Cybercrime is an activity that is becoming more
prevalent nowadays in various countries. Today, this crime is being taken seriously by all countries because it has
had a negative impact on society. In Malaysia, the forms of cyber crime we face
are hacking, money laundering, phishing and cyber fraud. Cybercrime can be
defined as any form of criminal behavior that uses any type of electronic
device through an internet connection and involves individual or group
behavior. Therefore, this article will discuss how the Malaysian government
reacts in dealing with the current issue of cybercrime as well as existing cyber
laws in Malaysia. This is because cybercrimes usually occur during online money
transactions, food orders through applications such as Foodpanda, e-hailing
orders, online money transfers, and company registration and others. Even so,
with the speed of internet use that is seen to have a positive impact on
society, there is no denying that there are also negative effects that need to
be addressed.
References
[1]
Aminnuraliff, M. (2022, May 22). Jenayah Macau Scam di Selangor membimbangkan. Sinar Harian. https://www.sinarharian.com.my/article/203494/berita/semasa/jenayah-macau-scam-di-selangor-membimbangkan
[2]
Amri, S. A. K. (2022, August 4). Kempen #TakNakScam raih 2.3 juta capaian. Harian Metro. https://www.hmetro.com.my/mutakhir/2022/08/868357/kempen-taknakscam-raih-23-juta-capaian
[3]
Rahim, A. A., & Manap, N. A. (2004). Jenayah Berkaitan Dengan Komputer: Perspektif Undang-Undang Malaysia. Dewan Bahasa dan Pustaka, 56.
[4]
Bidin, A. B., et al. (2015). Intipan Siber: Jenayah Baru dalam Masyarakat Kontemporari. Jurnal Islam dan Masyarakat Kontemporari, 11, 12-25.
[5]
Awani, A. (2021). Macau Scam: All You Need to Know. https://www.astroawani.com/berita-malaysia/macau-scam-all-you-need-know-263044
[6]
Harian, B. (2020). Enam Langkah ‘Lawan’ Jenayah Siber. https://www.bharian.com.my/berita/nasional/2020/05/692956/enam-langkah-lawan-jenayah-siber
[7]
Chen, W. L., Guo, X. F., et al. (2020). Phishing Scam Detection on Ethereum: Towards Financial Security for Blockchain Ecosystem. Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence (IJCAI-20), Yokohama, 7 January 2021, 4506. https://www.ijcai.org/proceedings/2020/0621.pdf
[8]
CyberSecurity Malaysia (2020). Cybersecurity Incidents and Trends in Malaysia. Vol. 1. https://www.cybersecurity.my/data/content_files/46/2222.pdf
[9]
Farhana (2016, April 1). Cyberbullying. PORTAL MyHEALTH. http://www.myhealth.gov.my/en/cyberbullying-2/
[10]
Jahankhani, H., Al-Nemrat, A., & Hosseinian-Far, A. (2014). Cybercrime Classification and Characteristics. In: B. Akhgar, A. Staniforth, & F. Bosco, Eds., Cyber Crime and Cyber Terrorism Investigator’s Handbook (pp. 149-164), Syngress. https://doi.org/10.1016/B978-0-12-800743-3.00012-8
[11]
Hariah Metro (2021). Kempen #TakNakScam Tingkat Kesedaran Penipuan Jenayah Siber. https://www.hmetro.com.my/mutakhir/2021/07/731239/kempen-taknakscam-tingkat-kesedaran-penipuan-jenayah-siber
[12]
Ismail, A. I. (2023, February 24). Love Scam sasar mangsa kesunyian. Sinar Harian. https://www.sinarharian.com.my/article/246957/berita/semasa/love-scam-sasar-mangsa-kesunyian
[13]
Jayabalan, P., Ibrahim, R., & Abdul Manaf, A. (2014). Understanding Cybercrime in Malaysia: An Overview. Sains Humanika, 2, 109-115.
[14]
Anderson, J. C., & Closen, M. L. (1999). Document Authentication in Electronic Commerce: The Misleading Notary Public Analog for the Digital Signature Certification Authority, 17 J. Marshall J. Computer & Info. L. 833. Journal of Computer & Information Law, 17, Article 5.
[15]
Yar, M. (2006). Cybercrime and Society. SAGE Publications.
[16]
Whitty, M. T. and Buchanan, T. (2012). The Online Romance Scam: A Serious Cybercrime. Cyberpsychology, Behavior, and Social Networking, 15, 181-183. https://doi.org/10.1089/cyber.2011.0352
[17]
Manap, N. A., Jamal, J. (2003). Jenayah Komputer: Perbandingan Menurut Akta Jenayah Komputer 1997 dan Prinsip Undang-Undang Jenayah Islam. Jurnal Undang-undang dan Masyarakat, 7, 16.
[18]
Robert H’obbes’ Zakon. (1999). Hobbes’s Internet Timeline. https://www.zakon.org/robert/internet/timeline/
[19]
Abdullah, R. H. (2003). Teknologi Maklumat dan Penggunaannya. Prentice Hall/Pearson Malaysia Sdn Bhd, 116.
[20]
Paraschiv, D., Toade, L., et al. (2021). Internet Fraud and Phishing Attacks—A European Perspective. 7th BASIQ International Conference on New Trends in Sustainable Business and Consumption, Foggia, 3-5 June 2021, 394-400. https://doi.org/10.24818/BASIQ/2021/07/051
[21]
Zakon, R. H. (2003). Hobbes’ Internet Timeline: The Definitive ARPAnet & Internet History. https://www.zakon.org/robert/internet/timeline/