Cyberterrorism in Africa : Is This the Real Life, Is This Just Fantasy?

Author:

Grobbelaar AltaORCID

Abstract

This paper seeks to examine the relevance of the term ‘cyberterrorism’ within African spaces. Although the notion of cyberterrorism as a concept is contested by scholars such as Jason Burke and Marc Sageman, the application of the concept in an African context raises a number of concerns. Firstly, rather than focusing on the semantic and conceptual issues only, more attention should be paid to the material implications of such discourses for people and states on the continent who are on the receiving end of such conceptualisation. Discourses regarding fear are always very complex and shape the way in which reality is perceived, understood and how hegemonic power-relations are formed within certain contexts. Secondly, these discourses reflect a Eurocentric bias, because, as visible in the definition used and accepted by US defence analysts, cyberterrorism would refer to “Unlawful attacks and threats of attack against computers, networks, and the information stored therein when done to intimidate or coerce a government or its people in furtherance of political or social objectives.”. These types of discourses are largely state-centric or government-centric, created to operate in spheres where effective governance varies from what is accepted as such on the African continent. While connectivity and globalization are becoming increasingly important for Africa as a whole, it begs the question whether the term is not more appropriate for highly globalized, technologically advanced contexts of the global North. In contrast with countries in the global North, African countries’ limited use and penetration of information technology thus underline the need for a critical (re)examination of the discourses relating to cyberterrorism in the African context. What needs to be established is whether cyberthreats, specifically cyberterrorism, pose a real threat on the continent, or whether the concept has become a platitude or blanket term to describe any form of information-based hostility. The paper questions the application of concepts such as cyberthreats, cyberterrorism and cybersecurity in African-centered approaches.

Publisher

Óbudai Egyetem

Reference52 articles.

1. African Union. (2014) African Union Convention on Cyber Security and Personal Data Protection. Available at https://au.int/sites/default/files/treaties/29560-treaty-0048_-_african_union_convention_on_cyber_security_and_personal_data_protection_e.pdf (Accessed: 28 May 2024)

2. Al Jazeera Staff (2016) ‘Q&A: Boko Haram’s Changing Tactics’, Al Jazeera, 11 February. Available at https://www.aljazeera.com/news/2016/02/qa-boko-haram-changing-tactics-160211045508486.html (Accessed: 28 May 2024)

3. Allen, K. (2022) ‘Weaponised Drones - the Latest Tech Threat to Reach Africa’, Institute for Security Studies, 11 October. Available at https://issafrica.org/iss-today/weaponised-drones-the-latest-tech-threat-to-reach-africa (Accessed: 28 May 2024)

4. Aly, A., Macdonald, S., Jarvis, L., and Chen, T. M. (2017) ‘Introduction to the Special Issue: Terrorist Online Propaganda and Radicalization’, Studies in Conflict & Terrorism, 40(1), pp. 1–9. DOI: https://doi.org/10.1080/1057610X.2016.1157402, ISSN 1057-610X

5. Archetti, C. (2015) Terrorism, Communication and New Media: Explaining Radicalization in the Digital Age. Perspectives on Terrorism, 9(1), pp. 49–59. ISSN 2334-3745

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3