Cyber Crimes in Malaysia and U.S.A.: What Should We Do in Malaysia?

Only available on StudyMode
  • Topic: Biological classification
  • Pages : 2 (330 words )
  • Download(s) : 68
  • Published : November 6, 2011
Open Document
Text Preview
1.INTRODUCTION
Discuss the definition(s) and the scope of cyber crimes. •Search in the internet for the definition(s) and the scope of cyber crime. •Note down the references.
Quote the definition(s) or paraphrase the definition(s) but you must acknowledge the references. •Follow the format on how to write citation (check the textbook). •Choose the definition and the scope of cyber crimes that you like most.

2.CONTENT
2.1CLASSIFICATION OF CYBER CRIMES
Classify the cyber crimes into 3-4 groups and provide examples for each group •Search in the internet for the classification of cyber crimes. •Note down the references.
References must be authoritative (e.g., Governments, NGOs, relevant agencies, experts, newspapers but not individuals who may present their personal opinions). •You are encouraged to find references from journals, books, magazines, and authoritative websites. •Quote the classification or paraphrase the definition(s) but you must acknowledge the references; you can also create your own classification. •Follow the format on how to write citation (check the textbook).

2.2 COMPARISON OF CYBER CRIMES IN MALAYSIA AND USA
Compare the cyber crimes in Malaysia and USA according to your classifications you made earlier. •Search in the internet for cases of cyber crimes in Malaysia and USA. Look for some statistics, police reports, and/or studies by experts. •Quote studies done by other people.

References must be authoritative (e.g. Governments, NGOs, relevant agencies, experts, newspapers but not individuals who may present their personal opinions) •You are encouraged to finds references from journals, books, magazines, and authoritative websites. •Follow the format on how to write citation (check the textbook). •Show comparison of cyber crimes between the two countries according to your classifications.

2.3SUGGESTIONS
Present your proposal on what we should do to curb those cyber crimes. •Provide...
tracking img