655 research outputs found

    An In-Depth Look into Cybercrime

    Get PDF
    Cybercrime is an increasing area of study in the field of criminology. With the advancement of technology and the growing use of social media, people are connected all over the world more than they have ever been before. It is not the invention of new crimes but technology has allowed old crimes to be committed through a new medium. This paper explores the realm of cyberspace and how old crimes are being committed in new ways by different countries and people

    Cybercrime Pervasiveness, Consequences, and Sustainable Counter Strategies

    Get PDF
    As our connectivity and dependency on technology increases, so does our vulnerability. Technology has provided not only new tools, but also new opportunities for criminals in the digital world. The abuse of new technologies has been threatening economic and Jinancial security and actually devastating the lives of affected indivicluals. In Nigeria, cybercrime has recorded mostly foregin-based individuals and organizations as victims thereby getting Nigeria ranked among the nations with notorious pemasiveness of high-tech crimes. Indeed, adequately formulating a strategy to contain the menace of cybercrime presents aformidable challenge to law enforcement. This paper x-rays noted instances of cybercrime pervasiveness, its devastating consequences, and up-to-date countermeasures in Nigeria It develops an enforceable/sustainable framework to determine how critical infrastructures are put at risk snd how law enforcement should react in responding to the threats

    The Global Risks Report 2016, 11th Edition

    Get PDF
    Now in its 11th edition, The Global Risks Report 2016 draws attention to ways that global risks could evolve and interact in the next decade. The year 2016 marks a forceful departure from past findings, as the risks about which the Report has been warning over the past decade are starting to manifest themselves in new, sometimes unexpected ways and harm people, institutions and economies. Warming climate is likely to raise this year's temperature to 1° Celsius above the pre-industrial era, 60 million people, equivalent to the world's 24th largest country and largest number in recent history, are forcibly displaced, and crimes in cyberspace cost the global economy an estimated US$445 billion, higher than many economies' national incomes. In this context, the Reportcalls for action to build resilience – the "resilience imperative" – and identifies practical examples of how it could be done.The Report also steps back and explores how emerging global risks and major trends, such as climate change, the rise of cyber dependence and income and wealth disparity are impacting already-strained societies by highlighting three clusters of risks as Risks in Focus. As resilience building is helped by the ability to analyse global risks from the perspective of specific stakeholders, the Report also analyses the significance of global risks to the business community at a regional and country-level

    Cyber Security’s Influence on Modern Society

    Get PDF
    The world of cyber security is evolving every day, and cyber-criminals are trying to take advantage of it to gain as much money and power as possible. As the Internet continues to grow, more people around the world join the Internet. The purpose of this is to see how much of an importance cyber security has and how cyber-criminals are able to utilize the cyberworld for their own personal gain. Research has been done on how the cyberworld got where it is today. Additionally, individual research has been done in an effort to learn how to hack. A hack lab has been created and a study has been done to see if it is possible to hack into a cell phone within one month without obtaining any knowledge prior to the start of the study

    Building a Trademark Safe Harbor for Contributory Counterfeiting Liaibility After Tiffany v. eBay

    Get PDF
    (Excerpt) Since current anti-counterfeiting tools are not easily applied to the Internet, thereby diminishing their effectiveness, this Note argues that compensating for this deficiency requires legal provisions that encourage online service providers to implement both proactive and reactive anti-counterfeiting measures. After Tiffany, e-commerce businesses in the United States are only required to react appropriately to counterfeiting on their websites. Though it is well-settled that trademark owners must police their own brand, the Tiffany decision makes it extremely difficult and costly for owners to combat counterfeiting on their own. Furthermore, the Second Circuit’s application of a reactive law written specifically for secondary copyright infringement on the Internet does not effectively address the entire temporal range of harm posed by trademark infringement. Part I discusses the goals and policies underlying American trademark law and explains where counterfeiting fits in this framework. This Part also traces the development of the judicially-created doctrine of contributory trademark law and how it has been applied in counterfeiting cases. Part II compares the American approach to contributory trademark infringement to that of European courts. Part III analyzes and assesses how each approach addresses the harms of contributory trademark infringement on the Internet. Part IV proposes a legislative solution similar to the safe-harbor provisions of the DMCA, but tailored to the specific goals, policies, and harms faced by trademark owners. While the Second Circuit properly decided that a notice-and-takedown procedure is one effective way to combat trademark infringement on the Internet, it is a reactive mechanism that does not effectively address harms to trademarks owners and consumers that accrue even before someone buys a counterfeit item. For this reason, a safe-harbor provision for trademark law should incentivize online marketplaces like eBay to take preventive action against trademark infringement

    Exploring the Challenges of Forensic Technology in Responding to Identity Document Theft in Polokwane Policing Area, South Africa

    Get PDF
    This study explores the challenges of forensic technology in responding to Identity Document (ID) theft as an approach used by the South African Police Service (SAPS) in the Polokwane policing area. This study further evaluates the availability of technological and conventional resources to respond to this scourge, as well as the capabilities of the SAPS to utilise the available [lack of forensic technology] resources to respond best to ID theft. This was done by analysing preventative measures, associated with these challenges, as faced by SAPS and other relevant stakeholders on responding to this crime in the Polokwane Central Business District (CBD), Bendor Park, and Flora Park, coupled with the number of stores situated in the business sectors of these selected areas. For this study, the researchers adopted a quantitative research approach with 90 respondents in the identified areas. This study established that the secretive nature of ID theft makes it difficult for the relevant stakeholders (Not limited to the local SAPS, Businesses, and Public members as presented by this study) to effectively respond to this scourge. Negatively, the forefront gatekeepers to respond to this crime are mainly SAPS Constables with less training to investigates ID theft properly. Thus, find themselves being more reactive than proactive, which contributes to the difficulty of locating potential perpetrators in the process of conventional investigations applications. Furthermore, ID thieves utilise advanced technological resources (I.e. Computer hacking software), as opposed to SAPS which does not have systems nor capacity to effectively respond to this crime. The limited resources at the disposal of SAPS also renders its effort in responding to this crime inadequate. For recommendations; significant emphases should be directed on the promotion of public awareness through public education for the use of forensic technology as an investigative and identification tool of responding to ID theft. The intensive training of SAPS officials and inter-governmental corroboration between SAPS, Department of Home Affairs (DHA), and other relevant stakeholders in understanding this technology are highly advised

    Doxxing to Deter: Citizen Activism on Social Media

    Get PDF
    • …
    corecore