412 research outputs found

    Global cyber trends : a South African reality

    Get PDF
    Cyber trends are a reality across the globe. Not only are technology and electronic devices and media used more regularly in easing everyday activities, but these technological advances are also used in sophisticated criminal activities. Regardless of the global innovation and development ranking of a country, all countries tend to show the same global trends, either on a more or lesser scale. Some of the more prominent global trends are identified and discussed. This paper aims to show that these global cyber trends are also a reality in South Africa, by addressing some of the most prominent global trends. Based on the statistics available to support the presence of high cyber trends, as present in high ranked countries across the globe, this article shows that technology within South Africa has advanced to such an extent that the country is not unduly hurdled by large scale lack of connectivity and bandwidth, computer illiteracy, low Internet penetration and inadequate cyber crime related legislation. The discussion within this paper places South Africa on par with first world countries in terms of cyber trends

    Privacy and Security Concerns Associated with Mobile Money Applications in Africa

    Get PDF
    The rapid adoption of mobile money use in Africa raises concerns regarding the privacy and security of users, particularly in light of Financial Action Task Force recommendations requiring user transparency and the collection of transaction data. The transparency required of the now-financially-included—particularly in nations with weak adherence to the rule of law and limited privacy protections—leaves users vulnerable to abuse. Further, the increasing complexity of mobile phone use that is indicative of mobile money applications raises concerns regarding Africa’s preparedness for heightened security threats that come hand in hand with increased use. To address these problems, the authors of this Article recommend specific policy actions by African nations to improve consumer privacy and cybersecurity, supported by policies of industrialized nations like the United States and responsible corporate behavior

    Cybercrime and the double-edged sword of state survelliance in South Africa

    Get PDF
    Abstract: This article uses the recent cyber attack on one of South Africa’s largest financial institutions Liberty Holdings as an entry point to illustrate the challenge of cybercrime for the boardrooms of big capital in South Africa. This breach reinforces arguments raised for enhancing the state’s capacity to police cybercrime. Against this backdrop, the article reflects on the debate around the policing of cybercrime in South Africa, highlighting arguments that the way in which the state attempts to deal with this growing problem has also created fears of the emergence of a surveillance state with unfettered powers lodged in intelligence agencies. This debate has been sharpened by recent exposés of the corruption seemingly endemic to South African intelligence services, revelations that some of its leading personnel were gerrymandered to settle internal battles within the ruling African National Congress (ANC), and more shocking, the allegation that a key agency tasked with providing IT to the country’s entire public service might have been captured by one supplier

    We Want To Do It Our Way: The Neutralisation Approach to Managing Information Systems Security by Small Businesses

    Get PDF
    Small businesses thrive in the developing economy of South Africa and address the important issue of unemployment and poverty that exists in the country. A large number of these businesses can be found in the province of Gauteng due to the large and diverse economic contribution the province delivers to the economy of South Africa. With the increased use of Information Systems (IS) by small businesses across the Gauteng province and in South Africa generally, there is increasingly constant exposure to information security risks. Interestingly, standards such as NISTIR 7621 specifically tailored to small businesses and which could offer great insights on how to manage security risks are by and large not followed to the letter. We find in our work that owner-managers prefer to handle matters of security ‘in their own terms’ and apply neutralisation (termed rationalisation) techniques to overcome the effects posed by security threats. We used four instrumental cases for this purpose. Our findings suggest that neutralisation manifests as values held by owner-managers and this can often create the unintended consequences of exacerbating security risk to these small businesses

    Cybercrime awareness and reporting in the public sector in Botswana

    Get PDF
    Includes abstract.Includes bibliographical references.Different authors have reported on the problem of cybercrime and other concepts that are associated with it. The studies looking at the area of ICT and cybercrime are examined and assessed to identify gaps that exist. Nevertheless, most of these studies focused more on developed countries, and did not emphasise on the public sector. Therefore, their findings might not be appropriately applicable to governments in developing countries especially within the Africa context. This study seeks to investigate factors that are necessary to enable the Botswana public sector to properly report on cybercrime attacks. The ICT environment of Botswana government is explored to determine the extent of ICT utilisation in the public sector. Based on the literature survey, a research framework for reporting cybercrime for the Botswana public sector is formulated

