Cyber-Crimes and the Boundaries of Domestic Legal Responses: Case for an Inclusionary Framework for Africa
نویسنده
چکیده
As the world marches deeper into the unknown passageway of digital revolution, it is becoming apparent that the tremendous benefits of the internet age are being challenged by the formidable menace of cyber-crime, not the least in the African region. While African States vary in the degree to which their economies and peoples are affected by cyber-crime, there is no gainsaying the fact that the collective ability of African States to track and trace the source(s) of any criminal use of the internet or cyber-attacks on infrastructures, economies or individuals is central to the deterrence of such attacks as well as to long-term survival of these States. An acknowledged and concerted ability to respond to cyber-crimes, to track, trace and apprehend domestic and international cyber-criminals can forestall future attacks through fear of severe penalties. This paper highlights the general weakness or inertia of African States in curbing the menace of cyber-crimes and particularly draws attention to the inherent limitations and failures in current domestic legal responses to cyber-crime. Acknowledging the complex and often extraterritorial nature of cyber-crimes, this paper makes a case for a redefinition of the notion of sovereignty and its implications for the recurring decimal of cyber-crime against African economies and societies. Extrapolating from learned experiences around the world, this paper explores the trajectory of a regional normative initiative that would streamline and synergise the efforts of African States in responding to the phenomenon of cyber-crimes.
منابع مشابه
Exercising FOREIGN CRIMINAL JURISDICTION over State officials
Our article examines the extent to which state officials are subject to prosecution in foreign domestic courts for international crimes. We consider the different types of immunity that international law accords to state officials, the reasons for the conferment of this immunity and whether they apply in cases in which it is alleged that the official has committed an international crime. ...
متن کاملAn Authorization Framework for Database Systems
Today, data plays an essential role in all levels of human life, from personal cell phones to medical, educational, military and government agencies. In such circumstances, the rate of cyber-attacks is also increasing. According to official reports, data breaches exposed 4.1 billion records in the first half of 2019. An information system consists of several components, which one of the most im...
متن کاملPrinciples of Criminal Responsibility of Physicians in Unintentional Crimes in Iran and England
Physicians all over the world are responsible for the care, recovery and treatment of patients, but sometimes as a result of inadequate care or negligence of Physicians, there is a great deal of damage to patients, which in addition to the legal aspect of the case that results in substantial damages, can result in criminal or police liability of physicians. In principle, criminal law does not i...
متن کاملThe Survey of the Robust Legal Institutions of Doing Business on the Capital Flight and Attracting Foreign Direct Investment
One of the important preconditions for economic growth and development is the provision of capital; each society needs to provide an environment to attract foreign and domestic investment. But despite the rich revenues of oil in OPEC member countries, their business environments are largely confronted with the domestic Capital Flight and reluctance of foreign investors to invest. The purpose of...
متن کاملDesigning a Data Warehouse for Cyber Crimes
One of the greatest challenges facing modern society is the rising tide of cyber crimes. These crimes, since they rarely fit the model of conventional crimes, are difficult to investigate, hard to analyze, and difficult to prosecute. Collecting data in a unified framework is a mandatory step that will assist the investigator in sorting through the mountains of data. In this paper, we explore de...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Journal of Information, Law and Technology
دوره 2009 شماره
صفحات -
تاریخ انتشار 2009