• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 61
  • 7
  • 4
  • 3
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 85
  • 85
  • 40
  • 38
  • 32
  • 30
  • 26
  • 24
  • 21
  • 18
  • 14
  • 14
  • 12
  • 12
  • 12
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
81

Cyber crime: a comparative law analysis

Maat, Sandra Mariana 11 1900 (has links)
The Electronic Communications and Transactions Act, 25 of 2002, eradicated various lacunae that previously existed in respect of cyber crimes. Cyber crimes such as inter alia hacking, rogue code, unauthorised modification of data and denial of service attacks have now been criminalised. Specific criminal provisions in relation to spamming, computer-related fraud and extortion have also been included in the Act. It is argued that theft of incorporeal items such as information has already been recognised in our law, but has not been taken to its logical conclusion in our case law. However, there are instances where neither the common law nor our statutory provisions are applicable and where there is still a need for legislative intervention. The Act sufficiently deals with jurisdiction, the admissibility of data messages, the admissibility of electronic signatures and the regulation of cryptography. Cyber inspectors are a new addition to law enforcement. / Jurisprudence / L. L. M.
82

Internet-based electronic payment systems

Kortekaas, Birgit Friederike 01 January 2002 (has links)
As today, the traditional payment systems of cash, cheques and credit cards are being supplemented by electronic cheques, electronic credit card-based systems, and token-based systems, online security is of utmost importance and one of the biggest criteria used for evaluating electronic payment systems. Electronic payment systems must guarantee the essential security requirements: confidentiality, privacy, integrity, availability. authentication, non-repudiation as well as anonymity and trust. This paper compares the various payment systems (both traditional and electronic) available today mainly according to their security aspects. Secure processing can be accomplished including access controls and detection techniques, such as, encrypted communication channels, user and/or message authentication, symmetric and asymmetric encryption, digital certificates and firewalls. These effective security measures, which are outlined in detail in this paper, will protect the information and payment systems against security risks that currently threaten the Internet / Computing / M.Sc. (Information Systems)
83

A comparative review of legislative reform of electronic contract formation in South Africa

Snail, Sizwe 09 May 2016 (has links)
Electronic contracts in the new technological age and electronic commerce have brought about world-wide legal uncertainty. When compared to the traditional paper-based method of writing and signing, the question has arisen whether contracts concluded by electronic means should be recognised as valid and enforceable agreements in terms of the functional equivalence approach. This study will examine the law regulating e-commerce from a South African perspective in contrast to international trends and e-commerce law from the perspective of the United States. The research investigates various aspects of contract formation such as time and place, validity of electronic agreements, electronic signatures, attribution of electronic data messages and signatures, automated transaction as well as select aspects of e-jurisdiction from a South African and United States viewpoint. / Mercantile Law / LLM
84

Elektroniska underskrifter, ett tekniskt och juridiskt fenomen : En utredning av elektroniska underskrifters rättsliga förhållande till teknik och funktioner / Electronic signatures, a technical and legal phenomenon : An investigation of electronic signatures legal relationship to technology and functions

Jonsson, Isak, Nahlbom, Robin January 2022 (has links)
I uppsatsen utreds det tekniska och juridiska fenomenet elektroniska underskrifter, som idag till viss del har ersatt traditionella handskrivna underskrifter. Den rättsliga ställningen för elektroniska underskrifter påverkas direkt av den teknik de bygger på, varför juridiken bör anses vara nära sammankopplad med tekniken. Innebörden av en elektronisk underskrift kan sägas vara kontrollerbara uppgifter i elektronisk form som bland annat möjliggör att en person som har undertecknat en handling kan verifieras. Elektroniska underskrifters funktioner jämförs vanligtvis med handskrivna underskrifter trots att funktionerna uppfylls med hjälp av olika tekniska lösningar. En elektronisk underskrift fyller fem olika funktioner som bland annat gör användningen av elektroniska underskrifter säker för dess användare. EIDAS-förordningen är central för elektroniska underskrifters rättsverkan och avser att vara en teknikneutral reglering. Något regelverk för hur den underliggande tekniken ska vara utformad finns inte. Tre typer av elektroniska underskrifter kan identifieras av förordningen, vilka är enkla, avancerade och kvalificerade elektroniska underskrifter. De olika underskriftstyperna skiljer sig åt både avseende krav och rättsverkan. EIDAS-förordningens mest betydelsefulla bestämmelse torde vara att en elektronisk underskrift som huvudregel inte får förvägras rättslig verkan på grund av dess elektroniska form. Formkrav som uppställs i nationell rätt kan hindra elektroniska underskrifter från att användas. I svensk rätt förekommer både formalavtal som tillåter och inte tillåter att elektroniska underskrifter används. Bestämmelser kan även föreskriva att en viss typ av elektronisk underskrift får eller ska användas. Konsensualavtal kan till skillnad från formalavtal användas obehindrat med elektroniska underskrifter, eftersom avtalstypen är flexibel i sin natur. När elektroniska underskrifter används i en elektronisk miljö skulle problem avseende viljeförklaringar kunna uppstå och påverka konsensualavtal. Exempelvis om viljeförklaringar avges snabbt genom några knapptryck eller om elektroniska undertecknandetjänster är otydligt utformade för användare. Elektroniska underskrifter bör anses ha såväl juridiska som tekniska förutsättningar för att i framtiden kunna användas i ännu större omfattning än idag.
85

Secure Digital Provenance: Challenges and a New Design

Rangwala, Mohammed M. January 2014 (has links)
Indiana University-Purdue University Indianapolis (IUPUI) / Derived from the field of art curation, digital provenance is an unforgeable record of a digital object's chain of successive custody and sequence of operations performed on the object. It plays an important role in accessing the trustworthiness of the object, verifying its reliability and conducting audit trails of its lineage. Digital provenance forms an immutable directed acyclic graph (DAG) structure. Since history of an object cannot be changed, once a provenance chain has been created it must be protected in order to guarantee its reliability. Provenance can face attacks against the integrity of records and the confidentiality of user information, making security an important trait required for digital provenance. The digital object and its associated provenance can have different security requirements, and this makes the security of provenance different from that of traditional data. Research on digital provenance has primarily focused on provenance generation, storage and management frameworks in different fields. Security of digital provenance has also gained attention in recent years, particularly as more and more data is migrated in cloud environments which are distributed and are not under the complete control of data owners. However, there still lacks a viable secure digital provenance scheme which can provide comprehensive security for digital provenance, particularly for generic and dynamic ones. In this work, we address two important aspects of secure digital provenance that have not been investigated thoroughly in existing works: 1) capturing the DAG structure of provenance and 2) supporting dynamic information sharing. We propose a scheme that uses signature-based mutual agreements between successive users to clearly delineate the transition of responsibility of the digital object as it is passed along the chain of users. In addition to preserving the properties of confidentiality, immutability and availability for a digital provenance chain, it supports the representation of DAG structures of provenance. Our scheme supports dynamic information sharing scenarios where the sequence of users who have custody of the document is not predetermined. Security analysis and empirical results indicate that our scheme improves the security of the typical secure provenance schemes with comparable performance.

Page generated in 0.0459 seconds