1 Introduction

The incidences of cybercrime have had an astronomical increase due to a myriad of factors in line with increased interconnectivity of the world. The growth of the Internet has brought transformations to every facet of humanity. However, there are two sides of a coin to any development and with technological advancements, cybercrime and lawlessness with Internet use have become a challenge. Notwithstanding the challenges of cybercrimes, Amosun et al. [1] explain that the Internet arose from the computer revolution and is considered the Fourth Industrial Revolution (4IR) advancing educational development, societal development, and societal transformation for humanity.

Ige [2] reports that educational researchers were mid-way into the celebrations of social transformation brought about by the Internet when the anonymity that accompanies Internet use escalated the activities of criminally minded users to harm unsuspecting and novice users. Esen [3] revealed the hydra-headed nature of cybercrime as a new type of criminal activity that lacks globally accepted definition. Illegal activities are conducted using a computer connected to the Internet [4] and the group are referred to in Ige [2] as “new kinds of YakuzaFootnote 1 called Cyber Bandits”.

Scholars confirm that Internet use and development in nations such as Nigeria, South Africa, Cameroon, Ghana, and Togo that have similar developmental indicators as Papua New Guinea (PNG), have experienced cybercrimes that have rarely received governmental intervention due to the technical nature of these crimes and inadequate capacity of the law enforcement agencies to investigate [1, 5]. The crimes committed in the cyberspace by these modern day ‘Yakuzas’ cannot be tried by the traditional laws since these laws were promulgated in the analog era (pre-1980), prior to the widespread commercialisation and global adoption of the Internet in the 1980s and 1990s, making it more accessible to the public.

The objectives of this research are to:

  • Deconstruct the concept of ‘cybercrime’ and cyberspace policing.

  • Explore the trends in the occurrence of cybercrimes in Australia, Fiji, Papua New Guinea, and Australia.

  • Proffer action plans that PNG can adopt to secure the well-being of her citizenry in cyberspace considering cyber breaches and cyber victimisation reported in Australia.

2 Related works

2.1 The concept of ‘cybercrime’

Cybercrime is open to new meaning as it occurs from one nation to another. Evidence from literature shows that the legal framework of a nation or laws promulgated to address cybercrime or strategies adopted by a nation to prevent and address cybercrime, have great influence on the meanings given to or definitions provided, on cybercrimes.

Timofeyev and Dremova [6] consulted Chapter 28 of the Criminal Code in Russia and defined cybercrime as acts that take place in the sphere of information processes that threaten security. In furtherance of the meaning ascribed to cybercrime in The Russian Criminal Code, Timofeyev and Dremova [6] grouped cybercrimes in Russia as follow:

  • Accessing computer information or data illegally,

  • The use of or distribution of malicious programmes,

  • Breaching the rules of storage or processing or transmission of computer information or data, and

  • The spread of pornography [7].

There is no nation of the world that has effectively combated cybercrimes using the criminal code promulgated prior to Internet connectivity gaining momentum across the world. The criminal code adopted by the State Duma in Russia on 24 May 1996, was adopted by the Russian Federation Council on 5 June 1996 and the law was gazetted on 13 June 1996 [7].

However, the Russian Federation lacks the tenacity to prosecute cyber criminals successfully or exhaustively. Timofeyev and Dremova [6] state that Internet use and development in Russia experienced in 1996 has advanced with the Internet becoming more popularised and is wrought with all manner of social, economic, and political activities. Thus, the 1996 laws to address crime occurrences are no longer applicable. The Russian Federation therefore needs to take further steps to enact laws that are specific to crimes committed in cyberspace to protect her citizens. The changing nature of cybercrimes has been facilitated by the advancements of the 4IR, which has challenged law enforcement agents in Russia. From the current realities of cyber lawlessness in Eastern Europe due to the presence of cybercrime hotspots such as Romania and Ukraine that have globally acclaimed computer hackers, there would be criminal occurrences that would demystify the application of these laws specified in The Russian Criminal Code to cybercrimes in future.

