AN ANALYSIS OF THE LEGAL FRAMEWORK OF CYBER RELATED CRIMES IN UGANDA

  • Type: Project
  • Department: Law
  • Project ID: LAW0429
  • Access Fee: ₦5,000 ($14)
  • Pages: 41 Pages
  • Format: Microsoft Word
  • Views: 475
  • Report This work

For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

Table of contents

Declaration .............................................................................................................................................. ii

Approval ................................................................................................................................................ iii

Dedication .............................................................................................................................................. iv

Acknowledgements ................................................................................................................................. v

List of acronyms ..................................................................................................................................... vi

List of cases .......................................................................................................................................... vii

List of statutes ...................................................................................................................................... viii

Table of contents .................................................................................................................................... ix

Abstract. ................................................................................................................................................ xii

CHAPTER ONE ..................................................................................................................................... 1

1.0 Introduction ....................................................................................................................................... 1

1.1 Background of the study .................................................................................................................... 1

1.2 Statement of the problem ................................................................................................................... 5

1.3 General Objective of the study ........................................................................................................... 5

1.4 Specific Objectives of the study ......................................................................................................... 5

1.5 Research questions ............................................................................................................................ 6

1.6 Scope of the study ............................................................................................................................. 6

1.7 Significance of the study .................................................................................................................... 6

1.8 Methodology ..................................................................................................................................... 7

1.9 Literature review ............................................................................................................................... 7

1.10 Chapterization ............................................................................................................................... 21

CHAPTER TWO .................................................................................................................................. 22

LEGAL FRAMEWORK ON CYB ER SECURITY IN UGANDA ......................................................... 22

2.0 Introduction ..................................................................................................................................... 22

ix

2.1 Electronic Transaction Act. .............................................................................................................. 22

2.2 The Electronic Signatures Act.. ........................................................................................................ 23

2.3 The Computer Misuse Act ............................................................................................................... 23

CHAPTER THREE ............................................................................................................................... 26

CHALLENGES ASSOCIATED WITH CYB ER CRIME ...................................................................... 26

3.0 Introduction ..................................................................................................................................... 26

3.1 Reliance on ICTs ............................................................................................................................. 26

3.2 Number of users .............................................................................................................................. 27

3.3 Availability of devices and access .................................................................................................... 28

3.4 Availability of information .............................................................................................................. 29

3.5 Missing mechanisms of control ........................................................................................................ 30

3.6 Independence of location and presence at the crime site ................................................................... 30

3.7 Automation ...................................................................................................................................... 31

3 .8 Resources ........................................................................................................................................ 32

3.9 Conclusion ...................................................................................................................................... 32

CHAPTER FOUR ................................................................................................................................. 34

STRATEGIES IN THE FIGHT AGAINST CYBERCRIME .................................................................. 34

4.0 Introduction ..................................................................................................................................... 34

4.1 Implementation of existing strategies ............................................................................................... 34

4.2 Regional differences ........................................................................................................................ 34

4.3 Relevance of cybercrime issues within the pillars of cyber security .................................................. 35

4.4 A cybercrime policy as starting point ............................................................................................... 35

4.5 Responsibility within the government .............................................................................................. 36

4.6 Defining the different components ................................................................................................... 36

4.7 Determination of stakeholders .......................................................................................................... 37

X

4.8 Defining key topics for legislation ................................................................................................... 38

4.9 Legal measures ................................................................................................................................ 39

4.10 Conclusion .................................................................................................................................... 40

CHAPTER FIVE ................................................................................................................................... 42

LEGAL PENAL TIES AND CONTRIBUTIONS TO THE ELIMINATION OF CYBER CRIMES ....... 42

5.0 Introduction ..................................................................................................................................... 42

5.1 United Nations and United Nations Office on Drugs and Crimes ...................................................... 42

5.2 International Telecommunication Union .......................................................................................... 44

5.3 European Union ............................................................................................................................... 45

5.4 The Commonwealth ........................................................................................................................ 46

5.5 Conclusion ...................................................................................................................................... 46

5.6 Recommendations ........................................................................................................................... 47

References ............................................................................................................................................. 49

