Formulation of specialized legislation to tackle the growing spirit of cyber crime: a comparative study (2024)

Bibliography

Allan 2005 NZLR

Allan G "Answer to cyber crime: a delicate mix of the Orthodox and alternative" 2005 New Zealand Law Review 149-178

Anon 2006 Computer fraud and security

Anonymous "US ratification International Crime Convention" 2006 (11) Computer fraud and security 2-3

Anon 2006 Harvard LR

Anonymous "immunizing internet or: how I learned to stop worrying and loving the worm" 2006 (119) Harvard Law Review 2442-2463

Anon Schiereiland

Anonymous 'Online Sex Pests Censored' Peninsula 5 April 2008 9

Audal et al 2008 Aclr

Audal et al."Computer Crimes" 2008 (45) The American Criminal Law Review 233-272

Bazelon et al 2006 ACLR

Bazelon E et al."Computer Crimes" 2006 (43) The American Criminal Law Review 260-308

Bekker et al. "The Criminal Courts"

Streams PM et al

Berg 2007 Michigan Bar Journal

Berg T "The Changing Face of Cybercrime: New internet threats create challenges for law enforcement" 2007 (86) Michigan Bar Journal 18-22

Blackwell 1997 Canadian lawyer

Blackwell G "A jurisdiction called Cyberspace?"1997 Canadian lawyer 22-23

Brenner 2001 Murdoch Univ Ejl

Brenner S "Cybercrime Investigation and Reaction: The Role of Penest and Procedural Law" 2001 (8) Murdoch University Electronic Journal of Law 1-16

Burner a Clarke 2005 John Marshall Jcil

Brenner SW en Clarke LL "Distributiebeveiliging: Prevention of Cyber ​​Crime" 2005 (23) John Marshall Journal of Computer and Information Law 659-209

Burner and Koops 2004 JHTL

Brenner S and Koops B-J "approaches of jurisdiction" 2004 (4) Journal of High Technology Law 1-46

Brotite En Gani 2003 Crim Lj

Bronitt S and Gani M "Cybercrime Boundaries Change: From computer hacking to cyber terrorism" 2003 (27) Criminal Law Journal 303-317

Burchell 2002 SALJ

Burchell J "Criminal Justice at the Crossroads" 2002 South African Law Journal 579-602

We are Chhelpen 2009 times

Chelemu K "Banks opens files for the police in SMS -Mind Case" 2009 Times 23 July 2009 6

Collier 2005 Jutas Business Law

Collier D "Apparently not that simple: Producing computer prints in court" 2005 (13) Jutas Business Law 6-9

Dadhich & Shukla "Kabiratsaasasa"

Dadhich A OG Shukla G "CyberPrimes: A Insight to the Indian Position" I Kierkegaard SM (Red) Cyberlaw Security and Privacy (International Association of IT Advokater 2007) 414-425

Fafinski 2008 Journal of Criminal Law

Fafinski's "Computer Abuse: The Implications of Police and Justice Act 2006" 2008 (72) Journal of Criminal Law 53-66

Finlay 1999 TBL

Finlay E "Team Online: Personal Jurisdicture in Cyberspace" 1999 (62) Texas Bar Journal 334-341

Goodman and Brenner 2002 IJlit

Goodman MD en Brenner's "The New Consensus on Criminal Behaviour in Cyberspace" 2002 International Journal of Law and Information Technology 10 139-222

Hofman 2006 Sacj

Hofman J "Electronic Proof in Criminal Serves" 2006 South African Journal of Criminal Justice 3 257-275

Jahankhani 2007

JAHANKHANI H "Evaluation of cyber legislation acting in Global Cyber Village" 2007 (1) International Journal of Electronic Security and Digital Forensics 1-11

Kerr 2005/2006 Harvard LR

Kerr Us "Search and Epizures in a Digital World" 2005/2006 119 (1-3) Harvard Law Review 532-585

McKenna 2004 InfoSecurity I DAG

McKenna B "UK MPS call for computer abuse act Upgrade" 2004 InfoSecurity Today July/5.Auugustus

Miquelan-Weissmann 2005 John Marshall Jcil

Miquelan-Weissmann MF "The Cyber Crime Convention: A Harmonized Implementation of International Criminal Code: What prospects for procedural good process?"2005 (23) John Marshall Journal of Computer and Information Law 1-28

Ormerod 2004 Crim Lr

Ormerod DC "Case and Comment" 2004 Criminal Law Review 951-954

SALRC Discussiedocument 109

South African Law Reform Commission Dississiedocument 109 Project 124 (Oct 2005)

Sibanda "Selection of the law"

Sibanda OS "Election of legislation, jurisdiction and recognition and enforcement of judgments in e-commerce in South Africa" ​​in Kierkegaard SM (RED) Cyber ​​Security and Privacy (International Association of IT Attornneys 2007) 259-266

