Examining Media Portrayals of and Approaches To Cybercrimes in Botswana
Examining Media Portrayals of and Approaches To Cybercrimes in Botswana
Examining Media Portrayals of and Approaches To Cybercrimes in Botswana
Student Name:
Student ID:
Supervisor:
Course Code:
Course Name:
Faculty:
Department:
Programme:
Tshephaone Reasentse
201104855
Miss. C. Behrens
CJS 421
Research Project
Social Sciences
Sociology
BA: Criminal Justice Studies
In loving memory of my beloved grandmother who contributed so much on my life, my personal and
professional growth, may her soul rest in peace!
Mrs. Emily Mosidi Bogatsu (1933-2015)
ACKNOWLEDGEMENTS
I must first acknowledge my gratitude to Miss. Camden Behrens whose guidance, supervision for this
dissertation is unrivalled, and also for her meticulous attention to the details of this dissertation.
Credit is also due to other people who offered timeless support and profoundly inspired me namely;
Prof. J. Kiggundu, Prof. K. Acheampong, Prof. D. Sebudubudu, Dr. I.S. Malila, Dr. G. Faimau, Dr. D.
Mpabanga, Dr. R. Kumar, Dr. V.B. Lunga, Dr. Mooko, Dr. N. Swartz, Dr. K. Setlhare, Mrs. M.K.
Gaborone, Mrs. K.T.O. Mashaka, Mr. T. Ntsabane, Mrs. E. Alexander, Mr. P.B. Gunda, Mrs. R. Segokgo,
Mr. G.G. Makofi, Mrs. K. More, Mrs. V. Sekgwathe and lastly to my colleagues, criminal justice
scholars class of 2015.
ii
TABLE OF CONTENTS
ABSTRACT..1
1. INTRODUCTION.1
1.1.
Importance of Research...2
1.2.
1.3.
2.2.
3. LITERATURE REVIEW.4
3.1.
3.1.1. Worldwide.5
3.1.2. African Continent.6
3.1.3. Republic of Botswana7
3.2.
Research Design..12
4.2.
4.3.
Data Collection.13
4.4.
7.2.
7.3.
7.4.
7.5.
7.6.
7.7.
7.8.
8. DISCUSSION OF FINDINGS...21
9. CONCLUSION AND RECOMMENDATION(S).25
10. PLAGIARISM DECLARATION...26
11. REFERENCES27
iv
LIST OF ABBREVIATIONS
ACRI
BPS
CSI
CEMAC
CoE
Council of Europe
DCEC
DISS
DDoS
Distributed Denial-of-Service
EAC
ECOWAS
ECTA
EU
European Union
FBI
ICT
INTERPOL
MISA
MLA
PC
Personal Computer
PROATIA
RICPCTIA
RSA
SADC
SSA
USA
ABSTRACT
This dissertation examines the media representations of and approaches to cybercrimes specifically
in Botswana. In a bid to examine and establish such media representations of cybercrime, data was
collected from seven (7) Botswana online newspapers namely; Daily News, The Echo, Botswana
Guardian, Sunday Standard, The Voice, The Midweek Sun and Mmegi. The argument of this paper is
that cybercrimes in general are underreported by the media despite the economic and other negative
consequences that results from these crimes. In addition, there are more potential victims of
cybercrimes in Botswana therefore cybercrime education is paramount to prevent multiple
victimization of cybercrimes and policing of cybercrimes. Moreover the media often reports and
narrates the outcomes of cybercrime court cases focusing more on the offender thus neglecting the
victims of cybercrimes. Lastly the commonly reported types of cybercrimes are, cyber fraud and card
cloning.
Key Words: Cybercrimes, Media representations
1. INTRODUCTION
Cybercrime in and of itself is of great concern globally, unlike more traditional forms of
communication, the Internet allows users to communicate with many people, cheaply and easily. The
estimated 1.6 billion people on the Internet, approximately 24 per cent of the worlds population,
provide an unprecedented pool of potential offenders and victims of cybercrimes (Clough, 2007),
moreover the expanding wave of Internet connectivity and digital technologies bring us a lot of
convenience, at the same time they also offer criminals more chance to commit crime (Sekgathe &
Talib, 2011). According to Aas, (2007) cybercrime is an elusive phenomenon and can cover a number
of acts and activities1. Wall (2001: 2 in Aas, 2007) points out that the term has no specific referent in
law2 and is a concept mainly invented by the media but consensus is that crimes committed on the
cyberspace are cybercrimes hereinafter defined as, the use of a computer as an instrument to
These can either be the target of the offence, such as when the offender steals information from or cause damage to
the computer system, or a tool by which offence is facilitated, such as fraud or the distribution of child pornography
(Gooch & Williams, 2007).
2
You will seldom find a clear and fixed definition of cybercrime in the interpretation section of a cybercrime statute
but the overall aim of that statute (International, Regional or National) will seek to address and/or combat cybercrimes
vide Council of Europe (COE) Convention on Cybercrime, (2001) and Botswana Cybercrime and Computer related
Crimes Act of 2007.
1|Page
further illegal ends, such as committing fraud, trafficking in child pornography and intellectual
property, stealing identities, or violating privacy (Cybercrime, 2015).
1.1.
Importance of Research
What is vital to discuss is that the media on the other hand plays a pivotal role in reporting incidence
of crimes in general because individuals generally cannot get sufficient information on their own to
make informed decisions on public matters, so they rely on media to provide information therefore,
free media helps ensure that the democratic principle of publicity sometimes referred to as
transparency is satisfied (Media Freedom, 2015). The media also serves as a watchdog by scrutinising
and criticising public officials over the way they manage public affairs (Balule, 2008) and also
addresses issues of national security, cybercrimes being one of them. Therefore with all that said the
purpose of this study was to examine the media reports in relation to the incidence or occurrence of
cybercrimes and establish whether such reports truly reflects the gravity and extent of cybercrimes
in Botswana. Furthermore, various online newspapers both state and private print media were
explored and perused to decipher the portrayals of cybercrimes in general. However, it is worth
mentioning that researcher found very little relevant studies or research done in Botswana on media
representations of cybercrimes. This shows that there is a gap in the information on cybercrime and
media reporting in Botswana, and this makes the study more pertinent.
1.2.