The enforcement of law on cybercrimes in Fiji started with the ‘Crimes Decree 2009–Division 6 on Computer Offences’. The use of ‘Decree’ in this cybercrime legislation suggests that these laws were brought into effect during military governance. According to the United Nations Conference on Trade and Development (UNCTD) [8], Fiji is one of the 46 countries in the Asia–Pacific region that has cybercrime legislation while seven have draft legislations, and seven have no legislation on cybercrime.

The Cybercrime Act enacted in Fiji in 2021, states that cybercrime is the use of computer systems to:

  • compromise the confidentiality, integrity, and availability of computer data and computer systems;

  • commit computer-related forgery, computer-related extortion, and computer-related fraud; and

  • commit other non-computer dependent offences such as identity theft, and telecommunications services theft [9].

The Cybercrime Act promulgated in Fiji accommodates cooperation and collaboration with the governments of other countries to ensuring that stored computer data is accessible to cross-border entities for investigative purposes. The Fijian Cybercrime Act (2021) empowers the supervisory minister to prescribe penalties that do not exceed FJD50000.00 and FJD200000.00 for individual and corporate entities that violate the provisions of this ‘Act’.

Cybercrime in Australia refers to the use of computers and other related devices (that is, ancillary) to commit serious commonwealth, state, or territory-related offences [10]. The Australian Cybercrime Act (ACA) went into effect in 2001 and was amended by Act No. 127 of 2004. The promulgation of Cybercrime Act in 2001 amended or repealed the relevant sections of certain laws that were improvised to address cybercrimes in Australia; these included Crimes Act 1914, Customs Act 1901, Telecommunications (Interception) Act 1979, Australian Security Intelligence Organisation Act 1979, Criminal Code Act 1995, and Education Services Student Act 2000 [10]. These amendments, or repealments of these laws with the enactment of Cybercrime Act in 2001 in Australia, suggests the legal complexities of different laws to address cybercrimes on the Internet or 4IR era.

The provisions of Cybercrime Code Act 2016 in Papua New Guinea, lists four divisions of activities that constitute cybercrimes:

2.2 Division 1: offences related to the integrity of data and electronic systems or devices

  • Unauthorised access or hacking

  • Illegal interception

  • Data interference

  • System interference

  • Data espionage

  • Illegally remaining.

2.3 Division 2: computer related offences

  • Electronic fraud

  • Electronic forgery

  • Electronic gambling or lottery by a child

  • Identity theft

  • Illegal devices.

2.4 Division 3: content related offences

  • Pornography

  • Child pornography

  • Child online grooming

  • Animal pornography

  • Defamatory publication

  • Cyber bullying

  • Cyber harassment

  • Cyber extortion

  • Unlawful disclosure

  • Spam.

2.5 Division 4: other offences

  • Cyber attack

  • Online copyright infringement

  • Online trademark infringement

  • Patent and industrial designs infringement

  • Unlawful advertising.Footnote 2

The cybercrime laws enacted in Russia, Fiji, and Australia that were reviewed in this study are comparable to the provisions of the Papua New Guinea’s Cybercrime Code Act that was passed in 2016. Additionally, the cybercrime law enforcements in Russia, Fiji, and Australia have legal structures that collaborates on investigation of crimes in their cyberspace and cyberspace of other countries of the world that requires technical and investigative assistance to prosecute cyber lawlessness.

2.6 Incidences of cybercrimes in Papua New Guinea

The incidences of cybercrimes reported and prosecuted in PNG are ‘content-related offences’Footnote 3 and not financial related crimes like the cases reported by IC3 in Australia and other countries.

It was reported that a man known as ‘Dominic Aku’ from the Eastern Highlands of PNG adopted the nom de guerre ‘Jason Aku’ to post a threat about Prime Minister Marape in 2020 from the prison at Bomana.Footnote 4 In 2020, Ronald Katak of Nelikum village in East Sepik of PNG was arrested by the investigators of the Royal Papua New Guinea Constabulary (RPNGC)’s cybercrime unit for posting defamatory statements about the Agriculture Minister of PNG on Facebook.Footnote 5 These cases reported in PNG are before the courts since the matters violated the provisions of Cybercrime Code Act 2016. The interesting aspect of crimes committed in the cyberspace in PNG is the culture of settling such disputes out of courts for compensations related benefits.Footnote 6 In developed nations of the world, the cybercrime case reported in East Sepik could suffer a setback in court since it is related to freedom of information and speech due to the involvement of a political office holder that is currently serving in the government.

