...Master in Engineering Business Management Razak School of Engineering and Advanced Technology Universiti Teknologi Malaysia International Campus Kuala Lumpur, Malaysia Abstract Due to demands to full fill necessity of K-economy towards Vision 2020, Malaysia is now on the race to create more Information Technology (IT) literate. Education sector has been targeted to be an introduction sector to implement Information and Communication Technology (ICT) tools to advance learning and teaching processes. As such, Government of Malaysia has been working on few strategies to introduce electronic gadget applications in Malaysian schools to improve quality of education inclusively. In this study, we have conducted a survey to study the needs and acceptability of electronic gadgets such as mobile phones in schools, then analyzed outcome of survey accordingly. The result of the survey shows level of acceptance on the use of electronic gadget in schools and ethical consideration has been considered to decide best decision to overcome its negative impacts. Based on ethical consideration, the use of electronic gadgets in schools should be permitted as it brings more valuable benefits towards nation and society well-being. Malaysian to maintain high level of ethics and morality act to be able to use and handle knowledge well. Keywords: IT gadgets; Mobile phone; Information and Communication Technology; Malaysia Schools 1. Introduction 1.1. ICT as enable tools towards K-economy...
Words: 4314 - Pages: 18
...Introduction David S. Wall, author of Cybercrime: The Transformation of Crime in the Information Age, once said, “In a nutshell, we are shocked by cybercrime, but also expect to be shocked by it because we expect it to be there, but – confusingly – we appear to be shocked if we are not shocked (if we don’t find it)!” In today’s society, cybercrimes are considered a greater threat than ever. Computer crime can be defined as a crime that is committed where the computer or electronic data device is integral to the criminal act (Kranacher, Riley, and Wells 114). Although many do not believe that they can cause any vital damage, cybercrimes such as wiretapping, piggybacking, and computer viruses can have significant repercussions on various organizations. By identifying the type of cybercrime, discussing how organizations can protect themselves from it, and multiple real-life examples, an insightful analysis of the implications of cybercrime can be better understood. Wiretapping Wiretapping has become a very common way of committing computer fraud. This occurs when perpetrators read information being transmitted between an organization’s computers. In order to decrease this, companies can implement various encryption techniques to help ensure that confidential information does not reach the hands of a person who can use it with malicious intent (Kranacher, Riley, and Wells 120-21). This information that is obtained could be pertaining to an organization’s consumers, employees...
Words: 1097 - Pages: 5
...Title Content page no Introduction…………………………………………………….……………………………….1 What is cybercrime? ..........................................................................................................1 Types of cybercrime……………………………………………………………………………..2 Reasons of cybercrime……………………………………………………………..……………2-3 Offences of cybercrime under ICT Act-2006……………………………………………………3 Penalties of cybercrime under ICT Act-2006 ……………………………………………………4 Cyber Tribunal …………………………………………………………………………………...5 Cyber appellate Tribunal ………………………………………………………………………….5 Recent condition of cyber law in Bangladesh……………………………………………………..6 Recommendations……………………..………………………………………………………….6 Conclusion ………………………..………………………………………………………………7 Bibliography …………….………………………………………………………………………..8 Introduction Information and communications technology (ICT) is often used as an extended synonym for information technology (IT), but is a more specific term that stresses the role of unified communications and the integration of telecommunications (telephone lines and wireless signals), computers as well as necessary enterprise software, middleware, storage, and audio-visual systems, which enable users to access, store, transmit, and manipulate information. The phrase ICT had been used by academic researchers since the 1980s, but it became popular after it was used in a report to the UK government by Dennis Stevenson in 1997 and in the revised National Curriculum...
Words: 6414 - Pages: 26
...Manila Fifteenth Congress Second Regular Session Begun and held in Metro Manila, on Monday the Twenty-fifth day of July two thousand eleven. [ Republic Act No. 10175 ] AN ACT DEFINING CYBERCRIME, PROVIDING FOR THE PREVENTION, INVESTIGATION, SUPPRESSION AND THE IMPOSITION OF PENALTIES THEREFOR AND FOR OTHER PURPOSES Be it enacted by the Senate and House of Representatives of the Philippines in Congress assembled: CHAPTER I PRELIMINARY PROVISIONS SECTION 1. Title. — This Act shall be known as the “Cybercrime Prevention Act of 2012″. SEC. 2. Declaration of Policy. — The State recognizes the vital role of information and communications industries such as content production, telecommunications, broadcasting electronic commerce, and data processing, in the nation’s overall social and economic development. The State also recognizes the importance of providing an environment conducive to the development, acceleration, and rational application and exploitation of information and communications technology (ICT) to attain free, easy, and intelligible access to exchange and/or delivery of information; and the need to protect and safeguard the integrity of computer, computer and communications systems, networks, and databases, and the confidentiality, integrity, and availability of information and data stored therein, from all forms of misuse, abuse, and illegal access by making punishable under the law such conduct or conducts. In this light, the State shall adopt sufficient powers...
