Google scholar arxiv informatics ads IJAIS publications are indexed with Google Scholar, NASA ADS, Informatics et. al.

Call for Paper

-

July Edition 2021

International Journal of Applied Information Systems solicits high quality original research papers for the July 2021 Edition of the journal. The last date of research paper submission is June 15, 2021.

E-Crime: an analytical study and Possible Ways to Combat

Mohammad Talib, Virginiah Sekgwathe Published in

International Journal of Applied Information Systems
Year of Publication 2012
© 2010 by IJAIS Journal
10.5120/ijais12-450261
Download full text
  1. Mohammad Talib and Virginiah Sekgwathe. Article: E-Crime: an analytical study and Possible Ways to Combat. International Journal of Applied Information Systems 2(2):1-8, May 2012. BibTeX

    @article{key:article,
    	author = "Mohammad Talib and Virginiah Sekgwathe",
    	title = "Article: E-Crime: an analytical study and Possible Ways to Combat",
    	journal = "International Journal of Applied Information Systems",
    	year = 2012,
    	volume = 2,
    	number = 2,
    	pages = "1-8",
    	month = "May",
    	note = "Published by Foundation of Computer Science, New York, USA"
    }
    

Abstract

The internet is a powerful tool for development, paradoxically it is a double edged sword providing opportunities for governments, business industry etc to develop and operate reaching the international landscape at the same time equipping the greed motivated individuals with risk free opportunities of committing crime. Cyber crime, and cyber attacks or remotely controlled attacks affect our daily lives hence no government, public and private sector can afford to ignore. E-crime observably requires that the cyberspace be regulated in order to achieve independent, in depth analysis of the phenomena and of course accomplish cyber justice and deterrence. Lack of Internationally harmonized legislation, penalty, the knowledge and expertise of cyber criminals, the lagging behind of the law enforcement agencies, judiciary, legislators, prosecutors, academia etc, and of course victims' failure to report cyber crime incidents seriously inhibit the combat against this high tech crime

Reference

  1. Amol Vyavhare, Cyber Forensic tools http://www. articleswave. com/computerarticles/top-cyber-forensic-tools. html last accessed on 02/11/2009
  2. Brian Stanford et. Al. , Challenges and achievements in e-business and e-work, google books, 2002
  3. Bullis K (2007), Ultradense Molecular Memory, MIT Technology Review http://www. technologyreview. com/Nanotech/18100/ available from last accessed 10th March 2011
  4. Computer Forensics, Cybercrime and Steganography http://www. forensics. nl/links/ Accessed 02/11/2009
  5. Cyber crime losses almost doubled, available from http://www. theregister. co. uk/2010/03/15/cybercrime_complaint_surge/ last accessed on 30/02/2011
  6. Cyber Crimes and Computer related Crimes Act, of Botswana, 2007, available from http://www. itu. int/ITU-D/projects/ITU_EC_ACP/hipssa/Activities/SA/docs/SA-1_Legislations/Botswana/CYBERCRIMES. pdf last accessed 20/03/2012
  7. Fombard CM and Quansah EK, The Botswana Legal System, LexisNexis Interpak Books, Pietermaritzburg, 2008
  8. High Court throws out former BOB employee's bail bid, Botswana Daily News dated 9th June, 2003 available from last accessed 10th March 2012
  9. IOLScitech 2011, Top five cyber threats facing consumers, available from http://www. iol. coza/scitech/technology/security/top-five-cyberthreats-facing-consumers-1. 1009335 last accessed on 22/04/2011
  10. Knight W, (2005), Holographic Memory Discs May Put DVDs to shame, NewScietist. com, available from http://www. newscientist. com/article. ns?id=dn8370 last accessed 10th March 2012
  11. Lai, S, Current status of the Phase Change Memory and its Future, available from http://www. intel. com/research/documents/Stefan-IEDM-1203-PAPER. PDF last accessed 12/03/2011
  12. Lecture on "Electrical Units of Measurement" (3 May 1883), published in Popular Lectures Vol. I, p. 73; quoted in Encyclopaedia of Occupational Health and Safety (1998) by Jeanne Mager Stellman, p. 1992 available from http://zapatopi. net/kevin/quotes/ and http://en. wikiquote. org/wiki/William_Thomson last accessed on 23/02/2011
  13. Marcella A and Doug Menendez, Cyber Forensics, A field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, 2nd Edition, Library of Congress Cataloguing- in Publication Data, 2007
  14. Muller Robert, Statement to Senate Judiciary Committee, December 2, 2006, available from http://www. fbi. gov/congress/congress06/mueller200606. htm accessed on 30/03/2011
  15. Report on Progress of MP's e-strategy dated 25/01/2007, available from www. mpa. gov. uk/committees/mpa/2007/070125/10/, last accessed 05/03/2012
  16. Research Centre For Educational Technology (RCET), Ubiquitous Computing, available from http://www. rcet. org/ubicomp/what. htm, last accessed 02/02/2012
  17. Sekgwathe V. and Talib M, Cyber Forensics; Computer Security and Incident Response, available from http://www. sdiwc. net/digital-library/web-admin/upload-pdf/00000149. pdf last accessed 12/03/2012
  18. Simon Young, Civil Forfeiture of Criminal Property, Legal Measures for Targeting the Proceeds of Crime, Library of Congress Cataloguing- in Publication Data, 2009
  19. Stanley Brodsky, Expert Expert Witness, More Maxims and Guidelines for Testifying in Court, Library of Congress Cataloguing- in Publication Data, 2006
  20. Temane's over P1million case heard at the magistrate court, Botswana Daily News dated 19th February, 2002, available from http://www. dailynews. gov. bw/cgi-bin/news. cgi, last accessed 10th March 2011
  21. The World Bank Group, Financial Intelligence Units, An Overview, International Monetary Fund Publication Services, Library of Congress Cataloguing- in Publication Data, 2004
  22. United States Department of Justice, District of Oregon (1999). First Criminal Copyright Conviction Under "No Electronic Theft (NET) Act for Unlawful Distribution of Software on the Internet available from http://www. usdoj. gov/opa/pr/1999/August/371crm. htm last accessed 22/03/2011

Keywords

E-crime, Online Security, E-evidence, Ict