english oumh1203 sh.haslin
TRANSCRIPT
![Page 1: English OUMH1203 Sh.haslin](https://reader030.vdocuments.site/reader030/viewer/2022021317/577cd3a21a28ab9e7897490e/html5/thumbnails/1.jpg)
8/13/2019 English OUMH1203 Sh.haslin
http://slidepdf.com/reader/full/english-oumh1203-shhaslin 1/12
OUMH1203(SMP) ENGLISH FOR WRITTEN COMMUNICATION SH.HASLIN BT
WAN.SARIP(820113135264001)
2011
FAKULTI PENDIDIKAN DAN BAHASA
SEMESTER SEPTEMBER / TAHUN 2011
OUMH1203SMP
ENGLISH FOR WRITTEN COMMUNICATION (SMP)
SHARIFAH HASLIN BINTI WAN SARIP
NO. MATRIKULASI : 820113132!"001
NO. KAD PENGNEALAN : 820113#13#2!"
NO. TELEFON : 01$8%81%
E#MEL : &'*+'',&-'.
PUSAT PEMBELAARAN : OUMMIRI
![Page 2: English OUMH1203 Sh.haslin](https://reader030.vdocuments.site/reader030/viewer/2022021317/577cd3a21a28ab9e7897490e/html5/thumbnails/2.jpg)
8/13/2019 English OUMH1203 Sh.haslin
http://slidepdf.com/reader/full/english-oumh1203-shhaslin 2/12
OUMH1203(SMP) ENGLISH FOR WRITTEN COMMUNICATION SH.HASLIN BT
WAN.SARIP(820113135264001)
2011
CONTENT P45
1. I6797*6 1 # 2
2. C67567
2.1 C&&*+*7*6 + C;5 C*5&
C;5*5 4*6&7 <5&6 2 # 3
C;5*5 4*6&7 <<57 3 # "
C;5*5 4*6&7 4=56567 " #
2.2 C<*&6 + C;5 C*5& *6 M&* 6 U.S.A # 8
3. C69&*6 8 # %
". R5+5565& 10
![Page 3: English OUMH1203 Sh.haslin](https://reader030.vdocuments.site/reader030/viewer/2022021317/577cd3a21a28ab9e7897490e/html5/thumbnails/3.jpg)
8/13/2019 English OUMH1203 Sh.haslin
http://slidepdf.com/reader/full/english-oumh1203-shhaslin 3/12
OUMH1203(SMP) ENGLISH FOR WRITTEN COMMUNICATION SH.HASLIN BT
WAN.SARIP(820113135264001)
2011
I6797*6
Cyber space is a virtual space that has become as important as real space for business,
politics, and communities. Malaysia’s commitment in using Information and
Communication Technology (ICT) as reflected by the investment in the Multimedia
Super Corridor (MSC) and its lagships increase our dependency on cyber space.
!o"ever, this dependency places Malaysia in an e#tremely precarious position because cyber
space is vulnerable to borderless cyber$attac%s.
Cyber space, as it stands today, gives rise to both positive and negative conse&uences.
or negative conse&uences, the ingredient of this digital soup is so vague that many refer to it
as the dar% sides of technology and that cybercriminal currently have the upper hand over la"
enforcement efforts. The applicability and effectiveness of our e#isting la"s need to be
constantly revie"ed to face the ris%s coming from the cyber.
'hat is this Cyber crime 'e read about it in ne"spapers very often. et*s loo% at the
dictionary definition of Cybercrime+ It is a criminal activity committed on the internet. This
is a broad term that describes everything from electronic crac%ing to denial of service attac%s
that cause electronic commerce sites to lose money.
-esides that, cyber$crime is refers to any crime that involves a computer and
a net"or% . The computer may have been used in the commission of a crime, or it may be the
target. et crime refers to criminal e#ploitation of the Internet. Such crimes may threaten a
nation’s security and financial health. Issues surrounding these types of crime have become
high$profile, particularly those surrounding crac%ing, copyright infringement, pornography,
and child grooming. There are also problem of privacy "hen confidential information is lost
or intercepted, la"fully or other"ise. Internationally, both governmental and non$state actors
engage in cybercrimes, including espionage, financial theft, and other cross$border crimes.
