ABSTRACT: This paper reports a systematic review of the studies related to cyber prostitution within the South African (SA) context. Qualitative studies published in peer reviewed journals from 2006 to 2016 were reviewed in order to determine the extent and nature of cyber prostitution within the SA context, impact of cyber prostitution and the measures put in place to combat or deal with cyber prostitution within the South African context. The review revealed that (1) majority of research and interventions tend to focus on street-based prostitution (2) studies on the extent and nature of cyber prostitution within the SAcontext are underrepresented in the research field (3) the negative impacts of cyber prostitution are not clearly determined by existing literature(4) cyber prostitution has become a preferred method of prostitution in modern society for varied motives. Recommendations for further research on cyber prostitution within the SAcontext are also provided.
The facilities of computer technology have not come out without drawbacks. Though it makes the life so speedy and fast, but hurled under the eclipse of threat from the deadliest type of criminality termed as Cybercrime without computers, entire businesses and government operations would almost cease to function. This proliferation of cheap, powerful, user friendly computers has enabled more and more people to use them and, more importantly, rely on them as part of their normal way of life. As businesses, government agencies, and individuals continue to rely on them more and more, so do the criminals Restriction of cybercrimes is dependent on proper analysis of their behavior and understanding of their impacts over various levels of society. Therefore, in the current manuscript a systematic understanding of cybercrimes and their impacts over various areas like Soci eco political, consumer trust, teenager etc. With the future trends of cybercrimes are explained. Dr. Renu | Pawan ""Impact of Cyber Crime: Issues and Challenges"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-3 , April 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23456.pdf
Paper URL: https://www.ijtsrd.com/engineering/other/23456/impact-of-cyber-crime-issues-and-challenges/dr-renu
According to the 2014 Internet Crime Report published by the Federal Bureau of Investigation and conducted by the National White Collar Crime Center, the United States is the world’s leading country in terms of cybercrime-related reports. The survey revealed that of the 269,422 reported cases, 123,684 involved a monetary loss averaging at $2,971 each.
Canadian Clearinghouse on Cyberstalking NCFTA PresentationRandyMcCall
An introduction to the Clearinghouse project, including: a statistical view of cyberstalking in Canada; and common victim and offender characteristics; the common ways of resolving harassment; a view of our objectives and goals; and specific features the final Clearinghouse web site will possess.
The facilities of computer technology have not come out without drawbacks. Though it makes the life so speedy and fast, but hurled under the eclipse of threat from the deadliest type of criminality termed as Cybercrime without computers, entire businesses and government operations would almost cease to function. This proliferation of cheap, powerful, user friendly computers has enabled more and more people to use them and, more importantly, rely on them as part of their normal way of life. As businesses, government agencies, and individuals continue to rely on them more and more, so do the criminals Restriction of cybercrimes is dependent on proper analysis of their behavior and understanding of their impacts over various levels of society. Therefore, in the current manuscript a systematic understanding of cybercrimes and their impacts over various areas like Soci eco political, consumer trust, teenager etc. With the future trends of cybercrimes are explained. Dr. Renu | Pawan ""Impact of Cyber Crime: Issues and Challenges"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-3 , April 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23456.pdf
Paper URL: https://www.ijtsrd.com/engineering/other/23456/impact-of-cyber-crime-issues-and-challenges/dr-renu
According to the 2014 Internet Crime Report published by the Federal Bureau of Investigation and conducted by the National White Collar Crime Center, the United States is the world’s leading country in terms of cybercrime-related reports. The survey revealed that of the 269,422 reported cases, 123,684 involved a monetary loss averaging at $2,971 each.
Canadian Clearinghouse on Cyberstalking NCFTA PresentationRandyMcCall
An introduction to the Clearinghouse project, including: a statistical view of cyberstalking in Canada; and common victim and offender characteristics; the common ways of resolving harassment; a view of our objectives and goals; and specific features the final Clearinghouse web site will possess.
Whistle blowing is an act aimed at unveiling or exposing gross misdeed associated with services rendered in public or private institutions. These acts which constitutes diverse dimensions of crimes popularly referred to as corruption has obviously eaten deep into the fabrics of virtually every sector of our economy including university education system. It is pathetic but frankly to remark that this imbroglio characterizing the society has remained unabated due to absence of secure reporting line. Hence, the development of Whistle-Blowing System with secure electronic avenue for reporting every act or conduct that contradicts and compromises ethical provisions. It creates seamless link to enroll prospective whistle-blowers, accepts documented reports with verifiable evidence, allows communication with investigators, protects whistle-blower’s identity and interfaces them for due rewards. The system development process adopted the object-oriented methodology with its tools such as use-case diagram, sequence diagram and flowcharts. Implementation protocol utilized a combination of Javascript/php/HTML at the front-end while MySQL was engaged at the back-end for appropriate data documentation. It is suited with enormous prospects for assisting management trap down most of the sharp practices and inconsequentialities inherent in most Nigerian universities by accepting user identity, the reports and processes same to specifications.
LOCATION PRIVACY ONLINE: CHINA, THE NETHERLANDS AND SOUTH KOREAijsptm
The aim of the study is to explore cross-cultural differences in users’ location privacy behaviour on LBSNs (location-based social networks) in China, the Netherlands and Korea. The study suggests evidence that Chinese, Dutch and Korean users exhibit different location privacy concerns, attitudes to social influence, perceived privacy control and willingness to share location-related information on LBSNs. The results
show that in general, the more concerned users are about location privacy, the less they are willing to share and it also suggests that location privacy concern and social influence affect each other. Furthermore, the more control people perceive they have over their privacy, the more they are willing to share location information. A negative relationship between willingness to share location information and users’ actual sharing of location information was seen. In short, it is concluded that the relation between cultural values and location privacy behaviours only have a partial connection.
The internet, smartphones and social media have become tools for citizens to perform activities that fall within the range of police work and the work of other organisations dealing with public security. Like modern Sherlock Holmes citizens assist the police and go beyond. They report on crimes, investigate, identify suspects and form vigilante groups. Citizens employ social media for criminal investigation, for crime prevention or for ensuring public security independent of police and to watch and publicly share actions with law enforcement agencies (LEAs).
A Pattern Language of Social Media in Public SecuritySebastian Denef
This report summarizes practices of social media use in public security. Our goal is to create an inventory of best practices, lessons-learned, and roles and responsibilities, to analyse specifically how social media is being used by police and other public security planners, within and outside Europe. By providing an overall description, we aim to spark discussions and provide a common language for social media use in the field of public security planning.
Using data from academic literature review, the review of blogs, books, existing best practice descriptions and expert knowledge this report compares social media practices. Inspired by Christopher Alexander’s work on ‘pattern languages’ for urban spaces and buildings, we analysed the data and looked for patterns. To further refine our findings, we presented the practice patterns to social media and security experts and interviewed them about their perspective and current practices.
As a result, we identified 74 practice patterns that describe and structure the use of social media for public security. The patterns are structured in three groups, describing how (1) law enforcement agencies (LEAs), such as the police, (2) citizens and (3) criminals are using social media and impact public security. With 50 patterns, the focus of our work is on group (1), the LEAs.
Cryptocurrency enforcement framework - Report by the U.S. Department of JusticeLoeb Smith Attorneys
The US Department of Justice released a report regarding #cryptocurrency enforcement with strategies to take related to #digitalassets and interest in how enforcement will work in the #decentralizedfinance space.
The report could serve to shape the future vision of authorities and regulators towards #cryptocurrencies.
Artificial Intelligence, Feminised Bodies, and Online Retailers Promoting on Instagram: A Discussion via the ‘Human Rights and Technology’ Final Report 2021.
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...AJHSSR Journal
ABSTRACT: In the past two decades, third world countries such as South Africa have made steadily developments towards combating hacking as a form of Cybercrime. The developments made by the South African Criminal Justice towards the prevention of hacking have been mildly progressive. The Council of Europe Convention on Cybercrime is the treaty that all South African legislation and policy with regard to hacking is required to be in line with this convention. This treaty has also been the cornerstone to first world countries such as the United States, when preventing cybercrime such as hacking. In order for South Africans to have a safe and secure cyberspace that is free from hackers; there needs to be a co-operative system put in place by the South African Criminal Justice System that involves the government, non-profit organizations and the community. A Criminal Justice system that works closely with the community is able to properly guide its members and correctly prosecute the crime of hacking. Therefore, using qualitative secondary data this paper explores the existing measures put in place by the South African Criminal Justice to combat hacking. The findings of this paper indicate that conceptual understanding of this crime (hacking) can play a pivotal role in addressing the manifestation of this crime in a large extent as the nature and extent can be established, the use of technological means also contribute to hacking, this is also linked to individuals (victims) ignorance. For recommendations, the use of technology and conventional method in awareness can help in responding to the scale and consequence of hacking in South Africa.
PROTECTING THE NATION’S CYBER SYSTEMS 9WHAT ARE THE .docxbriancrawford30935
PROTECTING THE NATION’S CYBER SYSTEMS 9
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE THREAT TO THE NATION’S CYBER SYSTEMS
A Master Thesis
Submitted to the Faculty
Of
American Public University
By
Daniella Rowell
In Partial Fulfillment of the
Requirements for the degree
Of
Master of Arts
February 2016
American Public University
Charles Town, WV
Introduction and purpose statement
Technology is an intrinsic tool of change in the world today. It has had a very huge impact on how things are done given that it seeks to enhance life in way or another. A new global threat known as cybercrime was introduced in the wake of technological advancements. Cybercrime is basically defined as any unlawful act whereby the perpetrator uses a computer or network in its perpetration or the computer or network is a target. The 21st Century has seen immense changes in how criminals are committing crime as they rely more on computers than ever (Brenner, 2010). Whereas some commit cyber-crimes due to the thrill involved, others are motivated by economic goals such as deriving profits. Consequently, cybercrime is a core issue that needs to be tackled as it has a wide array of motivations, targets and it commission is ever changing.
Comment by Chris: No comma between the author and year in Turabian formatting. The comma goes between the year and page number. Comment by Chris: Is this your purpose statement? You need to clearly state your purpose statement.
“The purpose of this thesis is to…….”
This study seeks to address underlying issues within our society that in one way or another contributes to cyber-crime. These factors range from government policies, societal and personal factors such as a jealous spouse hacking his or her partners account, ideological motivated cybercrime and structural cause whereby more information is stored online hence increase cyber criminals reward. The U.S government for examples lacks an official definition of cybercrime. As a result, this term is used interchangeably to refer to other internet and/or technology related malicious acts. Federal law enforcement agencies on the other hand give cybercrime a legal definition based on their jurisdiction and crimes they are charged with investigating (Kirwan, 2013). Furthermore, there is no national strategy solely focused on fighting cybercrime. Instead, it’s integrated in strategies aimed at fighting other crimes such as Transnational Organized crime among others. Consequently, there is need to communicate a vivid definition of cybercrime to persons vested with authority of carrying out prevention strategies. Cyber criminals form networks which increases difficulty of elimination.
Cyber criminals have made a lot of effort in trying to increase the profitability of their activities. Both small and large businesses are at risk of being victims of cybercrime. One estimate has placed cybercrime as a very costly affair for victims in a research done in twenty four countr.
