Vol 3 No 1 (2020): Volume 3 Issue 1 Year 2020
Articles

Cybercrimes: Threats, Challenges, Awareness, and Solutions in Sierra Leone

Ibrahim Abdulai Sawaneh
Department of Computer Science at the Ernest Bai Koroma University of Science and Technology, Magburaka, Sierra Leone
Published March 9, 2020
Keywords
  • Cybercrime,
  • Cyber-Law,
  • Cybercriminals,
  • Cyberspace,
  • Hacking
How to Cite
Sawaneh, I. A. (2020). Cybercrimes: Threats, Challenges, Awareness, and Solutions in Sierra Leone. Asian Journal of Interdisciplinary Research, 3(1), 185-195. https://doi.org/10.34256/ajir20114

Plum Analytics

Abstract

The internet hosts all online activities either for public or private usage. It is a powerful online podium where people socialize, make new friends, conduct academic research, perform online business transactions, share sensitive data, communication over the internet, surveillance purpose by security agencies, monitor climatic condition, used in e-healthcare system, online banking, online pay, e-commerce, defense system, and host of others critical infrastructures are the new order of the day. This has attracted online criminals to diverse numerous malicious techniques to invade people’s privacy and also exploit those data. A new game has resulted in these online malicious activities are known as “cybercrime or internet crime” which is a rewarding business as of today. Therefore, it has become difficult to protect those online activities as cybercrimes are growing daily, which suggests that effective and appropriate countermeasures are needed to combat those threats and make online activities more secure. The research paper presents the various types of cybercrime activities, countermeasures, and suggestions for online users.

Downloads

Download data is not yet available.

References

  1. Anand Kumar Shrivastav, Ekata, (2013) ICT Penetration and Cybercrime in India: A Review, International Journal of Advanced Research in Computer Science and Software Engineering, 3, 414-419.
  2. Harpreet Singh Dalla, Geeta, (2013) Cyber Crime – A Threat to Persons, Property, Government, and Societies, International Journal of Advanced Research in Computer Science and Software Engineering, 3.
  3. Hemraj Saini, Yerra Shankar Rao, Panda, T.C., (2012) Cyber-Crimes and their Impacts: A Review, International Journal of Engineering Research and Applications, 2, 202-209
  4. Lee, M. (2015). The evolution of cybercrime: From Julius Caesar and Prince Philip to state-sponsored malware. International Business Times. Retrieved from: http://ibtimes.co.uk.
  5. Prince, Mathew (2016). Empty DDoS Threats: Meet the Armada Collective”. Cloudflare.
  6. Richard Donegan, (2012) Bullying and Cyberbullying: History, Statistics, Law, Prevention, and Analysis, The Elon Journal of Undergraduate Research in Communications. 3, 33-42.
  7. Romagna, M., Van Den Hout, N.J., (2017). “Hacktivism and Website Defacement: Motivations, Capabilities and Potential Threats”. Proceedings of the 27th Virus Bulletin International Conference: 41 – 50.
  8. Saroj Mehta & Vikram Singh, (2013) Study of Awareness about Cyber Laws in the Indian Society, International Journal of Computing and Business Research, 4.
  9. Taylor, R. W., Fritsch, E. J., & Liederbach, J. (2015). Digital crime and digital terrorism. (3rd ed.). Upper Saddle River, NJ: Pearson.
  10. Taylor, R. W., Fritsch, E. J., & Liederbach, J. (2015). Digital crime and digital terrorism. (3rd ed.). Upper Saddle River, NJ: Pearson.
  11. Vineet Kandpal and Singh, R.K., (2013) Latest Face of Cybercrime and Its Prevention In India, International Journal of Basic and Applied Sciences, 2, 150-156.