english oumh1203 sh.haslin

12
OUMH1203(SMP) ENGLISH FOR WRITTEN COMMUNICATION SH.HASLIN BT WAN.SARIP(820113135264001) 2011 FAKULTI PENDIDIKAN DAN BAHASA SEMESTER SEPTEMBER / TAHUN 2011 OUMH1203SMP ENGLISH FOR WRITTEN COMMUNICATION (SMP) SHARIFAH HASLIN BINTI WAN SARIP NO. MATRIKULASI : 820113132!"001 NO. KAD PENGNEALAN : 820113#13#2!" NO. TELEFON : 01$8%81% E#MEL : &'*+'',&-'. PUSAT PEMBELAARAN : OUMMIRI

Upload: anonymous-jntglc

Post on 04-Jun-2018

227 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: English OUMH1203 Sh.haslin

8/13/2019 English OUMH1203 Sh.haslin

http://slidepdf.com/reader/full/english-oumh1203-shhaslin 1/12

OUMH1203(SMP) ENGLISH FOR WRITTEN COMMUNICATION SH.HASLIN BT

WAN.SARIP(820113135264001)

2011

FAKULTI PENDIDIKAN DAN BAHASA

SEMESTER SEPTEMBER / TAHUN 2011

OUMH1203SMP

ENGLISH FOR WRITTEN COMMUNICATION (SMP)

SHARIFAH HASLIN BINTI WAN SARIP

NO. MATRIKULASI : 820113132!"001

NO. KAD PENGNEALAN : 820113#13#2!"

NO. TELEFON : 01$8%81%

E#MEL : &'*+'',&-'.

PUSAT PEMBELAARAN : OUMMIRI

Page 2: English OUMH1203 Sh.haslin

8/13/2019 English OUMH1203 Sh.haslin

http://slidepdf.com/reader/full/english-oumh1203-shhaslin 2/12

OUMH1203(SMP) ENGLISH FOR WRITTEN COMMUNICATION SH.HASLIN BT

WAN.SARIP(820113135264001)

2011

CONTENT P45

1. I6797*6 1 # 2

2. C67567

2.1 C&&*+*7*6 + C;5 C*5&

C;5*5 4*6&7 <5&6 2 # 3

C;5*5 4*6&7 <<57 3 # "

C;5*5 4*6&7 4=56567 " #

2.2 C<*&6 + C;5 C*5& *6 M&* 6 U.S.A # 8

3. C69&*6 8 # %

". R5+5565& 10

Page 3: English OUMH1203 Sh.haslin

8/13/2019 English OUMH1203 Sh.haslin

http://slidepdf.com/reader/full/english-oumh1203-shhaslin 3/12

OUMH1203(SMP) ENGLISH FOR WRITTEN COMMUNICATION SH.HASLIN BT

WAN.SARIP(820113135264001)

2011

I6797*6

Cyber space is a virtual space that has become as important as real space for business,

 politics, and communities. Malaysia’s commitment in using Information and

Communication Technology (ICT) as reflected by the investment in the Multimedia

Super Corridor (MSC) and its lagships increase our dependency on cyber space.

!o"ever, this dependency places Malaysia in an e#tremely precarious position because cyber

space is vulnerable to borderless cyber$attac%s.

Cyber space, as it stands today, gives rise to both positive and negative conse&uences.

or negative conse&uences, the ingredient of this digital soup is so vague that many refer to it

as the dar% sides of technology and that cybercriminal currently have the upper hand over la"

enforcement efforts. The applicability and effectiveness of our e#isting la"s need to be

constantly revie"ed to face the ris%s coming from the cyber.

'hat is this Cyber crime 'e read about it in ne"spapers very often. et*s loo% at the

dictionary definition of Cybercrime+ It is a criminal activity committed on the internet. This

is a broad term that describes everything from electronic crac%ing to denial of service attac%s

that cause electronic commerce sites to lose money.

