ABSTRACT: In the past two decades, third world countries such as South Africa have made steadily developments towards combating hacking as a form of Cybercrime. The developments made by the South African Criminal Justice towards the prevention of hacking have been mildly progressive. The Council of Europe Convention on Cybercrime is the treaty that all South African legislation and policy with regard to hacking is required to be in line with this convention. This treaty has also been the cornerstone to first world countries such as the United States, when preventing cybercrime such as hacking. In order for South Africans to have a safe and secure cyberspace that is free from hackers; there needs to be a co-operative system put in place by the South African Criminal Justice System that involves the government, non-profit organizations and the community. A Criminal Justice system that works closely with the community is able to properly guide its members and correctly prosecute the crime of hacking. Therefore, using qualitative secondary data this paper explores the existing measures put in place by the South African Criminal Justice to combat hacking. The findings of this paper indicate that conceptual understanding of this crime (hacking) can play a pivotal role in addressing the manifestation of this crime in a large extent as the nature and extent can be established, the use of technological means also contribute to hacking, this is also linked to individuals (victims) ignorance. For recommendations, the use of technology and conventional method in awareness can help in responding to the scale and consequence of hacking in South Africa.
This paper examined technologies being used in crime prevention and detection with a view to
identifying such technologies, legal issues and the challenges involved in the application of these technologies
and attempted to forge an acceptable legal framework for the use of technologies in crime prevention and
detection in Nigeria. Both primary and secondary sources of data were used. Primary sources include books,
journal, publications, dailies, conventions and a host others. Secondary sources include materials sourced from
the internet. The study revealed that though there are quite a good number of technologies for crime prevention
and detection, the major issues involved are the human right abuse and the challenges of training the staff who
are expected to apply these technologies among others. The study concluded that though there is need to
employ sophisticated technologies in view of the alarming rate of crime commission worldwide and particularly
in Nigeria , however, these technologies need to be reviewed to soften the hardship and human right abuses
which are found in the application of the technologies. This can be achieved by putting in place an acceptable
world standard and robust legal framework that would help in the mitigation of hardship and human abuses
that are embedded in the application of the technologies.
Supporting the global efforts in strengthening the safety, security and resilience of Cyberspace, the Commonwealth Cybersecurity Forum 2013, organised by the Commonwealth Telecommunications Organisation. The ceremonial opening examined how Cyberspace could be governed and utilised in a manner to foster freedom and entrepreneurship, while protecting individuals, property and the state, leading to socio-economic development. Speakers of this session, Mr Mario Maniewicz, Chief, Department of Infrastructure, Enabling Environment and E-Applications, ITU; Mr David Pollington, Director, International Security Relations, Microsoft; Mr Alexander Seger, Secretary, Cybercrime Convention Committee, Council of Europe; Mr Nigel Hickson, Vice President, Europe, ICANN and Mr Pierre Dandjinou, Vice President, Africa, ICANN, added their perspectives on various approaches to Cybergovernance, with general agreement on the role Cyberspace could play to facilitate development equitably and fairly across the world.
Hosted by the Ministry of Posts and Telecommunications of Cameroon together with the Telecommunications Regulatory Board of Cameroon and backed by partners and industry supporters including ICANN, Council of Europe, Microsoft, MTN Cameroon, AFRINIC and Internet Watch Foundation, the Commonwealth Cybersecurity Forum 2013 seeks to broaden stakeholder dialogue to facilitate practical action in Cybergovernance and Cybersecurity, some of which will be reflected in the CTO’s own work programmes under its Cybersecurity agenda.
1. The document discusses issues around internet governance and filtering, noting that while the internet is a critical global resource, there are currently no enforceable international laws governing access.
2. It outlines some principles of internet governance inspired by international law, and examines how different countries justify internet filtering to uphold community standards or ensure national security.
3. The document concludes that while states have independent control over internet access within their borders, there are no meaningful external legal checks and the UN currently takes no stance on internet governance internationally.
Final presentation cyber security submit copysmita mitra
The document discusses cyber security issues in New Zealand. It notes that cybercrime affects one in five New Zealanders and the most reported incidents in 2018 were phishing and credential harvesting. New Zealand's cyber security strategy focuses on improving cyber resilience, capability, addressing cybercrime, and international cooperation. The National Cyber Security Centre was established to improve security across sectors and provide guidance on threats. The strategy is based on principles of partnerships, enabling economic growth, upholding national security, and protecting human rights online.
- Cybercrime costs consumers an estimated $110 billion per year, with over 1.5 million victims per day experiencing financial losses averaging $197 per victim. Nearly half of all online adults globally have experienced cybercrime in the past year.
- In 2012, there were over 1.5 billion web attacks using 6.5 million unique domains hosted across 202 countries. High-profile cyber attacks have targeted governments, companies, and organizations around the world.
- The threat of cybercrime is expected to increase in the coming years through more advanced attacks, exploitation of mobile and cloud-based infrastructure, and the potential rise of cyber warfare. However, many challenges remain in establishing effective legal frameworks, skills, and international cooperation to address
The Internet has become closely associated with freedom of expression and the global economy. Today, it plays a direct or indirect role in almost every aspect of life. Yet many fear the Internet as we have come to know it is at risk, with restrictions forcing fragmentation along political, corporate, or cultural lines. Despite growing concerns about the future of the Internet, discussion surrounding online freedom remains largely mired in a handful of issues: the necessity and appropriateness of government surveillance in the United States, digital privacy in Europe, and censorship in authoritarian states such as China. However, between them, the United States, Europe, and China account for less than half of the world’s Internet users. For much of the rest of the world, any discussion of Internet freedom falls at the complex intersection of political and social liberties, nation-building, security threats, economic development, and resource constraints.
Asia’s biggest developing democracies - India, Indonesia, Bangladesh, the Philippines, and Thailand - account for a quarter of the world’s people, but only about one-tenth of the global online population. The policy decisions these states make going forward will be of considerable importance for the future of the Internet and offer some useful lessons about the limitations and vulnerabilities of the global Internet freedom agenda as it is currently being pursued by the United States and Europe.
From a survey of these countries’ experiences, six broad conclusions or principles can be drawn. First, the online world is an outgrowth of the offline world, rather than a distinct phenomenon. Internet policy cannot be considered in a vacuum, or divorced from other relevant aspects of public policy, such as security, economic policy, or governance. Second, laws, norms, and cultural attitudes related to Internet use vary widely, even among democracies. A one-size-fits-all approach to Internet freedom will not work and may even prove counterproductive. Third, online freedoms and greater security are not inherently at odds with one another in open societies. Discourse that presents a false choice between security and freedom is harmful for both, as well as for state legitimacy and economic growth.
Fourth, while much discussion of Internet freedom frames the issue as a conflict between governments, corporations, and civil society, each sector is divided on the merits of unfettered Internet freedom. Fifth, current legislation pertaining to the Internet in many democratic countries is deeply flawed, even in the context of their own constitutional rights pertaining to freedom of expression. By and large, Internet-related legislation is vague, making implementation arbitrary, and undermining public trust in state institutions. And sixth, users are often not adequately informed of the privileges and restrictions associated with Internet use in their native countries. Policies and initiat
Legal deficiency of cybercrime in nigeria need for urgent legal reform (cha...Gamaliel Olayiwola Fasuyi
This Study focuses on the legal framework prohibiting Cybercrimes in Nigeria. Cybercrime
involves using computers and internet by individuals to commit crime. The people across the globe are technologically transformed to the extent that life
depends on technology. The application of ICT covers every facet of human life and that has led
to the birth of unanticipated rates of crimes coming in a borderless form. The paper examines the
types of cybercrimes prevalent in Nigeria, international conventions approach and other
jurisdictional practices with a view to abreast the application of legal framework of cybercrimes
both in the Nigerian context and international community.
The findings of the paper are that the Nigerian legislations on the subject acknowledge
the existing challenges and are on the right track, but need to be strengthened to achieve the desired
purpose. It further observed that there is no unanimous definition of the concept in all jurisdictions
which add issue to the subject in terms of challenges. The study recommends that the recently signed Nigerian Cybercrimes (Prohibition & Prevention Act) 2015 should be actively enforced
with a view to bringing our legal framework on par with other jurisdictions as well as proffering
other reforms to enhance Cybersecurity in Nigeria.
This document discusses issues around encryption regulation. It notes developments in end-to-end encryption and storage encryption. It discusses views from FBI Director James Comey and UK Prime Minister David Cameron calling for access to encrypted communications. It reviews national policies on encryption in the US, India, China and Russia. The Council of Europe and UN Special Rapporteur support strong encryption for privacy and security. Key issues are comparing political economies today versus the 1990s which led to encryption liberalization, and determining appropriate forums for decision making given interests of industry, civil society, states and others.
This paper examined technologies being used in crime prevention and detection with a view to
identifying such technologies, legal issues and the challenges involved in the application of these technologies
and attempted to forge an acceptable legal framework for the use of technologies in crime prevention and
detection in Nigeria. Both primary and secondary sources of data were used. Primary sources include books,
journal, publications, dailies, conventions and a host others. Secondary sources include materials sourced from
the internet. The study revealed that though there are quite a good number of technologies for crime prevention
and detection, the major issues involved are the human right abuse and the challenges of training the staff who
are expected to apply these technologies among others. The study concluded that though there is need to
employ sophisticated technologies in view of the alarming rate of crime commission worldwide and particularly
in Nigeria , however, these technologies need to be reviewed to soften the hardship and human right abuses
which are found in the application of the technologies. This can be achieved by putting in place an acceptable
world standard and robust legal framework that would help in the mitigation of hardship and human abuses
that are embedded in the application of the technologies.
Supporting the global efforts in strengthening the safety, security and resilience of Cyberspace, the Commonwealth Cybersecurity Forum 2013, organised by the Commonwealth Telecommunications Organisation. The ceremonial opening examined how Cyberspace could be governed and utilised in a manner to foster freedom and entrepreneurship, while protecting individuals, property and the state, leading to socio-economic development. Speakers of this session, Mr Mario Maniewicz, Chief, Department of Infrastructure, Enabling Environment and E-Applications, ITU; Mr David Pollington, Director, International Security Relations, Microsoft; Mr Alexander Seger, Secretary, Cybercrime Convention Committee, Council of Europe; Mr Nigel Hickson, Vice President, Europe, ICANN and Mr Pierre Dandjinou, Vice President, Africa, ICANN, added their perspectives on various approaches to Cybergovernance, with general agreement on the role Cyberspace could play to facilitate development equitably and fairly across the world.
Hosted by the Ministry of Posts and Telecommunications of Cameroon together with the Telecommunications Regulatory Board of Cameroon and backed by partners and industry supporters including ICANN, Council of Europe, Microsoft, MTN Cameroon, AFRINIC and Internet Watch Foundation, the Commonwealth Cybersecurity Forum 2013 seeks to broaden stakeholder dialogue to facilitate practical action in Cybergovernance and Cybersecurity, some of which will be reflected in the CTO’s own work programmes under its Cybersecurity agenda.
1. The document discusses issues around internet governance and filtering, noting that while the internet is a critical global resource, there are currently no enforceable international laws governing access.
2. It outlines some principles of internet governance inspired by international law, and examines how different countries justify internet filtering to uphold community standards or ensure national security.
3. The document concludes that while states have independent control over internet access within their borders, there are no meaningful external legal checks and the UN currently takes no stance on internet governance internationally.
Final presentation cyber security submit copysmita mitra
The document discusses cyber security issues in New Zealand. It notes that cybercrime affects one in five New Zealanders and the most reported incidents in 2018 were phishing and credential harvesting. New Zealand's cyber security strategy focuses on improving cyber resilience, capability, addressing cybercrime, and international cooperation. The National Cyber Security Centre was established to improve security across sectors and provide guidance on threats. The strategy is based on principles of partnerships, enabling economic growth, upholding national security, and protecting human rights online.
- Cybercrime costs consumers an estimated $110 billion per year, with over 1.5 million victims per day experiencing financial losses averaging $197 per victim. Nearly half of all online adults globally have experienced cybercrime in the past year.
- In 2012, there were over 1.5 billion web attacks using 6.5 million unique domains hosted across 202 countries. High-profile cyber attacks have targeted governments, companies, and organizations around the world.
- The threat of cybercrime is expected to increase in the coming years through more advanced attacks, exploitation of mobile and cloud-based infrastructure, and the potential rise of cyber warfare. However, many challenges remain in establishing effective legal frameworks, skills, and international cooperation to address
The Internet has become closely associated with freedom of expression and the global economy. Today, it plays a direct or indirect role in almost every aspect of life. Yet many fear the Internet as we have come to know it is at risk, with restrictions forcing fragmentation along political, corporate, or cultural lines. Despite growing concerns about the future of the Internet, discussion surrounding online freedom remains largely mired in a handful of issues: the necessity and appropriateness of government surveillance in the United States, digital privacy in Europe, and censorship in authoritarian states such as China. However, between them, the United States, Europe, and China account for less than half of the world’s Internet users. For much of the rest of the world, any discussion of Internet freedom falls at the complex intersection of political and social liberties, nation-building, security threats, economic development, and resource constraints.
Asia’s biggest developing democracies - India, Indonesia, Bangladesh, the Philippines, and Thailand - account for a quarter of the world’s people, but only about one-tenth of the global online population. The policy decisions these states make going forward will be of considerable importance for the future of the Internet and offer some useful lessons about the limitations and vulnerabilities of the global Internet freedom agenda as it is currently being pursued by the United States and Europe.
From a survey of these countries’ experiences, six broad conclusions or principles can be drawn. First, the online world is an outgrowth of the offline world, rather than a distinct phenomenon. Internet policy cannot be considered in a vacuum, or divorced from other relevant aspects of public policy, such as security, economic policy, or governance. Second, laws, norms, and cultural attitudes related to Internet use vary widely, even among democracies. A one-size-fits-all approach to Internet freedom will not work and may even prove counterproductive. Third, online freedoms and greater security are not inherently at odds with one another in open societies. Discourse that presents a false choice between security and freedom is harmful for both, as well as for state legitimacy and economic growth.
