Applying the Routine Activities Theory to Cybercrime: A ‘Cyber’ Capable guardian.

Authors

  • Sagwadi Mabunda University of the Western Cape

Keywords:

Cybercrime, machine learning, artificial intelligence, designated point of contact, south africa, cyber capable guardian, type I cybercrimes, Routine Activities Theory

Abstract

This paper presents the third constitutive element of the Routine Activities Theory, the capable guardian, as a possible response to combatting cybercrime. It suggests a re-imagining of the concept of the capable guardian from its original form to what this study calls the cyber capable guardian. It argues that in order to combat cybercrime successfully, it is necessary to introduce artificial intelligence Technology in the form of machine learning to create a cyber capable guardian which will perform functions that a human capable guardian would not be able to perform. Finally, it discusses section 52 of the Cybercrimes Act, which provides for the Designated Point of Contact (DPoC). It argues that the DPoC would be a suitable capable guardian if it were to be created as an independent agency which is incorporated as a private company in terms of The Companies Act 71 of 2008. It further argues that the DPoC should be established with the chief mandate of combating cybercrime through the creation and operation of the Cyber Capable guardian.

Metrics

Metrics Loading ...

Downloads

Published

2024-08-15

How to Cite

Mabunda, S. (2024). Applying the Routine Activities Theory to Cybercrime: A ‘Cyber’ Capable guardian. Journal of Anti-Corruption Law, 8, 60–84. Retrieved from https://epubs.ac.za/index.php/jacl/article/view/1670