Journal Research in Peace, Gender and Development (JRPGD) Vol. 4(2) pp. 27-37, March, 2014 DOI: http:/dx.doi.org/10.14303/jrpgd.2014.013 Available online http://www.interesjournals.org/ JRPGD Copyright © 2014 International Research Journals Full Length Research Paper Using the Cost Element Model to Explain Perpetrators’ Perceptions to Combat Cybercrime in Cameroon: A Structural Equation Model Approach *Eric Akuta Global Institute for Crime Research and Department of Criminal Justice University of the Incarnate Word, San Antonio, Texas *Corresponding author email: akutaeric@yahoo.com ABSTRACT The emergence and rapid diffusion of cybercrime in Sub Saharan Africa within the past two decades has been a menace to the rest of the world especially the developed nations. Four of the world’s top ten countries involved in cybercrime perpetration are in the Sub-Saharan African region with Cameroon inclusive. In Cameroon, several steps including the purchase of latest anti-cybercrime equipment, increase in law enforcement officers, partnership with developed countries and the passing of new laws has been taken to curb cybercrime. These steps have not solved the problem because the rate of cybercrime perpetration has steadily remained on the rise with an increase in Internet diffusion in Cameroon. This study argued that, the solution to cybercrime lies in the adoption of a criminal focused strategy that examines the perception of perpetrators on ways to combat cybercrime. The study begged the question; how can the Cost Element Model be applied to combat cybercrime? To answer this, the study looked at two main variables: the influence Perceived Risks involved in committing cybercrime has on the rate of cybercrime perpetration and the effects Perceived Efforts required to commit cybercrime have on the rate of cybercrime perpetration in Cameroon. The study surveyed 189 cybercrime perpetrators in Cameroon. Applying the Cost Element Model adopted from Clarke’s (1980) Situational Crime Prevention Theory, the study used the Structural Equation Model (PLS) to establish the relationship between the risk and effort involved in committing cybercrime and the rate of cybercrime perpetration. The study concluded that, perceived effort has a partial influence on perpetration rate while perceived risk has a strong influence on rate of cybercrime perpetration in Cameroon. Keywords: Cybercrime, Criminal-Focused Approach, Perceived Effort, Perceived Risk. INTRODUCTION The rapid diffusion of the Internet and its trajectory strongly brings out the importance and influence the Internet and other forms of Information and Communication Technologies (ICTs) have on all world sectors. Blind (2011) and Wartalla and Jennings (2000) indicated that the information and communication technologies, especially the Internet, have not only affected world economies, but have also impacted the society at large including political systems worldwide. Consequently, the Internet is not only the result of innovation in ICT, but also an enabler for various types of innovations in the private, and public sectors, and for broader and more complex innovation processes. As an innovation that spread in the 1990s, the Internet and other forms of ICTs created opportunities for learning, business and interaction that challenged previous traditional patterns. This exposure leapfrogged several technologically backward regions of the world like Africa, which was regarded as “backwards”, into the world of ICT (Collins and Halverson, 2009). These new technologies increase opportunities for several marginalized groups, also allowing them to share in a knowledge base that was 28 J. Res. Peace Gend. Dev. once reserved for a select few in developed countries (Collins and Halverson, 2009). This leap by supposed “backward regions” has not come without a heavy price to the world at large. As Akuta et al (2011) put it, while the world enjoys the benefits of ICTs especially the Internet, it has also been confronted with this heavy price which has been referred to as the unintended consequences of ICTs- Cybercrime. Cybercrime caught the world at large and Cameroon in particular off-guard. This has partly been as a result of the weakness of existing policies and laws, the influence of the establishment and the perception of other stakeholders, especially in the case of Cameroon raising concerns in the corridors of power (Akuta and Akuta, 2012; Longe, 2012). When these concerns are looked at on a global scale as indicated by Serrano (2011), cybercrime is rated as an industry that is worth a hundred and fourteen (114) billion dollars. When the effects of cybercrime are quantified in financial terms, it is realized that the dollar amount lost to cybercrime annually is significantly more than the annual global market for marijuana, cocaine, and heroin combined, thus the need for concern (Serrano, 2011). More concern is raised when reference is made to literature that indicates that out of the top ten countries in the world with a high level of cybercrime prevalence, Sub-Saharan Africa is host to four of these countries. These are regarded as top cybercrime hot spots; Nigeria, Cameroon, Ghana and South Africa. This rate of cybercrime prevalence has triggered a renaissance in the fight against cybercrime in Cameroon, which is ranked second in cybercrime prevalence in Africa after Nigeria and forth in the world after the U.S., Britain, and Nigeria (Akuta et al., 2011). According to reports from the World Bank (2013), points out that, Cameroon is ranked as the riskiest nation in the world for online trade. Because of this surge in cybercrime perpetration, like several countries, Cameroon is executing efforts to solve this problem. New laws and policies are being passed, software is being developed and cyber security equipment are being purchased to enhance the fight against cybercrime. While all these measures are being put in place to fight cybercrime, Akuta, (2012) holds that the fight against cybercrime should involve all stakeholders. Stakeholders in the fight against cybercrime in Cameroon range from the average man on the street that knows and fraternizes with cyber criminals to the administration that enacts decrees and proposes laws passed by the legislature, and the various international organizations set up to prevent and deter cyber criminals from indulging in