02164nas a2200133 4500000000100000008004100001260001200042100002000054700002700074245007700101856017600178520166200354022001402016 2012 d c2012-061 aMarthie Grobler1 aJoey Jansen van Vuuren00aCollaboration as proactive measure against cyber warfare in South Africa uhttps://www.tandfonline.com/doi/pdf/10.1080/10246029.2012.654803?casa_token=ZIvHzHTczu0AAAAA:o5tVtRVLB2aC6qgzBEUALtTh6tsHllRHFH3-umIxeULWvuOWeev5LRtuShHLDHgllhUUmo2TIi6qtQ3 aThe international scope of the Internet and wide reach of technological usage requires cyber defence systems to intersect largely with the application and implementation of international legislation. One of the problems associated with the technological revolution is that cyber space comprises complex and dynamic technological innovations to which no current legal system is well suited. A further complication is the lack of comprehensive treaties facilitating international cooperation with regard to cyber defence. The result is that many countries will not be properly prepared or adequately protected by legislation in the event of a cyber attack on a national level. The article investigates this problem by touching on the influence that cyber defence has on the international position of the government. The article addresses the principles of cyber security and cyber warfare acts, and briefly touches on cyber security collaboration efforts for South Africa. The authors are of the opinion that Africa does not follow a coordinated approach in dealing with cyber security, and that the various structures that have been established to deal with cyber security are inadequate to deal with issues holistically. To work towards such a coordinated approach, it is suggested that specific interventions be developed to address cyber crime. This approach should create and maintain a partnership or collaboration between business, government and civil society. The authors are of the opinion that unless these spheres of society work together, Africa's efforts to ensure a secure cyber space may be compromised. © 2012 Institute for Security Studies. a1024-6029