Cybercrime: The Morality of Social Networking and Beyond

26
Running head: CYBERCRIME 1 Cybercrime: The Morality of Social Networking and Beyond Ngiam Ai Leng Alicia (SCSJ0007980) Lasheena Kujalan (SCSJ0004257) Shavinka Devi A/P Christopher Sithambaram (SCSJ0015810) Kwan Pooi Leng (SCSJ0014158) Peranath Chandran (SCSJ0014294) MPW2153: Moral Studies SEGi College Subang Jaya Ms Nadia Introduction

Transcript of Cybercrime: The Morality of Social Networking and Beyond

Running head: CYBERCRIME 1

Cybercrime: The Morality of Social Networking and Beyond

Ngiam Ai Leng Alicia (SCSJ0007980)

Lasheena Kujalan (SCSJ0004257)

Shavinka Devi A/P Christopher Sithambaram (SCSJ0015810)

Kwan Pooi Leng (SCSJ0014158)

Peranath Chandran (SCSJ0014294)

MPW2153: Moral Studies

SEGi College Subang Jaya

Ms Nadia

Introduction

CYBERCRIME: SOCIAL NETWORKING AND BEYOND

The social media has greatly impacted the definition of

communication; it has as much influenced society in several areas. Such

areas of influence shall be defined as (Lievrouw & Livingston, 2002)

social, cultural, political, and even financial. Nevertheless, the morality of

actions and messages transmitted through the digital world is often

questioned. For instance, When it comes to the legal issues of catching a

partner red-handed—in the act there are cut-off points to attempting to—

cross legal boundaries and fight for your rights. According to Gruber

(2009), if the messages retrieved from a spouse is stored in a device that

is equally accessible by both parters, then the complaint may or may not

violate wiretapping laws. However, if that is not the case, then the

complaint will be heading towards direct accusation; (Gruber, 2009) one is

subject to criminal and civil penalties for retrieval through access of his

or her partner s online account. This is so because in committing the’crime, whether unintentionally or out of pure suspicion, the suspecting

spouse has intruded the privacy of the partner. In Malaysia, there exists

the Digital Forensics Department (DFD) that enables the nation to track

down (Talib, 2013) identity theft. Section 232 of the Communications

Multimedia Act 1998 imposes a penalty of nearly RM300, 000, three years’imprisonment, or both (Talib, 2013) in cases whereby communication and

multimedia services are registered with ill-intentions. The prupose of this

paper is for a clearer understanding of the morality of cybercrime

transmitted through social networking.

Keywords: social networking, cybercrime, morality

2

CYBERCRIME: SOCIAL NETWORKING AND BEYOND

False Information on the Internet

Undoubtedly, there is a multitudinous load of information

from people all around the world that can be obtained through

computer. People share information and post their thoughts and

ideas over the internet in variety of ways, including Facebook,

Myspace, Twitter, forum and blog. Meanwhile, people receive

information through the same way. However, frankly speaking,

the degree of truth of information on the Internet is crucial

to be discerned—because false information could have a great

impact on us and our morality.

In order to win the attention of others, to meet the

"self-realization" psychological requirements, there are people

who exchange the main drift, use grandstanding, and even ignore

the moral that pollute network information. For instance, many

have shared their own feelings, thoughts, opinions, and even

false reports regarding the MH370 incident that happened

recently. Certainly, as citizens of our country, it is

justifiable for us to be concerned about things that happen in

our country. However, if we use false information to attract

others’ attention, this is definitely far beyond the

righteousness of morality. In fact, the freedom of information

3

CYBERCRIME: SOCIAL NETWORKING AND BEYOND

on Internet has allowed every individual to express completely

anything that comes across their minds without realizing or

taking the responsibility of the consequences.

