The Challenges in Investigating and Prosecuting Computer Crimes. A Reflection On Online Fraud in Uganda.

TABLE OF CONTENTS

DECLARATION .................................................................................................... . . ......................... !

APPROVAL .......................................................................................................................................... 11

DEDICATION ...................................................................................................................................... 111

ACKNOWLEDGEMENT ...................................................................................................................... i\

ABSTRACT ........................................................................................................................................... v

CHAPTER ONE .................................................................................................................................... I

!.!.Introduction .................................................................................................. . I .. '

1.2.Scope of the study; ........................................................................................................................... 2

1.3.0bjectives ofthe study; ................................................................................ .. I .......................... -

1.3.1.General objective .............................................................................................. .

1.3.2.Specific objectives............................................................................................ . ......................... 3

1.4.I:Zesearch n1ethodology ............................................................................................ .......................... ~

1.4. 1 Research design................................................................................................. .. ....................... 3

1.4.2.Study population ............................................................................................ . ., .... "~

l. 5. Lin1itations of the study....................................................................................... . .......................... 3

1.6.Literature Review.............................................................................................. . .......................... '

CHAPTER TWO .................................................................................................................................. 5

2. 1. Background of Computer Crimes; .................................................................................................... :'i

2.2.Computer Crime Statistics;................................................................................. . ......................... :>

2.3.Motivations for computer crimes ......................................................................... . .......................... 7

CI-IA .. PTER THREE ............................................................................................................................ II

3.1.What are the main computer crime tools? ...................................................... . . ......................... II

3.2. Who are the perpetrators of online crime? ....................................................................................... I 1

vi

3.3. What are the threats to the public and busines:;':' ............................................ . ........................ I'

3.3.1.Public...................................... .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ................. 12

3.3.2.Business ...................................................................................................................................... 13

CtiAPTER FOUR ............................................................................................................................... l-1-

4. !.Challenges to enforcement of computer crimes ............................................................................... 14

4.2.ldentity of cybercriminals .................................................................................. . ······················· ].]

4.3.J urisdictional challenges .................................................................................... . . ........................ I')

4.4.The extra traditional processes challenge ..................................................... . I

····•·············· .. !

4.5.The nature of evidence .................................................................................................................... 21

4.6.Lack ol'e1lective reponing and death of data....................................................... . ..................... 23

4. 7.Cost, time and effort incurred in investigation and prosecution ..................... . . .. ······················ 2-l

4.8.Lack of adequate legislation and ineffective ones where extant ..................................................... 26

4. 9.1nternational law without enforcement mechanisms............................................ . ........................ 27

4. 10. Trained, poorly paid and lack of protection for l

4.11. Dearth of experts in prosecution of cybercrimes .. ....................................... ...... .. . ...................... 2lJ

4.12.Absence of one universal law governing cybercrimes .................................................................... 30

CHAPTER FIVE ................................................................................................................................. .32

S.l.l~ecotllilleildatioilS .......................................................................................................................... 32

REFERENCES .................................................................................................. . ·························· 33

.Books ................... '' ).)

.Journals

.International instruments ..................................................................................................................... 35

.Table of Cases......................................................................................................... . ....................... 3)

.Internet............................................................................................................... . ...................... :\

Overall Rating

0

5 Star
(0)
4 Star
(0)
3 Star
(0)
2 Star
(0)
1 Star
(0)
APA

HERBERT, A (2022). The Challenges in Investigating and Prosecuting Computer Crimes. A Reflection On Online Fraud in Uganda.. Afribary. Retrieved from https://tracking.afribary.com/works/the-challenges-in-investigating-and-prosecuting-computer-crimes-a-reflection-on-online-fraud-in-uganda

MLA 8th

HERBERT, A "The Challenges in Investigating and Prosecuting Computer Crimes. A Reflection On Online Fraud in Uganda." Afribary. Afribary, 09 Aug. 2022, https://tracking.afribary.com/works/the-challenges-in-investigating-and-prosecuting-computer-crimes-a-reflection-on-online-fraud-in-uganda. Accessed 23 Nov. 2024.

MLA7

HERBERT, A . "The Challenges in Investigating and Prosecuting Computer Crimes. A Reflection On Online Fraud in Uganda.". Afribary, Afribary, 09 Aug. 2022. Web. 23 Nov. 2024. < https://tracking.afribary.com/works/the-challenges-in-investigating-and-prosecuting-computer-crimes-a-reflection-on-online-fraud-in-uganda >.

Chicago

HERBERT, A . "The Challenges in Investigating and Prosecuting Computer Crimes. A Reflection On Online Fraud in Uganda." Afribary (2022). Accessed November 23, 2024. https://tracking.afribary.com/works/the-challenges-in-investigating-and-prosecuting-computer-crimes-a-reflection-on-online-fraud-in-uganda