2.7 Cyberspace policing

The uniqueness of crimes committed in cyberspace necessitated the use of different approaches to protect users and information in cyberspace. Cyberspace is open to diverse attacks from web-based criminals, terrorists, and hackers located in different countries of the world [11]. Tropina [12] argues that the use of new technologies has created new possibilities for criminals to exploit the same advantages offered by the new technologies. This emerging scenario led some nations to design lawful strategies for policing cyberspace. At present, cyberspace remains the prominent source of innumerable ‘’against the law” activities such as the dark web commercial transactions, child pornography, hacking, and migration of traditional crimes such as advanced fee fraud (419), copyright infringements, and disruption of ICT networks [12].

In 2022, the incidences of cybercrimes have grown by 13% to 76,000 in one year, which implies that cybercrime is committed every seven minutes in Australia [13]. The evolving threats from the crimes committed in cyberspace led stakeholders in Australia to declare that “cyberspace has become a battleground” and is “increasingly the domain of warfare” [13]. In 2023, the Australian High Tech Crime Centre (AHTCC) was founded and hosted in Canberra by the Australian Federal Police (AFP). The AHTCC transformed into a new High Tech Crime Operations (HTCO) portfolio in 2007 and was officially launched in 2008 [14]. The new HTCO is saddled with the responsibility of investigating online child sex exploitation, collaborating with banking and finance institutions on protection from cyber-attack, protection of Australia’s information infrastructure, and countering forms of crimes enabled by technology [14]. Besides Australia, the United States, the United Kingdom, Canada, India, and France have specialized organizations that maintain law and order in cyberspace other than the national police [15].

A new dimension of cyberspace policing in India called “Cyber Hawks” evolved in July 2022. The “Cyber Hawks” comprises 30 top social media influencers (i.e., civilians) that have agreed to work with a city police chief called “Chief Amitech Kumar” in Nagpur, India [16]. The 30 cyber hawks will patrol cyberspace as volunteers by assisting the police in Nagpurto generate local feeds on online content platforms and their contents [16]. Despite the promises presented by informal or formal strategies adopted by some countries of the world on cyberspace policing, scholars have identified these primary challenges to policing cyberspace:

  1. 1.

    The anonymity offered by the Internet enables cyber scammers to commit crimes at geographical locations when they are not physically residing or present [2].

  2. 2.

    The cross-jurisdictional presence of the perpetrator makes cyber policing difficult especially if the perpetrator is anonymous [17].

  3. 3.

    Enmity or hostility between countries [18] could hinder collaboration on tackling or countering cybercrimes across transnational borders. Chang [18] reported that there were computer attacks completed against the United States of America that originated from computers in Taiwan but controlled by command-and-control servers in China.

Notwithstanding the highlighted challenges, police, and cyberspace researchers such as Aremu [19], Broadhurst [20], Choo [21], and Jaishankar [22] should note that cyberspace has emerged as the cosmopolitan frontier of information age policing (See Sampson [23]). Now, cybercrime has transformed into a growing social and financial problem [24].

3 Materials and methods

3.1 Data for the study

The data analysed to explore the occurrence of cybercrimes in Australia from 2001 to 2021 were taken from the Internet Crime Reports (Formerly Internet Fraud Reports), compiled by The Federal Bureau of Investigation’s (FBI) Internet Crime Complaint Center (IFCC) created by the United States (US) government to collect data on a new variant of criminal activity emerging in the 2000s [25].

