Abstract

Abstract Incidents of violence perpetrated through digital technology platforms or facilitated by these means have been reported, often in high-income countries. Very little scholarly attention has been given to the nature of technology-facilitated violence and abuse (TFVA) across sub-Saharan Africa (SSA) despite an explosion in the use of various technologies. We conducted a literature review to identify and harmonize available data relating to the types of TFVA taking place in SSA. This was followed by an online survey of young adults through the SHYad.NET forum to understand the nature of TFVA among young adults in SSA. Our literature review revealed various types of TFVA to be happening across SSA, including cyberbullying, cyberstalking, trolling, dating abuse, image-based sexual violence, sextortion, and revenge porn. The results of our online survey revealed that both young men and women experience TFVA, with the most commonly reported TFVA being receiving unwanted sexually explicit images, comments, emails, or text messages. Female respondents more often reported repeated and/or unwanted sexual requests online via email or text message while male respondents more often reported experiencing violent threats. Respondents used various means to cope with TFVA including blocking the abuser or deleting the abused profile on social media. Keywords Adolescents Internet Social media Sub-Saharan Africa Mobile phones Violence Citation Makinde, O.A., Olamijuwon, E., Ichegbo, N.K., Onyemelukwe, C. and Ilesanmi, M.G. (2021), "The Nature of Technology-Facilitated Violence and Abuse among Young Adults in Sub-Saharan Africa", Bailey, J., Flynn, A. and Henry, N. (Ed.) The Emerald International Handbook of Technology-Facilitated Violence and Abuse (Emerald Studies In Digital Crime, Technology and Social Harms), Emerald Publishing Limited, Bingley, pp. 83-101. https://doi.org/10.1108/978-1-83982-848-520211005 Publisher: Emerald Publishing Limited Copyright © 2021 Olusesan Ayodeji Makinde, Emmanuel Olamijuwon, Nchelem Kokomma Ichegbo, Cheluchi Onyemelukwe, and Michael Gboyega Ilesanmi. Published by Emerald Publishing Limited. This chapter is published under the Creative Commons Attribution (CC BY 4.0) licence. Anyone may reproduce, distribute, translate and create derivative works of these chapters (for both commercial and non-commercial purposes), subject to full attribution to the original publication and authors. The full terms of this licence may be seen at http://creativecommons.org/licences/by/4.0/legalcode. License This chapter is published under the Creative Commons Attribution (CC BY 4.0) licence. Anyone may reproduce, distribute, translate and create derivative works of these chapters (for both commercial and non-commercial purposes), subject to full attribution to the original publication and authors. The full terms of this licence may be seen at http://creativecommons.org/licences/by/4.0/legalcode. Introduction The utilization of technology, including cell phones, cameras, internet-associated gadgets, personal computers, and social media, has become part of regular day-to-day activities (Douglas, Harris, & Dragiewicz, 2019; Gillwald, 2017; Henry & Powell, 2018; Simon, Goldberg, Aharonson-Daniel, Leykin, & Adini, 2014). These technologies are used for communicating and to carry out routine tasks. Africa's technology scene is fast-evolving, driven to a great extent by growth in cell phone penetration, which has become a significant tool for innovators beyond its basic use as a communication device. Today, Africa's continuous advancement in technology cannot be separated from the desire to solve its socioeconomic challenges (Eziakonwa, 2019). Cell phones brought new possibilities to Africa: connecting individuals and markets, and facilitating service delivery across the urban–rural divide (Aker & Mbiti, 2011). The overwhelming importance of the internet to development and the economy in the current information age cannot be overemphasized. In 2016, access to the internet was deemed a human right by the United Nations and the intentional disruption of internet, a human rights violation (Howell & West, 2016). About 75% of respondents surveyed across 39 countries by Pew Research were found to either use the internet occasionally or own a smartphone (Poushter, Caldwell, & Chwe, 2018a). Unlike more developed parts of the world where internet access is almost universal and the growth in use has plateaued, internet use in sub-Saharan Africa (SSA) 1 has seen remarkable growth since 2013 (Silver & Johnson, 2018a). In SSA, 41% of respondents utilize the internet across six countries surveyed (Silver & Johnson, 2018a). Of these six countries, South Africa had the highest population with internet access, a median of 59%. This was followed by Senegal (46%), Nigeria (42%), Ghana (39%), Kenya (39%), and Tanzania (25%) (Silver & Johnson, 2018a). The majority of internet users in SSA go online for social communication purposes (Silver & Johnson, 2018a). Paralleling the growth in use of the internet, the use of social media (such as Facebook, Instagram, and Twitter) has continued to see tremendous adoption in emerging and developing