The Challenges in Investigating and Prosecuting Computer Crimes. A Reflection On Online Fraud in Uganda.


  • Department: Law
  • Project ID: LAW0457
  • Access Fee: ₦5,000
  • Pages: 44 Pages
  • Reference: YES
  • Format: Microsoft Word
  • Views: 448
Get this Project Materials

TABLE OF CONTENTS

DECLARATION .................................................................................................... . . ......................... !

APPROVAL .......................................................................................................................................... 11

DEDICATION ...................................................................................................................................... 111

ACKNOWLEDGEMENT ...................................................................................................................... i\

ABSTRACT ........................................................................................................................................... v

CHAPTER ONE .................................................................................................................................... I

!.!.Introduction .................................................................................................. . I .. '

1.2.Scope of the study; ........................................................................................................................... 2

1.3.0bjectives ofthe study; ................................................................................ .. I .......................... -

1.3.1.General objective .............................................................................................. .

1.3.2.Specific objectives............................................................................................ . ......................... 3

1.4.I:Zesearch n1ethodology ............................................................................................ .......................... ~

1.4. 1 Research design................................................................................................. .. ....................... 3

1.4.2.Study population ............................................................................................ . ., .... "~

l. 5. Lin1itations of the study....................................................................................... . .......................... 3

1.6.Literature Review.............................................................................................. . .......................... '

CHAPTER TWO .................................................................................................................................. 5

2. 1. Background of Computer Crimes; .................................................................................................... :'i

2.2.Computer Crime Statistics;................................................................................. . ......................... :>

2.3.Motivations for computer crimes ......................................................................... . .......................... 7

CI-IA .. PTER THREE ............................................................................................................................ II

3.1.What are the main computer crime tools? ...................................................... . . ......................... II

3.2. Who are the perpetrators of online crime? ....................................................................................... I 1

vi

3.3. What are the threats to the public and busines:;':' ............................................ . ........................ I'

3.3.1.Public...................................... .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ................. 12

3.3.2.Business ...................................................................................................................................... 13

CtiAPTER FOUR ............................................................................................................................... l-1-

4. !.Challenges to enforcement of computer crimes ............................................................................... 14

4.2.ldentity of cybercriminals .................................................................................. . ······················· ].]

4.3.J urisdictional challenges .................................................................................... . . ........................ I')

4.4.The extra traditional processes challenge ..................................................... . I

····•·············· .. !

4.5.The nature of evidence .................................................................................................................... 21

4.6.Lack ol'e1lective reponing and death of data....................................................... . ..................... 23

4. 7.Cost, time and effort incurred in investigation and prosecution ..................... . . .. ······················ 2-l

4.8.Lack of adequate legislation and ineffective ones where extant ..................................................... 26

4. 9.1nternational law without enforcement mechanisms............................................ . ........................ 27

4. 10. Trained, poorly paid and lack of protection for l

4.11. Dearth of experts in prosecution of cybercrimes .. ....................................... ...... .. . ...................... 2lJ

4.12.Absence of one universal law governing cybercrimes .................................................................... 30

CHAPTER FIVE ................................................................................................................................. .32

S.l.l~ecotllilleildatioilS .......................................................................................................................... 32

REFERENCES .................................................................................................. . ·························· 33

.Books ................... '' ).)

.Journals

.International instruments ..................................................................................................................... 35

.Table of Cases......................................................................................................... . ....................... 3)

.Internet............................................................................................................... . ...................... :\

  • Department: Law
  • Project ID: LAW0457
  • Access Fee: ₦5,000
  • Pages: 44 Pages
  • Reference: YES
  • Format: Microsoft Word
  • Views: 448
Get this Project Materials
whatsappWhatsApp Us