Cybercrime and Challenges in South Africa

Cybercrime and Challenges in South Africa PDF Author: Stanley Osezua Ehiane
Publisher: Springer Nature
ISBN: 981993057X
Category : Social Science
Languages : en
Pages : 251

Get Book Here

Book Description
The advent of the Internet for global advancement and development has opened the world to new crimes. This is the first comprehensive book on the subject matter, considering the absence of textbooks in teaching the subject matter in higher learning institutions. Hitherto, the book is distinctive and timely in the wake of the inclusion of the subject matter as a new curriculum in many African universities. The book focuses on South Africa, where the Internet has been misused by individuals to perpetuated crime which has been on the increase and unabated. The book's contents and its discourse are significant to students in higher institutions, researchers, and organizations, to give in-depth insights into varied cybercrime on various forms and the manners in which cybercrimes have been executed. Lastly, the book contains instances where the Internet has been used to perpetuate crimes in recent times in South Africa.

Cybercrime and Challenges in South Africa

Cybercrime and Challenges in South Africa PDF Author: Stanley Osezua Ehiane
Publisher: Springer Nature
ISBN: 981993057X
Category : Social Science
Languages : en
Pages : 251

Get Book Here

Book Description
The advent of the Internet for global advancement and development has opened the world to new crimes. This is the first comprehensive book on the subject matter, considering the absence of textbooks in teaching the subject matter in higher learning institutions. Hitherto, the book is distinctive and timely in the wake of the inclusion of the subject matter as a new curriculum in many African universities. The book focuses on South Africa, where the Internet has been misused by individuals to perpetuated crime which has been on the increase and unabated. The book's contents and its discourse are significant to students in higher institutions, researchers, and organizations, to give in-depth insights into varied cybercrime on various forms and the manners in which cybercrimes have been executed. Lastly, the book contains instances where the Internet has been used to perpetuate crimes in recent times in South Africa.

Mission Impossible?

Mission Impossible? PDF Author: Aki Stavrou
Publisher:
ISBN:
Category : Computer crimes
Languages : en
Pages : 132

Get Book Here

Book Description


Combating Cyber Related Crime in South Africa

Combating Cyber Related Crime in South Africa PDF Author: Ezeji Chiji Longinus
Publisher:
ISBN:
Category : Computer crimes
Languages : en
Pages : 250

Get Book Here

Book Description
The global cost of cyber-crime is now estimated to be well over one trillion dollars a year (Norton Symantec study, 2013). Cyber-crime has no regional, national or international boundaries, unlike ordinary crime which has physical and remits boundaries and limits in relation to jurisdiction. The growing problem is that, cybercrime can be committed from any computer system in the world and subsequently making it very difficult to combat. The new broadband and mobile internet network that provide services to the public have given rise to cyber attack. Cyber criminals have intercepted vital and essential government, personal business information online. A number of online userʹs email addresses have been hacked and the information obtained used to perpetrate fraudulent activities. South Africans among other nations have witnessed incidences of cyber-crime victimization and other attacks ranging from cyber bulling, cyber terrorism, cyber warfare, industrial espionage, identity theft, online pornography, hacking, spreading of worms and viruses and Denial of Service, Phishing attacks and cyber stalking. Many people in South Africa have been victimised via social media networks/ wireless network such as I-phone, I-Pods, smart phones, tablets and cell phone that are internet enabled (Sullivan, 2011: 21). This research focuses on combating cyber-crimes. Among the following are the objectives of the research; to ascertain the efforts of the criminal justice system officials on the combating, investigation, prosecution/adjudication and sentencing of cyber related crimes, make contribution towards policing of cyber related crimes especially in South Africa. The researcher made use of qualitative methodology. Unstructured interview was used in collecting data. The researcher met with twelve respondents face to face during data collection process and the data derived was analysed in the findings. The following are the findings of the research; there is shortage of criminal justice experts who are knowledgeable in handling cyber related cases, especially in the area of prevention, investigation, prosecution/adjudication and sentencing of cyber-crime in South Africa. The law/Legislation used in prosecution of cyber related crime in South Africa is too lenient and cannot deter or checkmate cyber criminals. Cyber-crimes are not reported often to the authorities by victims due to ignorance while vi some organizations do not report cyber-attacks to protect the reputation of their organizations. The researcher recommends that the criminal justice structures give its officials specialised training to be one step ahead of the cyber criminals. In addition, new law/legislation with regards to prosecution of cyber-crime should be enacted and or old ones updated to reflect current issues.

