Faculty of Commerce, Law and Management (ETDs)
Permanent URI for this communityhttps://hdl.handle.net/10539/37778
Browse
6 results
Search Results
Item Gamification to educate consumers about cybercrime in South Africa(University of the Witwatersrand, Johannesburg, 2024) Maselo, Kehilwe Venacia; Lee, GregoryThis study examines the impact of gamification on South African consumers attitudes and understanding of cybercrime. Given the increasing reliance on the Internet activities such as social media, digital banking, and e-commerce, there is a critical need for consumers to adopt basic security measures to protect themselves against threats such as privacy breaches, identity theft, cyberbullying, and exposure to harmful content. However, many individuals lack the necessary knowledge and expertise to ensure their online security. The research explores the challenges associated with enhancing security awareness and assesses the potential of gamification techniques to overcome these obstacles. By integrating game mechanics and elements into online security awareness activities, the study aims to make learning about cybersecurity engaging and enjoyable, leading to better understanding and adoption of safe online practices. The findings indicate that gamification significantly enhances consumer engagement, knowledge retention, and proactive cybersecurity behaviours. Additionally, the research contributes to the theoretical framework of Self-Determination Theory (SDT) and behavioural science by providing empirical evidence that intrinsic motivation, fostered through gamification, enhances learning outcomes and behaviour change in cybercrime education. These insights offer valuable implications for businesses and organisations seeking to improve their cybersecurity training and consumer awareness campaigns. Ultimately, this research highlights gamification’s potential to transform cybersecurity education and to promote a more cyber-aware and proactive consumer base in South AfricaItem The perceived impact of security and privacy risks on social commerce amongst social media users in South Africa(University of the Witwatersrand, Johannesburg, 2023) Ramjith, SamreshThis research investigated the influence of social media attitude, social media trust, and risk awareness (cybersecurity and privacy) on social commerce intention. Five hypotheses were proposed, which were then tested with a sample of social media users via an online survey. Survey results were cleaned and then analysed through Partial Least Squares Structural Equation Modeling (PLS-SEM) using SmartPLS software. The study did not find a significant direct effect of social media attitude on social commerce intention, but did find that social media attitude was found to significantly influence social media trust. The moderation effects of cybersecurity risk awareness and privacy risk awareness on the relationship between social media trust and social commerce intention were not supported. The study supports and reinforces the importance of trust in social commerce and the need for businesses and social media platforms to continuously work to enhance trust amongst users. A research outcome is the necessity for deeper investigation into the role of user attitudes and risk awareness in social commerce. The study contributes to the social commerce literature by providing empirical evidence about the complex interplay between trust, attitude, and risk awareness, contributing to enhancing understanding of these relationships and their impact on business strategiesItem Legal challenges of establishing jurisdiction over cloud data: addressing the gaps in South Africa’s cybercrime legislative framework(University of the Witwatersrand, Johannesburg, 2023) Musoni, Melody; Klaaren, JonathanThis thesis discusses the problems presented by the emerging technology of cloud computing during cybercrime investigations. One of the main challenges with cloud computing technologies is the lack of clarity on jurisdiction and whether law enforcement agents can exercise unilateral enforcement jurisdiction over remote cloud data. The thesis signifies the challenge by demonstrating how remote access to cloud data can potentially infringe on the sovereignty of foreign states, violate international law, and infringe on people’s privacy rights. The underlying concern with cybercrime investigations in the cloud context is that the current laws are not only territorial, but they are also outdated and lacking the ability to complement and address technological advancements. The central question discussed is whether the jurisdictional principles need to be revised to address innovative technological advancements or if the traditional principles suffice and can continue to be of application. At present, there are diverging views and approaches to dealing with cloud data jurisdiction for criminal investigation purposes. Some scholars, judges and law officers still rely on traditional jurisdictional principles and apply them to cyberspace and cloud environments. They do not see the justification to have separate laws to address activities in cyberspace. However, others advocate for the acclimatisation of new laws to meet the technological changes. Compounding this difference in opinion is the uncertainty in legal frameworks on cybercrime. Such uncertainty has left the topic vacillating between the views of territorialists and those of data exceptionalists. Similarly, South Africa’s position on this issue is unequivocal as various pieces of legislation address the issue of cloud jurisdiction differently. This makes this study of utmost importance. This thesis argues that law should be developed to address the technological changes presented by cloud computing technologies. Traditional jurisdictional principles which emphasise on geographical territory are not sufficient to address the unique