211 research outputs found

    Evaluation of Efficiency of Cybersecurity

    Get PDF
    Uurimistöö eesmärgiks on uurida, kuidas tõhus küberjulgeolek on olnud edukas. Uurimistöö kasutab parima võimaliku tulemuse saamiseks mitmesuguseid uurimismeetodeid ja kirjanduse ülevaade on süstemaatiline. Kuid uurimistöö järeldus on see, et uuring ei suuda kinnitada või tagasi lükata peamist töö hüpoteesi. Uuring ei õnnestunud, sest puuduvad korralikud teooriad, mis näitavad ohutuse ja küberjulgeoleku nähtusi ning puuduvad head näitajad, mis annaksid küberohutuse tõhususe kohta kehtivaid ja ratsionaalseid tulemusi, kui hästi on küberkuritegevuse abil õnnestunud küberkuritegevuse tõhusaks võitmiseks ja küberkuritegude tõhusaks vähendamiseks. Seepärast on küberjulgeoleku teadusteooria ja julgeoleku teadusteooria vähearenenud 2018. aastal. Uuringud on teinud küberjulgeoleku ja turvalisuse arendamise põhilisi avastusi. Edasiste põhiuuringute suund on luua üldine turbeteooria, mis kirjeldab ohtlike muutujate ohtlike muutujate kavatsust, ressursse, pädevust ja edusamme ohtlike muutujate ja aksioomide puhul, kus ohtlike muutujate mõõtmisel saab teha selle sisse loodetavas ja teooria kirjeldab, millised on tõhusad meetmed, et vältida ja leevendada ning millised ei ole ja lõpuks kehtestada nõuetekohased mõõdikud, et mõõta turvalisuse ja küberjulgeoleku tõhusust loodetavus ja kehtivusega.The purpose of the thesis is to research how effectively cybersecurity has succeeded on its mission. The thesis used multiple research methods to get best possible answer and the literature review has been systematic. However, the conclusion of the research was that the study is unable to either confirm or reject the main working hypothesis. The study is unable to do it because of the lack of proper theories to describe what are the phenomena in secu-rity and cybersecurity and the lack of proper metrics to give valid and sound conclusion about the effective of cybersecurity and how well have cybersecurity succeed on its mis-sion to effectively prevent and mitigate cybercrime. Therefore, the science of security and science of cybersecurity are underdeveloped in 2018. The research has made basic discov-eries of development of cybersecurity and security. A direction of further basic research is to establish a general theory of security which describes threat variables, threat variables intention, resources, competence and progress of the threat variables and axioms where measurement of threat variables can be made with reliability and the theory would describe which are effective measures to prevent and mitigate and which are not and finally, estab-lish proper metrics to measure efficiency of security and cybersecurity with reliability and validity

    An analysis of cybercrime investigation by Directorate for Priority Crime investigation

    Get PDF
    Cybercrime has taken on epic proportions and it is rapidly becoming a major threat in South Africa; as technology evolves, similarly the cyber criminals become more innovative. The following problems were identified by the researcher during interviews conducted: Investigations require adequate resources to investigate such crimes. There is a need for continuous training to keep abreast of the ever-changing technology. The lack of skills and knowledge required for investigating cybercrime. The research design that was used in the study is a qualitative research approach. The sixteen research participants who met the requirements of the study were selected by means of purposive sampling. Interviews were used to collect data. The aim of the study is to analyse the impact of computer crime in South Africa and determine whether detectives of the South African Police Service (SAPS) and Directorate for Priority Crime Investigation (DPCI) officials possess the relevant skills required to investigate cybercrimes. Various literature reviews were consulted to gather information on other Authors’ findings on this area of study.Criminology and Security ScienceM.A. (Criminal Justice

    Strengthening e-crime legislation in the UAE: learning lessons from the UK and the EU

