Cyber insecurity in the wake of COVID-19: a reappraisal of impacts and global experience within the context of routine activity theory

Authors

DOI:

https://doi.org/10.15587/2523-4153.2022.253820

Keywords:

COVID-19, cyber attacker, cybercriminal, cyber insecurity, cyberspace, impacts and global experience, routine activity theory (RAT)

Abstract

Shortly after the enthronement of COVID-19 on the global continent, cyberspace became a dominant arena for social, economic, religious, educational, recreational and political activities across the world. This paper draws insights from the existing literature to illustrate how COVID-19 has provided situational opportunities for cyber criminals to strike and exploit people of their valuable resources through creating fraudulent websites as well as spreading of malware and ransomware to vulnerable users. To this end, routine activity theory becomes very dominant and crucial in understanding the underlying basis for the increased cybercrimes that currently characterize the cyber space. The study demonstrates that the twin phenomenon of coronavirus and cyber insecurity has not only instilled fears into the hearts of cyber users but has also negatively impacted the global economy in various ways that cannot be quantified by any study. Since all measures put in place to contain the threats of the horrible virus, have, hitherto, remained counterproductive, the paper recommends essential cyber hygiene practices (such as, antivirus protection, malware and phishing awareness, weak spots identification, intelligent techniques, risk management approach, zero trust design, home network security and general cybersecurity awareness) as a coping strategy to salvage both the public health and security sectors from the twin occurrence of Covid-19 pandemic and cyber insecurity, which has respectively inflicted and claimed millions of lives, and jeopardized significant portions of the global economy. Providing a continued cyber-safe remote-working environment for employees will be of ultimate measure

