Cybersecurity and Cybercrime
Laws in the SADC Region

https://zimbabwe.misa.org

METHODOLOGY

The research design guiding this evaluation was framed within a participatory qualitative research
methodology. The qualitative methodology will be applied in order to feed the quantitative methodology.
Qualitative research integrates the methods and techniques of observing, documenting, analysing,
and interpreting characteristics, patterns, attributes, and meanings of human phenomena under
study (Gillis & Jackson, 2002; Leininger, 1985). Lincoln (1992) argues that qualitative methods are
naturalistic, participatory modes of inquiry that disclose the lived experiences of individuals.
Consequently, “there is no single, objective reality, there are multiple realities based on subjective
experience and circumstance” (Wuest, 1995: 30).

Data Collection Instruments
Document analysis
Document analysis is a form of qualitative research that was be employed in this study. Through this
method, the researcher was able to analyse legislation and policy documents, including international
regional, sub-regional and national legislation model laws and legislation on cybersecurity and cyber
crime. This information was analysed in order to make sense of the policy and legal implications

12

Select target paragraph3