As a result, people who are deeply rely on Internet

information are easily distorted and corrupted by all this

false information. They are lacking of the awareness of

discerning the true and false, especially our young generation,

who are the major victims of this. For example, my cousin who

is only ten years old told firmly me that she is going to have

plastic surgery once she grows up. According to the

information that she obtained from the internet, beauty is

essentially important to a female. She believes that a girl

who is not good looking is

not worthy to be loved by others. With this in mind, she

claims that she will not make friends with those she considers

are not beautiful. Although I have tried my best to explain

the truth to her, the information she obtained from the

Internet seemed to be deeply rooted in her. It is because she

is young and lacks of the ability to discern the right and

4

CYBERCRIME: SOCIAL NETWORKING AND BEYOND

wrong information on Internet. Indeed, I believe that we

desperately need to create awareness in today’s society, about

the trueness of the information on internet. In addition, it

is necessary to establish rules and limits in sharing

information through internet which is compatible the morality.

Sexting

According to Harney (2012) sexting is the act of sending

explicit messages, primarily between mobile phones or online

posts. The term was first popularized in the early 21st century

and is a meaning of sex and texting where the letter is meant

in the wide sense of sending a text possibly with images,

videos, or obscene and vulgar words. In the month of August

2012, for the first time in Merriam-Webster’s Collegiate

Dictionary, the word sexting was listed. Sexting has been

described as taking place in the United States, United Kingdom,

Canada and Australia.

It is disappointing to know that many images end up

widely circulated or posted online , especially when

relationships end. The law calls these images ‘child abuse

material’ or child pornography. Child abuse material can

5

CYBERCRIME: SOCIAL NETWORKING AND BEYOND

include (Anonymous) films, photos, digital images and videos

sent by SMS, email, in chat rooms or published on blogs. It

can even include pictures that have been photo-shopped to make

a young person look naked, or cartoons of young people having

sex. The maximum penalty for making, sending or having child

abuse material is 15 years in prison.

New South Wales child pornography laws only apply to

images of young people under the age of 16, but the

Commonwealth laws are broader. These laws even apply to images

of young people who look like they are under the age of 18.

Anyone who sends, receives or even asks for a naked or sexual

image of a person who is or appears to be under the age of 18

is at risk of committing a crime and of being charged.

Research from the UK has shown that while young people are

increasingly savvy at protecting themselves from so called

‘stranger danger’ they are having to face a new problem of

‘peer to peer’ approaches with boys (in particular) constantly

6

CYBERCRIME: SOCIAL NETWORKING AND BEYOND

demanding sexual images. Sexting from peers worries young

people more than stranger danger.

There can also be serious legal consequences of sexting

for young people (2011) it is against the law to create,

transmit or possess a sexual image of a minor. Some young

people are therefore committing a crime through their actions,

perhaps without knowing. There have even been cases

(particularly in the US) of young people being prosecuted for

such activities. Talking about sexting and relationship,

sexting is a result of advances in technology enabling new

forms of social interaction. Messages with sexual content can

be exchanged from phones, emails, or social media website.

Sexting also occurs online on social media websites for the

public to view. Newer technology allows sending pictures, and

videos, which are intrinsically more explicit and have greater

impact, without the involvement of photo printing personnel, or

the need of a photo processing dark room at home (just like

using an instant camera, but even easier and less expensive).

Sexting as a phenomenon (Harvey, 2012) began primarily through

the extensive use of text messaging by young people; in fact,

7

CYBERCRIME: SOCIAL NETWORKING AND BEYOND

young adults use the medium of the text message much more than

any other new media to transmit messages of a sexual nature.

Furthermore, text messaging use is related to sexting

behaviours or attitude. For example, those who send any type

of messages were more likely that they received a sexually

suggestive images or videos on their mobile gadgets. About 54%

of a study sample had sent sexually explicit pictures or videos

to their partners at least once, and 1/3 of their sample had

engaged in such activities occasionally, according to Maffly

(2012), showing that sexting is actually quite prevalent in

today's modern society. In the year 2013, it was found that

sexting is often used to enhance the relationship and sexual

satisfaction in a romantic partnership. According to Verna

Larsen (2012), "Once you put it out there, it's out there. You

do not have any control over it anymore."