/ctivity crossing international borders and involving the interests of at least one nationstate is
sometimes referred to as cyber "arfare. The international legal system is attempting to hold
actors accountable for their actions through the International Criminal Court
/nother definition of cyber$crime by The Oxford Reference Online defines cyber
crime as crime committed over theInternet. The Encyclopedia Britannica defines cyber crime
as any crime that is committed by means of special %no"ledge or e#pert use of computer
technology. Cyber crime could reasonably include a "ide variety of criminal offences and
activities. The scope of this definition becomes "ider "ith a fre&uent companion or
1
![Page 4: English OUMH1203 Sh.haslin](https://reader030.vdocuments.site/reader030/viewer/2022021317/577cd3a21a28ab9e7897490e/html5/thumbnails/4.jpg)
8/13/2019 English OUMH1203 Sh.haslin
http://slidepdf.com/reader/full/english-oumh1203-shhaslin 4/12
OUMH1203(SMP) ENGLISH FOR WRITTEN COMMUNICATION SH.HASLIN BT
WAN.SARIP(820113135264001)
2011
substitute term 0computer$related crime.1 2#amples activities that are considered
cyber crime can be found in the United Nations Manual on the Prevention and
Control of Computer-Related Crime The manual includes fraud, forgery, computer
sabotage, unauthorised access and copying of computer programs as e#amples of cyber
crime.
Cybercrimes can be basically divided into 3 ma4or categories+
5. Cybercrimes against persons.
Cybercrimes committed against persons include various crimes li%e transmission of child$
pornography, harassment of any one "ith the use of a computer such as e$mail. The
traffic%ing, distribution, posting, and dissemination of obscene material including
pornography and indecent e#posure, constitutes one of the most important Cybercrimes
%no"n today. The potential harm of such a crime to humanity can hardly be amplified. This
is one Cybercrime "hich threatens to undermine the gro"th of the younger generation as also
leave irreparable scars and in4ury on the younger generation, if not controlled.
/ minor girl in /hmedabad "as lured to a private place through cyber chat by a man,
"ho, along "ith his friends, attempted to gang rape her. /s some passers$by heard her cry,
she "as rescued.
/nother e#ample "herein the damage "as not done to a person but to the masses is the
case of the Melissa virus. The Melissa virus first appeared on the internet in March of 5666.
It spread rapidly throughout computer systems in the 7nited States and 2urope. It is
estimated that the virus caused 89 million dollars in damages to computers "orld"ide.
In the 7nited States alone, the virus made its "ay through 5.: million computers in
one$fifth of the country*s largest businesses. ;avid Smith pleaded guilty on ;ec. 6, 5666 to
state and federal charges associated "ith his creation of the Melissa virus. There are
numerous e#amples of such computer viruses fe" of them being Melissa and love bug.
Cyber harassment is a distinct Cybercrime. <arious %inds of harassment canand do occur in cyberspace, or through the use of cyberspace. !arassment can be se#ual,
2
![Page 5: English OUMH1203 Sh.haslin](https://reader030.vdocuments.site/reader030/viewer/2022021317/577cd3a21a28ab9e7897490e/html5/thumbnails/5.jpg)
8/13/2019 English OUMH1203 Sh.haslin
http://slidepdf.com/reader/full/english-oumh1203-shhaslin 5/12
OUMH1203(SMP) ENGLISH FOR WRITTEN COMMUNICATION SH.HASLIN BT
WAN.SARIP(820113135264001)
2011
racial, religious, or other. =ersons perpetuating such harassment are also guilty of
cybercrimes. Cyber harassment as a crime also brings us to another related area of violation
of privacy of citi>ens. <iolation of privacy of online citi>ens is a Cybercrime of a grave
nature. o one li%es any other person invading the invaluable and e#tremely touchy area of
his or her o"n privacy "hich the medium of internet grants to the citi>en.
or e#ample are
(i) E* &<+*64 :
/ spoofed email is one in "hich e$mail header is forged so that mail appears to originate
from one source but actually has been sent from another source
(**) S<*64 :
Spamming means sending multiple copies of unsolicited mails or mass e$mails such as chain
letters.