-esides that, cyber$crime is refers to any crime that involves a computer  and

a net"or% . The computer may have been used in the commission of a crime, or it may be the

target. et crime refers to criminal e#ploitation of the Internet. Such crimes may threaten a

nation’s security and financial health. Issues surrounding these types of crime have become

high$profile, particularly those surrounding crac%ing, copyright infringement, pornography,

and child grooming. There are also problem of privacy "hen confidential information is lost

or intercepted, la"fully or other"ise. Internationally, both governmental and non$state actors

engage in cybercrimes, including espionage, financial theft, and other cross$border crimes.

/ctivity crossing international borders and involving the interests of at least one nationstate is

sometimes referred to as cyber "arfare. The international legal system is attempting to hold

actors accountable for their actions through the International Criminal Court

/nother definition of cyber$crime by The Oxford Reference Online defines cyber

crime as crime committed over theInternet. The Encyclopedia Britannica defines cyber crime

as any crime that is committed by means of special %no"ledge or e#pert use of computer

technology. Cyber crime could reasonably include a "ide variety of criminal offences and

activities. The scope of this definition becomes "ider "ith a fre&uent companion or 

1

Page 4: English OUMH1203 Sh.haslin

8/13/2019 English OUMH1203 Sh.haslin

http://slidepdf.com/reader/full/english-oumh1203-shhaslin 4/12

OUMH1203(SMP) ENGLISH FOR WRITTEN COMMUNICATION SH.HASLIN BT

WAN.SARIP(820113135264001)

2011

substitute term 0computer$related crime.1 2#amples activities that are considered

cyber crime can be found in the United Nations Manual on the Prevention and 

Control of Computer-Related Crime The manual includes fraud, forgery, computer 

sabotage, unauthorised access and copying of computer programs as e#amples of cyber

crime.

 Cybercrimes can be basically divided into 3 ma4or categories+

5. Cybercrimes against persons.

Cybercrimes committed against persons include various crimes li%e transmission of child$

 pornography, harassment of any one "ith the use of a computer such as e$mail. The

traffic%ing, distribution, posting, and dissemination of obscene material including

 pornography and indecent e#posure, constitutes one of the most important Cybercrimes

%no"n today. The potential harm of such a crime to humanity can hardly be amplified. This

is one Cybercrime "hich threatens to undermine the gro"th of the younger generation as also

leave irreparable scars and in4ury on the younger generation, if not controlled.

  / minor girl in /hmedabad "as lured to a private place through cyber chat by a man,

"ho, along "ith his friends, attempted to gang rape her. /s some passers$by heard her cry,

she "as rescued.

  /nother e#ample "herein the damage "as not done to a person but to the masses is the

case of the Melissa virus. The Melissa virus first appeared on the internet in March of 5666.

It spread rapidly throughout computer systems in the 7nited States and 2urope. It is

estimated that the virus caused 89 million dollars in damages to computers "orld"ide.

  In the 7nited States alone, the virus made its "ay through 5.: million computers in

one$fifth of the country*s largest businesses. ;avid Smith pleaded guilty on ;ec. 6, 5666 to

state and federal charges associated "ith his creation of the Melissa virus. There are

numerous e#amples of such computer viruses fe" of them being Melissa and love bug.

  Cyber harassment is a distinct Cybercrime. <arious %inds of harassment canand do occur in cyberspace, or through the use of cyberspace. !arassment can be se#ual,

2

Page 5: English OUMH1203 Sh.haslin

8/13/2019 English OUMH1203 Sh.haslin

http://slidepdf.com/reader/full/english-oumh1203-shhaslin 5/12

OUMH1203(SMP) ENGLISH FOR WRITTEN COMMUNICATION SH.HASLIN BT

WAN.SARIP(820113135264001)

2011

racial, religious, or other. =ersons perpetuating such harassment are also guilty of

cybercrimes. Cyber harassment as a crime also brings us to another related area of violation

of privacy of citi>ens. <iolation of privacy of online citi>ens is a Cybercrime of a grave

nature. o one li%es any other person invading the invaluable and e#tremely touchy area of

his or her o"n privacy "hich the medium of internet grants to the citi>en.

or e#ample are

(i) E* &<+*64 :

/ spoofed email is one in "hich e$mail header is forged so that mail appears to originate

from one source but actually has been sent from another source

(**) S<*64 :

Spamming means sending multiple copies of unsolicited mails or mass e$mails such as chain

letters.