Background to Study
It is evident that the use of modern technology and the cyberspace has not only improved the lives
of individuals in a civil society but also to administration of governments and government service
delivery in most states. The proliferation of digital technology, and the convergence of computing
and communication devices, has transformed the way in which we socialise and do business. While
overwhelmingly positive, there has also been a dark side to these developments. Proving the maxim
that crime follows opportunity, virtually every advance has been accompanied by a corresponding
niche to be exploited for criminal purposes. Our increasing dependence on computers and digital
networks makes the technology itself a tempting target; either for the gaining of information or as a
means of causing disruption and damage. (Clough, 2007). In addition, according to Sekgwathe, (2014)
she is of the view that the exact impact of cybercrime is often underestimated or unknown hence the
disastrous economic impact of these attacks are not well established, this phenomena however
prompted the United States Federal Bureau of Investigations (FBI) to make e-security or cyber
2|Page
security the third unit of its mission because of the unknown disastrous economic impacts of
cybercrime as mentioned above.
Furthermore with the advent of cybercrimes which are regarded a global concern as these crimes do
no occur within country boundaries. In order to address this cross-border crimes, countries had had
to come together to device ways in which cybercrime can be prevented. Amongst others, the 2001
European Convention on Cybercrime also known as the Budapest Convention. The Convention on
cybercrime3 was set up to ensure that countries participate and adopt appropriate legislation hence
harmonization of domestic laws, this Convention however represents a comprehensive international
response to the problems of cybercrime4. The need for harmonization of laws came as a result of the
principle in international law that Countries are understandably protective of their right to impose
their own standards under their domestic criminal law, countries may even see opportunities to
establish themselves as data havens, providing maximum privacy and minimal regulation of content
hosted there. For others, particularly in the developing world, cybercrime may simply not be a priority
(Clough, 2007). This was confirmed by the Attorney General of Botswana (Molokomme A. L., 2012)
in her address to Octopus Cybercrime Conference in France that in Botswana, it was felt that we
had other more pressing challenges that need our attention, resources and time, more than issues
which did not seem to affect the day-to-day lives of ordinary citizens, such as cybercrime.
1.3.
Statement of Problem
In the 2014 state of the Nation address by President S.K.I. Khama stated that the ever changing
environment in the policing landscape presents new challenges such as the growing
sophistication of violent, serious and intrusive, transnational, organized and cybercrimes. Many
Batswana are also falling prey to online as well as more conventional conmen (Khama, 2013).
This is corroborated by Colarik, (2006) that cybercriminals have become skilled and been targeting
asserts to sell because cyberspace encompasses multinational jurisdiction, cybercriminals circumvent
prosecution by operating in countries that have either weak or non-existent computer crime law, or
lack the resources for strong enforcement.
The Convention on Cybercrime remains the most influential international treaty dealing with breaches of law over the
internet or other information networks (Anonymous, Handbook of European data Protection Law, 2014).
4
The Convention also provides for procedural powers covering search of computer networks and interception of
communications in the context of fighting cybercrimes.
3|Page
The media has shown has made their observations on this issue of cybercrimes for example, online
media reports such as Sunday Standard claim that Botswana is a global cybercrime hotspot5. From
this article in that paper it was stated that Botswana has been identified as a potential cybercrime
hotspot which provides organized cybercrime with the ability and the hosting capacity to attack
western countries. This emerged in a research project launched by the International Cyber Security
Protection Alliance to identify how cyber-attacks are likely to evolve over the next eight years. This
research however, has explored the way in which media reporting of cybercrimes is framed, whether
such reports truly reflects the nature and extent of cybercrimes in Botswana. Henceforth, various
online media reports were collected for examination.
The aim of this research is examining the media representations of cybercrimes in Botswana.
2.2.
2.2.1. To assess the extent to which the media in Botswana portrays incidents of cybercrimes
2.2.2. To examine the vulnerability of the users of the cyberspace as reported by the media
2.2.3. To find out the impact of media reporting of cybercrimes on victims and offenders of
cybercrimes
2.2.4. To find out the type of cybercrimes that are reported by the media in Botswana
2.2.5. To establish a nexus between cybercrime reporting patterns and the individual journalists
3. LITERATURE REVIEW
In this section, the review of literature has been categorized into three (3) parts viz; i) Prevalence of
Cybercrime worldwide, ii) Cybercrime Media Reporting and lastly iii) Legal Situation of Cybercrimes
(Inter and Intra-jurisdictional measures). These categories provides an overview on the complexities
of cybercrime and media reporting thereof. As indicated above in the rationale of the research, in
the searching for relevant research on the topic of media representation of cybercrimes, the
researcher could find very little relevant studies or research done in Botswana. Therefore, I relied on
studies conducted in some countries in Africa, Europe and North America.
(Anonymous, Sunday Standard Online Edition. Botswana is Global Cybercrime Hotspot, 2012)
4|Page
3.1.
3.1.1. Worldwide
Studies conducted on the subject cybercrime shows that cybercrime is a growing concern not only
nationally but also internationally. On a global scale, research (The 2013 Norton Cybercrime report)
indicates that 64% of males, compared to 58% of females, are more likely to become victims of
cybercrime6. It also suggests that the highest numbers of cybercrime victims are found in Russia
(85%), China (77%) and South Africa (73%)7. Innocent populace are falling prey to cheats, threats,
money and identity losses, sexual abuses etc. especially on the cyberspace, and most of the victims
around the World especially in developing countries, are still ignorant of their rights on the Web and
the methodology to bring a culprit to book (Sekgathe & Talib, 2011). Moreover, the 2013 Norton
Cybercrime report suggests that 50% of online adults have been victims of cybercrime and/or
negative situations in 12 month period and 41% of online adults have become victim of malware,
viruses, hacking, scams, fraud and theft. Only 3 in 10 adults (31%) however, thought they were more
likely to become a victim of online, rather than offline crime. The 2011 Norton report also indicated
a 3% rise in overall cybercrime since the 2010 survey and reported the most common (and most
preventable) type of cybercrime remained computer viruses or malware8. In addition, the CSI/FBI
Computer Crime and Security Survey in (Clough, 2007) shows that in previous years the most common
category of attack was virus, worm or Trojan infections (64% in 2005). In 2006 the survey split this
category into two new categories, virus or worm infections and Trojan or rootkit infections: fortyfive per cent of respondents experienced virus or worm infections, 21% experienced Trojan or rootkit
infections while 18% experienced both. The relatively high level of attack by Trojans and rootkits
reflects a broader trend of such malware being utilised for ID theft and the creation of botnets9.
The report further showed that almost of the tablet and smartphone consumers leave security behind i.e. they do
not use basic precautions such as passwords, security software or back up files for their mobile device.
