Trends, impacts and responses to cybercrime in the Zimbabwean retail sector
Author:
Mugari Ishmael,Kunambura Maxwell,Obioha Emeka E.,Gopo Norah R.
Abstract
Purpose
This study aims to explore the nature and impacts of cybercrime in the Zimbabwean retail sector and evaluate the effectiveness of the current measures to deal with cybercrime.
Design/methodology/approach
This study adopted a mixed research design on a sample of 38 retail players in a small mining town, Bindura, who were selected using stratified random and purposive sampling techniques. Data were collected through a mainly closed-ended questionnaire and in-depth interview guide. Statistical Package for Social Sciences (SPSS) was used to analyse quantitative data, whereas summative content analysis was used to analyse qualitative data.
Findings
Virus dissemination, hacking and card fraud were identified as the major forms of cybercrime prevalent in the retail sector. Additional security costs, loss of sensitive data and direct financial losses were found to be the major impacts posed by cybercrime on retail sector. It was also established that the current internal measures and policing efforts to fight cybercrime in the retail sector were ineffective.
Originality/value
This study provides context-specific information on the scourge of cybercrime in a developing third world country that has of late been characterised by a myriad of other socioeconomic challenges. Although similar studies have been conducted in other parts of the globe, there has been a dearth of literature on retail sector cybercrime in Zimbabwe. This study also interrogates the Zimbabwean retail sector’s preparedness in dealing with this contemporary threat.
Subject
Community and Home Care,Law,Safety Research
Reference42 articles.
1. Australian payment card fraud: January-December 2018 data;Australian Payments Network,2019
2. Data analysis of cybercrimes in businesses;Journal of Information Technology and Management Science,2017
3. Trust violation and repair: the information privacy perspective;Decision Support Systems,2015
4. Phishing, SMiShing &vishing: an assessment of threats against mobile devices;Journal of Emerging Trends in Computing and Information Sciences,2014
5. Lost, stolen or skimmed: overcoming credit card fraud in South Africa;SA Crime Quarterly,2012