Snail and Madziwa 2008 without prejudice

Snail S and Madziwa's "Hacking, Cracking and other illegal online activities" 2008 without prejudice 30-31

Van der Merwe 2003 JCrdl

Van der Merwe DP "Computer Crime-New National and International Developments" 2003 Journal of Contemporary Roman-Dutch Law 30-44

Van der Merwe 2007 JCrdl

Van der Merwe DP "Information technology Crime-a new paradigm is necessary" 2007 Journal of Contemporary Roman-Dutch Law 309-319

Van der Merwe et al Ect - Love

Van der Merwe DP et al. Information and communication technology legislation (Lexis Nexis Durban 2008)

Van zyl 2008 jcrdl

Van Zyl SP "Sexual violations and internet: Are we ready for 2010?"

Wilson 2006 Aust LJ

Wilson J "Cybercrime in the private sector: Partnerships between the private sector and law enforcement" 2006 (80) Australian Law Journal 694-704

Xing een 2007 web o log i

Xingan L "International promotions against Cyber Crime: Network Systems in Networked Crime Scene" 2007 (4) Webology 1-31

Legislation

South Africa

Constitution of the Republic of South Africa 1996

Civil Proceedings Act 25 van 1965

Criminal Procedure Act 51 of 1977

Electronic Communication and Transactions Act 25 of 2002

Film and publications Law 65 of 1996

Financial Intelligence Center Act 38 AF 2001

Magistrates Court of Justice 32 van 1944

Prevention of organized Crime Second Change Act 38 of 1999

Regulation of intercepting communication and delivery of communication -related information Law 70 of 2002

Internationale

Australian Criminal Code 1995

CyberPrimes and Information Technology Act 2000 (Indien)

CyberPrimes Act Law 2 van 2006 (VAE)

Computer Misuse Act 1990 (VK)

Criminal Code and Cybercrime Act 2001 (Australië)

Electronic Communications Privacy Act van 1986 (VS)

National Information Infrastructure Protection Act 1996 (VS)

Criminal Code Act 11 of 2004 (Qatar)

Patriot Act 2001 (VS)

Disputes

South Africa

Bud Industrial Holdings (PTY) LTD against Strang and other SCA 144 from 2007 (RSA)

Motata against Nair No and another 2009 1 SAC 263 (T);2009 2 SA 575 (T);

Sb Jafta v ezering KZN Wildlife (SAG D 204/07)

S v Harper in Elke 1981 (1) SA 88 (D)

Narlis Mod South African Bank of Athene 1976 (2) SA 573 (a)

S V Roll M.Fl.2008 (2) SAC 252

Ndlovu against correction services and another 2006 (4) All SA 165 (W)

S i ntululi 1970 (2) Med 278 (W)

S V Maseki 1981 (4) SA 374 (t) (t) (t) (t) (t) (t) (t) (t) (t) (t) (t) (t) (t) (t) (t) (t) (t) (t) (t) (t) (t) (t) (t)

C In MPMLO 1986 (H) are 485 (E)

Secombe Mod AG 1919 TPD 270

Internationale

Director of the public persecution against Sutcliffe [2001] VSC 43 (Victoria, Australia)

R V Gold (1988) AC 1063

R V Smith (Wallace) Nr.4 [2004] EWCA Crim 631

US Mod Councilman 385 F3D 793 (First Circuit 2005)

US V Gorshov 2001 WL 1024026

US Mod Judd 46 F3d 961 (California Circuit 1995)

US Mod Thomas 74 F3d 70 (Sixth Circuit 1996)

Register via InternetRessourcer

Anon 2009 www.ib.com/

Anonymous 2009 South Africa has the lowest software piracy in Africa, while Zimbabwe has the highest on the world www.ib/.com/internat.law-snews [access on 1 June 2009]

Anon 2009 www.legalbrief.co.za/

Anonymous 2009 Judge Motata guilty of drunk driving www.legalbrief.co.za/article [access on 3 September 2009]

Anon 2009 www.news24.com/

Anonymous 2009 enormous growth in cyber crime www.news24.com/news24/southafrica [access on 10 June 2009]

Anon 2009 www.zawya.com

Anonymous 2009 Cyber crime that increases in Qatar www.zawya.com [access on May 20, 2009]

Anon 2009a www.mg.co.za/

Anonymous 2009a Motata was guilty of drunk driving www.mg.co.za/article/2009-09-02 [access on 3 September 2009]

Anon 2009b www.mg.co.za/

Anonymous 2009b Motata to appeal against drunk-driven decision www.mg.co.za/article/2009-09-09 [access on September 10, 2009]

Anon 2007 it-online.co.za/

Anonymous 2007 SA seems to be tackling cyber crime with CSIrt it-online.co.za/conte't/view/180306/129 [access on November 26, 2007]

