Search Results - "Cybercrime"

Refine Results
  1. 1

    Overview of the Budapest convention on cybercrime by Zulhuda, Sonny

    Published 2014
    “…The discussion on the importance of Budapest Convention on Cybercrime in Malaysian context becomes increasingly important due to the need for co-operation between States and private industry in combating cybercrime. …”
    Get full text
    Get full text
    Get full text
  2. 2

    Content Analysis of Cybercrime Infographic by Zeti Azreen Ahmad, Nur Nadia Abd Mubin, Akmal Arzeman

    Published 2023
    “…Despite the daily coverage of cybercrime incidents, people continue to fall victims. …”
    Get full text
    Get full text
  3. 3
  4. 4

    Cybercrime behaviour in the context of youth development by Jaya, M. Izham, Ab Razak, Mohd Faizal, Mohamad, Mastura, Hisham, Syifak Izhar

    Published 2022
    “…It is proven that health (stress-free, worry-free), social relations (relationship with parents), and safety (security while using the internet) had a significant relationship in cybercrime behaviour among Malaysian youth. Furthermore, this study discussed the contributions and significance of youth studies in the latest research studies together with the future direction.…”
    Get full text
    Get full text
  5. 5

    Cryptocurrency and cybercrime – the need to strengthen the legal framework by Puniran, Mohd Noor Ikram, Zul Kepli, Mohd Yazid

    Published 2018
    “…The emphasis is on cybercrime and consumer protection. Since very few countries have adequate legislation to regulate virtual currency, it has been widely exploited by scammers and syndicates for money laundering, hacking, terrorism financing, fraud, and other illegal purposes. …”
    Get full text
    Get full text
  6. 6

    A Data Analytics Strategy to the Underground Economy of Cybercrime by Varun, P.R., Usha, Sree, Malathy, Batumalay

    Published 2024
    “…Thus, a new sort of organization known as the "cybercrime underground" has developed, one that both runs underground markets and fosters the growth of cybercrime conspiracies. …”
    Get full text
    Get full text
  7. 7
  8. 8

    Locating and collecting cybercrime evidences on cloud storage: review by Ahmed, Abdulghani Ali, Li, Chua Xue

    Published 2017
    “…In addition, the increase in the number of cybercrimes against cloud services challenges the forensic process of locating and collecting cybercrime evidence in cloud storage. …”
    Get full text
    Get full text
    Get full text
  9. 9

    Authentication of electronic evidence in cybercrime cases based on Malaysian laws by Mustapa Sa’di, Mursilalaili, Kamarudin, Abdul Rani, Mohamed, Duryana, Ramlee Saad, Zulfakar

    Published 2015
    “…This article attempts to explain the scope of electronic evidence in relation to criminal cases such as in cybercrimes, as far as its admissibility and weightage are concerned. …”
    Get full text
    Get full text
  10. 10

    Combating the threats of cybercrimes in Malaysia: the efforts, the cyberlaws and the traditional laws by Mohamed, Duryana

    Published 2013
    “…Cybercrimes are increasing in Malaysia. According to a report the crimes jumped by 88 percent in 2011 with 15,218 cases compared with 8090 in 2010. …”
    Get full text
    Get full text
  11. 11

    Proactive Model for Locating and Collecting Cybercrime Evidences on Cloud Computing by Ahmed, Abdulghani Ali, Chua, Xue Li

    Published 2017
    “…In fact, increasing number of crimes against cloud storage makes the investigation process of extracting and collecting cybercrime evidences in cloud forensics more challenging. …”
    Get full text
    Get full text
  12. 12

    Online shopping satisfaction in Malaysia: A framework for security, trust and cybercrime by Imtiaz Ali, Najma, Samsuri, Suhaila, Abu Seman, Muhamad Sadry, Brohi, Imtiaz Ali, Shah, Asadullah

    Published 2016
    “…We also consider the cybercrime as another major barrier to achieve the customer satisfaction in online shopping. …”
    Get full text
    Get full text
    Get full text
  13. 13
  14. 14

    Authentication of electronic evidence in cybercrime cases based on Malaysian laws and Islamic laws by Mustapha Sa'di, Mursilalaili, Mohamed, Duryana, Kamarudin, Abdul Rani, Ramlee, Zulfakar

    Published 2014
    “…In order to ensure such evidence is admissible and carry the expected weightage, the parties must first prove the authenticity of such evidence, and subsequently on its reliability and relevancy. Nevertheless, in cybercrime cases, proving the crime is actually a technical challenge, where the responsible personnel are required to understand what is electronic evidence, how to extract and preserve the originality of such evidence and the laws governing electronic evidence as well as cybercrimes. …”
    Get full text
    Get full text
  15. 15

    Investigating cybercrimes under the Malaysian cyberlaws and the criminal procedure code: issues and challenges by Mohamed, Duryana

    Published 2012
    “…Investigating cybercrimes requires full commitment and readiness to fight the criminals. …”
    Get full text
    Get full text
  16. 16

    Gender representation in written essays on cybercrime amongst secondary school students / Kalairani A/P Nadasan by Kalairani, Nadasan

    Published 2014
    “…The objective of the study is to identify the language used by teenagers to describe the female teenage social network users with relation to cybercrimes. It will focus on the choice of words that teenagers use to describe female teenage users who get involved in cybercrime and later identify the causes that lead the female teenage users‟ involvement in cybercrime over the Internet. …”
    Get full text
    Get full text
  17. 17

    Design and development of Malaysian cybersecurity profiling framework: Towards creating a recommendation system to combat cybercrime by Yeo, Han Rong

    Published 2022
    “…This research proposed a primary cybersecurity profiling framework for Malaysian by integrating Malaysia cybercrime situation, auto cyber security awareness measurement, and collaborative recommendation system. …”
    Get full text
    Get full text
  18. 18

    A legal study on cybercrime involving counterfeit pharmaceutical with references to the United States of America / Shafiqka Nisha Basah by Basah, Shafiqka Nisha

    Published 2017
    “…Counterfeit pharmaceutical cybercrime are a global problem and increasing in Malaysia, it has evolved in term of time and the advanced of technology. …”
    Get full text
  19. 19
  20. 20