Constraints in Prevention of Cybercrime in Public Cybercafés in Kisumu City

  IJCTT-book-cover
 
         
 
© 2020 by IJCTT Journal
Volume-68 Issue-7
Year of Publication : 2020
Authors : Vivian Anyango Oloo, George Raburu, Michael Oduor Okoya
DOI :  10.14445/22312803/IJCTT-V68I7P106

How to Cite?

Vivian Anyango Oloo, George Raburu, Michael Oduor Okoya, "Constraints in Prevention of Cybercrime in Public Cybercafés in Kisumu City," International Journal of Computer Trends and Technology, vol. 68, no. 7, pp. 37-42, 2020. Crossref, https://doi.org/10.14445/22312803/IJCTT-V68I7P106

Abstract
The World Wide Web or internet has gained exponential growth and popularity, bringing people closely together by creating virtual cyberspace communities during the last three decades. Undoubtedly, the internet has also revolutionalized life in the developing world including Kenya, where cash transfer and various form of data files are extensively exchanged. On the contrary, insecurity in the internet systems or cyber insecurity has concomitantly grown resulting to risks and disasters that are technologically oriented. The Cybersecurity Report shows that Kenya lost Sh21.1 billion to cybercrime in 2017, a 40 per cent increase from Sh15.1 billion in 2015. Although security measures such as simcard registration and control of Internet Protocol (IP) have been initiated in public cybercafés, little effect seems to have been achieved with scanty information available with regards to constraining factors. The purpose of this study was to explore factors constraining prevention of cybercrime, among public cybercafés in Kisumu City. Specific objectives were to: assess the infrastructure among public cybercafes, and to assess the factors constraining prevention of cybercrime among cybercafés. Cross sectional survey design was employed on a sample of 48 attendants from randomly selected 18 cybercafés operating in the city. Questionnaire was used for data collection while descriptive statistics was used for data analysis. Findings revealed that there is inadequate infrastructure to aid identification and monitoring of cybercrime, copuled by few and untrained attendants in the public cybercafés in Kisumu City. The major constraints affecting cybercrime prevention were lack of awareness and education on cybercrime detection and prevention, inadequate training, non-reporting of cybercrime to relevant authorities, low awareness of government policies and poor infrastructure as evidenced by low number of internet access points and cyber attendants within the cybercafés. The study recommends that thorough awareness and education on cyber security be launched by stakeholders to curb this menace.

Keywords
Cyber Crimes, cybercafes, infrastructure, prevention constraints, cyber security.

Reference
[1] Ajayi, E. F. G. (2016). “Challenges to enforcement of cyber-crimes laws and policy”.Journal of internet and information systems, 6(1), 1 – 12.Ali, M.M. (2016).
[2] “Determinants of Preventing Cyber Crime: a Survey Research”. International Journal of Management Science and Business Administration, 2 (7), 16-24.
[3] Chiroma, H., Abdulhamid, S.M., Gital, A.Y., Usman, A.M., and Maigari, T.U. (2011). “Academic Community Cyber Caf´es - A Perpetration Point for Cyber Crimes in Nigeria”. Information Sciences and Computer Engineering, 2 (2), 7–13.
[4] Lakshmanan, A. (2019). “Literature review on Cyber Crimes and its Prevention Mechanisms”. Technical Report.Research Gate: DOI: 10.13140/RG.2.2.16573.51684, https://www.researchgate.net/publication/331010726.
[5] Lutta, V. O. and Obiri, J. F. (2015). Cyber Crime a Rising Threat for Internet - Based Businesses in Western Region, Kenya. International Journal of Scientific & Engineering Research, 6, (3), 371 – 378. Norton (2015)."Cybercrime definition". Retrieved 24th October, 2019, http://us.norton.com/cybercrime.
[6] Oso, Y.W., & Onen, D (2011). ”General Guide for Writing Research Proposal and Report.A handbook for beginning Researchers.” Options Press and Publishers,
[7] Kisumu PricewaterhouseCoopers (PwC, 2011). Economic Crime Survey India Report, 2011.
[8] Tsohou, A. and Holtkamp, P. (2018). “Are users competent to comply with information security policies? An analysis of professional competence models.” Information Technology & People, 31 (5), 1047-1068.
[9] Spanaki,K., Gürgüç, Z., Mulligan, C. and Lupu, E. (2019). “Organizational cloud security and control: a proactive approach”. Information Technology & People, 32(3), 516-537
[10] Vahdati, S. and Yasini, N. (2015), “Factors affecting internet frauds in private sector: a case study in cyberspace surveillance and scam monitoring agency of Iran”, Computers in Human Behavior, 51 (A), 180-187.
[11] Van Niekerk, B. (2017). “An analysis of cyber-incidents in South Africa”.The AfricanJournal of Information and Communication (AJIC), 20, 113-132.
[12] Priya. R (2016) "An Ideal Approach for Detection of Phishing Attacks using Naïve Bayes Classifier". International Journal of Computer Trends and Technology (IJCTT) V40(2):84-87, October 2016. ISSN:2231-2803. www.ijcttjournal.org.