Sexting thus can be considered a "behaviour that ties into

sexuality and the subsequent level of relationship satisfaction

experienced by both partners". Based on the interviews

conducted by Albury and Crawford, they discovered that sexting

8

CYBERCRIME: SOCIAL NETWORKING AND BEYOND

is commonly used in positive aspects. According to Albury and

Crawford, sexting was not only an activity occurring in the

context of flirtation or sexual relationships, but also between

friends, as a joke or during a moment of bonding.” The study

had a small sample size, so more research needs to be done

surrounding sexting and motivation (Maffly, 2012), but it is

clear that sexting is a phenomenon that is not constrained to

simply unattached individuals looking for fun; it is used by

those in intimate relationships to increase feelings of

intimacy and closeness one's partner. Thus, instead of

increasing intimacy in these types of relationships, sexting

acts as a buffer for physical intimacy.

Social Networking

As technology became more universal and people are

becoming more keen to know new things that is happening around

them, sometimes they do not think about the consequences

that they are about to face because people tend to be ignorant

and naïve as well. Here the negative issues about social

networking shall be discussed. Normally people get into social

9

CYBERCRIME: SOCIAL NETWORKING AND BEYOND

networks to meet new people, make new friends, share stories,

and learn new cultures and way of life from different people

around the world. Unfortunately, some take advantage of this

situation, causing negative impacts on social networkers.

Firstly, when you are active in your social networking, you

tend to share a lot of things with your social buddies. We

share such information as pictures, videos, music, and most of

all we share our views about issues happening around us such

as what you did for the day, what kind of people you met, how

bad was your day at work, and many more. This may seem to be

normal but unfortunately, some people perceive things in a very

different way and some values could be contradicting towards

the others, especially when your colleague comes across an

offensive status that you post on Facebook about your boss.

The chances of you losing your job is high.

On the other hand, cyber stalking, which means the

repetitive usage of electronic devices to go online and harass

someone is another matter to handle. For instance, there are

many ways which an individual seeks out and stalk others even

though they do not come from the same country. In doing do,

they may project emotional, physical, and psychological

10

CYBERCRIME: SOCIAL NETWORKING AND BEYOND

consequences to the victim. As for a case that happened in

Washington, United States, a 12-year-old girl was sentenced to

probation for cyber-stalking her classmate’s Facebook account

and posting elicit sexual content. Riparbelli (2011) stated in

the headlines that:“The 12-year-old, who pleaded guilty and

whose name has not been released, was charged with

Cyberstalking and Computer Trespass First Degree. She was

sentenced to six months of probation and 20 hours of community

service, along with mandatory adult supervision of all computer

usage, according to the King County Prosecuting Attorney's

Office.”

A decrease in productivity is yet another negative impact.

Most people nowadays get carried away too fast, especially when

they are busy meeting new people, sharing new things and

chatting with people in social network such as Facebook or

Twitter especially on working hours. Such actions are not

considered productive at all. The time that a person should

spend on meeting new clients in the real world and creating

brand awareness to the society is all being wasted by killing

quality time doing something that is not so beneficial to the

11

CYBERCRIME: SOCIAL NETWORKING AND BEYOND

company. Orrill (2014) cited a research study indicating that

“companies whose networks provided Facebook access experienced

a 1.5 percent drop in employee productivity. Peter Cohan

followed up on the study in a February 2012 piece for

Forbes.com, using statistics on Facebook's growth during the

interim to calculate that Facebook use within the workplace

could lead to a 9.4 percent productivity decrease in companies

throughout the U.S., a drop that could collectively cost

businesses as much as 1.4 trillion dollars.”

Although it is nice to meet new people especially when you

are going through a bad break-up or some people tend to be very

friendly, tending to add people around (people who they know

and may not know), which is a very concerning situation indeed.

The problem begins when people, especially teenagers and

students, tend to share too much of information in their social

profiles and unfortunately they are too ignorant to privatize

their profile, opening an advantage point for strangers to use

your profile information and photos to create a fake profile—

defined (Dr. Phil, n. d.) as catfishing.

Social media addiction, a danger which is getting quite

out of hand when people cannot stop posting things on Facebook,

12

CYBERCRIME: SOCIAL NETWORKING AND BEYOND

having prolonged conversations about selfies in Instagram and

twitting non-stop. These are all symptoms of social media

addiction. There is even a term Facebook Addiction Disorder.