Words: 5454 - Pages: 22
...[ Republic Act No. 10175 ] AN ACT DEFINING CYBERCRIME, PROVIDING FOR THE PREVENTION, INVESTIGATION, SUPPRESSION AND THE IMPOSITION OF PENALTIES THEREFOR AND FOR OTHER PURPOSES Be it enacted by the Senate and House of Representatives of the Philippines in Congress assembled: CHAPTER I PRELIMINARY PROVISIONS SECTION 1. Title. — This Act shall be known as the “Cybercrime Prevention Act of 2012″. SEC. 2. Declaration of Policy. — The State recognizes the vital role of information and communications industries such as content production, telecommunications, broadcasting electronic commerce, and data processing, in the nation’s overall social and economic development. The State also recognizes the importance of providing an environment conducive to the development, acceleration, and rational application and exploitation of information and communications technology (ICT) to attain free, easy, and intelligible access to exchange and/or delivery of information; and the need to protect and safeguard the integrity of computer, computer and communications systems, networks, and databases, and the confidentiality, integrity, and availability of information and data stored therein, from all forms of misuse, abuse, and illegal access by making punishable under the law such conduct or conducts. In this light, the State shall adopt sufficient powers to effectively prevent and combat such offenses by facilitating their detection, investigation, and prosecution at both the domestic and international...
Words: 4460 - Pages: 18
...last thirty years there have been dramatic advances in information technology - the development of the microprocessor, the rise of the personal computer, the emergence of the Internet - which have revolutionised the way information is created, stored, shared, and used. Today, powerful, affordable and diverse devices, together with expanding broadband networks, create a powerful opportunity for connectivity for individuals and communities. Over the past two decades, rapid advances in software, IT services, and communications have enabled many traditionally separate and disparate infrastructures and business operations to become more connected. Through this connectivity virtually every aspect of society has experienced a transformation. Businesses and governments have been able to manage and streamline their operations. Individuals have been offered ready access to multiple sources of information thereby expanding knowledge and choice. Across every field of endeavour – commercial, social, scientific and philanthropic – the power of information has been increased and the transaction costs of engagement have been lowered. Our broad reliance on software, services, and communications, along with the benefits they offer, has naturally attracted the malevolent interest of terrorists, criminals, and other sophisticated attackers. To address this threat requires unprecedented cooperation and constant effective action by technology vendors, governments, businesses, and consumers. Drawing...
Words: 13936 - Pages: 56
...Information Technology Name American Intercontinental University Information Technology (IT) and its effects Information Technology can be described as the use of computers and telecommunication devices in organizations for storage, retrieval and sending of data and information. In the past two decades, advancements in technology have been through the internet and the use of the World Wide Web, among other IT innovation such as advancement in computers. The IT innovations are important as they have assisted organizations in processing and storing as well as exchanging appropriate information for decision making and competitive advantages. In the field of business, potential customers use the internet and World Wide Web to look for company information, and product news since companies started to use internet to advertise their products. Through the Internet, business information is present across the globe and the Web has two main advantages. The first is that it offers convenience where people can communicate and complete transaction from different locations. The second advantage is that it provides information. There is a lot of information concerning companies, their products, as well as competitors and the information is also of high quality, and readily available. The main innovation of IT advancements is that the world has become a global village with easy access and exchange of information. But on the other hand, some individuals and organizations have used...
