A Review of Privacy, Internet Security Threat, and Legislation in Africa: A Case Study of Nigeria, South Africa, Egypt, and Kenya

A Review of Privacy, Internet Security Threat, and Legislation in Africa: A Case Study of Nigeria, South Africa, Egypt, and Kenya

Bellarmine Ezumah, Suraj Olunifesi Adekunle
ISBN13: 9781466601611|ISBN10: 1466601612|EISBN13: 9781466601628
DOI: 10.4018/978-1-4666-0161-1.ch005
Cite Chapter Cite Chapter

MLA

Ezumah, Bellarmine, and Suraj Olunifesi Adekunle. "A Review of Privacy, Internet Security Threat, and Legislation in Africa: A Case Study of Nigeria, South Africa, Egypt, and Kenya." Internet and Distributed Computing Advancements: Theoretical Frameworks and Practical Applications, edited by Jemal H. Abawajy, et al., IGI Global, 2012, pp. 115-136. https://doi.org/10.4018/978-1-4666-0161-1.ch005

APA

Ezumah, B. & Adekunle, S. O. (2012). A Review of Privacy, Internet Security Threat, and Legislation in Africa: A Case Study of Nigeria, South Africa, Egypt, and Kenya. In J. Abawajy, M. Pathan, M. Rahman, A. Pathan, & M. Deris (Eds.), Internet and Distributed Computing Advancements: Theoretical Frameworks and Practical Applications (pp. 115-136). IGI Global. https://doi.org/10.4018/978-1-4666-0161-1.ch005

Chicago

Ezumah, Bellarmine, and Suraj Olunifesi Adekunle. "A Review of Privacy, Internet Security Threat, and Legislation in Africa: A Case Study of Nigeria, South Africa, Egypt, and Kenya." In Internet and Distributed Computing Advancements: Theoretical Frameworks and Practical Applications, edited by Jemal H. Abawajy, et al., 115-136. Hershey, PA: IGI Global, 2012. https://doi.org/10.4018/978-1-4666-0161-1.ch005

Export Reference

Mendeley
Favorite

Abstract

This chapter serves as a collection of works that were done in the area of cybersecurity in Africa—with a focus on four countries representing the cardinal points in Africa: Kenya, Nigeria, Egypt, and South Africa. It presents detailed information on the legislative framework proposed and implemented by these countries to combat and control cybercrimes. Notable among them are the Egypt’s e-Signature Law 15, Kenya’s e-Transaction Bill, Nigeria’s Computer Security and Critical Information Infrastructure Protection Bill, and South Africa’s Electronic Communications and Transaction Act. Equally, these legislative measures were commended, criticized, and factors that militate their implementation are discussed. The ultimate realization is that cybercrime can never be abolished; rather, every effort aims at combating and controlling it in some way. Finally, the chapter posits areas that the African nations can improve in their quest for making cyberspace safer.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.