1,284 research outputs found

    Mobile Game Based Learning on Online Banking Fraud Security among Young Adults (BFG)

    Get PDF
    Online banking has brought a huge transformation in many banking and financial services. The percentage of online banking users has increase rapidly across the age including young adults nowadays. In 2011, fraud marks the highest percentage of cyber-crime cases in Malaysia. High concern rises among global expertise on fraud attacks especially in economic and banking sectors. However, the knowledge on this issue among Malaysian young adults is still low. Through the survey conducted, about 63% of young adults do not know about online banking system security. Therefore, this paper presents an alternative approach to educate young adults in Malaysia about online banking fraud. The main deliverables of this study are to identify the online banking fraud security issues that related to young adults, their behavior towards online system security and the development stages. Bypass Fraud Game (BFG) has been proposed based on mobile game-based learning model by mapping with learning theories and approach using Android Eclipse and SDK Development software as the platform. In addition, Technology Acceptance Model (TAM) is used to evaluate the effectiveness on adaption of learning theories in mobile game-based learning. The results show that the game is well received by the users with average response more than 4.00 for TAM elements which are Perceived Usefulness (PU), Perceived Ease of Use (PEOU) and Attitude towards Using (ATU). Through this interactive and fun approach, BFG is expected to help young adults in identifying the methods deployed by cyber criminals as well as precaution action to prevent from being attack

    The diaspora Nigerians’ image problem of drug and fraud: A case study of the Malaysian-Indonesian experience through newspaper reports

    Get PDF
    It is no longer news that the economic and social problems in Nigeria have led to mass migration of Nigerians to other parts of the world for better job opportunities and/or education.South-East Asia has had its fair intake of some of these Nigerians especially in recent times.However, some unscrupulous Nigerians in their bid to make quick money have used the opportunity afforded by some of their host nations to commit crimes ranging from drug trafficking to internet fraud.The negative activities of these few have had a bad impact on the image of the entire citizenry of Nigeria in diaspora and this has led to stereotyping and prejudices-at times with dire consequences.Using the textual analysis method, this paper looks at the activities of some of these criminal minded Nigerians in diaspora through newspaper reports in Malaysia and Indonesia with a view to pinpointing the problems they are creating in these societies, their negative effect on other Nigerians and what solution(s) could possibly be implemented in curbing their activities

    THE LEGAL PROOF OF MACAU SCAM IN MALAYSIA

    Get PDF
    Although there are 5218 Macau scam cases reported since January to October 2020, from the total of the cases, 1420 cases were charged and 2676 were arrested by the Royal Malaysian Police (RMP). This fact can be considered as strong evidence to proof that Macau scam is getting increasingly serious and has the potential to become even worse in the future. Therefore, this study is conducted to investigate the legal meaning of Macau scam, the relevant provision in Malaysian Statute, the methods of proving and the standard of proof applicable in convicting Macau scam crime. Empirical methods of investigation based on available reported cases about Macau scam or fraud are developed herein. Application of such methods will analyse each of the issues highlighted in this study. This study found that Macau's scam means that the fraudulent act deliberately cheats someone to get fast money by making them suffer a loss of money. Besides that, there are provisions that may be applicable to Macau scam; as one of the forms of fraud contained in the Penal Code (Act 574), Section 24, Section 25, Section 415, Section 170 and Section 420. Reviewing cases of fraud as the basis for the Macau scam, it was explicitly stated in most cases that the burden of proof rests with the prosecutor or the group who wished to allege the Macau scam. The standard of proof in civil trials is in the balance of probabilities. The impact of the study is on phone users; victims of Macau scams and legal practitioners in Malaysia. Future studies may be conducted in the field of legal remedies for a Macau scam crime

    Understanding cybercrime in Malaysia: an overview

    Get PDF
    Rapid developments of internet technology and cyber world have created new opportunities for irresponsible people to take advantage of internet users. Millions of internet users across globe have fallen victim to cybercrime. However, many issues regarding cybercrime are not fully understood yet. It is important to thoroughly understand many aspects of cybercrime for better decision making. This paper provides an overview of cybercrime in Malaysia including current state and statistics of cybercrime, common types of cybercrime, brief description of Malaysian cyber laws and describes the role of Malaysian government in responding to cyber security incidents. Hopefully, this paper will enrich current scenarios of cybercrime in Malaysia. Finally, the directions for future research were discussed

    Scammed Posting Detector: A Case Study of Pet Scammed Posting

    Get PDF
    Nowadays, there are many people are being victims of the internet scam. Scammer performs the scam in order to gain money from the victims. Pet scam is one of the scams that contribute to the increase of the internet scam cases. Pet scam starts from the pet scammed posting which is the fake posting about pet sales or adoptions in the online auction site. Due to the unawareness of online buyer on the pet scamming activities and the current pet scam applications are not able to notify the user on the potential pet scam, the pet scam detector which used to detect and alert the user on the potential pet scam must be developed. Usually, the victims of the pet scam are the pet lovers and online buyers. Therefore, they are the target user for this application. Besides, the research on the previous pet scammed emails, the interview of the experienced pet scam victim, and the survey on the public awareness regarding pet scam had been conduct to support the method applied. The results of these pilot studies help to derived the pet scammed email patterns which is useful in the development of the projects

    The ACMA’s international engagement - regulating in a globalised communications and media environment