(***) C;5 D5+7*6 :
This occurs "hen defamation ta%es place "ith the help of computers and ? or the Internet.
2.g. someone publishes defamatory matter about someone on a "ebsite or sends e$mails
containing defamatory information.
(*=) H&&567 > C;5 &7?*64 :Cyber Stal%ing Means follo"ing the moves of an individual*s activity over internet. It can be
done "ith the help of many protocols available such at e$ mail, chat rooms, user net groups.
:. Cybercrimes against property.
The second category of Cyber$crimes is that of Cybercrimes against all forms of property.
These crimes include computer vandalism (destruction of others* property), transmission of
harmful programmes.
/ Mumbai$based upstart engineering company lost a say and much money in the
business "hen the rival company, an industry ma4or, stole the technical database from their
computers "ith the help of a corporate cyber spy.
3
![Page 6: English OUMH1203 Sh.haslin](https://reader030.vdocuments.site/reader030/viewer/2022021317/577cd3a21a28ab9e7897490e/html5/thumbnails/6.jpg)
8/13/2019 English OUMH1203 Sh.haslin
http://slidepdf.com/reader/full/english-oumh1203-shhaslin 6/12
OUMH1203(SMP) ENGLISH FOR WRITTEN COMMUNICATION SH.HASLIN BT
WAN.SARIP(820113135264001)
2011
or e#ample are+
(*) C5*7 C F9 :
(**) I675579 P<57 *5& :
Soft"are piracy+ illegal copying of programs, distribution of copies of soft"are.
Copyright infringement+ Trademar%s violations+ Theft of computer source code+
(***) I675657 7*5 7'5+7 :
the usage of the Internet hours by an unauthori>ed person "hich is actually paid by another
person.
3. Cybercrimes against government.
The third category of Cyber$crimes relate to Cybercrimes against @overnment. Cyber
terrorism is one distinct %ind of crime in this category. The gro"th of internet has sho"n that
the medium of Cyberspace is being used by individuals and groups to threaten the
international governments as also to terrorise the citi>ens of a country. This crime manifests
itself into terrorism "hen an individual crac%s into a government or military maintained
"ebsite.
In a report of e#pressindia.com, it "as said that internet "as becoming a boon for the
terrorist organisations. /ccording to Mr. /.A. @upta, ;eputy ;irector (Co$ordination), C-I,
terrorist outfits are increasingly using internet to communicate and move funds. ash%er$e$
Toiba is collecting contributions online from its sympathisers all over the "orld. ;uring the
investigation of the Bed ort shootout in ;ec. :999, the accused /shfa& /hmed of this
terrorist group revealed that the militants are ma%ing e#tensive use of the internet to
communicate "ith the operatives and the sympathisers and also using the medium for intra$
ban% transfer of funds.
Crac%ing is amongst the gravest Cyber$crimes %no"n till date. It is a dreadful feeling to
%no" that a stranger has bro%en into your computer systems "ithout your %no"ledge and
consent and has tampered "ith precious confidential data and information.
Coupled "ith this the actuality is that no computer system in the "orld is crac%ing
proof. It is unanimously agreed that any and every system in the "orld can be crac%ed. The
4
![Page 7: English OUMH1203 Sh.haslin](https://reader030.vdocuments.site/reader030/viewer/2022021317/577cd3a21a28ab9e7897490e/html5/thumbnails/7.jpg)
8/13/2019 English OUMH1203 Sh.haslin
http://slidepdf.com/reader/full/english-oumh1203-shhaslin 7/12
OUMH1203(SMP) ENGLISH FOR WRITTEN COMMUNICATION SH.HASLIN BT
WAN.SARIP(820113135264001)
2011
recent denial of service attac%s seen over the popular commercial sites li%e 2$bay, ahoo,
/ma>on and others are a ne" category of Cyber$crimes "hich are slo"ly emerging as being
e#tremely dangerous.
or e#ample are+
(*) F45 : currency notes, revenue stamps, mar% sheets etc can be forged using computers
and high &uality scanners and printers.