Words: 885 - Pages: 4
...Common Information Security Threats for Colleges CMGT/400 August 11, 2014 Common Information Security Threats Technologic advances occur at a rapid pace, with new devices coming out at frequent intervals. These new devices are appealing to college students who want to do everything as quickly and easily as possible. Because of the numerous smartphones, tablets, and laptops used by students and employees, college campuses face various security issues from mobile devices that connect to the network, often unintentionally. Identification of Threats There are many threats a network faces when the IT department allows students to connect to the network or Internet using mobile devices. Some threats affect the campus network only, while other threats directly affect students or employees. For the campus network, threats include Social media vulnerabilities, Unauthorized access to employee or student information, and Email attacks (phishing) For students, the main threat comes from identity theft, often a result of inappropriate practices connected to social media and email attacks. Often, attacks to a college network occur because of unintentional and misguided errors from students. Information Vulnerabilities Students use mobile devices, ranging from smartphones to tablets to laptops, to access class schedules, grades, email, and social network sites. Many devices have the capability to store user ID’s and passwords but personal security measures...
Words: 1428 - Pages: 6
...Introduction Cybercrime targets both government and private industries with various methods and motives behind them. Those various attack methods can make a significant damage ranging from an individual identity theft based scale to national scale concerning its security as a sovereign nation. In other words, cybercrime equally brings serious concerns for both private industries and government. Also, private industries have an interchangeable relationship with government agencies as client to provide services. Most of utilities-related critical infrastructure systems in every city are mostly managed by private organizations. As we are more depending on technological management of such critical infrastructure and centralization of such system throughout the network, cybercrime targeting those critical infrastructures can have detrimental effects for both private and government sectors. There has been a steady increase in numbers of cybercrime with its benefits over the traditional crime in the past decades. Cyber criminals are getting smarter and equipped with more resources with every passing days and are becoming bigger threats. Therefore, it is important to scrutinize those cybercrime-related issues as well as to delve into planning a well-thought out countermeasure for both private and government sectors in various aspects for betterment of safer society of the information era. In this paper, Part I addresses how government intervention justifies telling private industry...
Words: 3978 - Pages: 16
...15,218 Type of incidents: 14,000 • • • • • • • • 12,000 10,000 8,000 As at 31st August 2013 Fraud and scams Intrusion and web defacement Destruction Denial-of-Service Virus / Malware Harassment Content-related Intrusion attempts 9,986 7753 8,090 6,000 3,566 4,000 2,123 2,000 81 196 1997 1998 527 347 1999 2000 860 625 2001 2002 1,372 912 915 754 2003 2004 2005 1,038 2006 2007 2008 2009 2010 Number of cyber security incidents referred to CyberSecurity Malaysia (excluding spams) Copyright © 2013 CyberSecurity Malaysia 2011 2012 2013 HIGH LEVEL USAGE = HIGH RISK 1.6 RM The cybercrime situation in Malaysia Billion lost to scams in...
Words: 1957 - Pages: 8
...Russian Patriotic Hacking During Operation Allied Force Introduction. With the increasing number of cyberattacks, many security professionals are greatly troubled by the real threat to the information technology infrastructure in the United States. While safeguarding information has been a major issue for the private and public sectors since the beginning of the computer era, the increased level of concern over the most recent attacks has resulted in devoting more resources to combat this threat. This paper analyzes numerous cyberattacks by Russian computer enthusiast group Chaos Hackers Crew and other hacktivists during Operation Allied Force in 1999, that included taking down and defacing various NATO and US Government websites, several successful virus propagation attempts on military servers and countless spamming storms. This particular case raises curious questions about the legal definition of term cyberconflict itself, magnitude of the damage from a potential cyberattack on U.S. Government by terrorists and the level of preparedness of key military and intelligence units for the cyberwar. The cyberterrorism threat is real, however it’s essential to recognize that preserving the state of continuous distress over computer vulnerabilities can be profitable. Based on this research, cultural differences play a huge role in the world of computer hackers who decide what entity to attack and how, also the scale of a cyberattack doesn’t matter as economic damage can be devastating...
Words: 8586 - Pages: 35
...crimes essay THE INFORMATION TECHNOLOGY ACT AMENDMENT OF 2008 Cyber law, in a general sense, has been envisaged as a term that encapsulates the legal issues related to the use of communicative, transactional, and distributive aspects of networked information devices and technologies. And the crimes against these issues are termed as cyber crime Cyber law and cyber crime Cyber crime spans not only state and national boundaries, but the international boundaries as well. At the Tenth United Nations Congress on the Prevention of Crime and Treatment of Offenders, in a workshop devoted to the issues of crimes related to computer networks, cybercrime was broken into two categories and defined thus: * In a narrow sense, the term cyber crime has been defined as any illegal behavior directed by means of electronic operations that target the security of computer systems and the data processed by them. * In the broader sense, cyber crime has been defined as any illegal behavior committed by means of, or in relation to, a computer system or network, including such crimes as illegal possession [and] offering or distributing information by means of a computer system or network. The extent of cyber crime is so vast and complicated that an act which may be crime in one nation may not be so in another. Some of the basic examples of cyber crime are unauthorized access, damage to computer data and program, computer sabotage, unauthorized interception of communications, computer espionage...