From 8 May 2000 to 31 December 2021, the complaints received by the Internet Crime Complaint Center (IC3) exceeded 6.5 million [26]. The Federal Bureau of Investigation (2021) explains that the data provided in the annual reports are aggregated to promote public awareness and educate the public on trends inherent in cyber and Internet crimes to enable different nationalities to stay ahead of threats posed by this new type of criminal activity.

The data presented on incidences of cybercrimes in this study were accessed and extracted from the Internet Fraud and Crime Reports of 2001 to 2021 [26] as well as the institutional website of National White Collar Crime Center [26].

3.2 Analysis of data on cybercrimes

The data were analysed using descriptive statistics to highlight the trends inherent in cybercrime occurrences in Australia from 2001 to 2021. Percentages, XGraph of Population Pyramid on IBM Statistical Package for Social Sciences (SPSS) 29.0 were used to present the trends. The two outputs of XGraph generated by the Population Pyramid program were screened by three academic researchers (two male, one female) to select the output most friendly to non-mathematically inclined readers of the National Research Institute’s publications. The output of XGraph, selected by two (one male, one female) of the three selected academic researchers, is presented Figs. 1 and 2 in the section on results of the study. The data analysed were used to make future projections on the nature and dimension of cybercrimes that Papua New Guinea could experience in the future.

Fig. 1
figure 1

Percentage of cybercrime victims 2001–2014 in Australia. The error bar at 95% presented in Figure implies that the researcher has a chance of 5% of making untrue inferences from the processed data

Fig. 2
figure 2

Percentage of cybercrime victims 2015–2021 in Australia

4 Results

4.1 Trends in the occurrence of cybercrimes in Australia

The data extracted from the Internet crime reports for this study were coded and analysed in two parts because:

  • The data released by The Federal Bureau of Investigation and National White Collar Crime Center from 2001 to 2015 were presented in percentages.

  • The total complaints received from Internet users used to calculate these statistics were presented in the annual reports on Internet crime.

  • The data released by The Federal Bureau of Investigation and National White Collar Crime Center in 2000 only comprised the total number of complaints with summary details.

  • From 2016 to 2021, the IC3 discontinued the use of statistical percentages, and presented the number of victims in each country of the world reported in whole numbers.

The results of the analysis are presented in the following figures.

The analysed data presented in Fig. 1, indicates that for the first time Australia featured at the list of top ten nations whose citizens were victimised in cyberspace in 2001.

The number of people in Australia that lost funds to cyber criminals rose astronomically from 2001 to 2005 but declined from 2006 to 2009. The trend went up in 2010 to 0.7% (4th) and declined gradually from 2011 to 2014 (0.53%; 5th). In 2015, 288,012 victims were defrauded via the Internet globally; however, Australia did not feature in the global top ten countries listed in that year.

The results presented in Fig. 2 show the increase in the number of cybercrime victims located in Australia from 2016, that resulted in the country being listed in the top ten global ranking in 2016.

(936)→ 2017 (989)→ 2018 (1227)→ 2019 (1298)→ 2020 (1807)→ 2021 (2204).

For these years, Australia was in 5th, 6th, and 4th place respectively. A striking trend in the data presented by the National White Collar Crime Center and the Federal Bureau of Investigation from 2016 to 2019, is that Australia occupied the 5th position consecutively among the global nations with cybercrime victims. The statistics provided below Fig. 2 show a steady increase in the number of cybercrime victims, despite the fifth position occupied by Australia for these years.

5 Discussion

The trends inherent or observable in the data extracted on cybercrimes in Australia confirms that incidences of crimes in cyberspace have escalated from 2016 to 2021. A plausible explanation for the steady increase in the number of victims of cybercrimes in Australia seems attributable to the increase in the number of individuals using the Internet in the country. The data presented by the World Bank [27] in Fig. 3 indicates that 85% of the population in Australia used the Internet in 2015, this statistic increased to 87% of the Australian population in 2016 and steadied at 87% in 2017.

