Abstract

The study sought to evaluate the impact of cybercrime practice in local authorities with special reference to Bulawayo City Council. Zimbabwean organizations both private and public, including local authorities have not been spared by the effects of cybercrime. Given this susceptibility to risk there was a deficit of cyber security best practices at the Bulawayo City Council. Chapter two of the study reviewed past works in terms of which the conceptual framework, theoretical framework and empirical framework were highlighted. The study was based on the routine activities theory that expressed that cybercrime even in local authorities was ordinary and it just required opportunity. Chapter three highlighted the research methodology. The research was largely based on a case of the Bulawayo City Council; hence the design used was a case study. The defense for using the case study was that the research evaluated the impact of cybercrime practice in local authorities with special reference to Bulawayo City Council. An aggregate of 93 respondents were sampled using judgmental sampling. The results showed that illegal access to computer systems, illegal interference and identity theft were amongst the types of cybercrime faced whilst worker training was the major strategy to fight cybercrime. Basing on the results, it was concluded that cybercrime was predominant in local authorities, with hacking, identity theft, phishing and scamming inter alia being the greatest risks faced. It was recommended that in reply to governmental and business requirements for cyber-protection specialists and personnel growth requirements, academic bodies could create specific learning programmes and courses to unite information and research, and intensify synergies in understanding cyber protection.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.