economies. The use of online social networking sites in these economies rose by 19% points from 34% to 53% between 2013 and 2018 (Poushter, Caldwell, & Chwe, 2018b). In 2010, Facebook was the most visited website in Africa with more than 17 million subscribers (André-Michel, 2010). The population accessing Facebook from Africa had ballooned to more than 139 million users a month by 2018, with the majority accessing it through their mobile devices (Shapshak, 2018). Social media has played important roles in sociopolitical discussions in the region such as during the “bring back our girls” campaign that was launched after more than 200 secondary school girls were kidnapped by Boko Haram insurgents in Nigeria (Peters, 2014). Twitter was used in coordinating the widespread condemnation and protests that followed to pressure the Nigerian government to act (Fink, Schmidt, Barash, Cameron, & Macy, 2016). Twitter was also used for communication and coordination during the Westgate mall attack in Kenya, with researchers calling for a formal guideline on how to use these communication channels effectively in such emergency situations (Simon et al., 2014). The internet has contributed to various facets of the economy in SSA, including education, health, agriculture, and communication (Silver & Johnson, 2018b; Tom-Aba et al., 2015). In Tanzania, mobile phones have been used as surveillance tools for managing data from a rabies outbreak (Mtema et al., 2016). Similarly, in Malawi, people living with HIV and AIDS receive text messages daily via mobile phones reminding them to take their medicines on schedule (Aker & Mbiti, 2011). In Nigeria, citizens can report domestic and sexual violence via phone calls or email (P.M. News, 2019), and in Ghana, farmers are able to find out the price of tomatoes in Accra, several kilometers away, via text message and decide whether it's worth ferrying their goods there for sale (Aker & Mbiti, 2011). Also in Niger, laborers are able to call friends in Benin Republic to find out about job opportunities ahead of traveling there (Aker & Mbiti, 2011). African business owners are leveraging mobile phones to increase efficiency and delivery of services to consumers (Aker, 2010). The general availability of cell phones has paved the way for electronic banking (Donner & Tellez, 2008). Mobile payment systems have emerged as a reliable alternative payment platform for transactions, consistently reducing the market share of cash-based transactions in national economies that once relied absolutely on cash payments (Aker & Mbiti, 2011). Kenya launched M-PESA in 2007, “a mobile phone–based money transfer, financing, and microfinancing service to allow users to deposit, withdraw, transfer money and pay for goods and services” (Calvo, Morales, & Zikidis, 2017, p. 127). M-PESA allows branchless banking service whereby users can withdraw money from a network of agents that includes airtime resellers and retail outlets acting as banking agents (Jack & Suri, 2011). Between July 2016 and July 2017, 1.7 billion transactions were processed over M-PESA, totaling about 3.6 trillion shillings or 48.76% of the country's GDP (McGath, 2018). Thus, mobile technology has greatly affected the lives of the poor in Kenya and is noted to have lifted over 2% of households out of poverty (Suri & Jack, 2016). Despite the many advantages of technology on a country's economy and populace (Silver & Johnson, 2018b), there are emerging negative consequences of the use of technology that require additional investigation on their dimensions and consequences, and possible action to mitigate their effect (Douglas et al., 2019). Technology-facilitated violence and abuse (TFVA) has emerged as one of these consequences and has been increasingly studied in developed countries that birthed and embraced the widespread use of information and communications technology (ICT) long before SSA countries. The rapid growth in the adoption of various technologies across SSA increases the number of people at risk for TFVA. The use of the World Wide Web and cell phones exposes new opportunities for perpetrators of violence to abuse their targets. Across the world, the number of reported cases of cyberbullying has been on the rise (Burton & Mutongwizo, 2009). The unbound climes of the web equally make those accessing the internet from remote villages exposed to these risks. Hertz and David-Ferdon (2009) emphasize that the contemporary nature of electronic aggression limits the availability of information on the subject. However, available evidence is predominantly from the United States, Canada, the United Kingdom, Australia, and a few European countries. Information relating to TFVA by race, ethnicity, gender, or location reveals TFVA's complexities. For example, although gender-based violence (GBV) is predominantly targeted at women, with at least one in three women having a lifetime experience of GBV (United Nations Population Fund, 2016), a large study conducted in Australia did not find significant differences between men's and women's reported experiences of TFVA (proportion of respondents who experienced at least one type of TFVA was 62.1% for women and 