7
The report (op cit) shows that Consumers security IQ is high on Personal Computers (PC), and low on mobile phones
because 90% of PC users delete suspicious emails from people they dont know unlike 6% of mobile users. 72% of PC
users have at least a basic free antivirus solution unlike 33% of mobile users and lastly, 78% of PC users avoid storing
sensitive files online as dissimilar to 48% of mobile users.
8
A generic term (short for malicious software) covering a range of software programs and types of programs designed
to attack, degrade or prevent the intended use of a computer network e.g. viruses, worms and/or Trojans (Gooch &
Williams, 2007).
9
A program which infects a targeted computer and allows it to be controlled remotely.
5|Page
A survey released in 2013 by the Ditch the Label anti-bullying charity sampled 10,008 young people
aged between 13-22 years old. Out of the 10,008, 67% were from the United Kingdom, 17% from the
United States of America, 12% from Australia and 4% from other countries. The report identified
different levels of cyberbullying10 across different social networks, showing that: i) 7 out of 10 young
people have been victims of cyber-bullying, and ii) 37 % have experienced cyber-bullying on a highly
frequent basis and 20 % have experienced extreme cyber-bullying on a daily basis. The findings also
showed that the most common social networks for cyberbullying were Facebook (54%), Twitter (28%)
and Ask FM (26%).
10
the act of threatening, teasing, ridiculing and embarrassing another person through technological mediums such as
social networking websites (for example, Facebook, Twitter and Myspace), texting and Instant Messaging (Merwe,
2015)
11
Nigeria is regarded as the hub or safe haven for cybercrime in the world and has been at the spot light from the
international community for its involvement in cybercrime. It is ranked the 3rd in the world behind the USA and Britain
and the 1st within the African continent.
12
A 2010 report by the McAfee cybersecurity firmly cites Cameroon as the worlds riskiest destination for internet
surfers with more than a third (36.7%) of websites hosted in Cameroon being suspicious (McAfee, 2009)
6|Page
their nature are borderless and as a result of this, the SSA countries tried to come up with coordinated
efforts within their regions, in Africa and the wold in general. These efforts have seen Africa Regional
blocks like EAC13, CEMAC, ECOWAS14 and SADC work towards harmonizing, their laws, holding
working sessions to train law enforcement officers and partnering with other international
organizations and companies to fight cybercrimes which has been a success.
3.2.
From the outset mass media representations of crime, deviance, and disorder have been a perennial
cause of concern and research (Anonymous, Media Representations and Responsibilities, n.d.) shows
that in general people overestimate the level of crime in their community, and media representations
of crime are thought to be partly responsible for this; The report further shows that there is
widespread concern that the level and type of crime reported in the media presents a distorted view
of the real level of crime in the community; and that this misrepresentation may lead to prejudice
towards certain groups, stereotyping of certain groups, people becoming isolated from their
community through fear of crime, and the imposition of draconian measures to fight crime. The
13
7|Page
disciplinary role of the media stories about crime, reproducing as well as representing order, is
supported more clearly by research (Maguire, Morgan, & Reiner, 2012). This is partly because media
representations exaggerate the threat of fear of crime and in the main promote policing and
punishment as the antidote. Similarly Pollark, (2007) had the same findings which indicate that news
reporting follows the law of opposites, the characteristics of crime, criminals, and victims
represented in the media are in most respects the polar opposite of the pattern suggested by official
crime statistics. The problem with the above reports is that it did not examine cybercrimes but
instead overgeneralized it as a crime like most traditional forms of crimes despite its uniqueness. In
addition (Reiner,n.d) argues that news reporting of crime and, further, of the particular types of crime
on which journalists disproportionately focus, is selective and unrepresentative. News reporting of
crime victims is equally so.
17
A theory, in both every day and scientific use, is normally used to denote a model or set of concepts and propositions
that pertains to some actual phenomena; a theory can provide understanding of these phenomena or form the basis
for action with respect to them. Qualitative researcher do no usually design their research primarily to apply or test
formally constructed theories about the topics and settings they study. Instead they normally seek to better understand
these topics and settings through their investigations and to inductively develop theory about these from their data.
(Given, 2008).
8|Page
sensational rather than the mainstream, and stories of computer misuse may be uncritically accepted
and repeated by the journalists. A case in point is that of Aron Caffrey an 18-year-old hacker who was
charged with a target cybercrime18, the defense he pioneered (Trojan horse defence) was that
someone hacked into his computer Turkish hackers and tried to frame him, claiming they regularly
seized control of chat rooms and other Internet sites. He said his computer operating system allowed
remote access and control and therefore was vulnerable to Trojan horse programs and this defence
has been used successfully in cases in which the use of a computer was incidental to the crime.
Brenner, (2010) argued in his observation that If the Trojan horse defense is routinely used to win
acquittals in U.S. cybercrime cases, that is not being reported by the media. Because the media tends
to report the outcome of cases that go to trial, the lack of media reports of Caffrey-style victories
suggests his success may be something of an aberration.
18
19
They include hacking, malware, and Distributed Denial of Service (DDoS) attacks
(Anonymous, Botswana Gazette Journalist, Lawyer arrested over Story, 2015)
9|Page
Botswana Gazette offices shortly after 1400Hrs on May 6, 2015 with a warrant to confiscate
computers and documents of the organization. The following day (May 7), DCEC officers returned
and placed under arrest Shike Olsen, acting Editor Lawrence Seretse and the journalist Innocent
Selatlhwa. It later became evident that the arrests were related to an article published by the Gazette,
titled DCEC foils Chitube, Reatile and Moumakwas alleged P150 million oil deals. The article linked
a deported Zambian national, Jerry Chitube, to illegal activities for Botswanas intelligence arm, the
Directorate on Intelligence and Security Services (DISS), and the ruling Botswana Democratic Party.
This was a concern for MISA Botswana because three Gazette employees were arrested and detained
for almost five (5) hours inside the holding cells of the DCEC. Their lawyer, Joao Salbany was also
arrested and detained, but at a different location at Mogoditshane Police Station (Anonymous,
Botswana Gazette Journalist, Lawyer arrested over Story, 2015).
3.3.