Fourth, while much discussion of Internet freedom frames the issue as a conflict between governments, corporations, and civil society, each sector is divided on the merits of unfettered Internet freedom. Fifth, current legislation pertaining to the Internet in many democratic countries is deeply flawed, even in the context of their own constitutional rights pertaining to freedom of expression. By and large, Internet-related legislation is vague, making implementation arbitrary, and undermining public trust in state institutions. And sixth, users are often not adequately informed of the privileges and restrictions associated with Internet use in their native countries. Policies and initiat
Legal deficiency of cybercrime in nigeria need for urgent legal reform (cha...Gamaliel Olayiwola Fasuyi
This Study focuses on the legal framework prohibiting Cybercrimes in Nigeria. Cybercrime
involves using computers and internet by individuals to commit crime. The people across the globe are technologically transformed to the extent that life
depends on technology. The application of ICT covers every facet of human life and that has led
to the birth of unanticipated rates of crimes coming in a borderless form. The paper examines the
types of cybercrimes prevalent in Nigeria, international conventions approach and other
jurisdictional practices with a view to abreast the application of legal framework of cybercrimes
both in the Nigerian context and international community.
The findings of the paper are that the Nigerian legislations on the subject acknowledge
the existing challenges and are on the right track, but need to be strengthened to achieve the desired
purpose. It further observed that there is no unanimous definition of the concept in all jurisdictions
which add issue to the subject in terms of challenges. The study recommends that the recently signed Nigerian Cybercrimes (Prohibition & Prevention Act) 2015 should be actively enforced
with a view to bringing our legal framework on par with other jurisdictions as well as proffering
other reforms to enhance Cybersecurity in Nigeria.
This document discusses issues around encryption regulation. It notes developments in end-to-end encryption and storage encryption. It discusses views from FBI Director James Comey and UK Prime Minister David Cameron calling for access to encrypted communications. It reviews national policies on encryption in the US, India, China and Russia. The Council of Europe and UN Special Rapporteur support strong encryption for privacy and security. Key issues are comparing political economies today versus the 1990s which led to encryption liberalization, and determining appropriate forums for decision making given interests of industry, civil society, states and others.
Where next for the Regulation of Investigatory Powers Act?blogzilla
This document summarizes recommendations from reports by David Anderson QC, the Intelligence and Security Committee, and RUSI on reforming and consolidating complex UK legislation governing intelligence agencies and investigatory powers. It notes calls to replace existing laws with a new comprehensive bill that clearly defines agencies' powers and capabilities while strengthening oversight and legal safeguards. The government plans to introduce a draft Investigatory Powers Bill for scrutiny later in 2015.
This document summarizes a research paper about violations of cybercrime and jurisdiction in Indonesia. It discusses how technological advances have enabled new forms of digital crime. It describes several types of cybercrimes such as unauthorized access, spreading viruses, hacking, and cyberterrorism. It also discusses Indonesia's laws regarding electronic information and cybercrime. The document analyzes some challenges around jurisdiction for cybercrimes that cross borders. It examines how Indonesia applies legal jurisdiction and sanctions to cybercrime perpetrators based on the location of the crime and perpetrator. It aims to explain how Indonesia's legal system will handle cybercrime cases and reduce such violations.
Digital security law security of individual or governmentM S Siddiqui
The document discusses Bangladesh's proposed Digital Security Act 2018 and debates around balancing national security, personal security, and freedom of expression. It summarizes key sections of the proposed law that have raised human rights concerns, such as allowing searches and arrests without warrants. While cyber security aims to protect digital systems and data, the law may infringe on citizens' privacy and speech. There are calls to amend sections to ensure rights are not violated in the name of national security.
The Digital Security Act 2018 in Bangladesh aims to curb crimes committed digitally such as spreading fake news, slander, and inciting violence. However, critics argue it could undermine media freedom and freedom of expression that are protected by the country's constitution and laws. The act allows the government to monitor digital platforms and restrict content it deems harmful or offensive. International organizations have called for reforming the laws to prevent overreach and protect civil liberties.
This document provides an overview and analysis of the Digital Security Act 2018 in Bangladesh. It discusses the purpose of the act to address cybersecurity issues, the controversies around limitations to civil liberties, and an evaluation of the act's constitutionality and viability based on international guidelines. The document examines specific sections of the act that are controversial and violate constitutional rights. It provides recommendations to address these issues in both the short and long term through legislative amendments and capacity building.
The document discusses the Digital Security Act (DSA) of Bangladesh. It provides an overview of the intended role of the DSA to punish offenses related to illegal access of information and cybercrimes. However, it also analyzes troublesome parts of the DSA that could infringe freedom of expression and be open to abuse. These include provisions allowing blocking of online content and criminalization of speech that insults or hurts religious sentiments. The document concludes with recommendations to revise problematic sections of the DSA to align it with international human rights standards on freedom of expression.
This document summarizes a white paper on cyber crime within the South African government. It discusses the growing problem of identity theft and hacking within government systems. It outlines the Cool Frog Cyber Project, which was authorized to target and disrupt international crime syndicates hijacking identities to enable financial crimes. The project profiled 4 linked syndicates, analyzed threats, and achieved several arrests and convictions. It discusses investigative methods like searches, hardware key loggers, and working with partners like law enforcement. The document recommends improving security measures, vetting, and training to better address cyber crimes within government.
This document summarizes international laws and policies regarding privacy and mass surveillance in the post-Snowden era. It discusses obligations under international human rights law, calls by the UN General Assembly to review surveillance practices, and reports by the UN High Commissioner for Human Rights criticizing secret interpretations of law and lack of protections for individuals. The document also reviews data privacy regulations in Europe, debates around data localization, encryption technologies, and concludes that strengthening international law and information security is needed to curb mass surveillance by powerful states.
Keeping our secrets? Shaping Internet technologies for the public goodblogzilla
This document discusses challenges to privacy from technological development, market failures, and authorized access. It then discusses approaches to designing for privacy, including data minimization, user consent, and privacy by design. Finally, it examines shaping technologies for the public good through defining privacy as a public good, limiting government surveillance, new privacy regulations like GDPR, and encouraging competition.
The document discusses cyber security challenges for smart communities. It notes that cyber threats are becoming more sophisticated and pose risks to critical infrastructure. Establishing effective cooperation between public and private sectors is important for developing strategies to address cyber challenges in smart communities. As communities become more connected through information and communication technologies, demand for robust cyber security will continue to grow.
This document provides a summary of a dissertation defense presentation on the normalcy of crime as a requirement for intelligence analysis in Nigerian law enforcement agencies. The summary includes:
1) The dissertation examines how studying the normalcy of crime can help law enforcement agencies in gathering and managing intelligence information.
2) It analyzes challenges facing Nigerian law enforcement agencies and how understanding crime dynamics could aid intelligence assessments.
3) Several hypotheses are proposed regarding the relationships between criminal intelligence and law enforcement practices, internal security, and national security.
Cyber security and prevention in BangladeshRabita Rejwana
This document discusses cyber crime prevention and security in Bangladesh. It begins by defining cyberspace and some key characteristics, such as lack of geographical boundaries and digital footprints. It then defines cyber crimes and classifications like financial fraud, cyberterrorism, and computer hacking. The document outlines several laws in Bangladesh related to cyber security, including the Penal Code of 1860, Information and Communication Technology Act of 2006, Pornography Control Act of 2012, and Digital Security Act of 2018. It discusses adjudicating cyber crimes through a Cyber Tribunal and Cyber Appellate Tribunal. The conclusion emphasizes that prevention through awareness of laws is key to reducing cyber crimes.
Al Amin Rahman & Associates is among the very few leading law firms in Bangladesh, having its presence throughout out of the world. We believe in our lawyers, they are very professional in their work and always try to suggest the best opinion according to the situation. We understated the importance of our client and work very carefully towards the procedure of Legal service. For further details in regards to LEGAL SERVICE in Bangladesh follow the down below link.
For further details in regards to LEGAL SERVICE in Bangladesh follow the down below link
Website: http://www.alaminrahman.com/2016/12/27/cyber-law-bangladesh/
Email: info@alaminrahman.com
This document discusses cyber crime and provides definitions and classifications of both conventional and cyber crimes. It begins by defining conventional crime and noting that crime has always been a part of human society. It then defines cyber crime, noting that a computer can be either a tool or target of criminal activity. Various types of cyber crimes are outlined such as those involving financial crimes, pornography, intellectual property crimes, and hacking. Prevention and security measures to address cyber crime are also discussed such as user access controls, firewalls, intrusion detection systems, and response mechanisms.
Cyber Crime and its Jurisdictional Issue'sDhurba Mainali
This document discusses cyber crime and issues of jurisdiction. It begins with background on the growth of internet usage and the rise of cyber crime. It then defines cyber crime and outlines its history. The document describes several common types of cyber crimes such as hacking, identity theft, cyber stalking, theft, and spoofing. It discusses the challenges of jurisdiction for cyber crimes, distinguishing between subject matter and personal jurisdiction. An example case involving jurisdiction is provided. The conclusion emphasizes the need for international cooperation and evolving cyber laws to address new forms of cyber crime.
Whistle blowing is an act aimed at unveiling or exposing gross misdeed associated with services rendered in public or private institutions. These acts which constitutes diverse dimensions of crimes popularly referred to as corruption has obviously eaten deep into the fabrics of virtually every sector of our economy including university education system. It is pathetic but frankly to remark that this imbroglio characterizing the society has remained unabated due to absence of secure reporting line. Hence, the development of Whistle-Blowing System with secure electronic avenue for reporting every act or conduct that contradicts and compromises ethical provisions. It creates seamless link to enroll prospective whistle-blowers, accepts documented reports with verifiable evidence, allows communication with investigators, protects whistle-blower’s identity and interfaces them for due rewards. The system development process adopted the object-oriented methodology with its tools such as use-case diagram, sequence diagram and flowcharts. Implementation protocol utilized a combination of Javascript/php/HTML at the front-end while MySQL was engaged at the back-end for appropriate data documentation. It is suited with enormous prospects for assisting management trap down most of the sharp practices and inconsequentialities inherent in most Nigerian universities by accepting user identity, the reports and processes same to specifications.
Navigating Indonesia's Information HighwayICT Watch
This document provides an overview of internet freedom standards and issues related to regulating online content in Indonesia. It discusses how Indonesia has made progress on freedom of expression since 1998 but also increased attempts to crack down on internet freedoms. Laws around pornography, defamation, blasphemy and a pending cybercrime bill threaten online speech. The report examines internet filtering, access issues, and recommends legal reforms to bring laws in line with international standards on freedom of expression.
Operation Noah's Ark is a firm and proud supporter in assisting in the regulating Cyber Terrorism we have a O% tolerance to this types of activities among those who are involved in these acts.
Copyright and privacy by design - what lessons have we learned?blogzilla
This document discusses privacy and data protection by design. It covers:
1. Early efforts at digital rights management (DRM) and "trusted" system architectures.
2. More recent efforts at web blocking and legislation like the PROTECT-IP Act. Effectiveness of blocking is limited by encryption, site replication, and alternative access methods.
3. The GDPR's requirements for data protection by design and by default, including data minimization and limiting data collection and access.
Indonesia National Cyber Security StrategyICT Watch
This document outlines Indonesia's national cyber security strategy. It discusses the importance of ICT for Indonesia's economic growth and identifies Indonesia as the 4th largest mobile market and 8th largest internet user market. It describes three dimensions of cyber threats, examples of cyber attacks, and obstacles facing Indonesia's cyber security. It proposes six priority strategies: strengthening policies and regulations; establishing governance and organization; protecting critical infrastructure; implementing security systems and technology; building human resource capacity; and international collaboration. The strategies are intended to secure Indonesia's cyberspace and sovereignty from growing cyber threats.
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSALijcisjournal
This article underscores the urgent need for a global response to cyber threats, discusses the risks
associated with increasing reliance on technology, and sets the stage for a review focused on understanding and mitigating cybercrimes. In summary, the passage discusses the internet's impact on
national development and the growing problem of cybercrime. It calls for a deeper understanding of the
characteristics and motivations of cybercriminals and highlights several questions that need to be
addressed to effectively combat cybercrime and its detrimental effects on society. The classification of cybercrime is summarized into five categories: Cybercrimes against Persons (including cyber
pornography, cyber stalking, financial cybercrimes, phishing, and vishing), Cybercrimes against Property(involving intellectual property violations, data theft, and "Man in the Middle" attacks), Cybercrimes against Government, Denial of Service (DOS) Attacks, and Other Cybercrimes (comprising data diddling,salami attacks, email bombing, email spoofing, logic bombs, internet time theft, and mobile and wireless technology-related cybercrimes).
Internet and computers have changed working, communication, meeting and business requirements and conditions all over globe. Due to this high profile technology, everyone can share any activity that was unexpected and unimaginable few decades back. It was the imagination of people that they will live their lives in this manner and do their business quickly and imagination and dream has come true with the introduction of internet only. Modern society is now associated with internet and related technologies, over a quarter of the world's population is wired into the net and this number is growing every day
Where next for the Regulation of Investigatory Powers Act?blogzilla
This document summarizes recommendations from reports by David Anderson QC, the Intelligence and Security Committee, and RUSI on reforming and consolidating complex UK legislation governing intelligence agencies and investigatory powers. It notes calls to replace existing laws with a new comprehensive bill that clearly defines agencies' powers and capabilities while strengthening oversight and legal safeguards. The government plans to introduce a draft Investigatory Powers Bill for scrutiny later in 2015.
This document summarizes a research paper about violations of cybercrime and jurisdiction in Indonesia. It discusses how technological advances have enabled new forms of digital crime. It describes several types of cybercrimes such as unauthorized access, spreading viruses, hacking, and cyberterrorism. It also discusses Indonesia's laws regarding electronic information and cybercrime. The document analyzes some challenges around jurisdiction for cybercrimes that cross borders. It examines how Indonesia applies legal jurisdiction and sanctions to cybercrime perpetrators based on the location of the crime and perpetrator. It aims to explain how Indonesia's legal system will handle cybercrime cases and reduce such violations.
Digital security law security of individual or governmentM S Siddiqui
The document discusses Bangladesh's proposed Digital Security Act 2018 and debates around balancing national security, personal security, and freedom of expression. It summarizes key sections of the proposed law that have raised human rights concerns, such as allowing searches and arrests without warrants. While cyber security aims to protect digital systems and data, the law may infringe on citizens' privacy and speech. There are calls to amend sections to ensure rights are not violated in the name of national security.
The Digital Security Act 2018 in Bangladesh aims to curb crimes committed digitally such as spreading fake news, slander, and inciting violence. However, critics argue it could undermine media freedom and freedom of expression that are protected by the country's constitution and laws. The act allows the government to monitor digital platforms and restrict content it deems harmful or offensive. International organizations have called for reforming the laws to prevent overreach and protect civil liberties.
