Computer Crimes: A Case Study of What Malaysia Can Learn from Others?

Rapid development of information technology (IT) has brought with it many new applications such as e-commerce and global business. The past few years have seen activities in the legislative arena covering issues such as digital signatures, the international recognition of electronic documents and pr...

Ausführliche Beschreibung

Gespeichert in:  
Bibliographische Detailangaben
1. VerfasserIn: Appudurai, Janaletchumi (VerfasserIn)
Beteiligte: Ramalingam, Chitra L
Medienart: Elektronisch Aufsatz
Sprache:Englisch
Veröffentlicht: 2007
In: Journal of Digital Forensics, Security and Law
Jahr: 2007
Online-Zugang: Volltext (kostenfrei)
Volltext (kostenfrei)
Journals Online & Print:
Lade...
Verfügbarkeit prüfen: HBZ Gateway

MARC

LEADER 00000caa a22000002c 4500
001 1866146866
003 DE-627
005 20250124054859.0
007 cr uuu---uuuuu
008 231018s2007 xx |||||o 00| ||eng c
024 7 |a 10.15394/jdfsl.2007.1020  |2 doi 
035 |a (DE-627)1866146866 
035 |a (DE-599)KXP1866146866 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
084 |a 2,1  |2 ssgn 
100 1 |a Appudurai, Janaletchumi  |e VerfasserIn  |4 aut 
245 1 0 |a Computer Crimes: A Case Study of What Malaysia Can Learn from Others? 
264 1 |c 2007 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
520 |a Rapid development of information technology (IT) has brought with it many new applications such as e-commerce and global business. The past few years have seen activities in the legislative arena covering issues such as digital signatures, the international recognition of electronic documents and privacy and data protection. Both the developed and developing countries have exhibited keenness to embrace the IT environment. Securing this electronic environment from intrusion, however, continues to be problematic. A particular favorite form of computer crime would be ‘hacking’. As more computer systems move on to on-line processing and improved telecommunications, computer hackers are now a real threat. Legislation criminalizing intrusion and destruction activities directed at computers are needed. Malaysia joined the list of countries with computer-specific legislation with the enactment of its Computer Crime Act 1997 (CCA). This paper focuses on hacking as a criminal act, and compares the Malaysian CCA with legislation from other countries. The current computer crime situation in Malaysia is looked at and exposes the difficulties and obstacles Malaysia faces in enforcing the Act. The paper concludes with recommendations for Malaysia in terms of policy, practices and penalties 
700 1 |a Ramalingam, Chitra L  |e VerfasserIn  |4 aut 
773 0 8 |i Enthalten in  |t Journal of Digital Forensics, Security and Law  |d [Erscheinungsort nicht ermittelbar] : Association of Digital Forensics, Security and Law, 0000  |g (2007)  |h Online-Ressource  |w (DE-627)1760598410  |w (DE-600)3068918-1  |x 1558-7223  |7 nnas 
773 1 8 |g year:2007 
856 |u https://commons.erau.edu/cgi/viewcontent.cgi?article=1020&context=jdfsl  |x unpaywall  |z Vermutlich kostenfreier Zugang  |h publisher [deprecated] 
856 4 0 |u https://core.ac.uk/download/217157471.pdf  |x Verlag  |z kostenfrei  |3 Volltext 
856 4 0 |u https://doi.org/10.15394/jdfsl.2007.1020  |x Resolving-System  |z kostenfrei  |3 Volltext 
935 |a mkri 
951 |a AR 
ELC |a 1 
LOK |0 000 xxxxxcx a22 zn 4500 
LOK |0 001 439182762X 
LOK |0 003 DE-627 
LOK |0 004 1866146866 
LOK |0 005 20231018043710 
LOK |0 008 231018||||||||||||||||ger||||||| 
LOK |0 035   |a (DE-2619)CORE63184284 
LOK |0 040   |a DE-2619  |c DE-627  |d DE-2619 
LOK |0 092   |o n 
LOK |0 852   |a DE-2619 
LOK |0 852 1  |9 00 
LOK |0 935   |a core 
OAS |a 1 
ORI |a SA-MARC-krimdoka001.raw