A comparative analysis on the adequacy of the computer crimes act 1997 in Malaysia and the computer misuse act 1990 in United Kingdom in governing the issue of phishing / Munira Masood...[et al.]

The objective of this research is to determine the adequacy of the United Kingdom and the Malaysian laws in governing the issue of phishing. The computer related crime law that governs the issue of phishing in the United Kingdom is the Computer Misuse act 1990 while the Computer Crimes Act 1997 is a...

Full description

Saved in:
Bibliographic Details
Main Authors: Masood, Munira, Ibrahim, Ikram, Kamar Rozaman, Khairul Aiman, Ahmad Khairy, Shazryll Aizad
Format: Student Project
Language:English
Published: 2009
Subjects:
Online Access:https://ir.uitm.edu.my/id/eprint/32932/1/32932.pdf
https://ir.uitm.edu.my/id/eprint/32932/
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.uitm.ir.32932
record_format eprints
spelling my.uitm.ir.329322022-07-06T00:25:35Z https://ir.uitm.edu.my/id/eprint/32932/ A comparative analysis on the adequacy of the computer crimes act 1997 in Malaysia and the computer misuse act 1990 in United Kingdom in governing the issue of phishing / Munira Masood...[et al.] Masood, Munira Ibrahim, Ikram Kamar Rozaman, Khairul Aiman Ahmad Khairy, Shazryll Aizad Computer crimes Technology and law The objective of this research is to determine the adequacy of the United Kingdom and the Malaysian laws in governing the issue of phishing. The computer related crime law that governs the issue of phishing in the United Kingdom is the Computer Misuse act 1990 while the Computer Crimes Act 1997 is applied in Malaysia. By analysing and comparing both of these Acts, the finding shows that both of these Acts are inadeqiate in governing the issue of phishing. To tackle this problem, the United Kingdom has enacted the Fraud Act 2006 which covers the real world as well as fraud in an online environment. Much earlier in 1998, the Malaysian government has created the Communications and Multimedia Act 1998 to govern the issue of phishing. The introduction of these two new legislations is said to be adequate in governing the issue of phishing. In addition to the legal measure in governing the issue of phishing the non-legal measures such as education and public awareness campaign as well as technologies involving two layer authentication and computer software program can be used to govern the issue of phishing. 2009 Student Project NonPeerReviewed text en https://ir.uitm.edu.my/id/eprint/32932/1/32932.pdf A comparative analysis on the adequacy of the computer crimes act 1997 in Malaysia and the computer misuse act 1990 in United Kingdom in governing the issue of phishing / Munira Masood...[et al.]. (2009) [Student Project] (Unpublished)
institution Universiti Teknologi Mara
building Tun Abdul Razak Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Mara
content_source UiTM Institutional Repository
url_provider http://ir.uitm.edu.my/
language English
topic Computer crimes
Technology and law
spellingShingle Computer crimes
Technology and law
Masood, Munira
Ibrahim, Ikram
Kamar Rozaman, Khairul Aiman
Ahmad Khairy, Shazryll Aizad
A comparative analysis on the adequacy of the computer crimes act 1997 in Malaysia and the computer misuse act 1990 in United Kingdom in governing the issue of phishing / Munira Masood...[et al.]
description The objective of this research is to determine the adequacy of the United Kingdom and the Malaysian laws in governing the issue of phishing. The computer related crime law that governs the issue of phishing in the United Kingdom is the Computer Misuse act 1990 while the Computer Crimes Act 1997 is applied in Malaysia. By analysing and comparing both of these Acts, the finding shows that both of these Acts are inadeqiate in governing the issue of phishing. To tackle this problem, the United Kingdom has enacted the Fraud Act 2006 which covers the real world as well as fraud in an online environment. Much earlier in 1998, the Malaysian government has created the Communications and Multimedia Act 1998 to govern the issue of phishing. The introduction of these two new legislations is said to be adequate in governing the issue of phishing. In addition to the legal measure in governing the issue of phishing the non-legal measures such as education and public awareness campaign as well as technologies involving two layer authentication and computer software program can be used to govern the issue of phishing.
format Student Project
author Masood, Munira
Ibrahim, Ikram
Kamar Rozaman, Khairul Aiman
Ahmad Khairy, Shazryll Aizad
author_facet Masood, Munira
Ibrahim, Ikram
Kamar Rozaman, Khairul Aiman
Ahmad Khairy, Shazryll Aizad
author_sort Masood, Munira
title A comparative analysis on the adequacy of the computer crimes act 1997 in Malaysia and the computer misuse act 1990 in United Kingdom in governing the issue of phishing / Munira Masood...[et al.]
title_short A comparative analysis on the adequacy of the computer crimes act 1997 in Malaysia and the computer misuse act 1990 in United Kingdom in governing the issue of phishing / Munira Masood...[et al.]
title_full A comparative analysis on the adequacy of the computer crimes act 1997 in Malaysia and the computer misuse act 1990 in United Kingdom in governing the issue of phishing / Munira Masood...[et al.]
title_fullStr A comparative analysis on the adequacy of the computer crimes act 1997 in Malaysia and the computer misuse act 1990 in United Kingdom in governing the issue of phishing / Munira Masood...[et al.]
title_full_unstemmed A comparative analysis on the adequacy of the computer crimes act 1997 in Malaysia and the computer misuse act 1990 in United Kingdom in governing the issue of phishing / Munira Masood...[et al.]
title_sort comparative analysis on the adequacy of the computer crimes act 1997 in malaysia and the computer misuse act 1990 in united kingdom in governing the issue of phishing / munira masood...[et al.]
publishDate 2009
url https://ir.uitm.edu.my/id/eprint/32932/1/32932.pdf
https://ir.uitm.edu.my/id/eprint/32932/
_version_ 1738513869313146880
score 13.209306