Words: 5688 - Pages: 23
...How Technology is Changing Accounting Accounting 525 Melissa Holland-Mitchell December 20, 2014 Professor Jones K. Kasonso Computer technology is always changing, so fast that many companies will simply update their current computer system continuously. Technology and the computer are a part of our lives; it helps managers make decisions to improve business operations, allows for faster transfer of information, and is simply a basic necessity to do business in many professions including accounting. There are technological trends that will have a tremendous impact on the accounting profession: cyber security, cloud, mobile devices, and big data. The Cloud and mobile technology available today is transforming the job of the tax and accounting professionals (Proformative.com, 2012). Where technology used to be behind the scenes at the office, its use is increasingly extended beyond internal use and out to the client. Mobile accountants work remotely between 5.8 to 8.6 hours per week. By 2015 the number of mobile workers is in North America and Latin America is to exceed 212 million (Proformative.com, 2012). More accountants are using smart phones for work; mobile access allows firms to connect with clients outside of regular business hours, and other locations. Smartphone’s are quickly being adopted by the accounting professional, many still think of the Smartphone as just a mobile phone with additional features such as texting and music player. However with the...
Words: 2332 - Pages: 10
...IT ETHICS AND LEADERSHIP Term 3, Academic Year 2014-2015 by LORETO V. SIBAYAN PAUL MATTHEW G. AVILA Master of Science in Information Technology College of Computer Studies April 2014 TABLE OF CONTENTS ABSTRACT 5 CHAPTER 1 1.0 INTRODUCTION 6 CHAPTER 2 2.0 OVERVIEW OF LITERATURE 8 2.1 CYBERCRIME 9 2.2 THEORIES OF CRIME 2.2.1 CRIMINOLOGICAL THEORIES 10 2.2.2 PSYCHOLOGICAL THEORIES 12 2.3 TYPES OF CRIME 14 2.3 CAUSES CYBERCRIME 19 2.4 CYBERCRIME PREVENTION 22 CHAPTER 3 3.0 ANALYSIS CYBERCRIME CASES 26 SUMMARY OF CYBERCRIME CASES 38 CONCLUSION AND RECOMMENDATION 43 REFERENCES 44 ABSTRACT The 21st century has brought about certain influences in the lives of everyone including the way we do business transactions, the way we gain education and the way we communicate; these influences are mostly revolutionized through the use of modern day technology and though these technologies have been proven to be beneficial to the entire society, it also carries with it aspects that can be worrying for everyone. Certain professionals in the said field use their expertise to illegally develop ways on how to take advantage of others with of course the use of technology hence cybercrime. This study aims to provide an overview of the said topic and depict real life incidents with major companies and also discuss ways...
Words: 7997 - Pages: 32
...Ethics in Cyberspace: Have We Seen This Movie Before? DR. THOMAS DONALDSON Monday, February 5, 2001 Wilder Pavilion, Adamian Academic Center Bentley College Waltham, Massachusetts Presenters Njeru Salesio Kinyua: Nduati Paul Njaaga: Toroitich Patrick Kiplimo: Lemuel Mangla: Bryan Egessa: 046485 015118 049063 090716 090524 Introduction Dr. Donaldson begins by stating that his topic, ethics in cyberspace, should be approached with considerable humility. Internet has dramatically affected our lives while frustrating our attempts to understand it and therefore we should be mindful that in the past, great intellects have been undone by the appearance of new phenomena. He gives an example of Adam Smith’s where he devoted only one paragraph to the topic of the emerging phenomenon of the business corporation. He did so because he believed corporations were never going to amount to much. Professor Smith was profoundly wrong. Dr. Donaldson says he may be profoundly wrong also as he ventures into cyberspace to untangle its ethical implications. “In my attempt I am most concerned to separate the old from the new, that is, to discern which value changes we're encountering are really old stuff, like a movie we've seen before but with a different cast, and what is fundamentally new. “ An answer to this question should help us, in turn, to discover how, if at all, the internet promises to change our values and what ethical controversies...
Words: 3009 - Pages: 13