Community Policing and National Security A Study of Selected Local Government...ijtsrd
The rising crime rate, especially violent crime involving terrorism, armed robbery, Fulani herdsmen attack, banditry, ritual murders, political assassinations, ethnic and religious violence, kidnapping, pipe line vandalism, election violence are becoming very serious problem to the Nigerian society. Aristotle Isaac Jacobs "Community Policing and National Security: A Study of Selected Local Government Areas in Bayelsa State, Nigeria" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1 , December 2020, URL: https://www.ijtsrd.com/papers/ijtsrd38204.pdf Paper URL : https://www.ijtsrd.com/humanities-and-the-arts/social-science/38204/community-policing-and-national-security-a-study-of-selected-local-government-areas-in-bayelsa-state-nigeria/aristotle-isaac-jacobs
Whistle blowing is an act aimed at unveiling or exposing gross misdeed associated with services rendered in public or private institutions. These acts which constitutes diverse dimensions of crimes popularly referred to as corruption has obviously eaten deep into the fabrics of virtually every sector of our economy including university education system. It is pathetic but frankly to remark that this imbroglio characterizing the society has remained unabated due to absence of secure reporting line. Hence, the development of Whistle-Blowing System with secure electronic avenue for reporting every act or conduct that contradicts and compromises ethical provisions. It creates seamless link to enroll prospective whistle-blowers, accepts documented reports with verifiable evidence, allows communication with investigators, protects whistle-blower’s identity and interfaces them for due rewards. The system development process adopted the object-oriented methodology with its tools such as use-case diagram, sequence diagram and flowcharts. Implementation protocol utilized a combination of Javascript/php/HTML at the front-end while MySQL was engaged at the back-end for appropriate data documentation. It is suited with enormous prospects for assisting management trap down most of the sharp practices and inconsequentialities inherent in most Nigerian universities by accepting user identity, the reports and processes same to specifications.
LOCATION PRIVACY ONLINE: CHINA, THE NETHERLANDS AND SOUTH KOREAijsptm
The aim of the study is to explore cross-cultural differences in users’ location privacy behaviour on LBSNs (location-based social networks) in China, the Netherlands and Korea. The study suggests evidence that Chinese, Dutch and Korean users exhibit different location privacy concerns, attitudes to social influence, perceived privacy control and willingness to share location-related information on LBSNs. The results
show that in general, the more concerned users are about location privacy, the less they are willing to share and it also suggests that location privacy concern and social influence affect each other. Furthermore, the more control people perceive they have over their privacy, the more they are willing to share location information. A negative relationship between willingness to share location information and users’ actual sharing of location information was seen. In short, it is concluded that the relation between cultural values and location privacy behaviours only have a partial connection.
The internet, smartphones and social media have become tools for citizens to perform activities that fall within the range of police work and the work of other organisations dealing with public security. Like modern Sherlock Holmes citizens assist the police and go beyond. They report on crimes, investigate, identify suspects and form vigilante groups. Citizens employ social media for criminal investigation, for crime prevention or for ensuring public security independent of police and to watch and publicly share actions with law enforcement agencies (LEAs).
A Pattern Language of Social Media in Public SecuritySebastian Denef
This report summarizes practices of social media use in public security. Our goal is to create an inventory of best practices, lessons-learned, and roles and responsibilities, to analyse specifically how social media is being used by police and other public security planners, within and outside Europe. By providing an overall description, we aim to spark discussions and provide a common language for social media use in the field of public security planning.
Using data from academic literature review, the review of blogs, books, existing best practice descriptions and expert knowledge this report compares social media practices. Inspired by Christopher Alexander’s work on ‘pattern languages’ for urban spaces and buildings, we analysed the data and looked for patterns. To further refine our findings, we presented the practice patterns to social media and security experts and interviewed them about their perspective and current practices.
As a result, we identified 74 practice patterns that describe and structure the use of social media for public security. The patterns are structured in three groups, describing how (1) law enforcement agencies (LEAs), such as the police, (2) citizens and (3) criminals are using social media and impact public security. With 50 patterns, the focus of our work is on group (1), the LEAs.
Cryptocurrency enforcement framework - Report by the U.S. Department of JusticeLoeb Smith Attorneys
The US Department of Justice released a report regarding #cryptocurrency enforcement with strategies to take related to #digitalassets and interest in how enforcement will work in the #decentralizedfinance space.
The report could serve to shape the future vision of authorities and regulators towards #cryptocurrencies.
Artificial Intelligence, Feminised Bodies, and Online Retailers Promoting on Instagram: A Discussion via the ‘Human Rights and Technology’ Final Report 2021.
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...AJHSSR Journal
ABSTRACT: In the past two decades, third world countries such as South Africa have made steadily developments towards combating hacking as a form of Cybercrime. The developments made by the South African Criminal Justice towards the prevention of hacking have been mildly progressive. The Council of Europe Convention on Cybercrime is the treaty that all South African legislation and policy with regard to hacking is required to be in line with this convention. This treaty has also been the cornerstone to first world countries such as the United States, when preventing cybercrime such as hacking. In order for South Africans to have a safe and secure cyberspace that is free from hackers; there needs to be a co-operative system put in place by the South African Criminal Justice System that involves the government, non-profit organizations and the community. A Criminal Justice system that works closely with the community is able to properly guide its members and correctly prosecute the crime of hacking. Therefore, using qualitative secondary data this paper explores the existing measures put in place by the South African Criminal Justice to combat hacking. The findings of this paper indicate that conceptual understanding of this crime (hacking) can play a pivotal role in addressing the manifestation of this crime in a large extent as the nature and extent can be established, the use of technological means also contribute to hacking, this is also linked to individuals (victims) ignorance. For recommendations, the use of technology and conventional method in awareness can help in responding to the scale and consequence of hacking in South Africa.
PROTECTING THE NATION’S CYBER SYSTEMS 9WHAT ARE THE .docxbriancrawford30935
PROTECTING THE NATION’S CYBER SYSTEMS 9
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE THREAT TO THE NATION’S CYBER SYSTEMS
A Master Thesis
Submitted to the Faculty
Of
American Public University
By
Daniella Rowell
In Partial Fulfillment of the
Requirements for the degree
Of
Master of Arts
February 2016
American Public University
Charles Town, WV
Introduction and purpose statement
Technology is an intrinsic tool of change in the world today. It has had a very huge impact on how things are done given that it seeks to enhance life in way or another. A new global threat known as cybercrime was introduced in the wake of technological advancements. Cybercrime is basically defined as any unlawful act whereby the perpetrator uses a computer or network in its perpetration or the computer or network is a target. The 21st Century has seen immense changes in how criminals are committing crime as they rely more on computers than ever (Brenner, 2010). Whereas some commit cyber-crimes due to the thrill involved, others are motivated by economic goals such as deriving profits. Consequently, cybercrime is a core issue that needs to be tackled as it has a wide array of motivations, targets and it commission is ever changing.
Comment by Chris: No comma between the author and year in Turabian formatting. The comma goes between the year and page number. Comment by Chris: Is this your purpose statement? You need to clearly state your purpose statement.
“The purpose of this thesis is to…….”
This study seeks to address underlying issues within our society that in one way or another contributes to cyber-crime. These factors range from government policies, societal and personal factors such as a jealous spouse hacking his or her partners account, ideological motivated cybercrime and structural cause whereby more information is stored online hence increase cyber criminals reward. The U.S government for examples lacks an official definition of cybercrime. As a result, this term is used interchangeably to refer to other internet and/or technology related malicious acts. Federal law enforcement agencies on the other hand give cybercrime a legal definition based on their jurisdiction and crimes they are charged with investigating (Kirwan, 2013). Furthermore, there is no national strategy solely focused on fighting cybercrime. Instead, it’s integrated in strategies aimed at fighting other crimes such as Transnational Organized crime among others. Consequently, there is need to communicate a vivid definition of cybercrime to persons vested with authority of carrying out prevention strategies. Cyber criminals form networks which increases difficulty of elimination.
Cyber criminals have made a lot of effort in trying to increase the profitability of their activities. Both small and large businesses are at risk of being victims of cybercrime. One estimate has placed cybercrime as a very costly affair for victims in a research done in twenty four countr.
Community Policing and National Security A Study of Selected Local Government...ijtsrd
The rising crime rate, especially violent crime involving terrorism, armed robbery, Fulani herdsmen attack, banditry, ritual murders, political assassinations, ethnic and religious violence, kidnapping, pipe line vandalism, election violence are becoming very serious problem to the Nigerian society. Aristotle Isaac Jacobs "Community Policing and National Security: A Study of Selected Local Government Areas in Bayelsa State, Nigeria" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1 , December 2020, URL: https://www.ijtsrd.com/papers/ijtsrd38204.pdf Paper URL : https://www.ijtsrd.com/humanities-and-the-arts/social-science/38204/community-policing-and-national-security-a-study-of-selected-local-government-areas-in-bayelsa-state-nigeria/aristotle-isaac-jacobs
Reasons why the developing field of computer forensics is essential to modern-day law enforcement in fighting cyber crimes (by Lillian Ekwosi-Egbulem).
Essay on Cyber Crime and Cyber Law
Essay on CyberCrime
Cyber Crime Essay
Cyber Crime : A Crime
Cybercrime: Two Case Studies
Literature Review On Cyber Crime
Cyber Crime And Transnational Crime Essay
Essay on Cyber Crime and National Security
Cyber Crime Essay
CyberCrime Essay
Cyber Crime Essay
The Issue Of Cyber Crimes Essay
Essay on Introduction to Computer Crime
Essay about CyberCrime and Terrorism
Pros And Disadvantages Of Cyber Crime Essay
Internet Crime Essay
Cyber Crime
Cyber-Crime is a Serious Problem Essay examples
Advantages And Disadvantages Of Cyber Crime
Cyber Crime Essay
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docxphilipnelson29183
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE THREAT TO THE NATION’S CYBER SYSTEMS
A Master Thesis
Submitted to the Faculty
of
American Public University
By
Daniella Rowell
In Partial Fulfillment of the
Requirements for the degree
of
Master of Arts
March 2016
American Public University
Charles Town, WV
A dynamic cyber terrorism framework. International Journal of Computer Science and Information Security by Ahmad, R. & Yuns, Z., 2012 advance an upsurge of cybercrime over the past few years. This increase is related to the dynamism shown by the integration of cybercrime in the execution of conventional crimes. This literature resource is important to this research as it explores a rather sensitive sector within the borders of the United States which is national security. The United States has many enemies most notably terrorists who target systems of the country’s defense systems. An analysis of this literature breaks down the attacks already conducted against the defense infrastructure as well as highlighting vulnerabilities existing within the sector. As a matter of fact, double standards of some security personnel raise an unprecedented risk since terrorist end up gaining inside knowledge on how to attack systems. Many at times cyber terrorism is neglected when expounding on the scope of cybercrime as more conventional cyber-attacks such as fraud, cyber defamation amongst other get a fair share of attention. A shift from the more obvious forms is evident in this literature as cyber terrorism is not a new form of attack in the context of the United States. As it's rightly opened in this literature, the start of the next world war could be a blackout but not a bang as many people expect. A single code could be enough to put everything in our country to stand still ranging from trains, airport operations, and power plants amongst others. Consequently, this research shall explore the perceived complacency within the defense department so as to make recommendations on how to prevent such attacks. In addition, the defense may have to ensure that its personnel’s loyalty is to the United States and its people alone and that no form ill-intended collaborations shall be made to expose the system’s vulnerabilities to an enemy. Moreover, the public is charged with responsibilities of understanding cyber terrorism to enable them to raise alarm whenever queer activities in the neighborhood are detected.