cybercrime (Akuta et al., 2011). This should be focused towards a preventive action. For a preventive action to take place, Akuta, (2012) suggest that, the principal stakeholder involved in the perpetration of cybercrime-the perpetrators should be the main consulted group especially because this venture is being dealt with in a region where the local community does not necessarily view cyber criminals as ‘criminals’ (Akuta, 2012). To do this, the study was limited to Cameroon because of its uniqueness in the cybercrime surge, and was designed to provide policy makers both at local and international levels with an in-depth knowledge on how the use of a good understanding of cybercrime perpetrators’ perceptions in combating cybercrime can be of importance to craft and implement cybercrime laws and policies that will reduce the rate of cybercrime perpetration in Cameroon. Two questions were put in place: What are cybercrime perpetrators’ perceptions on the antecedents to combat cybercrime in Cameroon? Why do cybercrime perpetrators have the perceptions they have on antecedents to combat cybercrime in Cameroon? This study assumed that: An increase in the amount of effort required to commit cybercrime negatively influences the rate of cybercrime perpetration. An increase in the amount of perceived risk to be faced when committing cybercrime will cause a drop in cybercrime perpetration rate. Once this was determined, the study sort to first find out what laws and policies have been enacted to facilitate the fight against cybercrime, using these laws and policies, what implementation strategies have been tried and how has the establishment handled issues concerning the fight against cybercrime. Having a sound knowledge on these and seeing a rising rate in cybercrime perpetration in Cameroon gave the researcher the basis to argue for the use of a Criminal Focused Approach in fighting cybercrime. Limitations of Existing Cybercrime Laws and Policies According to Lu et al (2006) and Wada (2011), the prevalence of cybercrime in Cameroon in particular and SSA as a whole is due to the inability of existing laws and policies to deter cybercriminals because cybercrime criminals are unafraid of committing crimes in the cyber world due to the fact that relevant laws are less clear and enforcement is less stringent. Existing laws treated computers as property and could only prosecute crimes that involved stealing the whole computer system or destruction of the computer but had no jurisdictional powers over information hackers. Ojedukun (2005) points out that there is no way law enforcement officers within African countries could take action against cyber Akuta 29 criminals unless countries first enacted laws that criminalize the activities in which these offenders engage. According to United Nations Office of Drugs and Crime (2013), the rise in cybercrime perpetration rate in SSA is due to the lawless nature of most SSA countries. In these countries the present laws to prosecute cybercrime are absent and existing laws are grossly inadequate to reduce cybercrime. For instance, in Kenya where, as of 2002, there has been a significant rise in cybercrime, there were no existing laws to deal specifically with cyber criminals. The laws that existed at the time were inadequate and did not specify how perpetrators of cybercrime were supposed to be prosecuted when arrested. Makhanya (2001) cites the example of South Africa where in 2001, the laws that existed were ill equipped to handle Internet and Internet related crimes. For instance, the 1977 Criminal Procedure Act that was implemented in South Africa had nothing to do with the Internet when it was being drafted and so did not make any stipulations that could cure this 21st century malaise. These laws did not take into account offenses that involved the theft and abuse of data as well as programs found on the computer, thus leaving a host of cybercriminals unprosecuted (Makhanya, 2001). The lapse in existing laws that allowed cybercriminals to go unprosecuted in several SSA countries and the alarming rate of diffusion of cybercrime within and without countries’ territorial boundaries, rekindled a reawakening spirit of cybercrime fighting in most SSA governments. This renaissance compelled SSA state governments and regional organizations to enact legislations, laws and form commissions that not only deal with specific crimes but that deal with cybercrimes as a whole (Kioni, 2008). In 1998, the Kenyan parliament passed the Kenya Communication Act (KCA) to address Information and Communication Technology (ICT) mishaps. These mishaps partly stemmed from the fact that an increased use of the Internet and its rapid diffusion was accompanied by crimes that were not virtualized when the 1998 Act was being drafted. This act did not address specific issues concerning cybercrime. For this reason, the KCA was amended twice in 2009 to meet the demands of the time (Wanjiku, 2009). According to the Communication Commission of Kenya (CCK) (2009), the first amendment in section 83U-Z criminalized unauthorized access and interception to computer data and service, modification of computer material, access with intent to commit offenses and unlawful possession of devices and data. This amendment also stipulated jail terms for the aforementioned cybercrimes. The second amendment commonly known as the E- Transaction’s Act of 2009, went a step further to look at limitations to contract formations in the Internet environment, and liabilities of service providers, privacy, security and the use of electronic records and signature to governments. It also addressed the definition of cybercrime and punishment as well as e-signature and private policies (C C K, 2009). Nigeria has also been in the international spotlight for its involvement in cybercrime. Ranked as third in the world behind the United States and Britain, and first within the African continent in the rate of cybercrime perpetration, Nigeria’s conspicuous position has been a trigger factor that has influenced the way the nation handles issues concerning cybercrime (Adomi, 2008; Boateng et al., 2010). Ehimen and Bola (2010) pointed out that there exists no specific law in Nigeria that criminalizes perpetrators of cybercrime directly but there are laws that can be used to prosecute cybercriminals. In 2003, following a