    Get PDF
    The ACMA’s overriding purpose is to make communications and media work in the public interest, and its international engagement is central to achieving this. The role of international engagement in both protecting and promoting Australia’s communications and media interests is reflected in the legislation the ACMA administers - particularly for spectrum management, telecommunications and radiocommunications standards-setting, unsolicited communications and cybersecurity, and online content. These areas of the ACMA’s work span jurisdictional boundaries, often making it necessary to engage with international bodies and overseas regulators to develop effective responses to the challenges they raise. The ACMA and its predecessors have been engaging with overseas organisations and in international fora for many years. However, the continued global integration of communications and media markets and services, and the disruptive impacts of digital technologies is driving the need for greater collaboration and cooperation between countries. The ACMA is one of many communications and media regulators around the world looking to maximise the social and economic benefits of digital technologies through developing best-practice responses to these challenges. International engagement is an important way the ACMA advances policies and programs that will help to reduce harms and promote outcomes in the interests of Australian business and the community. For example, the ACMA’s international engagement aims to prevent cybersecurity threats and unsolicited communications at the source country through entering bilateral and multilateral arrangements to support a safer networked environment. And, along with other international regulators, the ACMA is looking to ensure that sufficient spectrum is available to cater for the expected growth in mobile broadband services through regional and global harmonisation to foster innovation and productivity within the Australian communications sector. Through engaging with overseas regulators and other international bodies, the ACMA can learn from their experiences and enhance its own regulatory practice. In so doing, the ACMA ensures its decisions and approaches reflect world’s best practice, and as an organisation it is well positioned to respond to the pressures and demands of the evolving environment in which it operates

    Consumer protection for online banking scams via e-mail in Malaysia

    Get PDF
    The new advancement in technology both hard and soft is creating new opportunities for cyber criminals.It is an effective tool for going against the law.In the economic sector, the number of Malaysians opting for online banking to do transaction is increasing.There are 9.8 million online banking account holders in Malaysia. However, cases of online banking scams in Malaysia have been increasing since such first case was registered in 2005.Statistics from Financial Mediation Bureau showed that the number of cases had increased.Therefore, the objectives of this paper are to identify cyber scams via email in online banking business model and to examine consumer protection of online banking scams in Malaysia

    Individual Awareness of E-Wallet and Bank Staff Related Fraud in Malaysia, in the Face of Widespread Global Digitalization

    Get PDF
    The digitalised world is accelerating at a tremendous pace. Many banks and businesses today offer e-wallets as a way of paying bills. As more and more products and services are being offered online at just a click away, a major concern is the security and privacy of data that is widely being transmitted across cyberspace to support online businesses and payment activities. This is because, there are many cybercriminals who attempt to use methods to make financial gain from unsuspecting online users of apps. There is a wide array of apps available to users including the popular e-commerce applications, ride hailing apps, banking apps, travel apps, chat and social apps and many of these apps are used by cybercriminals, who plant links in such apps to trick users. The aim of this research is to gather information on the extent of e-wallet fraud and whether respondents have heard of bank staff being involved in fraud. The aim is create awareness on how the public can be more aware of the pitfalls of using e-wallet and banking online applications for day to day transactions, particularly through the use of the mobile phone to make a transaction

    Persuasion strategies: use of negative forces in scam e-mails

    Get PDF
    The 21st century globalisation strongly influences the world as a result of highly improved technology and communications which made it possible for everyone involved to have equal access to a global market and information exchange via English. As a result, electronic communication has become part of the present-day multinational professionals of all fields who work daily in front of their digital monitors. At times, these professionals may receive Nigerian 419 scam e-mails in which fraudsters target victims to make advance payments for financial gains that do not materialise. In these e-mails, situations in which persuasion techniques are intertwined are well crafted. As a result, the victim who is susceptible to the offer is more likely to respond and be lured into losing money eventually. The present study, consequently, analysed a corpus of 50 Nigerian 419 scam e-mails through a textual analysis to examine language aspects in terms of persuasion strategies fraudsters used as a compelling force to achieve their communicative purposes of lures and deceits. The study has revealed two major types of deceptive techniques which are used in combination, namely framing-rhetoric triggers, disguised as the traditional genre of electronic communications and human weakness-exploiting triggers, intended as incitement of recipients' emotions. Finally, the paper includes not only pedagogical suggestions for business English teachers when implementing classroom activities, but also warnings for either pre-experienced or experienced business professionals in relation to interpreting the unknown e-mails' messages they receive with great caution

    Analysis of Interpersonal Communication Patterns of Love Scams Mode on Social Media in Female Students in Medan City

    Get PDF
    One of the modes that takes the most victims, especially women, is love scams. This mode is to find a mate in cyberspace. People who don't have a soul mate or who are lonely try to find a partner through the internet. The purpose of this study was to determine the pattern of interpersonal communication mode love scams on social media in UIN North Sumatra students. This research covers various issues such as the formulation of the problem, namely, how the mode of love scams on social media among female students can occur. To answer these problems thoroughly and deeply. The research method used is qualitative content analysis using Computer Mediated Communication (CMC) Models consisting of impersonal, interpersonal and hyperpersonal. The study concluded that all three patterns are established in love scam cases. Analysis of this study will be conducted interviews with several sources and observations which will then be verified so that the research is relevant. The results of this study show that often interpersonal communication carried out via social media can create self-disclosure (self-disclosure) which creates high trust between one party which can lead to the occurrence of love scammers. Research contributions based on technological developments that continue to grow and become more sophisticated will also bring greater dangers, one of which is cyber crime, although the number of cases of cybercrime victims is very high, but only a few people dare to report. This is due to the lack of a supervisory system and law in our country, therefore users are required to be good at maintaining personal privacy to avoid crime on social media
    • …
    corecore