Identity theft: a legal study on phishing / Khadijah Ilyana Mahayudin…[et al.].
In Malaysia, many internet users are getting more savvy by using the cyber space to do online transactions. However, the practicality of online transactions brings great harm to the users where their identity can be stolen and used by other third parties, which is also known as phishing. Phishing is...
| Main Authors: | Mahayudin, Khadijah Ilyana, Azman, Ayuni, Mustapa, Norainzan, Sulaiman, Salwa |
|---|---|
| Format: | Student Project |
| Language: | English |
| Published: |
2009
|
| Subjects: | |
| Online Access: | https://ir.uitm.edu.my/id/eprint/31766/ |
Similar Items
Security alert framework using dynamic tweet-based features for phishing detection on twitter
by: Liew, Seow Wooi
Published: (2019)
by: Liew, Seow Wooi
Published: (2019)
The doctrine of the independence of the judiciary / Mohd Roslan Mahayudin
by: Mahayudin, Mohd Roslan
Published: (1982)
by: Mahayudin, Mohd Roslan
Published: (1982)
HPLC profile of root extract of Costus Malortieanus / Ahmad Fathi Mahayudin
by: Mahayudin, Ahmad Fathi
Published: (2010)
by: Mahayudin, Ahmad Fathi
Published: (2010)
Legal redress for identity theft in Malaysia : hope or hype?
by: Zulhuda, Sonny
Published: (2012)
by: Zulhuda, Sonny
Published: (2012)
Cyber Identity Theft
by: Roberts, Lynne
Published: (2009)
by: Roberts, Lynne
Published: (2009)
Kecacatan bangunan dan pemasalahan kualiti dalam proses pembangunan perumahan yang baru diserah milik oleh pemaju / Mahayudin Mahmood
by: Mahmood, Mahayudin
Published: (1998)
by: Mahmood, Mahayudin
Published: (1998)
Phishing: legal and regulatory challenges
by: Wan Embong, Wan Emril Nizam
Published: (2010)
by: Wan Embong, Wan Emril Nizam
Published: (2010)
1 HOUR RD Survival Map / Shahriza Ilyana Ramli … [et al.]
by: Ramli, Shahriza Ilyana, et al.
by: Ramli, Shahriza Ilyana, et al.
Waqf land in Malaysia: Legal and non-legal impediments with propositions / Siti Khadijah Abdullah Sanek...[et al.]
by: Abdullah Sanek, Siti Khadijah, et al.
Published: (2017)
by: Abdullah Sanek, Siti Khadijah, et al.
Published: (2017)
Istisna financing as practiced in Malaysia and related issues / Ibtisam @ Ilyana Ilias
by: Ibtisam @ Ilyana, Ilias
Published: (2007)
by: Ibtisam @ Ilyana, Ilias
Published: (2007)
The Shariah approach to criminalise identity theft
by: Mohamed, Sidi Mohamed Ould, et al.
Published: (2014)
by: Mohamed, Sidi Mohamed Ould, et al.
Published: (2014)
Phishing detection via identification of website identity
by: Ee, Hung Chang, et al.
Published: (2013)
by: Ee, Hung Chang, et al.
Published: (2013)
The Shari’ah approach to criminalise identity theft
by: Zulhuda, Sonny, et al.
Published: (2015)
by: Zulhuda, Sonny, et al.
Published: (2015)
A critical study on the establishment of interfaith commission from the legal perspective in Malaysia / Siti Khadijah Asma'on ...[et al.]
by: Asma'on, Siti Khadijah, et al.
Published: (2010)
by: Asma'on, Siti Khadijah, et al.
Published: (2010)
PhishWHO: Phishing webpage detection via identity keywords
extraction and target domain name finder
by: Tan, Choon Lin, et al.
Published: (2016)
by: Tan, Choon Lin, et al.
Published: (2016)
Fear of cyber-identity theft and related fraudulent activity
by: Roberts, Lynne, et al.
Published: (2013)
by: Roberts, Lynne, et al.
Published: (2013)
Online identity theft, security issues, and reputational damage
by: Ahmad Zukarnain, Zuriati, et al.
Published: (2021)
by: Ahmad Zukarnain, Zuriati, et al.
Published: (2021)
Structured lipids from virgin coconut oil as permeation enhancers and emollients in cosmetics / Salizatul Ilyana Ibrahim
by: Ibrahim, Salizatul Ilyana
Published: (2014)
by: Ibrahim, Salizatul Ilyana
Published: (2014)
Structured lipids from virgin coconut oil as permeation enhancers and emollients in cosmetics / Salizatul Ilyana Ibrahim
by: Ibrahim, Salizatul Ilyana
Published: (2014)
by: Ibrahim, Salizatul Ilyana
Published: (2014)
Whisteblowing intentions in the retaliation sphere / Shahriza Ilyana Ramli and Azni Syafena Andin Salamat
by: Ramli, Shahriza Ilyana, et al.
Published: (2013)
by: Ramli, Shahriza Ilyana, et al.