This document provides an overview and analysis of the Digital Security Act 2018 in Bangladesh. It discusses the purpose of the act to address cybersecurity issues, the controversies around limitations to civil liberties, and an evaluation of the act's constitutionality and viability based on international guidelines. The document examines specific sections of the act that are controversial and violate constitutional rights. It provides recommendations to address these issues in both the short and long term through legislative amendments and capacity building.
The document discusses the Digital Security Act (DSA) of Bangladesh. It provides an overview of the intended role of the DSA to punish offenses related to illegal access of information and cybercrimes. However, it also analyzes troublesome parts of the DSA that could infringe freedom of expression and be open to abuse. These include provisions allowing blocking of online content and criminalization of speech that insults or hurts religious sentiments. The document concludes with recommendations to revise problematic sections of the DSA to align it with international human rights standards on freedom of expression.
This document summarizes a white paper on cyber crime within the South African government. It discusses the growing problem of identity theft and hacking within government systems. It outlines the Cool Frog Cyber Project, which was authorized to target and disrupt international crime syndicates hijacking identities to enable financial crimes. The project profiled 4 linked syndicates, analyzed threats, and achieved several arrests and convictions. It discusses investigative methods like searches, hardware key loggers, and working with partners like law enforcement. The document recommends improving security measures, vetting, and training to better address cyber crimes within government.
This document summarizes international laws and policies regarding privacy and mass surveillance in the post-Snowden era. It discusses obligations under international human rights law, calls by the UN General Assembly to review surveillance practices, and reports by the UN High Commissioner for Human Rights criticizing secret interpretations of law and lack of protections for individuals. The document also reviews data privacy regulations in Europe, debates around data localization, encryption technologies, and concludes that strengthening international law and information security is needed to curb mass surveillance by powerful states.
Keeping our secrets? Shaping Internet technologies for the public goodblogzilla
This document discusses challenges to privacy from technological development, market failures, and authorized access. It then discusses approaches to designing for privacy, including data minimization, user consent, and privacy by design. Finally, it examines shaping technologies for the public good through defining privacy as a public good, limiting government surveillance, new privacy regulations like GDPR, and encouraging competition.
The document discusses cyber security challenges for smart communities. It notes that cyber threats are becoming more sophisticated and pose risks to critical infrastructure. Establishing effective cooperation between public and private sectors is important for developing strategies to address cyber challenges in smart communities. As communities become more connected through information and communication technologies, demand for robust cyber security will continue to grow.
This document provides a summary of a dissertation defense presentation on the normalcy of crime as a requirement for intelligence analysis in Nigerian law enforcement agencies. The summary includes:
1) The dissertation examines how studying the normalcy of crime can help law enforcement agencies in gathering and managing intelligence information.
2) It analyzes challenges facing Nigerian law enforcement agencies and how understanding crime dynamics could aid intelligence assessments.
3) Several hypotheses are proposed regarding the relationships between criminal intelligence and law enforcement practices, internal security, and national security.
Cyber security and prevention in BangladeshRabita Rejwana
This document discusses cyber crime prevention and security in Bangladesh. It begins by defining cyberspace and some key characteristics, such as lack of geographical boundaries and digital footprints. It then defines cyber crimes and classifications like financial fraud, cyberterrorism, and computer hacking. The document outlines several laws in Bangladesh related to cyber security, including the Penal Code of 1860, Information and Communication Technology Act of 2006, Pornography Control Act of 2012, and Digital Security Act of 2018. It discusses adjudicating cyber crimes through a Cyber Tribunal and Cyber Appellate Tribunal. The conclusion emphasizes that prevention through awareness of laws is key to reducing cyber crimes.
Al Amin Rahman & Associates is among the very few leading law firms in Bangladesh, having its presence throughout out of the world. We believe in our lawyers, they are very professional in their work and always try to suggest the best opinion according to the situation. We understated the importance of our client and work very carefully towards the procedure of Legal service. For further details in regards to LEGAL SERVICE in Bangladesh follow the down below link.
For further details in regards to LEGAL SERVICE in Bangladesh follow the down below link
Website: http://www.alaminrahman.com/2016/12/27/cyber-law-bangladesh/
Email: info@alaminrahman.com
This document discusses cyber crime and provides definitions and classifications of both conventional and cyber crimes. It begins by defining conventional crime and noting that crime has always been a part of human society. It then defines cyber crime, noting that a computer can be either a tool or target of criminal activity. Various types of cyber crimes are outlined such as those involving financial crimes, pornography, intellectual property crimes, and hacking. Prevention and security measures to address cyber crime are also discussed such as user access controls, firewalls, intrusion detection systems, and response mechanisms.
Cyber Crime and its Jurisdictional Issue'sDhurba Mainali
This document discusses cyber crime and issues of jurisdiction. It begins with background on the growth of internet usage and the rise of cyber crime. It then defines cyber crime and outlines its history. The document describes several common types of cyber crimes such as hacking, identity theft, cyber stalking, theft, and spoofing. It discusses the challenges of jurisdiction for cyber crimes, distinguishing between subject matter and personal jurisdiction. An example case involving jurisdiction is provided. The conclusion emphasizes the need for international cooperation and evolving cyber laws to address new forms of cyber crime.
Whistle blowing is an act aimed at unveiling or exposing gross misdeed associated with services rendered in public or private institutions. These acts which constitutes diverse dimensions of crimes popularly referred to as corruption has obviously eaten deep into the fabrics of virtually every sector of our economy including university education system. It is pathetic but frankly to remark that this imbroglio characterizing the society has remained unabated due to absence of secure reporting line. Hence, the development of Whistle-Blowing System with secure electronic avenue for reporting every act or conduct that contradicts and compromises ethical provisions. It creates seamless link to enroll prospective whistle-blowers, accepts documented reports with verifiable evidence, allows communication with investigators, protects whistle-blower’s identity and interfaces them for due rewards. The system development process adopted the object-oriented methodology with its tools such as use-case diagram, sequence diagram and flowcharts. Implementation protocol utilized a combination of Javascript/php/HTML at the front-end while MySQL was engaged at the back-end for appropriate data documentation. It is suited with enormous prospects for assisting management trap down most of the sharp practices and inconsequentialities inherent in most Nigerian universities by accepting user identity, the reports and processes same to specifications.
Navigating Indonesia's Information HighwayICT Watch
This document provides an overview of internet freedom standards and issues related to regulating online content in Indonesia. It discusses how Indonesia has made progress on freedom of expression since 1998 but also increased attempts to crack down on internet freedoms. Laws around pornography, defamation, blasphemy and a pending cybercrime bill threaten online speech. The report examines internet filtering, access issues, and recommends legal reforms to bring laws in line with international standards on freedom of expression.
Operation Noah's Ark is a firm and proud supporter in assisting in the regulating Cyber Terrorism we have a O% tolerance to this types of activities among those who are involved in these acts.
Copyright and privacy by design - what lessons have we learned?blogzilla
This document discusses privacy and data protection by design. It covers:
1. Early efforts at digital rights management (DRM) and "trusted" system architectures.
2. More recent efforts at web blocking and legislation like the PROTECT-IP Act. Effectiveness of blocking is limited by encryption, site replication, and alternative access methods.
3. The GDPR's requirements for data protection by design and by default, including data minimization and limiting data collection and access.
Indonesia National Cyber Security StrategyICT Watch
This document outlines Indonesia's national cyber security strategy. It discusses the importance of ICT for Indonesia's economic growth and identifies Indonesia as the 4th largest mobile market and 8th largest internet user market. It describes three dimensions of cyber threats, examples of cyber attacks, and obstacles facing Indonesia's cyber security. It proposes six priority strategies: strengthening policies and regulations; establishing governance and organization; protecting critical infrastructure; implementing security systems and technology; building human resource capacity; and international collaboration. The strategies are intended to secure Indonesia's cyberspace and sovereignty from growing cyber threats.
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSALijcisjournal
This article underscores the urgent need for a global response to cyber threats, discusses the risks
associated with increasing reliance on technology, and sets the stage for a review focused on understanding and mitigating cybercrimes. In summary, the passage discusses the internet's impact on
national development and the growing problem of cybercrime. It calls for a deeper understanding of the
characteristics and motivations of cybercriminals and highlights several questions that need to be
addressed to effectively combat cybercrime and its detrimental effects on society. The classification of cybercrime is summarized into five categories: Cybercrimes against Persons (including cyber
pornography, cyber stalking, financial cybercrimes, phishing, and vishing), Cybercrimes against Property(involving intellectual property violations, data theft, and "Man in the Middle" attacks), Cybercrimes against Government, Denial of Service (DOS) Attacks, and Other Cybercrimes (comprising data diddling,salami attacks, email bombing, email spoofing, logic bombs, internet time theft, and mobile and wireless technology-related cybercrimes).
Internet and computers have changed working, communication, meeting and business requirements and conditions all over globe. Due to this high profile technology, everyone can share any activity that was unexpected and unimaginable few decades back. It was the imagination of people that they will live their lives in this manner and do their business quickly and imagination and dream has come true with the introduction of internet only. Modern society is now associated with internet and related technologies, over a quarter of the world's population is wired into the net and this number is growing every day
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...IJCI JOURNAL
The study is focused on identity theft and cybersecurity in United States. Hence, the study is aimed at examining the impact of cybersecurity on identity theft in United States using a time series data which covers the period between 2001 and 2021. Trend analysis of complaints of identity theft and cybersecurity over the years was conducted; also, the nature of relationship between the two variables was established. Chi-Square analysis was used to examine the impact of cybersecurity on identity theft in United States. Line graphs were used to analyze the trend in the variable. Time series data was used in the study and the data was obtained from secondary sources; Statista.com, US Federal Trade Commission, Insurance Information Institute and Identitytheft.org. Result from the study revealed that consumers’ complaints on identity theft were on the increase every year. Total spending of the economy (both private and public
sector) on cybersecurity was on continuous increase over the years. More than 100% of spending in 2010 as incurred in 2018. The Chi-Square analysis revealed that cybersecurity does not have significant impact on identity theft. The study recommended that the government increase the level of public awareness to ensure that members of the public protect their personal and other information to ensure that they are not compromised for fraud or identity theft. Organizations also need to invest more in the security system and develop policies that will support the security system. At the country level, international treaties and collaboration should be encouraged to prosecute the fraudsters hiding behind national borders.
This document summarizes a presentation on cyber crime within the South African government. It discusses the types of cyber crimes that occur, including identity theft, data interception, malware, and hacking. It outlines investigations conducted by the Directorate for Special Operations (DSO) into organized cyber crime syndicates operating across government departments and international borders. The presentation details the DSO's investigative methodology, including searches, undercover operations, and use of spyware. It also discusses prosecutions of arrested individuals under the Electronic Communications and Transactions Act and for racketeering offenses. The presentation emphasizes the need for cooperation across law enforcement agencies and private sectors to effectively combat organized cyber crime.
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIAIRJET Journal
This document discusses the historical genesis and evolution of cybercrime and cyber security laws in India. It begins by discussing how crime has evolved with technology over time. It then discusses how cybercrime first emerged during the Cold War era and increased rapidly with the spread of the internet. The document outlines some of the earliest cybercrimes and catalyst events that led countries to develop cyber laws. It also discusses the objectives of the study, research methodology, and provides definitions of key terms like cyber security. Overall, the document provides a high-level overview of the emergence of cybercrime and development of cyber laws in India over time.
Lesson7-Hacktivism, Terrorism, Espionage, Disinformation Campaigns and Warfar...adnis1
This document discusses several topics related to cybercrime, including hacktivism, cyberespionage, cyberterrorism, and cyberwarfare. It provides definitions and examples of each topic. For hacktivism, it describes how some activists have resorted to illegal hacking strategies to draw attention to causes. For cyberespionage, it outlines how nation-states use cyber methods like malware to conduct espionage more easily and avoid risks. It also discusses legal frameworks and challenges responding to these issues across borders.
Issues with respect to the proper ownership and jurisdiction of information contained on the internet have set the stage for an ongoing legal debate over Cyber-Law and its impact on Cyber-Crime.
Enhanced Global Cyber-Security and proposed governing regulations are not a luxury, but a necessity, for today’s business and government entities which operate in real time environments.
This document discusses cyber law and its impact on cyber crime. It notes that while cyber crimes are increasing globally and costing businesses trillions, the laws governing cyber space have not kept pace with the growth of the internet. There is still a huge challenge to develop comprehensive international regulations and laws to address coordinated cyber attacks across borders. It argues that some structure around jurisdiction, privacy, commerce and other issues is needed to help curb cyber crime, but that regulating the internet is complex given its global, boundary-less nature. Enhanced international cooperation around cyber law enforcement is important for addressing cyber threats.
Essay on Cyber Crime and Cyber Law
Essay on CyberCrime
Cyber Crime Essay
Cyber Crime : A Crime
Cybercrime: Two Case Studies
Literature Review On Cyber Crime
Cyber Crime And Transnational Crime Essay
Essay on Cyber Crime and National Security
Cyber Crime Essay
CyberCrime Essay
Cyber Crime Essay
The Issue Of Cyber Crimes Essay
Essay on Introduction to Computer Crime
Essay about CyberCrime and Terrorism
Pros And Disadvantages Of Cyber Crime Essay
Internet Crime Essay
Cyber Crime
Cyber-Crime is a Serious Problem Essay examples
Advantages And Disadvantages Of Cyber Crime
Cyber Crime Essay
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdflinda gichohi
This is an article/blog on the Privacy Symposium Africa 2022 on Privacy Rights and Digital rights as Human Rights. It also talks about Online Gender Based Violence , this is gender based violence that manifests in the Digital Space and Online world ie; phishing, non-consensual sharing, harrassment. This article explains why Privacy rights are essential in the modern world.
