655 research outputs found
An In-Depth Look into Cybercrime
Cybercrime is an increasing area of study in the field of criminology. With the advancement of technology and the growing use of social media, people are connected all over the world more than they have ever been before. It is not the invention of new crimes but technology has allowed old crimes to be committed through a new medium. This paper explores the realm of cyberspace and how old crimes are being committed in new ways by different countries and people
Cybercrime Pervasiveness, Consequences, and Sustainable Counter Strategies
As our connectivity and dependency on technology increases, so does our vulnerability.
Technology has provided not only new tools, but also new opportunities
for criminals in the digital world. The abuse of new technologies has been threatening
economic and Jinancial security and actually devastating the lives of affected indivicluals. In Nigeria, cybercrime has recorded mostly foregin-based individuals
and organizations as victims thereby getting Nigeria ranked among
the nations with notorious pemasiveness of high-tech crimes. Indeed, adequately
formulating a strategy to contain the menace of cybercrime presents aformidable
challenge to law enforcement. This paper x-rays noted instances of cybercrime
pervasiveness, its devastating consequences, and up-to-date countermeasures in
Nigeria It develops an enforceable/sustainable framework to determine how critical
infrastructures are put at risk snd how law enforcement should react in responding
to the threats
The Global Risks Report 2016, 11th Edition
Now in its 11th edition, The Global Risks Report 2016 draws attention to ways that global risks could evolve and interact in the next decade. The year 2016 marks a forceful departure from past findings, as the risks about which the Report has been warning over the past decade are starting to manifest themselves in new, sometimes unexpected ways and harm people, institutions and economies. Warming climate is likely to raise this year's temperature to 1° Celsius above the pre-industrial era, 60 million people, equivalent to the world's 24th largest country and largest number in recent history, are forcibly displaced, and crimes in cyberspace cost the global economy an estimated US$445 billion, higher than many economies' national incomes. In this context, the Reportcalls for action to build resilience – the "resilience imperative" – and identifies practical examples of how it could be done.The Report also steps back and explores how emerging global risks and major trends, such as climate change, the rise of cyber dependence and income and wealth disparity are impacting already-strained societies by highlighting three clusters of risks as Risks in Focus. As resilience building is helped by the ability to analyse global risks from the perspective of specific stakeholders, the Report also analyses the significance of global risks to the business community at a regional and country-level
Cyber Security’s Influence on Modern Society
The world of cyber security is evolving every day, and cyber-criminals are trying to take advantage of it to gain as much money and power as possible. As the Internet continues to grow, more people around the world join the Internet. The purpose of this is to see how much of an importance cyber security has and how cyber-criminals are able to utilize the cyberworld for their own personal gain. Research has been done on how the cyberworld got where it is today. Additionally, individual research has been done in an effort to learn how to hack. A hack lab has been created and a study has been done to see if it is possible to hack into a cell phone within one month without obtaining any knowledge prior to the start of the study
Building a Trademark Safe Harbor for Contributory Counterfeiting Liaibility After Tiffany v. eBay
(Excerpt)
Since current anti-counterfeiting tools are not easily applied to the Internet, thereby diminishing their effectiveness, this Note argues that compensating for this deficiency requires legal provisions that encourage online service providers to implement both proactive and reactive anti-counterfeiting measures. After Tiffany, e-commerce businesses in the United States are only required to react appropriately to counterfeiting on their websites. Though it is well-settled that trademark owners must police their own brand, the Tiffany decision makes it extremely difficult and costly for owners to combat counterfeiting on their own. Furthermore, the Second Circuit’s application of a reactive law written specifically for secondary copyright infringement on the Internet does not effectively address the entire temporal range of harm posed by trademark infringement. Part I discusses the goals and policies underlying American trademark law and explains where counterfeiting fits in this framework. This Part also traces the development of the judicially-created doctrine of contributory trademark law and how it has been applied in counterfeiting cases. Part II compares the American approach to contributory trademark infringement to that of European courts. Part III analyzes and assesses how each approach addresses the harms of contributory trademark infringement on the Internet. Part IV proposes a legislative solution similar to the safe-harbor provisions of the DMCA, but tailored to the specific goals, policies, and harms faced by trademark owners. While the Second Circuit properly decided that a notice-and-takedown procedure is one effective way to combat trademark infringement on the Internet, it is a reactive mechanism that does not effectively address harms to trademarks owners and consumers that accrue even before someone buys a counterfeit item. For this reason, a safe-harbor provision for trademark law should incentivize online marketplaces like eBay to take preventive action against trademark infringement
Recommended from our members
Will Products Liability Litigation Help Protect IoT Users from Cyber-Physical Attacks?
While there is an identifiable trend towards protecting consumers from data breaches and data misuses related to IoT devices through new legislation, new regulations, government enforcement actions, and private lawsuits, there has been little progress towards creating similar legally enforceable standards of care for “cyber-physical device security.” This article explores this underdeveloped area of academic inquiry into cyber-physical device security within the context of product liability litigation in the United States. The two questions addressed in this article are: (1) Have there been any successful products liability court decisions in the United States that have held IoT manufacturers liable for creating IoT products with inadequate cyber-physical device security; and (2) Is it likely that product liability litigation will soon lead to significant change in IoT cyber-physical device security? Analysis of laws, regulations, and court cases shows that the answer to both questions is negative. These findings have implications for IoT device users, device manufacturers, and the government agencies whose job it is to deter data breaches and other IoT-related cyberattacks
Exploring the Challenges of Forensic Technology in Responding to Identity Document Theft in Polokwane Policing Area, South Africa
This study explores the challenges of forensic technology in responding to Identity Document (ID) theft as an approach used by the South African Police Service (SAPS) in the Polokwane policing area. This study further evaluates the availability of technological and conventional resources to respond to this scourge, as well as the capabilities of the SAPS to utilise the available [lack of forensic technology] resources to respond best to ID theft. This was done by analysing preventative measures, associated with these challenges, as faced by SAPS and other relevant stakeholders on responding to this crime in the Polokwane Central Business District (CBD), Bendor Park, and Flora Park, coupled with the number of stores situated in the business sectors of these selected areas. For this study, the researchers adopted a quantitative research approach with 90 respondents in the identified areas. This study established that the secretive nature of ID theft makes it difficult for the relevant stakeholders (Not limited to the local SAPS, Businesses, and Public members as presented by this study) to effectively respond to this scourge. Negatively, the forefront gatekeepers to respond to this crime are mainly SAPS Constables with less training to investigates ID theft properly. Thus, find themselves being more reactive than proactive, which contributes to the difficulty of locating potential perpetrators in the process of conventional investigations applications. Furthermore, ID thieves utilise advanced technological resources (I.e. Computer hacking software), as opposed to SAPS which does not have systems nor capacity to effectively respond to this crime. The limited resources at the disposal of SAPS also renders its effort in responding to this crime inadequate. For recommendations; significant emphases should be directed on the promotion of public awareness through public education for the use of forensic technology as an investigative and identification tool of responding to ID theft. The intensive training of SAPS officials and inter-governmental corroboration between SAPS, Department of Home Affairs (DHA), and other relevant stakeholders in understanding this technology are highly advised
- …