Open Science Research Excellence

Open Science Index

Commenced in January 2007 Frequency: Monthly Edition: International Publications Count: 29296


Select areas to restrict search in scientific publication database:
5717
Managing Legal, Consumers and Commerce Risks in Phishing
Abstract:
Phishing scheme is a new emerged security issue of E-Commerce Crime in globalization. In this paper, the legal scaffold of Malaysia, United States and United Kingdom are analyzed and followed by discussion on critical issues that rose due to phishing activities. The result revealed that inadequacy of current legal framework is the main challenge to govern this epidemic. However, lack of awareness among consumers, crisis on merchant-s responsibility and lack of intrusion reports and incentive arrangement contributes to phishing proliferating. Prevention is always better than curb. By the end of this paper, some best practices for consumers and corporations are suggested.
Digital Object Identifier (DOI):

References:

[1] Sean B. Hoar, (2001). "Identity Theft: The Crime of the New Millennium", USA Bulletin, http://www.cybersafe.gov/criminal/cybercrime/usamarch2001_3.htm
[2] Anonymous, (2007). "Phishing - Nationmaster", http://www.nationmaster.com/encyclopedia/phishing
[3] U.S. Department of Justice, (2004). "Special Report on Phishing", http://www.usdoj.gov/criminal/fraud/docs/phishing.pdf
[4] MyCERT, (2006). "MS-111.112006: MyCert Quarterly Summary (Q3) 2005", http://www.mycert.org.my/
[5] MyCERT, (2005). "MS-093.072005: MyCert Quarterly Summary (Q2) 2005", http://www.mycert.org.my/
[6] Bob Sullivan, (2003). "Look-alike Email Scams on the Rise", http://www.msnbc.msn.com/id/3078451
[7] Laws of Malaysia, (2001). "Copyright Act 1987 - Act 332", http://www.msc.com.my/cyberlaws/act_copyright.asp
[8] Laws of Malaysia, (2002). "Copyright Crime Act 1997 - Act 563", http://www.msc.com.my/cyberlaws/act_computer.asp
[9] Laws of Malaysia, (2002). "Digital Signature Act 1997 - Act 562", http://www.msc.com.my/cyberlaws/act_digital.asp
[10] Laws of Malaysia, (2002). "Telemedicine Act 1997 - Act 564", http://www.msc.com.my/cyberlaws/act_telemedicine.asp
[11] Laws of Malaysia, (2002). "Communications and Multimedia Act 1998 - Act 588", http://www.msc.com.my/cyberlaws/act_communications.asp
[12] Laws of Malaysia, (2002). "Malaysian Communications and Multimedia Commission Act 1998 - Act 589", http://www.msc.com.my/cyberlaws/act_malaysiancomm.asp
[13] Lawyerman, (2005). "Law Dictionary - Fraud", http://www.lawyerment.com.my/scripts/dictionary/?id=362&pr=fraud
[14] Federal Trade Commission, (2004). "FTC v. Zachary Keith Hill", http://www.ftc.gov/os/caselist/0323102/040322info0323102.pdf
[15] United States Department of Justice, (2004). "Internet and Telemarketing Fraud", http://www.usdoj.gov/criminal/fraud/internet/
[16] Steptoe&Johnson, (2004). "Just What Copyright Law Needs", http://www.steptoe.com/publications-3149.html
[17] David McGuire, (2004). " Senate Bill Targets ÔÇÿPhishers- ", Washingtonpost, http://www.washingtonpost.com/wpdyn/ articles/A44826-2004Jul12.html
[18] Robert Louis, (2005). "Plugging the ÔÇÿPhishing- Hole: Legislation Versus Technology", http://www.law.duke.edu/journals/dltr/articles/2005dltr0006.html
[19] SecurityPark.net, (2005). "Fraud Law strengthened to counter phishing attacks", http://www.securitypark.co.uk/article.asp?articleid=23886&CategoryID =1
[20] House of Lords, (2005). "Fraud Bill