A Study on the Cyber-Crime and Cyber Criminals: A Global Problemijbuiiir1
Today, Cybercrime has caused lot of damages to individuals, organizations and even the Government. Cybercrime detection methods and classification methods have came up with varying levels of success for preventing and protecting data from such attacks. Several laws and methods have been introduced in order to prevent cybercrime and the penalties are laid down to the criminals. However, the study shows that there are many countries facing this problem even today and United States of America is leading with maximum damage due to the cybercrimes over the years. According to the recent survey carried out it was noticed that year 2013 saw the monetary damage of nearly 781.84 million U.S. dollars. This paper describes about the common areas where cybercrime usually occurs and the different types of cybercrimes that are committed today. The paper also shows the studies made on e-mail related crimes as email is the most common medium through which the cybercrimes occur. In addition, some of the case studies related to cybercrimes are also laid down
The document discusses several aspects of internet safety including information security issues like viruses and privacy issues. It also discusses regulating obscene content and false information online. It describes international efforts through the UN and WSIS to address internet governance and build confidence in internet use. However, perceptions of threats may outweigh the actual risks to minors online. Proposed legislation to require data retention raises privacy and civil liberties concerns. Striking a balance between open access and protecting vulnerable groups is important for innovation.
Cybersecurity Context in African Continent - Way ForwardGokul Alex
The slides from the presentation session by Gokul Alex on the Enigmatic Economy of Cyber Crimes and Cyber Attacks across the globe with the specific focus on African Continent ravaging countries such as South Africa, Nigeria, Kenya, etc. Cybersecurity issues are looming large and assuming larger significance in the post pandemic political economies. This presentation was delivered to the TAFFD Virtual Conference on Cybersecurity in July 2020 together with Red Team Hacker Academy and BeyondIdentity.
This document outlines the objectives and topics covered in a course on cyber law. The course aims to enable students to understand cyber law, explore cyber crimes and related issues, and develop competencies for dealing with cyber fraud. Key topics covered include an overview of cyber law and cyber crimes, intellectual property rights, and the regulation of cyber space in India and globally. The course also seeks to enhance students' understanding of legal issues related to online transactions and clarify intellectual property issues in cyber space.
Cyber crime poses several challenges for law enforcement. Technically, it can be difficult to attribute crimes due to IP spoofing and anonymity tools. Software vulnerabilities are also common and enable theft of data. Legally, different countries have varying laws and evidence standards, complicating international investigations. Ethically, agencies must respect privacy and human rights while investigating digital crimes. Addressing these technical, legal and ethical challenges is crucial to effectively combat cyber crime.
Essay on Introduction to Computer Crime
Essay about CyberCrime and Terrorism
Cyber Crime : A Crime
Essay on CyberCrime
Cyber Crime Essay
Cyber Crimes And The Crime
Persuasive Essay On Cybercrime
Cyber Crime Essay
Cybercrime And Its Effect On Society
CyberCrime Essay
Essay on Cyber Crime and National Security
Cyber-Crime is a Serious Problem Essay examples
Literature Review On Cyber Crime
Cyber Crime
Cyber Crime
Why Cybercrime Is Important
Essay on Cyber Crime and Cyber Law
Cybercrime: Two Case Studies
Cyber Crime Essay
Cyber Crime Essay
The National Cyber Security Strategy: Success Through CooperationMark Johnson
The document outlines the Netherlands' National Cyber Security Strategy. It discusses how society has become increasingly dependent on ICT and vulnerable to cyber threats. The strategy aims to improve cyber security through cooperation between public and private sectors. It establishes basic principles such as linking initiatives, public-private partnerships, individual responsibility, and proportional responses. The goal is to create a resilient digital infrastructure while respecting privacy and civil liberties.
Similar to An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa: A Criminological Perspective (19)
Study of Road Patterns and Space Formation in Settlement Areas on the Edge of...AJHSSR Journal
ABSTRACT: This research aims to find developments in road patterns from 2008 to 2024 and explain the
influence of road patterns on the formation of settlements on the edge of Lake Laut Tawar. This research uses a
quantitative descriptive approach and diachronic reading analysis techniques. This research uses overlapping
maps (superimpose), surveys, and interviews. The results of this research are to find factors that influence the
formation of settlements on the edge of Lake Laut Tawar, including the flat topographic conditions. Demographics
continue to increase in the population of the study location. The social culture at the study location is that the
residents who live on the edges of Lake Laut Tawar are residents who have family relationships. Distribution of
space designations that change function from agricultural land to residential land. Land values vary on the edges
of Lake Laut Tawar according to their zones.
KEYWORDS : Road Pattern, Lake Edge, Laut Tawar Lake
HAPIS AT KATANUNGAN, PANGUNGULILA NG MGA NAIWAN: SIPAT-SURI SA MAIKLING KUWEN...AJHSSR Journal
ABSTRAK: Ang pagpapatiwakal o sariling pagtapos ng buhay ay isang malubhang dilema na madalas na
kinahaharap ng isang taong nakararanas ng malalim na hirap at kalungkutan. Ang isa sa mga dahilan ng
pagpapatiwakal ay ang pagtingin dito bilang isang paraan ng pagtakas mula sa mga suliranin at hamon ng buhay.
Ang pagsusuri sa maikling kuwentong "Bahay sa Dilim" ni Alfredo Enriquez ay isang uri ng kwalitatibong
pananaliksik na gumamit ng pagsusuring pangnilalaman upang maabot ang layunin nito na tukuyin at
maipaliwanag ang mga isyu ng dilema at desisyon sa pagpapatiwakal, pagmamahal sa pamilya, at pangungulila
at pagsisisi. Sa paggamit ng mga teoryang pampanitikan tulad ng eksistensyalismo at romantisismo bilang mga
gabay, ninais ng mga mananaliksik na magbigay-liwanag at solusyon sa mga isyu ng pagpapatiwakal. Ito ay
magiging patnubay sa pagpapalawak ng kaalaman tungkol sa mga suliranin at karanasan ng mga pamilyang
Pilipino, pati na rin sa mga laban na hinaharap ng isang tao na nakararanas ng isang dilema. Sa dulo, hinahamon
ng pag-aaral na ito na gamitin pa ang iba't ibang uri ng panitikan na mas naglalarawan ng tunay na karanasan at
realidad ng buhay.
KEYWORDS : pagpapatiwakal, dilema, kalungkutan, buhay, pangungulila
Risk Tolerance as A Moderation of Financial Literacy and Lifestyle on Old Age...AJHSSR Journal
ABSTRACT:Old age financial planning must consider various factors, such as retirement age, estimated
monthly expenses in retirement, life expectancy, current and projected income until retirement which determines
the ability to save, assets and investments already owned, and the impact of inflation on future purchasing
power. Future, as well as the level of investment return. This research is causal associative research, this
research uses a quantitative approach. The population used in this research were employees within the Rectorate
of the University of Mataram, 67 Civil Servants. The saturated sampling method or total sampling is a sampling
technique in which all members of the population are used as samples. In this questionnaire, respondents'
answers were measured using a 6-point Likert scale: with ratings of 1 (strongly disagree), 2 (disagree), 3
(somewhat disagree), 4 (somewhat agree), 5 (agree), 6 (strongly agree). The Partial Least Square-Structural
Equation Model (PLS-SEM) with smart PLS 3.0 software was used to analyze the research data. The study's
findings indicate that financial literacy is found to have a positive and significant impact on old-age financial
planning among Rectorate employees at the University of Mataram. This indicates that as financial literacy
levels increase, so do activities relate to planning for retirement. Conversely, lifestyle does not exhibit a
significant influence on old-age financial planning for these employees. Furthermore, the interaction between
financial literacy and risk tolerance weakens the effect of financial literacy on retirement financial planning,
implying that higher risk tolerance diminishes the impact of financial literacy on planning for retirement.
However, risk tolerance does not moderate the influence of lifestyle on old-age financial planning, indicating
that the interaction between lifestyle and risk tolerance does not significantly affect retirement financial
planning for Rectorate employees at Mataram University.
KEYWORDS :Risk Tolerance, Financial Literacy, Lifestyle, Old Age Financial Planning
THE INFLUENCE OF APPLICATION FEATURES AND SECURITY THROUGH TRUST ON BRImo CUS...AJHSSR Journal
ABSTRACT : This research objective is to determine the influence of application features and security
through trust on BRImo customer loyalty in Banyuwangi. This research used the Explanatory Research type.
The population used in this research is all customers who use the BRImo application as of the end of December
2022 at the BRI Banyuwangi office, totaling 89,333 customers. The sampling technique in this research used a
multistage random sampling technique (multi stage sampling). In this study, the criteria used were customers
who happened to use the BRImo application and were financially registered, totaling 100 respondents. The data
analysis method used Structural Equation Modeling (SEM) with the SmaprtPLS application. The research
results showed that Application Features influence BRIMo Trust in Banyuwangi Regency. Security influenced
BRIMo's trust in Banyuwangi Regency. Application features influenced BRIMo customer loyalty in
Banyuwangi Regency. Security influenced BRIMo Customer Loyalty in Banyuwangi Regency. Trust influenced
BRIMo Customer Loyalty in Banyuwangi Regency. Trust mediated the influence of Application Features on
BRIMo Customer Loyalty in Banyuwangi Regency. Trust mediated the influence of Security on BRIMo
Customer Loyalty in Banyuwangi Regency.
KEYWORDS : Application feature, security, trust, loyalty
On Storytelling & Magic Realism in Rushdie’s Midnight’s Children, Shame, and ...AJHSSR Journal
ABSTRACT: Salman Rushdie’s novels are humorous books about serious times. His cosmopolitanism and
hybrid identity allowed him access to multiple cultures, religions, languages, dialects, and various modes of
writing. His style is often classified as magic realism, blending the imaginary with the real. He draws
inspiration from both English literature and Indian classical sources. Throughout his works, there is a lineage of
‘bastards of history’, a carnival of shameful characters scrolling all along his works. Rushdie intertwines fiction
with reality, incorporating intertextual references to Western literature in his texts, and frequently employing
mythology to explore history. This paper focuses on Rushdie’s three novels: Midnight’s Children, Shame, and
Haroun and the Sea of Stories, analyzing his postmodern storytelling techniques that aim to explore human
vices and follies while offering socio-political criticism.
KEYWORDS : Magic Realism, Rushdie, Satire, Storytelling, Transfictional Identities
CYBER SECURITY ENHANCEMENT IN NIGERIA. A CASE STUDY OF SIX STATES IN THE NORT...AJHSSR Journal
ABSTRACT: Security plays an important role in human life and endeavors. Securing information and
disseminating are critical challenges in the present day. This study aimed at identifying innovative technologies
that aid cybercrimes and can constitute threats to cybersecurity in North Central (Middle Belt) Nigeria covering
its six States and the FCT Abuja. A survey research design was adopted. The researchers employed the use of
Google form in administering the structured questionnaire. The instruments were faced validated by one expert
each from ICT and security. Cronbach Alpha reliability Coefficient was employed and achieved 0.83 level of
coefficient. The population of the study was 200, comprising 100 undergraduate students from computer science
and Computer/Robotics Education, 80 ICT instructors, technologists and lecturers in the University and
Technical Colleges in the Middle Belt Nigeria using innovative technologies for their daily jobs and 20 officers
of the crime agency such as: Independent Corrupt Practices Commission (ICPC) andEconomic and Financial
Crimes Commission (EFCC). Three research purposes and questions as well as the hypothesis guided the study
on Five (5) point Likert scale. Data collected were analyzed using mean and standard deviation for the three
research questions while three hypotheses were tested using t-test at 0.05 level of significance. Major findings
revealed that serious steps are needed to better secure the cybers against cybercrimes. Motivation, types, threats
and strategies for the prevention of cybercrimes were identified. The study recommends that government,
organizations and individuals should place emphasis on moral development, regular training of its employees,
regular update of software, use strong password, back up data and information, produce strong cybersecurity
policy, install antivirus soft and security surveillance (CCTV) in offices in order to safeguard its employees and
properties from being hacked and vandalized.
KEYWORDS: Cybersecurity, cybercrime, cyberattack, cybercriminal, computer virus, Virtual Private Networks
(VPN).
TACKLING ILLEGAL LOGGING: PROBLEMS AND CHALLENGESAJHSSR Journal
ABSTRACT: Illegal logging poses significant environmental, economic, and social challenges worldwide. This
research explores the problems associated with illegal logging in the present and future, shedding light on the
multifaceted nature of this issue and the accompanying challenges faced by governments, organizations, and
communities. The study employs a comprehensive literature review to analyze the current state of illegal
logging, its causes, and its consequences. It examines the environmental impact of deforestation, including
biodiversity loss, habitat degradation, and climate change. The researchers identify the challenges faced in
combating illegal logging in the present and anticipate future obstacles. It considers illegal logging networks'
complex and elusive nature, the limited enforcement capacity, and the need for international cooperation and
coordination. The study also examines the adoption and effectiveness of policies, regulations, and technological
advancements in curbing illegal logging practices in Davao City.
Keywords -Problems and Challenges, Cultural Disruptions, Anticipate future problems.
Towards Developing Students’ Soft Skills: The Case of ENSAM StudentsAJHSSR Journal
ABSTRACT: Building students’ soft skills has started to gain ground within the realm of higher education in
Morocco. However, the development of these skills requires a real-life context which simplifies their learning.
In this regard, the present study is mainly conducted to investigate the effect of the out-group collaborative
learning method on the development of students’ soft skills. Data for the study comes from 20 semester two
students at “Ecole Nationale Superieure d'Arts et Metiers” (ENSAM), Moulay Ismail University, Meknes, by
implementing a one-group pretest-posttest research design. The qualitative and quantitative findings confirm
that there is a statistically significant difference between the pretest and posttest results. Therefore, the adopted
treatment, the out-group collaborative learning method, has improved students’ communication, adaptability and
presentation delivery skills. The findings of this study can be useful for future studies and give language
teachers insights into the importance of using the out-group collaborative learning method in their teaching of
the soft skills.
KEYWORDS : collaborative learning, soft-skills, out-group collaborative learning method
STUDY ON THE DEVELOPMENT STRATEGY OF HUZHOU TOURISMAJHSSR Journal
ABSTRACT: Huzhou has rich tourism resources, as early as a considerable development since the reform and
opening up, especially in recent years, Huzhou tourism has ushered in a new period of development
opportunities. At present, Huzhou tourism has become one of the most characteristic tourist cities on the East
China tourism line. With the development of Huzhou City, the tourism industry has been further improved, and
the tourism degree of the whole city has further increased the transformation and upgrading of the tourism
industry. However, the development of tourism in Huzhou City still lags far behind the tourism development of
major cities in East China. This round of research mainly analyzes the current development of tourism in
Huzhou City, on the basis of analyzing the specific situation, pointed out that the current development of
Huzhou tourism problems, and then analyzes these problems one by one, and put forward some specific
solutions, so as to promote the further rapid development of tourism in Huzhou City.