(**) C;5 T5*& :
7se of computer resources to intimidate or coerce others.
(***) W5; ?*64:
!ac%ers gain access and control over the "ebsite of another, even they change the content of
"ebsite for fulfilling political ob4ective or for money.
COMPARISON OF C@BER CRIMES IN MALA@SIA AND USA
T!2 SIT7/TID I M//SI/
-ased on the definition of Clinard and Euinney (56F3) ("ho divided "hitecollar crime into
occupational crime and corporate crime), "hite$collar crime in Malaysia can be categori>ed
as follo"s+
O++565& P=*&*6& + L,
Criminal misappropriation of property sect. G93 to G9G, =enal Code
Criminal breach of trust sect. G9H to G96, =enal Code
Cheating ?fraud sect. G5H to G:9, =enal Code
orgery?credit?/TM card fraud sect. GG to GFF/, =enal Code
Counterfeiting currency sect. G86a to G86;, =enal Code
;efamation sect. G66 to H9:, =enal Code
=roduct piracy Copyright /ct 568F ?Dptical ;iscs /ct :995
=roduct counterfeiting Trade Mar% /ct 56F, Trademar% /mendment /ct :999,
Cyber crime Computer Crimes /ct 566F,;igital Signature /ct 566F,Telemedicine /ct 566F.
Dffences of communications and multimedia industries Multimedia /ct 5668,Malaysian
Communications and Multimedia Commission /ct 5668.
Dffences of printing and publication =rinting =resses and =ublications /ct 568G
5
![Page 8: English OUMH1203 Sh.haslin](https://reader030.vdocuments.site/reader030/viewer/2022021317/577cd3a21a28ab9e7897490e/html5/thumbnails/8.jpg)
8/13/2019 English OUMH1203 Sh.haslin
http://slidepdf.com/reader/full/english-oumh1203-shhaslin 8/12
OUMH1203(SMP) ENGLISH FOR WRITTEN COMMUNICATION SH.HASLIN BT
WAN.SARIP(820113135264001)
2011
-an%ing ? financial fraud -an%ing and inancial Institutions /ct 5686,oan shar%ing Money
enders /ct 56H5(/mendments :993).
The Boyal Malaysia =olice (BM=) as the main la" enforcement agency in the country
has specific offences to deal "ith. /mong the offences investigated by the Commercial
Crime Investigation ;epartment (CCI;) of BM= are as follo"s+
a. Dffences under the =enal Code such as criminal breach of trust, criminal misappropriation
of property, cheating and forgery (include /TM?credit card fraud), false accounting,
counterfeiting currency and criminal defamation.
b. Cyber crime under the Computer Crime /ct 566F such as hac%ing$mail fraud, Internet
fraud, /TM?credit card fraud.
c. =roduct piracy under the Copyright /ct 566F and Dptical ;isc /ct:995 such as pirated
<C;?;<; and computer soft"are.
d. Money laundering under the Money aundering /ct :995.
e. oan shar%ing under the Money enders /ct 56H5 (/mendments:993).
/part from the police, other la" enforcement agencies such as -an% egara, Securities
Commission, /nti$Corruption /gency, Inland Bevenue ;epartment, Customs and 2#cise
;epartment, 2nvironmental ;epartment and others are also empo"ered to investigate certain
offences according to specific provisions and respective 4urisdictions.
THE SITUATION IN USA
Congress and all fifty state legislatures responded to the difficulties of prosecuting
computer misuse as a property crime by enacting ne" computer crime statutes. lorida
passed the first state statute in 56F8J the final state to enact a statute "as <ermont in May
5666. Congress enacted the first federal computer crime la" in 568G, broadened it
considerably in 568, and then updated it in various "ays in 5669, 566G, 566, and :995.