    Get PDF
    The electronic revolution brought with it technological innovations that are now integral to communication, business, commerce and the workings of governments all over the world. It also significantly changed the criminal landscape. Globally it has been estimated that crime conducted via the internet (e-crime) costs more than €290 billion annually. Formulating a robust response to cybercrime in law is a top priority for many countries that presents ongoing challenges. New cybercrime trends and behaviours are constantly emerging, and debates surrounding legal provisions to deal with them by increasing online tracking and surveillance are frequently accompanied by concerns of the rights of citizens to freedom, privacy and confidentiality. This research compares the ways that three different legislative frameworks have been navigating these challenges. Specifically, it examines the legal strategies of the United Arab Emirates (UAE), the United Kingdom (UK) and the European Union (EU). The UAE is comparatively inexperienced in this area, its first law to address e-crime was adopted in 2006, sixteen years after the UK, and so the express purpose of this study is to investigate how e-crime legislation in the UAE can be strengthened. Drawing on a range of theoretical resources supplemented with empirical data, this research seeks to provide a comprehensive account of how key e-crime legislation has evolved in the UAE, the UK and the EU, and to evaluate how effective it has been in tackling cybercrime. Integral to this project is an analysis of some of the past and present controversies related to surveillance, data retention, data protection, privacy, non-disclosure and the public interest. An important corollary of this research is how e-crime legislation is not only aligned with political and economic aims, but when looking at the UAE, the discrete ways that legislation can be circumscribed by cultural, social and religious norms comes into focus

    Law and Judicial Application of Digital Forensic Evidence in Nigeria

    Get PDF
    The development of information & communication technology has left the Nigerian polity to the application of technology infrastructure to daily activities. In essence, disputes arising from these activities may ordinarily not be effectively settled without applying electronic evidence in proceedings before the courts. The skills and knowledge of electronic evidence require the ingenuity of forensic experts or examiners for the purpose of bridging the gap that may arise in the mind of the courts. Does the Nigerian Law accept forensic expert evidence? Is every evidence expert evidence? Are there set down conditions before the courts for forensic expert evidence to be accepted or applied to proceedings before the courts? What nature of cases requires forensic evidence? This paper  will  demonstrate how  information and communication technology has resulted in the application of digital devices by Nigerians and the nature of the impact it  has . Keywords: Digital Forensics Evidence, Forensics Examiners, Digital Forensics Experts, Law, Judicial application DOI: 10.7176/JLPG/96-08 Publication date: April 30th 202

    Law Enforcement Officers’ Perceptions in Combating Cybercrime at the Local Level

    Get PDF
    Cybercrime has become one of the fastest-growing concerns for law enforcement agencies at the federal, state, and municipal levels. This qualitative case study examined the perceptions of nine law enforcement officers’ from Texas regarding combating cybercrime at the local level. The conceptual framework was based on the structural contingency theory and Porter and Lawler’s theory of motivation. Data collection consisted of semistructured interviews, where member-checking helped to enhance the trustworthiness. In addition, data gathered from interview transcripts were inductively coded and used to organize data into categories to determine the themes in the study. Most of the participants in this study perceived that law enforcement agencies were not equipped to take a more prominent role in cybercrime investigations because of the lack of experience and resources. Participants also provided recommendations to address cybercrime at the local level, including helping community members understand cybercrime threats while empowering the public to become safer and more secure during online activity. Finally, many of the participants suggested that creating multiple cybercrime task forces located in major cities throughout the United States could serve as a method of combating cybercrime at the local level. This study’s positive social change implications include providing information to law enforcement agencies about potential gaps in combating cybercrime at the local level, along with recommendations for more streamlined cybercrime training for law enforcement officers to increase officer efficiencies in cybercrimes

    A Review of The Challenges of Paperless Concept In The Society 5.0

    Get PDF
    The world will start a new era of society where technology and humans can collaborate to solve social problems. Many countries have ridden into the 4.0 era in the industrial revolution. In reality, Japan began to introduce Society 5.0, where the concept was the answer to the industrial revolution 4.0. Society 5.0 applies the human-centered concept based on information technology. In fact, there has been no in-depth study of the advantages and challenges of implementing paperless in various fields. The purpose of this paper is to review the challenges and the advantages of the paperless concept using Narrative Literature Review to provide an objective analysis of the paperless concept. The objects research discussed including industry/manufacturing, education, medical, and government. This paper provides an in-depth study and analysis of the paperless concept's advantages and challenges related to hardware and software maintenance, data security and reliability, human resources technical skills, social interaction, and disaster recovery strategy
    • …
    corecore