INTRODUCTION
As for 21st century, Malaysia has been acknowledge by Europe and ASEAN countries
as a fast growing country equipped by latest and modern technology. Technology used in
here can be categorized under few industries like Agriculture, Internet of Things (IOT),
Education, Mobile E-Wallet and others too. Innovative technological solutions are vital to
keep up with the fast pace of change. Artificial intelligence and digital tools have great
potential to protect consumers by authenticating sources and identifying harmful content and
options should be explored. As social media platforms and online marketplaces evolve, these
digital safeguards should be built-in to ensure that user safety is inherent in system design.
However recently Malaysia has been exposed with high risk cybercrimes which give bad
reputation as a multicultural country. Cases like love scam, banking hack accounts, money
laundering has negative impact towards Malaysia reputation. Therefore our group choose to
write our angle on Internet and Security Crimes Has Caused Damaged In Malaysia. A 58-
year-old clerk lost RM927,400 of her savings in the past three years to a scammer who had
asked her to loan him money to start an oil exploration business in the US (Predeep
Nambiar, 2021). Cyber threat can harm anyone who been trapped into their strategy. By
looking at this serious issue happening around Malaysia, we have decided to choose a topic
about Internet and Security Crimes Has Caused Damaged In Malaysia. We have found
this article as interesting topic to be discussed because we have openly exposed into
cybercrimes without our knowledge. Hackers or cybersecurity threat has been in the industry
as their main source of income. Public used Internet as their daily usage in terms of daily
communications or personal use. Our group has divided into four (4) members that will
explain different view of our main topic. Below is our group sub-topic :
i) Aizura Nur Binti Ismail - Invasion of Privacy
ii) Puteri Nor Kamalia Binti Kamal - Data Breach
iii) Nazrin Fikri Bin Abd Latib - Personal Data Protection Act (PDPA)
iv) Rizal Asyraaf Bin Ramli - A Legal Address on Cybersecurity
Threat
During the Pandemic Covid-19 hit Malaysia back in end of 2020, we have seen that
cyber criminal cases risen because people’s spend most of their times on laptop or
smartphones. E-commerce platforms is the most popular application visited by Malaysians
during the lockdown. Hence, cybercriminal see this as a golden opportunity for them to scam
people’s and hack into their personal or company account. Some 62% of organisations in
Malaysia are seeing an increase in cyber security challenges in the middle of workplace shift,
with 25% or more alerts on cyber threats since the start of the Covid-19 pandemic (Nur
Haziqah A Malek, 2021). Online fraud is frequently committed at any level of ages and
everyone is risking their safety when they been trapped. Meanwhile, Malaysians protection
are protected by the enforcement agencies by the government. As one Malaysian protection
authority highlighted, different consumer law can apply in different countries with different
powers to prosecute crimes so this can complicate the pursuit of fraudsters.
METHODOLOGY
To gather and support our data of research, we have conducted various ways of
getting information from experienced and from the public opinions. We have interviewed
Iman Sofea binti Mohamad Ibrahim, a lawyer and law graduate, Khen Han Ming, a security
expert, Azlan Shah the chief creative editor for the Malay Mail Sdn. Bhd. (also former
employee of Victoria International College), and
Other than that we have conducted online questionnaire by using google form and ask
the public opinion about our topic. 98% are constantly on the internet for work and leisure,
65.3% are concern about their privacy, and 48.5% are aware that Malaysia has no specific
law such as a Privacy Act to protect personal privacy, except for the Personal Data Protection
Act 2010 (“PDPA”), which deals with personal data and focuses on regulating the processing
of ‘personal data’ in commercial transactions.
Cybersecurity threat has become worse nowadays with easy access to information in
the internet world. Everyone in this world has their own smartphones where they can get
access to any information needed. With an open door opportunity, some internet geeks use
their talents in a different path. Those who excel and are expert in coding can easily hack into
public accounts. To understand more on this sub-topic, I have interviewed Iman Sofea binti
Mohamad Ibrahim, a Lawyer and UiTM Law graduates. She explained that in Malaysia, all
Malaysians are protected with a few laws, for example, The Computer Crimes Act 1997, The
Digital Signatures Act 1997, The Electronic Commerce Act 2006, Multimedia Act (CMA)
1998 and the Copyright Act 1987 including the Penal Code. All of these laws she said were
to protect Malaysians right when experiencing an issue related to them. Any cybercriminal
that breach the law and regulations will be convicted and bring to justice. Therefore she said
public should aware of their safety when socializing in social media or keep their personal
information safely in their book and away from any apps that can harm the users at any time.
In this modern era, a group of ruling power has control over the Internet. They can be
from the government, society and internet geeks. This will apply in Conflict Perspective
where there will be a different idea or view, especially when a topic about cybersecurity has
been discussed. The public will get exposed to the internet daily with their smartphones,
tablets or laptops. Social applications like Twitter and Facebook have a major role in
exposing debate about a certain topic. For example, those in the Lesbian, Gay, Bisexual,
Transgender, Queer (LGBTQ) community will seek to acknowledge their present in the
community. Some countries, especially Muslim countries, have rejected that group in
promoting or seeking legal marriage. However, with the power of social media, this group
has been outspoken and got their full support. For example, during Pride Month, a month in
June during which LGBTQ groups celebrate their so-called birth anniversary, people on
social media will express their support. Even some of the government or races rule out their
existence, but they dare to present themselves as a proud community.