62.0% for men) (Powell & Henry, 2019), although variations were observed to exist across the different dimensions of TFVA investigated in the study. Pockets of research have been conducted in various parts of SSA that describe what has been observed by researchers within their immediate environment. However, we are not aware of any study of TFVA that encompasses the whole of SSA. The purpose of this chapter is to examine the different types of TFVA that have been recorded in SSA, with a particular focus on young adults. The first section provides background information in the form of a review of the current literature on TFVA in SSA. The second section sets out the methodology we used in conducting an online survey of young adults in SSA relating to their experiences with TFVA. The third section sets out the results of our online survey and discusses connections between our findings and the existing literature. Our conclusion summarizes these results and suggests directions for future research and policy. Literature Review In our review of current literature on TFVA in SSA, we found various studies that highlighted a range of issues around the topic across specific countries. We have grouped the issues discussed by these studies into three categories: (1) cyberbullying, cyberstalking, and trolling; (2) digital dating abuse and electronic dating violence; and (3) image-based sexual abuse (IBSA), sextortion, and revenge porn. It is noteworthy that these have been categorized for convenience, and there is no clear line separating one category from the other. Cyberbullying, Cyberstalking, and Trolling Cyberbullying is “bullying which involves the use of ICT such as email, cell phone and text messages, instant messaging, defamatory personal websites, and defamatory online personal polling websites to support deliberate, repeated, and hostile behavior by an individual or group that is intended to harm others” (Belsey, 2005, cited in; Burton & Mutongwizo, 2009, p. 1). Cyberbullying has been widely reported across several countries in SSA including Botswana, Ethiopia, Ghana, South Africa, Senegal, Nigeria, Uganda, and others (Madanda, Ngolobe, & Amuriat, 2009; Mooketsi, 2018; Mulisa & Getahun, 2018; Olumide, Adams, & Amodu, 2015b; Sall, 2017; Sam, Bruce, Agyemang, Amponsah, & Arkorful, 2019). In one study, more than 45% of 18- to 45-year-old female users of Facebook or Twitter in West and Central Africa reported having experienced some form of GBV on social media (Internet Sans Frontieres, 2019). In 2010, the UN estimated that 95% of online “aggressive behavior, harassment, abusive language and denigrating images in online spaces were aimed at women and came from partners or former male partners” (APC, 2010, para 2). Burton and Mutongwizo (2009) reported that in South Africa, young people experienced cyberaggression within and outside the school premises, although this was more pronounced outside the school environment (42.9% vs. 31.0%). Various studies have shown that in Nigeria, about 40% of young people had experienced some form of cyberbullying, though many of them were also perpetrators (Olumide, Adams, & Amodu, 2015a; Olumide et al., 2015b). Cyberstalking involves the use of the internet or electronic devices to monitor a person's activity (Sissing, 2013), while internet trolling involves posting irritating comments, often to get others into an argument (Ansong, Takyi, Damoah, Ampomah, & Larkotey, 2013). These types of abuse have equally been reported in different countries in the region including Ghana, Uganda, South Africa, and Nigeria (Ansong et al., 2013; Madanda, Berna, & Amuriat, 2009; Punch Newspapers, 2020; Sissing, 2013). In Uganda, two women were murdered by their spouses after claiming they discovered romantic SMSs on their phones (APC, 2010; Madanda et al., 2009). In a recent incident reported in Nigeria, a woman was sentenced to death for killing her husband after finding nude pictures of another woman on his phone (Punch Newspapers, 2020). Digital Dating Abuse and Electronic Dating Violence Dating fraud is one of the most frequently discussed forms of TFVA in Africa. While Nigeria has been regularly accused of being the source of romance scams, leading such scams to be popularly referred to as “Nigerian scams,” Edwards et al.’s (2018) analysis found several other African and non-African origins of such scams including Ghana, South Africa, Togo, Senegal, Ivory Coast, Kenya, Malaysia, the United Kingdom, the United States and Turkey. While most of the targets of the dating scams are women seeking companionship in developed countries, there are instances of men who are also tricked using various female profiles (Aransiola & Asindemade, 2011). The mode of operation of the dating scams often involves long-term engagements with victims who fall in love believing such to be a mutual feeling. Unfortunately, many of the victims are tricked into parting with huge sums of money before realizing they were being scammed. Victims of dating scams are left with scars that end up affecting their psychological health. The consequences of dating scams could go beyond emotional and financial losses. In one instance, someone being