presidential decree, there was legislative action that established the Economic and Financial Crimes Commission of 2004. This commission was vested with the power to investigate, prosecute and penalize all economic and financial crimes related to terrorism, money laundering, and drug trafficking and advanced fee fraud. Although these stipulations did not specifically mention cybercrime, EFCC partners with other organizations in the combat against cybercrime because in today’s society most economic and financial crimes are committed with the use of the Internet (Longe and Chiemeke, 2008). To make up for lapses of the EFCC Act, and to specifically address the issue of cyber and cyber related crimes, the Nigerian parliament passed the Computer Security and Critical Information Infrastructure Protection Bill in 2005. This bill, commonly referred to as the Cybercrime Bill, aims to secure computer systems and networks, and protect critical information and infrastructure by criminalizing certain computer based activities (Chawki, 2009); Chawki (2009); Oriola (2005) continue to point out that with the diverging nature of cybercrime and a significant increase in the number of advanced fee fraud cases recorded, the Advanced Fee Fraud and Other Fraud Related Offences Act was passed in 2006. This Act proposed ways to combat online scams and other related cybercrimes by issuing harsher penalties of imprisonment of 5-15 years without the option of a fine. This case is similar to that of the Republic of South Africa, which like Nigeria was ranked among the top ten countries in the world in cybercrime prevalence (Africa News Monitoring Team, 2010). With the most advanced economy on the African continent, and more specifically SSA, South Africa has had its share of a fast rise in unintended consequences of ICTs. With the development of the South African IT sector, there has been a rapid expansion of computer system connectivity. “This rapid expansion of computer connectivity has provided opportunities for criminals to 30 J. Res. Peace Gend. Dev. exploit security vulnerabilities in the on-line environment in fast rising economies like that of South Africa (Broadhurst, 2006). To catch up with this malaise, the South African government passed the Electronic Communications and Transactions Act of 2002 (Cole et al., 2008). Chapter thirteen of the act clearly defines cybercrimes and stipulates penalties for each offense. These crimes were grouped into four categories: those involving unauthorized access to data, interception and interference with data and computer related extortion, fraud and forgery. Understanding the trans-national nature in which cybercrime operates, South Africa aligned with other European countries as the only African country to sign and ratify the council of Europe’s treaty on cybercrime. This treaty obliged member states to criminalize offenders that indulge in any form of cybercrime and also cooperate with each other to investigate and punish culprits guilty of cyber and cyber related crimes (Cole et al., 2008). After Nigeria, as a hub of cybercrime in SSA, Cameroon tailgates Ghana as king of cybercrime prevalence in Central Africa. A 2010 report by the McAfee Cyber-security Firm cites Cameroon as the world’s riskiest destination for Internet surfers with more than a third (36.7%) of websites hosted in Cameroon being suspicious (McAfee Inc, 2009). In line with this, the country, through its Ministry of Post and Telecommunications and the National Agency for Information and Communication Technologies advanced a bill to parliament that allows them to set up a cyberpolice force, define major crimes, and determine legal procedures to help fight cybercrime. Also, the Cameroonian parliament voted for a bill to set up a cyberpolice force to fight the alarming rate of cybercrime in the nation (Mforgham, 2010). While the efforts of Cameroon have rested in the planning phase, countries like Botswana have moved a step further. Botswana passed the Cybercrime and Computer Related Crimes Bill of 2007. This bill defines the jurisdiction of Botswana in crimes that affect its citizens and brings out extradition conditions and procedures of cyber criminals (Cole et al., 2008). The bill also holds accountable Botswana nationals for infringements committed not only in Botswana but outside the borders of Botswana as well, especially within countries like Zambia that shares a common boundary (Botswana National Assembly, 2007). Zambia, on its part developed the Computer Misuse and Crimes Act of 2004 to handle cybercrime issues. The Act dealt with the criminalization of systems’ intrusion, interception of data, and system disruption. It also went further to institute harsh penalties for cybercrimes including prison sentences of up to twenty-five years (Cole et al., 2008). Though all these laws and policies have been enacted by various SSA countries, the enactment of outstanding legislatures and crafting of policies with extremely harsh punitive measures will serve at nothing if the implementation process is taunted. Role of Implementation Strategies Applied Lu et al (2006) stated that the high level of cybercrime perpetration is due to the fact that relevant laws and policies are less clear and enforcement is less stringent. To confirm this assertion with a look at the perceptions of cybercrime perpetrators in Cameroon, there is a strong need to examine the practical steps that have been taken to implement the existing laws and policies in SSA as a whole and Cameroon in particular. For instance, in Nigeria, the creation of the Economic and Financial Crimes Commission (EFCC) was a bold step towards the fight against cybercrime. EFCC’s ascension to the power throne of crime fighting in Nigeria ushered in the creation of specialized units that saw the effective investigation and prosecution of offenders, and training of staff including the general and asset investigation unit, the legal and prosecution unit and the training unit. While the training unit has been able to organize sessions where law enforcement officers have been trained on eradicating crime, the investigation unit created a monitoring and intelligence unit that assisted in the gathering of information to facilitate investigation (Anadi and Jones, 2011). To facilitate the investigation of cybercrime, Operation Eagle Claw was launched. In this