KEYWORDS:Huzhou; Travel; Development
Enhancing Losari Beach Exploration: Augmented Reality for Immersive Visualiza...AJHSSR Journal
ABSTRACT: South Sulawesi, commonly known as Makassar, boasts rich cultural heritage and customs,
making it a prominent destination for tourism. Among its attractions, Losari beach stands out as a focal point for
visitors seeking to explore the city's natural beauty and cultural offerings. In this context, leveraging modern
technology such as augmented reality presents an innovative approach to showcasing Losari beach to potential
tourists. This research endeavors to introduce tourism assets in a more visually captivating manner through the
use of augmented reality. Utilizing software tools like Unity and Adobe Illustrator, the study focuses on creating
an immersive experience where tourists can interact with virtual representations of Losari beach. By simply
pointing their mobile phone cameras at designated markers or using barcode scanners, tourists can access
augmented reality features embedded within the application. The findings of this research aim to provide
valuable information, particularly for foreign tourists, about Losari beach, positioning it as a compelling
destination within South Sulawesi's diverse array of tourist attractions. Through this technological innovation,
the study seeks to enhance the visibility and appeal of Makassar city's tourism offerings on a global scale.
KEYWORDS: Visualizing, Losari Beach, Augmented Reality
DEVELOPMENT STATUS AND COUNTERMEASURES OF TMALL DURING THE COVID-19 EPIDEMICAJHSSR Journal
ABSTRACT:China's e-commerce enterprises have developed rapidly, among which Tmall has become one of
the largest retail shopping websites in China.But in the past year, the Covid-19 epidemic has brought a huge
impact to Chinese e-commerce enterprises, and Tmall is no exception.Therefore, the development status of
Tmall in the new crown epidemic situation was analyzed, and the viewpoint was put forward :Tmall1 stabilized
the situation in the face of the epidemic situation and made a very correct countermeasures.The influence of this
epidemic on Tmall was deeply analyzed, and the conclusion was made: the new crown epidemic is both a
challenge and an opportunity forTmall.
KEYWORDS:Tmall; COVID - 19 outbreak ; The electronic commerce
Factors affecting undergraduate students’ motivation at a university in Tra VinhAJHSSR Journal
ABSTRACT: Motivation plays an important role in foreign language learning process. This study aimed to
investigate student’s motivation patterns towards English language learning at a University in Tra Vinh, and factors
affecting their motivation change toward English language learning of non-English-major students in the semester.
The researcher used semi-structured interview at the first phase of choosing the participants and writing reflection
through the instrument called “My English Learning Motivation History” adapted from Sawyer (2007) to collect
qualitative data within 15 weeks. The participants consisted of nine first year non-English-major students who learning
General English at pre-intermediate level. They were chosen and divided into three groups of three members each
(high motivation group; average motivation group; and low motivation group). The results of the present study
identified six visual motivation patterns of three groups of students with different motivation fluctuation, through the
use of cluster analysis. The study also indicated a diversity of factors affecting students’ motivation involving internal
factors as influencing factors (cognitive, psychology, and emotion) and external factors as social factors (instructor,
peers, family, and learning environment) during English language learning in a period of 15 weeks. The findings of
the study helped teacher understand relationship of motivation change and its influential factors. Furthermore, the
findings also inspired next research about motivation development in learning English process.
KEY WORDS: language learning motivation, motivation change, motivation patterns, influential factors, students’
motivation.
The Impact of Work Stress and Digital Literacy on Employee Performance at PT ...AJHSSR Journal
ABSTRACT :This research aims to analyze the correlation between employee work stress and digital literacy
with employee performance at PT Telkom Akses Area Cirebon, both concurrently and partially. Employing a
quantitative approach, the study's objectives are descriptive and causal, adopting a positivist paradigm with a
deductive approach to theory development and a survey research strategy. Findings reveal that work stress
negatively and significantly impacts employee performance, while digital literacy positively and significantly
affects it. Simultaneously, work stress and digital literacy have a positive and significant influence on employee
performance. It is anticipated that company management will devise workload management strategies to
alleviate work stress and assess the implementation of more efficient digital technology to enhance employee
performance.
KEYWORDS -digital literacy, employee performance,job stress, multiple regression analysis, workload
management
The Settlement of Construction Disputes Through Dispute Councils From the Per...AJHSSR Journal
ABSTRACT:This research differs from the practice of business activity in the construction services industry,
which may lead to construction disputes. The settlement of construction disputes is a consensus based on the
basic principle of debate. If the discussions between the parties do not reach an agreement, the parties may take
measures to resolve the dispute through the dispute council. Because the standard governing the disputes
committee was not fully regulated, they did not comply with the principle of legal certainty. Therefore, further
research was needed to establish a theoretical basis for regulating the disputes committee in settling construction
disputes. This research is a standard legal research using a legal regulatory, conceptual, and comparative
approach. The research results show that the ideal concept of resolving construction disputes through a dispute
council based on the value of legal certainty is to establish that the position of the dispute council is a special
court that has the authority to resolve construction disputes under construction services agreements. To realize
the position of the Court of Disputation as a special court, it must be based on the creation of philosophical
values, the creationof legislative regulations, and the creation of the institutional structure of the Court of
Disputation.
KEYWORDS-Construction Disputes, Dispute Council, Special Court
VALUES OF ORAL LITERATURE IN THE SOCIETY: A STUDY OF FOLKTALES OFOGBA IN RIVE...AJHSSR Journal
ABSTRACT : Oral literature is a creative work of art that portends high merit and has the creative use of
imagination in preliterate societies. It adopts the genres of literature: drama, prose and poetry in the oral milieu,
using performance as its hallmark. It thrives on the use of oral data because of its orality. This paper focuses on
the moral values or oral literature in the society using Ogba as a spring board. The study was carried out in
communities ofOgba. The population of the study consists of ten towns and village, in Ogba. The theoretical
framework used is Dell Hyme’s ethno-poetics because the works of oral literature relate to the society. This
paper concludes that oral literature serves to against all odds; communicate ideas, emotions, beliefs and
appreciation of life. The folktales in Ogba for instance, serve similar purpose through their
rendition/performance. Through the stories, the younger generation in Ogba society is familiarised with the
customs, traditions, and rituals prevalent in the society. This paper therefore recommends the use of oral
literature in all its genres to inculcate moral values and lessons to the teenagers and youths. Against this
background, Ogba (African) themselves must cease to regard oral literature as primitive and fetish.
KEYWORDS: Values, Oral Literature, Society, Ogba, Folktales
Pormalistikong Pagdalumat sa mga Tula ni Ron CanimoAJHSSR Journal
ABSTRACT: Nilayon ng pag-aaral na ito na masuri ang dalawampung (20) tula ni Ron Canimo gamit ang
pormalistikong dulog batay sa mga sumusunod na elemento: (a) Sukat at Tugma, (b) Talinghaga at
Simbolismo, (c) Imahen, (d) Tema, at (e) Diksiyon. Layunin din nitong mataya ang antas ng pagtanggap ng
ginawang pagsusuri gamit ang nabuong instrumento sa pagtataya nito. Sinunod dito ang Input-Process-Output
na balangkas ng pag-aaral at ginamitan ng kwantitatib-deskriptib-ebalwatib na pamamaraan. Sa pamamagitan
ng talatanungang ibinatay sa ginamit ni Morales (2014) na naimodipika ayon sa kahingian ng kasalukuyang
pag-aaral, tatlong (3) gurong eksperto ang nagsilbing tagataya dito na siyang tumiyak sa kahusayan ng nabuong
pagsusuri ng mananaliksik. Gamit ang Content Analysis, natuklasan na makabagong pamamaraan ang istilo na
ginamit ni Ron Canimo sa pagsulat ng mga tula. Lahat ng kanyang mga tula ay walang sinusunod na sukat at
tugma, may iba‟t ibang tayutay at simbolismong ginamit, magkaibang pandama ang pinagana dahil sa mga
imahe at paglalarawang ginawa, iba‟t ibang uri ng pag-ibig ang tinalakay at gumamit ng pormal, impormal o
kumbersasyonal na wika at makabagong istilo sa pagsulat ng tula. Gamit ang mean at standard deviation,
lumabas na “Mataas” ang antas ng pagtanggap sa kabuuan ng mga gurong eksperto na tumaya sa nabuong
pagsusuri. Lumabas din na “Mataas” ang antas ng kanilang pagtanggap sa nabuong pagsusuri batay sa mga
sumusunod na elemento: (a) Sukat at Tugma, (b) Talinghaga at Simbolismo, (c) Imahen, (d) Tema, at (e)
Diksiyon. Mula sa natayang pagsusuri at kinalabasan ng antas ng pagtanggap dito, naitala ang mga paksa sa
Junior High School Filipino na maaaring lapatan at gamitan ng nabuong pagsusuri.
KEYWORDS: Kumbensyunal, Pagdalumat, Pormalistiko, Ron Canimo, Tula
SCHOOL CULTURE ADAPTATION AMONG INDIGENOUS PEOPLES COLLEGE STUDENTS AT A PRIV...AJHSSR Journal
ABSTRACT: This qualitative study investigates the adaption experiences of indigenous college students at the
University of Mindanao, Matina-main campus. Eight major themes emerged, including difficulties with language
proficiency, online learning, classroom interaction, examination systems, grading procedures, school regulations,
resource accessibility, coping mechanisms, and future goals. Implications include the requirement for targeted
language proficiency and technology use support, an understanding of adaption processes, interventions to
improve resource accessibility, and equitable public administration policies. The study underlines the importance
of adaptation in various educational contexts, as well as the role of educators and legislators in creating inclusive
learning environments.
KEYWORDS: indigenous college students, adaptation, educational challenges, coping strategies
The effect of Institutional Ownership, Sales Growth and Profitability on Tax ...AJHSSR Journal
ABSTRACT: This research aims to test, analyze and obtain empirical evidence about the influence of
institutional ownership, sales growth and profitability on tax avoidance. The object of this research is
manufacturing companies in the consumer goods industry sector listed on the Indonesia Stock Exchange (BEI)
in 2018-2022. This research used quantitative research methods and causal research design. The sampling
technique in this research used non-probability sampling with purposive sampling as the basis for determining
the sample so that a sample of 55 samples was obtained. The data used is secondary data obtained from the
official website of the Indonesia Stock Exchange (BEI) during the 2018-2022 period. The data analysis method
used was multiple linear regression analysis with several tests such as descriptive statistical tests, classical
assumption tests, and hypothesis testing using SPSS version 26 statistical software. The results showed that the
institutional ownership variable has no effect on tax avoidance, while the sales growth and profitability has a
negative and significant effect on tax avoidance.
KEYWORDS: Institutional Ownership, Sales Growth, Profitability, Tax Avoidance
MGA ESTRATEHIYA SA PAGTUTURO KAUGNAY SA PASALITANG PARTISIPASYON NG MGA MAG-A...AJHSSR Journal
ABSTRAK: Ang mga estratehiya sa pagtuturo ay mahalagang kasangkapan sa paghahatid ng mabisang
pagtuturo sa loob ng silid. Tinukoy sa pag-aaral na ito ang antas ng kagustuhan ng mga mag-aaral sa pagsasadula,
pangkatang talakayan at paggawa ng mga koneksyon sa tunay na karanasan sa buhay bilang mga estratehiya sa
pagtuturo ng panitikan sa Filipino at pasalitang partisipasyon ng mga mag-aaral sa Baitang 7 ng Misamis
University Junior High School, Ozamiz City. Ang ginamit na disenyo sa pananaliksik na ito ay deskriptivcorrelational. Ang mga datos sa pag-aaral ay nagmula sa kabuuang populasyon na 120 na mag-aaral at tatlong
mga guro na tagamasid sa pasalitang partisipasyon ng mga mag-aaral. Ang Talatanungan sa Kagamitan sa
Pagtuturo ng Panitikan at Checklist batay sa Obserbasyon sa Pasalita na Partisipasyon ay ang instrumentong
ginamit sa pagkalap ng datos. Mean, standard deviation, Analysis of Variance at Pearson Product-Moment
Correlation Coefficient ang mga ginamit na estatistiko na sangkap. Inihayag sa naging resulta na ang tatlong piling
estratehiya sa pagtuturo ng panitikan sa Filipino ay may pinakamataas na antas ng kagustuhan ng mga mag-aaral.
Ang antas ng pakilahok ng mga mag-aaral sa paggamit ng tatlong estratehiya sa pagtuturo ng panitikan ay
pinakamataas na nagpapahiwatig na aktibong nakilahok ang mga mag-aaral sa mga gawain. Inihayag din na
walang makabuluhang kaibahan sa antas ng kagustuhan ng mga mag-aaral sa mga estratehiya sa pagtuturo ng
panitikan sa Filipino. Ito ay nangahulugan na gustong-gusto ng mga mag-aaral ang pagkakaroon ng mga
estratehiya sa pagtuturo. Walang makabuluhang kaugnayan ang kagustuhan sa mga estratehiya at antas ng
pakikilahok ng mga mag-aaral. Hindi nakaapekto sa kanilang pakikilahok ang anumang estratehiyang ginamit ng
guro.
KEYWORDS : estratehiya, karanasan, pagsasadula, pagtuturo, pangkatang talakayan
The Role of the Instruction of Reading Comprehension Strategies in Enhancing ...AJHSSR Journal
ABSTRACT :Throughout my studies and teaching English in different language centers and higher studies
institutions, I have come to conclude that students consider Reading comprehension as a nightmare that
frightens them and hinders their language acquisition in the Moroccan EFL Context. This may cause them to
develop an internal psychological obstacle that grows as their lack of the necessary instruments or tools to
overcome are not equipped with. They become lost and unaware about or unfamiliar with the necessary reading
comprehension strategies that could help them to face the problem of misunderstanding or non-understanding
of English texts. Respectively, this article which is only one part of my whole study aims at showing the effect
of teaching reading strategies in enhancing the S1 students‟ familiarity with reading strategies and raising their
frequency use. A sample of 283 University students in EFL context have been chosen randomly and have
attended the usual academic reading classes, yet only 76 are subject to this survey. 38 of them constitute the
experimental group who have attended the treatment regularly in one of the language centers and the other 38
participants are chosen randomly from the whole population to constitute the Control group. They all have
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
How to Make a Field Mandatory in Odoo 17Celine George
In Odoo, making a field required can be done through both Python code and XML views. When you set the required attribute to True in Python code, it makes the field required across all views where it's used. Conversely, when you set the required attribute in XML views, it makes the field required only in the context of that particular view.