Author Biography

Sogo Angel Olofinbiyi, University of Venda

PhD

Department of Criminal Justice

School of Law

References

  1. Barau, A. S. (2016). Cyber insecurity as a manifestation of new form of global urban vulnerability. Imam Journal of Applied Sciences, 1 (1), 27–32.
  2. Holt, T. J.; Huebner, B. M., Bynum, T. S. (2016). Cybercrime. The Handbook of Measurement Issues in Criminology and Criminal Justice. Wiley, 29–48. doi: http://doi.org/10.1002/9781118868799.ch2
  3. Rossi, F. D., Hohemberger, R., Konzen, M. P., Temp, D. C. (2020). E-Banking Security: Threats, Challenges, Solutions, and Trends. Encyclopedia of Criminal Activities and the Deep Web. IGI Global, 893–904. doi: http://doi.org/10.4018/978-1-5225-9715-5.ch060
  4. Felson, M., Clarke, R.V. (1998). Opportunity Makes the Thief: Practical theory for crime prevention. London, 44.
  5. Boivin, R., de Melo, S. N. (2019). The Concentration of Crime at Place in Montreal and Toronto. Canadian Journal of Criminology and Criminal Justice, 61 (2), 46–65. doi: http://doi.org/10.3138/cjccj.2018-0007
  6. Ten Boom, A., Pemberton, A., Groenhuijsen, M. S. (2019). The need for protection and punishment in victims of violent and nonviolent crime in the Netherlands: The effect of relational distance. Victims & Offenders, 14 (2), 222–238. doi: http://doi.org/10.1080/15564886.2019.1575300
  7. WHO-Convened Global Study of Origins of SARS-CoV-2 (2021). China Part. Geneva: World Health Organization. Available at: https://www.who.int/publications/i/item/who-convened-global-study-of-origins-of-sars-cov-2-china-part
  8. Hallal, P. C., Victora, C. G. (2021). Overcoming Brazil’s monumental COVID-19 failure: an urgent call to action. Nature Medicine, 27 (6), 933–933. doi: http://doi.org/10.1038/s41591-021-01353-2
  9. Introduction to COVID-19: methods for detection, prevention, response and control (2020). WHO. Available at: https://openwho.org/courses/introduction-to-ncov
  10. Covid-19 data in motion (2021). Johns Hopkins University and Medicine. Available at: https://coronavirus.jhu.edu/
  11. Salyer, K. (2020). COVID-19: What to know about the coronavirus pandemic. World Economy Forum. Available at: https://www.weforum.org/agenda/2020/04/covid-19-what-to-know-about-the-coronavirus-pandemic-on-6-april/
  12. Coronavirus in Africa Tracker: How many covid-19 cases & where (2020). African Argument. Available at: https://africanarguments.org/2020/04/07/coronavirus-in-africa-tracker-how-many-cases-and-where-latest/
  13. Modes of transmission of virus causing COVID-19: Implications for IPC precaution recommendations (2020). World Health Organization. Available at: https://www.who.int/news-room/commentaries/detail/modes-of-transmission-of-virus-causing-covid-19-implications-for-ipc-precaution-recommendations
  14. Olofinbiyi, S. A., Singh, S. B. (2020). The role and place of COVID-19: An opportunistic avenue for exponential world’s upsurge in cybercrime. International Journal of Criminology & Sociology, 9 (11), 221–230.
  15. Muttoo, S. K., Badhani, S. (2021). An Analysis of Malware Detection and Control through Covid-19 Pandemic. 2021 8th International Conference on Computing for Sustainable Global Development (INDIACom). IEEE, 637–641
  16. Singh, S, Medatwal, C. A. (2021). Study on impact of Covid-19 Pandemic on cyberspace. International Journal of Management, 12 (3).
  17. Gundur, R. V., Levi, M., Topalli, V., Ouellet, M., Stolyarova, M., Chang, L. Y.-C., Mejía, D. D. (2021). Evaluating Criminal Transactional Methods in Cyberspace as Understood in an International Context. CrimRxiv. doi: http://doi.org/10.21428/cb6ab371.5f335e6f
  18. Abukari, A. M, Bankas, E. K. (2020). Some cyber security hygienic protocols for teleworkers in COVID-19 pandemic period and beyond. International Journal of Scientific & Engineering Research, 11 (4), 1401–1407.
  19. Poremba, S. (2020). Businesses Underestimate COVID-19 Cybersecurity Risks. Available at: https://securityboulevard.com/2020/05/businesses-underestimate-covid-19-cybersecurity-risks/
  20. Banerjee, D. (2020). How COVID-19 is overwhelming our mental health. Nature India. Available at: https://www.natureasia.com/en/nindia/article/10.1038/nindia.2020.46
  21. Zhang, B. Y., Yan, X. A., Tang, D. Q. (2018). Survey on Malicious Code Intelligent Detection Techniques. Journal of Physics: Conference Series, 1087, 062026. doi: http://doi.org/10.1088/1742-6596/1087/6/062026
  22. Breda, F., Barbosa, H., Morais, T. (2017). Social engineering and cyber security. Inem Conference: International Technology, Education and Development Conference. doi: http://doi.org/10.21125/inted.2017.1008
  23. Pinto, D. (2020). Cyber criminals use coronavirus to loot gullible citizens. Available at: https://www.newindianexpress.com/cities/hyderabad/2020/mar/30/cybercriminals-use-coronavirus-to-loot-gullible-citizens-2123302.html