Preventing and Combating Cybercrime in East Africa

Preventing and Combating Cybercrime in East Africa PDF Author: Abel Juma Mwiburi
Publisher:
ISBN: 9783428156016
Category : Africa, East
Languages : en
Pages : 241

Get Book Here

Book Description
The focus of this book is to examine the effectiveness of the measures currently employed in East Africa as a region, and in the individual Member States in dealing with cybercrime and how best the same can be modified to prevent and combat cybercrime in the region. So, the subsequent analysis in this book is done with a view of drawing some lessons from Europe2019s cybercime regimes. In so doing, the book is set to critically examine the role of the law in preventing and combating cybercrime in East Africa; investigate the extent to which the current laws address the problem of cybercrime and ICT governance and regulation in the East African region at country and regional levels; examine the level and extent of cooperation required among the EAC partners in fighting cybercrime; analyze legal and institutional challenges on ICT governance and regulation in East Africa and globally with a view of creating a crime-free environment for the Internet and computer users; and examine the best ways through which the East Africa region can ensure efficient regulation of ICT through a regime that will prevent and combat cybercrime without necessarily inhibiting social, political and economic development."

Cyber crime strategy

Cyber crime strategy PDF Author: Great Britain: Home Office
Publisher: The Stationery Office
ISBN: 9780101784221
Category : Law
Languages : en
Pages : 44

Get Book Here

Book Description
The Government published the UK Cyber Security Strategy in June 2009 (Cm. 7642, ISBN 97801017674223), and established the Office of Cyber Security to provide strategic leadership across Government. This document sets out the Home Office's approach to tackling cyber crime, showing how to tackle such crimes directly through the provision of a law enforcement response, and indirectly through cross-Government working and through the development of relationships with industry, charities and other groups, as well as internationally. The publication is divided into five chapters and looks at the following areas, including: the broader cyber security context; cyber crime: the current position; the Government response and how the Home Office will tackle cyber crime.

Cybercrime

Cybercrime PDF Author: Susan W. Brenner
Publisher:
ISBN: 9788182746145
Category : Computers
Languages : en
Pages : 0

Get Book Here

Book Description
In Russia, there are people who earn their living trading in personal information belonging to American citizens. They maintain websites where one can buy names, addresses, and Social Security and credit card numbers. Cybercrime flourishes? Both transnationally and within our own borders. It is time to arm ourselves with the information we need to remain safe. Cybercrime: Criminal Threats from Cyberspace is intended to explain two things: what cybercrime is and why the average citizen should care about it. To accomplish that task, the book offers an overview of cybercrime and an in-depth discussion of the legal and policy issues surrounding it. Enhancing her narrative with real-life stories, author Susan W. Brenner traces the rise of cybercrime from mainframe computer hacking in the 1950s to the organized, professional, and often transnational cybercrime that has become the norm in the 21st century. She explains the many different types of computer-facilitated crime, including identity theft, stalking, extortion, and the use of viruses and worms to damage computers, and outlines and analyzes the challenges cybercrime poses for law enforcement officers at the national and international levels. Finally, she considers the inherent tension between improving law enforcement`s ability to pursue cybercriminals and protecting the privacy of U.S. citizens.

At the Nexus of Cybersecurity and Public Policy

At the Nexus of Cybersecurity and Public Policy PDF Author: National Research Council
Publisher: National Academies Press
ISBN: 0309303214
Category : Computers
Languages : en
Pages : 170

Get Book Here

Book Description
We depend on information and information technology (IT) to make many of our day-to-day tasks easier and more convenient. Computers play key roles in transportation, health care, banking, and energy. Businesses use IT for payroll and accounting, inventory and sales, and research and development. Modern military forces use weapons that are increasingly coordinated through computer-based networks. Cybersecurity is vital to protecting all of these functions. Cyberspace is vulnerable to a broad spectrum of hackers, criminals, terrorists, and state actors. Working in cyberspace, these malevolent actors can steal money, intellectual property, or classified information; impersonate law-abiding parties for their own purposes; damage important data; or deny the availability of normally accessible services. Cybersecurity issues arise because of three factors taken together - the presence of malevolent actors in cyberspace, societal reliance on IT for many important functions, and the presence of vulnerabilities in IT systems. What steps can policy makers take to protect our government, businesses, and the public from those would take advantage of system vulnerabilities? At the Nexus of Cybersecurity and Public Policy offers a wealth of information on practical measures, technical and nontechnical challenges, and potential policy responses. According to this report, cybersecurity is a never-ending battle; threats will evolve as adversaries adopt new tools and techniques to compromise security. Cybersecurity is therefore an ongoing process that needs to evolve as new threats are identified. At the Nexus of Cybersecurity and Public Policy is a call for action to make cybersecurity a public safety priority. For a number of years, the cybersecurity issue has received increasing public attention; however, most policy focus has been on the short-term costs of improving systems. In its explanation of the fundamentals of cybersecurity and the discussion of potential policy responses, this book will be a resource for policy makers, cybersecurity and IT professionals, and anyone who wants to understand threats to cyberspace.