Fig. 3
figure 3

Statistics of individual internet users in Australia 1990 to 2020 [46]

The percentage of Internet users increased to 88% in 2018, and by 2019, it had reached 89%. Internet users among the total residents in Australia stood at 90% in 2020. Data provided by the World Bank [27] indicated that the population of Australia in 2021 was 25,739,256Footnote 7; however, only 1,022,449 had access to the 39,794 secure Internet servers reported in the data. The implication of these statistics is that if Internet access continues to grow at 1% for the next 10 years, Australia could experience cyberattacks that would lead to an astronomical increase in the number of cybercrime victims reported to the National White Collar Crime Center for Australia.

However, the inference drawn regarding escalating cyber victimisation would be moderated if an increased proportion of Internet users in Australia have access to secure Internet servers. This has not been the case, as indicted by data presented by the World Bank [28] in Fig. 4.

Fig. 4
figure 4

Secure internet users in Australia 1990 to 2020 [46]

As at 2020 (i.e., latest/current data), there were 39,794 secure Internet servers per 1 million people residing in Australia. This implies that there are close to 960,206 vulnerable Internet users per one million residents in Australia, and 24,716,807 in general in this same country [29]. This information is a further technical-related reason for escalating cyber victimisation of unsuspecting Internet users in Australia.

Ezebilo and Kipongi [30] affirm that government effectiveness in the provision of public goods and services is vital for economic growth, and this includes the use of technology and the advantages of its development. Of importance, therefore, is cybersecurity particularly with increasing interconnectivity among countries in the world. According to the Federal Bureau of Investigation and the National White Collar Crime Center [31], the monetary losses attributed to Internet-related scams that have affected citizens of different countries of the world, including Australia from 2017 to 2021, stood at $18.7 billion. The Federal Bureau of Investigation and the National White Collar Crime Center [31] thus confirm cybersecurity as one of the essential goods and services of a public nature necessary in all countries of the world.

5.1 Applicability of cybercrime occurrences in Australia to Papua New Guinea

The statistics on Australia presented by the FBI and IC3 regarding the incidences of cybercrimes, are applicable to Papua New Guinea (PNG) because the number of Internet users in both countries has increased at 1% to 2% from 2013 to 2017. The 2018 to 2020 data on the growth in the population of Internet users has not been computed and this non-availability of data applies to available secure Internet users for PNG as well.

Other motivations for studying occurrences of cybercrime and using it as a benchmark for PNG is the geographical proximity of the two nations. For instance, only 4 km separates Australia and PNG in the Torres Strait, a transitionary boundary that was redefined till 1985 [32]. There are possibilities that cyber breaches in Australia pose great risks to the security of cyber infrastructures in PNG since geographical proximity, cultural connections and Australians-Papua New Guineans interactions goes back to premodern era.Footnote 8

Predictions are that the use of mobile phones in PNG could rise from 2.5 million to 6 million within 5 years [33] and would be accompanied with subscriptions to data services by PNG citizens, which have the potential to expose PNG citizens to cybercriminals. PNG had 1.37 million Internet users in January 2021, which marked an increase of 270,000 from year 2020 [34]. The rate at which Internet users are on the rise in PNG calls for a proactive approach from the government and law enforcement agencies on securing the activities involving her citizenry in cyberspace.

In PNG at present, there are challenges experienced on investigating transnational crimes while the incidences of crimes do not match or correspond to arrests and convictions made by the Royal Papua New Guinea Constabulary (RPNGC) [35]. Considering security risks that are associated with increased interconnectivity of PNG and her virtual assets, the GoPNG must develop a cyberspace policy that reflects PNG’s vital intercultural values and unhindered transmission of information. This cyberspace policy must adopt a holistic approach to PNG’s citizenry e-welfare that includes protection against all forms of crimes in cyberspace.

According to the United States Government [36], cyberspace norms should be supported by the following principles: upholding fundamental freedoms, respect for property, valuing privacy, protection from crime, and right of self-defence. A cursory evaluation of these fundamental principles that the United States affirms, is a fundamental strategic plan for strategies that could enable a state to meet her traditional international obligations. It confirms that common principles necessary for a just society in the physical space, are also applicable to man’s existence and interaction in cyberspace.