20
21
10 | P a g e
or service level agreements to make cooperation smooth and effective. This legal assistance (MLA)
which form an important part of the fight against cybercrime, are handled by the Directorate of Public
Prosecutions. Notwithstanding that, Botswana has a generous mutual legal assistance legislation
which makes possible, assistance to any country with which Botswana has some reciprocal form of
MLA arrangement. Ngakaagae, (2010) asserted that no agreement exists with the European Union
(EU), and Botswana has not acceded to the EU convention on cybercrime. Botswana cybercrime
legislation however is based on the EU model and borrows heavily (almost word for word) from the
same. With the exception of the absence of a provision specifically enabling real time interception of
traffic data there would appear to be little, if any, legal impediment to requirements for accession,
but in attempting to address the issues relating to the current cybercrime and computed related
crimes act, the Permanent Secretary in the Ministry of Defence, Justice and Security, Segakweng
Tsiane outlined the following strategies put in place by Botswana Government in dealing with cyber
security such as the drafting and reviewing of laws such as Counter terrorism Bill, Proceeds and
Instruments of serious Crime Bill, Human trafficking Bill, Criminal Procedure and Evidence Act and so
on (Anonymous, Botswana workshop advances SADC Cyber Security reforms, 2015).
Ngakaagae, (2010) further alludes to the fact that although it is desirable that Botswana accede to
the EU Convention, true consensus is unachievable. Countries are understandably protective of their
right to impose their own standards under their domestic criminal law, particularly when we consider
the myriad of interests that come into play when seeking to regulate the Internet and other new
technologies. What may be achieved, however, is a broad consensus which can then be built upon in
the future for those areas where there is less international agreement. This is the approach adopted
by the Council of Europe Convention on Cybercrime, the first, and so far the only, multinational
instrument to address issues of cybercrime. (Clough, 2007)
4. RESEARCH METHODOLOGY
4.1.
Research Design
The research in its entirety was a qualitative research and exploratory22 because the researcher
wanted get an insight on cybercrime media reporting and on this basis, attempt to explain why the
media represents cybercrimes the way they do. Given the short time for this research (3 months),
22
Research in which social phenomena are investigated without priory expectations, in order to develop explanations
of them (Bachman & Schutt, 2014)
12 | P a g e
the research was cross-sectional23 that is, data was collected there and then within a period of a
semester (March, April and May 2015). In addition, this was a case study24 in the Botswana context
and relied heavily on secondary data analysis hence most online-newspapers were analysed both
public and private media. The research entailed an extended literature review to supplement the
findings.
4.2.
Since the research was conducted within a short period of time, for the purpose of Botswana, It was
imperative to provide an overview of the Botswana media by categorizing it into two namely; i) Print
media (Botswana Gazette, Botswana Guardian, Botswana Daily News, Midweek Sun, Sunday
Standard, The Voice and Ngami Times) ii) Broadcast Media (Television: Botswana Television-BTV
which is state owned, Radio: Gabz FM, Radio Botswana 1, Radio Botswana 2, Yarona FM and Duma
FM) (Republic of Botswana-Government portal, 2014). In addition, Radio Botswana and Botswana
Television falls under the department of Broadcasting Services. So my sample was based on online
print media thus simple random sampling25 because there are very few online newspapers to deal
with so, I used (7) private newspapers26 and one (1) public newspaper. The reason being that I had
to be as objective as possible because private media has been framed to be anti-government and
state media pro-government, so I had to consider them both despite the fact that there is only one
state online newspaper.
4.3.
Data Collection
As elucidated in the research design above, the research was qualitative therefore the data collection
instrument employed was the document study or analysis of documents27. The newspaper articles
which were perused online from their respective websites were; the Botswana Daily News, Botswana
23
13 | P a g e
Gazette, Botswana Guardian, Mmegi, The Voice, The Echo and Sunday standard online newspapers,
reported online stories from 2008 to 2015 the reason being that the cyber laws were assented by the
cabinet on 2007 so the idea was to see whether the media view this law as a deterrent measure of
these cybercrimes and how this law is administered by courts both on victims and offenders of
cybercrimes.
4.4.
In my blueprint of data analysis, the intention was to analyse the data using the thematic coding and
analysis28 where data collected would be categorised into themes29 all of which describes the various
dimensions of the fact in issue, how the media in Botswana frames cybercrimes so as to ascertain the
trends and patterns of words used, their frequency, their relationships, the structures and discourses
of communication. In addition as stated from above, the research was a case study and the data
collection method was content analysis which is the intellectual process of categorizing qualitative
textual data into clusters of similar entities, or conceptual categories, to identify consistent patterns
and relationships between variables or themes. Lastly, the styles of data display adopted was mixed
methods that is graphic summaries30 and quotes31.
28
Thematic analysis is a data reduction and analysis strategy by which qualitative data are segmented, categorized,
summarized and reconstructed in a way that captures the important concepts within the data set (Given, 2008).
29
An idea that recurs in or pervades a work of art or literature, themes typically are derived from codes generated by a
qualitative researcher (Given, 2008).
30
These include tables, bar graphs, pie charts, line graphs, matrices, hierarchical relationship indicators and flow charts.
All of these provide a quick summary of considerable chunks of data, producing an overall snapshot which can then be
more fully explained and illustrated with other forms of qualitative display such as quotes or case studies (Grbich,
2007).
31
This usually involves the display of key quotes. When more than one quote is displayed, the purpose is to
demonstrate the variety in responses or to emphasise the concordance of a range of views on a particular issue. In both
cases, the display acts as a starter for more detailed explanations or discussions (Grbich, 2007).
14 | P a g e
6. ETHICAL CONCERNS
For this section even though it is important for every academic research, in my case it does not apply
in the sense that the research relied heavily on secondary data and content analysis unlike if it
involved dealing with human beings directly.
7.1.
NEWS PAPER
CODE
ARTICLE(S)
Ballout goes to Jail
Cybercrime court
Incidence of
Offender
case
cybercrimes
representation
Anti-cybercrime
Education on
Vulnerability of the
Victim
workshops
Cybercrime
users of the
representation
important
cyberspace
Cybercrimes
Cybercrime
extraditable-
Legislation
Types of cybercrimes
Reporting patterns
and journalists
Minister
The coding frame above illustrates how Botswana Daily newspaper which is a state owned newspaper
displays cybercrimes and their occurrence. I must state that from their database within a period of 7
years (2008-2015) only eight (8) articles were retrieved which discussed specifically cybercrimes. This
clearly shows that cybercrimes are underreported as they should. What can be deciphered from the
above table is that the reporter(s) of the daily newspapers tend to focus more on the offenders and
thats what I learned from four (4) Articles which focused more on Joseph Ballout who was facing
cybercrime offenses. On the victim aspect, only one article discussed the vulnerability of the users of
the cyberspace because it stressed on the essence of cybersecurity, this was indicted when it was
15 | P a g e
reported that Ms. Segakweng the permanent secretary in the Ministry of Defence, Justice and
Security contended for the need for public education on cybercrime32. The problem with the 8 articles
I read was that daily news journalists tend to omit other important information which would
otherwise give credit to the story such as the case of Ballout where they did not report the victims
position his/her whereabouts and so on. In short the state media does not report incidence of
cybercrimes more often than other crimes in general.