(***) C;5 D5+7*6 :

This occurs "hen defamation ta%es place "ith the help of computers and ? or the Internet.

2.g. someone publishes defamatory matter about someone on a "ebsite or sends e$mails

containing defamatory information.

(*=) H&&567 > C;5 &7?*64 :Cyber Stal%ing Means follo"ing the moves of an individual*s activity over internet. It can be

done "ith the help of many protocols available such at e$ mail, chat rooms, user net groups.

:. Cybercrimes against property.

The second category of Cyber$crimes is that of Cybercrimes against all forms of property.

These crimes include computer vandalism (destruction of others* property), transmission of

harmful programmes.

  / Mumbai$based upstart engineering company lost a say and much money in the

 business "hen the rival company, an industry ma4or, stole the technical database from their

computers "ith the help of a corporate cyber spy.

3

Page 6: English OUMH1203 Sh.haslin

8/13/2019 English OUMH1203 Sh.haslin

http://slidepdf.com/reader/full/english-oumh1203-shhaslin 6/12

OUMH1203(SMP) ENGLISH FOR WRITTEN COMMUNICATION SH.HASLIN BT

WAN.SARIP(820113135264001)

2011

or e#ample are+

(*) C5*7 C F9 :

(**) I675579 P<57 *5& : 

Soft"are piracy+ illegal copying of programs, distribution of copies of soft"are.

Copyright infringement+ Trademar%s violations+ Theft of computer source code+

(***) I675657 7*5 7'5+7 :

the usage of the Internet hours by an unauthori>ed person "hich is actually paid by another

 person.

 

3. Cybercrimes against government.

The third category of Cyber$crimes relate to Cybercrimes against @overnment. Cyber

terrorism is one distinct %ind of crime in this category. The gro"th of internet has sho"n that

the medium of Cyberspace is being used by individuals and groups to threaten the

international governments as also to terrorise the citi>ens of a country. This crime manifests

itself into terrorism "hen an individual crac%s into a government or military maintained

"ebsite.

  In a report of e#pressindia.com, it "as said that internet "as becoming a boon for the

terrorist organisations. /ccording to Mr. /.A. @upta, ;eputy ;irector (Co$ordination), C-I,

terrorist outfits are increasingly using internet to communicate and move funds. ash%er$e$

Toiba is collecting contributions online from its sympathisers all over the "orld. ;uring the

investigation of the Bed ort shootout in ;ec. :999, the accused /shfa& /hmed of this

terrorist group revealed that the militants are ma%ing e#tensive use of the internet to

communicate "ith the operatives and the sympathisers and also using the medium for intra$

 ban% transfer of funds.

  Crac%ing is amongst the gravest Cyber$crimes %no"n till date. It is a dreadful feeling to

%no" that a stranger has bro%en into your computer systems "ithout your %no"ledge and

consent and has tampered "ith precious confidential data and information.

  Coupled "ith this the actuality is that no computer system in the "orld is crac%ing

 proof. It is unanimously agreed that any and every system in the "orld can be crac%ed. The

4

Page 7: English OUMH1203 Sh.haslin

8/13/2019 English OUMH1203 Sh.haslin

http://slidepdf.com/reader/full/english-oumh1203-shhaslin 7/12

OUMH1203(SMP) ENGLISH FOR WRITTEN COMMUNICATION SH.HASLIN BT

WAN.SARIP(820113135264001)

2011

recent denial of service attac%s seen over the popular commercial sites li%e 2$bay, ahoo,

/ma>on and others are a ne" category of Cyber$crimes "hich are slo"ly emerging as being

e#tremely dangerous.

or e#ample are+

(*) F45 : currency notes, revenue stamps, mar% sheets etc can be forged using computers

and high &uality scanners and printers.