features of cloud data. Pre-internet based jurisdictional principles should not be directly applied in cyberspace or cyber-environments. It is important for law to be developed in a manner which allows it to adequately address technological developments. One way of achieving this is by reformulating jurisdictional principles to conform with the emerging technologies. Apart from law, lawyers and law makers should leverage the use of other regulatory modalities such as code to regulate online conduct. Code can play the role of law which can effectively regulate cyberspaces as well as solve the data jurisdictional problem. This thesis supports the notion of reformulation of jurisdictional principles to address these challenges. In addition, it also points out the importance of reinforcing the current measures in place to address jurisdictional challengesItem The sufficiency of protection in light of the increasing number of cybercrime and cyber harassment cases(University of the Witwatersrand, Johannesburg, 2022-10-31) Witz, Daniel JosephThis research examines how the South African Police Services, the National Prosecuting Authority, current and new legislation and Criminal Law address harassment in light of the increased threat and technological advancements of cyberbullying and cyber harassment. This research assignment will critically reflect on whether the Protection from Harassment Act, supported by recent additions to South African legislation, affords an applicant sufficient protection considering the increasing number of cybercrime and cyber harassment cases, and whether or not the reliance on the South African Police Services and South African Courts negates any protection that the legislation affords. In conclusion, this research report will make certain recommendations regarding how the complex issues of harassment can be addressed to focus on the protection of South Africa's Constitutional ValueItem A critical analysis of the legal framework relating to cybercrime in Uganda(2021) Adesuyi, DaramolaThis dissertation examines the legal framework relating to cybercrime in Uganda and its effect on the enforcement of its terms. Investigating this issue is crucial in the wake of the rise in global interconnectivity as a result of the relative advances in technology, which challenge the application of the old standard of classification and investigation of traditional crimes. Unlike the advanced nations, the current laws regulating criminal conduct in most developing nations today are ill-equipped to cope with these emerging cybercrimes. Therefore, this dissertation argues that Uganda’s extant legal framework is manifestly inadequate to protect individuals from the threats resulting from cybercrime effectively. This view is held based on an analysis of the major procedural challenges and issues in Uganda today and a review of the current legal regime. This dissertation contends that, contrary to the common belief, merely enacting legislation, which is a ‘cut and paste’ of foreign cyber laws, does not automatically resolve issues related to cybercrimes in Uganda. Furthermore, the dissertation argues that useful lessons can be obtained from an effective legal regime based on insights from the Council of Europe Convention on Cybercrime, and South Africa. Similarly, other pragmatic ways of effective protection against cybercrime in Uganda are suggested to improve awareness and scholarship, strengthen law enforcement agencies and the judiciary, and improve cooperation with international and regional cybercrime regimesItem Factors influencing cyber insurance adoption in South Africa industry(University of the Witwatersrand, Johannesburg, 2020) Mbatha, Nkosinathi SphiweOrganisations are benefiting from the use of emerging digital technologies for improved efficiencies. These technologies are vulnerable to cyber-attacks resulting in breaches on organisational assets. Cyber-attacks necessitates boards and top management to strategically rethink their cybersecurity approaches to managing cyber risks. The purpose of the study was to explore the factors influencing cyber insurance adoption in the South African industry. The study adapted Technology-Organisation-Environment (TOE) theoretical framework to investigate cyber insurance adoption relevant to the South African context. The review of literature focused on the cybersecurity, cyber risk management, and cyber insurance phenomenon to understand the global and developing world landscape. The research design followed the systemic collection of qualitative data through semi-structured interview questions on the purposefully selected sample of professionals in the public and private sectors of the South African industry. The analysis and interpretation through categorisation of patterns of data collected enabled presentation and discussion of emerging themes resulting in findings. The key findings relate to effective cybersecurity awareness, organisational approach to managing cyber risks, as well as the nature of industry and compliance with legislation. The study established that the combination of effective cybersecurity awareness, the relationship between the strategic organisational approach to cybersecurity and top management support towards cyber risk management as well as compliance with legislation are the factors influencing cyber insurance adoption in the South African industry. In order to meet the research objectives, various conclusions were made. The study concluded that effective cybersecurity awareness must be viewed as a strategic imperative to enable organisations to operate securely. The study also concluded that organisations must proactively approach cybersecurity strategically thereby ensuring effective top management buy-in. The study concluded that the POPI Act is the primary driver of cyber insurance adoption in the South African industry.