
تعداد نشریات | 163 |
تعداد شمارهها | 6,878 |
تعداد مقالات | 74,135 |
تعداد مشاهده مقاله | 137,876,104 |
تعداد دریافت فایل اصل مقاله | 107,235,196 |
Exploring Responses to Cybercrime in South Africa: The South African Police Services (SAPS) Perspectives | ||
Journal of Cyberspace Studies | ||
مقالات آماده انتشار، پذیرفته شده، انتشار آنلاین از تاریخ 01 مرداد 1404 اصل مقاله (574.8 K) | ||
نوع مقاله: Review article | ||
شناسه دیجیتال (DOI): 10.22059/jcss.2025.395262.1149 | ||
نویسندگان | ||
Slindile Ngcece1؛ Sazelo Mkhize2؛ Khanyisile B Majola* 2 | ||
1Department of Humanities, School of Applied Human Sciences, University of Kwa Zulu Natal, KwaZulu-Natal, South Africa. | ||
2Department of Criminology and Security Science, School of Criminal Justice College of Law, The University of South Africa (UnISA), Pretoria, South Africa. | ||
چکیده | ||
Background: The rapid development of technology and computing has significantly impacted modern societies, leading to increased opportunities for wealth creation and, inversely, transactional offending. Cybercrimes are increasing and have become a major threat to nations, governments, businesses, and individuals, resulting in financial losses, reputational damage, and personal information data breaches. Aims: This study explores how the South African Police Service (SAPS) responds to and combats cybercrimes. Methodology: This research was conducted in Durban, KwaZulu-Natal. The study adopted the qualitative research approach and the phenomenological research design, according to which interpretive and constructivist qualitative research paradigms were deemed appropriate. Data was collected through in-depth interviews using semi-structured interviews, with a sample of 17 participants purposively drawn from the Directorate for Priority Crime Investigation (DPCI) and the Commercial Crimes Unit (CCI) of the South African Police Service (SAPS). The theoretical orientation that guided the study is the Structural Functionalism Theory. Data were analyzed using thematic analysis. Findings: The study revealed that South Africa has been experiencing an increase in cybercrimes. However, has introduced laws and security strategies, such as the Cybercrime and Cybersecurity Bill of 2017, to respond to cybercrimes. However, these are argued to be not adapting fast enough to the constantly changing technological environment. Conclusion: Although limited, there are Police forensic experts in the field who can respond to cybercrimes. The study emphasizes the need for collaboration among all stakeholders, including prosecutors, the judiciary, private security agencies, CSPs, and ISPs, to effectively tackle cybercrimes. | ||
کلیدواژهها | ||
cybercrimes؛ cybersecurity؛ law enforcement؛ policies؛ South African police services | ||
مراجع | ||
Abdul-Rasheed, S.L.; Lateef, I.; Yinusa, M.A. & Abdullateef, R.A. (2016). “Cybercrime and Nigeria’s external image: A critical assessment”. Africology: The Journal of Pan African Studies, 9(6). https://www.jpanafrican.org/docs/vol9no6/9.6-9-Abdual-Rasheed.pdf.
Alabi, A.; Bamidele, A.H. & Oladimeji, A.B. (2023). “Cybercrime in Nigeria: Social influence affecting the prevention and control”. Lafia Journal of Economics and Management Sciences. 8(1). https://www.lajems.com/index.php/lajems/article/download/249/194.
Al-Dhaqm, A.; Ikuesan, R.A.; Kebande, V.R.; Razak, S.; Grispos, G. & Choo, K.R (2021). “Digital forensics subdomains: The state of the art and future directions”. IEEE Access. 9. https://doi.org/10.1109/ACCESS.2021.3124262.
Bankole, F.; Taiwo, A. & Claims, I. (2022). “An extended digital forensic readiness and maturity model”. Forensic Science International: Digital Investigation. 40. https://doi.org/10.1016/j.fsidi.2022.301348.
Baror, S.O.; Ikuesan, R.A. & Venter, H.S. (2021). “A defined digital forensic criteria for cybercrime reporting”. 17th International; Conference on Intellectual Capital, Knowledge Management & Organisational Learning. http://dx.doi.org/10.34190/ICCWS.20.056.
