Cyber Security in Nigeria: Appraising Cybercrime, the Existing Legal Framework, the Challenges and the Way Forward

2021 ◽  
Author(s):  
Israel Adekunle Adeniyi
2018 ◽  
Vol 235 ◽  
pp. 00037 ◽  
Author(s):  
Máté Zöldy ◽  
Imre Zsombók

In our research we highlighted the problematic of the refuelling of autonomous vehicles. During the way to be full autonomous, the vehicles take over more and more driving function from the driver. It is lot of focus on automotive cyber security or trajectory following, but refuelling is not in the main researches. After reviewing the vehicle drivetrains, it was specified which to focus for further testing. In the second part of the article the main influencers of fuel consumption was listed based on a literature overview. Main aspects of the carried out test is listed and results helped us to refine the research direction. For modelling the refuelling of the vehicle it is an enabler to set realistic models for fuel consumption. Relevant researches were studied and these was extended with overview of refuelling studies. Based on these the main direction of our research was set.


2021 ◽  
Vol VI (I) ◽  
pp. 68-81
Author(s):  
Syeda Sundus Anwar ◽  
Tughral Yamin

A clear lack of Civil-Military Cooperation is evident in the field of national cybersecurity policy. For a country such as Pakistan with fractious political, cultural, and diverse ethnic identities and ideological characteristics, an unguarded cyber domain can add to the existing rifts. In light of these challenges, Pakistan needs to create a national cybersecurity policy and strategy incorporating both civil and military concerns. The aim of this research paper is to find out a conceptual framework of Civil-Military Cooperation (CIMIC) in the realm of cybersecurity. This study has used open-ended semistructured interviews to find out the way forward and the hindrances in civil-military cooperation to create a robust national cybersecurity regime. For an effective national cybersecurity policy, synergy has to be created between the civil and military sectors. The military should not only have the necessary cybersecurity expertise, but it should also organize cyber-drills incorporating all stakeholders.


2018 ◽  
Author(s):  
Peter M. Shane

This critique of Karson K. Thompson’s note, "Not Like an Egyptian: Cybersecurity and the Internet Kill Switch Debate," argues that the U.S. lacks a framework of laws and regulations, "smart" or otherwise, that adequately incentivizes the parties with the greatest capacity to improve our cyber security to do so. It attributes the poor state of U.S. cyber policy to the "bewildering array of overlapping responsibilities" scattered among government offices and departments; the difficult imperative of sharing responsibility among military and civilian authorities; the fact that most of the networks (and the dependent critical infrastructures) that need protecting are in private hands; and the lack of public understanding of the kinds of regulation that are necessary or appropriate. The essay argues that meaningful progress towards an adequate legal framework depends on a broad national debate aimed at defining the public good with regard to cyber-security, and the inevitable trade-offs among security, privacy, productivity, economic growth, organizational flexibility, military effectiveness, government transparency, and accountability that must be confronted in making sensible cyber-security policy.


2020 ◽  
Vol 9 (1) ◽  
pp. 406
Author(s):  
Sergiy Dubchak ◽  
Valentyna Goshovska ◽  
Volodymyr Goshovskyi ◽  
Oleksandr Svetlychny ◽  
Olena Gulac

The article is devoted to the analysis of legal regulation of the sphere of nuclear safety and security of Ukraine on the way to European integration. The authors drew attention to the importance of Ukraine achieving the necessary level of and nuclear sefaty and security adopted in the EU member states. The emphasis was placed on the fact that the prospects for fulfilling national obligations in the field of nuclear safety in accordance with European standards directly depend on solving the problems of ensuring the functioning of nuclear facilities, the physical protection of nuclear materials and installations as well as radioactive waste management. The main directions of ensuring the nuclear safety and secutiry in the world within the international law are considered. The role and activities of the International Atomic Energy Agency (IAEA) in setting up a regulatory framework for nuclear safety and security are analyzed. The international legal framework for nuclear safety and security was discused.The legislative basis for nuclear safety and secutiry in the EU IS characterized. The issue of legal norms unification in the field of nuclear safety regulation of EU member states was considered. The principles of legal regulation of nuclear a safety and security in Ukraine are characterized. Key words: nuclear safety, nuclear security, public administration of nuclear safety and security, legal regulation of nuclear safety and security, European integration, sustainable development in the field of ensuring nuclear safety and security. UDC 35:574:339.9:349.6        JEL Classification: K 23, K 32, K 33,  Q 5