scammed was convinced to travel to meet her supposed boyfriend based in West Africa. In the course of her visit, she was kidnapped by the boyfriend's gang and held by the group for ransom (Edwards et al., 2018). There is also evidence of severe physical and sexual violence arising from internet-facilitated dating and intimate relationships in Africa. Five cases of women who met their abusers on Facebook or were reunited with them through this channel after not being in contact for a while have been chronicled in Nigeria. Two of the victims were raped while the other three were victims of attempted rape (Makinde, Odimegwu, Abdulmalik, Babalola, & Fawole, 2016). One of the victims was murdered in the process while two others suffered severe physical violence. The victim who lost her life had traveled believing she was meeting with her boyfriend and his business partners based in Lagos (Idongesit, 2014). In another case, a young university undergraduate who first met with a young man on Facebook was pushed out of a third-floor apartment following an argument with him (Idongesit, 2014). While she did not die from her injuries, she suffered severe physical and life-changing injuries including a fractured pelvis (Idongesit, 2014). Image-Based Sexual Abuse, Sextortion, and Revenge Porn Technology-facilitated sexual violence (TFSV) is one form of TFVA. TFSV can include the use of technology to facilitate sexually violent physical encounters (as discussed above), as well as IBSA, sextortion, and revenge porn. IBSA is becoming a prevalent form of TFVA with the increasing availability of camera and video-enabled cell phones (Powell & Henry, 2019). Often, images and videos are made with the consent of everyone involved. However, when the relationship goes sour, one of those involved may threaten to use the image against the other unless the other person meets some specified requests. IBSA can take many forms including sextortion and “revenge porn” (McGlynn, Rackley, & Houghton, 2017). Sextortion is “the threatened dissemination of explicit, intimate, or embarrassing images of a sexual nature without consent, usually for the purpose of procuring additional images, sexual acts, money, or something else” (Patchin & Hinduja, 2018, p. 2). Revenge porn is “the nonconsensual distribution of private, sexual images by a malicious ex-partner” (McGlynn et al., 2017, p. 26). There have been documented incidents of sextortion and revenge porn in Malawi, Uganda, Senegal, Nigeria, and South Africa (Chisala-Tempelhoff & Kirya, 2016; Musoni, 2019; Sall, 2017). In Nigeria, a female university student was expelled after her boyfriend shared a sex video that they had both made at an earlier stage in their relationship (Vanguard News, 2019). Some research indicates that most of the denigrating sexual images available online feature women (APC, 2010). Overall, there is relatively little research on TFVA generally or TFSV specifically in SSA. Only one identified study attempted to quantify the level of TFVA in the region, although its methodology was not adequately explained (Internet Sans Frontieres, 2019). Among available studies, various dimensions of TFVA have been recorded across the breadth of SSA, as outlined above, although incidents of TFVA and TFSV cannot be easily categorized as there is significant crossover among the various types. As a result, little is known about the nature and dimensions of TFVA and TFSV specifically in SSA as a whole, providing reason for additional investigation of these issues. Gaining a better understanding of these issues will be important for developing strategic advocacy, enactment of laws, and preventive action to respond to TFVA and TFSV in SSA. Methodology Study Design and Recruitment We conducted an online survey between November 2019 and February 2020 in order to better understand experiences with various forms of TFVA (with a focus on TFSV) among young African adults between the ages of 18 and 34. Respondents were recruited primarily through a paid advertisement on Facebook. Our team also shared the link to the survey on personal social media profiles and early respondents were encouraged to share the survey link with their friends. The Facebook advertisement environment provides potential advertisers a unique opportunity to target users on the platform based on a set of socio-demographic characteristics (such as age, sex, education, location), interests, or behaviors. Leveraging this opportunity, we initially created an advertisement campaign targeting Facebook users who were living in any SSA country at the time of data collection, were between ages 18 and 34 years, and whose primary language on Facebook was English. However, in order to increase female participation, after observing initially low responses from women, we created another campaign targeting young female adults. Both advertisements ran throughout the period of data collection. The Facebook advertisements were delivered on the news feed of users whose profile matched our inclusion criteria. The advertisement caption described the survey as exploring the use of technology and adverse experiences that could occur from its use. The Facebook