Cybercrime and Challenges in South Africa

Cybercrime and Challenges in South Africa

Author: Stanley Osezua Ehiane

Publisher: Springer Nature

Published: 2023-11-01

Total Pages: 251

ISBN-13: 981993057X

DOWNLOAD EBOOK

The advent of the Internet for global advancement and development has opened the world to new crimes. This is the first comprehensive book on the subject matter, considering the absence of textbooks in teaching the subject matter in higher learning institutions. Hitherto, the book is distinctive and timely in the wake of the inclusion of the subject matter as a new curriculum in many African universities. The book focuses on South Africa, where the Internet has been misused by individuals to perpetuated crime which has been on the increase and unabated. The book's contents and its discourse are significant to students in higher institutions, researchers, and organizations, to give in-depth insights into varied cybercrime on various forms and the manners in which cybercrimes have been executed. Lastly, the book contains instances where the Internet has been used to perpetuate crimes in recent times in South Africa.


Handbook of Research on Information and Cyber Security in the Fourth Industrial Revolution

Handbook of Research on Information and Cyber Security in the Fourth Industrial Revolution

Author: Fields, Ziska

Publisher: IGI Global

Published: 2018-06-22

Total Pages: 673

ISBN-13: 1522547649

DOWNLOAD EBOOK

The prominence and growing dependency on information communication technologies in nearly every aspect of life has opened the door to threats in cyberspace. Criminal elements inside and outside organizations gain access to information that can cause financial and reputational damage. Criminals also target individuals daily with personal devices like smartphones and home security systems who are often unaware of the dangers and the privacy threats around them. The Handbook of Research on Information and Cyber Security in the Fourth Industrial Revolution is a critical scholarly resource that creates awareness of the severity of cyber information threats on personal, business, governmental, and societal levels. The book explores topics such as social engineering in information security, threats to cloud computing, and cybersecurity resilience during the time of the Fourth Industrial Revolution. As a source that builds on available literature and expertise in the field of information technology and security, this publication proves useful for academicians, educationalists, policy makers, government officials, students, researchers, and business leaders and managers.


Preventing and Combating Cybercrime in East Africa

Preventing and Combating Cybercrime in East Africa

Author: Abel Juma Mwiburi

Publisher:

Published: 2018-12-13

Total Pages: 241

ISBN-13: 9783428156016

DOWNLOAD EBOOK

The focus of this book is to examine the effectiveness of the measures currently employed in East Africa as a region, and in the individual Member States in dealing with cybercrime and how best the same can be modified to prevent and combat cybercrime in the region. So, the subsequent analysis in this book is done with a view of drawing some lessons from Europe2019s cybercime regimes. In so doing, the book is set to critically examine the role of the law in preventing and combating cybercrime in East Africa; investigate the extent to which the current laws address the problem of cybercrime and ICT governance and regulation in the East African region at country and regional levels; examine the level and extent of cooperation required among the EAC partners in fighting cybercrime; analyze legal and institutional challenges on ICT governance and regulation in East Africa and globally with a view of creating a crime-free environment for the Internet and computer users; and examine the best ways through which the East Africa region can ensure efficient regulation of ICT through a regime that will prevent and combat cybercrime without necessarily inhibiting social, political and economic development."


Combating Cyber Related Crime in South Africa

Combating Cyber Related Crime in South Africa

Author: Ezeji Chiji Longinus

Publisher:

Published: 2014

Total Pages: 250

ISBN-13:

