https://zimbabwe.misa.org Cybersecurity and Cybercrime Laws in the SADC Region References African Union. (2013). AU Convention on Cyber Security and Personal Data Protection. Retrieved from https://au.int/ sites/default/files/treaties/29560-treaty-0048_-_african_ union_convention_on_cyber_security_and_personal_data_ protection_e.pdf African Union. (2019). Declaration on Principles of Freedom of Expression and Access to Information in Africa. https:// www.achpr.org/public/Document/file/English/draft_ declaration_of_principles_on_freedom_of_expression_ in_africa_eng.pdf African Declaration on Internet Rights and Freedoms (AFDEC). (2020). Privacy and Personal Data Protection in Africa Advocacy Toolkit. Johannesburg. Brenner, S. W. & Schwerha, J. J. (2007-2008). Cybercrime havens: Challenges and solutions. Business Law Today, 17(2), 49-79. Cou nc i l of Eu rope. (20 0 4). T he Budapest Convention. Retrieved from https://w w w.europarl. europa.eu/meetdocs/2014_2019/documents/libe/ dv/7_conv_budapest_/7_conv_budapest_en.pdf Electronic Frontier Foundation. (2013). The Necessary and Proportionate Principles. Retrieved from https:// necessaryandproportionate.org/citations/page/5/ Freedom House (2019). Freedom in the World — Zambia Country Report. Retrieved from https://freedomhouse.org/ country/zambia Gillis, A., & Jackson, W. (2002). Research methods for nurses: Methods and interpretation. Philadelphia: F.A. Davis Company. Government of Botswana. (2018). Cyber Crime and Computer Related Crimes Act. Retrieved from https://www.bocra. org.bw/sites/default/files/documents/18%20Act%2029-062018%20Cybercrime%20and%20Computer%20Related%20 Crimes.pdf Government of Tanzania. (2015). Cybercrime Act. Retrieved https://rsf.org/sites/default/files/the_cyber_crime_act_2015. pdf Government of Malawi. (2016). Electronic Transactions and Cyber Security Act. https://crm.misa.org/upload/web/ e-transactions-act-2016.pdf Government of Namibia. (2017). Electronic Transactions and Cybercrime Bill. Retrieved from https://www.iwits.me/ story/namibian-electronic-and-cybercrime-bill/ Gover n ment of Lesot ho. (2020). Computer Cr i me and Cyber Bi l l. Retrieved from https://w w w.gov.ls/ cyber-crime-a-risk-to-lesotho/ Government of South Africa. (2016). Cybercrimes and Cybersecurity Bill. Retrieved from https://www.justice. gov.za/legislation/bills/CyberCrimesBill2017.pdf Government of Zambia. (2017). Cyber Security and Cyber Crimes Bill . https://www.lusakatimes.com/wp-content/ uploads/2018/06/The-Cyber-Security-and-the-Cyber-CrimesDRAFT-Bill-2017.pdf Government of Zimbabwe. (2020). Cybersecurity and Data Protection Bill. Retrieved from http://veritaszim.net/sites/ veritas_d/files/Cyber%20Security%20and%20Data%20 Protection%20Bill.pdf Hove, K. (2017, July 8). The SADC Model Law on Computer Crime and Cybercrime: A Harmonised Assault on the Right to Privacy? https://www.linkedin.com/pulse/sadc-modellaw-computer-crime-cybercrime-harmonised-assaultkuda-hove/ Hunter, M. and Mare, A. A Patchwork for Privacy: Mapping communications surveillance laws in southern Africa. Media Policy and Democracy Project. DOI: 10.13140/ RG.2.2.33154.71363 Leininger, M. M. (1985). Qualitative Research Methods in Nursing. Orlando: Grune and Stratton. Lincoln, Y. S. (1992). Sympathetic connections between qualitative methods and health research. Qualitative Health Research, 2(4), 375-391. IPPR and Action Namibia. (2017). Submission: Draft Provisions of the Electronic Transactions and Cybercrime Bill (2017). Retrieved from https://action-namibia.org/wpcontent/uploads/2017/10/ACTION-IPPR-Submission-on-ETCBill-June2017.pdf Mare, A. (2020). Internet Shutdowns in Africa| StateOrdered Internet Shutdowns and Digital Authoritarianism in Zimbabwe. International Journal of Communication, 14, 4244-4263. Mare, A. (2018). Politics unusual? Facebook and political campaigning during the 2013 harmonised elections in Zimbabwe. African Journalism Studies, 38(2), 1–22. MISA-Zimbabwe. (2020). Cybersecurity and Data Protection Bill entrenches surveillance: MISA Zimbabwe analysis of the Cybersecurity and Data Protection Bill, 2019. Retrieved from https://zimbabwe.misa.org/wp-content/uploads/ sites/13/2020/05/Cybersecurity-and-Data-Protection-Billentrenches-surveillance-MISA-Zimbabwe-analysis.pdf Orji, U. J. (2015). Multilateral Legal responses to cyber Security in Africa: Any Hope for Effective International cooperation? A paper presented during the 7th International Conference on Cyber Conflict: Architectures in Cyberspace, 105-118. SADC. (2013). SADC Model Law on Computer Crime and Cybercrime. Retrieved from https://www.itu.int/en/ITU-D/ Cybersecurity/Documents/SADC%20Model%20Law%20 Cybercrime.pdf Seger, A. (2016). ‘Implementat ion of t he Budapest Convention on Cybercrime’. [PowerPoint Presentation]. Retr ieved f rom ht t p://w w w.oas.org /jur id ico/pd fs/ cyb9_coe_cyb_oas_dec16_v1.pdf. Wuest, J. (1995). Feminist grounded theory: An exploration of the congruency and tensions between two traditions in knowledge discovery. Qualitative Health Research, 5(1), 125–137. Zuboff, S. (2018). The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power. London: Profile Books. 41