[HL]" , http://www.publications.parliament.uk/pa/ld200506/ldbills/007/2006007 .pdf
[21] H.Amir Khalid, (2004). "Cyber-crime: Business and the law on different pages", The Star, http://www.niser.org.my/news/2004_03_05_01.html
[22] Symantec Corporation, (2006). "What is the Phishing Report Network?", http://www.phishreport.net/
[23] Office of Public Sector Information, (1998). "Data Protection Act 1998", http://www.opsi.gov.uk/acts/acts1998/19980029.htm
[24] The Library of Congress, (2005). "Personal Data Privacy and Security Act of 2005", http://thomas.loc.gov/cgibin/ query/D?c109:44:./temp/~c109jCs5pz.
[25] Parlimen Malaysia, (1999). "Akta Perlindungan Pengguna 1999- Akta 599", http://www.parlimen.gov.my/pdf/a599.pdf
[26] Electronic Privacy Information Center, (2003). " Privacy and Human Rights 2003", http://www.privacyinternational.org/survey/phr2003/countries/malaysia. htm
[27] McAfee Inc, (2005). "Anti-Phishing-Best Practices for Institutions and Consumer", http://www.mcafee.com/us/local_content/white_papers/wp_antiphishing .pdf
Vol:13 No:02 2019Vol:13 No:01 2019
Vol:12 No:12 2018Vol:12 No:11 2018Vol:12 No:10 2018Vol:12 No:09 2018Vol:12 No:08 2018Vol:12 No:07 2018Vol:12 No:06 2018Vol:12 No:05 2018Vol:12 No:04 2018Vol:12 No:03 2018Vol:12 No:02 2018Vol:12 No:01 2018
Vol:11 No:12 2017Vol:11 No:11 2017Vol:11 No:10 2017Vol:11 No:09 2017Vol:11 No:08 2017Vol:11 No:07 2017Vol:11 No:06 2017Vol:11 No:05 2017Vol:11 No:04 2017Vol:11 No:03 2017Vol:11 No:02 2017Vol:11 No:01 2017
Vol:10 No:12 2016Vol:10 No:11 2016Vol:10 No:10 2016Vol:10 No:09 2016Vol:10 No:08 2016Vol:10 No:07 2016Vol:10 No:06 2016Vol:10 No:05 2016Vol:10 No:04 2016Vol:10 No:03 2016Vol:10 No:02 2016Vol:10 No:01 2016
Vol:9 No:12 2015Vol:9 No:11 2015Vol:9 No:10 2015Vol:9 No:09 2015Vol:9 No:08 2015Vol:9 No:07 2015Vol:9 No:06 2015Vol:9 No:05 2015Vol:9 No:04 2015Vol:9 No:03 2015Vol:9 No:02 2015Vol:9 No:01 2015
Vol:8 No:12 2014Vol:8 No:11 2014Vol:8 No:10 2014Vol:8 No:09 2014Vol:8 No:08 2014Vol:8 No:07 2014Vol:8 No:06 2014Vol:8 No:05 2014Vol:8 No:04 2014Vol:8 No:03 2014Vol:8 No:02 2014Vol:8 No:01 2014
Vol:7 No:12 2013Vol:7 No:11 2013Vol:7 No:10 2013Vol:7 No:09 2013Vol:7 No:08 2013Vol:7 No:07 2013Vol:7 No:06 2013Vol:7 No:05 2013Vol:7 No:04 2013Vol:7 No:03 2013Vol:7 No:02 2013Vol:7 No:01 2013
Vol:6 No:12 2012Vol:6 No:11 2012Vol:6 No:10 2012Vol:6 No:09 2012Vol:6 No:08 2012Vol:6 No:07 2012Vol:6 No:06 2012Vol:6 No:05 2012Vol:6 No:04 2012Vol:6 No:03 2012Vol:6 No:02 2012Vol:6 No:01 2012
Vol:5 No:12 2011Vol:5 No:11 2011Vol:5 No:10 2011Vol:5 No:09 2011Vol:5 No:08 2011Vol:5 No:07 2011Vol:5 No:06 2011Vol:5 No:05 2011Vol:5 No:04 2011Vol:5 No:03 2011Vol:5 No:02 2011Vol:5 No:01 2011
Vol:4 No:12 2010Vol:4 No:11 2010Vol:4 No:10 2010Vol:4 No:09 2010Vol:4 No:08 2010Vol:4 No:07 2010Vol:4 No:06 2010Vol:4 No:05 2010Vol:4 No:04 2010Vol:4 No:03 2010Vol:4 No:02 2010Vol:4 No:01 2010
Vol:3 No:12 2009Vol:3 No:11 2009Vol:3 No:10 2009Vol:3 No:09 2009Vol:3 No:08 2009Vol:3 No:07 2009Vol:3 No:06 2009Vol:3 No:05 2009Vol:3 No:04 2009Vol:3 No:03 2009Vol:3 No:02 2009Vol:3 No:01 2009
Vol:2 No:12 2008Vol:2 No:11 2008Vol:2 No:10 2008Vol:2 No:09 2008Vol:2 No:08 2008Vol:2 No:07 2008Vol:2 No:06 2008Vol:2 No:05 2008Vol:2 No:04 2008Vol:2 No:03 2008Vol:2 No:02 2008Vol:2 No:01 2008
Vol:1 No:12 2007Vol:1 No:11 2007Vol:1 No:10 2007Vol:1 No:09 2007Vol:1 No:08 2007Vol:1 No:07 2007Vol:1 No:06 2007Vol:1 No:05 2007Vol:1 No:04 2007Vol:1 No:03 2007Vol:1 No:02 2007Vol:1 No:01 2007