Developments in cybercrime law and practice in Ethiopia
With increasing access to information and communication technologies such as the Internet, Ethiopia has recently taken responsive legislative measures. One such legislative measure is enactment of cybercrime rules as part of the Criminal Code of 2004. These rules penalize three items of computer cri...
Saved in:
| Published in: | The computer law and security report Vol. 30; no. 6; pp. 720 - 735 |
|---|---|
| Main Author: | |
| Format: | Journal Article |
| Language: | English |
| Published: |
Oxford
Elsevier Ltd
01.12.2014
Elsevier |
| Subjects: | |
| ISSN: | 2212-473X, 0267-3649, 2212-4748 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | With increasing access to information and communication technologies such as the Internet, Ethiopia has recently taken responsive legislative measures. One such legislative measure is enactment of cybercrime rules as part of the Criminal Code of 2004. These rules penalize three items of computer crimes namely hacking, dissemination of malware and denial of service attacks. The cybercrime rules are however slightly outdated due to changes that have occurred in the field of cybercrime since the enactment of the Code. The surge of new varieties of cybercrimes previously uncovered under the Code and the need to legislate tailored evidentiary and procedural rules for investigation and prosecution of cybercrimes have recently prompted the Ethiopian government to draft modern and comprehensive cybercrime legislation, but the draft law still needs further work on cybercrimes in light of other major legislative developments at regional and national levels. This article closely examines major developments in cybercrime law and practice in Ethiopia since the enactment of the first set of cybercrime rules and proffers recommendations towards a unified cybercrime regime. |
|---|---|
| AbstractList | With increasing access to information and communication technologies such as the Internet, Ethiopia has recently taken responsive legislative measures. One such legislative measure is enactment of cybercrime rules as part of the Criminal Code of 2004. These rules penalize three items of computer crimes namely hacking, dissemination of malware and denial of service attacks. The cybercrime rules are however slightly outdated due to changes that have occurred in the field of cybercrime since the enactment of the Code. The surge of new varieties of cybercrimes previously uncovered under the Code and the need to legislate tailored evidentiary and procedural rules for investigation and prosecution of cybercrimes have recently prompted the Ethiopian government to draft modern and comprehensive cybercrime legislation, but the draft law still needs further work on cybercrimes in light of other major legislative developments at regional and national levels. This article closely examines major developments in cybercrime law and practice in Ethiopia since the enactment of the first set of cybercrime rules and proffers recommendations towards a unified cybercrime regime. |
| Author | Yilma, Kinfe Micheal |
| Author_xml | – sequence: 1 givenname: Kinfe Micheal surname: Yilma fullname: Yilma, Kinfe Micheal email: kinfeyilma@gmail.com, kinfey@hu.edu.et organization: Hawassa University, School of Law, Ethiopia |
| BackLink | http://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=28961174$$DView record in Pascal Francis |
| BookMark | eNo9kE1Lw0AQhhepYK39A55yEbwk7mY3mwS8SK0fUPCi4G2Zzk5xS5rE3bTSf-8Gi3OZgXkY5n0u2aTtWmLsWvBMcKHvthk2wWc5FyrjdcYFP2PTPBd5qkpVTf5n-XnB5iFseSwpBa_UlJWPdKCm63fUDiFxbYLHNXn0bkdJAz8JtDbpPeDgkMb1cvhyXe_gip1voAk0P_UZ-3havi9e0tXb8-viYZViIYshXYuCVGnrMreFVkpDDsDLwgpCDRql5MoCRqgq1-uiBitkHWNoIbkmBJQzdvt3t_fd957CYHYuIDUNtNTtgxFa11VVKcUjenNCISA0Gw8tumD6mAX80eRVrYUoVeTu_ziKfx8ceRPQUYtknSccjO2cEdyMas3WjGrNqNbw2kS18hf-QW5z |