Anon 2007 www.crime-research.org/

Anonymous 2007 South Africa to tackle cyber crime www.crime-reearch.org/news/11.07.2006/2115/ [access on November 26, 2007]

Anon 2007 www.iol.co.za/

Anonymous 2007 Bank customers warned of phishing -fidus www.iol.co.za/General/news [access on 27 May 2007]

Anon 2007 www.polity.org.za/

Anoniem 2007 Survey of the Real Cost of Virtual Crime www.polity.org.za/article [Toegang op 27 november 2007]

Anon 2006a archive.gulfnews.com/

Anonymous 2006a e-Government Studies Smart Card to replace ID archive.gulfnews.com/articles [access on March 3, 2009]

Anon 2006b archive.gulfnews.com

Anonymous 2006b Federal Law includes all areas of cyber crime archive.gulfnews.com [access on 12 February 2006]

Bowman 2006 www.itp.net/

Bowman D 2006 Saudi takes love on cyber crime www.itp.net/index [access on October 15, 2006]

Cybercrime Law 2007 www.cybercrimelaw.net/

Cybercrime Law 2007 What is cyber crime?

Cybercrime Law 2009 www.cybercrimelaw.net/

Cybercrime Law 2009 Cybercrime Law www.cybercrimelaw.net/ [Access op 21 mei 2009]

Other 2008 www.austalianit.news.com.au/

Best k 2008 cyber-treaty can mean new love www.austalianit.news.com.au/story [access on 27 May 2008]

The 2009 it.mp.gov.in/

Department of Information Technology Government in Madhya Pradesh 2009 Cyberwetten in India DIT.MP.GOV.IN/CYBERLAWT.HTM [access on 6 May 2009]

DPA 2009 www.thepeninsulaqatar.com/

DPA 2009 Tourists in the Philippines attracted by Piratopied Draurt www.thenpeninsulaqatar.com/display_news.asp?section=WORLD_News&month=March2009&file=WORLD_News2009030185.XML [Access until March 1, 2009]

Herseleman and Warren 2004.edu.au/

Herselman M and Warren M 2004 Cyber Crime, who influence companies in South Africa www.dealin.edu.au/view [access on 10 June 2009].

Howe 2007 archive.gulfnews.com/

Howe M 2007 Golf States to combat cyber crime archive.gulfnews.com/articles [access on 19 June 2007]

Krebs 2008 Blog.WashingtonPost-Com/

Krebs B 2008 Senate Bill approves Cyber-Crime blog.Washingtonpost-Com/Security Fix/2008/07 [access on May 21, 2009]

Leyden 2008 www.theregister.co.uk/

Leyden J 2008 UK Cyber Crime Overaul finally takes an increase in www.theegister.co.uk/2008/09 [access on May 21, 2009]

MANDIMANA en snail 2009 www.hg.org/

Mndzima s and snail s 2009 cyber crime in zuid -Africa www.hg.org/article [Access on April 14, 2009]

2008 2008 www.thestandard.com/

Ogundeeji OA 2008 African states to discuss cyber crime www.thstandard.com/news/2008 [access on 21 May

Roberts 2007 archive.gulfnews.com/

Roberts L 2007 Golf states to combat cyber crime;Gulf States Plan Unified Action at Cybercrime Law archive.gulfnews.com/articles [access on 19 June 2007]

Singh 2009 www.ind.ii.org/

Singh T 2009 Cyberlaw and Information Technology www.ind.ii.org/cyberlaw.aspx [Toegang op 6 mei 2009]

SABRIC 2009 www.sabric.co.za

SABRIC 2009 South African Banking Risk Information Center www.sabric.co.za/ [Toegang tot 10 december 2009]

SPECIAL CORRESPONDANT 2008 www.thehindu.com/

Special correspondent 2008 Parliament approves cyber crime account www.thehindu.com/2008/12/24/stories/2008122456021400.htm [access on 21 May 2009] good.

Townson 2006 www.gulf-times.com

Townson P 2006 calls for legal steps to combat cyber crimes www.gulf-dimes.com [access on March 3, 2009]

Formulation of specialized legislation to tackle the growing spirit of cyber crime: a comparative study (2024)
Top Articles
Latest Posts
Article information

Author: Domingo Moore

Last Updated:

Views: 5580

Rating: 4.2 / 5 (73 voted)

Reviews: 88% of readers found this page helpful

Author information

Name: Domingo Moore

Birthday: 1997-05-20

Address: 6485 Kohler Route, Antonioton, VT 77375-0299

Phone: +3213869077934

Job: Sales Analyst

Hobby: Kayaking, Roller skating, Cabaret, Rugby, Homebrewing, Creative writing, amateur radio

Introduction: My name is Domingo Moore, I am a attractive, gorgeous, funny, jolly, spotless, nice, fantastic person who loves writing and wants to share my knowledge and understanding with you.