Institutional Repository

E-crimes and e-authentication - a legal perspective

Show simple item record

dc.contributor.advisor Kroeze, Irma Johanna
dc.contributor.advisor Kritzinger, E.
dc.contributor.author Njotini, Mzukisi Niven
dc.date.accessioned 2016-10-27T14:44:50Z
dc.date.available 2016-10-27T14:44:50Z
dc.date.issued 2016-09
dc.date.submitted 2016-10-27
dc.identifier.citation Njotini, Mzukisi Niven (2016) E-crimes and e-authentication - a legal perspective, University of South Africa, Pretoria, <http://hdl.handle.net/10500/21720> en
dc.identifier.uri http://hdl.handle.net/10500/21720
dc.description.abstract E-crimes continue to generate grave challenges to the ICT regulatory agenda. Because e-crimes involve a wrongful appropriation of information online, it is enquired whether information is property which is capable of being stolen. This then requires an investigation to be made of the law of property. The basis for this scrutiny is to establish if information is property for purposes of the law. Following a study of the Roman-Dutch law approach to property, it is argued that the emergence of an information society makes real rights in information possible. This is the position because information is one of the indispensable assets of an information society. Given the fact that information can be the object of property, its position in the law of theft is investigated. This study is followed by an examination of the conventional risks that ICTs generate. For example, a risk exists that ICTs may be used as the object of e-crimes. Furthermore, there is a risk that ICTs may become a tool in order to appropriate information unlawfully. Accordingly, the scale and impact of e-crimes is more than those of the offline crimes, for example theft or fraud. The severe challenges that ICTs pose to an information society are likely to continue if clarity is not sought regarding: whether ICTs can be regulated or not, if ICTs can be regulated, how should an ICT regulatory framework be structured? A study of the law and regulation for regulatory purposes reveals that ICTs are spheres where regulations apply or should apply. However, better regulations are appropriate in dealing with the dynamics of these technologies. Smart-regulations, meta-regulations or reflexive regulations, self-regulations and co-regulations are concepts that support better regulations. Better regulations enjoin the regulatory industries, for example the state, businesses and computer users to be involved in establishing ICT regulations. These ICT regulations should specifically be in keeping with the existing e-authentication measures. Furthermore, the codes-based theory, the Danger or Artificial Immune Systems (the AIS) theory, the Systems theory and the Good Regulator Theorem ought to inform ICT regulations. The basis for all this should be to establish a holistic approach to e-authentication. This approach must conform to the Precautionary Approach to E-Authentication or PAEA. PAEA accepts the importance of legal rules in the ICT regulatory agenda. However, it argues that flexible regulations could provide a suitable framework within which ICTs and the ICT risks are controlled. In addition, PAEA submit that a state should not be the single role-player in ICT regulations. Social norms, the market and nature or architecture of the technology to be regulated are also fundamental to the ICT regulatory agenda. en
dc.format.extent 1 online resource (xiii, 338 leaves) : color illustrations en
dc.language.iso en en
dc.subject Biometric characters en
dc.subject Computer hacking en
dc.subject Distributed denial of service (DDoS) attacks en
dc.subject E-authentication en
dc.subject Furtum, en
dc.subject ICT regulation en
dc.subject ICTs
dc.subject ID fraud en
dc.subject ID theft en
dc.subject Information or computer systems en
dc.subject Larceny en
dc.subject Man-in-the-middle attacks en
dc.subject PAEAN
dc.subject Phishing en
dc.subject Precautionary principle and user characters en
dc.subject.ddc 345.268
dc.subject.lcsh Computer crimes -- Law and legislation en
dc.subject.lcsh Computer networks -- Security measures en
dc.subject.lcsh Authentication en
dc.subject.lcsh Phishing en
dc.subject.lcsh Electronic commerce -- Law and legislation en
dc.subject.lcsh Intellectual property en
dc.title E-crimes and e-authentication - a legal perspective en
dc.type Thesis en
dc.description.department Jurisprudence en
dc.description.degree LL. D.


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search UnisaIR


Browse

My Account

Statistics