Search Results - "Cybercrime"
-
1
Overview of the Budapest convention on cybercrime
Published 2014“…The discussion on the importance of Budapest Convention on Cybercrime in Malaysian context becomes increasingly important due to the need for co-operation between States and private industry in combating cybercrime. …”
Get full text
Get full text
Get full text
-
2
Content Analysis of Cybercrime Infographic
Published 2023“…Despite the daily coverage of cybercrime incidents, people continue to fall victims. …”
Get full text
Get full text
-
3
-
4
Cybercrime behaviour in the context of youth development
Published 2022“…It is proven that health (stress-free, worry-free), social relations (relationship with parents), and safety (security while using the internet) had a significant relationship in cybercrime behaviour among Malaysian youth. Furthermore, this study discussed the contributions and significance of youth studies in the latest research studies together with the future direction.…”
Get full text
Get full text
-
5
Cryptocurrency and cybercrime – the need to strengthen the legal framework
Published 2018“…The emphasis is on cybercrime and consumer protection. Since very few countries have adequate legislation to regulate virtual currency, it has been widely exploited by scammers and syndicates for money laundering, hacking, terrorism financing, fraud, and other illegal purposes. …”
Get full text
Get full text
-
6
A Data Analytics Strategy to the Underground Economy of Cybercrime
Published 2024“…Thus, a new sort of organization known as the "cybercrime underground" has developed, one that both runs underground markets and fosters the growth of cybercrime conspiracies. …”
Get full text
Get full text
-
7
-
8
Locating and collecting cybercrime evidences on cloud storage: review
Published 2017“…In addition, the increase in the number of cybercrimes against cloud services challenges the forensic process of locating and collecting cybercrime evidence in cloud storage. …”
Get full text
Get full text
Get full text
-
9
Authentication of electronic evidence in cybercrime cases based on Malaysian laws
Published 2015“…This article attempts to explain the scope of electronic evidence in relation to criminal cases such as in cybercrimes, as far as its admissibility and weightage are concerned. …”
Get full text
Get full text
-
10
Combating the threats of cybercrimes in Malaysia: the efforts, the cyberlaws and the traditional laws
Published 2013“…Cybercrimes are increasing in Malaysia. According to a report the crimes jumped by 88 percent in 2011 with 15,218 cases compared with 8090 in 2010. …”
Get full text
Get full text
-
11
Proactive Model for Locating and Collecting Cybercrime Evidences on Cloud Computing
Published 2017“…In fact, increasing number of crimes against cloud storage makes the investigation process of extracting and collecting cybercrime evidences in cloud forensics more challenging. …”
Get full text
Get full text
-
12
Online shopping satisfaction in Malaysia: A framework for security, trust and cybercrime
Published 2016“…We also consider the cybercrime as another major barrier to achieve the customer satisfaction in online shopping. …”
Get full text
Get full text
Get full text
-
13
-
14
Authentication of electronic evidence in cybercrime cases based on Malaysian laws and Islamic laws
Published 2014“…In order to ensure such evidence is admissible and carry the expected weightage, the parties must first prove the authenticity of such evidence, and subsequently on its reliability and relevancy. Nevertheless, in cybercrime cases, proving the crime is actually a technical challenge, where the responsible personnel are required to understand what is electronic evidence, how to extract and preserve the originality of such evidence and the laws governing electronic evidence as well as cybercrimes. …”
Get full text
Get full text
-
15
Investigating cybercrimes under the Malaysian cyberlaws and the criminal procedure code: issues and challenges
Published 2012“…Investigating cybercrimes requires full commitment and readiness to fight the criminals. …”
Get full text
Get full text
-
16
Gender representation in written essays on cybercrime amongst secondary school students / Kalairani A/P Nadasan
Published 2014“…The objective of the study is to identify the language used by teenagers to describe the female teenage social network users with relation to cybercrimes. It will focus on the choice of words that teenagers use to describe female teenage users who get involved in cybercrime and later identify the causes that lead the female teenage users‟ involvement in cybercrime over the Internet. …”
Get full text
Get full text
-
17
Design and development of Malaysian cybersecurity profiling framework: Towards creating a recommendation system to combat cybercrime
Published 2022“…This research proposed a primary cybersecurity profiling framework for Malaysian by integrating Malaysia cybercrime situation, auto cyber security awareness measurement, and collaborative recommendation system. …”
Get full text
Get full text
-
18
A legal study on cybercrime involving counterfeit pharmaceutical with references to the United States of America / Shafiqka Nisha Basah
Published 2017“…Counterfeit pharmaceutical cybercrime are a global problem and increasing in Malaysia, it has evolved in term of time and the advanced of technology. …”
Get full text
-
19
-
20