E- Crime under Section 86 of the Electronic Communications Act
| dc.contributor.author | Sithole, Tafadzwa | en_ZA |
| dc.date.accessioned | 2014-07-30T18:09:47Z | |
| dc.date.available | 2014-07-30T18:09:47Z | |
| dc.date.issued | 2014-07-30 | |
| dc.description.abstract | The modest objective of this research paper is to provide a general overview of the phenomenon commonly known as e-crime or computer crime. More specifically, the discussion will center on section 86 of the Electronic Communications Act (ECT Act).1 The application of the criminal law provisions found in section 86 will be examined. Attempts will also be made to interpret the section. As with almost any new piece of legislation, interpretation problems may arise. Where this is the case, possible recommendations will be made. Lastly, the paper will focus on some the crimes that are not found in the Electronic Communications Act. The main task in this part of the paper is to determine whether the common law is sufficient to deal with these new offences. Conducts known as phishing, advance fee fraud, identity theft and cyber stalking will be discussed. | en_ZA |
| dc.identifier.apacitation | Sithole, T. (2014). <i>E- Crime under Section 86 of the Electronic Communications Act</i>. (Thesis). University of Cape Town ,Faculty of Law ,Department of Commercial Law. Retrieved from http://hdl.handle.net/11427/4553 | en_ZA |
| dc.identifier.chicagocitation | Sithole, Tafadzwa. <i>"E- Crime under Section 86 of the Electronic Communications Act."</i> Thesis., University of Cape Town ,Faculty of Law ,Department of Commercial Law, 2014. http://hdl.handle.net/11427/4553 | en_ZA |
| dc.identifier.citation | Sithole, T. 2014-07-30. E- Crime under Section 86 of the Electronic Communications Act. University of Cape Town. | en_ZA |
| dc.identifier.ris | TY - Thesis / Dissertation AU - Sithole, Tafadzwa AB - The modest objective of this research paper is to provide a general overview of the phenomenon commonly known as e-crime or computer crime. More specifically, the discussion will center on section 86 of the Electronic Communications Act (ECT Act).1 The application of the criminal law provisions found in section 86 will be examined. Attempts will also be made to interpret the section. As with almost any new piece of legislation, interpretation problems may arise. Where this is the case, possible recommendations will be made. Lastly, the paper will focus on some the crimes that are not found in the Electronic Communications Act. The main task in this part of the paper is to determine whether the common law is sufficient to deal with these new offences. Conducts known as phishing, advance fee fraud, identity theft and cyber stalking will be discussed. DA - 2014-07-30 DB - OpenUCT DP - University of Cape Town LK - https://open.uct.ac.za PB - University of Cape Town PY - 2014 T1 - E- Crime under Section 86 of the Electronic Communications Act TI - E- Crime under Section 86 of the Electronic Communications Act UR - http://hdl.handle.net/11427/4553 ER - | en_ZA |
| dc.identifier.uri | http://hdl.handle.net/11427/4553 | |
| dc.identifier.vancouvercitation | Sithole T. E- Crime under Section 86 of the Electronic Communications Act. [Thesis]. University of Cape Town ,Faculty of Law ,Department of Commercial Law, 2014 [cited yyyy month dd]. Available from: http://hdl.handle.net/11427/4553 | en_ZA |
| dc.language.iso | en | en_ZA |
| dc.publisher.department | Department of Commercial Law | en_ZA |
| dc.publisher.faculty | Faculty of Law | en_ZA |
| dc.publisher.institution | University of Cape Town | |
| dc.title | E- Crime under Section 86 of the Electronic Communications Act | en_ZA |
| dc.type | Master Thesis | |
| dc.type.qualificationlevel | Masters | |
| dc.type.qualificationname | LLM | en_ZA |
| uct.type.filetype | Text | |
| uct.type.filetype | Image | |
| uct.type.publication | Research | en_ZA |
| uct.type.resource | Thesis | en_ZA |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- thesis_law_sitholet_2006.pdf
- Size:
- 390.41 KB
- Format:
- Adobe Portable Document Format
- Description: