E- Crime under Section 86 of the Electronic Communications Act

dc.contributor.authorSithole, Tafadzwaen_ZA
dc.date.accessioned2014-07-30T18:09:47Z
dc.date.available2014-07-30T18:09:47Z
dc.date.issued2014-07-30
dc.description.abstractThe modest objective of this research paper is to provide a general overview of the phenomenon commonly known as e-crime or computer crime. More specifically, the discussion will center on section 86 of the Electronic Communications Act (ECT Act).1 The application of the criminal law provisions found in section 86 will be examined. Attempts will also be made to interpret the section. As with almost any new piece of legislation, interpretation problems may arise. Where this is the case, possible recommendations will be made. Lastly, the paper will focus on some the crimes that are not found in the Electronic Communications Act. The main task in this part of the paper is to determine whether the common law is sufficient to deal with these new offences. Conducts known as phishing, advance fee fraud, identity theft and cyber stalking will be discussed.en_ZA
dc.identifier.apacitationSithole, T. (2014). <i>E- Crime under Section 86 of the Electronic Communications Act</i>. (Thesis). University of Cape Town ,Faculty of Law ,Department of Commercial Law. Retrieved from http://hdl.handle.net/11427/4553en_ZA
dc.identifier.chicagocitationSithole, Tafadzwa. <i>"E- Crime under Section 86 of the Electronic Communications Act."</i> Thesis., University of Cape Town ,Faculty of Law ,Department of Commercial Law, 2014. http://hdl.handle.net/11427/4553en_ZA
dc.identifier.citationSithole, T. 2014-07-30. E- Crime under Section 86 of the Electronic Communications Act. University of Cape Town.en_ZA
dc.identifier.ris TY - Thesis / Dissertation AU - Sithole, Tafadzwa AB - The modest objective of this research paper is to provide a general overview of the phenomenon commonly known as e-crime or computer crime. More specifically, the discussion will center on section 86 of the Electronic Communications Act (ECT Act).1 The application of the criminal law provisions found in section 86 will be examined. Attempts will also be made to interpret the section. As with almost any new piece of legislation, interpretation problems may arise. Where this is the case, possible recommendations will be made. Lastly, the paper will focus on some the crimes that are not found in the Electronic Communications Act. The main task in this part of the paper is to determine whether the common law is sufficient to deal with these new offences. Conducts known as phishing, advance fee fraud, identity theft and cyber stalking will be discussed. DA - 2014-07-30 DB - OpenUCT DP - University of Cape Town LK - https://open.uct.ac.za PB - University of Cape Town PY - 2014 T1 - E- Crime under Section 86 of the Electronic Communications Act TI - E- Crime under Section 86 of the Electronic Communications Act UR - http://hdl.handle.net/11427/4553 ER - en_ZA
dc.identifier.urihttp://hdl.handle.net/11427/4553
dc.identifier.vancouvercitationSithole T. E- Crime under Section 86 of the Electronic Communications Act. [Thesis]. University of Cape Town ,Faculty of Law ,Department of Commercial Law, 2014 [cited yyyy month dd]. Available from: http://hdl.handle.net/11427/4553en_ZA
dc.language.isoenen_ZA
dc.publisher.departmentDepartment of Commercial Lawen_ZA
dc.publisher.facultyFaculty of Lawen_ZA
dc.publisher.institutionUniversity of Cape Town
dc.titleE- Crime under Section 86 of the Electronic Communications Acten_ZA
dc.typeMaster Thesis
dc.type.qualificationlevelMasters
dc.type.qualificationnameLLMen_ZA
uct.type.filetypeText
uct.type.filetypeImage
uct.type.publicationResearchen_ZA
uct.type.resourceThesisen_ZA
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
thesis_law_sitholet_2006.pdf
Size:
390.41 KB
Format:
Adobe Portable Document Format
Description:
Collections