This literature resource is relevant to the research paper as it creates a general picture of what cybercrime is. Brenner, W. 2010 literature Cybercrime defines literature in its very nature. It occurs in two basic ways which either happen independently or simultaneously. On one hand, computers can be used in the perpetration of cyber-attacks but could be targeted on the other hand. This model carries a lot of weight in understanding how the legal definition of cybercrime is arrived at. Some individuals are ignorant of activities they perform.
Digital technology has transformed organizational life. Developments in communications, and in information storage and retrieval, to name just two areas, have greatly enhanced the efficiency with which legitimate organizations operate. Unfortunately, the benefits of digital technology are not lost on criminal organizations, which exploit digital technology to enhance the efficiency and effectiveness of their own operations. This paper will discuss the organized criminal exploitation of digital technology, by looking at a number of illustrative cases from Asia and around the world. It will discuss the various types of “conventional†organized crime that can be facilitated by digital technology, as well as terrorism, which itself can be regarded as a special kind of organized criminal activity. One fundamental question that the paper will seek to address is whether the activities of Asian organized crime have become substantively different as a result of technology, or whether traditional organized criminal activities in Asia are merely being conducted on a more efficient and effective basis. The paper will note the transnational nature of much organized criminal activity, and will discuss mechanisms for the control of organized crime in the digital age. Dr. S. Krishnan | Mr Harsh Pratap | Ms Sakshi Gupta "Organised Crime in the Digital Age" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd41185.pdf Paper URL: https://www.ijtsrd.comcomputer-science/computer-security/41185/organised-crime-in-the-digital-age/dr-s-krishnan
Legal deficiency of cybercrime in nigeria need for urgent legal reform (cha...Gamaliel Olayiwola Fasuyi
This Study focuses on the legal framework prohibiting Cybercrimes in Nigeria. Cybercrime
involves using computers and internet by individuals to commit crime. The people across the globe are technologically transformed to the extent that life
depends on technology. The application of ICT covers every facet of human life and that has led
to the birth of unanticipated rates of crimes coming in a borderless form. The paper examines the
types of cybercrimes prevalent in Nigeria, international conventions approach and other
jurisdictional practices with a view to abreast the application of legal framework of cybercrimes
both in the Nigerian context and international community.
The findings of the paper are that the Nigerian legislations on the subject acknowledge
the existing challenges and are on the right track, but need to be strengthened to achieve the desired
purpose. It further observed that there is no unanimous definition of the concept in all jurisdictions
which add issue to the subject in terms of challenges. The study recommends that the recently signed Nigerian Cybercrimes (Prohibition & Prevention Act) 2015 should be actively enforced
with a view to bringing our legal framework on par with other jurisdictions as well as proffering
other reforms to enhance Cybersecurity in Nigeria.
Pros And Cons Of Cybercrime
Pros And Disadvantages Of Cyber Crime Essay
Cyber Crime : A Crime
Cybercrime: Two Case Studies
Cyber Crime Speech
Why Cybercrime Is Important
The Issue Of Cyber Crimes Essay
Cyber Security Threats And Crimes
Cyber Crime Essay
Cybercrime Research Paper : Cybercrime
Cyber Crime In Australia
Cyber Crimes And The Crime
Research Paper On Cybercrime
Cyber Crime
Cyber Crime And Transnational Crime Essay
CyberCrime Essay
Advantages And Disadvantages Of Cyber Crime
Disadvantages Of Cyber Crime
Essay on Computer Crimes
Cyber Crime Essay
250 words agree or disagreeWeek 5 ForumMaiwand Khyber(Jul .docxvickeryr87
250 words agree or disagree
Week 5 Forum
Maiwand Khyber(Jul 31, 2019 1:01 PM) - Read by: 1
Reply
Organized crime refers to the crime conducted by local, national, or international groupings. These groups are highly centralized enterprises and are run by criminals who are engaged in illegal conduct for profit intention. They have an organized hierarchy, non-ideological motives, and are governed by rules and codes (Jones and Bartlett Learning, n.d.).
Three major types of organized crime include gang criminality, racketeering, and syndicate crime. Gang criminals are usually engaged in local offense like robbery, vehicle theft, kidnapping, ransom, and murder. They are hardened criminals who are dangerous to society. Racketeering is an activity in which the criminal gang is involved in extorting money from legitimate as well as illegitimate businesses by the use of intimidation. It consists in selling adulterated commodities, deceiving people, selling spurious drugs, and so forth. Racketeers usually don’t take away all profits and share it with the owners of businesses. In return, they want fixed money from the owners of illegal activities and allow prostitution, liquor selling, and gambling to continue unabated. Syndicate crime refers to the furnishing of unlawful goods and services by organized criminal groups, often known as mafia. Illegal products include liquor and drugs, while illicit services involve trafficking of girls, gambling, and so forth.
Several groups as The Cosa Nostra, The Russian mafia, The Mexican drug cartels, and The Asian Organized Crime Groups have been considered as criminal groups involved in the organized crime at national and transnational levels. International criminal groups operate under various structures with stable hierarchies and network. They try to influence government policies by using corrupt as well as legitimate methods (The United States Department of Justice, 2015).
With changing industrial contours, organized crime has also shifted from traditional ways to tech-savvy crimes (example: cybercrime). It has exploited technological advancements and communication strategies to expand cross-border. This high-tech realm has made many crimes an international threat rather than a local danger. Today, these crimes are conducted by nimble and loosely structured groups that have a global reach. Refined telephone networks have fostered rapid communication, thereby revolutionizing the illicit commerce (Bjelopera & Finklea, 2012).
While technology has facilitated the growth of organized crime, challenges posed by technological advancements in tracking and investigating organized crime need special mention. Investigation of cases has become difficult because of the sophisticated screening options as firewalls. In a drug investigation case that was carried out jointly by the United States and Colombian authorities, it was found that the presence of the firewall made it intricate for authorities to reach them.
Analyzing the influence of information and communication technology on the sc...JohnGacinya
Rwanda‟s Information Communication and Technology (ICT) sector is among the fastest growing ICT sectors in Africa. Mobile phone penetration had risen to 65% and internet spread was above 20% in 2013. ICT is double edged and has had positive and negative effects to the Rwandan society. It is hoped that Information communication technology is likely to reduce unemployment and transform the country into a competitive, knowledge based economy.
Analyzing the influence of Information and communication Technology on the sc...JohnGacinya
The main objective of this study is to analyze the role of
Information Communication technology in facilitating human
trafficking in Rwanda. Specifically,
(1) To analyze the influence of technology in facilitating
human trafficking in Rwanda.
(2) To analyze the extent to which Rwanda has been able to
combat human trafficking using technology.
The effect of Institutional Ownership, Sales Growth and Profitability on Tax ...AJHSSR Journal
ABSTRACT: This research aims to test, analyze and obtain empirical evidence about the influence of
institutional ownership, sales growth and profitability on tax avoidance. The object of this research is
manufacturing companies in the consumer goods industry sector listed on the Indonesia Stock Exchange (BEI)
in 2018-2022. This research used quantitative research methods and causal research design. The sampling
technique in this research used non-probability sampling with purposive sampling as the basis for determining
the sample so that a sample of 55 samples was obtained. The data used is secondary data obtained from the
official website of the Indonesia Stock Exchange (BEI) during the 2018-2022 period. The data analysis method
used was multiple linear regression analysis with several tests such as descriptive statistical tests, classical
assumption tests, and hypothesis testing using SPSS version 26 statistical software. The results showed that the
institutional ownership variable has no effect on tax avoidance, while the sales growth and profitability has a
negative and significant effect on tax avoidance.
KEYWORDS: Institutional Ownership, Sales Growth, Profitability, Tax Avoidance
MGA ESTRATEHIYA SA PAGTUTURO KAUGNAY SA PASALITANG PARTISIPASYON NG MGA MAG-A...AJHSSR Journal
ABSTRAK: Ang mga estratehiya sa pagtuturo ay mahalagang kasangkapan sa paghahatid ng mabisang
pagtuturo sa loob ng silid. Tinukoy sa pag-aaral na ito ang antas ng kagustuhan ng mga mag-aaral sa pagsasadula,
pangkatang talakayan at paggawa ng mga koneksyon sa tunay na karanasan sa buhay bilang mga estratehiya sa
pagtuturo ng panitikan sa Filipino at pasalitang partisipasyon ng mga mag-aaral sa Baitang 7 ng Misamis
University Junior High School, Ozamiz City. Ang ginamit na disenyo sa pananaliksik na ito ay deskriptivcorrelational. Ang mga datos sa pag-aaral ay nagmula sa kabuuang populasyon na 120 na mag-aaral at tatlong
mga guro na tagamasid sa pasalitang partisipasyon ng mga mag-aaral. Ang Talatanungan sa Kagamitan sa
Pagtuturo ng Panitikan at Checklist batay sa Obserbasyon sa Pasalita na Partisipasyon ay ang instrumentong
ginamit sa pagkalap ng datos. Mean, standard deviation, Analysis of Variance at Pearson Product-Moment
Correlation Coefficient ang mga ginamit na estatistiko na sangkap. Inihayag sa naging resulta na ang tatlong piling
estratehiya sa pagtuturo ng panitikan sa Filipino ay may pinakamataas na antas ng kagustuhan ng mga mag-aaral.
Ang antas ng pakilahok ng mga mag-aaral sa paggamit ng tatlong estratehiya sa pagtuturo ng panitikan ay
pinakamataas na nagpapahiwatig na aktibong nakilahok ang mga mag-aaral sa mga gawain. Inihayag din na
walang makabuluhang kaibahan sa antas ng kagustuhan ng mga mag-aaral sa mga estratehiya sa pagtuturo ng
panitikan sa Filipino. Ito ay nangahulugan na gustong-gusto ng mga mag-aaral ang pagkakaroon ng mga
estratehiya sa pagtuturo. Walang makabuluhang kaugnayan ang kagustuhan sa mga estratehiya at antas ng
pakikilahok ng mga mag-aaral. Hindi nakaapekto sa kanilang pakikilahok ang anumang estratehiyang ginamit ng
guro.
KEYWORDS : estratehiya, karanasan, pagsasadula, pagtuturo, pangkatang talakayan
The Role of the Instruction of Reading Comprehension Strategies in Enhancing ...AJHSSR Journal
ABSTRACT :Throughout my studies and teaching English in different language centers and higher studies
institutions, I have come to conclude that students consider Reading comprehension as a nightmare that
frightens them and hinders their language acquisition in the Moroccan EFL Context. This may cause them to
develop an internal psychological obstacle that grows as their lack of the necessary instruments or tools to
overcome are not equipped with. They become lost and unaware about or unfamiliar with the necessary reading
comprehension strategies that could help them to face the problem of misunderstanding or non-understanding
of English texts. Respectively, this article which is only one part of my whole study aims at showing the effect
of teaching reading strategies in enhancing the S1 students‟ familiarity with reading strategies and raising their
frequency use. A sample of 283 University students in EFL context have been chosen randomly and have
attended the usual academic reading classes, yet only 76 are subject to this survey. 38 of them constitute the
experimental group who have attended the treatment regularly in one of the language centers and the other 38
participants are chosen randomly from the whole population to constitute the Control group. They all have
Psychosocial Factors and Deviant Behaviors of Children in Conflict with the L...AJHSSR Journal
ABSTRACT:This study aims to determine the relationship between psychosocialfactors and deviant
behaviors among children in conflict with the law (CICL) inDavao Region. The researchers want to discover the
prevalent factors thatdrive these children to their behaviors. Further, the study sought to determinethe
manifestation of psychosocial factors in terms of life satisfaction, emotionalsupport, self-esteem, and personality
traits. The study's data came from N-83children in conflict with the law (CICL) at the Regional Rehabilitation
Center forYouth (RRCY) in Bago Oshiro, Davao City; all respondents are male. This studyused a total
enumeration sampling technique due to the relatively smallpopulation size. The researchers adapted the
Psychosocial surveyquestionnaires by Zabriskie & Ward (2013) and by John and Srivastava (1999)as well as the
Deviant Behavior Variety Scale (DBVS) by Sanches et al. (2016).Through the use of a validated questionnaire,
the mean and standard deviationare determined. The researchers modified this questionnaire and translated itinto
the respondents' mother tongue (Cebuano) for them to comprehend itbetter. The study discovered no significant
relationship between psychosocialfactors and deviant behaviors of children in conflict with the law (CICL) in
theDavao Region
KEYWORDS :Children in Conflict with the Law (CICL), deviant behaviors, psychosocial factors
Entropy: A Join between Science and Mind-SocietyAJHSSR Journal
ABSTRACT: Entropy is join, intersection and interaction between natural science and human mind-society.
We proposed that if internal interactions exist in isolated systems, entropy decrease will be possible for this
system. Management in system is a typical internal interaction within the isolated system. The purpose of
management is to use regulating the internal interactions within the system, and to decrease the increasing
entropy spontaneously. We propose the principle of social civilization and the developing direction is: freedom
of thought, rule of action. Both combinations should be a peaceful revision and improvement of social rules and
laws. Different countries and nations, different religions and beliefs should coexist peacefully and compete
peacefully. The evolution of human society must be coevolution. Its foundation is the evolution of the human
heart and the human nature.
KEYWORDS: entropy, science, society, management, mind, evolution.
A Model of Disaster Resilience Among Colleges and Universities: A Mixed Metho...AJHSSR Journal
ABSTRACT :This research paper aimed to create a comprehensive framework for measuring disaster
resilience in colleges and universities. The study used a mixed method through Exploratory Factor Analysis
(EFA), which involved analyzing data from a survey questionnaire. The questionnaire was developed based on
in-depth interviews with 12 selected participants from the University of Mindanao, as well as relevant literature
and studies. It was reviewed and validated by 10 experts using a method called Content Validity Ratio (CVR).
This questionnaire was then administered to 400 students from 10 different colleges in University of Mindanao.
After conducting the Exploratory Factor Analysis and performing rotations and iterations, the researchers
identified five main constructs that characterize disaster resilience among colleges (1) disaster preparedness, (2)
disaster awareness, (3) community readiness, and (4) disaster management, (5) disaster resilience. The
researchers aimed to create an organization called “Council of College Disaster Volunteers (CCDV)” which
consist of student volunteers. These factors can be used to develop effective management strategies and
strengthen efforts in preventing and managing disasters and accidents.
KEYWORDS:content validity ratio, criminology, disaster resilience, disaster management, exploratory factor
analysis, and Philippines.
Environmental Struggles and Justice Among Lumad Farmers of Davao CityAJHSSR Journal
ABSTRACT : The study described the various environmental struggles experienced among the participants
and their status in accessing justice. The study followed a qualitative multiple-case study approach; the
participants are the Lumad farmers of Marilog, Davao City selected through a Critical sampling method and
aims to present the environmental violations experienced by the Lumad farmers in Davao City and how it
affected their families and sustenance further, their status in accessing justice is also explored. The study
concluded that the most common struggles the participant experience are Illegal logging and improper waste
disposal, which affect their farms, family, health, and income. Their preferred means to accessing justice is
through barangay settlement; the rigors of accessing courts, such as distance, expenses, fear of ruling, and the
hassle of being called to be present in court, are the most prevalent barriers that hinder the lead farmers from
accessing justice or seeking legal action. Nevertheless, the participants believed that the government would help
them in accessing justice.
KEYWORDS :access to justice, criminology,environmental justice, environmental struggles, lumadfarmers
CYBERBULLYING EXPERIENCES OF UNIVERSITY OF MINDANAO CRIMINOLOGY STUDENTSAJHSSR Journal
ABSTRACT:This paper explores the cyberbullying experiences among Criminology students at the
University of Mindanao. A simple random sampling method was used to distribute the study's online
questionnaire to the respondents and to survey the target population. This study has four hundred (400)
respondents, and the respondents are Criminology students at the University of Mindanao. The findings of this
study revealed that the level of cyberbullying experiences is sometimes manifested. On the other hand, the
cyberbullying experiences of the students indicate a moderate level, which indicates that the cyberbullying
experiences of the respondents are sometimes manifested. Also, the computations showed that among the
indicators presented, the highest mean is obtained in the psychological effect, which implies that there is a
significant effect of cyberbullying experiences of the respondents in terms of the Gender level of the
respondents. Therefore, respondents with a low level of cyberbullying experiences tend to have a moderate level
of cyberbullying experience. However, there is no significant effect in terms of age and year level of the
respondents according to the results regarding the psychological, emotional, and physical impact of
cyberbullying.
KEYWORDS :cyberbullying, emotional, experiences, psychological,physical effect, and simple random
sampling method.
A philosophical ontogenetic standpoint on superego role in human mind formationAJHSSR Journal
ABSTRACT: One of the most significant contributions of psychoanalysis to understand the human being is the
elaboration of a model about the mind from a topical and dynamic perspective. Freud explains the mind by the
constitution of the preconscious, conscious, and subconscious. Later, by three dynamic components: the id, the
ego and the superego. Such an organization of the psychic apparatus supposes not only individual elements, but
social influences along the process of hominization. In this paper, we recover the findings of the renowned
anthropologist Lewis Morgan, trying to link some of them to the psychoanalytic theory. Especially highlighting
the importance of superego in Haidt’s social intuitionism.
Keywords: evolutionism, intuitionism, psychoanalysis, Freud, Haidt, Morgan
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...AJHSSR Journal
ABSTRACT: In the Malaysian context, small and medium enterprises (SMEs) experience a significant
burden of workplace accidents. A consensus among scholars attributes a substantial portion of these incidents to
human factors, particularly unsafe behaviors. This study, conducted in Malaysia's northern region, specifically
targeted Safety and Health/Human Resource professionals within the manufacturing sector of SMEs. We
gathered a robust dataset comprising 107 responses through a meticulously designed self-administered
questionnaire. Employing advanced partial least squares-structural equation modeling (PLS-SEM) techniques
with SmartPLS 3.2.9, we rigorously analyzed the data to scrutinize the intricate relationship between safety
behavior and safety performance. The research findings unequivocally underscore the palpable and
consequential impact of safety behavior variables, namely safety compliance and safety participation, on
improving safety performance indicators such as accidents, injuries, and property damages. These results
strongly validate research hypotheses. Consequently, this study highlights the pivotal significance of cultivating
safety behavior among employees, particularly in resource-constrained SME settings, as an essential step toward
enhancing workplace safety performance.
KEYWORDS :Safety compliance, safety participation, safety performance, SME
Psychological Empowerment and Empathy as Correlates of ForgivenessAJHSSR Journal
ABSTRACT: The study explores Psychological Empowerment and Empathy as Correlates of Forgiveness.
The two variables are regarded to have influence on the decision one makes to forgive another. The study aimed
at examining the relationships between psychological empowerment and forgiveness, empathy and forgiveness
and to identify which one of the two,Psychological Empowerment or Empathy, is the more powerful predictor of
forgiveness. The study took a survey design with a sample of 350 drawn from a population of university students
using a self-administered questionnaire with four sections: Personal information, Psychological empowerment
scale, Toronto Empathy questionnaire, and the Heartland Forgiveness Scale (HFS). Data analysis employed
Pearson’s product moment correlation and regression analysis to test hypotheses. The results show significant
relationships between psychological empowerment and forgiveness as well as empathy and forgiveness.
Empathy was found to be the more powerful predictor of forgiveness.
KEY WORDS: Psychological empowerment, empathy, forgiveness
Exploring The Dimensions and Dynamics of Felt Obligation: A Bibliometric Anal...AJHSSR Journal
ABSTARCT: This study presents, to our knowledge, the first bibliometric analysis focusing on the concept of
"felt obligation," examining 120 articles published between 1986 and 2024. The aim of the study is to deepen our
understanding of the existing knowledge in the field of "felt obligation" and to provide guidance for further
research. The analysis is centered around the authors, countries, institutions, and keywords of the articles. The
findings highlight prominent researchers in this field, leading universities, and influential journals. Particularly,
it is identified that China plays a leading role in "felt obligation" research. The analysis of keywords emphasizes
the thematic focuses of these studies and provides a roadmap for future research. Finally, various
recommendations are presented to deepen the knowledge in this area and promote applied research. This study
serves as a foundation to expand and advance the understanding of "felt obligation" in the field.
KEYWORDS: Felt Obligation, Bibliometric Analysis, Research Trends
Les autorités traditionnelles et l’administration coloniale au Tchad : 1900-1960AJHSSR Journal
ABSTRACT : In Africa, traditionalauthorities are the guardians of tradition. Recently, however, they have
been caughtbetween tradition and modernity in the exercise of political power in Chad. However, we are
witnessing the revival of chieftaincy and the hybridization of the politicalpowersexercisedwithinit. In this
cohabitation of powers, traditionalauthorityisescapingitsrole as guardian of tradition.
Traditionalauthorityisthereforepresented in itscurrent state, as a proxy for the modern state in traditional
administrative districts. The aim of thisstudyis to analyze the mutations and adaptability of
traditionalauthorityfrom the pre-colonialperiodthrough the colonial period to the post-colonial period. This
workanalyzes the mutations of authorities. The data collected and processedrevealthattraditionalauthorities have
survivedalmosteverywhere, the former chiefdomsdissolvedduringcolonization have been restored by
republicanheads of state, while more and more frequently civil servants, businessmen, academics and
othermembers of the literateelite, whopreviouslyhad no attraction for the position of traditionalchief, are
beingenthroned.
Key words:Authorities, Administration, colonization, Chad, Kanem.
A Conceptual Analysis of Correlates of Domestic Violence and Adolescent Risky...AJHSSR Journal
ABSTRACT: The study explores domestic violence and how it influences adolescent risky behavior.
Domestic violence is a devastating social problem resulting in significant and enduring effects on children,
threatening both their health and emotional well-being. The study aimed at examining the relationships between
domestic Violence and Psychological Empowerment, Domestic Violence and Self-esteem, psychological
Empowerment and Self-Regulation, Self Esteem and Psychological empowerment, Self-Esteem and Selfregulation, Self-Regulation and Adolescent Risky Behavior and identify the stronger predictor of self-regulation
between psychological empowerment and Self-esteem. Adolescent respondents who experienced domestic
violence were purposely selected and guided by teachers and administrators who had provided support to these
children.The questionnaire had six sections namely; personal information, the Child Exposure to Domestic
Violence Scale, the Psychological empowerment scale, the Rosenberg Self-esteem Inventory, and the Brief
Self-Control Scale. Data analysis employed Pearson's product-moment correlation (r) to test hypotheses 1,
2,3,4,5, and 6. Regression analysis was used for hypothesis 7.The results show a significant relationship
between domestic Violence and Psychological Empowerment, Domestic Violence and Self-esteem,
psychological Empowerment and Self-Regulation, Self Esteem and Psychological empowerment, Self-Esteem
and Self-regulation, Self-Regulation, and Adolescent Risky Behavior. The study documents that Psychological
empowerment is a stronger predictor of self-regulation than Self-esteem.
