A Comprehensive Analytical Review on Cybercrime in West Africa
- URL: http://arxiv.org/abs/2402.01649v1
- Date: Sun, 7 Jan 2024 23:36:43 GMT
- Title: A Comprehensive Analytical Review on Cybercrime in West Africa
- Authors: Victor Adewopo, Sylvia Worlali Azumah, Mustapha Awinsongya Yakubu,
Emmanuel Kojo Gyamfi, Murat Ozer, Nelly Elsayed
- Abstract summary: West-Africa countries face significant cybercrime challenges, exacerbated by inadequate resources and a dearth of security experts.
This study pinpoints potential cybercrime prevention strategies, such as leveraging the Triage framework.
Our research findings highlight the urgency for policymakers and law enforcement agencies to devise more efficient prevention strategies.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Cybercrime is a growing concern in West Africa due to the increasing use of
technology and internet penetration in the region. Legal frameworks are
essential for guiding the control of cybercrime. However, the implementation
proves challenging for law enforcement agencies due to the absence of a
dedicated and effective regional institutional follow-up mechanism. This study
conducted a systematic literature review focusing on West Africa's prevalence
of cybercrime, governing policies, regulations, and methodologies for combating
cybercrime. West-Africa countries face significant cybercrime challenges,
exacerbated by inadequate resources and a dearth of security experts. This
study pinpoints potential cybercrime prevention strategies, such as leveraging
the Triage framework and broadening research to cover pivotal areas like cyber
aggression and cyberbullying. Our research findings highlight the urgency for
policymakers and law enforcement agencies to devise more efficient prevention
strategies and policies. Overall, this study provides invaluable insights into
the state of cybercrime in West Africa to guide the formulation of potent
prevention and intervention strategies.
Related papers
- Countering Autonomous Cyber Threats [40.00865970939829]
Foundation Models present dual-use concerns broadly and within the cyber domain specifically.
Recent research has shown the potential for these advanced models to inform or independently execute offensive cyberspace operations.
This work evaluates several state-of-the-art FMs on their ability to compromise machines in an isolated network and investigates defensive mechanisms to defeat such AI-powered attacks.
arXiv Detail & Related papers (2024-10-23T22:46:44Z) - Navigating the road to automotive cybersecurity compliance [39.79758414095764]
The automotive industry is compelled to adopt robust cybersecurity measures to safeguard both vehicles and data against potential threats.
The future of automotive cybersecurity lies in the continuous development of advanced protective measures and collaborative efforts among all stakeholders.
arXiv Detail & Related papers (2024-06-29T16:07:48Z) - Analysing India's Cyber Warfare Readiness and Developing a Defence Strategy [0.0]
The demand for strong cyber defence measures grows, especially in countries such as India.
The literature review reveals significant shortcomings in India's cyber defence readiness.
The study proposes an educational framework for training cyber professionals.
arXiv Detail & Related papers (2024-06-18T12:55:07Z) - Guardians of Anonymity: Exploring Tactics to Combat Cyber Threats in Onion Routing Environments [0.0]
Onion routing networks, also known as darknets, are private networks that enable anonymous communication over the Internet.
This paper comprehensively analyzes cybercrime threats and countermeasures in onion routing networks.
arXiv Detail & Related papers (2024-05-11T23:18:00Z) - Assessing The Effectiveness Of Current Cybersecurity Regulations And Policies In The US [0.0]
The study evaluates the impact of these regulations on different sectors and analyzes trends in cybercrime data from 2000 to 2022.
The findings highlight the challenges, successes, and the need for continuous adaptation in the face of evolving cyber threats.
arXiv Detail & Related papers (2024-04-17T15:26:55Z) - Graph Mining for Cybersecurity: A Survey [61.505995908021525]
The explosive growth of cyber attacks nowadays, such as malware, spam, and intrusions, caused severe consequences on society.
Traditional Machine Learning (ML) based methods are extensively used in detecting cyber threats, but they hardly model the correlations between real-world cyber entities.
With the proliferation of graph mining techniques, many researchers investigated these techniques for capturing correlations between cyber entities and achieving high performance.
arXiv Detail & Related papers (2023-04-02T08:43:03Z) - Building a Resilient Cybersecurity Posture: A Framework for Leveraging
Prevent, Detect and Respond Functions and Law Enforcement Collaboration [0.0]
This research paper compares and contrasts the CyRLEC Framework with the NIST Cybersecurity Framework.
The CyRLEC Framework takes a broader view of cybersecurity, including proactive prevention, early detection, rapid response to cyber-attacks, and close collaboration with law enforcement agencies.
arXiv Detail & Related papers (2023-03-20T05:16:54Z) - Proceedings of the Artificial Intelligence for Cyber Security (AICS)
Workshop at AAAI 2022 [55.573187938617636]
The workshop will focus on the application of AI to problems in cyber security.
Cyber systems generate large volumes of data, utilizing this effectively is beyond human capabilities.
arXiv Detail & Related papers (2022-02-28T18:27:41Z) - Poisoning Attacks on Cyber Attack Detectors for Industrial Control
Systems [34.86059492072526]
We are first to demonstrate such poisoning attacks on ICS online neural network detectors.
We propose two distinct attack algorithms, namely, back-gradient based poisoning, and demonstrate their effectiveness on both synthetic and real-world data.
arXiv Detail & Related papers (2020-12-23T14:11:26Z) - Review: Deep Learning Methods for Cybersecurity and Intrusion Detection
Systems [6.459380657702644]
Artificial Intelligence (AI) and Machine Learning (ML) can be leveraged as key enabling technologies for cyber-defense.
In this paper, we are concerned with the investigation of the various deep learning techniques employed for network intrusion detection.
arXiv Detail & Related papers (2020-12-04T23:09:35Z) - Adversarial Machine Learning Attacks and Defense Methods in the Cyber
Security Domain [58.30296637276011]
This paper summarizes the latest research on adversarial attacks against security solutions based on machine learning techniques.
It is the first to discuss the unique challenges of implementing end-to-end adversarial attacks in the cyber security domain.
arXiv Detail & Related papers (2020-07-05T18:22:40Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.