operation, software that facilitates the sniffing out of fraudulent emails, called eagle claw software, was developed and deployed (Oates, 2009). It also instituted and carried out an aggressive campaign to educate the public on whistle blowing and the ills of cybercrime through the use of local media, public and private institutions and all levels of educational establishments (Maska, 2009). Even with all of these efforts, once the Nigerian administration, through the EFCC, recognized that the fight against cybercrime could not be won by a single nation or organization, they alongside the Nigerian government, partnered with other countries and organizations including the United Nations, other African and West African countries, the African Development Bank, INTERPOL, Microsoft, Western Union, Yahoo, Google, and Coca Cola to explore collective ways of combating this malaise (Chawki, 2009; ANMT, 2010). This partnership opened the way for the Nigerian government to take strong steps towards curbing cybercrime by creating a central agency to enforce crime laws, and regulate cybercafés by imposing a ban on the operation of overnight cybercafé services. These efforts have been buttressed among other things Akuta 31 by the amount of funds received by various anti-crime commissions. In 2004, the EFCC received an initial funding of approximately $2 million U.S. dollars from the Nigerian federal government and about $32 million U.S. dollars from 2005-2009 from the European Union. In the same year (2004), NCWG received about seven hundred thousand US dollars from the Nigerian Federal government to allow them the ability to smoothly carry on their responsibilities (Adomi, 2008; Adeleye, 2009). Like Nigeria, the fight against computer crimes according to Mukinda (2009) has spread through the nooks and crannies of Kenya. Kenya revamped its Cyber Crime Unit of the police force by embarking on a program to adequately train its law enforcement officers on handling cybercrime offenders. In 2009, 18 police officers were sponsored to receive four months of specialized training in the United States on emerging Internet-based criminal trends and the use of specialized equipment to track down cybercriminals. This was followed by a retraining of other members of the Cyber Crime Unit by their colleagues who had been trained in the US. This training gave the police force the ability to implement set policies. To continue with sound implementation efforts, Kenya Network Information Center (KENIC), which works under the auspices of the Ministry of Information and Communication and the Kenya police, established a Computer Security Incidence Response Team (CSIRT). This response team relays computer and network related security threats and vulnerabilities to the local Internet communities, and sends out a weekly newsletter of recorded activities to members on the CSIRT mailing list (Akuta et al., 2011). On the contrary, according to INTERPOL (2009), Cameroon fostered cybercrime laws and policy implementation efforts by signing an accord with international organizations to create and eventually establish a sub-regional bureau of INTERPOL in Yaoundé that serves the entire Central African region. This accord has helped to fight trans-border crimes like cybercrime, vehicle theft, and piracy, amongst other things. This has been a major boost to the law enforcement agency that has in many cases used this accord to facilitate the fight against cybercrime. The signing of this accord was accompanied by the President of Cameroon signing and providing Visa waiver status for all personnel operating on INTERPOL passports. He also called on all Central African leaders to do the same so as to allow swift apprehension of cyber and cyber related criminals (INTERPOL, 2009). The involvement of other African leaders with the Cameroonian government came with a mass effort to fight cybercrime from a trans-border point of view. The government, together with INTERPOL organized a working session that involved all police chiefs in Central Africa to discuss, be educated and adopt steps that could be taken by the region to fight transborder crimes. This included partnering with international organizations like the United Nations, and the creation of specialized units and training of specialized law enforcement officers on how to handle 21stcentury crime, headed by crime involving the use of the computer (Mosima, 2009). The partnerships that Cameroon created with other countries and International Organizations was preceded by the creation of the National Information and Communication Infrastructure (NICI) in 2001 to wage a 10 year fight from 2004 to 2015 against cybercriminals in Cameroon (Economic Commission for Africa, 2006). By 2006, the degree that created the NICI was revisited by the Presidency partly due to the rapid diffusion of cybercrime and the inability of NICI to take over the Ministry of Post and Telecommunications. Two things were amended; the name was changed to the National Agency for Information and Communication Technology, (ANTIC) and the agency was placed directly under the auspices of the Presidency in association with the Ministry of Post and Telecommunications, which had overseen the creation of NICI towards the fight against computer crime (Asongwe, 2012). The implementation strategies put in place in various countries including Cameroon were in a bid to bring down the rate of cybercrime perpetration. Role of Neo Institutions Both the enactment and implementation of laws and policies to fruition as mentioned above depends very much on the collaboration of all stakeholders. These stakeholders when categorized under their various functions form what (Longe, 2012) refers to as the play of Institutions. These institutions influencing cyber-attacks, according to Longe (2012) reside at different levels including global, national, local, social network, professional, industrial, inter-organizational and intraorganizational. In like manner, Akuta et al (2011) points out that the stakeholders who make up the various institutions transcend established institutions like international organizations, governments of various nations, legislatures, through banks, law enforcement agencies, and anticrime commissions to relations, friends and members of the community where these cyberattacks emanate to the cybercriminals themselves. A