The task of developing a cyberspace policy for PNG needs consultation or support of other nations, especially countries with advanced mechanisms for combating cybercrimes. The contents of the proposed PNG’s cyberspace policy must align with her foreign policy. For instance, in the case of United States, this country will, along with other countries of the world, encourage responsible behaviour and oppose people that seek to disrupt networks and systems, divert, and deter malicious actors, and preserve the United States’ vital national assets as necessary and appropriate [36]. In 2016, PNG promulgated the Cybercrime Code to tackle the occurrences of crimes in the cyberspace and in 2021, PNG developed a cybersecurity policy with the aim of demonstrating government’s commitment to strengthen the GoPNG cybersecurity capabilities or know-how and preserve PNG from cyber threats.Footnote 9 Despite the importance of these documents to e-citizenship in PNG, an international strategy for the cyberspace is needed to establish the policy priorities for PNG regarding the use of cyberspace.

5.2 Action plan on cybersecurity for Papua New Guinea

The Government of Papua New Guinea (GoPNG) could adopt certain strategies to outmanoeuvre cybercriminals or terrorist groups targeting the PNG citizenry. The United States International Strategy for Cyberspace [36] recognises that threats to Internet networks are constituted by terrorists, cybercriminals, states, and proxies (Agents) of cybercriminals or states. The United States International Strategy for Cyberspace [36] also recognises another interest group in the cyberspace called the ‘good actors’. The good actors in the context of this study are individuals, governmental, non-governmental and social entities that promote civil liberties, privacy, cross-cultural and transnational values in the cyberspace. One of the modern strategies of combating occurrences of crimes in cyberspace is ‘Cyberspace Policing or Cyberspace Constabulary’.

5.3 Cyberspace policing or cyberspace constabulary

Cyberspace policing is the use of police in the real world to secure human beings that transact different activities in cyberspace and tackle criminality and ill-social behaviours in the online or virtual world. Cyberspace has been described as the new frontier for policing [37]. This conception was made by Sampson [37] as the rise or evolution of cyberspace has created new types of criminal activities and varieties of anti-social behaviours that humanity has not witnessed prior to the Internet era. Cyberspace policing must be considered by state actors as a core responsibility of the government, and not an aspect of a societal life that can be outsourced to private Internet security companies. The severity and hydra-headed nature of cybercrimes has led to the formation of different bodies or interest groups to secure the cyberspace, notably ‘The Society for the Policing of Cyberspace’.Footnote 10

The PNG Cyberspace Police could be equipped to effectively maintain law and order in the PNG’s cyberspace by designing a web portal. The web portal must feature questions that will enable the PNG Cyberspace Police to seamlessly transfer cases or incidences beyond their technical capacity to resolve to The Federal Bureau of Investigation (FBI) and the Australian Cyber Security CentreFootnote 11 (ACSC). The essential questions on the web portal must have the biographical information of the cybercrime victim such as: Name, Sex, Age, City of Residence, Province, Country, Mobile Number, Email Address, as well as the complaint.

Other primary questions that would enable the victims to provide information for investigative or reporting purposes for the PNG Cyberspace Police are also necessary for the effective use of the PNG Cyberspace Police web portal (see Appendix). There are other interest groups beside institutionalised cyberspace police in different nations of the world, such as cyberspace vigilantes. These cyberspace vigilantes adopt legal and illegal approaches to attain their objectives of securing cyberspace. However, the illegal dimensions of cyberspace vigilantes make it undesirable as an approach to administer or attain justice in the PNG cyberspace.

5.4 The PNG cyberspace asset recovery team

Another component of the action plan that PNG can adopt to tackle crime occurrences in cyberspace is to constitute the PNG Cyberspace Asset Recovery Team (PNGCART) [38]. The Recovery Asset Model (RAT) was developed and used by the United States Internet Crime Complaint Center (IC3) to connect law enforcement agencies and financial institutions to support statistical and investigative analyses. According to the Federal Bureau of Investigation and National White Collar Crime Center [31], the IC3’s RAT was designed to rationalise communication with financial institutions and enable the Federal Bureau of Investigation’s structures to freeze funds and possibly accounts of victims that have made transfers or payments to domestic accounts under false and fraudulent premises.

