Neo-Institutionalization of Cyber Criminal Activities in Africa – A Treatise Longe Olumide (PhD) University Academic Department of Computer Science, University.

Slides:



Advertisements
Similar presentations
Business Ethics for Real Estate: A. Glean
Advertisements

Licensing of Intangible Transfers of Technology
The Well-being of Nations
Module 4 Social Determinants of Financial Reporting
Legitimate Leadership SPIAA Training Conference Enhancing Legitimacy: Procedural Justice & Crime Control in the 21 st Century Tuesday, July 22,
Primary aim: Understand how a political agent derives the right to make decisions about an ip. How industrial policy is legitimized in the EU.
Cyber crime impact on Businesses Bogdan Manolea RITI dot-Gov.
MANAGEMENT RICHARD L. DAFT.
Auditor General’s Office One key audit focus area – Compliance with Laws and Regulations.
Chapter 29 Ethics in Accounting
Chapter 1 An Overview of Managerial Finance © 2005 Thomson/South-Western.
© 2010 Cengage Learning. Atomic Dog is a trademark used herein under license. All rights reserved. Chapter 15 Working in the HRM Field.
Stern School of Business Managerial Accounting Summer 2005 Instructor: Francois Brochet.
PowerPoint Presentation by Charlie Cook Copyright © 2005 South-Western. All rights reserved. Module 9 Organizational Action in Complex Environments.
Copyright 2004 Prentice Hall
School-Community Relations. Learning Outcomes (School-Community Relations) Students are able to: Students are able to: Explain the meaning of meaningful.
Copyright © 2015 Pearson Education Ltd.
Traditions and Innovations
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
LOCAL GOVERNANCE IN THE 21 ST CENTURY: FRAUD, CORRUPTION AND ETHICS (THE UGANDA EXPERIENCE) PAPER PRESENTED AT TRAINING WORKSHOP HELD AT DOCKLANDS HOTEL.
1 THE FINANCIAL MANAGEMENT INSTITUTE ETHICS - THE CHALLENGES CONTINUE WILLIAM J. CESSFORD, FCMA, CMA.
Internal Auditing and Outsourcing
Chapter Five – Motivation of Personnel.  Understand a definition of motivation.  Comprehend organizational theory and motivation from a historical perspective.
C H A P T E R 2 Stakeholder Relationships, Social Responsibility, and Corporate Governance.
ISO Richard Welford CSR Asia © CSR Asia 2011.
1 ISO WD3 ISO/TMB WG SR – ISO ISO WD3 Contributing to the development of ISO Dubai Practitioners Workshop (10 July 2007)
Your cybersecurity breach will happen! Here’s what to do to mitigate your risk Thursday, 25 September 2014.
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
A Politics of Vulnerability Reporting Black Hat Briefings, Europe 2001 Scott Blake Director of Security Strategy BindView Corporation/RAZOR Research.
Principles of Management Core Principles
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Developing an Effective Ethics Program
Week 3 – Interdisciplinary Nature of Studying Organizations
Managing the Privacy Function at a Large Company Kimberly S. Gray, Esq., CIPP Chief Privacy Officer Highmark Inc.
6. Management in public sector in the context of anti-corruption policy.
Introduction to Computer Ethics
IS for Managers (INFO 640) L1(b): Challenges in introducing and managing IS/IT in modern day organizations GP Dhillon, PhD Associate Professor of IS School.
Confidence Building Measures Anatoly A.Streltsov D.Tech., D.J., prof. deputy director of the IPII MSU named by M.V.Lomonosov.
LONGE, OLUMIDE, RICHARD, BOATENG CHIEMEKE, STELLA CHANIKA, JONES Towards Remodelling The Peel Theory of Community Policing for Global Cyber Security.
Professor Colon FTC Comparative Criminal Justice Systems / 6 th edition Chapter 2: Domestic Crime, Transnational Crime, and Justice.
Human Resource Management Lecture-38. Summary of Lecture-37.
Organizing in a Changing Global Environment Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall 3-1.
CYBER CRIMES PREVENTIONS AND PROTECTIONS Presenters: Masroor Manzoor Chandio Hira Farooq Qureshi Submitted to SIR ABDUL MALIK ABBASI SINDH MADRESA TUL.
Understanding Business Ethics 2 nd Edition © 2014 SAGE Publications, Inc. Chapter 13 Evaluating Corporate Ethics Understanding Business Ethics Stanwick.
Culture Clash: Law, Business and Technology Mitch Dembin Chief Security Advisor (US) Microsoft Corporation.
31 October The African Policing Civilian Oversight Forum (APCOF) is a network of state and civil society African practitioners active in policing.
The Environment of Management
Growth in West Africa: impacts of extractive industry on women’s economic empowerment in Cote d’Ivoire & Ghana Dr. William BAAH-BOATENG Principal Investigator.
1 AFCOM Data Center World March 15, 2016 Moderator: Donna Jacobs, MBA Panel: Greg Hartley Bill Kiss Adam Ringle, MBA ITM 9.2 The New Security Challenge:
Copyright © 2011 Pearson Education International Business Environments and Operations Global Edition Part Two Comparative Environmental Frameworks 3-1.
Moral Standards Moral standards deal with matters that can seriously injure or benefit humans. For example, most people in American society hold moral.
Organizations of all types and sizes face a range of risks that can affect the achievement of their objectives. Organization's activities Strategic initiatives.
CSC4003: Computer and Information Security Professor Mark Early, M.B.A., CISSP, CISM, PMP, ITILFv3, ISO/IEC 27002, CNSS/NSA 4011.
AJS 532 Entire Course For more classes visit AJS 532 Week 1 DQ 1 AJS 532 Week 1 DQ 2 AJS 532 Week 1 DQ 3 AJS 532 Week 1 The Social.
Chapter 4 The Institutionalization of Business Ethics Copyright © Houghton Mifflin Company. All rights reserved. MGT University of Bahrain College.
Information Security Program
MGMT 452 Corporate Social Responsibility
MANAGEMENT RICHARD L. DAFT.
MANAGEMENT RICHARD L. DAFT.
MGMT 452 Corporate Social Responsibility
Computer Security Fundamentals
Fraud Risk Management at Digital Insurance Market
Ethics & Social Responsibility
AJS 532 Possible Is Everything/snaptutorial.com
8 Building Blocks of National Cyber Strategies
Advanced Management Control and Sustainable Development
CompTIA Security+ Study Guide (SY0-401)
Chapter 8 Developing an Effective Ethics Program
Cyber security Policy development and implementation
Organizational Behavior (OB)
Presentation transcript:

