Understanding Cybercrime in Malaysia: An Overview

Authors

  • Prasad Jayabalan Advanced Informatics School, Universiti Teknologi Malaysia (UTM), Jalan Semarak 54100 Kuala Lumpur, Malaysia
  • Roslina Ibrahim Advanced Informatics School, Universiti Teknologi Malaysia (UTM), Jalan Semarak 54100 Kuala Lumpur, Malaysia
  • Azizah Abdul Manaf Advanced Informatics School, Universiti Teknologi Malaysia (UTM), Jalan Semarak 54100 Kuala Lumpur, Malaysia

DOI:

https://doi.org/10.11113/sh.v2n2.424

Keywords:

Cybercrime, internet crime, cyber legislation

Abstract

Rapid developments of internet technology and cyber world have created new opportunities for irresponsible people to take advantage of internet users. Millions of internet users across globe have fallen victim to cybercrime. However, many issues regarding cybercrime are not fully understood yet. It is important to thoroughly understand many aspects of cybercrime for better decision making. This paper provides an overview of cybercrime in Malaysia including current state and statistics of cybercrime, common types of cybercrime, brief description of Malaysian cyber laws and describes the role of Malaysian government in responding to cyber security incidents. Hopefully, this paper will enrich current scenarios of cybercrime in Malaysia. Finally, the directions for future research were discussed.

References

Babu, M., & Parishat, M. (2004). What is cybercrime? Retrieved August 27, 2013, from http://www.crime-research.org/analytics/702/.

BBC News. (2001). Life of Crime Part 5, United Kingdom. Retrieved September 30, 2013 from http://news.bbc.co.uk/hi/english/static/in_depth/uk/2001/life_of_crime/cybercriminals.stm>.

BBC, Spammers and Virus Writers Unite, BBC News Online. (2003). Retrieved June 10, 2014 from http://news.bbc.co.uk/1/hi/technology/2988209.stm.

Communications and Mutimedia Act 1998 (REPRINT). (2006). Retrieved September 30, 2013 from http://www.agc.gov.my/Akta/Vol.%2012/Act%20588.pdf.

Computer Crime Act 1997 (REPRINT). (2006). Retrieved September 30, 2013 from http://www.agc.gov.my/Akta/Vol.%2012/Act%20563.pdf.

Computer Crime Research Center. (2013). Cybercrime Goes Mobile. Retrieved September 29, 2013 from http://www.crime-research.org/news/16.03.2011/3865/.

Cyber Security Malaysia. (2012). Hacking Costs Malaysia MYR 3.3 mln, Telecompapaer (19 nov 2012). Retrieved September 29, 2013, from http://www.cybersecurity.my/en/knowledge_bank/news/2012/main/detail/2249/index.html.

CyberSecurity Malaysia. (2013). What About Cybercrime. Retrieved September 2013, from http://www.cybersecurity.my/en/media_centre/media_faqs/media_faqs/main/detail/1691/index.html.

Copyright Act (Amendment). (1997). Retrieved September 30, 2013 from http://www.myipo.gov.my/documents/10180/23047/Copyright%20(Amendmend)Act%20A994.pdf.

Dhashene Letchumanan. (2013). Lim Kok Wing University and Royal Malaysian Police Fights Cybercrime, Lim Kok Wing University of Creative Technology official website, August 29, 2013. Retrieved September 30, 2013 from http://www.limkokwing.net/media/news/ limkokwing_university_royal_malaysian_police_fights_cyber_crime/.

Digital Signatures Act 1997 (REPRINT). (2006). Retrieved September 30, 2013 from http://www.agc.gov.my/Akta/Vol.%2012/Act%20562.pdf.

D. Thomas, B. D. Loader. (2000). Introduction—cybercrime: Law Enforcement, Security and Surveillance in the Information Age, Cybercrime: Law Enforcement, Security and Surveillancein the Information Age, Taylor & Francis Group, New York, NY.