look at these institutions allowed the researcher to revisit the idea that institutions play a salient part in influencing the perpetration of cyber-attacks both directly and/or indirectly. This intentional or unintentional part played by institutions portrays the strategic influence the perception of institutions has on the fight against cybercrime (Longe, 2012; Akuta et al., 2011). There is a significant difference 32 J. Res. Peace Gend. Dev. in the perceptions of stakeholders on ways to combat cybercrime perpetration at the national level of analysis. Methodology From the review of the work done by previous authors, questionnaire items that are relevant to the constructs in this study were identified. The main constructs were developed based on existing measures as drawn from Clarke’s Situational Crime Prevention Theory as expounded by Arkers, (2004) who have used the same theory to test crime. Constructs developed from the work of these authors included: Perceived Effort to Commit Crime and Perceived Risk of being Caught Committing a crime. Although most items used in this study were based on previous empirical studies, the actual measurement scales to capture the context of this study were developed by this researcher. Once that was done, questionnaire items were modified to match this study on cybercrime perpetrators’ perceptions in Cameroon. Also, important concepts in the survey were defined in order to provide the respondents with a clearer understanding of the questionnaires. To get the most appropriate data for this study, the researcher solicited experts in the perpetration of cybercrime in Cameroon. The expert group targeted here is the cybercrime perpetrators themselves. There is no better group to get the perceptions of cybercrime perpetrators from than from the perpetrators themselves. Thus, cybercrime perpetrators in Cameroon who are considered to be the most important but neglected stakeholder, served as the expert group in this study. In line with this, Beebe & Rao (2005) argue that the main focus on solving crime should be directed towards the criminals thereby enhancing a Criminal Focused Research. They argue that crime prevention is achieved by influencing the would-be criminal’s decision-making process through various environmental and protection measures known as situational factors. The hypotheses of this study were tested with the use of both quantitative and qualitative data. While the perceptions of cybercrime perpetrators was tested quantitatively, the qualitative data was used to test the reasons why perpetrators had the perceptions they exhibited. This was done with the use of open-ended questions. The unit of analysis used in this study is cybercrime perpetrators drawn from four main cities in Cameroon. This was done with the aid of paid informants who claimed to be former cybercrime perpetrators. To achieve this, the researcher developed a seven step Likert scale that assisted in the measurement of the two major variables. The administration of the survey was done using a very rigorous and covert approach to ensure that the study validity addressed the questions the researcher posed concerning the perceptions of cybercrime perpetrators in Cameroon. The questionnaires, which gathered principally primary data, were administered using a web-based survey system.The initial mail sent out for responses did not result in the researcher having the desired response rate. This led to the researcher bringing in a paid inside informant and also played the part of a non-participating undercover for some of the viable perpetrators whom this study found very valuable. This greatly improved the response rate of 31.7 with a sample size of, N=189 which was regarded as sufficient for the study. According to Chin (1998), the required number of cases for a PLS analysis of this sought is 10 times the number of indicators. To make sure the respondents were actually cybercrime perpetrators, the researcher secretly requested the services of cybercafé operators who dealt with the perpetrators on a daily basis for confirmatory identification. The quality of data collected was verified in terms of its validity and reliability with a look at the exploratory factor analysis, Cronbach’s alpha, composite reliability and indicator loadings, weights, and the Average Variance Extracted. The study employed the Structural Equation Model (SEM) using Partial Least Squares (PLS) algorithms to obtain better results. Once PLS was applied, the researcher evaluated the measurement and the structural models simultaneously. The measurement model was examined for convergent and discriminant validity. The structural model provided the required information that is needed to evaluate the hypotheses in the research model. FINDINGS AND DISCUSSION The Cost Element, as stated in this study, refers to the variables that require the Perpetrators to put in some effort, risk or time to perpetrate cybercrime (Clarke, 1997). In this study, the researcher used the following variables to make up the Cost Element Model; Perceived Risk and Perceived Effort to commit cybercrime. The researcher conducted PLS analysis on the cost element model of perpetrator’s perceptions to find out the contribution of cost element constructs on the overall model. The table below displays R2 for each endogenous construct in the model. According to the results, the constructs explain 56% of the perception of perpetrators on cybercrime perpetration rate. The table indicates the coefficients of all hypothesized paths in the model with the significance. The model indicates that Perceived Risk significantly influenced perpetrators perceptions with path coefficients of 0.629 and Perceived Effort partially influenced perpetrators perceptions with a path coefficient of 0.173. Akuta 33 Table 1. Descriptive Statistics of Questionnaire item responses N Min Cybercrime Perpetration Rate (RP) RPCP 189 1 Max Mean 7 0.700004 Σ 0.059101 RPEO 189 1 7 0.710008 0.058072 RPER 189 1 7 0.770037 0.043494 RPID RPSL 189 189 1 1 7 7 0.713579 0.693396 0.064522 0.069222 Perceived Effort to Commit Cybercrime (PE) PEAF 189 1 7 0.657326 0.092289 PECR 7 0.629643 0.116253 189 1 PEPR 189 1 7 0.697092 0.091932 PEPS 189 1 7 0.752351 0.067277 PETS 189 1 7 0.739949 0.070979 Perceived Risk to Commit Cybercrime (PR) PRBF PRCD 189 189 1 1 7 7 0.707420 0.058642 0.756204 0.054167 