Neo-Institutionalization of Cyber Criminal Activities in Africa – A Treatise Longe Olumide (PhD) University Academic Department of Computer Science, University of Ibadan, Ibadan, Nigeria Director, Institute for Cyber Security & Allied Research ICITD, Southern University, Baton Rouge, Louisiana, USA

Introduction Despite the body of research devoted to cyber attacks, identifying and analyzing the motivation for cyber criminals activities as well as governments and organizational responses that facilitates or hinder these attacks remain a difficult challenge (Cox et al, 2010; Otis & Evans 2003; Econinfosec, 2007). Technocrats and theorists are at odds as to the best way to comprehend the actions of cyber criminals and the symbiotic relationships they have with various players.

Institutions Explained Institutions influencing cyber attacks reside at different levels—global, national, local, social network, professional, industry, inter- organizational and intra-organizational These institutions exerts political, legal, cultural and other environmental factors specific to a country that influence cybercrime. The state is arguably the most important external institutional actor and powerful drivers of institutional isomorphism since a violation of laws and regulations can have harsh economic and social sanctions

Neo Institutional Connections Macro- and micro-level institutions provide regulative, normative and cognitive legitimacy to cyber criminals, organizations’ and governments’ actions that facilitate or hinder cyber attacks Based on institutional procedure, we can connect cyber attack patterns to norms, rules, laws and cognitive assessment of cyber activities. A previous research (Longe et al, 2009) linked institutional legitimacy with cyber conflict and investigated cost-benefit associated cyber criminal activities as well as strategic asymmetry faced by organizations. There is need to understand the exact nature of institutional mechanisms involved in cyber infrastructure and cyber criminal activities.