  24. Update: Coronavirus-themed domains 50 % more likely to be malicious than other domains (2020). Check Point’s Global Threat Index. Available at: https://blog.checkpoint.com/2020/03/05/update-coronavirus-themed-domains-50-more-likely-to-be-malicious-than-other-domains/
  25. Cybercrime and COVID-19: A concern for financial stability during the pandemic (2020). The South African Institute of International Affairs (SAIIA). Available at: https://saiia.org.za/research/cybercrime-and-covid-19-a-concern-for-financial-stability-during-the-pandemic/
  26. Chigada, J., Madzinga, R. (2021). Cyberattacks and threats during COVID-19: A systematic literature review. SA Journal of Information Management, 23 (1). doi: http://doi.org/10.4102/sajim.v23i1.1277
  27. Khan, N. A., Brohi, S. N, Zaman, N. (2020). Ten deadly cybersecurity threats amid COVID-19 pandemic. IEEE. Berlin. doi: http://doi.org/10.36227/techrxiv.12278792.v1
  28. Identity theft, viewed (2020). South African Banks Risk Information Centre.
  29. Impact of COVID-19: The World has changed and so have we (2020). Price Waterhouse Coopers. Available at: https://www.pwc.co.za/en/about-us/integrated-report-2020/impact-of-covid-19.html
  30. Crisanto, J. C., Prenio, J. (2020). Financial crime in times of COVID-19 – AML and cyber resilience measures, bank for international settlements. Available at: https://www.bis.org/fsi/fsibriefs7.htm
  31. Paek, H.-J., Hove, T. (2021). Information Communication Technologies (ICTs), Crisis Communication Principles and the COVID-19 Response in South Korea. Journal of Creative Communications, 16 (2), 213–221. doi: http://doi.org/10.1177/0973258620981170
  32. Samsad, J., Forkan, A. (2021). Advancing Health Information System with System Thinking: Learning Challenges of E-Health in Bangladesh During COVID-19. International Conference on Health Information Science. Cham: Springer, 15–23. doi: https://doi.org/10.1007/978-3-030-90885-0_2
  33. Balsom, W., Dixon, D. (2020). ‘How COVID-19 shows the urgent need to address the cyber poverty gap’. World Economic Forum-Cybersecurity. Available at: https://www.weforum.org/agenda/2020/03/covid-19-pandemic-shows-the-urgency-for-addressing-the-cyber-poverty-gap/
  34. Laskar, P., Yallapu, M. M., Chauhan, S. C. (2020). “Tomorrow Never Dies”: Recent Advances in Diagnosis, Treatment, and Prevention Modalities against Coronavirus (COVID-19) amid Controversies. Diseases, 8 (3), 30. doi: http://doi.org/10.3390/diseases8030030
  35. Beware of criminals pretending to be WHO (2020). World Health Organization. Available at: https://www.who.int/about/cyber-security
  36. Chigada, J. M. (2020). A qualitative analysis of the feasibility of deploying biometric authentication systems to augment security protocols of bank card transactions. SA Journal of Information Management, 22 (1). doi: http://doi.org/10.4102/sajim.v22i1.1194
  37. Regional cybersecurity forum for Europe and CIS (2020). International Telecommunications Union. Sofia Bulgaria. Available at: https://www.itu.int/en/ITU-D/Regional-Presence/Europe/Pages/Events/2020/CSF/SofiaBG.aspx
  38. Impact of COVID-19 on Cybersecurity (2020). Deloitte. Available at: https://www2.deloitte.com/ch/en/pages/risk/articles/impact-covid-cybersecurity.html
  39. Nathan, M. (2020). Credential stuffing: new tools and stolen data drive continued attacks. Computer Fraud & Security, 2020 (12), 18–19. doi: http://doi.org/10.1016/s1361-3723(20)30130-5
  40. Magome, M. (2020). South Africa sees sharp rise in virus, part of African wave. Associated Press. Available at: https://www.usnews.com/news/world/articles/2020-12-10/south-africa-sees-sharp-rise-in-virus-part-of-african-wave
  41. COVID-19 cyberthreats, viewed (2020). Interpol. Available at: https://www.interpol.int/en/Crimes/Cybercrime/COVID-19-cyberthreats
  42. Why We Click: The Psychology Behind Phishing Scams and How to Avoid Being Hacked (2020). Tessian. Available at: https://www.tessian.com/blog/why-we-click-on-phishing-scams/
  43. COVID-19 related scams – news and resources (2020). Action Fraud. Available at: https://www.actionfraud.police.uk/covid19
  44. Cohen, L. E., Felson, M. (1979). Social Change and Crime Rate Trends: A Routine Activity Approach. American Sociological Review, 44 (4), 588–608. doi: http://doi.org/10.2307/2094589
  45. Aldawood, H., Geoff, S. (2020). Contemporary cyber security social engineering solutions, measures, policies, tools and applications: A critical appraisal, 2019-2020. International Journal of Security, 10 (1), 1–15.

Downloads

Published

2022-03-31

How to Cite

Olofinbiyi, S. A. (2022). Cyber insecurity in the wake of COVID-19: a reappraisal of impacts and global experience within the context of routine activity theory. ScienceRise: Juridical Science, (1(19), 37–45. https://doi.org/10.15587/2523-4153.2022.253820

Issue

Section

Juridical Science