TABLE OF CONTENTS
DECLARATION .................................................................................................... . . ......................... !
APPROVAL .......................................................................................................................................... 11
DEDICATION ...................................................................................................................................... 111
ACKNOWLEDGEMENT ...................................................................................................................... i\
ABSTRACT ........................................................................................................................................... v
CHAPTER ONE .................................................................................................................................... I
!.!.Introduction .................................................................................................. . I .. '
1.2.Scope of the study; ........................................................................................................................... 2
1.3.0bjectives ofthe study; ................................................................................ .. I .......................... -
1.3.1.General objective .............................................................................................. .
1.3.2.Specific objectives............................................................................................ . ......................... 3
1.4.I:Zesearch n1ethodology ............................................................................................ .......................... ~
1.4. 1 Research design................................................................................................. .. ....................... 3
1.4.2.Study population ............................................................................................ . ., .... "~
l. 5. Lin1itations of the study....................................................................................... . .......................... 3
1.6.Literature Review.............................................................................................. . .......................... '
CHAPTER TWO .................................................................................................................................. 5
2. 1. Background of Computer Crimes; .................................................................................................... :'i
2.2.Computer Crime Statistics;................................................................................. . ......................... :>
2.3.Motivations for computer crimes ......................................................................... . .......................... 7
CI-IA .. PTER THREE ............................................................................................................................ II
3.1.What are the main computer crime tools? ...................................................... . . ......................... II
3.2. Who are the perpetrators of online crime? ....................................................................................... I 1
vi
3.3. What are the threats to the public and busines:;':' ............................................ . ........................ I'
3.3.1.Public...................................... .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ................. 12
3.3.2.Business ...................................................................................................................................... 13
CtiAPTER FOUR ............................................................................................................................... l-1-
4. !.Challenges to enforcement of computer crimes ............................................................................... 14
4.2.ldentity of cybercriminals .................................................................................. . ······················· ].]
4.3.J urisdictional challenges .................................................................................... . . ........................ I')
4.4.The extra traditional processes challenge ..................................................... . I
····•·············· .. !
4.5.The nature of evidence .................................................................................................................... 21
4.6.Lack ol'e1lective reponing and death of data....................................................... . ..................... 23
4. 7.Cost, time and effort incurred in investigation and prosecution ..................... . . .. ······················ 2-l
4.8.Lack of adequate legislation and ineffective ones where extant ..................................................... 26
4. 9.1nternational law without enforcement mechanisms............................................ . ........................ 27
4. 10. Trained, poorly paid and lack of protection for l
4.11. Dearth of experts in prosecution of cybercrimes .. ....................................... ...... .. . ...................... 2lJ
4.12.Absence of one universal law governing cybercrimes .................................................................... 30
CHAPTER FIVE ................................................................................................................................. .32
S.l.l~ecotllilleildatioilS .......................................................................................................................... 32
REFERENCES .................................................................................................. . ·························· 33
.Books ................... '' ).)
.Journals
.International instruments ..................................................................................................................... 35
.Table of Cases......................................................................................................... . ....................... 3)
.Internet............................................................................................................... . ...................... :\
HERBERT, A (2022). The Challenges in Investigating and Prosecuting Computer Crimes. A Reflection On Online Fraud in Uganda.. Afribary. Retrieved from https://afribary.com/works/the-challenges-in-investigating-and-prosecuting-computer-crimes-a-reflection-on-online-fraud-in-uganda
HERBERT, A "The Challenges in Investigating and Prosecuting Computer Crimes. A Reflection On Online Fraud in Uganda." Afribary. Afribary, 09 Aug. 2022, https://afribary.com/works/the-challenges-in-investigating-and-prosecuting-computer-crimes-a-reflection-on-online-fraud-in-uganda. Accessed 23 Nov. 2024.
HERBERT, A . "The Challenges in Investigating and Prosecuting Computer Crimes. A Reflection On Online Fraud in Uganda.". Afribary, Afribary, 09 Aug. 2022. Web. 23 Nov. 2024. < https://afribary.com/works/the-challenges-in-investigating-and-prosecuting-computer-crimes-a-reflection-on-online-fraud-in-uganda >.
HERBERT, A . "The Challenges in Investigating and Prosecuting Computer Crimes. A Reflection On Online Fraud in Uganda." Afribary (2022). Accessed November 23, 2024. https://afribary.com/works/the-challenges-in-investigating-and-prosecuting-computer-crimes-a-reflection-on-online-fraud-in-uganda