Abstract Thii; report provides a comprehensive overview of the most relevant topics linked to the legal aspects of cybercrime and focuses on the demands of developing countries. Due to the transnational dimension of cybercrime, the legal instruments are the same for developing and developed countries. However, the references used were selected for the benefit of the case study (Uganda), in addition to a broad selection of resources provided for a more in-depth study of the different topics. Whenever possible, publicly available sources were used, including many freeof-charge editions of online law journals. The report contains five main chapters. After an introduction (Chapter I), it provides an overview of the phenomena of cybercrime (Chapter 2). This includes descriptions of how crimes are committed and explanations of the most widespread cybercrime offences such as hacking, identity theft and denial-of service attacks. An overview of the causes of cybercrimes in Uganda and the world at large, prosecution of cybercrirne (Chapters 3 and 4). After a summary of some of the activities undertaken by international and regional organizations in the fight against cybercrirne and also it continues with an analysis of different legal approaches with regard to substantive criminal law, procedural law, digital evidence, international cooperation and the responsibility of Internet service providers (Chapter 5) discusses the conclusions and recommendations to the study.

AN ANALYSIS OF THE LEGAL FRAMEWORK OF CYBER RELATED CRIMES IN UGANDA
For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

Share This
  • Type: Project
  • Department: Law
  • Project ID: LAW0429
  • Access Fee: ₦5,000 ($14)
  • Pages: 41 Pages
  • Format: Microsoft Word
  • Views: 475
Payment Instruction
Bank payment for Nigerians, Make a payment of ₦ 5,000 to

Bank GTBANK
gtbank
Account Name Obiaks Business Venture
Account Number 0211074565

Bitcoin: Make a payment of 0.0005 to

Bitcoin(Btc)

btc wallet
Copy to clipboard Copy text

500
Leave a comment...

    Details

    Type Project
    Department Law
    Project ID LAW0429
    Fee ₦5,000 ($14)
    No of Pages 41 Pages
    Format Microsoft Word

    Related Works

    Table of Contents DECLARATION ............................................................................................................................. i APPROVAL .................................................................................................................................. ii DEDICATION... Continue Reading
    ABSTRACT The main objective of this study was to provide an analysis of the effectiveness of the legal framework on the protection and enforcement of work rights in Uganda. The study found out that numerous labour laws were enacted by parliament in the year 2006 to act as guidelines to both the employers and the employees in the pr?tection and... Continue Reading
    ABSTRACT The main objective of this study was to provide an analysis of the effectiveness of the legal framework on the protection and enforcement of work rights in Uganda. The study found out that numerous labour laws were enacted by parliament in the year 2006 to act as guidelines to both the employers and the employees in the pr?tection and... Continue Reading
    TABLE OF CONTENTS DECLARATION ii APPROVAL iii DEDICATION iv ACKNOWLEDGEMENT v LIST OF STATUES vi CASES vi CHAPTER ONE 1 INTRODUCTION 1 1 .0 General introduction 1. 1 Histoiy and background of the study 3 1.2 Statement of the problem 6 1.3 Objectives of the Study 6 1 .4 Research questions 7 1.5 Scope of the Research 7 1.6 Significance of the study... Continue Reading
    • Type:Project
    • ID:LAW0373
    • Department:Law
    • Pages:107
    Abstract In the recent years Domestic Violence in Uganda has been on the rise and it has affected people in many families especially children. women and men. These continue to be adversely impacted b) the Domestic Violence which occurs in families and homes. However there has not been sufficient research professing the causes and impacts of... Continue Reading
    TABLE OF CONTENTS DECLARATION .............................................................................................................................. i APPROVAL .................................................................................................................................... ii DEDICATION... Continue Reading
    CONTENTS DECLARATION ......................................................................................................................................... ii APPROVAL ............................................................................................................................................... iii DEDICATION... Continue Reading
    TABLE OF CONTENTS DECLARATION ..................................................................................................................... .i APPROVAL ............................................................................................................................ ii . . ACKNOWLEDGEMENT... Continue Reading
    TABLE OF CONTENTS DECLARA TION .............................................................................................................................. i APPROVAL ................................................................................................................................... ii DEDICATION... Continue Reading
    Abstract The study assessed the effectiveness of legal framework on gender inequality in Uganda. It was guided by the following objectives to examine the forms and causes of gender inequality, in Uganda, to analyze the legal framework on gender inequality in· Uganda, to examine the extent to which gender inequality laws have been enforced in... Continue Reading
    Call Us
    whatsappWhatsApp Us