Evolving Software Processes

Evolving Software Processes PDF Author: Arif Ali Khan
Publisher: John Wiley & Sons
ISBN: 1119821754
Category : Computers
Languages : en
Pages : 324

Get Book Here

Book Description
EVOLVING SOFTWARE PROCESSES The book provides basic building blocks of evolution in software processes, such as DevOps, scaling agile process in GSD, in order to lay a solid foundation for successful and sustainable future processes. One might argue that there are already many books that include descriptions of software processes. The answer is “yes, but.” Becoming acquainted with existing software processes is not enough. It is tremendously important to understand the evolution and advancement in software processes so that developers appropriately address the problems, applications, and environments to which they are applied. Providing basic knowledge for these important tasks is the main goal of this book. Industry is in search of software process management capabilities. The emergence of the COVID-19 pandemic emphasizes the industry’s need for software-specific process management capabilities. Most of today’s products and services are based to a significant degree on software and are the results of largescale development programs. The success of such programs heavily depends on process management capabilities, because they typically require the coordination of hundreds or thousands of developers across different disciplines. Additionally, software and system development are usually distributed across geographical, cultural and temporal boundaries, which make the process management activities more challenging in the current pandemic situation. This book presents an extremely comprehensive overview of the evolution in software processes and provides a platform for practitioners, researchers and students to discuss the studies used for managing aspects of the software process, including managerial, organizational, economic and technical. It provides an opportunity to present empirical evidence, as well as proposes new techniques, tools, frameworks and approaches to maximize the significance of software process management. Audience The book will be used by practitioners, researchers, software engineers, and those in software process management, DevOps, agile and global software development.

CyberBRICS

CyberBRICS PDF Author: Luca Belli
Publisher: Springer Nature
ISBN: 3030564053
Category : Law
Languages : en
Pages : 289

Get Book Here

Book Description
This book stems from the CyberBRICS project, which is the first major attempt to produce a comparative analysis of Internet regulations in the BRICS countries – namely, Brazil, Russia, India, China, and South Africa. The project has three main objectives: 1) to map existing regulations; 2) to identify best practices; and 3) to develop policy recommendations in the various areas that compose cybersecurity governance, with a particular focus on the strategies adopted by the BRICS countries to date. Each study covers five essential dimensions of cybersecurity: data protection, consumer protection, cybercrime, the preservation of public order, and cyberdefense. The BRICS countries were selected not only for their size and growing economic and geopolitical relevance but also because, over the next decade, projected Internet growth is expected to occur predominantly in these countries. Consequently, the technology, policy and governance arrangements defined by the BRICS countries are likely to impact not only the 3.2 billion people living in them, but also the individuals and businesses that choose to utilize increasingly popular applications and services developed in BRICS countries according to BRICS standards. Researchers, regulators, start-up innovators and other Internet stakeholders will find this book a valuable guide to the inner workings of key cyber policies in this rapidly growing region.

The Legal Regulation of Cyber Attacks

The Legal Regulation of Cyber Attacks PDF Author: Ioannis Iglezakis
Publisher: Kluwer Law International B.V.
ISBN: 940351020X
Category : Law
Languages : en
Pages : 333

Get Book Here

Book Description
This updated edition of a well-known comprehensive analysis of the criminalization of cyberattacks adds important new guidance to the legal framework on cybercrime, reflecting new legislation, technological developments, and the changing nature of cybercrime itself. The focus is not only on criminal law aspects but also on issues of data protection, jurisdiction, electronic evidence, enforcement, and digital forensics. It provides a thorough analysis of the legal regulation of attacks against information systems in the European, international, and comparative law contexts. Among the new and continuing aspects of cybersecurity covered are the following: the conflict of cybercrime investigation and prosecution with fundamental rights to privacy and freedom of expression; the 2016 Directive on security of network and information systems (NIS Directive); the General Data Protection Regulation (GDPR); the role of national computer security incident response teams (CSIRTs); the European Union (EU) response to new technologies involving payment instruments, including virtual currencies and digital wallets; the EU Commission’s legislative proposals to enhance cross-border gathering of electronic evidence; internet service providers’ role in fighting cybercrime; measures combatting identity theft, spyware, and malware; states and legal persons as perpetrators of cybercrime; and the security and data breach notification as a compliance and transparency tool. Technical definitions, case laws, and analysis of both substantive law and procedural law contribute to a comprehensive understanding of cybercrime regulation and its current evolution in practice. Addressing a topic of growing importance in unprecedented detail, this new edition of a much-relied-upon resource will be welcomed by professionals and authorities dealing with cybercrime, including lawyers, judges, academics, security professionals, information technology experts, and law enforcement agencies.