7.2.
CODE
Cybercrime suspects
Cybercrime
Incidence of
Offender
remanded
court case
cybercrimes
representation
Police commissioner
Cybercrime
Reporting patterns of
Offender
policing
cybercrime
representation
Cybercrimes and
Cybercrime
Types of cybercrimes
Extent of
cybercriminals
specific
Cybercrimes
reporting
AON survey shows
Cybercrime
Vulnerability of Users
Victim
specific
of the cyberspace
representation
under-rated by captive
reporting
directors
Botswana is global
Cybercrime
Vulnerability of Users
Victim
cybercrime hotspot
specific
of the cyberspace
representation
reporting
On the face of it, what can be deduced from the above Sunday standard coding frame is that,
cybercrime representation is fairly good as opposed to the Daily News. From the sixteen (16) articles
I perused where detailed and succinct portraying both offenders and potential victims equally. I must
also state that some reporters of Sunday standard where contradictory in their stories in the sense
that a there would be a mismatch in the title of the story an example is an article titled No Laws in
32
16 | P a g e
Botswana to combat Internet crime published on the 9th February 2012 by Calistus Bosaletswe33,
when you read the contends you will discover that there are laws that attempts to address internet
crimes as he put it, the issue was the difficulty faced by law enforcement to extradite offenders who
committed cybercrime outside Botswana and also to indicate that Cybercrime and Computer Related
crime Act was enacted in 2007 so this results in misinformation. The problem I observed which was
similar to online Daily Newspaper was that the reporting patterns of journalist are more or less the
same in the sense that when they report cybercrimes they either focus solely on the offender or
victim not both which is ideal so that a reader may be able to conclude that the victim of cybercrime
incurred financial losses and the type of assistance he sought. What I can say is that Sunday Standard
reports incidence of cybercrimes in a satisfactory manner because from their stories it clearly shows
various business companies in the private sector and some in the public sector are vulnerable and
likely to become victims of cybercrime should it happen.
7.3.
CODE
Cybercrime court
Incidence of
Offender
Bai
case
cybercrimes
representation
An obvious assumption looking at the above coding frame would be under-reporting of cybercrimes
in general by the voice newspaper. It barely reports cybercrime and I must indicate that I managed
to retrieve seven (7) articles all of which had the key word cybercrime. Moreover what I learnt from
this newspaper was that it sensationalise issues before they are verified and title of the stories and
the contents of the story are almost invariably haphazard and inconsistent particularly on
cybercrimes. The way this newspaper reports stories is more of exaggeration which has the effect of
defaming victims of cybercrimes in general. Out of the 7 articles, only one reports on the offender
who was alleged to have committed a cybercrime offence hereinafter Dan Kenosi who was denied
bail34. The type of cybercrime that was reported is distribution of pornographic materials online.
33
34
(Bosaletswe, 2012)
(Matota, 2015)
17 | P a g e
7.4.
CODE
Cybercrime
teeth
legislation
Cybercrime
passes
prosecutorial
Extent of cybercrimes
Types of cybercrime
Extent of cybercrimes
Types of cybercrime
Extent of cybercrimes
procedure
Cybercrime cases on
Cybercrime specific
the increase
reporting
cybercrime poses
Cybercrime policing
Types of cybercrimes
Extent of cybercrimes
Cybercrime court
Incidence of
Offender
on Daniel Kenosi
case
cybercrimes
representation
challenge to the
police
From the above mmegi coding frame, of the ten (10) articles I perused so far the conclusion would
be that the focus is more on addressing the extent of cybercrime, but there is no specific reference
to victims of cybercrimes at all rather only offenders are included in the story. Mmegi newspaper
acknowledges that cybercrime cases are on the increase and by far the types of cybercrimes reported
involve fraudulent commercial or monetary transactions; and card cloning where skimming devices
are placed in ATM machines to duplicate information from a victims debit card. In fraudulent online
shopping, victims are lured into fully paying for non-existent goods before delivery35.
35
18 | P a g e
7.5.
CODE
Cybercrime reporting
arrested on
Reporting patterns
cybercrimes
and journalists
Cybercrime penalty
electronic trafficking
in pornographic
material
Guilty verdict test
Cybercrime court
Incidence of
Botswanas
case
cybercrimes
Convicted
Cybercrime court
Incidence of
Offender
cybercriminal
case
cybercrimes
representation
cybercrime law
thrown in jail
The above Midweek Sun coding frame shows that cybercrime media reporting is poor because I was
able to retrieve only three (3) articles from the database. The problem with these articles was,
cybercrimes were not discussed in detail instead there was constant reference to the Cybercrime and
Computer Related crimes Act. Just like the voice newspaper the, the stories portrays only offenders
of cybercrimes but very little reference is done to the victims thereof.
7.6.
CODE
Cybercrime reporting
Extent of cybercrimes
cybercrime
What I can deduce from the four (4) articles that I have read together with interpreting the above
coding frame, firstly Botswana guardian newspaper reports incidence of cybercrime piecemeal and
the way it reports its stories would persuade a reader that cybercrimes are not of public concern.
Secondly, it does not establish both the victims and offenders of cybercrimes but will give a vague
19 | P a g e
reference and only financial consequences of such crimes because in one of the articles was claimed
that Botswanas digital migration will cost the government 1 billion pula (BWP)36.
7.7.
CODE
Lack of cybercrime
Cybercrime
legislation putting
Legislation
you at risk
Botswana gazette has only one (1) article on cybercrimes in their online data base up to date. This
also shows that cybercrimes are under-reported by the newspaper. What can be said is that the
above article or story merely criticizes the Cybercrime and Computer Related crimes Act in that it
does not fully protect victims of cybercrime. The newspaper alleges that 60% of people still use a
single email for everything, not knowing that it provides easy access for hackers which shows that a
significant number of people are vulnerable to cybercrimes.
7.8.