advertisement included a link to the survey website (SHYad.NET). SHYad.NET is an online collaborative platform by and for young African adults and is actively managed by one of the authors (EO). The platform was developed in 2018 as a data collection network for monitoring the sexual and reproductive health changes in young African adults. Detailed information about the survey was provided on the SHYad.NET website. Respondents were informed that participation in the survey was voluntary and they could skip any question they did not want to answer. The contact details of one of the authors was also provided on the survey, and respondents were informed that they could get in touch via email should they require additional information about the survey. Instrument We combined several approaches to delineate experiences and coping strategies of TFVA among young adults in SSA countries. Respondents were asked about four forms of TFVA, of which many focused on specific forms of TFSV, as shown in the list below: digital harassment; image-based abuse; sexual aggression and/or coercion; and gender-/sexuality-based harassment. 2 The TFSV questions were adapted from a dichotomous scale with a 21-item measure of TFSV from a previous study conducted by Powell and Henry (2019). The TFSV scale covered four different thematic areas: digital sexual harassment, IBSA, sexual aggression and/or coercion, and gender- and/or sexuality-based hate speech. There were different questions that addressed each of these four themes. Four questions that related to intimate partner technology-facilitated violence in the original scale were modified to reflect technology-facilitated violence perpetrated by anyone. For example, “Partner gained access to your emails or other online accounts without permission” was revised to “Someone gained access to your emails or other online accounts without permission.” Furthermore, respondents who reported having experienced any of the listed behaviors were asked to provide an additional narration of the circumstances of such experience. The respondents who reported having experienced any of the listed behaviors were also asked to describe how upsetting the experience was for them and how they handled the situation (coping strategies). The descriptions provided by the respondents were reviewed and categorized based on themes. Study Sample A total of 581 responses were received on the survey website as of February 28, 2020. During data collection, respondents were first asked to indicate whether they consented to participating in the study or not. The survey was subsequently terminated for the respondents who did not consent to participate in the survey. The survey website tracked the number of attempts made by a user to complete the questionnaire. We identified a few instances of multiple attempts to complete the survey by some users. However, the majority of the multiple attempts involved respondents who did not initially consent to participate in the study during the first attempt but consented prior to participating subsequently. For a few respondents who responded more than once, we carefully identified and excluded all subsequent responses during data analysis. Due to ethical reasons regarding the sampling of minors, we excluded responses from adolescents under 18 years at the time of data collection. We also excluded survey responses with missing information on key demographic characteristics such as age, sex, country of residence, and religious affiliation. These criteria resulted in the exclusion of about 32% of responses from those who did not provide consent to participate in the study, were taking the survey more than once, or did not meet any of the criteria highlighted. Our final analytic sample for the study comprised 389 complete responses from young adults aged 18–34 years who were resident in SSA. Ethical Considerations Ethical approval to collect responses on sexual and reproductive health using SHYad.NET was obtained from the University of the Witwatersrand Human Research Ethics Committee (nonmedical) under research ethics number H19/02/25 prior to recruiting respondents. Data Processing and Analysis We assessed experiences with TFVA based on the respondent's self-reported experience of the listed behaviors. The results were further stratified by gender to compare differences in the experiences of men and women. We then tested the observed differences across gender using Chi-square. A qualitative text analysis of respondents' description of any of the listed experiences was also conducted to provide a contextual description and explanation of the quantitative analysis of TFVA. Quotes from these descriptions were extracted and used to provide additional clarity to observations. Finally, we examined how the respondents handled their personal experience of any of the listed behaviors. Their described experiences were recoded into categorical groups to allow for proportional analysis. All data processing, analysis, and visualizations were done using R statistical package. R is an open source robust statistical package that is rich in conducting visualizations and enables manipulation of charts produced through