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
Leveraging Generative AI to Drive Nonprofit InnovationTechSoup
In this webinar, participants learned how to utilize Generative AI to streamline operations and elevate member engagement. Amazon Web Service experts provided a customer specific use cases and dived into low/no-code tools that are quick and easy to deploy through Amazon Web Service (AWS.)
Chapter wise All Notes of First year Basic Civil Engineering.pptxDenish Jangid
Chapter wise All Notes of First year Basic Civil Engineering
Syllabus
Chapter-1
Introduction to objective, scope and outcome the subject
Chapter 2
Introduction: Scope and Specialization of Civil Engineering, Role of civil Engineer in Society, Impact of infrastructural development on economy of country.
Chapter 3
Surveying: Object Principles & Types of Surveying; Site Plans, Plans & Maps; Scales & Unit of different Measurements.
Linear Measurements: Instruments used. Linear Measurement by Tape, Ranging out Survey Lines and overcoming Obstructions; Measurements on sloping ground; Tape corrections, conventional symbols. Angular Measurements: Instruments used; Introduction to Compass Surveying, Bearings and Longitude & Latitude of a Line, Introduction to total station.
Levelling: Instrument used Object of levelling, Methods of levelling in brief, and Contour maps.
Chapter 4
Buildings: Selection of site for Buildings, Layout of Building Plan, Types of buildings, Plinth area, carpet area, floor space index, Introduction to building byelaws, concept of sun light & ventilation. Components of Buildings & their functions, Basic concept of R.C.C., Introduction to types of foundation
Chapter 5
Transportation: Introduction to Transportation Engineering; Traffic and Road Safety: Types and Characteristics of Various Modes of Transportation; Various Road Traffic Signs, Causes of Accidents and Road Safety Measures.
Chapter 6
Environmental Engineering: Environmental Pollution, Environmental Acts and Regulations, Functional Concepts of Ecology, Basics of Species, Biodiversity, Ecosystem, Hydrological Cycle; Chemical Cycles: Carbon, Nitrogen & Phosphorus; Energy Flow in Ecosystems.
Water Pollution: Water Quality standards, Introduction to Treatment & Disposal of Waste Water. Reuse and Saving of Water, Rain Water Harvesting. Solid Waste Management: Classification of Solid Waste, Collection, Transportation and Disposal of Solid. Recycling of Solid Waste: Energy Recovery, Sanitary Landfill, On-Site Sanitation. Air & Noise Pollution: Primary and Secondary air pollutants, Harmful effects of Air Pollution, Control of Air Pollution. . Noise Pollution Harmful Effects of noise pollution, control of noise pollution, Global warming & Climate Change, Ozone depletion, Greenhouse effect
Text Books:
1. Palancharmy, Basic Civil Engineering, McGraw Hill publishers.
2. Satheesh Gopi, Basic Civil Engineering, Pearson Publishers.
3. Ketki Rangwala Dalal, Essentials of Civil Engineering, Charotar Publishing House.
4. BCP, Surveying volume 1
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
How to Setup Warehouse & Location in Odoo 17 InventoryCeline George
In this slide, we'll explore how to set up warehouses and locations in Odoo 17 Inventory. This will help us manage our stock effectively, track inventory levels, and streamline warehouse operations.
हिंदी वर्णमाला पीपीटी, hindi alphabet PPT presentation, hindi varnamala PPT, Hindi Varnamala pdf, हिंदी स्वर, हिंदी व्यंजन, sikhiye hindi varnmala, dr. mulla adam ali, hindi language and literature, hindi alphabet with drawing, hindi alphabet pdf, hindi varnamala for childrens, hindi language, hindi varnamala practice for kids, https://www.drmullaadamali.com
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa: A Criminological Perspective
1. American Journal of Humanities and Social Sciences Research (AJHSSR) 2019
A J H S S R J o u r n a l P a g e | 146
American Journal of Humanities and Social Sciences Research (AJHSSR)
e-ISSN :2378-703X
Volume-3, Issue-1, pp-146-154
www.ajhssr.com
Research Paper Open Access
An Exploratory Study on Mechanisms in Place to Combat
Hacking In South Africa: A Criminological Perspective.
1
Siyanda Dlamini, 2
Candice Mbambo
1
Senior Lecturer, Criminology Department, College of Social Sciences and Humanities. University of Fort
Hare, South Africa.
1
M.A candidate, School of Applied Human Sciences, Criminology & Forensic Studies Discipline, University of
KwaZulu-Natal.
ABSTRACT: In the past two decades, third world countries such as South Africa have made steadily
developments towards combating hacking as a form of Cybercrime. The developments made by the South
African Criminal Justice towards the prevention of hacking have been mildly progressive. The Council of
Europe Convention on Cybercrime is the treaty that all South African legislation and policy with regard to
hacking is required to be in line with this convention. This treaty has also been the cornerstone to first world
countries such as the United States, when preventing cybercrime such as hacking. In order for South Africans to
have a safe and secure cyberspace that is free from hackers; there needs to be a co-operative system put in place
by the South African Criminal Justice System that involves the government, non-profit organizations and the
community. A Criminal Justice system that works closely with the community is able to properly guide its
members and correctly prosecute the crime of hacking. Therefore, using qualitative secondary data this paper
explores the existing measures put in place by the South African Criminal Justice to combat hacking. The
findings of this paper indicate that conceptual understanding of this crime (hacking) can play a pivotal role in
addressing the manifestation of this crime in a large extent as the nature and extent can be established, the use of
technological means also contribute to hacking, this is also linked to individuals (victims) ignorance. For
recommendations, the use of technology and conventional method in awareness can help in responding to the
scale and consequence of hacking in South Africa.
KEYWORDS: South African Criminal Justice System, Hacking, Cybercrime and Cybersecurity.
I. INTRODUCTION
Computer crimes such as hacking showed great growth during the 90s in South Africa, because the internet
became a popular way for users to connect worldwide. The internet is one of the greatest sensations in
contemporary society. It has become a symbol of technological ingenuity and has offered humankind the
greatest of benefits. The internet has been one of the most helpful networks concerning the access to information
and communication.As much as the internet has made positive contributions towards human relations, this high-
tech existence of the internet came with risks. According to Lilley (2002), “the internet has the capacity to
liberate and imprison persons simultaneously”. The internet has the power to enable individuals who have not
had any special computer training education to become the biggest threat to humankind, through the ability to
provide details of how to access sensitive classified information.
According to Lilley (2002), “the threat of the hacker is often perceived as being one of the major threats of the
digital age”. Hackers will carry out an attack on cyberspace for financial gain or either just to prove the severe
security flaws in the Web site or system being attacked (Lilley 2002: 49). This means that hackers will not only
hack an organization for financial gain, hackers will also intend to expose the weaknesses of a particular
organization. Those individuals who hack into websites for their own financial gain and those with the intention
to gain confidential personal information are crackers.
In South Africa, the developments that are designed address hacking as a form of cybercrime have been
relatively slow. It is essential to investigate the existing policies of the South African Criminal Justice System
that ensure the prevention of hacking. In order to derive prevention measures that will decrease the high rates of
hacking attacks that the community reports. The South African Law Commission in 2001 published a discussion
paper on Computer-related crime. The paper was in the form of proposal that was aimed at dealing with any
persons who access stored communications with the absence of sufficient or correct authority; it also proposed
that persons found guilty of such activity were liable for a criminal offence (Cybercrimes & Cybersecurity Bill
2015: 2). This led to Cybercrimes and Cybersecurity Bill of 2015, the Bill provides for various cybercrime
2. American Journal of Humanities and Social Sciences Research (AJHSSR) 2019
A J H S S R J o u r n a l P a g e | 147
offences. This Bill establishes the creation of a Cyber Response Committee in parliament that will promote,
guide and coordinate activities aimed at improving cybersecurity measures by all role players, which includes
the strengthening of intelligence collection and improved State capacity to investigate, prosecute and combat
cybercrime such as hacking.
Government institutions such as the South African Criminal Justice system are not the only contributors towards
the prevention of hacking. Various non-profit organizations have made insightful contributions in the combat of
hacking in South Africa. The Internet Safety Campaign (2007) is an institution that works together with the
criminal justice system to create awareness of hackers. In partnership, they are able to create awareness that will
protect government and private institutions and protect people‟s personal information. The Internet Safety
Campaign (2007) has helped the criminal justice system “create an awareness catalogue „The Cybercrime
survival guide‟ that protects the public from hackers”. The prevention of a crime such as hacking that involves
digital technology and computer networks that require prevention strategies that allow the government, non-
governmental organizations (NGOs) to work together. Broadhurst (2006: 4) asserts that,“the police and other
agencies within government, networks between police and private institutions and networks of police across
national borders should be the drivers of prevention strategies with regard to hacking”. South Africa has made
use of international policies that are guidelines in the creation of hacking prevention policies, such as the
Council of Europe‟s Convention on Cyber-crime of 2001.“South Africa has signed the convention but did not
ratify the Convention. South Africa has complied with only the first part of the convention” (Van de Merwe
2008: 101). It provides a foundational framework in the creation of current laws that enhance the prevention of
hacking (Snail 2009: 9). As a member state of this treaty Snail (2009) highlights that South Africa is obliged to
criminalize:
The accessing or intercepting data unethically and illegally on a computer system.
The interfering without rightful authority of acomputer system and computer data.
The misusing of computer-related devices such as “hacker tools”, which include production, sale,
procurement for use, import or distribution of computer-related devices.
It is important that countries learn from each other‟s efforts to deal with cybercrime and create an international
cyber-crime code to be used universally if any significant success is to be achieved in combating hacking (Snail
2009). Therefore, the main aim of this paper is to explore the international and national policies that contribute
towards combating Hacking, and explore the effectiveness of the contributions made by the South African
Criminal Justice System together with the NGO`s in preventing hacking. This paper employs qualitative
secondary data to critically identify and analyze the policies put into place by the South African Criminal Justice
System to combat hacking as a form of cybercrime. It provides insight on the contribution of non-governmental
institutions towards the prevention of hacking. Then further highlight the contributions of international policies.
Hacking refers to a successful or an unsuccessful attempt to gain unauthorized use or unauthorized access to a
computer system (Howard 1997). According to Bainbridge (2000),hacking is “the accessing of a computer
system without the express or implied permission of the owner of that computer system”. This term “hacking” is
not be confused with the term “cracking” which is a component of hacking and can be defined as an individual
who enters a computer system with a fraudulent motive, for instance obtaining other persons‟ credit card
numbers for their own financial gain (Sinrod& Reilly 2000).Hacking is part of the broader term of cybercrime,
these types of crime are difficult to police and prosecute as they occur in cyberspace. Cyberspace allows for the
action of illegal electronic trespassing and virtual breaking and entering, which amounts to hacking (Bainbridge
2000: 307).It falls within the scope and function of the South African Criminal Justice System to protect South
Africans from the criminal activity of hacking. The South African Criminal Justice System consists of various
role players and stakeholders who share the mandate of preventing crime in South Africa (Dyson 2010).
II. THEORETICAL FRAMEWORK
A theoretical framework can define and clearly illustrate a topic (Strafford&Lesham 2008). The structure that
holds or supports a theory of a topic is a theoretical framework and provides a particular perspective, or lens,
through which to examine a particular topic.
The use of a theory that directly deals with crimes committed in cyberspace such as hacking is necessary, as it
will address the aims and objectives of this paper head on. The Space Transition Theory is a model that explains
the causes of crimes in cyberspace (Jaishankar 2007: 7). The theory argues that people behave differently when
they move from one space to another. According to Jaishankar (2007), the model provides key elements that
explain the perpetration of cybercrimes such as hacking:
A persons‟ status or position in the physical space will not allow them to participate in criminal activity
in the physical space if they have repressed criminal behavior, the individual will transfer this
behaviour to cyberspace.
The element of anonymity and flexibility of identity encourages offenders to commit crime on
cyberspace.
3. American Journal of Humanities and Social Sciences Research (AJHSSR) 2019
A J H S S R J o u r n a l P a g e | 148
An offender‟s criminal behaviour will move from the physical into cyberspace as cyberspace provides
the offender with a chance to escape.
Persons who are strangers can come together in cyberspace to commit crime in physical space and
individuals who are associates are likely to unite to commit crime in cyberspace.
Conflicting norms and values that can prevent one from criminal activity in physical space can allow
one to commit crime in cyberspace.
This Space Transition Theory is able to identify that persons who are likely to become unethical hackers are less
likely to have the ability of physically initiating a violent crime. Hacking is committed in a confined hidden
space and the identity of the hacker remainshidden, which makes hacking more appealing to hackers. Morals
and values that a personwill hold in the physical space is overridden by the hacker cyberspace due to the non-
disclosure of identity.
For the purpose of this paper, it is necessary for the South African Criminal Justice System to identify the
reasons, why and how hackers would hack particular institutions. This way there is direct information regarding
the causes of hacking attacks, making it possible to implement morepolicies that will prevent hacking. The
theory also explains why the Criminal Justice Systemhas made mild progressions in developing policies and
measures that are to prevent hacking. Hacking occurs in a different space, which you cannot access physically
making the policing of hacking difficult. The internet provides individuals with a platform where you can
perform various commands without having to change locations, showing the borderless nature of cybercrimes.
The theoretical framework shows that it is necessary to implement measures that prevent hacking as a form of
cybercrime.
III. LITERATURE REVIEW
A literature review is essential to analyse literature was previously written by scholars to understand the
substance of the measures that have been put in place by the South African Criminal Justice System to combat
hacking. Literature reviews help us gain insight on a particular topic and understand it more (Neuman
2011:124). This literature review will explore the various policies that are in place by the South African
Criminal Justice System to prevent hacking as a form of Cybercrime. Address the influence that international
policies have had or still have on domestic policies that fight against cybercrime such as hacking in South
Africa.
Cybercrime has shown a great increase in South Africa because the internet is the most commonly used network
by humans. The drastic increase is a result of the fact that cyber criminals now have access to all information on
the internet. Cyber criminals are now able to gain access to sensitive information if they possess the ability to
gain access to restricted information (Snail 2009: 2). The position on convicting cyber criminals in the past has
been unclear, as the law has failed to define cybercrimes such as hacking clearly. They have been definitions of
theft ofproperty, but this did not include the theft of property that is accessed unethically using a computer. Prior
to policies enacted to address cybercrimes, a cybercrime must link with another crime in order to amount to a
criminal offence. Cybercrimes such as hacking could not prosecuted on their own as a criminal offence they had
to connect to another deviation of the law (Snail 2009: 6). For instance, using the internet to defame a particular
person would not amount to a criminal offence of cyber-harassment, to charge person for a wrongful act their
offence would have to amount to a charge defamation of character.
