E-Crime: an analytical study and Possible Ways to Combat
Mohammad Talib and Virginiah Sekgwathe. Article: E-Crime: an analytical study and Possible Ways to Combat. International Journal of Applied Information Systems 2(2):1-8, May 2012. BibTeX
@article{key:article, author = "Mohammad Talib and Virginiah Sekgwathe", title = "Article: E-Crime: an analytical study and Possible Ways to Combat", journal = "International Journal of Applied Information Systems", year = 2012, volume = 2, number = 2, pages = "1-8", month = "May", note = "Published by Foundation of Computer Science, New York, USA" }
Abstract
The internet is a powerful tool for development, paradoxically it is a double edged sword providing opportunities for governments, business industry etc to develop and operate reaching the international landscape at the same time equipping the greed motivated individuals with risk free opportunities of committing crime. Cyber crime, and cyber attacks or remotely controlled attacks affect our daily lives hence no government, public and private sector can afford to ignore. E-crime observably requires that the cyberspace be regulated in order to achieve independent, in depth analysis of the phenomena and of course accomplish cyber justice and deterrence. Lack of Internationally harmonized legislation, penalty, the knowledge and expertise of cyber criminals, the lagging behind of the law enforcement agencies, judiciary, legislators, prosecutors, academia etc, and of course victims' failure to report cyber crime incidents seriously inhibit the combat against this high tech crime
Reference
- Amol Vyavhare, Cyber Forensic tools http://www. articleswave. com/computerarticles/top-cyber-forensic-tools. html last accessed on 02/11/2009
- Brian Stanford et. Al. , Challenges and achievements in e-business and e-work, google books, 2002
- Bullis K (2007), Ultradense Molecular Memory, MIT Technology Review http://www. technologyreview. com/Nanotech/18100/ available from last accessed 10th March 2011
- Computer Forensics, Cybercrime and Steganography http://www. forensics. nl/links/ Accessed 02/11/2009
- Cyber crime losses almost doubled, available from http://www. theregister. co. uk/2010/03/15/cybercrime_complaint_surge/ last accessed on 30/02/2011
- Cyber Crimes and Computer related Crimes Act, of Botswana, 2007, available from http://www. itu. int/ITU-D/projects/ITU_EC_ACP/hipssa/Activities/SA/docs/SA-1_Legislations/Botswana/CYBERCRIMES. pdf last accessed 20/03/2012
- Fombard CM and Quansah EK, The Botswana Legal System, LexisNexis Interpak Books, Pietermaritzburg, 2008
- High Court throws out former BOB employee's bail bid, Botswana Daily News dated 9th June, 2003 available from last accessed 10th March 2012
- IOLScitech 2011, Top five cyber threats facing consumers, available from http://www. iol. coza/scitech/technology/security/top-five-cyberthreats-facing-consumers-1. 1009335 last accessed on 22/04/2011
- Knight W, (2005), Holographic Memory Discs May Put DVDs to shame, NewScietist. com, available from http://www. newscientist. com/article. ns?id=dn8370 last accessed 10th March 2012
- Lai, S, Current status of the Phase Change Memory and its Future, available from http://www. intel. com/research/documents/Stefan-IEDM-1203-PAPER. PDF last accessed 12/03/2011
- Lecture on "Electrical Units of Measurement" (3 May 1883), published in Popular Lectures Vol. I, p. 73; quoted in Encyclopaedia of Occupational Health and Safety (1998) by Jeanne Mager Stellman, p. 1992 available from http://zapatopi. net/kevin/quotes/ and http://en. wikiquote. org/wiki/William_Thomson last accessed on 23/02/2011
- Marcella A and Doug Menendez, Cyber Forensics, A field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, 2nd Edition, Library of Congress Cataloguing- in Publication Data, 2007
- Muller Robert, Statement to Senate Judiciary Committee, December 2, 2006, available from http://www. fbi. gov/congress/congress06/mueller200606. htm accessed on 30/03/2011
- Report on Progress of MP's e-strategy dated 25/01/2007, available from www. mpa. gov. uk/committees/mpa/2007/070125/10/, last accessed 05/03/2012
- Research Centre For Educational Technology (RCET), Ubiquitous Computing, available from http://www. rcet. org/ubicomp/what. htm, last accessed 02/02/2012
- Sekgwathe V. and Talib M, Cyber Forensics; Computer Security and Incident Response, available from http://www. sdiwc. net/digital-library/web-admin/upload-pdf/00000149. pdf last accessed 12/03/2012
- Simon Young, Civil Forfeiture of Criminal Property, Legal Measures for Targeting the Proceeds of Crime, Library of Congress Cataloguing- in Publication Data, 2009
- Stanley Brodsky, Expert Expert Witness, More Maxims and Guidelines for Testifying in Court, Library of Congress Cataloguing- in Publication Data, 2006
- Temane's over P1million case heard at the magistrate court, Botswana Daily News dated 19th February, 2002, available from http://www. dailynews. gov. bw/cgi-bin/news. cgi, last accessed 10th March 2011
- The World Bank Group, Financial Intelligence Units, An Overview, International Monetary Fund Publication Services, Library of Congress Cataloguing- in Publication Data, 2004
- United States Department of Justice, District of Oregon (1999). First Criminal Copyright Conviction Under "No Electronic Theft (NET) Act for Unlawful Distribution of Software on the Internet available from http://www. usdoj. gov/opa/pr/1999/August/371crm. htm last accessed 22/03/2011
Keywords
E-crime, Online Security, E-evidence, Ict