KEYWORDS:Domestic violence, psychological empowerment, self-regulation, and Adolescent risky behavior
Driving Sustainable Competitive Advantage Through an Innovative Aggregator Bu...AJHSSR Journal
ABSTRACT : The aim of the research is to analyze the influence of the aggregation business model on
Sustainable Competitive Advantage (SCA). Through a survey of 216 MSMEs in the creative economy sector
selected randomly using an ex post facto causal research approach, an overview of the aggregator business
model and its impact on financial resources and SCA was obtained. The aggregator business model plays a role
in facilitating increased access to financial resources to meet both available and required working capital for
realizing SCA in Malang's Lokanima area. The strength of ABM lies in understanding the resources needed for
SCA and the effectiveness of mobilizing services while considering the most cost-effective options, including
providing various alternatives in their provision. Financial resources are an important factor supporting the
achievement of SCA. Access to financial resources is key to facilitating business growth and sustainability.
Theoretical implications: The concept of the aggregator business model emphasizes the efficient and effective
collection, aggregation, and distribution of resources in connecting service providers with consumers in an
economical and efficient manner. Practical implications: ABM can enhance the performance of financial
resource provision by optimizing relationships with MSMEs and financial institutions, leading to business
growth and sustainability for MSMEs.
KEYWORDS -Aggregator Business, Creative Economy, Financial Resources, Sustainable Competitive
Advantage
Accuracy of ChatGPT for Basic Values of Trigonometric FunctionsAJHSSR Journal
ABSTRACT : This study analyzes the accuracy of ChatGPT, an artificial intelligence model based on GPT3.5, in determining the values of basic trigonometric functions. To this end, we examine ChatGPT's responses to
sine, cosine, tangent, and cotangent values for a wide range of angles. We compare the results provided by
ChatGPT with the accuracy values determined by basic trigonometry. We also explore differences in accuracy
depending on changes in question complexity and given context. The results show a high level of accuracy of
ChatGPT in determining the values of trigonometric functions, especially for common angles. However, it is
noted that accuracy may be affected in certain cases of extreme angles or complex questions. This analysis
provides an important representation of ChatGPT's capabilities in the field of mathematics, using a new method
for testing the accuracy of artificial intelligence models in determining trigonometric values.
Keywords -Accuracy, AI Model, ChatGPT, Trigonometric Functions, Trigonometry
Postmodern Marketing and Its Impact on Traditional Marketing Approaches: Is K...AJHSSR Journal
ABSTRACT : The essay discusses the concept of postmodern marketing and its impact on marketing theory
and practice. It explores the characteristics of postmodernism, including openness, tolerance, hyper-reality,
fragmentation, and the lack of clear boundaries, and how they challenge traditional marketing approaches. The
paper also looks at the contributions of postmodern marketing to consumer and marketing research and how it
has redefined the way we think about marketing as a science. Ultimately, it raises the question of whether and
how marketing should adapt itself to the new conditions brought about by postmodernism.
KEYWORDS :Postmodernism, Postmodern Marketing, Kotler, Marketing Theory, Postmodern Consumer
Reorientation of Health Service Governance Toward the Fulfillment of Social J...AJHSSR Journal
ABSTRACT: Health insurance is a human right. At the practical level, this health insurance program in
Indonesia is organized by BPJS Kesehatan (Social Security Administering Body for Health). The
implementation of BPJS Kesehatan is still not optimal and effective. Three problems are discussed in this
writing: the dynamics of health insurance governance in Indonesia, the implementation of the fulfillment of the
right to health by BPJS Kesehatan, and the reorientation of BPJS Kesehatan services toward social justice.
These problems are then answered by scientific research methods using a sociological juridical approach.
Complaintsoften occur regarding the regulations, the services provided by the health facility providers, and the
distance between the community and the health facilities. Such complaints affect the public interest in becoming
BPJS Kesehatan participants. The aforementioned conditions must be considered and evaluated for the
government's success in the aspired national health insurance plan.
KEYWORDS -BPJS Kesehatan, Health Insurance, Social Justice
“To be integrated is to feel secure, to feel connected.” The views and experi...AJHSSR Journal
ABSTRACT: Although a significant amount of literature exists on Morocco's migration policies and their
successes and failures since their implementation in 2014, there is limited research on the integration of subSaharan African children into schools. This paperis part of a Ph.D. research project that aims to fill this gap. It
reports the main findings of a study conducted with migrant children enrolled in two public schools in Rabat,
Morocco, exploring how integration is defined by the children themselves and identifying the obstacles that they
have encountered thus far. The following paper uses an inductive approach and primarily focuses on the
relationships of children with their teachers and peers as a key aspect of integration for students with a migration
background. The study has led to several crucial findings. It emphasizes the significance of speaking Colloquial
Moroccan Arabic (Darija) and being part of a community for effective integration. Moreover, it reveals that the
use of Modern Standard Arabic as the language of instruction in schools is a source of frustration for students,
indicating the need for language policy reform. The study underlines the importanceof considering the
children‟s agency when being integrated into mainstream public schools.
.
KEYWORDS: migration, education, integration, sub-Saharan African children, public school
Sport et vieillissement : une analyse de la pratique des activités physiques ...AJHSSR Journal
Abstract : The aim of thispaperis to report on the effects of physicalactivity and sport on the health of older
people. Based on a mixed-methodsapproach, several techniques, namelydocumentaryanalysis and semistructured interviews, wereused in thisresearch in order to obtain a range of data thatwasavailable, accessible
and relevant to the subjectunderstudy. This enabled us to arrive at the resultsaccording to which the
stakeholders' perceptions of theirhealth are based on the practice of physicalactivities and sport as a social
construct in a socio-cultural context. Older people see sport as a way of curingillnesses, but above all as a way
of givingtheir bodies vitality. Othersseeit as a way of reinvigoratingthemselvesafter retirement.
Key words: Ageing, Physical activities, Sports activities, Elderly people.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Normal Labour/ Stages of Labour/ Mechanism of LabourWasim Ak
Normal labor is also termed spontaneous labor, defined as the natural physiological process through which the fetus, placenta, and membranes are expelled from the uterus through the birth canal at term (37 to 42 weeks
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Introduction to AI for Nonprofits with Tapp Network
A Criminological Exploration of Cyber Prostitution within the South African Context: a Systematic Review
1. American Journal of Humanities and Social Sciences Research (AJHSSR) 2019
A J H S S R J o u r n a l P a g e | 136
American Journal of Humanities and Social Sciences Research (AJHSSR)
e-ISSN :2378-703X
Volume-3, Issue-1, pp-136-145
www.ajhssr.com
Research Paper Open Access
ACriminological Exploration of Cyber Prostitution within the South
African Context: a Systematic Review
1
Siyanda Dlamini, 2
Ndumiso P. Nzama
1
Senior Lecturer, Criminology Department, College of Social Sciences and Humanities. University of Fort
Hare, South Africa.
2
M.A candidate, School of Applied Human Sciences, Criminology & Forensic Studies Discipline, University of
KwaZulu-Natal
ABSTRACT: This paper reports a systematic review of the studies related to cyber prostitution within the
South African (SA) context. Qualitative studies published in peer reviewed journals from 2006 to 2016 were
reviewed in order to determine the extent and nature of cyber prostitution within the SA context, impact of cyber
prostitution and the measures put in place to combat or deal with cyber prostitution within the South African
context. The review revealed that (1) majority of research and interventions tend to focus on street-based
prostitution (2) studies on the extent and nature of cyber prostitution within the SAcontext are underrepresented
in the research field (3) the negative impacts of cyber prostitution are not clearly determined by existing
literature(4) cyber prostitution has become a preferred method of prostitution in modern society for varied
motives. Recommendations for further research on cyber prostitution within the SAcontext are also provided.
KEYWORDS: cyberspace, cybercrime, crime cyber prostitution, online prostitution, prostitutes, prostitution.
I. INTRODUCTION
Modern Information and Communication Technologies (ICTs) have opened a new arena for varies
prospect.Amongst other things ICTs have facilitated the prevalence of cyber prostitution in most countries and
South Africa is no exception.According to Ari-Veikko (2006) “South Africa has the largest number of internet
users within the continent”. During 2000-2004 period South Africa had the highest number of internet users
within the continent and also the internet use growth increased by 46.8 % during the same period (Ari-Veikko,
2006). During year 2000 there were 2,400,000 internet users and in year 2004 the numbers increased to
3,523,000 (Ike Udogu – 2012). However the prevalence of cyber prostitution is under represented in the South
African Police Services (SAPS) and the Criminal Justice System (CJS). Available information report largely on
the cases of sexual offences identified by police officers and reported cases of sexual offences including charges
for street-based) prostitution but however these figures do not incorporate charges for cyber prostitution. Street-
based prostitution has mainly been the centre of interest by most government intervention and policies while
omitting the modern and wide-spreading model of prostitution conducted on cyberspace.
Cyberspace has become anarena of opportunities for most people across the globe. Current figures
indicate a raise in numbers of people who access and use the internet and prostitutes have also revolved to the
net to conduct their business but however, more research still needs to be conducted in order to have an in-depth
understanding of cyber-prostitution especiallywithin the SAcontext. This paper seeks to examine cyber
prostitution within the SA context in order to determine the extent and nature of cyber-prostitution within the
country. As part of the research objectives, this paper investigates the impact of cyber prostitution, examines the
factors which contribute to the prevalence of cyber prostitution and also look at the measures putted in place by
the SA government to eliminate or combat cyber prostitution.
CONCEPTUALIZATION
For the purpose of basic introduction to the topic and to provide the context in which concepts will be utilised,
an orientation to the keywordsof the study is necessary:
Cyberspace
Two decades ago, Featherstone and Burrows (1996:135) stated that we “might think of cyberspace as a utopian
vision for postmodern times”. Writers such as Stenger (1991) indicated that cyberspace exists but has no
location, while others have acknowledged that cyberspace is “truly the technology of miracles and dreams”
(Barrie, Sherman and Judkins, 1992:126-7 cited in Featherstone and Burrows, 1996:135). Smith and Kollock
2. American Journal of Humanities and Social Sciences Research (AJHSSR) 2019
A J H S S R J o u r n a l P a g e | 137
(1999:3) used the term “information superhighway” as a reference to modern computer technology and he
further stipulated that other metaphors such as global networks, cyberspace, the Net, internet, online and the
Web can be used interchangeably to define the modern computer mediated technologies. According to Smith
and Kollock, (1999:3) cyberspace “allows people to create range of new social spaces in which to meet and
interact with one another”. Amongst other things people can share information interact, search for information,
play games exchange ideas, communicate, conduct business, direct actions, create artistic media and transfer
funds through the use of cyberspace.