The GoPNG can develop or replicate the IC3’s RAT, as presented in Fig. 5.

Fig. 5
figure 5

The adapted recovery asset model team

Once a complaint is logged through the crime complaint centre, it is recorded in the PNG Cyberspace Police database. The automated triage provides instant digital evidence which is interpreted and analysed by the expertise of Computer Science analysts. This means that complaints received from the public could be assigned to their investigative officers with the PNGCART acting as an electronic liaison between the RPNGC and financial institutions supporting statistical and investigative analyses in PNG.

5.5 Education for justice

The Education for Justice (E4J) was initiated and developed by the United Nations Office on Drugs and Crime (UNODC) in partnership with The United Nations Educational, Scientific and Cultural Organisation (UNESCO) [39]. The E4J aims to foster or advance crime prevention and culture of lawfulness through educational activities designed for different levels of education, such as primary, secondary, and tertiary. The resources provided by the E4J team are useful to teach the rule of law and suitable for cybersecurity education for learners in primary, secondary, and higher educational institutions.

In the section of E4J/UNODC website developed for primary school learners there is a ‘Fun Corner’, ‘Primary-Level Library of Resources’, and ‘E4J Tools and Lesson Plans’ [40]. These resources feature educational materials appropriate for primary school learners on issues related to law for policy makers, teachers, parents, and students. The E4J tools and lesson plans have diverse resources for stakeholders that would enable them to facilitate lessons, workshops or training programmes on conflict resolution, critical thinking, teamwork, and empathy.

Another section of the E4J/UNODC website provides resources for secondary education [41]. This section contains a developed resource guide to support the Model United Nations (MUN) conference organisers on featuring issues emanating from UNODC foci into academic conferences. A unique feature of this section is the non-electronic game-based learning materials developed for 13–18-year-old learners, focusing on rule of law-related topics. Additionally, this section features handbooks developed for teachers in secondary and primary schools to support the teaching of rule of law-related topics. Finally, a further section on the E4J/UNODC website provides an array of peer-reviewed university teaching modules developed by 600 academics in more than 550 universities and 114 countries for teaching global crime prevention, integrity, and ethics [42].

6 Conclusion

This study investigated the trends on victims of cybercrime from 2001 to 2021 drawing on data provided by the Federal Bureau of Investigation and the National White Collar Crime Center. The outcomes of the literature reviewed, and data explicated from the repositories of the Federal Bureau of Investigation and the National White Collar Crime Center project the trends of cyber-victimisation experienced by citizens of Australia.

The data explicated from the World Bank confirms that Internet use and access in Australia and Papua New Guinea are growing annually at 1% to 2%. This data confirms that PNG will be more interconnected in the next few years. The increased interconnectivity of PNG needs adequate planning or measures on cybersecurity as Internet users in PNG become vulnerable to cyber scammers. Part of the cybersecurity measures for GoPNG is to invest in secured Internet servers for the emerging Internet users in PNG. Another veritable reason that justifies the need for institutionalised cybersecurity education in PNG, is the uniqueness of the nation as the primary bridge to the Pacific and South East Asia due to its strategic geographical location.

The lesson evident in the occurrence of cybercrimes in Australia is that none of the developed nations have effectively combated cybercrimes using the criminal code or provisions that were enacted during the analog era. The GoPNG should align or streamline the activities of organisations such as PNG Computer Emergency Response Team (PNGCERT), PNG National Cyber Security Centre (PNGNCSC), and the Cybercrime Unit of the Royal PNG Constabulary (RPNGC). The streamlining of the activities of these organisations would enable the Government to have a robust national cybersecurity plan in place for the country. This coordinated approach would transform PNG to the hub of cybersecurity in the Asia–Pacific region. The findings of this research would empower policy makers and cybersecurity experts to identify the appropriate national approach of furthering PNG cybersecurity agenda and reduce occurrences of cybercrimes in PNG.