CODE
Cyber-crime biggest
Education on
threat to economy
Cybercrime
Cyber-criminal jailed
Extent of cybercrimes
Cybercrime court
Incidence of
Offender
case
cybercrimes
representation
Metrotech to Host
Education on
Incidence of
Extent of cybercrimes
cyber-crime summit
Cybercrime
cybercrimes
Apart from the obvious contention that Echo online newspaper under-reports cybercrimes, on the
article cyber-crime biggest threat to economy37 has unpacked the complexities of cybercrimes and
has clearly defined cybercrime in express terms to mean illegal or illicit activity committed through
the use of computers and internet which was their first point of discussion. Moreover the reporter
also claims that human trafficking and illegal money transfer and fraud which are now thriving
36
37
20 | P a g e
through the use of computers and internet are now categorized as cyber-crimes. I must also indicate
that the reporter also claims that Botswana has also been ranked as one of the most secretive country
where fraud and illegal financial deals thrive, thus fraud and tax evasion in the business and financial
sector has expressed concern that millions of swindled money from Botswana is siphoned through
countries such as Zimbabwe. The aforesaid article is detailed and satisfactory because it discusses
the types of cybercrimes that occur, the extent of cybercrimes particularly the banking sector and
the report further claims that there is an Non-Governmental Organization called African Cyber Risk
Institute (ACRI) that have a research department, which gathers information from the public and
receive first-hand information from victims who lost money from their banks and it was indicated
that cyber-crime is increasing in phenomenal speed. Botswana have been subjected to millions of
spam the past decade, customers lost money through cyber dating scam, and people lost money
from banks. A lot was learnt from this article and on a lighter note just like other journalists from
other papers, when reporting cybercrime court cases the attention is more on the offender only
which is something common so far.
8. DISCUSSION OF FINDINGS
It is important to allude to the fact that there is little to no research conducted on media
representation of cybercrimes particularly in Botswana therefore the prime focus in this section
predominantly lies on the correlates between this study and international research as discussed from
the literature review. The findings of this research echoes most of the findings that were discovered
before and upon analysing most online newspaper articles, there was a pattern of reporting that I
observed and some overarching themes which will be discussed in detail in this section. By and large
the media in Botswana generally underreports incidence of cybercrimes because from a period seven
(7) years i.e. from 2008-2015 one would find a range of 1-16 articles/stories on cybercrimes from
each newspaper database as opposed to traditional crimes generally. This finding however affirms
the study that was conducted by (Reiner,n.d) who suggested that news reporting of crime and,
further, of the particular types of crime on which journalists disproportionately focus, is selective and
unrepresentative.
Notwithstanding the above, I must also indicate that the findings of this research shows that,
Botswana media tends to report cybercrime court cases and narrates what transpired from the case.
This reflects (Brenner, 2010) findings that as with other forms of crime, the media tends to report
21 | P a g e
the outcome of cases that go to trial, and stories of computer misuse may be uncritically accepted
and repeated by the journalists. In addition, the findings of this research furthers shows that the story
of Joseph Ballout38 and Daniel Kenosi39 was often repeated by six (6) newspapers from different
media houses i.e. Daily newspaper, Sunday standard newspaper, The Voice newspaper, Mmegi
newspaper, Midweek Sun newspaper and the echo. Furthermore, majority of journalists from various
media house tend to report cybercrimes as crimes that offenders would hardly get bail, which gives
an implication that the courts are unjust in handling cybercriminals, thereby labelling cybercriminals
as guilty before they go to trial. An example was when a journalist (Shapi, 2014) from Daily
Newspaper reports that the presiding magistrate Mrs. Linah Oahile-Mokibe uttered a statement
during trial to the effect that Ballout was man enough to take care of his actions, noting that the
sentence was meant to send a strong message to would-be criminals who might be tempted to act
likewise, another journalist (Pheko, 2014) from The Echo newspaper had the same perspective;
Joseph Ballout found out the hard way that crime does not pay silver haired cybercrime convict
Joseph Ballout will learn his fate today a strong statement that which incriminates an offender. The
findings of this research showed that the media is biased because unlike Joseph Ballouts court case
the perspective was to prejudge him as guilty and that he should taste his own medicine but for
Daniel Kenosis case the perspective was that the state was arbitrarily using its power to persecute
and label innocent offenders. The issue was diverted from cybercrimes as Kenosi was facing to
infringement of media freedom because Daniel Kenosi was and is still a journalist. This is how it was
reported (Matota, 2015); Scores of journalists and members of the public thronged the Village
Magistrate Court on Wednesday morning to offer support to Daniel Kenosi, a young journalist and
publisher who was arrested and jailed last week and also more people were interviewed namely;
BPS Public Relations Officer Mr. Christopher Mbulawa and MISA Botswana spokesperson, an extract
from the voice newspaper and mmegi newspaper (Matota, 2015: MISA press release on Daniel
Kenosi, 2015);
In a press statement MISA noted that the Acts used to charge Kenosi may not pass
constitutional muster because they are too wide and, therefore, are an unreasonable
infringement of section 12 (1) of the Constitution which provides for freedom of expression,
38
convicted on single charge of unlawful possession of computer devices and 14 cashing and paying cards designed for
the commission of cyber fraud crimes has been fined P10 000 and sentenced to six months prison term (Shapi, 2014).
39
A suspect in a case of unlawful distribution of pornographic or obscene material contrary to section 16 of the
Cybercrime and Computer Related Crimes Act (Matota, 2015).
22 | P a g e
which includes freedom by the media to communicate information without hindrance In our
view, all these blanket provisions ought to be challenged in court for breaching freedom of
expression.
Cybercrimes are portrayed to have negative effects and consequences which are detrimental to the
economy of a country as a whole and Mowaneng, (2015) gave this report the effects of cyber-crime
can affect the development of businesses in a bad manner thus denting the image of an organisation.
I must also indicate that the findings shows that some private newspapers tends to blame the
government for not doing enough to fight cybercrimes despite the continuously increasing levels of
cybercrimes, example from a report from Botswana gazette; On the governments side, Deputy EGovernment Controller, John Vassiliadis agreed that the cyber law had been surpassed by the
advancement of technology (Mogende, 2013) this affirms (Sekgwathe, 2014) findings that the exact
impact of cybercrime is often underestimated or unknown hence the disastrous economic impact of
these attacks are not well established, one journalist reported this in the echo
newspaper(Anonymous, Cyber-Crime; Biggest Threat to Economy, 2014); While there are no
statistics on cyber-crime activities in this country, human trafficking and cagey illegal financial deals
are among the worrying cyber-crime activities which are threatening the local Gross Domestic
Product (GDP). Lastly the findings further gives an impression is that there are more potential victims
of cybercrime in Botswana because there is lack of awareness of cybersecurity measures, training
and education all of which coincide with (Olowu, 2009) findings there is a need to educate users in
security awareness, and develop cybercrime regulations.