| CitedBy_id | crossref_primary_10_1016_j_heliyon_2023_e22823 crossref_primary_10_1016_j_ijlcj_2023_100577 |
| ContentType | Journal Article |
| Copyright | 2014 Kinfe Micheal Yilma 2015 INIST-CNRS |
| Copyright_xml | – notice: 2014 Kinfe Micheal Yilma – notice: 2015 INIST-CNRS |
| DBID | IQODW 7SC 8FD JQ2 L7M L~C L~D |
| DOI | 10.1016/j.clsr.2014.09.010 |
| DatabaseName | Pascal-Francis Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
| DatabaseTitle | Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace ProQuest Computer Science Collection Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | Computer and Information Systems Abstracts |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Law Applied Sciences |
| EISSN | 2212-4748 |
| EndPage | 735 |
| ExternalDocumentID | 28961174 S0267364914001605 |
| GroupedDBID | --K --M .DC .~1 0R~ 1B1 1RT 1~. 1~5 29F 4.4 457 4G. 5GY 5VS 6J9 7-5 71M 8P~ 9JN 9JO AACTN AAEDT AAEDW AAFJI AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AAXKI AAXUO AAYFN ABBOA ABFNM ABMAC ABMMH ABXDB ACDAQ ACGFS ACHQT ACNNM ACRLP ACZNC ADEZE ADJOM ADMUD AEBSH AEKER AFJKZ AFKWA AFTJW AGHFR AGUBO AGYEJ AHHHB AHZHX AIEXJ AIKHN AITUG AJOXV AKRWK ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AXJTR BKOJK BLXMC CS3 DU5 EFJIC EO8 EO9 EP2 EP3 FDB FEDTE FGOYB FIRID FNPLU FYGXN G-2 G-Q GBOLZ HLX HLZ HVGLF HZ~ IHE J1W KOM LG8 LG9 M41 MO0 MS~ N9A O-L O9- OAUVE OZT P-8 P-9 PC. PRBVW Q38 R2- RIG RPZ SBC SBM SDF SDG SDP SES SEW SPC SSB SSO SSV SSZ T5K UHS WUQ YK3 ~G- AATTM ABJNI ABWVN ACRPL ADNMO AEIPS ANKPU BNPGV IQODW SSH 7SC 8FD AAYWO ACLOT ACVFH ADCNI AEUPX AFPUW AIIUN AKBMS AKYEP EFKBS EFLBG JQ2 L7M L~C L~D ~HD |
| ID | FETCH-LOGICAL-c535t-b15e47d972d56446a2aa075d1ec6a6c3304dac15e87bb59ad13901461306ecac3 |
| ISICitedReferencesCount | 5 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000345823500010&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 2212-473X 0267-3649 |
| IngestDate | Mon Sep 29 05:59:29 EDT 2025 Wed Apr 02 07:14:01 EDT 2025 Tue Dec 03 05:08:26 EST 2024 |
| IsDoiOpenAccess | false |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 6 |
| Keywords | Cybersecurity Cybercrime Draft computer crime law Computer crime Ethiopia Criminal code Criminality Legislation Cybercriminality Information technology Recommendation Dissemination World wide web Malware Denial of service Internet Computer security Computer attack |
| Language | English |
| License | CC BY 4.0 |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c535t-b15e47d972d56446a2aa075d1ec6a6c3304dac15e87bb59ad13901461306ecac3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 23 |
| OpenAccessLink | https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2609534 |
| PQID | 1669888440 |
| PQPubID | 23500 |
| PageCount | 16 |
| ParticipantIDs | proquest_miscellaneous_1669888440 pascalfrancis_primary_28961174 elsevier_sciencedirect_doi_10_1016_j_clsr_2014_09_010 |
| PublicationCentury | 2000 |
| PublicationDate | 2014-12-01 |
| PublicationDateYYYYMMDD | 2014-12-01 |
| PublicationDate_xml | – month: 12 year: 2014 text: 2014-12-01 day: 01 |
| PublicationDecade | 2010 |
| PublicationPlace | Oxford |
| PublicationPlace_xml | – name: Oxford |
| PublicationTitle | The computer law and security report |
| PublicationYear | 2014 |
| Publisher | Elsevier Ltd Elsevier |
| Publisher_xml | – name: Elsevier Ltd – name: Elsevier |
