HOW A MEDIUM-SIZED COUNTRY RANKS HIGHER IN THE INDEXES FOR CYBERSECURITY: THE CASE OF MALAYSIA IN THE CONTEXT OF LEGAL AND ADMINISTRATIVE REGULATIONS

Authors

  • Kamil TARHAN

Keywords:

Cybersecurity, Cybersecurity Index, Malaysia’s Cyber Laws, Legal Regulations

Abstract

The expanding structure of cyberspace has caused threat elements to diversify and increase. The increase in its borders and the actors has led to rapid spread and transformation of threats in this domain. Unlike the real world, the fact that it has no borders led to a very controversial situation on the legal rules that can or should be applied in this area. Therefore, countries develop legal regulations to ensure cybersecurity within their cyberspace. These legal
regulations have emerged as an important situation in the evaluation of countries in the cybersecurity indexes. At this point, it will be examined how a medium-sized country like Malaysia takes place at the top of these indices based on legal regulations.

References

Appuduai, J. & Ramalingam, C. L. (2007). Computer Crimes: A Case Study of What Malaysia Can Learn from Others?. Journal of Digital Forensics, Security and Law, 2(2): 7-22.

Cavelty, M. D. & Wenger, A. (2020). Cyber security meets security politics: Complex technology, fragmented politics, and networked science, Contemporary Security Policy, 41(1): 5-32.

Computer Crimes Act 1997, http://www.jtu.sabah.gov.my/publication/data/Pub-Images/Content/Computer%20Crimes%20Act%201997.pdf, (Accessed Time: 29.06.2021)

Daud, M. & Zulhuda, S. (2020). Regulating the Spread of False Content Online in Malaysia: Issues, Challenges and the Way Forward, International Journal of Business and Society, 21(S1): 32-48.

Harknett, R. J. & Stever, J. A. (2011). The New Policy World of Cybersecurity, Public Administration Review, 455-460.

Hussein, S. M. (2000). The Malaysian Communications and Multimedia Act 1998—Its Implications on the Information Technology (IT) Industry, Information & Communications Technology Law, 9(1): 79-88.

ITU. (2007). Cybersecurity for All: ITU’s Work for a Safer World, https://www.itu.int/dms_pub/itu-s/opb/gen/S-GEN-CYBER-2007-PDF-E.pdf, (Accessed Time: 08.06.2021).

ITU. (2010). GSR 2010 Discussion Paper; The role of ICT regulation in addressing offenses in cyberspace, 2010, https://www.itu.int/ITU-D/treg/Events/Seminars/GSR/GSR10/documents/GSR10-paper6.pdf, (Accessed Time: 30.06.2021).

ITU. (2012). Understanding cybercrime: Phenomena, challenges and legal response, 2012, https://www.itu.int/ITU-D/cyb/cybersecurity/docs/Cybercrime%20legislation%20EV6.pdf, (Accessed Time: 30.06.2021).

Jayabalan, P., Ibrahim, R. & Manaf, A. A. (2014). Understanding Cybercrime in Malaysia: An Overview. Sains Humanika, 2(2): 109-115.

Karim, S. H. A. (2010). Introduction to National Cyber Security Policy, CyberSecurity Malaysia –MOSTI.

Laws of Malaysia Act 564 Telemedicine Act 1997, file:///C:/Users/S%20A%20M%20S%20U%20N%20G/Downloads/Telemedicine%20Act%201997%20Act%20564.pdf, (Accessed Time: 02.07.2021).

Laws of Malaysia Act 588 Communications and Multimedia Act 1998 (Incorporating latest amendment - Act A1220/2004), https://www.mcmc.gov.my/skmmgovmy/media/General/pdf/Act588bi_3.pdf, (Accessed Time: 01.07.2021).

Laws of Malaysia Act 680 Electronic Government Activities Act 2007, http://www.mbpp.gov.my/sites/default/files/6.%20Goverment%20Electronic%20Act.pdf, (Accessed Time: 04.07.2021).

Lessig, L. (1996). The Zones of Cyberspace, Stanford Law Review, 48(5): 1403-1411.

Majlis Keselamatan Negara. (2020). Kerajaan lancar Strategi Keselamatan Siber Malaysia RM1.8 bilion, 19.10.2020, https://www.mkn.gov.my/web/ms/2020/10/19/kerajaan-lancar-strategi-keselamatan-siber-malaysia-rm1-8-bilion/, (Accessed: 1.11.2020).

Manap, N. A. (2014). Alignment of Malaysia and ASEAN Agreements on ICT Laws: A Review, Proceeding International Conference on Electronic- Commerce Law, “E-Commerce Law in Asia: Opportunities and Challenges” (pp. 1-8).

Mohamed, D. B. (2012). Combating the threats of cybercrimes in Malaysia: The efforts, the cyberlaws and the traditional laws, Computer Law & Security Review, 29: 66-76.

Mohammed, A. A. S., Nawang, N. I. & Mustaffa, A. (2019). Criminal Attempt In The Malaysian Computer Crimes Act 1997 (Act 563), International Journal of Law, Government and Communication, 4(15): 01-07.

Pillai, D. and Han, Y. S. (2019). “Malaysia”, In The International Comparative Legal Guide to: Cybersecurity 2019 (pp. 130-138), London: Global Legal Group.

Sabillon, R., Cavaller, V. & Cano, J. (2016). National Cyber Security Strategies: Global Trends in Cyberspace, International Journal of Computer Science and Software Engineering (IJCSSE), 5(5): 67-81.

Shalhoub, Z. K., and Al Qasimi, S. L. (2010). Cyber Law and Cyber Security in Developing and Emerging Economies. UK: Edward Elgar Publishing.

Sunkpho, J., Ramjan, S. & Ottomakorn, C. (2018). Cybersecurity Policy in ASEAN Countries, Information Institute Conferences, Las Vegas, NV.

UN. (1990). Eighth United Nations Congress on the Prevention of Crime and the Treatment of Offenders, Havana, 27 August – 7 September 1990, https://www.unodc.org/, (Access Time: 30.06.2021).

Yew, W. (2002). Malaysian Law and Computer Crime”, SANS Institute Information Security Reading Room 2002.

Zakri, I. M. (2012). Internet Law: Latest Developments in Cyber Laws in Malaysia”, International Journal of Legal Information, 40(1-2): 257-272.

Zulhuda, S. (2011). National Security in Malaysia’s Digital Economy: Redefinition, Reaction and Legal Reform, Journal of Applied Sciences Research, 7(13): 2316-2325.

Zulhuda, S. (2012). The State of E-Government Security in Malaysia: Reassessing the Legal and Regulatory Framework on the Threat of Information Theft, ICCIT, 812-817.

Zulhuda, S. and Azmi, I. M. A. G. (2011). Security Safeguards on e-Payment Systems in Malaysia: Analysis on the Payment Systems Act 2003, Journal of International Commercial Law and Technology, 6(4): 187-193.

Downloads

Published

2022-01-30

How to Cite

TARHAN, K. (2022). HOW A MEDIUM-SIZED COUNTRY RANKS HIGHER IN THE INDEXES FOR CYBERSECURITY: THE CASE OF MALAYSIA IN THE CONTEXT OF LEGAL AND ADMINISTRATIVE REGULATIONS. Cyberpolitik Journal, 6(12), 222-234. Retrieved from http://cyberpolitikjournal.org/index.php/main/article/view/146