The literature shows the common types of cybercrimes reported are target cybercrimes, example
viruses, malwares and cyber fraud (Brenner, 2010: Sekgathe & Talib, 2011). The findings of this report
shows that cyber fraud, card cloning are the common types of cybercrimes reported by the media
(mmegi newspaper and the echo);
illegal money transfer and fraud which are now thriving through the use of computers
and internet are now categorized as cyber-crimes40... cybercrime cases on the increase Cyber
criminals have swindled over P9 million from Batswana, with cases of credit card fraud
increasingly41... the most common cybercrime involve fraudulent commercial or monetary
40
41
23 | P a g e
transactions; and card cloning where skimming devices are placed in ATM machines to
duplicate information from a victims debit card. In fraudulent online shopping, victims are
lured into fully paying for non-existent goods before delivery42.
The findings of this report shows that victims of cybercrimes are neglected because the focus tends
to be more on the offenders and only a few articles discusses the proactive measures that potential
victims of cybercrimes can employ, this was reported in the echo newspaper (Anonymous, CyberCrime; Biggest Threat to Economy, 2014) in the following manner;
ACRI Managing Director Beza Belayneh made an observation that organizations are making
significant investments on security systems and processes he also emphasized that computer
and internet users must be educated continuously on emerging threats on cyber space..
Project 2020 will deliver information and recommendations that raise awareness amongst
governments, businesses and citizens to help them prepare their defences against future
threats43.
Lastly the literature shows that due to the lack of security awareness programmes or specialised
training for the law enforcement agencies, many online users are becoming victims of cyber-crime
attacks and the incidence of successful attacks is increasing with impunity (Olowu, 2009), the findings
of this report reflects the same and mmegi newspaper (Anonymous, Cyber crime poses challenge to
police, 2015) claims that Even though the offence of cybercrime is extraditable, it is often a challenge
for the police to utilise government resources in search of suspects who in the end will be charged
with minor offences such as insultSo far, there is no specialist unit in Botswana dealing with
cybercrime.
42
43
24 | P a g e
25 | P a g e
10.
PLAGIARISM DECLARATION
Tshephaone Reasentse
15
May
2015
Authors Signature:
________________________________
26 | P a g e
REFERENCES
Aas, K. F. (2007). Globalization and Crime. London: Sage Publications.
Abraham, R. (2012). Media and National Security. New Delhi: KW Publishers Pvt ltd.
Akuta, E. A., Ong'oa, I. M., & Jones, C. R. (2011). Combating Cyber Crime in Sub-Sahara Africa; A
Discourse on Law, Policy and Practice. Journal of Research in Peace, Gender and
Development Vol. 1(4), 129-137.
Anonymous. (1-2). Media Representations and Responsibilities. Australian Psychological Society,
<www.psychology.org.au>, 2000.
Anonymous. (2012, July 23). Sunday Standard Online Edition. Botswana is Global Cybercrime
Hotspot. Retrieved from
http://www.sundaystandard.info/article.php?NewsID=14537&GroupID=1
Anonymous. (2013, August 26). DCEC investigates digital migration. Retrieved from
http://botswanaguardian.co.bw/news/570-dcec-investigates-digital-migration
Anonymous. (2013, February 18). Sunday Standard Online Edition. Police Commissioner issues alert
on Cybercrime. Retrieved from http://www.sundaystandard.info
Anonymous. (2014, November 18). BW Government website: Republic of Botswana-Government
portal. Retrieved from http://www.gov.bw/ministries--Authorities/Ministries/StatePresident/
Anonymous. (2014, November 18). BW government: RESPONSE TO US STATE DEPARTMENT PRESS
STATEMENT ON MR. MOKONE. Retrieved from
https://www.facebook.com/permalink.php?story_fbid=688968094519185&id=1482284119
26492
Anonymous. (2014, December 11). Cyber crime cases on the increase. Retrieved from
http://www.mmegi.bw/index.php?sid=1&dir=2007/
Anonymous. (2014, June 10). Cyber crime law gets teeth. Retrieved from
http://www.mmegi.bw/index.php?sid=1&aid=30&dir=2007/October/Friday5
27 | P a g e
Anonymous. (2014, October 17). Cyber-Crime; Biggest Threat to Economy. Retrieved from
http://www.echoonline.co.bw/index.php/business/item/2248-cyber-crime
Anonymous. (2014). Handbook of European data Protection Law. Council of Europe.
Anonymous. (2014, January 19). Sunday Standard Online Edition. AON survey shows cybercrime,
terrorism are under rated by captive directors. Retrieved from
http://www.sundaystandard.info
Anonymous. (2015, April 1). Botswana Freedom House. Retrieved from
http://freedomhouse.org/report/freedom-press/2013/botswana
Anonymous. (2015, May 11). Botswana Gazette Journalist, Lawyer arrested over Story. Retrieved
from http://www.misa.org/misa-chapters/botswana/item/3070-botswana-gazettejournalists-lawyer
Anonymous. (2015, March 9). Botswana workshop advances SADC Cyber Security reforms.
Retrieved from http://minetravel.co.bw/general-news/2014/06/06/botswana-workshopadvances
Anonymous. (2015, September 3). Cyber crime poses challenge to police. Retrieved from
http://www.mmegi.bw/index.php?aid=7640
Anonymous. (2015, March 11). MISA press release on Daniel Kenosi. Retrieved from
http://www.mmegi.bw/index.php?aid=50320
Anonymous. (2015, May 11). Mmegi Online: Challenges of Botswana Journalism. Retrieved from
http://www.mmegi.bw/index.php?sid=1&aid=24&dir=2008/july/friday18
Anonymous. (2015, March 14). Modipane Sex Spree turns into Rape. Retrieved from
http://m2.facebook.com/TheVoiceBW?v=timeline&page=1sectionLoadingID=m_timeline_lo
ading_div_1393660799_0_36_1×tart=0&
Anonymous. (2015, March 13). Modipane trio arrested on electronic trafficking in pornographic
material. Retrieved from http://themidweeksun.co.bw/news/5309-modipane-tro-arrestedon-electronic-trafficking-in
Atkey, R. (1991). Reconciling Freedom of Expression and National Security. The University of
Toronto Law Journal, Vol.41, No. 1, 38-59.
28 | P a g e
Bachman, R., & Schutt, R. K. (2014). The Practice of Research in Criminology and Criminal Justice.