PRLP 189 1 7 0.648609 0.075058 PRRT 189 1 7 0.766212 0.05160 PRSC 189 1 7 0.731311 0.059505 Table 2. Responses to Categorical Demographic Questions Targeted City Yaoundé Douala Bamenda Buea Gender Male Female Highest Level of Education Primary (Elementary) Secondary (Middle) High School Undergraduate Post Undergraduate Age Group 10-18 19-27 28-36 Perceived Effort on Perpetration Rate Perceived Effort to commit cybercrime was one of two constructs that made up the Cost Element Model. It was N 57 46 45 41 % 30.2 24.3 23.8 21.7 N 115 74 % 61 39 N 14 46 39 53 37 % 9 25 22 28 20 N 37 107 48 % 20 57 25 the first hypothesis (H1), stated by the researcher that suggested that an increase in the perceived amount of effort required to commit cybercrime negatively influences the rate of cybercrime perpetration. This 34 J. Res. Peace Gend. Dev. Figure 1. Cost Element Model Indicators Constructs Dependent Variable Table 3. Path Coefficient and R2 for Cost Element Model Independent Variables Perceived Effort Perceived Risk Path Strength Dependent Variable Path T P(t) Perpetration Rate 0.173 2.654 0.022 Perpetration Rate 0.626 9.903 0.000 R2 0.55 Note. Solid arrows represent significant relationships at the 5% level of significance R2 = the coefficient of determination construct was explained by the following indicator statements: available private chat rooms in cyber cafés provide a conducive environment for cybercrime perpetration; privacy secured cyber cafés provide the preferable environment for cybercrime perpetration; the closer one moves towards urban areas, the more access they have to Internet connectivity; the request for detailed identification information will be a hurdle to requesting home Internet subscription; and sharing the same home with parents or guardians limits one’s ability to engage in cybercrime activities. This hypothesis, as observed, was partially supported by the results obtained. The perceptions of Perpetrators indicated that preference was given to cyber cafés with private chat rooms than those without. The study revealed that the usage of cyber cafés with private chat rooms was skewed towards the female perpetrators than towards the male perpetrators. Over 82% of female cybercrime perpetrators surveyed agreed that they engaged primarily in sex related cybercrime. This warranted them to expose sensitive sexual parts of their bodies and or perform sexual acts at the request of potential clients. For this reason, they needed more privacy than male perpetrators thus the high demand for private chat rooms. Female perpetrators held that the elimination of private chat rooms from cyber cafés would be a serious blow to their brand of “business”, in spite of the fact that Face-book has presented them with the opportunity to easily share their story with potential clients. This accounts for the reason for which many of them created several Face-book accounts with different aliases. In the same light, 62% of perpetrators preferred to engage in cybercrime in cyber cafés that were less exposed to the public, mainly because it reduced the risk Akuta 35 Table 4. Results of Hypothesis Testing for Model of Perpetrators’ perceptions Hypothesis H1 H2 An increase in the perceived amount of effort required to commit cybercrime negatively influences the rate of cybercrime perpetration. An increase in the perceived amount of risk involved to commit cybercrime negatively influences cybercrime perpetration rate. of being caught by law enforcement officers. It should be noted that perpetrators did not see the idea of being arrested in itself as an issue, the reason for which they feared arrest is because once arrested, they would lose a reasonable amount of money for what they termed “settlement to the police” (bribing their way out of prosecution) and not because they were afraid of being prosecuted and incarcerated. Perpetrators also revealed that though cybercrime is purely an urban and education skewed crime, they would have preferred rural settings to perpetrate cybercrime because it took them away from the lamplight of tight urban security. However, this was not possible because of the lack of Internet connectivity in the rural areas of Cameroon. Thus cybercrime is undeniably an urban crime reserved exclusively for the educated class (Adomi and Igun, 2008). In discussing security, perpetrators were of the perception that having varying types of security devices placed in cyber cafés would not act as a deterrence factor to them. Only those that had just began or were amateurs would see this as a setback mainly because they depend heavily on cyber cafés, which are relatively cheap. Also in the category to be affected by security devices in cyber cafés are perpetrators that shared rooms with siblings or lived in the same house with parents or guardians. Others held that they were not worried about such security moves because they could afford to install Internet services in their homes. At this juncture, the question of instituting tougher Internet subscription terms was introduced. For an individual to get home Internet subscription, he or she had to provide detailed identification information to the Internet providers who in turn submit information to law enforcement officers when necessary. Perpetrators indicated this would not be a problem because most of them use aliases to acquire Internet subscriptions. One of the reasons for which this indicator was considered to be moderately supported is because perpetrators indicated that they could circumvent the issue of providing their real identity by bribing police officers who are in charge of Identification Cards production to establish an Identification card carrying their image but with a fake name. Finally, 70% of perpetrators agreed to have a tough time engaging in cybercrime from a home that is shared with their parents or guardians. This had to do with the long hours of work put in, the types of friends involved and the kinds of discussions they get involved in when they have to talk with potential victims on phone. Results Partially Supported Strongly Supported Perceived Risk on Perpetration Rate The second hypothesis tested (H2), postulated that an increase in the perceived amount of risk involved to commit cybercrime negatively influences the cybercrime perpetration rate. This implied that the greater the perceived risk by