Combating Computer Crime in Africa, Proposal for Pan African Cyber Crime Legal Framework

2010 ◽  
Author(s):  
F. Franklin Akinsuyi
2021 ◽  
pp. 129-134
Author(s):  
O. ZHEREBETS

The article substantiates the importance of universally recognized international principles in the field of international security. The scientific article outlines legal framework of international security law and grounds for increasing the number of basic principles of international law.


2018 ◽  
Author(s):  
Fransiska Novita Eleanora

computer crime (cyber crime) is a crime harm the consumers, especially in the field of commerce between business perpetrators and consumers. The method is bibliography study, the result show that the law of protection consumer ordinance (UUPK) cannot reach or give protection to consumers in particular which to cyber crime because the law is assumed to be week in doing in tackling and protection related to consumer rights.


Author(s):  
Aarthee R. ◽  
Ezhilmaran D.

This chapter describes how cybercrime, likewise called computer crime, is any illicit activity that includes a PC or system associated gadget. While numerous magnificent items have been produced to secure our information correspondence frameworks, these items must be upgraded significantly more. What is additionally required more are the individuals who know how to explore PC network security episodes and the individuals who have both investigative gifts and specialized knowledge of how the internet truly functions. This allows for an investigative structure which can withstand attack, alongside information of how the internet functions and the instruments to examine cybercrime apparatus to tell the who, where, what, when, why, and how. Cybercrime apparatus make our work substantially more productive.


2014 ◽  
Vol 72 (1) ◽  
Author(s):  
Tamrin Amboala ◽  
Ainnur Hafizah Anuar Mokhtar ◽  
Mohd Zulkifli Muhammad ◽  
Nasrul Hisyam Nor Muhamad

The paper presents a comparative study between the existing cyber laws in Malaysia and the Islamic perspective concerning four major issues in cyber space particularly concerning i) privacy, ii) trust, iii) theft and iv) contract. The study uses comparative approach from the main source of Islamic Syariah - Quran and Sunnah (tradition of the prophet s.aw.) and a thorough study of the existing law pertaining to cyber crime such as Communication and Multimedia Act 1998 and Computer Crime Act 1997. The study prevails that the above concerns principally seems to be consistent with Islamic view.  However, more extensive study must be carried out when it comes to implementation of these issues in e-commerce. With more than one billion Muslim population, the research will serve as a baseline for establishing an alternative view from Islamic perspective and cyber laws that taken into account approach based on Syariah to meet new challenges for Muslim Ummah in cyberspace.  


Author(s):  
Andreas Mitrakas ◽  
Damián Zaitch

The steep increase of cyber crime has rendered digital forensics an area of paramount importance to keep cyber threats in check and invoke legal safety and security in electronic transactions. This chapter reviews certain legal aspects of forensic investigation, the overall legal framework in the EU and U.S. and additional self-regulatory measures that can be leveraged upon to investigate cyber crime in forensic investigations. This chapter claims that while full-scale harmonisation of forensic investigation processes across the EU and beyond is unlikely to happen in the foreseeable future, cross-border investigations can be greatly facilitated by initiatives aiming at mutual assistance arrangements based on a common understanding of threats and shared processes. Involving the users through self-regulation and accountability frameworks might also contribute to reducing risks in electronic communications that emanate from cyber criminal threats.


Definition: - Computer crime is an offence or an attack done by the third party or the individual or group of people. It may be done in terms of many possible reasons like to steal some crucial information or data or money and all that possible things that may affect the victim mentally, financially or physically. Resources: - Internet, phone, hardware devices. Effects: - The coders may pollute some sort of codes which termed as viruses in the computers of the country men and may affect the security of the people at a very nominal grade but this is not all, it may also affects the norms and the rules of the organizational companies and may steal their crucial information. These types of people are termed as HACKER in the context of Cyber Security They also have an adverse effect on the economy of the country as the country may not have the proper rules and the cyber experts for securing of data and in that type of country no businessman may invest . Securing yourself: - Actually the computer polluters are the well-known people who have good enough knowledge of their work but we can still get out the attack held on us by using some precaution and using the proper paid and genuine antivirus as an survey has declared that in 58% of pc’s people have viruses due to their unpaid and local antivirus.


2020 ◽  
Vol 11 ◽  
pp. 41-44
Author(s):  
Konstantin N. Evdokimov ◽  

The problem of the evolution of computer crime into high-tech crime, its cross-border, transnational, organized and latent nature, requires the scientific community and law enforcement agencies to develop new conceptual approaches to counter this asocial phenomenon. In the scientific article, the author, taking into account the opinion of computer users, proposes a number of measures to prevent, combat and minimize the harmful consequences of computer crimes in the Russian Federation.


2008 ◽  
pp. 1681-1700
Author(s):  
Andreas Mitrakas ◽  
Damián Zaitch

The steep increase of cyber crime has rendered digital forensics an area of paramount importance to keep cyber threats in check and invoke legal safety and security in electronic transactions. This chapter reviews certain legal aspects of forensic investigation, the overall legal framework in the EU and U.S. and additional self-regulatory measures that can be leveraged upon to investigate cyber crime in forensic investigations. This chapter claims that while full-scale harmonisation of forensic investigation processes across the EU and beyond is unlikely to happen in the foreseeable future, cross-border investigations can be greatly facilitated by initiatives aiming at mutual assistance arrangements based on a common understanding of threats and shared processes. Involving the users through self-regulation and accountability frameworks might also contribute to reducing risks in electronic communications that emanate from cyber criminal threats.


2018 ◽  
Vol 3 (2) ◽  
pp. 107
Author(s):  
Uswatun Hasanah

Technology development cause crime in the world that keep fluctuating and changing.  Cyber crime is one of crime activities which takes place in the internet and develop fast globally, even faster than the conventional crime. Cyber crime is not only about computer-crime, cyber-terrrorist, cyber-narco-terrorist, but also capable to make impact toward state economy. This paper aims to understand the implementation of Islamic law or Islamic criminal law to see cyber crime. Islamic criminal law has been developed many years ago before arrival of information technology. This paper describes how Arab, Brunei Darussalam, and China reduce crime by adoption of islamic law. Islamic law what meant here is a law based on Islam, not a law made by Muslims then applied by Muslims. Islamic law can be practiced in every single country, although they don’t declare explicitly or they think that what have they done is not islamic law. Islamic law contains general principles to respon and develop efficient ways to overcome cyber-crime.


Sign in / Sign up

Export Citation Format

Share Document