(**) C;5 T5*& :

7se of computer resources to intimidate or coerce others.

(***) W5; ?*64:

!ac%ers gain access and control over the "ebsite of another, even they change the content of

"ebsite for fulfilling political ob4ective or for money.

COMPARISON OF C@BER CRIMES IN MALA@SIA AND USA

T!2 SIT7/TID I M//SI/

-ased on the definition of Clinard and Euinney (56F3) ("ho divided "hitecollar crime into

occupational crime and corporate crime), "hite$collar crime in Malaysia can be categori>ed

as follo"s+

O++565& P=*&*6& + L,

Criminal misappropriation of property sect. G93 to G9G, =enal Code

Criminal breach of trust sect. G9H to G96, =enal Code

Cheating ?fraud sect. G5H to G:9, =enal Code

orgery?credit?/TM card fraud sect. GG to GFF/, =enal Code

Counterfeiting currency sect. G86a to G86;, =enal Code

;efamation sect. G66 to H9:, =enal Code

=roduct piracy Copyright /ct 568F ?Dptical ;iscs /ct :995

=roduct counterfeiting Trade Mar% /ct 56F, Trademar% /mendment /ct :999,

Cyber crime Computer Crimes /ct 566F,;igital Signature /ct 566F,Telemedicine /ct 566F.

Dffences of communications and multimedia industries Multimedia /ct 5668,Malaysian

Communications and Multimedia Commission /ct 5668.

Dffences of printing and publication =rinting =resses and =ublications /ct 568G

5

Page 8: English OUMH1203 Sh.haslin

8/13/2019 English OUMH1203 Sh.haslin

http://slidepdf.com/reader/full/english-oumh1203-shhaslin 8/12

OUMH1203(SMP) ENGLISH FOR WRITTEN COMMUNICATION SH.HASLIN BT

WAN.SARIP(820113135264001)

2011

-an%ing ? financial fraud -an%ing and inancial Institutions /ct 5686,oan shar%ing Money

enders /ct 56H5(/mendments :993).

The Boyal Malaysia =olice (BM=) as the main la" enforcement agency in the country

has specific offences to deal "ith. /mong the offences investigated by the Commercial

Crime Investigation ;epartment (CCI;) of BM= are as follo"s+

a. Dffences under the =enal Code such as criminal breach of trust, criminal misappropriation

of property, cheating and forgery (include /TM?credit card fraud), false accounting,

counterfeiting currency and criminal defamation.

 b. Cyber crime under the Computer Crime /ct 566F such as hac%ing$mail fraud, Internet

fraud, /TM?credit card fraud.

c. =roduct piracy under the Copyright /ct 566F and Dptical ;isc /ct:995 such as pirated

<C;?;<; and computer soft"are.

d. Money laundering under the Money aundering /ct :995.

e. oan shar%ing under the Money enders /ct 56H5 (/mendments:993).

/part from the police, other la" enforcement agencies such as -an% egara, Securities

Commission, /nti$Corruption /gency, Inland Bevenue ;epartment, Customs and 2#cise

;epartment, 2nvironmental ;epartment and others are also empo"ered to investigate certain

offences according to specific provisions and respective 4urisdictions.

THE SITUATION IN USA

 Congress and all fifty state legislatures responded to the difficulties of prosecuting

computer misuse as a property crime by enacting ne" computer crime statutes. lorida

 passed the first state statute in 56F8J the final state to enact a statute "as <ermont in May

5666. Congress enacted the first federal computer crime la" in 568G, broadened it

considerably in 568, and then updated it in various "ays in 5669, 566G, 566, and :995.