As crazy as it sounds, Bicchierai (2012) claims that

just the simple motivation of receiving and answering a

notification triggers the dopamine levels, a neurochemical,

which when is released from the brain, gives the same feeling

as when someone consumes drugs or is having sex. In certain

countries in Asia, “internet addiction disorder” is accepted as

a psychological diagnosis.

Cyber Threats and Cyber Security

Cyber threat may affect everyone, internally or externally

through the internet. The people from modern culture are very

reliant to technology such as computers and internet because it

provides essential information and services. Internet has

become a tool for communication among people and between

government and citizens (CACI, 2011). Over 10,000 cases of cyber

threat have been reported for each month until certain time

period, based on Malaysian cybersecurity (Thamby, 2014).

Furthermore, President of the United State, Mr. Barack Obama has

13

CYBERCRIME: SOCIAL NETWORKING AND BEYOND

pointed out in one of his statement that they face economy and

national security challenges due to cyber threat in their country

(Protalinski, 2012). Cyber threat is a spiteful intention to

destroy or interrupt the cyberspace system (U.S Dictionary).

It includes a various kind of unkind or vicious activity that

could happen via the Internet (Hayden, 2013).

There are few types of cyber threats. Phishing is one of

the common cyber threats. Phishing is a scam where people

receive emails that may look genuine from official websites,

which the recipient might be keeping in touch with such as

PayPal, Yahoo and MSN. These websites are actually being

tricked by some phisher. A culprit would send messages to

certain recipients to gain personal information (“SECURE

LIST”). Spear phishing, similar to phishing, is an email sent

to the recipient from the hackers, pretending to be business

organizations or a person that the recipient might know. The

hacker’s intention is to get

14

CYBERCRIME: SOCIAL NETWORKING AND BEYOND

personal information such as bank account number, PINs and

credit cards (Symantec, 2013).

Furthermore, malicious code is also a cyber-threat. It is

a program that could destroy the computer and system. It can

come in many types such as viruses, worms and Trojan horses.

Virus is a programme that tends to duplicate itself, hides in

another programme and even spread to another cyberspace.

Besides that, it can scrap information from other computer

system. Worms is a code that multiplies itself. Trojan horses

are other types of programs which release a dangerous system

which can erase the entire data of the computer when a computer

user downloads and opens up any files that contains music or

movies (Brain & Fenlon, n. d.).

There a lot of reasons why cyber threat or cybercrime

occurs. Wrinkle, NCSA’S director of technology (2013), stated

that computer hackers tend to force into systems and commit

crime because of the lack of supervision by their parents.

Parents do not condition their children and educate their

children that intruding into computer system is immoral. Thus

these children learn computer hacking through internet such as

blogs and chat line. Hacker’s ethics are developed to be

15

CYBERCRIME: SOCIAL NETWORKING AND BEYOND

concern of one’s self in demonstrating accurate reason for

their particular actions. Furthermore, according hacker’s

morality, company which has poor security system is more

vulnerable to threats and cost might incur to investigate the

intrusion of a system in a company.

Hackers also feel it is alright to punish other industries

and people that they dislike and which this maybe disgraceful

for certain people. Others, stated it is totally acceptable to

cheat on people’s money and properties, if it is beneficial to

the hacker himself/herself (Wrinkler, 2013). Cyber threat

brings impact to individuals, private sectors, government and

international scales (CACI, 2011). Threats like phishing can

make one’s life miserable. As a result of this scam, one can

lose their life savings, fall on debts, and lose belongings and

transportations. In U.S, 3.6 million adults were cheated over

3.2 billion within a year (Cawley, 2010). Moreover, people

whom were a victim of the identity theft, like phishing, may go

through trauma and may face difficulties to get rid of the

trauma (LLCODE, n. d.).

16

CYBERCRIME: SOCIAL NETWORKING AND BEYOND

Malicious codes such as virus cost a huge amount of losses

when they affect industries. Viruses by the name of ILOVEYOU

affect companies, governments, and private sectors. This

system has the capability of erasing almost all the information

that was stored. Besides that, it is able to gain entry into

chat rooms using the user’s address. It is able to travel

everywhere around the world within an hour; the impairment of

this code could cost around fifteen million dollars

(Anonymous).