Electronic Government’s Activities Act. (2007). Retrieved September 30, 2013 from http://www.mampu.gov.my/documents/10228/11836/Electronic+Government+Activities+Act+2007-Act+680.pdf/e4b7ba49-eec5-42c7-b0f5-a73f6e984767.

Hong Lu, Bin Liang, Melanie Taylor. (2010). A Comparative Analysis of Cybercrimes and Government Law Enforcement in China and United States. Published in Springer Science.

Internet World Stats. (2012). Retreived August 28, 2013 from http://www.internetworldstats.com/stats3.htm.

Kaspersky Security Bulletin. (2013). Statistics, Retrieved June 10, 2014 from http://report.kaspersky.com/#the-overall-statistics-for-2013.

Malaysia Computer Emergency Response Team. (2012). MyCERT Incident Statistics 2012, Retrieved September 29, 2013 from http://www.mycert.org.my/en/services/statistic/mycert/2012/main/detail/836/index.html.

Malaysia Computer Emergency Response Team. (2013a). Definitions of Incidents, 2013a Retrieved June 10, 2014 from http://www.mycert.org.my/en/services/statistic/mycert/2013/main/detail/914/index.html.

Malaysia Computer Emergency Response Team. (2013b). Definitions of Incidents, Retrieved September 29, 2013b from http://www.mycert.org.my/en/services/report_incidents/cyber999/main/detail/799/index.html.

Ministry of Science, Technology & Innovation (MOSTI), Malaysia. (2013). Cyberlaws in Malaysia. Retrieved September 30, 2013, from http://nitc.mosti.gov.my/nitc_beta/index.php/national-ict-policies/cyberlaws-in-malaysia.

Moitra, S. (2005). Developing Policies for Cyber crime. European Journal of Crime, Criminal Law and Criminal Justice. 13(3), 435–464.

Sarah Gordon, Richard Ford. (2006). On the Definition and Classification of Cybercrime. Springer-Verlag France.

S. Philippsohn. (2001). Trends in Cybercrime—An Overview of Currentfinancial Crimes on the Internet. Computers & Security. 20(1), 53–69.

Telemedicine Act 1997 (REPRINT). (2006). Retrieved September 30, 2013 from http://www.agc.gov.my/Akta/Vol.%2012/Act%20564.pdf.

The Reality of Cyber-Threats Today, Zahri Yunos. (2014). Cybersecurity Malaysia, September 23, 2008, Retrieved June 10, 2014 from www.cybersecurity.my/data/content_files/13/420.pdf.

Thomas, J. (2008). Cybercrime: A Revolution in Terrorism and Criminal Behavior Creates Change in the Criminal Justice System. Retrieved September 30, 2008, from http://www.associatedcontent.com/article/44605/cybercrime_a_revolution_in_terrorism_html?page=2&cat=37.

Wingyanching, Hsinchun Chen, Weiping Chang, Shihchieh Chou. (2004). Fighting Cybercrime: A Review and the Taiwan Experience. Published in Science Direct, September.

Zorachan. (2013). Protection Against Cyber Crime, July 7, 2013, The Star Online. Retrieved September 30, 2013 from http://www.thestar.com.my/ story.aspx?file=%2f2012%2f7%2f7%2fsarawak%2f11617870.

(2010). Norton Cyber Crime Report, Retrieved February 23, 2011, from http://www.symantec.com/en/my/norton/theme.jsp?themeid=cybercrime_report.

(2012). Norton Cyber Crime Report, Retrieved September 28, 2013, from http://now-static.norton.com/now/en/pu/images/Promotions/2012/cybercrimeReport/2012_Norton_Cybercrime_Report_Master_FINAL_050912.pdf.

Downloads

Published

2014-09-09

How to Cite

Jayabalan, P., Ibrahim, R., & Abdul Manaf, A. (2014). Understanding Cybercrime in Malaysia: An Overview. Sains Humanika, 2(2). https://doi.org/10.11113/sh.v2n2.424