Crime
Crime relate to a deviance or antisocial behaviour which is against the law and societal norms. However current
studies and available literature indicate that the definition of crime may vary across certain countries and
cultures. In many countries “an appropriate definition of crime remains one of the most critical unresolved
issues in criminal justice” (Henny and Lanier, 2001). Young (1999) cited in Reiner (2000:71) also revealed that
“in pluralistic, rapidly changing cultures that celebrate diversity and choice there is an increasing ambiguity
about what constitutes deviance”. Centuries ago crime was viewed as an evil behaviour, but the emergent of the
criminology schools of thought challenged this motion of viewing crime as “the product of meddlesome
demons, demonic possession or irrational thought” (Henny and Lanier, 2001). Instead the classicists viewed
crime as a “mere behaviour albeit outlawed by the state” while the positivists challenged the classicist
perspective and argued that crime is an “extreme case of abnormal behaviour, the product of defective bodies or
mind” (Henny and Lanier, 2001)
According to the Law commission of Canada (2005:8) “in the last half of the twentieth century, various
scholars noted that crime is not an objective phenomenon and that the way society is structured reflect how
certain behaviours are understood and responded as deviance than an indication of any inherent problem with
those individuals regarded as criminals. Law Commission of Canada further states that understanding the law is
useful in order to understand what constitute criminal behaviour but however it is vital to “consider the broader
social process that help [to] give meaning to crime and its control [because] there is much more to the question
than simply referring to what is written in the Law”.
Cyber-crime
Cybercrime can be understood as a crime that is committed through the use of modern technology such as
computer mediated technology networks. Types of cybercrime include but not limited to identity theft, hacking,
internet fraud, child pornography and cyber-prostitution to name a few. According to Yar (2005) cybercrime
refers not so much to a single, distinctive kind of criminal activity, but more to a diverse range of illegal and
illicit activities that share in common the unique electronic environment in which they take place”. Moreover
Wall (2007) stressed that “all too often claims about cybercrimes lack clarification as to what it is that is
particularly „cyber‟ about them”.
Cyber prostitution
Cyber prostitution can be defined in more ways than one. Chris (2006) consented that the cornucopia of
commercial sex websites often uses the term „escort‟ rather than prostitute. Therefore, the activities of an
"escort" do add up to prostitution in the event that they incorporate 'sexual administrations to someone else
consequently for payment (Chris, 2006). In general prostitution entitle payment for sex or sexual activities (for
example blow-job), likewise in cyberspace prostitution, clients pay prostitutes for sex or simulated sexual
behaviour. “The activities of an „escort‟ do now amount to prostitution if they include „sexual services to
another person in return for payment or a promise of payment”. Therefore, cyber prostitution can be deemed as
online prostitution performed for money or any other momentary gains and “one of the most popular
cybercrimes is the act of prostitution through the use of the internet”.
Cyber prostitution- involves illegal engagement into cybersex in exchange for money, favours or any
other gains. Flowers (1998) revealed that prostitution is an act of “sexual relations between a prostitute and a
paying customer. In addition, Flowers (1998) acknowledged that in modern society the lines of what constitute
prostitution are sometimes blurred and “it is not always black and white in real life as the dictionary suggests”.
This paper will adapt Flowers (1998) definition of prostitution provided above. Cyber prostitution stands to be
defined in more ways than one to a variation of extents cyber prostitution can be said to be the action of doing
sexual facades using modern mediated technologies such as using the web cam, video screening or live two way
channelling.
II. PROBLEM STATEMENT
Current figures indicates an increase in numbers of prostitutes who access and use the internet for prostitution
but however there has not yet been a series of research being conducted to examine the extent, nature and the
impacts of cyber prostitution especially within the SA context. Gaining insights on the extent, nature and
impacts of cyber prostitution in modern SAsociety and itscomplex, digital environment study would be useful
3. American Journal of Humanities and Social Sciences Research (AJHSSR) 2019
A J H S S R J o u r n a l P a g e | 138
for government, public policy makers and other relevant stakeholders (such as the Criminal Justice System)
seeking to address and combat cyber prostitution communities.
RATIONALE
The prevalence of cybercrime is not well documented within the South African context. Current statistics have
mainly revealed figures of street-basedprostitution with littleto no reference to the modern type of prostitution
spiralling in cyberspace. Available literature has not yet reveals the extent and nature of cyber-prostitution
within the SA context. In order to develop effective policies and laws that attempt to eradicate cyber-prostitution
it is vital to understand the extent and nature of cyber-prostitution within the country. Contemporary there is a
growth in the number of escort sites and a rise in the number of commercial pages on prostitution, dating and
networking sites. Cyberspaces have opened up new streams for sexual predation and encouraged the
systematically organized sexual exploitation of certain vulnerable groups therefore its vital to conduct a
criminological exploration of cyber prostitution especially within the South African context.
From the above discussion, the study intends to examine the extent and nature of cyber prostitution within the
South African context.The study consists of four research objectives and research questions of which the study
intends to answer. Considering the insufficiency of information pertaining the extent and nature of cyber-
prostitution it should become clear that there is a need for a research study which will bring about understanding
of the extent and nature of cyber-prostitution, especially within the South African context.
According to White, (2008) objectives “identify the outcomes that are desired and point to the kind of questions
that would need to be asked in order to achieve these outcomes”. The objectives of this paper are to explore the
extent, nature and the impact of cyber prostitution within SA context and also determine the implemented
measures by the SA government as an attempt to eliminate or combat cyber prostitution.
UNDERLYING ASSUMPTIONS
An increasing number of individuals within the South African context engage in cyber prostitution for myriad
reasons. Social structural and financial factors also contribute to the prevalence of cyber-prostitution in the
country. Prostitutes migrate to cyber prostitution due to the risk, victimization and public exposure associated
with street based prostitution. Other individuals prefer cyber prostitutions due to its convenience and level of
safety in contrast to the former street base prostitution.
The level of cyber-prostitution is on the raise in modern society as a result of the technological era. In South
Africa and other parts of the world prostitution is criminalized. The study will bring about the understanding of
the level of cyber prostitution within South Africa and its impacts.It will enlighten relevant stakeholders within
criminology and the criminal justice systemabout the impact, factors, extent and natureof the parties involved in
cyber prostitution.It will also reveal how society perceives cyber prostitution and the preventative measures put
in place by the South African government to deal with cyber prostitution and whether or not cyber prostitution
has yet been criminalized in South Africa.
III. LITERATURE REVIEW
This section of the paper discusses the literature reviewed in the field of study in order to establish the gap and
what other authors have said or wrote about cyber prostitution. A literature review was conducted with
particular focus to the themes of the study. This literature review will cover the following themes: cyber
prostitution, street prostitution, prostitution and pornography online international and local measures and the
advantages of cyber prostitution.
Due to limited literature on cyber prostitution it is evidence that online-prostitution' and the effect of
the cyberspace on sex work and the criminal law has been under-examined. “Most research focuses exclusively
on street prostitution and female workers, with much less attention devoted to [cyber prostitution and] indoor
prostitution, male and transgender workers, customers and managers” (Weitzer, 2005). Client engage into cyber
prostitution or into prostitution in general for wild variety of motives, scholars such as McKeganey and Barnard
(1996) cited in Ashford (2008) identified some aspects that motivated clients to engage into paid Sex”, they
stressed that these aspect includes the ability to indicate specific acts that clients wished to perform, or have
performed on them, the ability to have intercourse with a scope of various ladies or prostitutes, the capacity to
search out prostitutes with particular physical qualities or showing specific pictures, the rush of accomplishing
something that was socially disliked and the constrained and unemotional nature of the contact with the
prostitutes (Ashford, 2008).
Cyber prostitution
According to Lane (2001) cyber prostitution and pornography is said to be a trending activity in our day and
age. With particular focus on online pornography Lane (2001) indicated that “Ashe and other online
pornographers [including cyber prostitutes] are the newest participants in an industry that over the last quarter-
century has grown from approximately $2 billion in a total revenue to at least $10 billion”. This indicates that
4. American Journal of Humanities and Social Sciences Research (AJHSSR) 2019
A J H S S R J o u r n a l P a g e | 139
the online prostitution and pornography industry generate large sums of money. That being said it is not
surprising to state that as much as the cyberspace has taken into account and made significant changes in the
business and e-vote based system. To support this notion Ashford (2008) revealed that just as e-commerce has
allowed for the transformation of business and e-democracy has begun to change government and the
democratic process, so too has technology impacted upon sexuality and commercial sexual transactions making
„traditional vices‟ ever more accessible to the general public.Recent reports indicate that cyber prostitution (or
cyber-sex) is becoming a large cooperation big business Holt et al (2015).
Kendall (2009) “finds that [sex] workers who solicit online largely represented growth in the overall
prostitution market, as opposed to simple displacement of the off‐ line, street‐ focused market”. In addition
“most sex workers who solicit online engage in lower risk behaviors than traditional street-based [sex] workers”
(Kendall, 2009). Traditional street-based prostitution is said to be riskier when compared cyber prostitution.
Risk associated with street-based sex work includes but not limited to the danger of brutality from clients,
pimps, police, drug dealer and the general public which might not be the case for prostitutions who operate on
cyberspace. Kendall (2009) stated that prostitutes “experience intimidation and harassment from the
communities where they work and sometimes live. Current studies and “empirical findings demonstrate the high
likelihood of street workers experiencing violence from other working women, predatory men involved in
prostitution, the general public (Benson, 1998) and severe physical harm from boyfriends/pimps” (May et al.,
2000,p. 18) cited in (Kendall, 2009).
Prostitution and Pornography (Online)
Cyberspace provide a wild variety of social content ranging from online pornography which includes video,
audio, text, photos and images of porn-stars. However, a distinction must be made between cyber-prostitution
and cyber-pornography. Thus cyber prostitution entitles payment for sex on cyberspace on the other hand
Akdeniz (1997) argued that there is no static definition of cyber pornography, due to social, moral and
legitimate varieties all around the globe it makes it hard to characterize pornographic content' in a path adequate
to all. What is considered essentially sexually unequivocal however not foul in one nation may well be revolting
in numerous different nations; then again what is viewed as legal yet not explicit may well be disgusting under
the present enactment in a few nations. However cyber pornography is said to comprise online sexually explicit
content which comes in various formats such as images and video files which reveal naked people and sexual
content in order to stimulate sexual excitement.
Pornography in cyberspace is said to be flourishing, for example, Black et al (2012) reported that the
use of online pornography has increased over the past decade. Furthermore “the effects of internet pornography
uses are widespread and are both negative (e.g., relationship and interpersonal distress) and positive (e.g.,
increases in sexual knowledge and attitudes toward sex)” (Black et al, 2012).
Street and Cyber Prostitution
According to Van Zyl (2008) “possibly the safest form of prostitution is cyber-sex which is sometimes even
committed at work”. Much scholastic composition appears to liken prostitution with road prostitution whereas it
is alleged that prostitutes in some parts of the globe have restrain from street prostitution and as a substitute they
have chosen to engage in different forms of prostitution such as cyber prostitution. Weitzer, 2005 highlighted
that “in the United States, Britain, The Netherlands, and many other countries, however, only a minority of
prostitutes work on the streets”. There are multiple online sites and forums that support sex work and due to the
risk associated with street prostitution, cyber prostitution on the other hand is deemed as effective and safe.