'hile no t"o statutes are identical, all share the common trigger of access "ithout

authori>ation or unauthori>ed access to computers, sometimes in tandem "ith its close

cousin, e#ceeding authori>ed access to computers. In most cases, the statutes prohibit

accessing a computer "ithout authori>ation or e#ceeding authori>ed access as a necessary but

not sufficient element of criminal liability, and then create several specific offenses bycombining this base "ith various additional statutory re&uirements. In other "ords, most

6

Page 9: English OUMH1203 Sh.haslin

8/13/2019 English OUMH1203 Sh.haslin

http://slidepdf.com/reader/full/english-oumh1203-shhaslin 9/12

OUMH1203(SMP) ENGLISH FOR WRITTEN COMMUNICATION SH.HASLIN BT

WAN.SARIP(820113135264001)

2011

statutes start "ith the basic building bloc% of unauthori>ed access to computers, and then

add additional elements to the offense to deal "ith specific types of computer misuse.

The influential federal computer crime statute codified at 58 7. S. C. 5939 provides a good

e#ample. The statute includes seven distinct crimes, listed in 5939(a)(5) through (a)(F),

almost all of "hich are triggered by access "ithout authori>ation to computers. or

e#ample, one crime prohibits unauthori>ed access to government computers, another

 prohibits unauthori>ed access to computers that results in damage, and a third prohibits

unauthori>ed access or e#ceeding authori>ed access to computers such that the user obtains

 private information. 2#ample of case in 7S/ is an even broader interpretation of access

appears in a civil decision, /merica Dnline v. ational !ealth Care ;iscount, Inc. (!C;)

This case is one of several civil cases brought by /D against spammers, senders of bul%

unsolicited commercial e$mail. In this dispute, /D sued !C;, a company that sells

discount health care plans, for hiring a spammer to send bul% e$mails about !C; to /D

customers. /D contended that by harvesting e$mail addresses and sending e$mail to /D

customers in violation of /D*s terms of service, the spammers had accessed /D*s

computers "ithout authori>ation. /D moved for summary 4udgment, prompting the court to

consider "hether a computer user accesses another computer "hen he sends e$mail to that

computer. The court ans"ered in the affirmative, offering an e#pansive interpretation of

access+

 

-ased on the situation in Malaysia I suggest a fe" methods to overcome the cyber crimes in

Malaysia such as+

L, 6 <96*&'567

In Malaysia, the =arliament amended the provisions of punishments for certain "hite$collar

offences on 5F September 5663. Dffences of criminal breach of trust under sections G9 to

G96 and cheating under section G:9 of the =enal Code no" carry a mandatory minimum term

of imprisonment (one year) together "ith mandatory "hipping, and the courts have the

discretion to further impose a fine.

E6+5567

The Boyal Malaysia =olice, through its Commercial Crime Investigation ;epartment (CCI;),

is the main agency that investigates "hite$collar crime cases in Malaysia. In vie" of thedrastic rise of cases and comple#ity of the offences over recent years, the CCI; has

7

Page 10: English OUMH1203 Sh.haslin

8/13/2019 English OUMH1203 Sh.haslin

http://slidepdf.com/reader/full/english-oumh1203-shhaslin 10/12

OUMH1203(SMP) ENGLISH FOR WRITTEN COMMUNICATION SH.HASLIN BT

WAN.SARIP(820113135264001)

2011

undergone e#pansion since 5 Kanuary :99H, "ith additional manpo"er and e&uipment

allocated to strengthen its capability in eradicating "hite$collar crimes. The police have also

established a orensic Computer aboratory to assist investigating officers in computer crime

cases.

O7'5 <5=567*=5 5&95&

 The idea of reducing opportunities is to ma%e it more difficult to  hide or commit fraud by+

a) maintaining accurate and complete internal accounting and financial recordsJ

 b) developing strong leadership and cohesive "or% groupsJ

c) monitoring the business and operational transactions and interpersonal relationships of

vendors, buyers, debtors, creditors, purchasing agents, representatives and others "ho

interface in the transactions bet"een financial unitsJ

d) establishing some form of physical security system to secure.

e) %eeping accurate personal bac%ground and current financial activities of employees.

