EconPapers    
Economics at your fingertips  
 

Cyber policy for monitoring and regulating cyberspace and cyber security measures for combating technologically enhanced crime in South Africa

Chiji Longinus Ezeji
Additional contact information
Chiji Longinus Ezeji: University of Johannesburg, South Africa

International Journal of Business Ecosystem & Strategy (2687-2293), 2024, vol. 6, issue 5, 96-109

Abstract: Advancements in science and technology has resulted in substantial transformations inside society. The telecommunications sector has established cyberspace, a virtual domain for online communication, data exchange, and digital interactions. This platform enables individuals to interact and cultivate relationships worldwide, fostering a sense of proximity despite geographical separation. Nonetheless, these improvements provide concerns, since there has been an increase in cyber victimisation via cyberspace, the internet, computer networks, and online systems. Criminals are progressively utilising these technologies to perpetrate illicit actions, endangering individuals, governments, organisations, and institutions.This study analyses the evaluation of cyber policies for regulating, monitoring, and supervising cyberspace activities, along with the implementation of cybersecurity measures to address technologically advanced crime. A mixed methods strategy, including qualitative and quantitative methodologies, was employed for data collecting. The research revealed that although cyberspace provides avenues for social contact, idea exchange, information dissemination, commercial transactions, and additional activities, it remains susceptible to cyber threats including ransomware, fraud, warfare, terrorism, trafficking, and breaches of privacy. Formulating cyber regulations to regulate actions in cyberspace is crucial for efficient law enforcement, alongside the establishment of a cybersecurity framework to safeguard critical cyber systems and bolster security protocols across several sectors. To safeguard both the public and private sectors against cybersecurity risks, it is essential to create and execute plans. These tactics encompass the regular evaluation and auditing of security systems, investment in cybersecurity training programs, maintenance of current systems, formulation and rehearsal of incident response plans, and dissemination of information among experts and professionals.

Keywords: Combating; Cyberspace; Cyber Security; Cyber Policy; Regulating; Monitoring; Technologically Enhanced Crime and South Africa. (search for similar items in EconPapers)
Date: 2024
References: Add references at CitEc
Citations:

Downloads: (external link)
https://www.bussecon.com/ojs/index.php/ijbes/article/view/670/347 (application/pdf)
https://doi.org/10.36096/ijbes.v6i5.670 (text/html)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:adi:ijbess:v:6:y:2024:i:5:p:96-109

Access Statistics for this article

International Journal of Business Ecosystem & Strategy (2687-2293) is currently edited by Umit Hacioglu

More articles in International Journal of Business Ecosystem & Strategy (2687-2293) from Bussecon International Academy Bussecon International Academy, School of Business, IHU, Ordu cad. F-05 Blok No 3, 34480 Basaksehir, Istanbul, Turkey. Contact information at EDIRC.
Bibliographic data for series maintained by Umit Hacioglu ().

 
Page updated 2025-03-19
Handle: RePEc:adi:ijbess:v:6:y:2024:i:5:p:96-109