A lot of intelligence organizations such as M15, M16 the

UK intelligence, held hands together with other government

sectors and industry to sort out the cyber threats (SSM15,

2014). According to Rouse (2010), cyber security emphasizes on

safeguarding the computer, networks, data and other programmes

from any unknown party accessing, damaging or causing an

attack. Cyber security is much important because there is a

need in protecting very confidential information that is being

stored, collected and transferred from one network to the other

via computers by certain government departments, hospital,

colleges and other businesses. Besides that, it is also useful

to protect the national security.

17

CYBERCRIME: SOCIAL NETWORKING AND BEYOND

Cybersex

Cybersex poses an issue in technoculture (Green, 2002) that is

proliferating throughout the 21st century as technology becomes

increasingly accessible to a larger number of people. The easiness of

having a relationship over the Internet, i. e. a cyber-affair “ ”

(TanimoonwaFasugba-Idowu & Hassan, 2013) is attacking (Gruber &“ ”Hedrick, 2001) the glory of marriages. Not only that, such encounters

produce ill-effects in the society spanning across three different yet inter-

connected aspects. As long as there exists any instances of erotic chat“ ”(TanimoonwoFasugba-Idowu & Hassan, 2013), regardless of whether it is a

one-time or continuouus event, these activities are nevertheless classified

as forms of cybersex.

Cybersex that occurs between a man and a woman who are already

in a relationhip is by all means harmless as their sole intention is to

maintain the relationship depite the fact that they are geographically

distances apart. This is a proof that falsifies the perceptions people have

that as long as there is no physical sex, the two individuals (Gruber &

Hedrick, 2001) are not having an affair. Ronquillo (2008) clearly states

that cybersex, or cs, as he terms it, is in reality a sexual encounter in

itself. The activities can take on several forms; according to Ben-Ziev

(2004), there are four kinds of relationships that can possibly stem from

cybersex: (i) one-to-one or group communication, (ii) interacting with real

or fantasy people, (iii) engaging with either anonymous or identified

people, and (iv) communicating in synchronized or asynchronized formats.

18

CYBERCRIME: SOCIAL NETWORKING AND BEYOND

According to TanimoonwoFasugba-Idowu and Hassan (2013), the three

main aspects that are deeply affected fall into the social, moral, and

religious dimensions. In the social dimension, the very first breakdown

accurs between the individual involved in the activity and the other

individual he or she is having sexual and emotional contact with. In fact,

it is a main cause of separation and divorce in the family unit; one of

the reasons is that such ill activities creates a higher expectations in

sexual activities, so obvious that partners in their actual real-life

relationships are able to notice the difference. In some cases, individuals

who become extremely obsessed with the images, audio, and videos

transmitted through the high-

speed digital communication that they require psychotherapy. After all, it

is classified as voyeurism if the participants become aroused by watching

others perform sexual acts. In the process, their views and perceptions

and wants of sex becomes painfully distorted.

In the moral dimensions, on the other hand, while different

communities have dissimilar standpoints to the morality of cybersex, the

idea is nevertheless clear: Cybersex leads to lies, deception, and

corruption. Families are torn apart due to the damages inflicted by social

and economical environments. Partners will have to deal with the

resources thatwill be put to huge waste; reversal, though not impossible,

creates a large hole in the ecnomic budgets of society.

The religious dimensions has Siddiqi (2004) asserting that zina, the

Islamic term for sex outside marriage, can be either pre-marital, extra-

marital, or even homosexual. It has been clearly stated that

(TanimoonwoFasugba-Idowu & Hassan, 2013) such activities are considered

sinful as it results in the participant(s) lust for things that lead to

19

CYBERCRIME: SOCIAL NETWORKING AND BEYOND

adultery. A similar view is found in the Bible; (Tanimoonwo-Fasugba-

Idowu & Hassan, 2013) such online activities are outlawed.

