the world. Indeed, cybersecurity experts
estimate that 80 per cent of personal computers
on the African continent are infected with
viruses and other malicious software.11
Cybercriminals have long considered Africa
as opportune to commit their criminal acts.
Statistics from various sources indicate that
Africa is very prone to cyber-related threats due
to the high number of domains coupled with
very weak network and information security. For
example, according to the Norton Cyber-Crime
Report, every second, 18 adults are victims of
cybercrime, resulting in more than 1.5 million
victims globally per day. In addition, South Africa
(80 per cent) has the third highest number of
cybercrime victims in the world, after Russia (92
percent) and China (84 percent).12
The Symantec report10
further reveals that in
2012, the number of targeted cyberattacks
in Africa increased by 42 per cent. Thirty-
one percent of these attacks, categorized as
cyberespionage, have hit both large and small
businesses. Individual consumers have also
become vulnerable to viruses and other forms
of cyberthreats. In Africa, Nigeria is the largest
target and source of malicious Internet activities,
the consequences of which are unfortunately
spilling into the other countries in the West
9 Cybercrimeisdefinedasabroadrangeofillegalactivitiescommitted
by means of, or in relation to, a computer system or network, including such
crimes as illegal possession and offering or distributing information by means
of a computer system or network.
10 Symantec Corporation, Internet Security Threat Report 2013, 2012
Trends, Volume 18 (April, 2013). Available from www.symantec.com/content/
en/us/enterprise/other_resources/b-istr_main_report_v18_2012_21291018.en-
us.pdf.
11 Franz-Stefan Gacy, “Foreign policy: Africa’s internet threat”,
National Public Radio, 29 March 2010.
Available from www.npr.org/templates/story/story.php?story-
Id=125297426.
12 Symantec Corporation, 2012 Norton Cybercrime Report, September
2012.
African subregion. In major African cities, such
as Cairo, Johannesburg, Lagos and Nairobi,
the rate of cyberconnected disturbances, such
as fraudulent financial transactions and child
kidnappings, especially in Kenya, facilitated
through Internet communications has doubled
in the past three years.
Recent use of information and communications
technologies (ICTs) in support of terrorism
attacks throughout Africa is adding an
additional dimension to the cybersecurity
issue. Evidence from the investigation into the
recent attack of the Westgate Mall in Kenya,
the activities of Boko Haram in Nigeria and Al-
Qaida in Islamic Maghreb (AQIM) in Northern
Africa highlight the use ICTs in the planning,
coordination, implementation and promotion
of the various attacks. Such attacks have
destabilized and hampered recent economic
growth performances of African countries. For
example, the Westgate Mall attack not only cost
at least 67 innocent lives and millions of dollars
in infrastructure damage, but it is also expected
to have cost the Kenyan economy some $200
million in lost tourism revenue.13
Consequently, African countries need to
urgently scale up efforts to combat cybercrimes
through a multi-stakeholder approach involving
government, industry and civil society
organizations.
As per the new strategic focus of ECA
on evidence-based policy and analytical
research, this policy brief provides options for
consideration by member States, within the
context of the African Union Convention on
Cyberspace Security and Protection of Personal
data to stem the threats posed by cybecrime
and cybercriminals, to their national economic
security.
13 Jacob Kushner, Jacob, “Mall terrorist attack may cost Kenya
$200 million in lost tourism earnings”, The Associated Press, 1 October 2013.
Available from www.ctvnews.ca/mall-terrorist-attack-may-cost-kenya-200-
million-in-lost-tourism-earnings-1.1478573.
3. 3
2. The economic impact of
cybersecurity
Theeconomicimpactofinadequatecybersecurity
is colossal. The Norton Cybercrime Report 2012
indicated that direct financial losses totalled an
average of $197 per victim worldwide, while
globally a grand $110 billion in direct financial loss
was recorded.14
A recent study by the International Data Group
Connect15
investigating the state of cyberthreats
in various regions of Africa, with particular
emphasis on Egypt, Kenya, Nigeria and South
Africa, shows that there is a strong correlation
between cybersecurity and economic growth.
Africa, traditionally, has a high rate of software
piracy. According to a 2011 study,16
the average
rate of software piracy in the region is about 73
per cent, with little change in recent years. In
addition to the financial loss — $1.785 billion —,
the high level of use of unauthorized software is
likely to aggravate the region’s virus and malware
woes.
The study by the International Data Group
Connect estimates that annually, cybercrimes
cost the South African economy $573 million, the
Nigerian economy $200 million, and the Kenyan
economy $36 million.15
A 2011 DeloitteTouche survey found that financial
institutionsinKenya,Rwanda,Uganda,theUnited
Republic of Tanzania and Zambia had registered
losses of up to $245 million due to cyberfraud,17
a
high sum for countries without highly developed
banking systems. Several commercial banks in
Zambia18
were robbed of more than $4 million in
14 Symantec Corporation, 2012 Norton Cybercrime Report,
September 2012.
15 International Data Group Connect, “Africa 2013: Cyber-crime,
hacking and malware”, White Paper. Available from www.idgconnect.com/
view_abstract/11401/africa-2013-cyber-crime-hacking-malware.