Carlifornia: Sage Publications.
Balule, B. T. (2008). Insult Laws: A Challenge to Media Freedom in SADC's fledging Democracies?
The comparative and International Law Journal of Southern Africa, Vol. 41, No.3, 404-427.
Batisani, O. (2014, August 1). Cyber-criminal Jailed. Retrieved from
http://www.echoonline.co.bw/index.php/local-news/item/1892-cyber-criminal-jailed
Baxter, A. (2014). Improving responses to Cybervictimization in South Australia. Victim support
service incorporated, pp: 1-29.
BOPA. (2013, February 12). Cybercrimes extraditable- minister. Retrieved from
http://www.dailynews.gov.bw/news-details.php?nid=942
BOPA. (2014, June 8). Anti-cybercrime workshops important. Retrieved from
http://www.dailynews.gov.bw/news-details.php?nid=11907
Bosaletswe, C. (2012, February 9). Sunday Standard Online Edition. No laws in Botswana to combat
internet crimes. Retrieved from http://www.sundaystandard.info
Botswana National e-Government Strategy. (2011-2016).
Brenner, S. W. (2010). Cybercrime Criminal Threats from Cyberspace. Carlifornia: praeger.
Broadcasting Regulations Subsidiary Legislation. (2010). Gaborone: Government Printer.
Clough, J. (2007). Principles of Cybercrime. Cambridge: Cambridge University Press.
Colarik, A. M. (2006). Cyber Terrorism: Political and Economic Implication. London: Idea Group
Publishing.
Constitution of Botswana. (2005). Gaborone: Government Printer.
Council of Europe (COE): Convention on Cybercrime. (2002). International Legal Materials, Vol. 41,
No. 2 , 282-302.
Cybercrime. (2015). Encyclopaedia Britannica Ultimate Reference Suite, Chicago: Encyclopaedia
Britannica.
Cybercrime and Computer Related Crimes Act. (2007). Gaborone: Government Printer.
29 | P a g e
Ditch the Label, 2013, pp. 1-16 viewed 21 April 2015. (2015, April 21). Retrieved from
http://www.ditchthelabel.org/annual-cyber-bullying-survey-cyber-bullying-statistics
Fick, J. (2009). Cyber Crime in South Africa: Investigating and Prosecuting Cyber Crime and the
Benefits of Public-Private Partnerships. Price Water House Coopers (PCW).
Given, L. M. (2008). The Sage Encyclopedia of Qualitative Research Methods. Los Angeles: Sage
Publications.
Gooch, G., & Williams, M. (2007). Oxford Dictionary of Law Enforcement. Oxford: Oxford University
Press.
Grbich, C. (2007). Qualitative Data Analysis: An Introduction. London: Sage Publications.
Greer, C. (n.d.). News Media, Victims and Crime.
Harf, M. (2014, November 18). On Arrest for Sedition in Botswana of Outsa Mokone. Retrieved from
https://www.facebook.com/U.S.EmbassyGaborone/posts/10152667315540359
James, L. P. (2014, November 3). Cybercrime and Cybercriminals. Retrieved from
http://www.sundaystandard.info/article.php?NewsID=21374&GroupID=5
Jewkes, Y. (2004). Media and Crime: Key Approaches to Criminology. London: Sage Publications.
Khama, S. K. (2013). State of the Nation Address. Gaborone: Botswana Government.
Mackinnon, P. (1977). Conspiracy and Sedition as Canadian Political Crimes. McGill Law Journal,
622-643.
Maguire, M., Morgan, R., & Reiner, R. (2012). The Oxford Handbook of Criminology (5th Ed.).
Oxford: Oxford University Press.
Marvasti, A. (2008). Doing Qualitative Research: A Comprehensive Guide. Carlifornia: Sage
Publications.
Marvasti, A. B. (n.d.). Qualitative Research in Sociology.
Matota, L. (2015, April 3). Dan Kenosi denied bail. Retrieved from
http://www.thevoicebw.com/2015/04/03/dan-kenosi-denied-bail/
30 | P a g e
Media Freedom. (2015). Encyclopaedia Britannica Ultimate Reference Suite, Chicago: Encyclopaedia
Britannica.
Media Practitioners Act. (2008). Gaborone : Government Printer.
Mediadefence. (2014, November 18). Explaining Issues: Sedition. Retrieved from Mediadefence
Website: http://mediadefence.org/stories/explaining-issues-sedition
Merwe, C. V. (2015). The Nature and Extent of Cyberbullying of Senior High School Students at
Abbotts College (Century Gate Campus) (Bachelors Degree Thesis). University of South
Africa.
MISA. (2014, November 18). Botswana-Media Institute of Souther Africa. Retrieved from MISA Web
site: http://www.misa.org/misa-chapters/botswana
Moeng, G. (2014, June 10). Facebook, SMS bill passes. Retrieved from
http://www.mmegi.bw/index.php?aid=178
Mogende, M. (2013, April 24). Lack of cyber crime legislation putting you at risk. Retrieved from
http://www.gazettebw.com/lack-of-cyber-crime-legislation-putting-you-at-risk/
Molokomme, A. (2011). Combating Cybercrime in Botswana. University of Botswana Law Journal,
55-59.
Molokomme, A. L. (2012). The Botswana Experience with Cybercrime Legislation and other
Measures. Octopus Conference on Cooperation Against Cybercrime, (pp. 1-5). Strasbourg.
Morula, M. (2013, July 28). Cyber crime suspects remanded. Retrieved from
http://www.sundaystandard.info
Mowaneng, G. (2015, February 27). Metrotech To Host Cyber-crime Summit. Retrieved from
http://www.echoonline.co.bw/index.php/business/item/2488-metrotech
Ngakaagae, K. (2010). Botswana (Experiences on Cybercrime). Octopus Interface Conference, (pp. 14). Strasbourg.
Olowu, D. (2009). Cyber-Crimes and the Bounderies of Domestic Legal Responses: Case for an
Inclusionary Framework for Africa. Journal of Information, Law & Technology (JILT),
<http://go.warwick.ac.uk/jilt/2009_/olowu>, 1-18.
31 | P a g e
Sorial, S. (2010). Can Saying Something make it So? The Nature of Sedious Harm. Law and
Philosophy, Vol.29, No.3, 272-305.
Symantec. (2015, April 21). '2013 Norton Report', Symantec, pp. 1-28. Retrieved from
http://symantec.com/about/news/resources/press_kits/detail.jsp?pkid=norton-report-2014
33 | P a g e