Hackers will carry out an attack on cyberspace for financial gain or either just to prove the severe security flaws
in the Web site or system being attacked (Lilley 2002: 49). Essentially this means that hackers will not only
hack an organization for financial gain. Hacking can expose the weaknesses of a particular organization. This
reinforces the pillars of the Space Transition Theory because hackers move from one space to another and will
commit a hacking attack just to expose their expertise in hacking. An individual who does so would not
necessarily be involved in criminal activity in public space but will do so in cyberspace(Jaishankar 2007: 8).
This exposes how the advancements in Information and Communication Technologies (ICT) have created a
range of new crime problems (Jaishankar 2007: 8). This creates a duty on the South African Criminal Justice to
facilitate prevention, detection, investigation, prosecution and punishment for cybercrimes such as hacking.
According to the South African Cyber Hub (2016),three stakeholders need to work together in order to assist the
South African Criminal Justice System with their duty to prevent hacking. The Government, private institutions
and the South African Community are required to work together in order to ensure the effectiveness of the
measures put in place by the South African Criminal Justice System to combat hacking.
IV. INTERNATIONAL DEVELOPMENTS
Western countries have made significant developments in creating policies that help fight against the plight of
hacking as a form of cybercrime because national legislation and policies can be limited in what it can achieve.
Domestic legislation only applies to the country of implementation and the implementation of such policies is
highly dependent on that countries interpretation. Therefore, it is essential to provide an overview of
international convention, which aims to combat hacking.
4. American Journal of Humanities and Social Sciences Research (AJHSSR) 2019
A J H S S R J o u r n a l P a g e | 149
The Council of Europe Convention on Cybercrime (2001)
The Council of Europe Convention on Cybercrime of 2001 is an international convention that attempted to
tackle the problem of Cybercrimes on an international platform. The aim of this policy was to establish a
common ground that will foster international cooperation when dealing with cybercrimes such as hacking.
“South Africa has signed but not ratified the treaty” (Snail 2009:8). The convention requires its parties to
establish jurisdiction over the offences that are committed that are enshrined in the treaty. Because of the
borderless nature of cyberspace where hacking occurs it is essential to have international cooperation if laws
relating to cybercrimes such as hacking are deemed to be successful (Van de Merwe 2008: 101). South Africa
has also complied with the first part of this convention, which sets out the regulations to criminalize acts that
amount to cybercrime (Snail 2009: 9). According to Snail (2009), “The Electronic Communications Transaction
Act 25 of 2002 of South Africa substantially deals with the requirements that are set out by this convention”.
According to Van de Merwe (2008), The Council of Europe Convention on Cybercrime (2001) faces criticism
for obligating its parties to enforce the requirements of the treaty. Critics argue that the convention should limit
itself to protecting global infrastructure and only criminalize those hackers who attack global infrastructure (Van
de Merwe 2008: 101). The enforcement mechanisms of the countries that form part of this treaty are not the
same. The convention obliges its member countries to co-operate with each other in order to facilitate the
investigation of any computer related offence. Van de Merwe (2008) asserts, “Parties may find it difficult to
reach sufficient international consensus on how to criminalize “content-related offences” where countries would
not agree with the criminalization of certain cybercrime acts”.
The Computer Misuse Act of 1990, Chapter 18: Access to Computer Material states: “Any person is guilty of an
offence if he or she intentionally causes a computer to perform any function with the intent to secure access to
any private stored data held by a computer or website. Persons found guilty of such an offence will be liable of
conviction to imprisonment of period not exceeding 6 months or a fine that is proportionate of the offence
committed”. This part of the Act criminalizes hacking, provides a necessary offence for hackers and complies
with the Council of Europe Convention on Cybercrime.
The United States Department of Justice
The United States Department of justice stated that unlawful computer hacking imperils the health and welfare
of individuals, corporations and government agencies that rely on the computers to communicate (Lilley 2002:
49). To address this, the United States Developed federal legislation The United States Code of 1996 under title
18 Crimes and Criminal Procedures, chapter 47: Fraud and False Statements section 1030. This policy aims to
address any: “Fraud and related activity in connection with computers and impose fines and sentences on those
who are perpetrators of such activity as defined by the Act” (The United States Code of 1996). This forms part
of the very early policies in America that addressed hacking as form of cybercrime. In principle, the regulations
of the United States are similar to those of the European Union concerning the law enforcement of the
cybercrime of hacking.
The development of international policies has had major effects on domestic legislation regarding hacking.For
example,India codified its first Act in 2000 called the Information Technology Act, the problem with this Act is
that “it failed to meet global standards that adhere towards the protection of the community from being victims
of hacking” (Nappinai 2010: 22).
SOUTH AFRICAN DEVELOPMENTS
In South Africa,the developments made to address hacking as a form of cybercrime have also been a reflection
of the developments made in the international sphere. There has been no actual special legislation has been
implemented to deal with hacking current legislation uses the broad term of cybercrime, which includes hacking
amongst other offences a component. In 2001, The South African Law Commission published a discussion
paper on Computer-related crime. The paper was a form of proposal aimed at dealing with any persons who
access stored communications with the absence of sufficient or correct authority; it also proposed that persons
found guilty of such activity were liable for a criminal offence. This led to the Cybercrimes and Cybersecurity
Bill (2015), the Bill provides for various cybercrime offences including hacking.
The Draft of the Cybercrimes and Cybersecurity Bill (2015)
The South African Criminal Justice System faced the same obstacle as other international countries, due to that
there were no laws that defined cybercrimes such as hacking. The Cybercrime Cybersecurity Bill is still under
discussion, only a draft of this Act has been included in the gazette in 2015. The aim of this Draft Bill is to
properly define offences and create penalties for the commitment of these particular offences. Also, to further,
regulate the jurisdiction of the courts and regulate the powers to investigate and seize information regarding any
report of cybercrime (Cybercrime and Cybersecurity Bill 2015: 2). Chapter 2 section 4 of this Bill address the
offences by stating that; “Any person who unlawfully and intentionally accesses the whole or any part of data, a
computer device, a computer network, database and a critical database is guilty of an offence” (Cybercrime and
Cybersecurity Bill 2015:14). The Bill highlights the offence of anyone found in possession of software that is
for unethical purposes is guilty of an offence. For instance, when hackers use emails as a virus to breakdown the
computers firewall in order to gain access to a person‟s personal information this is an offence.
5. American Journal of Humanities and Social Sciences Research (AJHSSR) 2019
A J H S S R J o u r n a l P a g e | 150
This Bill has made provision for the creation of infrastructure within the South African parliament to deal with
Cybercrime such as hacking. Government department such as the Department of Correctional Services,
Department of Defense, Department of Home Affairs, Department of Justice and Constitutional Development,
National Prosecuting Authority, South African Police Services, State Security Agency, Department of Finance
and the Finance Intelligence Centre have all come together to form committees in parliament to combat hacking
(Cybercrime and Cybersecurity Bill 2015: 74). The Bill provides for the following committees that best address
the phenomenon of hacking with reference to the South African Community:
The Cyber Response Committee
The objectives and functions of this committee are the implementation of government policies regarding
cybersecurity. Identify and prioritize areas that require great intervention, provide a central contact mechanism
that will facilitate cybersecurity and national security (Cybercrimes and Cybersecurity Bill 2015: 760). “Also to
promote, guide and coordinate activities aimed at improving cybersecurity measures by all role players, which
includes the strengthening of intelligence collection and improved State capacity to investigate, prosecute and
combat cybercrime and to deal with cyber threats” (Cybercrimes and Cybersecurity Bill 2015: 78).
National Cybercrime Centre
The objects and functions of the National Cybercrime Centre are to facilitate the operational coordination of
cyber security and incident response activities with reference to the prevention. Ensure that the inhabitants of the
Republic of South Africa uphold the law and maintain order (Cybercrimes & Cybersecurity Bill 2015: 91).
Develop measures in order to deal with cyber security matters affecting law enforcement (Cybercrimes &
Cybersecurity Bill 2015: 91). Analyze cybersecurity trends, vulnerabilities, sharing of information and threats in
order to improve the response to cybercrimes such as hacking. Establish the necessary capacity to deal with
cybersecurity threats and response to incidents that jeopardizing cybersecurity.“Develop and maintain cross-
border law enforcement cooperation in respect of cybercrime and promote, establish and maintain public-private
cooperation in order to fight cybercrime” (Cybercrimes and Cybersecurity Bill, 2015: 92). Promote, establish
and maintain international cooperation in order to in order to comply with the international standards of
combating cybercrimes using cybersecurity (Cybercrimes and Cybersecurity Bill, 2015: 92).
The formations of these committees show how the government has taken the initiative to address the cybercrime
of hacking.
The Electronic Communications Transaction Act 25 of 2002
The Electronic Communications Transaction Act, Act 25 of 2002 provides new provisions that will combat
hacking as a form of cybercrime. This Act made it possible for the prosecution of online offenders. Previously
the position had been unclear on what grounds to prosecute an individual who had been guilty of a cybercrime,
the Act makes clear definitions of cybercrimes such as hacking (Snail, 2009: 3). The Interception and
Monitoring Prohibition Act is another policy that put in place by the Criminal Justice System to prevent the
deviant behavior of hacking. This Act prohibits the unlawful interception or monitoring of any data message
used by hackers (Snail 2009: 3).
Commercial Organizations and Hacking
A number of international private financial institutions have reported a number of hacking attacks but South
Africa has had under reporting of hacking attacks (Herselma&Warren 2004: 253). Financial institutions are at a
greater risk of hackers due to the fact that majority of their information is on computer databases.
The major problem with hacking is when people hack into websites or restricted database without the intention
to affect harm to the website. A number of people find themselves in spaces they ought not to be, “people
hacking into systems are often just going in to have a look around (spying) without intending to do any damage
to the system or its integrity” (Herselma& Warren 2004: 254. This is not always the case in all cases of hacking,
usually cracking also occurs. Cracking is when an individual hacks into a particular database with the intent to
damage the systems integrity with fraudulent motives. The growth of technological information has led to a
decrease of the ability to copyright your information. The main problem with intellectual property is that they
can be more than one owner of intellectual property (Herselma& Warren 2004: 255).
A number of commercial institutes are interested in ensuring in delivering services in a faster and innovative
platform using the internet. South African banks, government agencies and Internet Service Providers (ISPs)
priorities what their websites performance and how fast it can perform new features to entice the public,
cybersecurity is normally an afterthought (Oladipo 2015). In November 2015, The Sunday Times newspaper
reported that hackers launched 6000 cyber-attacks on South African infrastructure such as businesses and
Internet Service Providers in the month of October 2015. This is due to fact that software development
companies feel pressured to work under short periods when developing websites, resulting in the creation of
websites that are of a sub-standard that hackers can easily attack (Oladipo 2015). For many commercial
institutes it is very difficult to detect they have been attacked by hackers, so it can take a period of about a year
till a hacker is detected and the company could lose its integrity and large amounts of revenue without knowing
the individual responsible (Oladipo 2015). South Africa has recently launched a Cybersecurity Hub in Pretoria
aimed at assisting commercial institutes and civil society work together in reporting hacking incidents.
6. American Journal of Humanities and Social Sciences Research (AJHSSR) 2019
A J H S S R J o u r n a l P a g e | 151
V. CTIMIZATION CAUSED BY HACKERS
Since the beginning of the technological revolution of computers,reports of unethical activities have increased in
South Africa. The illegal and unethical use of electronic technology is difficult to preventbecause cyber space is
a very large network that placed on a very small access point for example a computer, cell phone and other
communication devices (Hollinger 1991: 6). The major problem with cybercrimes is that various policies and
legislation failed define cybercrimes, describe the offence and provide a just and equitable fine. Observing the
activities that have occurred within our communities it is evident that computer crime especially in the form of
telecommunication and system hacking is on the rise (Hollinger 1991: 8).
This means that victimization can occur on a micro level or on a macro level. These exploitations or
victimization can occur in two ways; firstly, “it creates the impression that personal computer (PC) related
exploitations are happening with some normality among a little be that as it may, critical number of
organizations and associations every year, bringing about generally substantial scale fiscal misfortunes”
(Hollinger 1991: 9). Secondly, “roughly three-fourths of these occurrences are commonly executed by workers
and not untouchable programmers”(Hollinger 1991: 9). It would create the impression that defrauded
associations consider personal computer wrongdoing as essentially as an example of worker robbery (Hollinger
1991: 9). The problem with cybercrime it has been highly defined as business related crimes meaning that
normally an individual who has been employed by the by the particular institution that will later cause a threat to
that same institution.
The Colluminate Research Firm has identified South Africa as one of the hotspots for Cybercrimes. Government
agencies, commercial institutes and the community have lost millions of rands due to hackers (Herselma&
Warren 2004: 255). Hackers are not involved in hacking only to gain an income; in some instances, they seek to
defame individual by accessing confidential information. The threat of hackers has the ability to cause
victimization of all types of crime to the South African community. This makes it necessary to create awareness
and increase the measures that are in place by the Criminal Justice System to prevent hacking. The eradication
of hacking attacks is difficult to achieve but is relevant to develop practices to curb this type of cybercrime.
NON-GOVERNMENTAL ORGANISATIONS DEVELOPMENTS
Non-government organizations have major contributions towards the prevention of hacking because, these
organizations seek to the bridge the gap made by the South African Criminal Justice System. This creates
smaller and more intimate platforms to combat cybercrime. Such organizations look at the specific needs and
can communicate with the community directly on how to protect themselves from hackers.
Alert Africa
Alert Africa is a public awareness initiative that is in the form of a website created to protect average internet
users from hackers. The aim of this site is to educate and protect Africans from the threats that can occur over
the internet (Wolfpack 2015: 20). The Alert Africa website aims to educate the average internet users about
different cyber threats that exists online, provides useful tips on how to not become a victim as well as where to
report cybercrime to (Wolfpack 2015:20).