According to Weitzer (2005) “victimization and exploitation are highest among street prostitutes and among
those who have been trafficked into prostitution”. On the other hand, “other workers [such as cyber prostitutes]
are much less vulnerable to violence, exercise more control over their work, and derive at least some
psychological or physical rewards from what they do” (Weitzer, 2005).
Furthermore, “street prostitutes occupy the lowest stratum and receive the strongest dose of stigma;
upscale workers are somewhat less reviled (Weitzae, 2005). Ashford (2008)revealed that the growth of the
Internet and, in particular, online forums built around „commercial sex scene‟ sites often allow clients to seek
out a prostitute to perform a specific sexual act” which is much more convenience for both the client and
prostitute rather than standing on the street waiting forclients or looking around the streets for prostitutes.
Cyberspace enables both clients and prostitutes to exchange information through the use of the intranet. “This
exchange allowed the potential client to explore his sexual desire without a revelation of his identity or a
physical encounter taking place thus reducing any possible rejection of his request”. Kendall (2009) found
that “workers who solicit online largely represent growth in the overall prostitution market, as opposed to simple
displacement of the off‐ line, street‐ focused market”. In some cases cyber prostitutes engage physically with
theirclients to have sexual encounter when the dealhas been done on cyber space. However Van Zyl (2008)
revealed that cyber prostitution “sites are created to promote commercial sexual activities although they do not
physically take place
5. American Journal of Humanities and Social Sciences Research (AJHSSR) 2019
A J H S S R J o u r n a l P a g e | 140
IV. INTERNATIONAL DEVELOPMENTS
“In January 2006 the United Kingdom (UK) government published a „prostitution strategy‟ that set out four core
aims” (Chris, 2006). Chris (2008) stated that the strategy aims to produce better enforcement of laws against
kerb-crawling and seeks to create more opportunities for women to leave prostitution. However Chris (2006)
has criticized this strategy and states that “the approach of the UK government focuses on 'street sex', yet in the
cyber age we have seen a growth in the number of escort sites and a rise in the number of commercial pages on
dating and networking sites”. In addition, it seems, by all accounts, to be that the UK government urges law
authorization offices to target restricted assets on street prostitution whilst prostitution bolstered by the internet
is by all accounts flourishing (Chris, 2006). Ashfords (2008) argued that “It is striking that within the 75 pages
of the [UK government] report there is no focus upon the role of cyberspace within modern prostitution”. Most
interventions directed to prostitution also focus on female as prostitutes whilst omitting male prostitution.
Moreover “radical feminism sees prostitution as the quintessential form of male domination over women”
(Weitzer, 2005). “This narrow focus is surprising in the context of a rise in the number of websites dedicated to
varying forms of prostitution” (Ashford, 2008).
In an attempt to deal with sex offenses on cyberspaces and offline with precise focus on violent crimes
against children, the “Innocent Images program investigated child exploitation and pornography cases online,
while the [Crimes Against Children] CAC program handled cases of child prostitution, abduction and sex
tourism” (Holt et al, 2015 ). On the same vein Holt et al (2015) identified that International Centre for Missing
and Exploited Children (ICMEC) “has national operational centers in Belgium, Greece, Romania, South Africa,
US and also has regional offices in Singapore and Latin America”. Amongst other things, the ICMEC is said to
be responsible for investigating child exploitation cases, especially the sexually and cyber related cases.
SOUTH AFRICAN DEVELOPMENTS
The expansion of Africa‟s online population is underrepresented. A number of studies have reviewed and
examined the evolution, trend and use of Internet Communication Technologies (ICT) for criminal activities in
Africa (Ayoku, 2005; Longe et al., 2008; Longe & Chiemeke, 2007, Smith et al., 1999; Ribadu, 2005, Adomi &
Igun, 2007, Sylvester, 2001). Current literature reporting on local SA measures to deal with cyber prostitution
isscarce to none. In most cases, the South African government in collaboration with relevant stakeholders has
targeted specifically street prostitution. In South Africa police have arrested countless prostitutes on the street
and authors have written on the measures put in place in attempts to eradicate prostitution on the street.The
SAPS introduced the South African Crime Stop program which was launched in 1992 in an attempt to combat
crime in SA. While sex work is currently a criminal offence in South Africa, providing sufficient evidence that a
"sex for reward" transaction had taken place, is very difficult” (South African Law Reform Commission, 2009;
Richter, 2008 cited in Richter and Massawe, 2010).
Furthermore, “recent amendments to the Sexual Offences Act make it an express crime to buy sex. As
such, the police could prosecute sex workers clients, but the same problem arises with providing sufficient
evidence (Richter and Massawe, 2010). On the same vein the films and publication act 65 of 1996 intends to
regulate sexual context on published material, Van Zyl revealedthat (2008) “if a person exhibit himself or
herself by means of photographs or webcam or video clips on the Internet via email or a chat room it constitutes
an offence within section 19”. On the other hand, however, “where these sites are privately available and these
prostitutes do not lure the public into their webs, one could argue that these actions take place privately and that
the law has no interest therein”. Van Zyl (2008) further stated that no indication exist as to where these indecent
actions [cyber prostitution] must take place for it to constitute an offence, one can argue that online-sex,
webcam sex and telephone sex for reward are all criminal offences.
[However] it is difficult to determine whether or not an open and democratic society would condemn
prostitution as such but will tolerate online sexual activities for reward. Socially most indecent and
illicit sexual activities are condemned and promoters thereof are usually outcastes of the community.
Furthermore, since these prostitutes have no physical contact with the customers, can it still be seen as
prostitution or a mere form of business? If this online prostitution cannot be regarded as actual
prostitution wouldn‟t these actions be protected under the sections 16(c); 18 and 22 of the Constitution?
(VanZyl, 2008)
Therefore any type of accessibility of pictures or movies or alike on the Internet and mobile smart phones can be
viewed as a publication. In the event that these distributions contain material that would sensibly have made it
be XX or X18 appraised, such a production would constitute a criminal offense.
V. RESEARCH METHOD
Research Paradigm
According to Christensen et al (2013) a research paradigm is a world view or perspectives held by a community
of researchers that is based on the set of shared assumptions, concepts, values and practices. This paper used
qualitative research methods. Qualitative research approach can be applied to better understand any phenomena
6. American Journal of Humanities and Social Sciences Research (AJHSSR) 2019
A J H S S R J o u r n a l P a g e | 141
which little is yet known about (Strauss and Corbin, 1990). Qualitative research reports are typically rich with
detail and insights into participants experience or world view. Qualitative research paradigm will help to better
understand the extent and nature of cyber prostitution within the South African context and to generate thick
descriptions of the subjects experience‟s and world view. “Qualitative research generates narrative data-that is,
data described in words instead of numbers.
According to Babbie (2001) „sampling is the process of selecting observations‟. Observations for the study
were the secondary sources of information. Published data in relation to the research topic was examined in
order to determine the extent and nature of cyber prostitution in South Africa. According to Vartanian (2010)
“secondary data can include any data that are examined to answer a research question other than the question(s)
for which the data were initially collected”. Furthermore, “qualitative data can include data retrieved second
hand from interviews, ethnographic accounts, documents, photographs or conversations” (Emma, 2008).
Research design
Research design refers to the researchers overall plan or blue print of how the research is to be conducted
(Barbie& Mouton, 2001). The research design selected for this study is descriptive design. According to
Monsen and Van Horn (2007) “descriptive research is an effective way to obtain information used in devising
hypotheses and proposing association”. In addition Monsen and Van Horn (2007) revealed that important
examples of descriptive investigation are descriptive epidemiologic research and qualitative research studies. In
this regard, the descriptive design is used in qualitative research study.
Data Resources
Data collection is the process of gathering information that will help to answer themain research question(s) and
achieve research objective(s).The data was searched through the google scholar and University of KwaZulu-
Natal library electronic resources database search engine, books, government gazette, published statistics
documents and published journal articles . Search through internet database search engines retrieve data from
multiple data sources such as Santa Clara University - School of Law, Taylor and Francis online, ebscohost,
sage journals and Journal of Criminal Law to name a few. Information was also obtained through general
communication education, social sciences, criminology and psychology database. Technical reports, scholarly
journals, literature reviewed articles and reference books were all used as a sources of information. The key
words used to search for relevant information that will help in answering the research questions of the study
were: cyber prostitution, cyber prostitution in South Africa, cybersex/online sex, online prostitution,
prostitutes/prostitutes online, impact of cyber prostitution, extent and nature of cyber prostitution in South
Africa, South Africa and measures to deal with cyber prostitution.
Inclusion and Exclusion Criteria
The inclusion criteria for this study was as follows: (a) a study had to report significant factor(s) associated with
cyber prostitution within the South African context, which means qualitative research articles were included in
the review; (b) the study reported on the extent and nature of cyber prostitution within the SA context (c) the
study outline the impact of cyber prostitution and the measures put in place by the SA government (d) the
articles were published in English; (e) the articles have been peer reviewed; (f) full text can be accessed (f) they
were published between 2006 to 2016; (g) participants were cyber prostitutes, excluding the prostitutes from
non-cyber space (h) studies were conducted in South Africa.
Studies were excluded from the review if (a) they were quantitative in nature; (b) were not peer-reviewed (c)
had low levels of evidence; (d) researched participants included non-cyber prostitutes (e) did not report on the
impact, extent and nature of cyber prostitution within SA (f) were written in non-English language; and (g)
unpublished studies. The inclusion and exclusion criteria were chosen to narrow down the focus of the review.
After relevant articles were identified, each article was further examined and checked on the reference list in
order to determine additional relevant articles to include in the study review.
THEORETICAL FRAMEWORK
Various theoretical frameworks may be utilized to understand cyber prostitution within the South Africa
context. This paper utilized two theoretical framework namely: feminist theory and ecosystems theory. The
feminist theoretical framework was utilized to understand the nature of gender inequality in relation to cyber
prostitution. Socialist feminism, in particular, guided the study. According to Monsen and Van Horn(2007)
socialist feminism provides a synthesis of radical and Marxist feminist perspectives with recognition that both
capitalist and patriarchal systems play a part in the subordination of women.
On the other hand, Meyer (1983) revealed that ecosystems perspective allow us to understand any social
problem and human behavior within the social context. From the ecosystems perspective behavior needs to be
understood as a function of families, groups, organizations and communities which exist at micro, messo and
macro levels. This theoretical framework was used to assess interaction among the different levels of the eco-
7. American Journal of Humanities and Social Sciences Research (AJHSSR) 2019
A J H S S R J o u r n a l P a g e | 142
system to better understand cyber prostitutes‟ behavior within the South African context and to understand
factors that contribute to such practices. In addition, the theoretical framework assisted in understanding how
social networks contribute to cyber prostitution. Social networks are “a set of relational linkages and
communication pathways that influence the behavior of members” (Germain, 1981 cited in Greene, 2011).
VI. DATA ANALYSIS AND DISCUSSION
A data analysis refers to the categorizing, ordering, manipulating and summarizing of data to obtain answers to
the research question(s) (De Vos, 2005). Thus, the study analyzed secondary data and according to McArt and
McDougal (1985) ”when data resources are available, secondary analysis represents a potentially efficient and
cost effective method of research for both students and more advanced investigators”. Therefore, secondary data
analysis can be understood as a process of “re-analysis of data for the purpose of answering the original research
question(s) with better statistical techniques, or answering new questions with old data” (McArt and McDougal,
1985). Secondary data analysis entitles analysis of research collected by other researchers with an intention to
answer new research questions. Secondary data also has its own pros and cons, amongst the negative aspect of
secondary data, McCaston (2005) revealed that secondary data assists in understand a particular group, “but
compared to primary data they are imperfect reflections of reality. Without proper interpretation and analysis
they do not help us understand why something is happening”. Therefore it is vital to proper interpret and analyze
secondary data in order to aid in understanding a particular phenomenon.
