References
[1]. Abbey, E. D. (2024). Impact of Digital Transformation on Cybersecurity in African Businesses (Doctoral dissertation, St. Thomas University).
[4]. Amoo, O. O., Atadoga, A., Abrahams, T. O., Farayola, O. A., Osasona, F., & Ayinla, B. S. (2024). The legal landscape of cybercrime: A review of contemporary issues in the criminal justice system. World Journal of Advanced Research and Reviews, 21(2), 205-217.
[5]. Appiah, T., & Agblewornu, V. V. (2025). The Interplay of Perceived Benefit, Perceived Risk, and Trust in Fintech Adoption: Insights from Sub-Saharan Africa. Heliyon.
[9]. Buil-Gil, D., & Barrett, E. (2022). The dynamics of business, cybersecurity and cyber-victimization: Foregrounding the internal guardian in prevention. In The New Technology of Financial Crime (pp. 5-34). Routledge.
[12]. Chibanda, R., & Kabanda, S. (2022). Towards an African cybersecurity community of practice. In Proceedings of 43rd Conference of the South African Institute of Computer Scientists and Information Technologists, 85, 1-14.
[14].
Compaore, R., Ouedraogo, A. M., Baguiya, A., Kpebo, D. O., Sidibe, S., & Kouanda, S. (2022). Availability and utilization of postabortion care services in Burkina Faso, Côte d'Ivoire, and Guinea: A secondary analysis of emergency obstetric and neonatal care needs assessments (EmONC). Health Services Insights, 15, 1-10.
[16]. Farok, N. A. Z., & Zolkipli, M. F. (2024). Incident response planning and procedures. Borneo International Journal, 7(2), 69-76.
[17]. Grobbelaar, A. (2022). Cyberterrorism in Africa – Exaggerated Threat or Worthy Foe? Freska.
[18].
Hamon, J. K., Kambanje, M., Pryor, S., Kaponda, A. S., Mwale, E., Mayhew, S. H., & Burchett, H. E. (2022). Integrated delivery of family planning and childhood immunization services: A qualitative study of factors influencing service responsiveness in Malawi. Health Policy and Planning, 37(7), 885-894.
[23]. Jarkas, O., Ko, R., Dong, N., & Mahmud, R. (2025). A Container Security Survey: Exploits, Attacks, and Defenses. ACM Computing Surveys.
[27].
Liu, Y., Xu, X., Sadd, M., Kapitanova, O. O., Krivchenko, V. A., Ban, J., & Matic, A. (2021). Insight into the critical role of exchange current density on electrodeposition behavior of lithium metal. Advanced Science, 8(5), 2003301.
[28]. Mwita, P. S., & Mhina, J. R. A. (2023). Assessing the effectiveness of the implementation of cybercrimes mitigation strategies in selected commercial banks in Tanzania. European Journal of Theoretical and Applied Sciences, 1, 571-83.
[32]. Maluleke, W. (2023). Exploring cybercrime: An emerging phenomenon and associated challenges in Africa. International Journal of Social Science Research and Review, 6(6), 223-243.
[33]. Maphumulo, W. T., & Bhengu, B. R. (2019). Challenges of quality improvement in the healthcare of South Africa post-apartheid: A critical review. Curationis, 42(1), 1-9.
[35]. Mokofe, W. M. (2023). Digital transformations of the South African legal landscape. Journal of Digital Technologies and Law, 1(4), 1087-1104.
[36].
Monteith, S., Bauer, M., Alda, M., Geddes, J., Whybrow, P. C., & Glenn, T. (2021). Increasing cybercrime since the pandemic: Concerns for psychiatry. Current Psychiatry Reports, 23, 1-9.
[37].
Nafea, A. A., Hamdi, M. M., saad Abdulhakeem, B., Shakir, A. T., Alsumaidaie, M. S. I., & Shaban, A. M. (2024). Detection systems for Distributed Denial-of-Service (DDoS) attack based on time series: A review. In 2024 21st International Multi-Conference on Systems, Signals & Devices (SSD) (pp. 43-48). IEEE.
[39].
Okika, N., Nwatuzie, G. A., Olarinoye, H. S., Nwaka, A. A., Igba, E., & Dunee, R. (2025). Assessing the vulnerability of t raditional and post- quantum cryptographic systems through penetration testing and strengthening cyber defenses with zero trust security in the era of quantum computing. International Journal of Innovative Science and Research Technology, 10(2), 1240-1250.
[41]. Pamuk, M. (2025). Finding Path towards AI-Based Services in the Finance Industry (Doctoral Dissertation, Georg-August-Universität Göttingen).
[43]. Plachta, M., Hong, E., & Wahl, A. (2024). Transnational organized crime and economic integration. Intelligent Earth Leakage Relay (IELR), 40, 416.
[46]. Raza, S. A., Syed, D., Rizwan, S., & Ahmed, M. (2025). The use of data in financial services. In The Global Evolution, Changing Landscape and Future of Financial Markets: From Traditional to Digital (pp. 47–57). Emerald Publishing Limited.
[48].
Sarker, O., Jayatilaka, A., Haggag, S., Liu, C., & Babar, M. A. (2024). A Multi-vocal Literature Review on challenges and critical success factors of phishing education, training and awareness. Journal of Systems and Software, 208, 111899.
[49].
Sarower, A. H., Bhuiyan, T., Hasan, M. M., Arefin, M. S., & Hossain, G. (2025). SMFA: Strengthening multi-factor authentication with steganography for enhanced security. IEEE Access, 13, 43593 - 43606.
[50]. Shah, A. (2024). Cybercrime chronicles: Exploring the evolving landscape of challenges in the digital era. A Global Journal of Humanities (pp. 20-24).
[51].
Smyrlis, M., Somarakis, I., Spanoudakis, G., Hatzivasilis, G., & Ioannidis, S. (2021). Cyra: A model- driven cyber range assurance platform. Applied Sciences, 11(11), 5165.
[53]. Temara, S. (2024). The dark web and cybercrime: Identifying threats and anticipating emerging trends. International Journal of Advanced Engineering Research and Science (IJAERS), 11 (10), 80-93.
[54]. Thomas, G., & Sule, M. J. (2023). A service lens on cybersecurity continuity and management for organizations' subsistence and growth. Organizational Cybersecurity Journal: Practice, Process and People, 3(1), 18-40.
[57].
Wang, S. T., Zhang, C. X., Deng, Y. H., Qiu, Z. J., Chen, Z. M., Qin, Z., & Wang, X. D. (2024). Effect of free and bound proanthocyanidins from Chinese quince on heterocyclic aromatic amine formation and quality in fried chicken. Journal of Food Science, 89(6), 3494-3505.