Barrett, A.M. (2013). “Education and other sustainable development goals: a shifting agenda for comparative education”. Compare: A Journal of Comparative and International Education. 43(6): 825-829. https://doi.org/10.1080/03057925.2013.850285.
Boda, R.; Dullabh, R. & Steele, J. (2021). ENSafrica webinar: Cybercrimes Bill. Available from: https://www.ensafrica.com/videos/detail/3/ensafrica-webinar-how-the-cybercrimes-bill-wi (Accessed 17 June 2021).
Capazorio, S. & Hollis, R. (2017). From silk road to tor tunnels: A look at the history and development of cybercrimes”. Cybercrime Law Feature. https://www.withoutprejudice.co.za/publication/2017/July/articles.
Chudasama, D.; Patel, D. & Shaikh, N. (2020). “Research on cybercrime and its policing”. American Journal of Computer Science and Engineering Survey. 8(3): 14. https://www.imedpub.com/computer-science-and-engineering-survey.
Enweonwu, O.A.; Ugwu, I.P.; Onyejegbu, D.C.; Areh, C.E. & Ajah, B.O. (2021). “Religious fanaticism and changing patterns of violent crime in Nigeria”. International Journal of Criminology and Sociology. 10: 1378-1389. https://doi.org/10.6000/1929-4409.2021.10.158.
Gumbi, D. (2018). “Understanding the threat of cybercrime: A comparative study of cybercrime and the ICT legislative frameworks of South Africa, Kenya, India, the United States, and the United Kingdom”. University of Cape Town. http://hdl.handle.net/11427/29247.
Hofmeyr, C.D. (2020). “The Cybercrimes Bill is one step away from becoming law”. Technology, Media & Telecommunications Alert. https://www.cliffedekkerhofmeyr.com/export/sites/cdh/news/publications/2020/technology/downloads/Technology-Media-Telecommunications-ALert-7-July-2020.pdf.
IBM. (2024). “Cost of a data breach report”. https://wp.table.media/wp-content/uploads/2024/07/30132828/Cost-of-a-Data-Breach-Report-2024.pdf (Accessed 10 December 2024).
ITU: International Telecommunication Union. (2021). Global Cybersecurity Index 2020: Measuring commitment to cybersecurity. Available from: https://www.itu.int/dms_pub/itu-d/opb/str/D-STR-GCI.01-2021-PDF-E.pdf (Accessed 12 November 2024).
Kazaure, A.A.; Jantan, A. & Yusoff, M.N. (2023). “Digital forensics investigation approaches in mitigating cybercrimes: A review”. Journal of Information Science Theory and Practice. 11(4): 14-39. https://doi.org/10.1633/JISTaP.2023.11.4.2.
Kempen, A. (2019). “Fighting cybercrime requires an integrated and international effort- The SAPS's envisaged approach”. Servamus Community-Based Safety and Security Magazine. 112(1). https://hdl.handle.net/10520/EJC-130abd8806.
Kuzior, A.; Tiutiunyk, I.; Zielińska, A. & Kelemen, R. (2024). “Cybersecurity and cybercrime: Current trends and threats”. Journal of International Studies. 17(2): 220-239. https://doi.org/10.14254/2071-8330.2024/17-2/12.
Lourie, G. (2015). “What is South Africa doing to reduce cybercrime—tech financials”. Tech Financials. https://www.techfinancials.co.za/2015/11/05/what-sa-is-doing-to-reduce-cybercrime/.
Mabaso, J. (2018). Assessing the Cyber-Security Status of the Metropolitan Municipalities in South Africa. College of Law & Management Studies, University of KwaZulu-Natal. https://researchspace.ukzn.ac.za/handle/10413/18097.
Mabunda, S.M. (2021). The South African Legislative Response to Cybercrime. PhD Thesis, University of the Western Cape.
Maluleke, W. (2023). “Exploring cybercrime: An emerging phenomenon and associated challenges in Africa”. International Journal of Social Science Research and Review. 6(6): 223-243. http://dx.doi.org/10.47814/ijssrr.v6i6.1360.