Published: (2013)
Comparative study on traditional and modern mosques’ design, construction and community participation: case study in Peninsular Malaysia / Ilyana Sujak
by: Sujak, Ilyana
Published: (2014)
by: Sujak, Ilyana
Published: (2014)
Medical identity theft in telemedicine: solving the privacy and security issues
by: Olanrewaju, Rashidah Funke, et al.
Published: (2015)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2015)
Privacy and identity theft recovery planning: An onion skin model
by: Alashoor, T., et al.
Published: (2016)
by: Alashoor, T., et al.
Published: (2016)
Types of anti-phishing solutions for phishing attack
by: Siti Hawa, Apandi, et al.
Published: (2020)
by: Siti Hawa, Apandi, et al.
Published: (2020)
Measuring effective communication as a tool for achieving organizational objective in Pejabat Setiausaha Kerajaan Negeri Sembilan / Nuralifah Ilyana Hamdan
by: Hamdan, Nuralifah Ilyana
Published: (2018)
by: Hamdan, Nuralifah Ilyana
Published: (2018)
PhishGuard: Machine learning-powered phishing URL detection
by: Murad, Saydul Akbar, et al.
Published: (2023)
by: Murad, Saydul Akbar, et al.
Published: (2023)
Phishing webpage detection using weighted URL tokens for identity keywords retrieval
by: Tan, Choon Lin, et al.
Published: (2017)
by: Tan, Choon Lin, et al.
Published: (2017)
Evaluation of corrosive environment impact on low cost Fe/Al ADDED SAC105 solder alloys / Nor Ilyana Muhd Nordin
by: Nor Ilyana, Muhd Nordin
Published: (2017)
by: Nor Ilyana, Muhd Nordin
Published: (2017)
Negligence in medical tourism: reforming the law / Khadijah Wahab
by: Wahab, Khadijah
Published: (2015)
by: Wahab, Khadijah
Published: (2015)
Mechanical properties of tire replaced concrete / Khadijah Hamzah
by: Hamzah, Khadijah
Published: (2007)
by: Hamzah, Khadijah
Published: (2007)
The law and the control of Aedes in Shah Alam / Siti Khadijah Mohamed Yunus … [et al.]
by: Mohamed Yunus, Siti Khadijah, et al.
Published: (2009)
by: Mohamed Yunus, Siti Khadijah, et al.
Published: (2009)
The predictors of whistleblowing intentions at UiTM Kedah / Shahriza Ilyana Ramli, Siti Norfazlina Yusoff, Azlyn Ahmad Zawawi
by: Ramli, Shahriza Ilyana, et al.
Published: (2014)
by: Ramli, Shahriza Ilyana, et al.
Published: (2014)
Social sustainability practices in Malaysian rural Libraries / Siti Khadijah Rafie … [et al.]
by: Rafie, Siti Khadijah, et al.
Published: (2021)
by: Rafie, Siti Khadijah, et al.
Published: (2021)
Phishing website detection
by: Nur Sholihah, Zaini
Published: (2018)
by: Nur Sholihah, Zaini
Published: (2018)
Addressing the threats of online theft of trade secret and cyber espionage in Malaysia: the legal landscape
by: Abd. Jalil, Juriah
Published: (2019)
by: Abd. Jalil, Juriah
Published: (2019)
Investigation of medical identity theft in healthcare sector: its statistics, effects and way out.
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
A study on student’s involvement in extracurricular activities towards student satisfaction: a case study among diploma students in UiTM Kedah / Annisa Ilyana Abd Razak ... [et al.]
by: Abd Razak, Annisa Ilyana, et al.
Published: (2010)
by: Abd Razak, Annisa Ilyana, et al.
Published: (2010)
The determinants of inflation in three selected countries / Nurfarah Diyana Khairul Azman and Farah Eizlin Ilyana Mazli
by: Khairul Azman, Nurfarah Diyana
Published: (2019)
by: Khairul Azman, Nurfarah Diyana
Published: (2019)
Usage of digital reference service among students at an academic library in Northern Area / Siti Khadijah Rafie...[et al.]
by: Rafie, Siti Khadijah, et al.
Published: (2015)
by: Rafie, Siti Khadijah, et al.
Published: (2015)
Snatch theft: legal issues pertaining to law, punishment and enforcement in Malaysia within the context of penal code / Nurhazimah Md Yusof ... [et al.]
by: Md Yusof, Nurhazimah, et al.
Published: (2010)
by: Md Yusof, Nurhazimah, et al.
Published: (2010)
Similar Items
-
Security alert framework using dynamic tweet-based features for phishing detection on twitter
by: Liew, Seow Wooi
Published: (2019) -
The doctrine of the independence of the judiciary / Mohd Roslan Mahayudin
by: Mahayudin, Mohd Roslan
Published: (1982) -
HPLC profile of root extract of Costus Malortieanus / Ahmad Fathi Mahayudin
by: Mahayudin, Ahmad Fathi
Published: (2010) -
Legal redress for identity theft in Malaysia : hope or hype?
by: Zulhuda, Sonny
Published: (2012) -
Cyber Identity Theft
by: Roberts, Lynne
Published: (2009)