Recent Trends Recent events gives credence to the fact that institutional processes can influence and explain causation, depth and patterns of cyber attacks. Institutional activities can fuel cyber crime on local, national, national and global perspective. It is also possible to create opportunities for cyber attacks through social engineering networks, professional organization network, inter-organizational and intra-organizational infrastructures (Strang and Sine 2002; Longe et al, 2010).

Disorganization and Deinstitutionalization of Primary Societies in Africa Some institutionalisms refer traditional institutions consisting of custom and limited social networks (intragroup networks) of the pre-industrial era as the true forms of institutions (Sjostrand 1992). The disorganization of primary society through the internet and cyber activities has contributed to society’s increasing deinstitutionalization. In Africa, informal networks are still more effective than formal laws and regulations in dealing with local problems (Mol and Van Den Burg 2004). An individual’s social network is related to the obligation to be trustworthy and follow the norms of equity (Granovetter 1985).

Institutional Pillars Institutions residing at different levels can be described in terms of three institutional pillars: regulative, normative and cognitive: Regulative institutions Regulative institutions consist of "explicit regulative processes: rule setting, monitoring, and sanctioning activities“ These consist of regulatory bodies enforcing existing laws and rules that influence cyber criminals to behave in certain ways.

Normative Institutions Normative components introduce "a prescriptive, evaluative, and obligatory dimension into social life” Practices that are consistent with and take into account the different assumptions and value systems of the national cultures are likely to be successful (Schneider 1999). For instance, informal sanctions applied by a social group such as exclusion of a cyber- criminal from one's circle of friends send negative social feedback to the criminal

Cognitive Institution Cognitive institutions are associated with culture (Jepperson 1991). These components represent culturally supported habits that influence the cyber criminals’ behaviors. Cognitive programs that are built on the mental maps of individual criminals and thus function primarily at the individual level. They are carried by individuals but social in nature Compliance in the case of cognitive legitimacy concerns is due to habits. Political elites, organizational decision makers and cyber criminals may not even be aware that they are complying. Cognitive feedback depending on the nature and motivation of the actor include enjoyment from cybercrime, monetary gains and less guilt in such crimes.

Cyber Criminal Ideologies Ideology is an important component of cognitive institutions energizing many cyber criminals’ behaviors. Some recent cyber criminal activities in Africa are linked with fights for ideology. Ideological hackers attack websites to further political purposes. Such hackings can be mapped with obligation/community based intrinsic motivations (Lindenberg 2001).

Cyber Criminal Ideologies Repatriation Ideology is also another dimension which justifies cyber activities on pay-back from the Western World. Legitimization of cyber criminal activities as a form of gainful employment is also becoming increasingly popular in parts of Africa. Parental support for cyber criminal activities push these criminals to go as far as seeking diabolical means to defraud victims and escapeprosecution

Why Do Entrepreneurs Fall for Cybercrime Greed Gullibility Gratification Ignorance The long awaited miracle syndrome The Love Triangle Permanent Sentiment The Theory of Pseudo Ownership –

Cyber Crime Profile

Does Internet Entrepreneurs Have Enough Information on Cybercrime ? Internet security has not become a boardroom priority in many organizations For example: ◦ A Jupiter Executive Survey in South Africa found that 29% of security practitioners rate the risk of cyber-attacks as “low.” ◦ In Nigeria our recent research found that 5/7 of surveyed businesses does not have a well-defined security plan in place against cyber attacks. ◦ The Small Business Pipeline investigation in Uganda found that 73% of small businesses have no written security plan even though many estimate that any type of business interruption could cost the company upwards of $10,000 per day. In Ghana, Internet security budgets – are generally lower than required

How to prevent Cyber crime

Using the computer at workplace – between efficiency and privacy - Include the Policy on how to use Internet at workplace as a part of the labour contract - Training the employees on usage of Internet and software - Training the employees on how they should treat confidential information and the essential passwords

What to do with a cybercrime case ?

Where to report cyber crime cases? Internet Fraud Complaint Center (IFCC) IFCC is a partnership between the Federal Bureau of Investigation (FBI) and the National White Collar Crime Center (NW3C).

Thank you !