Preview

Cyber Crimes in Malaysia and U.S.A.: What Should We Do in Malaysia?

Satisfactory Essays
Open Document
Open Document
330 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cyber Crimes in Malaysia and U.S.A.: What Should We Do in Malaysia?
1. INTRODUCTION
• Discuss the definition(s) and the scope of cyber crimes.
• Search in the internet for the definition(s) and the scope of cyber crime.
• Note down the references.
• Quote the definition(s) or paraphrase the definition(s) but you must acknowledge the references.
• Follow the format on how to write citation (check the textbook).
• Choose the definition and the scope of cyber crimes that you like most.

2. CONTENT
2.1 CLASSIFICATION OF CYBER CRIMES
• Classify the cyber crimes into 3-4 groups and provide examples for each group
• Search in the internet for the classification of cyber crimes.
• Note down the references.
• References must be authoritative (e.g., Governments, NGOs, relevant agencies, experts, newspapers but not individuals who may present their personal opinions).
• You are encouraged to find references from journals, books, magazines, and authoritative websites.
• Quote the classification or paraphrase the definition(s) but you must acknowledge the references; you can also create your own classification.
• Follow the format on how to write citation (check the textbook).

2.2 COMPARISON OF CYBER CRIMES IN MALAYSIA AND USA
• Compare the cyber crimes in Malaysia and USA according to your classifications you made earlier.
• Search in the internet for cases of cyber crimes in Malaysia and USA. Look for some statistics, police reports, and/or studies by experts.
• Quote studies done by other people.
• References must be authoritative (e.g. Governments, NGOs, relevant agencies, experts, newspapers but not individuals who may present their personal opinions)
• You are encouraged to finds references from journals, books, magazines, and authoritative websites.
• Follow the format on how to write citation (check the textbook).
• Show comparison of cyber crimes between the two countries according to your classifications.

2.3 SUGGESTIONS
• Present your proposal on what we should do to curb those cyber crimes.



References: must be authoritative (e.g. Governments, NGOs, relevant agencies, experts, newspapers but not individuals who may present their personal opinions) • You are encouraged to finds references from journals, books, magazines, and authoritative websites. • Follow the format on how to write citation (check the textbook). • Show comparison of cyber crimes between the two countries according to your classifications. 2.3 SUGGESTIONS • Present your proposal on what we should do to curb those cyber crimes. • Provide suggestions as to what we should do (Malaysian government and individual Malaysians) to curb or reduce cyber crimes in Malaysia. 3. CONCLUSION Present your conclusion. Recap your discussion here

You May Also Find These Documents Helpful

  • Good Essays

    The purpose of this assignment is to help find appropriate sources for your research paper. Often, it is too easy to turn to the Internet for sources, but often these sources are not reliable. This assignment will assist students in learning what to look for in sources and how to determine good and bad sources.…

    • 1216 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Sources used are acknowledged in the text and reference list and used effectively to support discussion. Referencing follows a systematic approach, appropriate to…

    • 753 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    my paper

    • 285 Words
    • 2 Pages

    Provide an annotated bibliography of at least four additional scholarly sources that you will use to support your analysis in your Final Paper. This component needs to include a summary of each academic source (in your own words) as well as a brief description of the relevance to your Final Paper.…

    • 285 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Locate a minimum of 12 sources and use at least 9 in the paper— your sources must be from credible academic and media outlets only.…

    • 1473 Words
    • 6 Pages
    Good Essays
  • Best Essays

    The World Intellectual Property Organization (WIPO) saw a 20 per cent increase in the number of cyber squatting (abusive registration of trademarks as domain names) cases filed in 2005 as compared to 2004. In 2005, a total of 1,456 cyber squatting cases were filed with WIPO 's Arbitration and Mediation Centre, according to a WIPO release.…

    • 3218 Words
    • 13 Pages
    Best Essays
  • Best Essays

    Sony PSN Data Leakage

    • 1598 Words
    • 5 Pages

    This paper was prepared for CCST9029 Cyberspace Crime: Technology and Ethics, taught by Dr. K.P. Chow, tutored by Ms. Vivien Chan.…

    • 1598 Words
    • 5 Pages
    Best Essays
  • Powerful Essays

    Ponemon Institute (2012). The Impact of Cybercrime on Business: Studies of IT practitioners in the United States, United Kingdom, Germany, Hong Kong and Brazil. Retrieved from http://www.ponemon.org…

    • 2781 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    This a consistently formatted alphabetical list of all sources used within your research. You must use a variety of sources, including books, academic articles and websites. A minimum of 4 sources is advised. This does not form part of your word count. Follow the guide provided for you on…

    • 963 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Digital Crime

    • 5203 Words
    • 21 Pages

    References: Butterworth, C, & Bresson, P. (2010, March 12). Ic3 2009 annual report on internet crime released. Retrieved from http://www.ic3.gov/media/2010/100312.aspx…

    • 5203 Words
    • 21 Pages
    Powerful Essays
  • Satisfactory Essays

    1. Include a literature review of three scholarly sources based on the selected contemporary issue. Analyze the validity of the author’s arguments and/or biases.…

    • 423 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The growth of e-commerce has been astronomical and its relevance to many businesses c=has increased. According to Forrester, e-commerce in the United States is going to reach $279 billion by 2015 (Indvik, 2011). This includes all electronic financial transactions. A 12.6% increase to $176 billion in 2010 has been fueled by an increase in Internet connected devices such as smartphones, tablets, combined with new e-commerce models—such as NetFlix, Groupon, etc. The consumer appears to be the driving force behind the financial boom of e-commerce.…

    • 6545 Words
    • 27 Pages
    Good Essays
  • Good Essays

    As the Malaysian society becomes more and more technology-savvy and Internet savvy due to the encouragement by the government and the country’s vision to be a world leading country in computer technology with the Multimedia Super Corridor, the number of computer-related crimes is on the rise. Therefore, in order to combat this new type of crime, the government of Malaysia had introduced a new legal framework to facilitate the development of ICT systems called Cyber Laws of Malaysia which include the Computer Crime Act 1997.…

    • 1103 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Before evaluating the concept of cyber crime it is obvious that the concept of crime be discussed and the points of similarity between both these forms may be discussed. According to the Webster dictionary, crime is an act or the commission of an act that is forbidden or the omission of a duty that is commanded by a public law and that makes the offender liable to punishment by that law. From Wikipedia, the free encyclopaedia, describes crime as the breaking of rules or laws for which some governing authority (via mechanisms such as legal systems) can ultimately prescribe a conviction. Crime is also termed organised when it cuts across transnational, national, or local groupings of highly centralized enterprises run by criminals for the purpose of engaging in illegal activity, most commonly for monetary profit. Some criminal organizations, such as terrorist organizations, are politically motivated. They may also be considered organised if they display level of discipline.…

    • 4323 Words
    • 18 Pages
    Powerful Essays
  • Satisfactory Essays

    Although Malaysia wasn’t in the list of countries studied in the report, national cyberspace police Cybersecurity Malaysia said the findings are representative of the Malaysian threat…

    • 558 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    This report incorporates the impacts of cybercrime in Bangladesh especially focuses on the area of Personal life, Workplace as well as Policy making Bodies or thinkers. We believe the report would help all relevant concerns and especially policy makers.…

    • 7199 Words
    • 29 Pages
    Powerful Essays