Conclusion

Cybersex is a form of voyeurism in that participants prefer watching

others perform sex acts in orer to become sexually aroused themselves.

The entire morality of social networking through digital communication

revolves around the costs and benefits that have been weighed

equivalently. Obsession with the Internet can result in drastic

consequences, affecting the participants and their environment in several

ways in fact, rather whole-roundedly. It first influences the thoughts and—then the behavior and actions so much so that the individual becomes a

social ill.

References

Anonymous. (2011). Cyber threats to national security. In CACI.

Retrieved from

http://asymmetricthreat.net/docs/asymmetric_threat_5_paper.pdf.

Anonymous. (n. d.). Computer viruses and how they affect businesses.

Retrieved from

http://atlas.kennesaw.edu/~alancast/computervirus.htm.

Anonymous. (n. d.) NSPCC Weston House. Retrieved from

http://www.childline.org.uk/explore/onlinesafety/pages/sexting.aspx.

Anonymous. (n. d.). Cyber Smart-Cyber Issues. In Commonwealth of

Australia 2014.

20

CYBERCRIME: SOCIAL NETWORKING AND BEYOND

Retrieved from

http://www.cybersmart.gov.au/Parents/Cyber%20issues/Sexting.aspx.

Anonymous. (n. d.). The moral behind every identity theft stories. In

LLCODE.COM:lifelock code:preventing identity theft. Retrieved from

http://llcode.com/index.php.

Auburn, K. B. NY. Sexting: Know the Facts. Retrieved from

http://www.teenink.com/opinion/pop_culture_trends/article/131108/Sexti

ng-Know-the-

Facts/.

Biccchierai, F. L. (2012, November 3). How is Facebook Addiction

Affecting Our Minds?

Mashable. Retrieved from http://mashable.com/2012/11/03/facebook-

addiction/.

Brain, M. & Fenlon, W. (n. d.). How computer viruses work. In How

stuff works.

Retrieved from http://computer.howstuffworks.com/virus.htm.

Cawley, C. (2010, April 3). The critical effects of phishing scams. In

Bright hub. Retrieved

from

http://www.brighthub.com/computing/smb-security/articles/64476.aspx.

Dr. Phil. (n. d.). Online dating red flags: warning signs of a catfish.

In Dr. Phil. Retrieved

from http://www.drphil.com/articles/article/720.

Gercke, Prof. Dr. M. (2012, September). 1. Introduction. In

Understanding cybercrime:

phenomena, challenges, and legal response. Retrieved from

www.itu.int/ITU-D/cyb/cybersecurity/docs/Cybercrime

legislationEV6.pdf.

21

CYBERCRIME: SOCIAL NETWORKING AND BEYOND

Gruber, M. (2009, December 1). Cybersex and divorce, wiretapping and

interseption of your

spouse s electronic communication. In the Lee P. A. S.’Foundation. Retrieved from

theleepasfoundation.org/modules/article/view.article.php?204.

Howerton, J. (2013, June 7). Another leaked document reveals Obama

ordered U.S. to draft

potential target list for cyber-attacks. In The Blaze. Retrieved from

http://www.theblaze.com/stories/2013/06/07/another-leaked-document-

reveals-obama-

ordered-u-s-to-draft-potential-target-list-for-cyber-attacks/.

Maffly, B. (2012, June 18). Sexting prevalents among high-schoolers,

study finds. (2012).

Retrieved from http://www.sltrib.com/sltrib/news/54324965-78/explicit-

messages-nearly-

onlinetoday.html.csp.

National ICT Security and Emergency Response Center (NISER). (n. d.).

Is cybercrime

reigning on no man s land. Retrieved from ’ www.cybersecurity.my/data/content_files/13/134.pdf.

Norton Symantec. (n. d.). Spear phishing: scam, not sport. In Norton.

Retrieved from

http://us.norton.com/spear-phishing-scam-not-sport/article.

Orrill, J. (2014). Loss of Productivity Due to Facebook. In Azcentral.

Retrieved from

http://yourbusiness.azcentral.com/loss-productivity-due-facebook-

5468.html#.