'hile no t"o statutes are identical, all share the common trigger of access "ithout
authori>ation or unauthori>ed access to computers, sometimes in tandem "ith its close
cousin, e#ceeding authori>ed access to computers. In most cases, the statutes prohibit
accessing a computer "ithout authori>ation or e#ceeding authori>ed access as a necessary but
not sufficient element of criminal liability, and then create several specific offenses bycombining this base "ith various additional statutory re&uirements. In other "ords, most
6
![Page 9: English OUMH1203 Sh.haslin](https://reader030.vdocuments.site/reader030/viewer/2022021317/577cd3a21a28ab9e7897490e/html5/thumbnails/9.jpg)
8/13/2019 English OUMH1203 Sh.haslin
http://slidepdf.com/reader/full/english-oumh1203-shhaslin 9/12
OUMH1203(SMP) ENGLISH FOR WRITTEN COMMUNICATION SH.HASLIN BT
WAN.SARIP(820113135264001)
2011
statutes start "ith the basic building bloc% of unauthori>ed access to computers, and then
add additional elements to the offense to deal "ith specific types of computer misuse.
The influential federal computer crime statute codified at 58 7. S. C. 5939 provides a good
e#ample. The statute includes seven distinct crimes, listed in 5939(a)(5) through (a)(F),
almost all of "hich are triggered by access "ithout authori>ation to computers. or
e#ample, one crime prohibits unauthori>ed access to government computers, another
prohibits unauthori>ed access to computers that results in damage, and a third prohibits
unauthori>ed access or e#ceeding authori>ed access to computers such that the user obtains
private information. 2#ample of case in 7S/ is an even broader interpretation of access
appears in a civil decision, /merica Dnline v. ational !ealth Care ;iscount, Inc. (!C;)
This case is one of several civil cases brought by /D against spammers, senders of bul%
unsolicited commercial e$mail. In this dispute, /D sued !C;, a company that sells
discount health care plans, for hiring a spammer to send bul% e$mails about !C; to /D
customers. /D contended that by harvesting e$mail addresses and sending e$mail to /D
customers in violation of /D*s terms of service, the spammers had accessed /D*s
computers "ithout authori>ation. /D moved for summary 4udgment, prompting the court to
consider "hether a computer user accesses another computer "hen he sends e$mail to that
computer. The court ans"ered in the affirmative, offering an e#pansive interpretation of
access+
-ased on the situation in Malaysia I suggest a fe" methods to overcome the cyber crimes in
Malaysia such as+
L, 6 <96*&'567
In Malaysia, the =arliament amended the provisions of punishments for certain "hite$collar
offences on 5F September 5663. Dffences of criminal breach of trust under sections G9 to
G96 and cheating under section G:9 of the =enal Code no" carry a mandatory minimum term
of imprisonment (one year) together "ith mandatory "hipping, and the courts have the
discretion to further impose a fine.
E6+5567
The Boyal Malaysia =olice, through its Commercial Crime Investigation ;epartment (CCI;),
is the main agency that investigates "hite$collar crime cases in Malaysia. In vie" of thedrastic rise of cases and comple#ity of the offences over recent years, the CCI; has
7
![Page 10: English OUMH1203 Sh.haslin](https://reader030.vdocuments.site/reader030/viewer/2022021317/577cd3a21a28ab9e7897490e/html5/thumbnails/10.jpg)
8/13/2019 English OUMH1203 Sh.haslin
http://slidepdf.com/reader/full/english-oumh1203-shhaslin 10/12
OUMH1203(SMP) ENGLISH FOR WRITTEN COMMUNICATION SH.HASLIN BT
WAN.SARIP(820113135264001)
2011
undergone e#pansion since 5 Kanuary :99H, "ith additional manpo"er and e&uipment
allocated to strengthen its capability in eradicating "hite$collar crimes. The police have also
established a orensic Computer aboratory to assist investigating officers in computer crime
cases.
O7'5 <5=567*=5 5&95&
The idea of reducing opportunities is to ma%e it more difficult to hide or commit fraud by+
a) maintaining accurate and complete internal accounting and financial recordsJ
b) developing strong leadership and cohesive "or% groupsJ
c) monitoring the business and operational transactions and interpersonal relationships of
vendors, buyers, debtors, creditors, purchasing agents, representatives and others "ho
interface in the transactions bet"een financial unitsJ
d) establishing some form of physical security system to secure.
e) %eeping accurate personal bac%ground and current financial activities of employees.