2021 ◽  
Vol 3 (2) ◽  
pp. 10-15
Author(s):  
Nancy Asbaghipour ◽  
Reza Simbar

No part of society can elude legitimate occasions. Some of the time, eagerly or unwillingly, another is hurt, and the issue of hurtful obligation or how to compensate is raised by others. The rules and controls of each nation or other nations may be distinctive, and the way of demonstrating obligation and its components and the approach of the courts in deciding the sum of harms may moreover be diverse. Since the legitimate British framework is to some degree diverse from the legitimate Iranian framework, it appears valuable to know the sees of this framework. The think about of these likenesses and contrasts, counting the way of sanctioning laws, their modification, the way of the trial of courts and the limits of duties and the way of execution of judgments, raises numerous scores and gives other viewpoints for analysts to be utilized in tackling issues in society. The article presented attempts to clarify the perspective of the UK legal framework and compare it with the Iranian legal framework in terms of designing respectful risks within the contract to realize the over the result. All legitimate frameworks look for a full stipend. In this respect, due to the reality that the strategy of remuneration among other remuneration strategies within the UK, the legitimate framework of this nation has set exact criteria based on which the assurance of full emolument. It is more standard and precise. Iranian law is generally appropriate on the issue of damages. This can occur despite the fact that the refusal of the rule of the presence of a way of a stipend in infringement of legally binding commitments has not been considered with assurance.


2014 ◽  
pp. 471-514
Author(s):  
Catherine B. Lotrionte

This chapter discusses the nature of cyber threats against government and private computer systems, describing some steps the government has taken and the challenges involved in protecting those systems. The chapter argues that a national security approach for cyber security policy is the most promising option for preventing these cyber threats while operating within the domestic legal framework. After a review of the President's constitutional authorities to protect the nation from traditional threats, the chapter concludes that the President has some power to monitor Internet communications in transit within the United States when the communications threaten the welfare of the nation. The chapter recommends that this authority be augmented by Congressional action through legislation. The President's powers in cyber security, even given Congressional support, however, are still restrained by the protections the Fourth Amendment provides for traditional forms of communication and individual privacy. Although there is limited Fourth Amendment precedent in the area of cyber security, the well-established exceptions to the Fourth Amendment requirements, based on consent, special governmental needs and the reasonableness of the search or seizure, provide a legal basis for executive branch action to protect critical infrastructures and their computer systems. As the Courts have long held, these exceptions allow the government to conduct searches or seizures without being bound by all of the requirements of the Fourth Amendment. If the government develops its cyber security policy in line with these exceptions, this chapter argues the government can both protect critical computer systems and operate within Fourth Amendment doctrine that recognizes the legitimacy of privacy in electronic communications.


Author(s):  
Wouters Cornelis (Kees)

Armed conflicts have always been and still are major causes of refugee movements. They invariably cause human suffering, destroying State and societal structure and affecting the lives of civilian populations. While it is difficult to contest that people should not be returned to conflict, different thinking and practices are discernable in relation to the applicable legal framework for providing refugee protection to people displaced across borders by conflict. These discrepancies arise in part from the way in which conflicts are understood; the way in which the definition of a refugee in the Refugee Convention has been interpreted and applied; and in part from limitations in the definition itself. Recognizing ‘conflict refugees’ as refugees within the international legal framework requires an understanding of the dynamics of conflicts and a dynamic interpretation of the refugee definitions at global and regional levels.


2020 ◽  
Vol 11 (2) ◽  
pp. 131-141
Author(s):  
Federico Fusco

The present paper investigates the ongoing validity of the notion of subordination as selection criteria to allocate the labour protections in the contemporary economic framework. The gig economy is deeply affecting the way of working, transforming the employee in a service provider. This phenomenon is partially due to the progressive shift from a firm-based production model towards a market transaction based one. Although its lawfulness is still unclear, it highlights that the way of working is changing in a way that struggles to fit into the classic legal categories. This is mainly due to the fact that the labour protections are usually bestowed moving from a notion of subordination highly focused on the organisational element. Thus, economic actors suffering from the same economic weakness of the employees, but organisationally independent, struggle to obtain the necessary protections. Moving from those remarks the author suggests rethinking the allocation criteria of the labour protections, adopting economic weakness as the main criterion. This category should encompass all the individuals performing a working activity that are not able to significantly influence its financial outcome. The aim of such reform should be to extend the labour protections to all the subjects needing them. The final part of the paper investigates the possible solutions under the current legal framework. The major finding is that under certain circumstances the gig workers can be qualified as temporary employees not of the platform, but of the contractor. In this scenario, the digital platforms should be deemed as job-placement service providers and, thus, they should comply with the relevant provisions. These include the eventual need of administrative authorisations and the free-of-charge principle, whose violations represent, in several jurisdictions, a criminal offence


Sign in / Sign up

Export Citation Format

Share Document