    E-Commerce Adoption among Small and Medium Enterprises in Ghana

    Get PDF
    This study investigates the adoption of e-commerce among small and medium enterprises in Ghana. The quantitative survey approach was employed for the conduct of this study. A structured questionnaire was used to obtain data from a sample size of 291 representatives of SMEs across four (4) administrative regions in Ghana. This study applied the binary logistic regression model and Friedman test analytical techniques. The study's findings revealed that most SMEs in Ghana had adopted at least one form of e-commerce level. The study further revealed that the decision to adopt and implement e-commerce among SMEs in Ghana is dependent on perceived relative advantage, IT knowledge of owners/managers, perceived risk/ security factor, and perceived Compatibility with existing infrastructure, culture, and values of the firm. Significant challenges hindering e-commerce adoption among SMEs in Ghana as identified in this study include high internet traffic, cost of running and maintaining e-commerce operations reliability of service, internet connection failures, as well as doubts about having the implementation of economies of scale and scope in alliance with strategic networks, the maintenance of unblemished ethical conduct by retail e-commerce firms, and the incorporation of protection and privacy policy statement on electronic platforms of firms

    What's Going on in Community Media

    Get PDF
    What's Going On in Community Media shines a spotlight on media practices that increase citizen participation in media production, governance, and policy. The report summarizes the findings of a nationwide scan of effective and emerging community media practices conducted by the Benton Foundation in collaboration with the Community Media and Technology Program of the University of Massachusetts, Boston. The scan includes an analysis of trends and emerging practices; comparative research; an online survey of community media practitioners; one-on-one interviews with practitioners, funders and policy makers; and the information gleaned from a series of roundtable discussions with community media practitioners in Boston, Chicago, Minneapolis/St. Paul, and Portland, Oregon

    The representation of the use of social media for committing cyber-crimes in selected South African newspapers

    Get PDF
    This study aimed to provide insights into the manner in which the representation of social media usage in relation to cyber-related crimes within selected South African newspapers can potentially shape the ideas and perceptions that society may have towards social networking channels. Drawing on the literature from fields such as developmental studies, new media studies, identity formation and cyber-criminality, an analysis of the Price Water House Coopers Global Economic Survey (2011) was used to provide some insight into the issue of cyber-crime within South Africa. The survey which was conducted by Price Water House Coopers revealed that South Africa is ranked second in the world with the highest rate of reported fraud cases. According to them this rate is comparatively higher than the escalating percentage of cases reported in the United States and other nations. In order to correlate and illustrate some of the findings of the survey and that which was found through primary research, an in-depth content analysis applying limited designations analysis and detailed assertions analysis techniques (Du Plooy, 2007) has been performed on selected content from local print and online publications such as The Herald, Algoa Sun, The Weekend Post, The Sunday Times and News24, from the time period of January 2009 until January 2012. Herewith, a total of 125 articles were analysed in order to determine the tone and thematic nature of the communication within the respective platforms. Furthermore, the mass media has been argued as being the main platform of communication within society. Whereby, different communication techniques are used to communicate with different target audiences. On a theoretical level, the study explored whether or not social media perpetuates the prejudices of the modernisation theory or serves to challenge such prejudices. Furthermore, the study explored whether social media may potentially have an impact on the reported cyber-related crimes. Associated theory such as the representation theory, globalization, the privacy trust model, social contract theory, media richness theory, participatory theory, convergence, the digital divide, media-centricity, dependency and identity formation has been explored. It was found that social networking sites Facebook and Mxit have been represented as the most common platforms of cyber-related crime and women and teenagers are the most popular victims. The likelihood of individuals being exposed to cyber-crime within social networks is high due to the fact in order to develop online relationships, personal information needs to be shared. The Privacy Trust model was identified as being an important factor which shaped the findings of this study. This is due to the fact that a certain level of trust is held by social network subscribers to the Internet hosts who they entered into a social contract with and with their friends

    Information security awareness in small information technology-dependent business organisations

    Get PDF
    M.A. (Business Management)Small businesses thrive in the developing economy of South Africa and address the important issue of unemployment and poverty that exist in the country. A large number of these business organisations can be found in the province of Gauteng because of the large and diverse economic contribution the province delivers to the economy of South Africa. With the increased use of technology in the small businesses of Gauteng and South Africa, the risks around cyber-security, information security and other IT-related threats that can harm the businesses increase. As part of the related IT risks comes the information security awareness of the businesses. Research findings show that little to no information security awareness exists in the small IT-dependent business organisations of Gauteng, South Africa. New knowledge has been gained from the information technology uses and information security awareness that exists in small business organisations. This knowledge is specific to the small business organisations of South Africa which places an African context to a global debate of information security awareness
    • …
    corecore