Access the full text.
Sign up today, get DeepDyve free for 14 days.
Jamaica continues to experience financial crimes particularly in cyberspace including e-fraud, identity theft, credit card forging, money laundering and terrorist activities. Spoofing, spamming, virus propagation, spear phishing, buffer overflow and denial of service continue to be weaknesses found in organization’s cybersecurity in Jamaica. With the emergence of cryptocurrency and digital currency it is important that Jamaica uses intelligence led policing and data analysis to reduce and prevent financial crimes such as money laundering and corruption proceeds.Design/methodology/approachLiterature review; review of domestic legislation; review of current matters in courts.FindingsCybersecurity is no longer a pure computer security issue but instead, cybersecurity is seen as a national policy matter because the illicit use of cyberspace could have a significant impact on the financial sector in Jamaica. Cyberattacks have been successfully targeting the financial sector worldwide. While much of the efforts and resources to address the risk imposed by these cyberattacks are directed at developed economies, far less attention has been devoted to developing nations. Because many of these nations such as Jamaica have modest cyber capabilities, their ability to respond to cyberattacks can be limited, yet they need to respond to these attacks to protect their critical financial infrastructure.Originality/valueThere are few scholarly articles that focus on cybersecurity issues and legislation in Jamaica.
Journal of Financial Crime – Emerald Publishing
Published: Jan 2, 2023
Keywords: Jamaica; Financial crime; Cybersecurity
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.