22

CYBERCRIME: SOCIAL NETWORKING AND BEYOND

Protalinski, E. (2012, July 21). Obama: cyber attack serious threat to

economy, national

security. In Zd net. Retrieved from

http://www.zdnet.com/obama-cyber-attack-serious-

threat-to-economy-national-security-7000001324/.

Riparbelli, L. (2011, July 14). 12-Year-Old Sentenced for Cyberstalking

Classmate.

abcNEWS. Retrieved from

http://abcnews.go.com/Technology/12-year-sentenced-

washington-cyberstalking-case/story?id=14072315.

Rouse, M. (n. d.). What is cybersecurity. Definition from WhatIs.com.

Retrieved from

http://whatis.techtarget.com/definition/cybersecurity.

Siddiqi, M. (2004). Cybersex and zina. In fatwa management system.

Retrieved from

www.einfod.my/FMS_en/index.php?

option=com_fatwa&task=viewlink&link_id=

793*Itemid=59.

Staff. (n. d.). How is M15 tackling the cyber threat. In M15 security

service. Retrieved

from https://www.mi5.gov.uk/home/the-threats/cyber/how-is-mi5-

tackling-the-cyber-

threat.html.

Starr, L. (2011). Tools for teaching cyber ethics. In Education world.

Retrieved from

www.educationworld.com/a_tech/tech/tech055.shtml.

Talib, M. Z. A. (2013). Identity fraud: platform for cybercrime. In

Cyber Security

Malaysia. Retrieved from

23

CYBERCRIME: SOCIAL NETWORKING AND BEYOND

www.ilkap.gov.my/nlc2013/download/Nota/D2PlenarySession2.pdf.

Thamby, K. T. (2014, June 12). Staying ahead of cyber threats. In

Business circle.

Retrieved from http://www.businesscircle.com.my/staying-ahead-of-

cyber-threats/.

Wrinkler, I. (n. d.). Why hackers do the things they do. Retrieved

from

http://dl.packetstormsecurity.net/docs/hack/ethics/why.hackers.do.the.thi

ngs.they.do.html.

Journals:

Campbell, M. A. (2005). Cyberbullying: An Old Problem in a New

Guise. Australian

Journal of Guidance and Counseling, 15 (1) , pp. 68-76. Retrieved from

http://eprints.qut.edu.au/1925/1/1925.pdf.

Gruber, M. & Hedrick, L. K. (2001). Cybersex and divorce: interception

of and access to e-

mail and other electronic communications in the marital home.

Journal of the american

academy of matrimonal lawyers. Retrieved from

http://www.aaml.org/sites/default/files/cybersex%20and%20divorce-17-

1.pdf.

24

CYBERCRIME: SOCIAL NETWORKING AND BEYOND

TanimoonwoFasugba-Idowu, G. & Hassan, S. A. (2013, July). Cybersex:

advantages and

disadvantages. Journal of humanities and social sciences, 14 (3), pp. 60 –

65. Retrieved

from

https://www.academia.edu/4815137/Cybersex_Advantages_And_Disadvantages

_1.

Books:

Green, L. (2002). Gender and power. Communication, techniology, and

society, pp. 180 –

181. SAGE publications. Retrieved from books.google.com.my/books?

id.

Herhalt, J. (2011, July). Cybercrime a growing challenge for –governments. Issue monitor,

8. Retrieved from

https://www.kpmg.com/Global/en/IssuesAndInsights/ArticlesPublications/

Documents

/cyber-crime.pdf.

Lievrouw, L. A. & Livingston, S. (2002). Handbook of new media:

social shaping and

consequences of ICTs (Google eBook). Retrieved from

http://books.google.com.my/books?hl=en&lr=&id=VwJ4xsYHboYC&oi=fnd

25

CYBERCRIME: SOCIAL NETWORKING AND BEYOND

&pg=PP1&dq=social+networking+ICT+boundaries&ots=bqvvssxn5E&sig=RnTyP

J

gpUX6XrjegHEWgqMHpibM#v=onepage&q=social%20networking%20ICT

%20

boundaries&f=false.

26