Picture above explained how a community react against their name as mentioned as Muslim
Girl and people’s will get notice the tweet tweeted by a Muslim community.
I would like to address Collective Behaviour as one of the terms explained. When an
issue arises in cybersecurity either in a data breach, online statement, internet scam or
anything related to cybersecurity, it happens because of a group support. People whom get
attack or harmed by the cyber thief will get protected under the Cyber Security Law in
Malaysia. For example, under the Communications and Multimedia Act 1998, Section 233 of
the CMA is one of the notable provisions against making offensive statements online. One
example was the infamous direction given by the MCMC to a few ISPs in Malaysia to deny
access to The Malaysian Insider online news portal for their alleged violation of Section 233
of the CMA for publishing an offensive statement against the executives. There were
critiques that it was misused to stifle the voice of the opposition political parties (Chia Swee
Yik, 2018). This case has because hot topic to be discussed in social media when a media
business oriented towards denying their voices through their news.
Next I would like to explain the Stereotype term on Cyber Security Threat. In
Malaysia, media (online or offline) and social media can express their opinion towards any
issues in Malaysia. Their opinions may represent a community or individual and may be or
may not accurately reflect reality. For example, by promoting hashtag (#) on Twitter, it can
look good but also can be bad. Most of the hashtags and keyword behaviors have an agenda.
Influencing or bragging holds the top spot, following by uplifting a propaganda. It can be a
product, service or human nature. or marketing (Bhattacharyya, 2019). The best case
scenario happened recently in Malaysia through a Twitter campaign #KerajaanGagal. This
has caused tension in political debates and supporters and also
twitter users. They expressed their frustration towards the government on certain issues.
Picture above showing frustration towards the government action in fighting Covid-19 cases.
This tweet has blown up with more than 400 likes from the netizens.
The last term that I would like to be highlighted is Value Contradiction. Peoples will
respond differently in any cause of action in the community rather than the value of
individuality. For example, Malaysians would rather spend their money on a non-government
organisation (NGO) rather than spend their money on a government-designed programme.
This because they believe their action towards the NGO is a non-political view, and if they
follow the government programme, it will represent a political view. Muhyiddin said some
Islamic NGO leaders have expressed their worries over major challenges faced by Muslims
in Malaysia and around the world, especially on new developments in the way of life and
thinking, which are seen as a threat to Muslim beliefs and moral values (BERNAMA, 2020).
Malaysians Muslim respond to this issue by looking at NGOS more aware of the Islam issue
rather than the government.
References
Andy Bhattacharyya (2019). 82% of your hashtags are perhaps useless. Retrieved from:
https://uxplanet.org/slash-the-tag-7466867c9c43
Castell, M. (2014). The impact of the internet on society: a global perspective. Change : 19
key essays on how the internet change our lives (2014). Retrieved from:
https://www.bbvaopenmind.com/en/articles/the-impact-of-the-internet-on-society-a-
global-perspective/
Chia, S.Y (2018). Basic of cyber security law in Malaysia. Retrieved from:
https://chialee.com.my/basics-of-cyber-security-law-in-malaysia/
Iman Sofea Mohamad Ibrahim (17 June 2021) Telephone Interview. 016-7396392
Khen Han Ming. (24 May 2021). Telephone Interview. 010-2011267
Nur Haziqah A Malek (2021). Cyber threat on companies increases 25% due to pandemic.
Retrieved from: https://themalaysianreserve.com/2021/03/18/cyber-threat-on-
companies-increases-25-due-to-pandemic/
Predeep Nambiar (2021). RM1mil heartbreak for woman in love scam. Retrieved from:
https://www.freemalaysiatoday.com/category/nation/2021/06/21/rm1mil-heartbreak-
for-woman-in-love-scam/
Prime Minister’s Office of Malaysia Official Website (2020). PN government to be more
sensitive, responsive towards Islamic NGO concerns. Retrieved from:
https://www.pmo.gov.my/2020/09/pn-goverment-to-be-more-sensitive-responsive-
towards-islamic-ngo-concerns-pm-muhyiddin/
Quaglio, G. & Miller, S. (2020). Potentially negative effects of internet use. European
Parliamentary Research Service, 2020. doi: 10.2861/654637. Retrieved from:
https://www.europarl.europa.eu/RegData/etudes/IDAN/2020/641540/EPRS_IDA(202
0)641540_EN.pdf
Wieczorkowski, J. & Polak, P (2017). Big data and privacy: The study of privacy invasion
acceptance in the world of big data. Online Journal of Applied Knowledge
Management 5(1):57-71. doi:10.36965/OJAKM.2017.5(1)57-71 Retrieved from:
https://www.researchgate.net/publication/337490438_Big_data_and_privacy_The_stu
dy_of_privacy_invasion_acceptance_in_the_world_of_big_data