cybercrime perpetrators the lower the rate of cybercrime perpetration. This was the second strongest construct in the main model measured with path coefficient of 0.354 and a 0.000 P-value at the 0.05 level of significance. Note that a higher path coefficient indicates a strong relationship between the construct and the dependent variable, while a low p-value indicates a significant effect of the construct on the dependent variable. One of the greatest things that scared perpetrators was the idea of being caught. Thus the higher the risk, the lower the perpetration rate and the lower the risk of being caught the higher the rate of perpetration. The hypothesis was therefore strongly supported. It should be noted that Perceived Risk is one of the constructs that make up the Cost Element model. It was flanked by the following indicator statements; there is an increase in the risk and difficulty to perpetrate cybercrime with the introduction of security cameras in cyber cafes; there is an increase in the risk and difficulty to perpetrate cybercrime with the introduction of website censor devices on all computers in cyber cafes; there are available tough laws that prescribe sanctions for cybercrime perpetrators; the introduction of a cybercrime specially trained branch of the rapid intervention unit (BIR) would be a major deterrence factor for cybercrime perpetrators; and with bribe free law enforcement officials in Cameroon, the risk of engaging in cybercrime becomes enormously high. Perpetrators perceived that the introduction of security cameras in cyber cafes would pose a great threat to their attempt to engage in cybercrime perpetration. To them, one of the main reasons, aside from accessibility to engage in cybercrime perpetrating activities from cyber cafes, is the presence of secured privacy. Most cyber café operators are aware of the activities of perpetrators and provide a safe, confined and uncensored environment suitable for their activities. The presence of security cameras means that anybody who visits the cyber café could be visually identified. Perpetrators also indicated that the idea of installing security cameras becomes more complicated when Central Processing Unit censor devices are installed on all computers in the 36 J. Res. Peace Gend. Dev. cyber café. To them, the presence of these two measures raises the risk of being caught and thus reduces the zeal to engage in cybercrime activities in a cyber café. Though they thought a solution to this would be subscribing to Internet connection in their homes, despite the fact that it was more expensive, the idea of providing detailed identification information when subscribing for Internet home connection as mentioned before closes this lapse. With the idea of available tough laws and well-defined sanctions against cybercrime perpetrators, the researcher was amazed to find that though 63% of respondents actually thought there were established laws against cybercrime perpetration, all of them were also of the opinion that these laws were a window dressing and could be circumvented. On the other hand, none of them could say what the newly enacted cybercrime law or any other existing law stated about cybercrime perpetration. The perpetrators were of the perception that any such laws could only have an effect if law enforcement officers stopped accepting bribe. This led to the idea of instituting a cyber-security branch of the Rapid Intervention Unit Force, commonly known by its French acronym BIR ‘bee’. 73% of perpetrators surveyed indicated that they would consider stopping the perpetration of cybercrime if the BIR were to engage in cyber security efforts. Presently in Cameroon, the BIR is regarded as the most deadly, brutal, merciless and community unfriendly special force that keeps law and order in the country during special moments as deemed by the administration. Perpetrators indicated that the main reason for fearing the ‘bee’ is because they do not offer the latitude to propose a settlement amount. They held that with the regular police force, when they are in the process of receiving a large amount of money (25,000,000 FRS or $50,000), they requested police protection. Having police protection allowed them to ‘settle’ with just that group of police officers, and not get harassed by others. It was surprising to learn that among the perpetrators were spies for law enforcement officers. These spies were not there to feed the police district with information, but to tip off officers who would subsequently come in and offer their protective services in return for compensation. It is worth mentioning that a request to talk to some of these law enforcement officers was unequivocally turned down. CONCLUSION The study concludes that, 56% of the cybercrime perpetrated in Cameroon can be curbed by significantly increasing the risk of engaging cybercrime perpetration and making it more time consuming to go through the process of committing cybercrime. This will still be done with the use of laws, policies and software that targets risk and effort. Thus, with an increase in the opportunity reducing technics in cybercrime perpetration, there will be a significant drop in the rate of cybercrime perpetration witnessed in Cameroon and other countries south of the Sahara with the same demographics as Cameroon. While this study explains 56% of the rate of perpetration, there is a need to find out what accounts for the 44% that has not been accounted for by the Risk and Effort variables. The study suggests a look at two more perpetrators centered models; Benefit Element Model and the Justification Model. REFERENCES Adeleye S(2009). EFCC may lose $32million EU funding, Nigerian Compass. Retrieved January13, 2011 from http//www. compassnewspaper.com/~compas/NG/index.php?option=com _content&view=article&id=10237: efcc-may-lose 32m-eufunding&Itemid. Adomi E, Igun S(2008). Combating Cybercrime in Nigeria; the Electr. Libr. 26(5): 716-725. Africa News Monitoring Team- ANMT (2011). Nigeria, Ghana in world cybercrime rankings, retrieved Feb., 7, 2011 from http://www.africanews.com/site/Nigeria_Ghana_in_world_cyber_cri me_ranking/list_mesages/36409 Akers R, Jennings W(2009). Social Learning Theory; SAGE Publ. Akuta E(2012). An Exploratory Multi-Method Analysis of Cybercrime Perpetrators’ Perceptions to Combat Cybercrime in Sub Sahara Africa; the