To ensure proper interpretation and analysis of the data, the researcher has familiarizethemselves with
the information from the secondary sources in order to better understand the data and to know which
interpretations go with the data and which interpretation to assign to it. Themes were induced and data was
coded by marking relevant themes or instances. Coding gavea fresh view of the data and allowed for
comparison of sections that appeared to belong together. Elaboration was done in order to capture the finer
nuances of meaning which may have not beencaptured by the original coding system. The data was interpreted
and checked in order to identify if there wasany new information emerging, to improve the overall data quality
and reduce the possibilities of researcher bias. The following section presents the findings of the study.
FINDINGS
Findings of the study will be discussed in relation to the research objectives and the themes that emerge in the
data. Figure 1 presents how the themes are linked to each other as they will be discussed below:
Figure: 1 (Theme diagram)
The study was aimed at obtaining an understanding of the impact of cyber prostitution and the
measures put in place to deal with cyber prostitution within the SA context. In addition, the study explored the
extent and the nature of cyber prostitution within SA and gains an understanding of the factors that contribute to
cyber prostitution and how these can be eliminated. The purpose of this chapter is to present the key findings of
the study in relation to the research questions.
Implemented Measures in SA
National Cyber-security Policy
Framework
Computer Security Incident Response
team (CSIRT)
Computer Security Emergency
Response team CSERT)
Impact of cyber prostitution
Lower risks
Less direct victimization
More control
Maximized profit
Less public exposure
Cyber prostitution
Extent and nature of cyber prostitution in SA
Increasing repeatedly
Higher levels in major cities
Generate more profit
Less monitored by police
8. American Journal of Humanities and Social Sciences Research (AJHSSR) 2019
A J H S S R J o u r n a l P a g e | 143
Impacts of Cyber Prostitution
In relation to the first aim of the study, which was to understand the impact of cyber prostitution, the following
was found. Cyber prostitute experience less victimization then street prostitutes. Cyber prostitutes are less
vulnerable to violence and they are able to exercise more control over their work when compared to street based
prostitutes. There are therefore less likely to experience psychological or physical victimization due to their
work. The impact of cyber prostitution on prostitutes may vary, for example, some cyber prostitutes are
victimized by their client when they have physical encounter but this is not always the cases since some cyber
prostitutes do not engage physically with their clients and everything is done on cyber space.Kendall (2009)
most workers who solicit online engage in safer sex practices, and on average, see substantially fewer clients
than found in the literature on streetwalking prostitutes. This study found thatcyber prostitutes differ
substantially from their street-based counterparts in terms of sexual risk behaviors with their clients and they
have a lower risk of being arrested or prosecute by the police and CJS. Jones (2015) noted that “sex workers use
the internet to maximize profits and reduce risk exposure”. The use of cyberspace by prostitutes to conduct their
businessdecreases the chances of victimasation by the police, pimps and clients. Through the use of cyberspace
prostitutes are able to eliminate public exposure and maximize their profits.
Extent and Nature of Cyber Prostitution
With regards to the extent and nature of cyber prostitution, this study found that the number of sex workers who
work independently through Internet chat-rooms and other online endeavours has increasedconstantly. The
Find a Prostitutes, South African Hookers website revealed that there are 6,034 cyber prostitutes in the Eastern
Cape, 24,231 in the Gauteng region, 15,321 in KwaZulu-Natal, 1,917 in Limpopo, 3,568 in Mpumalanga, 3,477
in North-West, 637 in the Northern Cape, 5,488 in the Orange Free State and about 10,341 cyber prostitutes in
the Western Cape (http://www.find-prostitutes.com/za/). This clearly indicates an increase in number of
prostitutes who solicit sex online. Gauteng region has a higher number of cyber prostitutes followed by
KwaZulu-Natal and on the other hand the Northern Cape region has the smallest number of prostitutes who
solicit sex online.
The use of internet for varies motive is on the raise in SA and amongst other things prostitutes and their
clients use modern technologies to engage, communicate and share information on cyberspace. “South Africa
like many other countries has become dependent on the Internet to govern, to conduct business and for other
social purposes. The Internet has become indispensable to many South Africans and will continue to be, as more
people access the information highway”. As more people access the internet prostitutes use such platforms
(internet) to solicit sex online which is clearly indicated by the high figures on cyber prostitution. Accessibility
of sexual activities in cyberspace is not only limited to adult but children are increasingly exposed to these
components through internet searching, online chats and while playing internet games.
Figure: 2 (level of cyber prostitution in each province)
9. American Journal of Humanities and Social Sciences Research (AJHSSR) 2019
A J H S S R J o u r n a l P a g e | 144
Websites such aswww.offersupply.co.za/com, www.cougarcheaters.com/co.za and
www.fuckfreebuddydaing.co.za, to name a few, facilitates cyber prostitution within the South African context.
These website provide a platform for both prostitutes and clients to engage in sexual activities online and to also
to meet physically for sexual intercourse. To attract potential clients statements such asLinda (46) is looking for
a sexual encounter, are you interested?, Cindy (23) wants to share her nude private pictures with you and, do not
pay for a South Africa hooker when you can get laid by swingers that want to have sex, create a free account on
our adult swingers site and meet them in just minutes (cited in http://www.find-prostitutes.com/za/). In addition
a list of active nude prostitute‟s pictures and contact details are usually shown on these website in order for
clients to choose the type of prostitute they desire to engage in sexual activities with. Some websites and the
content on these websites can only be accessed by registered users only. This requires the client to first reveal
his or her personal details and subscribe in order to register and have access to these websites.
Implemented measures
In South Africa prostitution is illegalized whether it is done online or offline but however little has been done to
deal with cyber prostitution. With regards to measures implemented to deal with cyber prostitution within the
South African context, this study found that the South African government‟s State Security Agency has
implemented the National Cyber-security Policy Framework in order to address the prevalence of cybercrimes.
Amongst other things this policy framework intends to “create a secure, dependable, reliable and trustworthy
cyber environment that facilitates the protection of critical information infrastructure whilst strengthening
shared human values and understanding of Cybersecurity in support of national security imperatives and the
economy”. Cyberspace comes with new types of challenges to the governmentand it therefore introduces a
further dimension to the national security. From Selebi‟s point of view“it rather seems that the legislator finds it
too difficult to combat prostitution and online prostitution but legalising it seems to be the easier option to
dispose of this ever growing problem” (cited in Van Zyl, 2008)
VII. CONCLUSION AND RECOMMENDATIONS
The level of cyber prostitution is on the raise in SA. Cyber prostitutes are less vulnerable to violence and they
are able to exercise more control over their work when compared to street based prostitutes. There are less likely
to experience psychological or physical victimization due to their work since they operate in virtual space.
Available information indicates an increase in number of prostitutes who solicit sex online. Gauteng region has
a higher number of cyber prostitutes followed by KwaZulu-Natal. On the other hand the Northern Cape region
has the smallest number of prostitutes who solicit sex online. The use of internet for varies motive is on the raise
in SA and amongst other things prostitutes and their clients use modern technologies to engage, communicate
and share information on cyberspace. Along withother attempt, the South African government‟s State Security
Agency has implemented the National Cyber-security Policy Framework in order to address the prevalence of
cybercrimes.
It is suggested that further research in the field of study or area of enquiry still needs to be conducted in order to
gain in-depth understanding of cyber prostitution in SA. The following are the recommendations regarding
research on cyber prostitution in SA:
More primary research should be done in order to understand the existence and prevalence of cyber
prostitution in SA.
The South African government and relevant stakeholders should implement effective measures that
will address the existence of cyber prostitution within the country.
There is a need for new policies that will effectively address cybercrime in general and cyber
prostitution in particular
REFERENCES
[1]. Akdeniz, Y. (1997). Governance of pornography and child pornography on the global Internet: a multi-
layered approach. Law and the Internet: regulating Cyberspace, 223-241.
[2]. Anttiroiko, Ari-Veikko, 2006. Encyclopedia of Digital Government. Idea Group Inc: London.
[3]. Cunningham, S., & Kendall, T. D. (2011). Prostitution 2.0: The changing face of sex work. Journal of
Urban Economics, 69(3), 273-287.
[4]. E. Ike Udogu, 2012. The Developing World: Critical Issues in Politics and Society. Scarecrow Press:
UK
[5]. Elaine R. Monsen, Linda Van Horn, 2007. Research: Successful Approaches. American Dietetic
Association: USA.
[6]. http://www.find-prostitutes.com/za/.
[7]. Internet pornography use research: Methodology and content from the past 10 years. Cyberpsychology,
Behavior, and Social Networking, 15(1), 13-23.
[8]. Jones, A. (2015). Sex Work in a Digital Era. Sociology Compass, 9(7), 558-570.
10. American Journal of Humanities and Social Sciences Research (AJHSSR) 2019
A J H S S R J o u r n a l P a g e | 145
[9]. Lane, F. S. (2001). Obscene profits: entrepreneurs of pornography in the cyber age. Routledge. Law
Commission of Canada, 2005. What Is a Crime?: Defining Criminal Conduct in Contemporary Society.
UBC Press: Canada.
[10]. Marc A. Smith, Peter Kollock, 1999. Communities in Cyberspace. Routledge: London.
[11]. McArt, E. W., & McDougal, L. W. (1985). Secondary data analysis–a new approach to nursing
research. Image: The Journal of Nursing Scholarship, 17(2), 54-57.
[12]. McCaston, M. K. (2005). Tips for collecting, reviewing, and analyzing secondary data. Partnership and
household livelihood security unit. CARE.[Online document]. Retrieved Available from http://pqdl.
care. org/Practice/DME.
[13]. Mike Featherstone, Roger Burrows, 1996. Cyberspace/Cyberbodies/Cyberpunk: Cultures of
Technological Embodiment. SAGE: Britain.
[14]. Patrick White 2008 Developing Research Questions: A Guide for Social Scientists. Palgrave
Macmillan: UK
[15]. Richter, M., & Massawe, D. (2010). Did South Africa's soccer bonanza bring relief to sex workers in
South Africa? The 2010 FIFA World Cup and the impact on sex work. Agenda, 24(85), 21-30.
[16]. Robert Reiner, 2000. Crime and Control in Britain. Cambridge: UK
[17]. Short, M. B., Black, L., Smith, A. H., Wetterneck, C. T., & Wells, D. E. (2012). A review of
[18]. Thomas J Holt, Adam M Bossler, Kathryn C Seigfried-Spellar, 2015. Cybercrime and Digital
Forensics. Routledge: USA.
[19]. Thomas P. Vartanian, 2010. Secondary Data Analysis. Oxford University Press: New York.
[20]. Wall, D. (2007). Cybercrime: The transformation of crime in the information age (Vol. 4).
[21]. Weitzer, R. (2005). New directions in research on prostitution. Crime, Law and Social Change, 43(4-
5), 211-235.
[22]. Yar, M. (2005). The novelty of „cybercrime‟an assessment in light of routine activity theory. European
Journal of Criminology, 2(4), 407-427.