the application in various dimensions. Its strength in visualization made it helpful in the analysis. Results and Discussion Table 5.1 presents the summary of descriptive characteristics of the sample. The respondents were drawn from 22 countries with one-third of respondents resident in Nigeria (34%), 28% in Kenya, and about 6% in South Africa. The mean age of the respondents was 25 years (SD = 4.94 years). Respondents were mostly male (64%) and the majority (77%) had attained tertiary or higher education. More than three-quarters of the respondents were not married, although 43% were in a relationship. About 82% of the respondents were Christian and 14% were Muslim. Table 5.1. Descriptive Characteristics of Respondents. Sociodemographic Characteristics N = 389 Age 24.8 (4.94) Sex Female 140 (36.0%) Male 249 (64.0%) Education Tertiary 91 (23.4%) Tertiary/Higher 298 (76.6%) Country Ghana 27 (6.94%) Kenya 108 (27.8%) Nigeria 133 (34.2%) South Africa 23 (5.91%) Uganda 29 (7.46%) Zambia 24 (6.17%) Others 45 (11.6%) Relationship Status Not married: not in relationship 148 (38.0%) Not married: in a relationship 169 (43.4%) Married or living with partner 65 (16.7%) Formerly married 7 (1.80%) Religious Affiliation Christian 318 (81.7%) Muslim 53 (13.6%) Others 10 (2.57%) No religious affiliation 8 (2.06%) The high proportion of respondents from Nigeria, Kenya, and South Africa might have been influenced by the high penetration of internet in these countries (Silver & Johnson, 2018a). More educated and affluent people are known to participate in surveys than people with lower levels of education (Bhutta, 2012; Smith, 2008). As such, it was unsurprising that the majority of the respondents in this study had higher educational qualifications. Past research on using Facebook as a recruitment platform also suggests that the Facebook advertising platform tends to oversample better educated, young, and more active members (Rife, Cate, Kosinski, & Stillwell, 2016). This category of people may also have easier access to the internet than their peers with lower levels of education and income. Reported Instances of Technology-Facilitated Violence and Abuse Table 5.2 presents the distribution of self-reported experience of any of the listed behaviors by gender. About 89% of males and 82% of females reported experiencing at least one of the listed behaviors. While more male respondents reported experiencing at least one of the listed behaviors, this difference was not statistically significant. This finding is similar to a study conducted in Australia that did not find an overall statistically significant difference across the proportion of men and women that had experienced at least one type of TFSV (Powell & Henry, 2019). Table 5.2. Self-Reported Experience of Any Specific TFVA Among Respondents. Experience of TFVA No Experience of Any TFVA p Value Sex Female 115 (82.1%) 25 (17.9%) 0.073 Male 222 (89.2%) 27 (10.8%) Type of Technology-Facilitated Violence and Abuse Experienced Fig. 5.1 presents the most common types of TFVA that our respondents reported having experienced. The results show that unwanted sexually explicit images, comments, emails or text messages were the most common types of TFVA experienced by the respondents. More than half (56%) of the respondents (56% females, 56% males) reported receiving unwanted sexually explicit images, comments, or text messages. A 24-year-old male respondent from South Africa described his experience as follows: Someone unknown messaged me on Facebook and after I responded they started talking about sex and they (sent) nude pictures to me. Opens in a new window.Fig. 5.1. Experiences of Various Dimensions of TF

Highlights

  • The utilization of technology, including cell phones, cameras, internet-associated gadgets, personal computers, and social media, has become part of regular dayto-day activities (Douglas, Harris, & Dragiewicz, 2019; Gillwald, 2017; Henry & Powell, 2018; Simon, Goldberg, Aharonson-Daniel, Leykin, & Adini, 2014)

  • The results show that unwanted sexually explicit images, comments, emails or text messages were the most common types of technology-facilitated violence and abuse (TFVA) experienced by the respondents

  • It is notable that the overwhelming majority of young adults in our sample reported having experienced at least one of the listed forms of behavior often associated with TFVA

Read more

Summary

Introduction

The utilization of technology, including cell phones, cameras, internet-associated gadgets, personal computers, and social media, has become part of regular dayto-day activities (Douglas, Harris, & Dragiewicz, 2019; Gillwald, 2017; Henry & Powell, 2018; Simon, Goldberg, Aharonson-Daniel, Leykin, & Adini, 2014). These technologies are used for communicating and to carry out routine tasks. In SSA, 41% of respondents utilize the internet across six countries surveyed (Silver & Johnson, 2018a) Of these six countries, South Africa had the highest population with internet access, a median of 59%. The majority of internet users in SSA go online for social communication purposes (Silver & Johnson, 2018a)

Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call