Wolfpack Risk Awareness Campaign
This campaign adopted by the South African Police Services to combat hacking as a form of cybercrime. This
campaign is intensive, provides various mechanisms to protect individuals from cybercrimes such as hacking,
and creates awareness for these sorts of crimes. The South African Police have made great reference to the
Wolfpack‟s Information Security Awareness Catalogue of 2015.
The Internet Safety Campaign 2007
The Internet Safety Campaign (2007) is an institution that works together with the criminal justice system to
create awareness of hackers. In partnership, they are able to create awareness that will protect government and
private institutions and protect people‟s personal information. The Internet Safety Campaign (2007) has helped
the criminal justice system create an awareness catalogue „The Cybercrime survival guide‟ that protects the
public from hackers. This campaign consists of a public awareness portal. The site provides access to relevant
and trusted local and international resources aimed at educating individuals at all levels. The site also features
help for reporting suspected activities. It is part of an independent, non-commercial initiative borne out of the
needs identified over this past decade for pooling resources to address the criminal exploitation of Information
and Communication Technology in South Africa
Anonymous Africa
Anonymous Africa is group of hackers that known as „hacker-activist‟ this is a group of individuals that use
hacking to address agents of corruption, racism and fraud (Van Zyl 2016). Political parties such as the Economic
Freedom Fighters (EFF) of South Africa and the Zanu-PF of Zimbabwe have been victims of this group of
hackers. Recently the hackers have targeted websites in South Africa, which belong to Gupta owned companies
such as the broadcaster ANN7, The New Age newspaper, Sahara and Oakbay (Van Zyl 2016). The hackers of
Anonymous Africa use hacking to lead a mass protest of the injustices that occur in various countries, their aim
is to bring attention to these issues using a peaceful and non-destructive protest through hacking (Van Zyl
2016). The ANN7 and The New Age belong to the South African Broadcasting Company (SABC), which is a
7. American Journal of Humanities and Social Sciences Research (AJHSSR) 2019
A J H S S R J o u r n a l P a g e | 152
national key point. The Criminal Justice System has the onus to protect the integrity of national infrastructure
such as the SABC from intruders. According to the South African Constitution Act 108 of 1996 South Africans
have the right to freedom of speech, therefore the protests of Anonymous Africa are within the scope of their
constitutional rights. Non-governmental organizations of this nature must not expose sensitive data of national
key points in order to protect government websites from hackers who are not advocates of justice and harmony,
who only see to destroy.
In South Africa the development of these policies have been relatively slow due to the problem faced
internationally of defining what will construct a hacking. The Criminal Justice System has created policies that
address cybercrimes that would also encompass hacking. The problem with these policies and measures they are
a work-in-progress, as they do not specifically define hacking. In conclusion, internationally and nationally
various strides have been made towards creating a safe cyberspace. In order for the South African Criminal
Justice System to combat hacking there needs to be system for government agencies, commercial institutions,
non-governmental institutions and the community need to work together to create a safe cyberspace.
VI. METHODOLOGY
This paper is a secondary qualitative study conducted as a desktop research project. According to Travis (2016),
“a secondary research study requires the researcher to read recent scholarly works that have made contributions
towards answering the research problem”. This process involves collecting data from either the originator or a
distributor of primary research. In other words, accessing information already gathered. This means finding
information from third-party sources such as research reports, websites, magazine articles, and other sources
(Travis 2016).
This paper is a literature based research project, conducted through various searches using the internet. Firstly,
using Google as a search engine to find out to what extent the cybercrime of hacking has affected South Africa,
by looking closely at current newspaper discussions surrounding this topic. Secondly, using the University of
KwaZulu-Natal libraries search engine called World Cat, which allows one to locate books in any of the
University of KwaZulu-Natal libraries and other libraries. WorldCat also provides one with e-books. WorldCat
provides with books and e-books that addressed the policies implemented by the South African Justice System
to prevent hacking as a form of Cybercrime. These books addressed the development of policies from
international policies that prevent hacking in other countries. Thirdly, Google Scholar located the various
international policies and to seek further books and articles that address the research topic. Fourthly, a search
using EbscoHost located journal articles that address international and national policies developed to combat
hacking as a form of cybercrime. Lastly, governmental organization websites where used to locate non-
governmental websites that also contribute to the prevention of hacking.
VII. DISCUSSION
Analysis for this paper required the researcher to conduct a secondary data analysis. The researcher is not
involved in the actual primary collection of the data(Braun and Clarke, 2001: 6). This research paper consists of
various perspectives defined and researched by other scholars. This makes it essential to use an unstructured
analysis, through logical reasoning, comparative analysis and synthesis of the facts gathered from the literature
collected.
From the literature collected from the study, the researcher finds that the South African Criminal Justice System
has made progress towards the creation of policies that promote the prevention of hacking as a form of
cybercrime. The formulation of such policies is something that is very new to the world as many countries
where faced with the problem of not being able to define a crime that is committed on cyberspace.
Internationally the growth of technology and the internet has been much faster as opposed to South Africa,
hence the formulation of such policies in first world countries is more established. South Africa has adopted
international treaties and policies in order to prevent such criminal activity.
The South African Criminal Justice System has made various commitments to the creation of programs that
protect the community from hackers. The draft of the Cybercrimes Bill of 2015 has shown a greater progression
in the South African Criminal Justice Systems prevention of hacking. It has made it possible for the creation of
committees in parliament that will hold responsibility and accountability in the creation of various programs that
will prevent cybercrimes such as hacking. The Bill is still in draft form and shows the mild progression the
South African government has made in order to assist the Criminal Justice in its fight against hackers.
Non-governmental organizations have also made positive contributions towards the combat of hacking as a form
of cybercrime. These organizations help create awareness among communities at a more personal level. They
provide individuals with easy to use manuals to protect their computers and cell phones from hackers. The
South African Police Services works closely with non-government organizations that seek to contribute towards
the prevention of hacking and assist with the implementation of the national policies.
It is evident that current policies and legislation do not specifically define hacking as they make more reference
to cybercrime as a broad criminal offence. Legislation does not specifically define hacking but refers to
8. American Journal of Humanities and Social Sciences Research (AJHSSR) 2019
A J H S S R J o u r n a l P a g e | 153
activities that would amount to hacking. It is essential to create policies and legislation that correctly defines
hacking.
Organizations seek mostly to make the internet more effective in order to reach their own financial and
competitive goals. Cybersecurity should be the central key point of any organization that uses the internet as it
can expose the business and the community to great amount of criminal activity.
VIII. RECOMMENDATIONS AND CONCLUSION
"You can never stop cyber-attacks but you can employ the best practices to curb them," –Bright Mawudor 2015
South Africa Criminal Justice System faces a major challenge with regard to hacking. South African laws have
shown mild progression towards dealing with cyber threats such as hacking. Prevention measures of
cybercrimes such as hacking have shown great increase in most countries in the world, the challenge has been
the implementation of such policies and projects. The problem of not having efficient cyber capacity skills is
prevalent around the world this makes it difficult to address the threats caused by hacking.
The Cybercrimes and Cybersecurity Bill of 2015 is a step forward towards a safer cyberspace for South
Africans. The Bill has been criticised for being vague and unrealistic, as South Africa does not have the
necessary resources to implement the requirements of the Bill. The South African CyberHub (2016) has made it
easy for South African to work together in creating awareness and reporting cases of hacking. It is evident that
South Africa has created a legal platform to fight hacking but nothing aimed at policing cybercrimes such as
hacking.
The cybercrime of hacking has mirrored across the world and South Africa. It is necessary to create a forum
bringing together cyber-security experts, from university to corporate level, to discuss how to take the initiative
on these issues, rather than wait for the exploitation of security gaps. It is essential to work with young people
with newly acquired computer skills who might otherwise be tempted to use them for illegal activity online.
This makes it necessary for the South African Criminal Justice to create measures that police cybercrimes such
as hacking. In order to make the prevention more attainable the government, commercial institutes and non-
government organisations should work together in creating awareness programmes that protect the End user
(members of the community). It is also necessary to for the South African Criminal Justice System to advocate
for the creation of the necessary expert skills to combat hacking through the training of young computer experts
in the art of combating and detecting cyber threats such as hacking. The creation of an effective cyber-response
team is necessary in the South African Police Services to protect South Africans from the threat of hackers.
In conclusion, the Criminal Justice System of South Africa is making progress with regard to developing
policies that prevent hacking as a form of cybercrime. It is essential that government agencies work together in
order to prevent the growing phenomenon of hacking. The Council of Europe Convention on Cybercrime is a
key treaty in shaping global laws and policies aimed at combating hacking. The treaty is central to South
African laws and policies as it is a key element in the formation of legal documents used to form South African
Cybersecurity policies.
The Draft of the Bill of Cybercrime and Cybercrime 2015 accounts for the slow development of legislation in
South Africa with regard to hacking. This is the main policy that forms committees in parliament that address
cybercrimes, these committees ensure that parliament is accountable in the creation of policies and measures
that prevent hacking as a form of cybercrime. Parliament is the central to law making in South Africa it is
essential that parliament forms part of organizations that assist the South African Criminal Justice System in
making policies that assist with preventing hacking.
It is evident that victimization through hacking has shown an increase in South Africa. It is necessary to develop
measures that will protect individuals from hackers. The internet allows hackers the ability to become a threat to
all types of communities, it is also essential to equip members of the public on methods to protect themselves
from hackers.
Due to the relatively slow developments made towards making South Africans safe over the internet it is
relevant to for Non-governmental organization to contribute towards the combat of hacking as a form of
cybercrime. Cybercrime South Africa is an organization that has made great strides towards assisting the South
African Police Services in ensuring that they provide members of the community with the necessary prevention
strategies to decrease victimization. Various institutions are interested in making their institutions more
accessible using the internet and are oblivious to how vulnerable the organization becomes to hackers
REFERENCES
[1]. Broadhurst, R. 2006. Developments in the Global Law Enforcement of Cybercrime. International
Journal of Police and Management 29(3): 403-433.
[2]. Hollinger, R. G. 1991. Hackers, Computer Heroes or Electronic Highwaymen. Computer and Society
21(1): 6-17.
[3]. Howard, J. 1997. Analysis of Security Incidents on the Internet. Unpublished Doctoral Dissertation.
Pennsylvania: Carnegie Mellon University.
9. American Journal of Humanities and Social Sciences Research (AJHSSR) 2019
A J H S S R J o u r n a l P a g e | 154
[4]. Jaishankar, K. 2007. Establishing a Theory of Cybercrimes. International Journal of Cyber
Criminology 1(2): 7-9.
[5]. Mawudor, B. 2015. BBC News 17 November 2015
[6]. Nappinai, N. S. 2010 Cybercrime Law in India: Has Law kept Pace with Emerging Trends. Journal of
International Commercial Law and Technology 5(1): 22-28.
[7]. Oladipo, T. 2015. Cybercrime is Africa‟s Next Big Threat Experts warn. BBC Monitoring Africa
Security Correspondent 17 November 2015.
[8]. Snail, S. 2009. Cybercrime in South Africa: Hacking Cracking and other Unlawful Activities. Journal
of Information Law and Technology 3(2): 35-48.
[9]. Van Der Merwe, D. 2008.Information and Communication Law (Ed). Pretoria.
[10]. Van Zyl, G. 2016.Why Anonymous Hacked the SABC, Gupta Websites. Available from
www.fin24.com/companies/financial-services/anonymous2016061244 (Accessed 03 July 2016).
[11]. Wolfpack 2015.Information Security Awareness Catalogue. Available from www.wolfpackrisk.com.
(Accessed 20 July 2016).
[12]. Travis,D. 2016. Desk research: the what, why and how. (Online). Times Live. Available from:
www.userfocus.co.uk (Accessed on 20 September 2016).
[13]. Neuman, L.W. 2011.Social Research Methods: Qualitative and Quantitative Approaches. 7th
ed.
Boston, MA: Allyn and Bacon.
[14]. Bainbridge, D. I. 2000. Introduction to Computer Law 307.
[15]. Sinrod, E. J & Reilly, W. 2000. Hacking Your Way to Hard Time: Application of Computer Crime
Laws to Specific Types of Hacking Attacks. Journal of Internet Law. 4(3): 3.
[16]. Dyson, M. 2010.The Criminal Justice and You: A Guide to the South African Criminal Justice System.
Independent Projects Trust. Print Expression. Available from www.justiceforum.co.za. (Accessed 21
September 2016).
[17]. Internet Safety Campaign. 2007. Available from www.cybercrime.org(Accessed 20 July 2016).
[18]. Lilley, P. 2002.Hacked Attacked and Abused: Digital Crime Exposed. Koagn Page. Great Britain:
Biddles Ltd.
[19]. Strafford, V. and Lesham, S. 2008.Stepping Stones to Achieving your Doctorate. Mainhead: Open UP.
[20]. Prestorious, H. and Prestorious, E. 2008.Calumniate Online and Market Research Agency in South
Africa. Available at https://www.columinate.com/(Accessed 13 August 2016).
Cited Legislation
[21]. The Draft of Cybercrime and Cybersecurity Bill, 2015 (RSA). Available from
http://www.justice.gov.za/legislation/invitations/cybercrimesbill2015. (Accessed 20 March 2016).
[22]. The Electronic Communications Transaction Act, 2005 (RSA), 25. Available from
http://www.up.ac.za/media/shared/409/(Accessed 20 March 2016).
[23]. The Council of Europe Convention on Cybercrime, 2001 (UK). Available from
http://www.europarl.europa.eu/meetdocs/2014_2019/documents/libe/dv/7_conv_budapest_/ (Accessed
20 March 2016).
[24]. The Constitution of South Africa, 1996 (RSA). Available from
http://www.justice.gov.za/legislation/constitution/saconstitution-web-eng.pdf (Accessed 20 March
2016).
[25]. The United Kingdom Computer Misuse Act, 1990 (UK). Available from
http://www.legislation.gov.uk/ukpga/1990/18/contents (Accessed 20 March 2016).
[26]. The United States Code of 1996 title 18 Crimes and Criminal Procedures. Available from
https://www.gpo.gov/fdsys/pkg/USCODE-2009-title18/ (Accessed 20 March 2016).
[27]. India Information Technology Act, 2000 (India). Available from
www.wipo.int/wipolex/en/text.jsp?file_id=185998 (Accessed 20 March 2016).
[28]. The Interception and Monitoring Prohibition Act, 1992 (RSA), 127.Available form
https://www.imdin.org/doc/amlid. (Accessed 20 March 2016).