Mtuze, S.S. & Musoni, M. (2023). “An overview of cybercrime law in South Africa”. International Cybersecurity Law Review. 4: 299-323. https://doi.org/10.1365/s43439-023-00089-8.
Mugisha, D. (2019). “Role and impact of digital forensics in cyber crime investigations”. International Journal of Cyber Criminology. Forensic Science Institute, Gujarat Forensic Sciences University (GFSU). https://www.researchgate.net/publication/331991596_ROLE_AND_IMPACT_OF_DIGITAL_FORENSICS_IN_CYBER_CRIME_INVESTIGATIONS.
Nduka, R.E. & Basdeo, V. (2022). “The need for harmonised and specialised global legislation to address the growing spectre of cybercrime”. Southern African Public Law. 36(2). https://doi.org/10.25159/2522-6800/8112.
Olayemi, O.J. (2014). “A socio-technological analysis of cybercrime and cyber security in Nigeria”. International Journal of Sociology and Anthropology. 6(3): 116-125. https://doi.org/10.5897/IJSA2013.0510.
Pandey, A.K.; Tripathi, A.K.; Kapil, G.; Singh, V.; Khan, M.W.; Agrawal, A.; Kumar, R. & Khan, R.A. (2020). Current Challenges of Digital Forensics in Cyber Security. IGI Global Scientific Publishing. http://dx.doi.org/10.4018/978-1-7998-1558-7.ch003.
Pasaribu, R. (2018). “Fight narcotics with community strengthening: Crime control management by community policing”. Journal of Indonesian Legal Studies. 3(2): 237-252. https://doi.org/10.4018/978-1-7998-1558-7.ch003.
Ralarala, S. (2020). The Impact of Cybercrime on e-Commerce and Regulation in Kenya, South Africa, and the United Kingdom. Master thesis. School of Law, Strathmore University. https://su-plus.strathmore.edu/server/api/core/bitstreams/d2089a73-0980-4b48-8f81-36a592e399d8/content.
Reddy, E. (2019). “Analysing the investigation and prosecution of cryptocurrency crime as provided for by the South African Cybercrimes Bill”. Statute Law Review. 41(2): 1-14. http://dx.doi.org/10.1093/slr/hmz001.
Richards, N.U. & Eboibi, F.E. (2021). “African governments and the influence of corruption on the proliferation of cybercrime in Africa: Wherein lies the rule of law?”. International Review of Law, Computers & Technology. 35(2): 131-161. https://doi.org/10.1080/13600869.2021.1885105.
Rustad, M.L. (2001). “Private enforcement of cybercrime on the electronic frontier”. Southern California Interdisciplinary Law Journal. 11:63.
van Vuuren, J.C.; Leenen, L. & Pieterse, P. (2020). “Development and implementation of cybercrime strategies in Africa with specific reference to South Africa”. Journal of Information Warfare. 19(3): 83-101. https://www.jstor.org/stable/10.2307/27033634.
Vitus, N.E. (2023). “Cybercrime and online safety: Addressing the challenges and solutions related to cybercrime, online fraud, and ensuring a safe digital environment for all users— A Case of African States”. International Research Journal. 10(9). http://dx.doi.org/10.6084/m9.figshare.24155610.v1.
Wang, S.K.; Hsieh, M.; Chang, C.K.; Jiang, P. & Dallier, D.J. (2020). “Collaboration between Law Enforcement Agencies in Combating Cybercrime: Implications of a Taiwanese Case Study about ATM Hacking”. International Journal of Offender Therapy and Comparative Criminology. 65(4). https://doi.org/10.1177/0306624X20952391.
Wu, T.; Breitinger, F. & O'Shaughnessy, S. (2020). “Digital forensic tools: Recent advances and enhancing the status quo”. Forensic Science International: Digital Investigation. 34. https://doi.org/10.1016/j.fsidi.2020.300999. | ||
آمار تعداد مشاهده مقاله: 249 تعداد دریافت فایل اصل مقاله: 165 |