CONCLUSION
7nli%e conventional or street crime, "hite$collar crime is characteri>ed bythe high status of
offenders (crime of the po"erful). Cyber crime criminal behaviours are motivated by greed
rather than need, a motivation supported by selfishness and individualism inherent in the
values of capitalist society. The capitalist frame"or% "hich demands material success
and profit ma#imi>ation, coupled "ith the e#istence of certain loopholes in the corporate and
legal structures, have led to a "idespread of "hite$collar criminalities in the last t"o decades.
/lthough its e#tent and implications are serious, "hite$collar crime has not been fully
appreciated by the public. This, according to criminologists, can be attributed to the fact that
unli%e 0clear cut1 conventional crime such as murder, robbery and %idnapping, "hite$collar
crime is seen as less harmful and not violent. There is some evidence that in the past, the
public "ere indifferent to cyber crime. !o"ever, drastic rise of cases over recent years have
prompted gro"ing public and government concern about this menace.
To combat cyber crime effectively, an integrated approach isneeded. The responsibility
should be shared by the government, corporations, industry and public. The police have
al"ays been playing a leading role in enforcement and have embar%ed on a broad$based
strategy, including mutual cooperation "ith regional enforcement agencies in e#changinginformation and establishing net"or%ing and smart partnerships. Dn the other hand, in vie"
8
![Page 11: English OUMH1203 Sh.haslin](https://reader030.vdocuments.site/reader030/viewer/2022021317/577cd3a21a28ab9e7897490e/html5/thumbnails/11.jpg)
8/13/2019 English OUMH1203 Sh.haslin
http://slidepdf.com/reader/full/english-oumh1203-shhaslin 11/12
OUMH1203(SMP) ENGLISH FOR WRITTEN COMMUNICATION SH.HASLIN BT
WAN.SARIP(820113135264001)
2011
of the gro"ing number and seriousness of cyber crime criminalities, "hich maybe attributed
to leniency of sanctions, a tough and punitive policy is necessary. Cyber crime offences
should be treated as 0serious crime1, and that more prosecution and public punishment are
re&uired, to provide greater deterrence and to satisfy the interest of 4ustice. Criminological
research on cyber crime challenges simple e#planations of criminality that loo% to poverty
and social factors as causes and tells us a great deal about contemporary issues of
enforcement and public policy. If criminology is to provide a firm understanding of crime
and criminal 4ustice system, the image of lo"er$class offenders (conventional criminals) must
give "ay to a less reassuring vie" of criminality as a diversified form of behaviour that is
found at all class levels, including cyber crime offenders.
![Page 12: English OUMH1203 Sh.haslin](https://reader030.vdocuments.site/reader030/viewer/2022021317/577cd3a21a28ab9e7897490e/html5/thumbnails/12.jpg)
8/13/2019 English OUMH1203 Sh.haslin
http://slidepdf.com/reader/full/english-oumh1203-shhaslin 12/12
OUMH1203(SMP) ENGLISH FOR WRITTEN COMMUNICATION SH.HASLIN BT
WAN.SARIP(820113135264001)
2011
REFERENCES
rancis g /i% @uan (:999). Criminal Procedure. Malayan a" Kournal
@rabos%y, =. (:99) Electronic Crime! e" Kersey+ =rentice !all
Koseph 2by Buin (566). Corporate "raud , in Ne#s $traits Times, H and 6
Dctober 566.
epofs%y, K. (:99, Kune). Cy%erextortion %y denial-of-service attac& . Bis%, Betrieved
from http+??""".eresecurity.ca?=;?Cybere#tortionL:9byL:9;oS,L:9Bis%L:9Maga>ine
L:9KuneL:9:99.pdf
Drin S. Aerr (ovember, :993)./BTIC2+ C-2BCBIM2*S SCD=2+ IT2B=B2TI@
/CC2SS /; /7T!DBI/TID I CDM=7T2B MIS7S2 ST/T7T2S F8 . . 7.
. Bev. 5H6,
=rice 'aterhouse Coopers @lobal 2conomic Crime Survey (:993). Com%atin' Economic
Crime, in The Star, 5: Kuly :993.