IDEAS home Printed from https://ideas.repec.org/a/adi/ijbess/v6y2024i5p96-109.html
   My bibliography  Save this article

Cyber policy for monitoring and regulating cyberspace and cyber security measures for combating technologically enhanced crime in South Africa

Author

Listed:
  • Chiji Longinus Ezeji

    (University of Johannesburg, South Africa)

Abstract

Advancements in science and technology has resulted in substantial transformations inside society. The telecommunications sector has established cyberspace, a virtual domain for online communication, data exchange, and digital interactions. This platform enables individuals to interact and cultivate relationships worldwide, fostering a sense of proximity despite geographical separation. Nonetheless, these improvements provide concerns, since there has been an increase in cyber victimisation via cyberspace, the internet, computer networks, and online systems. Criminals are progressively utilising these technologies to perpetrate illicit actions, endangering individuals, governments, organisations, and institutions.This study analyses the evaluation of cyber policies for regulating, monitoring, and supervising cyberspace activities, along with the implementation of cybersecurity measures to address technologically advanced crime. A mixed methods strategy, including qualitative and quantitative methodologies, was employed for data collecting. The research revealed that although cyberspace provides avenues for social contact, idea exchange, information dissemination, commercial transactions, and additional activities, it remains susceptible to cyber threats including ransomware, fraud, warfare, terrorism, trafficking, and breaches of privacy. Formulating cyber regulations to regulate actions in cyberspace is crucial for efficient law enforcement, alongside the establishment of a cybersecurity framework to safeguard critical cyber systems and bolster security protocols across several sectors. To safeguard both the public and private sectors against cybersecurity risks, it is essential to create and execute plans. These tactics encompass the regular evaluation and auditing of security systems, investment in cybersecurity training programs, maintenance of current systems, formulation and rehearsal of incident response plans, and dissemination of information among experts and professionals.

Suggested Citation

  • Chiji Longinus Ezeji, 2024. "Cyber policy for monitoring and regulating cyberspace and cyber security measures for combating technologically enhanced crime in South Africa," International Journal of Business Ecosystem & Strategy (2687-2293), Bussecon International Academy, vol. 6(5), pages 96-109, October.
  • Handle: RePEc:adi:ijbess:v:6:y:2024:i:5:p:96-109
    DOI: 10.36096/ijbes.v6i5.670
    as

    Download full text from publisher

    File URL: https://www.bussecon.com/ojs/index.php/ijbes/article/view/670/347
    Download Restriction: no

    File URL: https://doi.org/10.36096/ijbes.v6i5.670
    Download Restriction: no

    File URL: https://libkey.io/10.36096/ijbes.v6i5.670?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:adi:ijbess:v:6:y:2024:i:5:p:96-109. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Umit Hacioglu (email available below). General contact details of provider: https://edirc.repec.org/data/ibihutr.html .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.