DOWNLOAD EBOOK

The global cost of cyber-crime is now estimated to be well over one trillion dollars a year (Norton Symantec study, 2013). Cyber-crime has no regional, national or international boundaries, unlike ordinary crime which has physical and remits boundaries and limits in relation to jurisdiction. The growing problem is that, cybercrime can be committed from any computer system in the world and subsequently making it very difficult to combat. The new broadband and mobile internet network that provide services to the public have given rise to cyber attack. Cyber criminals have intercepted vital and essential government, personal business information online. A number of online userʹs email addresses have been hacked and the information obtained used to perpetrate fraudulent activities. South Africans among other nations have witnessed incidences of cyber-crime victimization and other attacks ranging from cyber bulling, cyber terrorism, cyber warfare, industrial espionage, identity theft, online pornography, hacking, spreading of worms and viruses and Denial of Service, Phishing attacks and cyber stalking. Many people in South Africa have been victimised via social media networks/ wireless network such as I-phone, I-Pods, smart phones, tablets and cell phone that are internet enabled (Sullivan, 2011: 21). This research focuses on combating cyber-crimes. Among the following are the objectives of the research; to ascertain the efforts of the criminal justice system officials on the combating, investigation, prosecution/adjudication and sentencing of cyber related crimes, make contribution towards policing of cyber related crimes especially in South Africa. The researcher made use of qualitative methodology. Unstructured interview was used in collecting data. The researcher met with twelve respondents face to face during data collection process and the data derived was analysed in the findings. The following are the findings of the research; there is shortage of criminal justice experts who are knowledgeable in handling cyber related cases, especially in the area of prevention, investigation, prosecution/adjudication and sentencing of cyber-crime in South Africa. The law/Legislation used in prosecution of cyber related crime in South Africa is too lenient and cannot deter or checkmate cyber criminals. Cyber-crimes are not reported often to the authorities by victims due to ignorance while vi some organizations do not report cyber-attacks to protect the reputation of their organizations. The researcher recommends that the criminal justice structures give its officials specialised training to be one step ahead of the cyber criminals. In addition, new law/legislation with regards to prosecution of cyber-crime should be enacted and or old ones updated to reflect current issues.


Enforcing Cybersecurity in Developing and Emerging Economies

Enforcing Cybersecurity in Developing and Emerging Economies

Author: Zeinab Karake

Publisher: Edward Elgar Publishing

Published: 2019

Total Pages: 272

ISBN-13: 1785361333

DOWNLOAD EBOOK

This unique, innovative examination of cyberspace policies and strategies and their relation to cyber laws and regulations in developing and emerging economies uses economic, political, and social perspectives as a vehicle for analysis. With cyber risk at the top of the global agenda as high-profile breaches increase worries that cybersecurity attacks might compromise the world economy, this analysis becomes relevant across disciplines.


Cyber crime strategy

Cyber crime strategy

Author: Great Britain: Home Office

Publisher: The Stationery Office

Published: 2010-03-30

Total Pages: 44

ISBN-13: 9780101784221

DOWNLOAD EBOOK

The Government published the UK Cyber Security Strategy in June 2009 (Cm. 7642, ISBN 97801017674223), and established the Office of Cyber Security to provide strategic leadership across Government. This document sets out the Home Office's approach to tackling cyber crime, showing how to tackle such crimes directly through the provision of a law enforcement response, and indirectly through cross-Government working and through the development of relationships with industry, charities and other groups, as well as internationally. The publication is divided into five chapters and looks at the following areas, including: the broader cyber security context; cyber crime: the current position; the Government response and how the Home Office will tackle cyber crime.


At the Nexus of Cybersecurity and Public Policy

At the Nexus of Cybersecurity and Public Policy

Author: National Research Council

Publisher: National Academies Press

Published: 2014-06-16

Total Pages: 170

ISBN-13: 0309303214

DOWNLOAD EBOOK

We depend on information and information technology (IT) to make many of our day-to-day tasks easier and more convenient. Computers play key roles in transportation, health care, banking, and energy. Businesses use IT for payroll and accounting, inventory and sales, and research and development. Modern military forces use weapons that are increasingly coordinated through computer-based networks. Cybersecurity is vital to protecting all of these functions. Cyberspace is vulnerable to a broad spectrum of hackers, criminals, terrorists, and state actors. Working in cyberspace, these malevolent actors can steal money, intellectual property, or classified information; impersonate law-abiding parties for their own purposes; damage important data; or deny the availability of normally accessible services. Cybersecurity issues arise because of three factors taken together - the presence of malevolent actors in cyberspace, societal reliance on IT for many important functions, and the presence of vulnerabilities in IT systems. What steps can policy makers take to protect our government, businesses, and the public from those would take advantage of system vulnerabilities? At the Nexus of Cybersecurity and Public Policy offers a wealth of information on practical measures, technical and nontechnical challenges, and potential policy responses. According to this report, cybersecurity is a never-ending battle; threats will evolve as adversaries adopt new tools and techniques to compromise security. Cybersecurity is therefore an ongoing process that needs to evolve as new threats are identified. At the Nexus of Cybersecurity and Public Policy is a call for action to make cybersecurity a public safety priority. For a number of years, the cybersecurity issue has received increasing public attention; however, most policy focus has been on the short-term costs of improving systems. In its explanation of the fundamentals of cybersecurity and the discussion of potential policy responses, this book will be a resource for policy makers, cybersecurity and IT professionals, and anyone who wants to understand threats to cyberspace.


Cyber Warfare and Terrorism: Concepts, Methodologies, Tools, and Applications

Cyber Warfare and Terrorism: Concepts, Methodologies, Tools, and Applications

Author: Management Association, Information Resources

Publisher: IGI Global

Published: 2020-03-06

Total Pages: 1697

ISBN-13: 1799824675

DOWNLOAD EBOOK

Through the rise of big data and the internet of things, terrorist organizations have been freed from geographic and logistical confines and now have more power than ever before to strike the average citizen directly at home. This, coupled with the inherently asymmetrical nature of cyberwarfare, which grants great advantage to the attacker, has created an unprecedented national security risk that both governments and their citizens are woefully ill-prepared to face. Examining cyber warfare and terrorism through a critical and academic perspective can lead to a better understanding of its foundations and implications. Cyber Warfare and Terrorism: Concepts, Methodologies, Tools, and Applications is an essential reference for the latest research on the utilization of online tools by terrorist organizations to communicate with and recruit potential extremists and examines effective countermeasures employed by law enforcement agencies to defend against such threats. Highlighting a range of topics such as cyber threats, digital intelligence, and counterterrorism, this multi-volume book is ideally designed for law enforcement, government officials, lawmakers, security analysts, IT specialists, software developers, intelligence and security practitioners, students, educators, and researchers.


Evolving Software Processes

Evolving Software Processes

Author: Arif Ali Khan

Publisher: John Wiley & Sons

Published: 2022-01-05

Total Pages: 324

ISBN-13: 1119821754

DOWNLOAD EBOOK

EVOLVING SOFTWARE PROCESSES The book provides basic building blocks of evolution in software processes, such as DevOps, scaling agile process in GSD, in order to lay a solid foundation for successful and sustainable future processes. One might argue that there are already many books that include descriptions of software processes. The answer is “yes, but.” Becoming acquainted with existing software processes is not enough. It is tremendously important to understand the evolution and advancement in software processes so that developers appropriately address the problems, applications, and environments to which they are applied. Providing basic knowledge for these important tasks is the main goal of this book. Industry is in search of software process management capabilities. The emergence of the COVID-19 pandemic emphasizes the industry’s need for software-specific process management capabilities. Most of today’s products and services are based to a significant degree on software and are the results of largescale development programs. The success of such programs heavily depends on process management capabilities, because they typically require the coordination of hundreds or thousands of developers across different disciplines. Additionally, software and system development are usually distributed across geographical, cultural and temporal boundaries, which make the process management activities more challenging in the current pandemic situation. This book presents an extremely comprehensive overview of the evolution in software processes and provides a platform for practitioners, researchers and students to discuss the studies used for managing aspects of the software process, including managerial, organizational, economic and technical. It provides an opportunity to present empirical evidence, as well as proposes new techniques, tools, frameworks and approaches to maximize the significance of software process management. Audience The book will be used by practitioners, researchers, software engineers, and those in software process management, DevOps, agile and global software development.