| References | Criminal Code of the Federal Democratic Republic of Ethiopia. Federal Negarit Gazeta. Proclamation no. 414/2004. Marczak, Guaarnier, Galperin, Scott-Railton, Marquis-Boire (bib36) 2014 date of publication unavailable [accessed on 01.07.14]. (bib23) July 2013 US Federal Computer Fraud and Abuse Act (18 U.S.C. 1030.). The Federal Democratic Republic of Ethiopia (bib50) August 2009 Lau, Rubin, Smith, Trajkovic (bib35) 2000; vol. 3 A proclamation on advertisement. Federal Negarit Gazeta. Proclamation no. 759/2012. Ethiopia: cyber security profile. International Telecommunications Union. Available from (bib22) 2004 (bib2) 2012 Cybercrime legislation – country profiles. Council of Europe. Available from Ethiopian Federal Police Commission establishment proclamation. Federal Negarit Gazeta. Proclamation no. 720/2011. Kaspersky Lab Global Research and Analysis Team (Great) (bib32) 2013 INSA (bib30) 2012 (bib40) 2014 Timberg (bib52) 2014 Michael (bib38) 2009 Brown, Edwards, Marsden (bib6) 2009 Kumar (bib34) 2013 Interview with Director of INSA (bib31) December 2012 The anti-terrorism proclamation. Federal Negarit Gazeta. Proclamation no. 652/2009. Kopstein (bib33) March 10, 2014 Proclamation to provide for the definition of powers and duties of the executive organs of the Federal Democratic Republic of Ethiopia. Federal Negarit Gazeta. Proclamation no. 691/2010. Reidenberg (bib43) 2004; 1 World Internet Stats (bib56) 2012 (bib16) 2013 Cross (bib12) 2008 Marquis-Boire, Marczak, Guaarnier, Scott-Railton (bib37) 2013 (bib41) 2013 [accessed on 01.07.14]. Cyberethiopia (bib15) 2013 Sarkar (bib45) 2012 (bib27) 2009 Cyber attack: when the war goes digital a growing threat to Ethiopia. Ethiop Bus Week Rev. Available from Ethiopia Media Forum (bib17) 2012 Federal Courts proclamation. Federal Negarit Gazeta. Proclamation no. 25/1996. Information Network Security Agency (bib29) 2012 Brenner (bib4) 2004; 6 Constitution of the Federal Democratic Republic of Ethiopia. Federal Negarit Gazeta. Proclamation no. 1/1995. EU Directive 2013/40 on attacks against information systems and replacing council framework decision 2005/222/JHA. Berhane (bib3) 2012 Telecom fraud offense proclamation. Federal Negarit Gazeta. Proclamation no. 761/2012. Federal Democratic Republic of Ethiopia (bib25) February 2011 Conway (bib8) 2003 Copyright and neighboring rights protection proclamation. Federal Negarit Gazeta. Proclamation no. 410/2010. Gercke (bib26) 2011 Ethiopian Ministry of Communication and Information Technology (bib20) 2014; 1 Criminal Procedure Code of the Empire of Ethiopia. Negarit Gazeta. Proclamation no. 185/1961. Revised Southern nations, nationalities and peoples regional state courts proclamation. Debub Negairt Gazeta. Proclamation no. 43/2002. (bib46) 2012 (bib54) 2010 Wisconsin Computer Crimes Act, Wis Stat. § 943.70(2)(a). Timberg (bib51) 2014 Brenner (bib5) 2010 Information Network Security Agency re-establishment proclamation. Federal Negarit Gazeta. Proclamation no. 808/2013. National Intelligence and Security Service re-establishment proclamation. Federal Negarit Gazeta. Proclamation no. 804/2013. |
| References_xml | – year: February 2011 ident: bib25 article-title: Criminal justice policy – reference: Copyright and neighboring rights protection proclamation. Federal Negarit Gazeta. Proclamation no. 410/2010. – reference: Information Network Security Agency re-establishment proclamation. Federal Negarit Gazeta. Proclamation no. 808/2013. – year: 2012 ident: bib46 publication-title: The global competitiveness report 2012–2013, full data edition – reference: Constitution of the Federal Democratic Republic of Ethiopia. Federal Negarit Gazeta. Proclamation no. 1/1995. – volume: 1 year: 2004 ident: bib43 article-title: States and internet enforcement publication-title: Univ Ott Law Technol J – year: 2009 ident: bib27 article-title: Hackers infected three embassy websites to spread malware publication-title: Spam Fighter New – year: 2012 ident: bib45 article-title: Central Statistics Agency of Ethiopia and 100 Chinese government websites hacked by Hitcher – year: 2013 ident: bib32 publication-title: Kaspersky Secur Bull – year: 2012 ident: bib30 article-title: How to remove “Teddy Afro” worm – volume: 1 start-page: 7 year: 2014 ident: bib20 publication-title: Commun Inf Technol Stat Bull – year: 2012 ident: bib17 article-title: Teddy Afro virus attacks Diaspora – reference: US Federal Computer Fraud and Abuse Act (18 U.S.C. 1030.). – year: 2014 ident: bib52 article-title: U.S. citizen sues Ethiopia for allegedly using computer spyware against him publication-title: Wash Post – year: 2009 ident: bib6 article-title: Information security and cybercrime publication-title: Law and the internet – year: 2012 ident: bib29 article-title: Ethiopian cyber attack statistics in 2012 – year: 2014 ident: bib51 article-title: Foreign regimes use spyware against journalists, even the US publication-title: Wash Post – year: March 10, 2014 ident: bib33 article-title: Hackers without boarders publication-title: New Yorker – volume: vol. 3 year: 2000 ident: bib35 article-title: Distributed denial of service attacks publication-title: IEEE international conference on systems, man, and cybernetics – year: 2009 ident: bib38 article-title: Computer viruses slow African expansion publication-title: Guardian – year: 2012 ident: bib3 article-title: Ethiopia: two government websites hacked, defaced on Sunday publication-title: Horn Aff – reference: Proclamation to provide for the definition of powers and duties of the executive organs of the Federal Democratic Republic of Ethiopia. Federal Negarit Gazeta. Proclamation no. 691/2010. – reference: Cyber attack: when the war goes digital a growing threat to Ethiopia. Ethiop Bus Week Rev. Available from: – year: 2013 ident: bib34 article-title: Several government websites of Ethiopiahacked and defaced by Dr. @Dr.SHA6H publication-title: Techworm – year: 2011 ident: bib26 article-title: Understanding cybercrime: a guide for developing countries – year: 2003 ident: bib8 article-title: Hackers as terrorists? Why it doesn't compute publication-title: Comput Fraud Secur – reference: EU Directive 2013/40 on attacks against information systems and replacing council framework decision 2005/222/JHA. – year: 2012 ident: bib56 article-title: World internet usage and population statistics – year: 2013 ident: bib16 article-title: Egyptian cyber fighters attack Awramba Times website publication-title: Awramba Times – year: 2013 ident: bib41 publication-title: Proclamation to legislate, prevent and control computer crime, draft – reference: Criminal Procedure Code of the Empire of Ethiopia. Negarit Gazeta. Proclamation no. 185/1961. – reference: Wisconsin Computer Crimes Act, Wis Stat. § 943.70(2)(a). – reference: [accessed on 01.07.14]. – reference: National Intelligence and Security Service re-establishment proclamation. Federal Negarit Gazeta. Proclamation no. 804/2013. – reference: Ethiopian Federal Police Commission establishment proclamation. Federal Negarit Gazeta. Proclamation no. 720/2011. – reference: The anti-terrorism proclamation. Federal Negarit Gazeta. Proclamation no. 652/2009. – reference: A proclamation on advertisement. Federal Negarit Gazeta. Proclamation no. 759/2012. – year: 2014 ident: bib36 article-title: Hacking Team and the targeting of Ethiopian journalists – reference: ; date of publication unavailable [accessed on 01.07.14]. – reference: Revised Southern nations, nationalities and peoples regional state courts proclamation. Debub Negairt Gazeta. Proclamation no. 43/2002. – year: July 2013 ident: bib23 publication-title: Explanatory note to the draft computer crimes proclamation – reference: Ethiopia: cyber security profile. International Telecommunications Union. Available from: – year: December 2012 ident: bib31 article-title: Brigadier general Teklebirhan Weldearegay publication-title: Zemen Mag – year: 2008 ident: bib12 article-title: Scene of the cybercrime – year: August 2009 ident: bib50 article-title: The national information and communication technology policy and strategy – reference: Telecom fraud offense proclamation. Federal Negarit Gazeta. Proclamation no. 761/2012. – reference: Cybercrime legislation – country profiles. Council of Europe. Available from: – year: 2013 ident: bib15 article-title: Attacks on cyberethiopia.com – year: 2014 ident: bib40 article-title: Privacy International seeking investigation into computer spying on refugee in UK – year: 2010 ident: bib5 article-title: Cybercrime: threats from cyberspace – year: 2013 ident: bib37 article-title: You only click twice: FinFisher's global proliferation – volume: 6 year: 2004 ident: bib4 article-title: US cybercrime law: defining offences publication-title: Inf Syst Front – reference: Criminal Code of the Federal Democratic Republic of Ethiopia. Federal Negarit Gazeta. Proclamation no. 414/2004. – reference: Federal Courts proclamation. Federal Negarit Gazeta. Proclamation no. 25/1996. – year: 2010 ident: bib54 article-title: Virus attack on Ethiopian websites publication-title: Afr Online News – year: 2012 ident: bib2 publication-title: AU convention on confidence and security in cyberspace, version 01/09 – year: 2004 ident: bib22 publication-title: Explanatory note to criminal code of Ethiopia |
| SSID | ssj0000331084 ssj0016986 |
| Score | 1.9785986 |
| Snippet | With increasing access to information and communication technologies such as the Internet, Ethiopia has recently taken responsive legislative measures. One... |
| SourceID | proquest pascalfrancis elsevier |
| SourceType | Aggregation Database Index Database Publisher |
| StartPage | 720 |
| SubjectTerms | Applied sciences Computer crime Computer information security Computer science; control theory; systems Computer systems and distributed systems. User interface Crime Criminal code Cybercrime Cybersecurity Denial of service attacks Draft computer crime law Ethiopia Exact sciences and technology General aspects Governments Information systems. Data bases Internet Law Legislation. Standardization Malware Memory and file management (including protection and security) Memory organisation. Data processing Prosecutions Software |
| Title | Developments in cybercrime law and practice in Ethiopia |
| URI | https://dx.doi.org/10.1016/j.clsr.2014.09.010 https://www.proquest.com/docview/1669888440 |
| Volume | 30 |
| WOSCitedRecordID | wos000345823500010&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: Elsevier SD Freedom Collection Journals 2021 customDbUrl: eissn: 2212-4748 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0016986 issn: 2212-473X databaseCode: AIEXJ dateStart: 19950101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1La9tAEF6cpIdCKE3TEvcRVOgtCPTY5zGUlKSUUEgKvi2r1QoUXNnYzuvfZ0a7kuX40hZ6sDAr2bJmxvPab2YI-UJlYqQpIVJ1lMa0zGlspHOxs7SEV84qa9thE-LyUk4m6udo1Ffx301F08iHBzX_r6yGNWA2ls7-Bbv7L4UFeA9MhyOwHY5_xPgBDKjFutrHwi0sdvE_mQb8b1cahacR8D6b12bopaLs2DDuof_QMky6C9sMvbqop799WRniuloYvgs_MSQTUvoMmNFXuawhRaCIMjBvMRXt3F6wGcM13yWz06Rhh6XeUosiSwYWVvgGJVvK2-cRbhBCg51aU9-BNqBeN5tiX-HgrJxTBfEh9shjO2QvE0yBXts7vTibfO_zbEkODizW4oadJa7a6Z_9M4VCKo_5e37nDQ9lf26W8L-p_MCTLdvdOiTXr8mrEElEp14CDsjINW_Izg9zf0jEUAaiuonWMhABOyNgZ9TJAJ7uZOAt-fXt7PrreRwmZMSW5WwVFylzVJRKZCUDx5abzBjwAcvUWW64xVxVaSxcJEVRMGXKFFNcFGNG7qyx-Tuy28wad0QiXlUCSGpdoThllZOFYgKxyWAME8OqMWEdKXRwzrzTpYF9usMK3mgkoUYS6kRpIOGYHG_QTc99FxUNkT5PIR4ek88dITWoNtyvMo2b3S51yoFZUlKavP_Hm38gL9dS_pHsrha37hN5Ye9W9XJxHETlCfCgc1s |
| linkProvider | Elsevier |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Developments+in+cybercrime+law+and+practice+in+Ethiopia&rft.jtitle=The+computer+law+and+security+report&rft.au=Yilma%2C+Kinfe+Micheal&rft.date=2014-12-01&rft.pub=Elsevier+Ltd&rft.issn=2212-473X&rft.eissn=2212-4748&rft.volume=30&rft.issue=6&rft.spage=720&rft.epage=735&rft_id=info:doi/10.1016%2Fj.clsr.2014.09.010&rft.externalDocID=S0267364914001605 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2212-473X&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2212-473X&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2212-473X&client=summon |