This study shows that cyber crime is a recent addition to the list of crimes that can adversely affect businesses directly or indirectly. This phenomenon was not directly prosecutable in South Africa until the enactment of the ECT Act in July 2002. However this Act also prevents businesses to...
Footnote 32 Section 89 of the ECT Act has been criticized for not being stringent enough to deter cybercriminals.Footnote 33 For example, the maximum prison time for section 86 crimes was 12 months and for crimes such as fraud, extortion and forgery was a fine and imprisonment not exceeding ...
The Group-IB team conducted a research to identify and deanonymize the cybercriminal. Result The arrest of the criminal involved in phishing and deface attacks as well as malware development data and carding resulted in a dropped likelihood of encountering these crimes in the EU region....
Two key factors in the use of ICTs for the exchange of child pornography act as obstacles to the investigation of these crimes: 1 The use of virtual currencies and anonymous payment350 Understanding cybercrime: Phenomena, challenges and legal response 24 Cash payment enables buyers of certain...
The Computer Fraud and Abuse Act (CFAA), 18 U.S.C. 1030, outlaws conduct that victimizes computer systems. It is a cyber security law. It protects federal ... C Doyle 被引量: 6发表: 2013年 The Perception Analysis of Cyber Crimes in View of Computer Science Students Computer Technologies...
The Cybersecurity Information Sharing Act (CISA) of 2015. The effects of bullying and cyberbullying on kids in schools. Cyber security risk assessment of the Nigerian public sector. The effects of increased cyber crimes on intelligence. The United Kingdom cyber policy and strategy. ...
Fourthly, as AI-driven attacks can result in data breaches, organisations must ensure compliance with data protection regulations such as the Protection of Personal Information (POPI) Act in South Africa [124], the General Data Protection Regulation (GDPR) in the European Union (EU) [125], and...
The motivations for persons committing crimes on the Internet are very different than those whose intent is to commit an act of terrorism or a cyber-act of warfare. The players are also very different with varying funding and technical skill levels. A cyberterrorists motivation is political in ...
Money laundering cases are being reported in the US as cybercriminals are using bitcoin ATMs to route illicit money across the border.
Sharma, V. D. (2002). International crimes and universal jurisdiction.Indian Journal of International Law, 42(2), l39–l55. Google Scholar Benson, M. L., Tamara D. M & John E. E. (2009). White-collar crime from an opportunity perspective. In S. S. Simpson & D. Weisburd (Eds....