Cyber-related crime in South Africa: extent and perspectives of state’s roleplayers

This article examines cyber-related crime in South Africa and the efforts of the South African criminal justice system in combating its scourge. Cyber criminals make use of cyberattack techniques such as malicious software and viruses that attach themselves to normal files, consequently reproducing...

Full description

Saved in:  
Bibliographic Details
Authors: Ezeji, Chiji L. (Author) ; Bello, Paul Oluwatosin (Author) ; Olutola, Adewale A. (Author)
Format: Electronic Article
Language:English
Published: 2018
In: Acta criminologica
Year: 2018, Volume: 31, Issue: 3, Pages: 93-110
Online Access: Volltext (Verlag)
Journals Online & Print:
Drawer...
Check availability: HBZ Gateway
Keywords:

MARC

LEADER 00000naa a22000002 4500
001 1744511292
003 DE-627
005 20210113105057.0
007 cr uuu---uuuuu
008 210113s2018 xx |||||o 00| ||eng c
035 |a (DE-627)1744511292 
035 |a (DE-599)KXP1744511292 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
100 1 |a Ezeji, Chiji L.  |e VerfasserIn  |4 aut 
245 1 0 |a Cyber-related crime in South Africa  |b extent and perspectives of state’s roleplayers 
264 1 |c 2018 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
520 |a This article examines cyber-related crime in South Africa and the efforts of the South African criminal justice system in combating its scourge. Cyber criminals make use of cyberattack techniques such as malicious software and viruses that attach themselves to normal files, consequently reproducing themselves to cause damage to a computer system, or network. Other techniques such as Worms, Trojan and Backdoor programs are also used to gain access to a computer system, or network. Viruses and malicious software can also be transported by cyber criminals. Other related cybercrimes in South Africa such as e-commerce fraud and identity theft, involves the use of email, or web pages, to convince victims to reveal their personal or financial information. These have increased. Stolen information is used by cyber criminals to further other crimes. Furthermore, online credit cards fraud has increased, and cyber bulling are witnessed in different schools in South Africa. A qualitative research approach, through in-depth interviews was adopted for this study, and twelve persons participated through purposive sampling. Findings from this study indicate (among others) that there is a shortage of criminal justice experts who are knowledgeable about cyber-related cases. In addition, the study found that legislation on cyber-related crime in South Africa are not sufficient enough to deter cyber criminals from venturing into the act. The study also found that while individual victims often fail to report the crime due to ignorance, organisations often forgo reporting cybercrimes in a bid to protect their reputation. The study makes recommendations from the findings. 
700 1 |a Bello, Paul Oluwatosin  |e VerfasserIn  |0 (DE-588)1165707608  |0 (DE-627)1029785309  |0 (DE-576)510521177  |4 aut 
700 1 |a Olutola, Adewale A.  |e VerfasserIn  |4 aut 
773 0 8 |i Enthalten in  |t Acta criminologica  |d Centurion : Sabinet, 1988  |g 31(2018), 3, Seite 93-110  |h Online-Ressource  |w (DE-627)369553802  |w (DE-600)2119109-8  |w (DE-576)306600269  |x 1012-8093  |7 nnns 
773 1 8 |g volume:31  |g year:2018  |g number:3  |g pages:93-110 
856 4 0 |u https://journals.co.za/content/journal/10520/EJC-14d9dc60ec  |x Verlag  |3 Volltext 
951 |a AR 
ELC |a 1 
LOK |0 000 xxxxxcx a22 zn 4500 
LOK |0 001 3834759678 
LOK |0 003 DE-627 
LOK |0 004 1744511292 
LOK |0 005 20210113105057 
LOK |0 008 210113||||||||||||||||ger||||||| 
LOK |0 040   |a DE-21-110  |c DE-627  |d DE-21-110 
LOK |0 092   |o n 
LOK |0 689   |a s  |a Investigation 
LOK |0 689   |a s  |a Manifestation of cybercrime 
LOK |0 689   |a s  |a Prevention 
LOK |0 689   |a s  |a Prosecution 
LOK |0 689   |a s  |a Seriousness 
LOK |0 852   |a DE-21-110 
LOK |0 852 1  |9 00 
LOK |0 935   |a krub  |a krzo 
OAS |a 1  |b inherited from superior work 
ORI |a SA-MARC-krimdoka001.raw