16 Business Software Alliance, Shadow market: 2011 BSA global
software piracy study, ninth edition, May 2012. Available from http://
globalstudy.bsa.org/2011/downloads/study_pdf/2011_BSA_Piracy_Study-
Standard.pdf.
17 Henry Quarshie and Alexander Martin-Odoom, “Fighting
Cybercrime in Africa”, Computer Science and Engineering, vol. 2, No. 6
(2012), pp. 98-100.
18 Michael Chawe, “Cyber crime costs Zambian banks $4m”, Africa
Review, 14 June 2013, Available from www.africareview.com/News/Cyber-
the first half of 2013 as a result of sophisticated
cybercrime collaborations between Zambians
and foreigners.
3. Cybersecurity: challenges for Africa
Africa is facing several Internet-related challenges
in relation to security risk, intellectual property
infringement and protection of personal data.
Cybercriminals target people inside and outside
their national boundaries and most African
governments have neither the technical, nor the
financial capacity to target and monitor electronic
exchangesdeemedsensitivefornationalsecurity.
These challenges are:
• Low level of security provisions sufficient
to prevent and control technological and
informational risks.
• Lack of technical know-how in terms of
cybersecurity and inability to monitor and
defend national networks, making African
countries vulnerable to cyberespionage, as
well as to incidences of cyberterrorism.
• Inability to develop the necessary
cybersecurity legal frameworks to fight
cybercrime. A survey of 21 countries
conducted by ECA19
found that while many
countries had proposed legislations, the
level of deployment of security systems in
both the private and the public sectors to
combat cyber-crime was low.
• Cyber-security concerns are broader in
scope than national security concerns.
Yet, few major significant cybersecurity
initiatives in Africa have been implemented.
As ICTs are hailed as the end-all to the many
pressing problems of Africa, cybersecurity
is a critical issue that needs to be dealt
more comprehensively.
• There is a need to build an information
society that respects values, rights and
crime-costs-Zambian-banks--4millio/-/979180/1883006/-/128vr2iz/-/index.
html.
19 Benin, Burundi, the Congo, Cote d’Ivoire, the Democratic Republic
of the Congo, Egypt, Ethiopia, the Gambia, Ghana, Guinea-Bissau, Kenya,
Madagascar, Mali, Mozambique, Niger, Nigeria, Senegal, Sudan, Togo,
Uganda and Zambia.
4. 4
freedoms and guarantees equal access to
information, while encouraging the creation
of authentic knowledge and that can build
confidence and trust in the use of ICTs in
Africa.
• Generally limited levels of awareness of
ICT-related security issues by stakeholders,
such as ICT regulators, law enforcement
agencies, the judiciary, information
technology professionals and users.
4. Policy recommendations
Measuring the magnitude of challenges posed
by lack of adequate cybersecurity is complex.
Cybercrime is transnational in nature. Thus,
tackling it requires coordinated and focused
policies.The plurality of the issues dictates taking
into account its multiple dimensions, which are,
amongothers,scientific,technological,economic
and financial, political, and sociocultural. The
interaction between these dimensions reinforces
the complexity of cybesecurity, which is apparent
at several levels.
4.1 Policy, legal and regulatory
mechanisms
While continental dependence on ICTs is
growing, individuals, organizations and countries
are becoming highly vulnerable to attacks on
information systems and networks, such as
hacking, cyberterrorism and cybercrime. Few
individuals and organizations are equipped to
cope with such attacks. In this regard, the role
of governments in dealing with this important
phenomenon cannot be overemphasized. The
success of any cybersecurity initiative requires
the full involvement and support of the political
leadership at the very highest level. The role
of governments in putting in place the policy,
legal and regulatory framework is of paramount
importance. Some of these include the following:
4.1.1 Legal framework
Lack of cybersecurity legislation negatively
affects business. It is, therefore, essential that
effective anti-spam and cybercrime laws and
regulations be put in place in order to ensure
confidence and trust in the use of the Internet,
including carrying out online transactions, by
all stakeholders. This should be enhanced by
initiating capacity- building among relevant
policy stakeholders and creating a framework
for local enforcement of cybercrime mitigation.
4.1.2 Harmonization of policy and legal
frameworks
Separate but extremely intertwined to the
issue above is that of harmonization. Although
member States are at varying levels of
tackling cybersecurity and establishing policy
instruments and legislative frameworks, given
the global nature of cybercrime, policy and legal
frameworks need to be harmonized.
Cybersecurity is a global good and global and
regional actions are required. There is a need
to set minimum standards and procedures to
enable the continent to operate as one and instil
efficiency and effectiveness in its operations.
In this regard, the African Union Commission
(AUC) and ECA have been spearheading the
development of the African union convention
on cyber security, which has been undergoing
a series of reviews by the regional economic
communities and endorsed by the African
Union Ordinary Conference in Charge of
Communication and InformationTechnologies in
September 2012 in Khartoum and adopted by the
African Union Heads of State and Governments
Summit in June 2014 in Malabo. Countries
will, therefore, be expected to transpose their
cybersecurity laws in the framework of the
Convention and others can also be guided by it
to develop one.