Case of Cameroon; Doctoral Dissertation, Southern University Baton Rouge, USA. Akuta E, Akuta E(2012). In the Mind of the Cybercriminal; A Look at Involvement and Achievements of Cybercrime Perpetrators in Cameroon; Proceedings of the 2012 Louisiana Academy of Sciences Conference, March 3, 2012; Alexandria, Louisiana. Akuta E, Ong’oa I, Jones C(2011). Combating Cybercrime in Sub Saharan Africa; a Discourse on Law, Policy and Practice. J. Peace, Gender and Devel. Studies.1(4): 129-137. Anadi A, Jones C(2011). The Economic and Financial Crimes Commission (EFCC) Creation, Functions, Competence and Impact in Nigeria. Proceedings of the 2011Information Communication Technology Conference for Africa Nigeria. are Internet Access Points in Playing? European J. Social Sci. Pp. 6-4. Asongwe P(2012). E-Government and the Cameroon Cyber Security Legislation 2010: Opportunities and Challenges. The Afr. J. Infor. Communication. Pp. 12. Beebe N, Rao V(2005). Using Situational Crime Prevention Theory to Explain the Effectiveness of Information Systems Security. Proceedings of the 2005 Softwars Conference, Las Vegas, NV, December. 2005. Blind K(2011). The Internet as Enabler of New Forms of Innovation: st New Challenges for Research. Proceedings of the 1 Berlin Symposium on Internet and Society; October 25-27, Berlin Germany. Boateng R, Longe O, Mbarika V(2010). Cybercrime and Criminality in Ghana: Its Forms and Implications.Proceedings of the sixteenth Americas Conference on Information Technol. August 1215, Lima, Peru. Botswana National Assembly (2007). Cybercrime and Computer Related Crimes Act of 2007. Broadhurst R(2006). ‘Content Cybercrimes: Criminality and Censorship in Asia’ Indian J. Criminol. 34(1-2):11-30. Retrieved Feb., 7, 2011 Akuta 37 fromhhttp://ceps.anu.edu.au/publications/pdfs/broadhurst_pubs/broa dhurstcontent_cybercrimes.pdf Chawki M(2009). Nigeria Tackles Advanced Fee Fraud. J. Infor. Law and Technol. 1: 1-18. Chin W(1998). The Partial least squares approach to structural equation modeling, Modern methods for business Res. G. A. Marcoulides (ed.), London. 295-336. Clarke R(1980). Situational Crime Prevention: Theory and Practice, Bri. J. Criminol. 20: 136-147. Clarke R(1997). Situational Crime Prevention: Successful Case Studies, Harrow and Heston Publishers: Guilderland. Pp. 1-357. Cole K, Chetty M, Larosa C, Rietta F, Schmitt D, Goodman S(2008). Cyber securityin Africa; an Assessment, Sam Nunn School of International Affairs. Collins A, Halverson R(2009). Rethinking Education in the Age of Technology: the Digital Revolution and the Schools. The Digital Revolution and the Schools, New York, USA. Communication Commission of Kenya (2009). The Kenya Information and Communication Act,retrieved Feb., 7, 2011. from http://www.cck.go.ke/regulations/downloads/KenyaInformationCommunications-Act-Final.pdf. Ehimen R, Bola A(2010). Cybercrime in Nigeria; Bus. Intel. J. 3(1): 9398. INTERPOL (2011). About INTERPOL; Kenya Police http://www.interpol.int/public/icpo/default.asp Department (2010) Structure and Organization of Kenya Police www.kenyapolice.go.ke. Kioni M(2008). Are cybercrime laws in Kenya adequate? Kenya-bye; the Kenyan ICT Longe O(2012). Guilty as Charged: Neo-Institutionalization of Cyber Criminality. Universidad del Este (UNE) in Room LG 101, th Pasillo/Hall G. March 5 from 6:00pm to 7:30pm. Lecture. Longe O, Chiemeke S(2008). Cybercrime and Criminality in NigeriaWhat Roles Lu C, Jen W, Chang W, Chou S(2006). Cybercrime and Cybercriminals: An Overview of the Taiwan Experience. J. Computers. Pp. 1-6. Makhanya P(2001). Hackers stealing millions from KZN firms; Computer/IT, Retrieved June 21, 2010 from http://www.iol.co.za/index.php?click_id=115&art_id=ct20010514212 507126C16 26355 Maska MU(2009). Building national cyber security capacity in Nigeria: the journey so far, Regional cyber security forum for Africa and Arab states, Tunis, 2009, Retrieved February 7, 2011 from http://www.itu.int/ITUD/cyb/events/2009/tunis/docs/maskanigeriacybersecurity- june-09.pdf McAfee Inc (2009). McAfee Reveals the Riskiest Web Domains to Surf and Search, McAfee’s Third Annual Report Retrieved January 23, 2011 from http://www.mcafee.com/us/about/news/2010/q4/20101026-02.aspx Mforgham S(2010). Cameroon: 22 Internet Fraudsters Arrested, Africa News, Retrieved February18, 2011 from http://www.africanews.com/site/Cameroon_22_Internet_fraudsters_ arrested/list messages Mosima E(2009). Fighting Trans-National Crime Police Officers Mobilized, Cameroon Tribune; Retrieved January 27, 2011 from http://allafrica.com/stories/200909090372.html Mukinda F(2009). Kenya Police Retrain 18 Officers to Fight Cybercrime; the nation, Retrieved February 12, 2011 from www.nation.co.ke/News/-/1056/510···16uhn/-/ Oates J(2009). Operation Eagle Claw Nets 18 Nigerian Spammers, the A Register Retrieved January 27, 2011 from http://www.theregister.co.uk/2009/10/23/nigeria_police_success. Ojedokun A(2005). the Evolving Sophistication of Internet Abuses in Africa, the Int. Infor. Libr. Rev. 37: 11-17. Oriola T(2005). Advanced Fee Fraud on the Internet: Nigeria’s Regulatory Response. J. Infor. LAW and Technol. 21: 237-248. sector issues and opinions, Retrieved February 7, 2011 from http://kenyabyte.blogspot.com/2008/10/are-cyber-crime-laws-inkenya-adequate.html. Serrano A(2011). Cybercrime Pays: A $114 billion Industry; the Fiscal Retrieved March 24, 2012 from Times; http://www.thefiscaltimes.com/Articles/2011/09/14/CyberCrimePays-A-114-Billion-ndustry.aspx#page1. UNODC (2013). Comprehensive Study on Cybercrime; United Nations, USA. Wada F(2011). The Impact of Information and Communication Technology on Banking Institutions: Theoretical Policy Perspective of Cyber Crime in Nigeria, Doctoral Dissertation, Southern University Baton Rouge. Pp. 87-88. Wanjiku R(2009). Kenya Communication Amendment Act (2009); Progressive or Retrogressive? Association for Progressive Communications (APC). Wartella A, Jennings N(2000). Children and computers: New technology, old concerns. The Future of Children. Pp. 10-31. World Bank (2013). World Development Indicators; International Bank for Reconstruction and Development; World Bank, USA. How to cite this article: Akuta E. (2014). Using the Cost Element Model to Explain Perpetrators’ Perceptions to Combat Cybercrime in Cameroon: A Structural Equation Model Approach. J. Res. Peace Gend. Dev. 4(2):27-37