CONCLUSION

7nli%e conventional or street crime, "hite$collar crime is characteri>ed bythe high status of

offenders (crime of the po"erful). Cyber crime criminal behaviours are motivated by greed

rather than need, a motivation supported by selfishness and individualism inherent in the

values of capitalist society. The capitalist frame"or% "hich demands material success

and profit ma#imi>ation, coupled "ith the e#istence of certain loopholes in the corporate and

legal structures, have led to a "idespread of "hite$collar criminalities in the last t"o decades.

/lthough its e#tent and implications are serious, "hite$collar crime has not been fully

appreciated by the public. This, according to criminologists, can be attributed to the fact that

unli%e 0clear cut1 conventional crime such as murder, robbery and %idnapping, "hite$collar 

crime is seen as less harmful and not violent. There is some evidence that in the past, the

 public "ere indifferent to cyber crime. !o"ever, drastic rise of cases over recent years have

 prompted gro"ing public and government concern about this menace.

To combat cyber crime effectively, an integrated approach isneeded. The responsibility

should be shared by the government, corporations, industry and public. The police have

al"ays been playing a leading role in enforcement and have embar%ed on a broad$based

strategy, including mutual cooperation "ith regional enforcement agencies in e#changinginformation and establishing net"or%ing and smart partnerships. Dn the other hand, in vie"

8

Page 11: English OUMH1203 Sh.haslin

8/13/2019 English OUMH1203 Sh.haslin

http://slidepdf.com/reader/full/english-oumh1203-shhaslin 11/12

OUMH1203(SMP) ENGLISH FOR WRITTEN COMMUNICATION SH.HASLIN BT

WAN.SARIP(820113135264001)

2011

of the gro"ing number and seriousness of cyber crime criminalities, "hich maybe attributed

to leniency of sanctions, a tough and punitive policy is necessary. Cyber crime offences

should be treated as 0serious crime1, and that more prosecution and public punishment are

re&uired, to provide greater deterrence and to satisfy the interest of 4ustice. Criminological

research on cyber crime challenges simple e#planations of criminality that loo% to poverty

and social factors as causes and tells us a great deal about contemporary issues of

enforcement and public policy. If criminology is to provide a firm understanding of crime

and criminal 4ustice system, the image of lo"er$class offenders (conventional criminals) must

give "ay to a less reassuring vie" of criminality as a diversified form of behaviour that is

found at all class levels, including cyber crime offenders.

Page 12: English OUMH1203 Sh.haslin

8/13/2019 English OUMH1203 Sh.haslin

http://slidepdf.com/reader/full/english-oumh1203-shhaslin 12/12

OUMH1203(SMP) ENGLISH FOR WRITTEN COMMUNICATION SH.HASLIN BT

WAN.SARIP(820113135264001)

2011

REFERENCES

rancis g /i% @uan (:999). Criminal Procedure. Malayan a" Kournal

@rabos%y, =. (:99) Electronic Crime! e" Kersey+ =rentice !all

Koseph 2by Buin (566). Corporate "raud , in  Ne#s $traits Times, H and 6

Dctober 566.

epofs%y, K. (:99, Kune). Cy%erextortion %y denial-of-service attac& . Bis%, Betrieved

from http+??""".eresecurity.ca?=;?Cybere#tortionL:9byL:9;oS,L:9Bis%L:9Maga>ine

L:9KuneL:9:99.pdf 

Drin S. Aerr (ovember, :993)./BTIC2+ C-2BCBIM2*S SCD=2+ IT2B=B2TI@

/CC2SS /; /7T!DBI/TID I CDM=7T2B MIS7S2 ST/T7T2S F8 . . 7.

. Bev. 5H6,

=rice 'aterhouse Coopers @lobal 2conomic Crime Survey (:993). Com%atin' Economic

Crime, in The Star, 5: Kuly :993.