4.1.3 Coordination and cooperation
Cybersecurity transcends all boundaries.
Given the global dimension of cybersecurity,
it is difficult to fight against cybersecurity
breaches at the national level alone. Combatting
cybersecurity breaches requires cooperation
at all levels, among countries and international
organizations,andbetweenthepublicandprivate
sectors. Thus, a comprehensive framework for
international cooperation and outreach must
5. 5
be developed. To accomplish this, coordination
and collaboration in areas including computer-
aided fraud, hacking, distribution of child abuse
images and copyright infringement, as well as
uniformity in procedures and processes, must
occur.
4.2 Technological considerations
4.2.1 Development of infrastructure and
services
• There should be dedicated national
network infrastructures that can connect
government, industry and the research
community for the benefit of promoting
open knowledge engagement, an open
data system for researchers, innovation,
end-users and researchers’ synergy and
information technology development.
• There is also a need to establish a national
computer emergency readiness and
response team ecosystem to promote
national synergy on cybersecurity,
knowledge-sharing and intelligence
gathering on countermeasures against
cybercrime injurious to States, as well as
to individuals.
• A dedicated call centre for reporting
cybecrime should be set up with the
aim to assure cybervictims that there is
a place that they can turn to report such
crimes and receive assistance. As part of
the broader cybersecurity strategy, the
call centre should be staffed by sufficiently
trained and knowledgeable personnel and
have a website and a toll free number to
enable victims to report a cybecrime with
minimal inconvenience.
• The dissemination of best practices of
Internet service providers and registrar/
registry in their efforts to mitigate
cybercrime activities and undertake
capacity-building for e-commerce and
online transaction providers should be
promoted.
4.2.2 Investment on research
Knowledge and information serve as a direct
way of empowering countries and their citizens.
Currently, there is general lack of knowledge
and information on cybersecurity matters in
Africa. This gap must be closed. To achieve
this, sufficient resources has to be channelled
towards investment in research on cybersecurity
in Africa, which is currently lacking. Even in
cases in which research has been carried
out, such material is not readily available and
accessible. Thus, databanks need to be created
to serve as platforms for researchers to deposit
their outputs, including tools and techniques
used to identify and gather information about
cybercrime activities. Some countries have
in place data deposit laws. As these are very
useful, those without such laws, should impose
them using best practices of countries that have
already established them.
4.3 The social dimensions
4.3.1 Education
The exponential growth in the use of cyberspace
in Africa is not matched by the necessary skills.
Thus, there is a need for broad-based education
initiatives on Internet safety and security to
tackle the issues of child protection and social
security in general. Furthermore, facilitation of
secure ICT access for users is of a paramount
importance.
4.3.2 Engagement of all key stakeholders
It is important to understand that no one person
or institution can have the requisite capacity to
deal with cybersecurity. Cybesecurity is not
an event but rather a process. As a result, it
is not simply a matter of passing legislation,
or something that belongs to lawyers only.
Members of Parliament, lawyers, the judiciary,
intelligence/military, civil society, media, young
people and members of the public as key
stakeholders should all be involved in efforts
to deal with cybersecurity at the earliest
6. 6
available opportunity. It is important to engage
all stakeholders to ensure the necessary buy-
in and that they understand the issues and
processes involved.
References
Atta-Asamoah, Andrews. (Jul 2010).
Understanding the West African cyber-crime
process. African Security Review Vol. 18 No.4
pp.105-114. Institute for Security Studies.
http://www.tandfonline.com/doi/s/10.1080/10
246029.2009.9627562?journalCode=rasr20#.
Uu9NOPtdx8E.
Kaiko Namusa,Cyber crime costs banks
$4m. Times of Zambia. http://www.times.
co.zm/?p=18423
Cyber-crime-costs-Zambian-banks--4millio/-
/979180/1883006/-/128vr2iz/-/index.html
United Nations Office on Drugs and Crime
(February 2013) Comprehensive Study on
Cybercrime. http://www.unodc.org/documents/
organized-crime/UNODC_CCPCJ_EG.4_2013/
CYBERCRIME_ STUDY_210213.pdf
This policy brief was contributed by Mr. Mactar Seck with support from Ms. Tsega Belai under the
supervision of Mr. Kasirim Nwuke, Chief, NTIS
Ordering information
To order copies of Tackling the challenges of
cyber-security in Africa policy brief by Economic
Commission for Africa;
Please contact
Please contact: Publications, Economic Commission
for Africa, P.O. Box 3001, Addis Ababa, Ethiopia,
Tel: +251 11 544-9900, Fax: +251 11 551-4416,
E-mail: ecainfo@uneca.org
Web: www.uneca.org
Contact
Further information on ECA’s programme on
Technology and Innovation can be obtained from
Mr. Kasirim Nwuke, Chief, New Technologies and
Innovation Section/Special Initiatives Division,
Telephone: +251-11-544-3375, Office Fax: +251-
11- 551-0512, email: Knwuke@uneca.org.