2016
DOI: 10.5120/ijca2016909193
|View full text |Cite
|
Sign up to set email alerts
|

A Mobile Forensic Readiness Model aimed at Minimizing Cyber Bullying

Abstract: The existence of mobile devices in today's modern society has generated greater advantages to many users especially within the African continent with regard to how information is being disseminated. However, the efficacy of mobile device technology has not come without some drawbacks, especially with the proliferation of Internet enabled mobile devices among young people. Trends of cyber-bullying, for example, are on the increase and recent studies in South Africa have shown that the use of mobile devices amon… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 9 publications
0
0
0
Order By: Relevance
“…"Citizen journalism, also known as collaborative media, or street journalism, is based upon public citizens "playing an active role in the process of collecting, reporting, analyzing, and disseminating news and information" [1]. Tracking or monitoring incidents based on personal traits, characteristics, locations or collecting aspects of digital data that can be used in hypothesis creation is positioned to offer a practical approach towards combating cybersecurity incidents albeit from post-event response approach [4][5] [6].…”
Section: Introductionmentioning
confidence: 99%
“…"Citizen journalism, also known as collaborative media, or street journalism, is based upon public citizens "playing an active role in the process of collecting, reporting, analyzing, and disseminating news and information" [1]. Tracking or monitoring incidents based on personal traits, characteristics, locations or collecting aspects of digital data that can be used in hypothesis creation is positioned to offer a practical approach towards combating cybersecurity incidents albeit from post-event response approach [4][5] [6].…”
Section: Introductionmentioning
confidence: 99%