Intipan Siber: Jenayah Baru dalam Masyarakat Kontemporari [Cyber Types: New Crime in a Contemporary Society]
DOI:
https://doi.org/10.37231/jimk.2015.11.3.134Abstract
Innovation and technological advancement nowadays had produced several web-based products. These include social networking sites (SNS) which are dominating Internet usage among consumers. Although the site is able to connect friendship without limits and become a very effective means of communication in cyberspace, the negative impact should not be under-estimated. This article concludes that the use of social networking sites gives the risk of the crime of cyber stalking. An analysis on the legislative framework in Malaysia in relation to the crime shows that there is lacuna in legal provisions pertaining to the issue.
Keywords: social networking sites, cyber stalking, crimes, Malaysian law
Inovasi dan kemajuan teknologi masa kini telah menghasilkan beberapa produk berasaskan web. Antaranya ialah laman rangkaian sosial yang sedang mendominasi penggunaan Internet dalam kalangan pengguna. Walaupun laman ini mampu menghubungkan persahabatan tanpa batasan dan merupakan alat komunikasi di dunia maya yang sangat efektif, kesan negatifnya juga tidak boleh dipandang ringan. Artikel ini membincangkan penggunaan laman rangkaian sosial dan risiko terhadap jenayah intipan siber (cyber stalking). Selain itu, bagaimana jenayah intipan siber berlaku turut dibincangkan. Akhir sekali kerangka perundangan di Malaysia berkaitan jenayah intipan siber diutarakan bagi menilai sama ada ia sudah memadai dalam menangani jenayah ini.
Kata kunci: Laman rangkaian sosial, intipan siber, jenayah, undang-undang Malaysia.
References
Bocij, P. (2002). “Corporate cyberstalking: An invitation to build theory.†dalam First Monday. Jilid 7 Bil 11. http://firstmonday.org/ojs/index.php/fm/article/view/1002/923 (27 Julai 2015).
CyberSecurity Malaysia. (2015). Selasa 2 Jun. Siaran akhbar: Cybersecurity Malaysia sebuah agensi teknikal keselamatan siber bantu organisasi penguatkuasa undang-undang di Malaysia, h.1-3
http://www.cybersecurity.my/data/content_files/44/1493.pdf?.diff=1422844505 (27 Julai 2015).
“Cyberstalking: A new challenge for law enforcement and industry: A report from the attorney general to the vice president.†New York: US Department of Justice. http://www.cyber-rights.org/documents/cyberstalkingreport.htm (26 Februari 2012).
“Cyberstalking legal definition.†Webster’s New World Law Dictionary. http://law.your dictionary.com/cyberstalking (22 Februari 2012).
Ding, J. (1999). E-Commerce: Law & Practice. Malaysia: Sweet & Maxwell Asia.
eBizMBA Guide. (2014). Top 15 most popular social networking sites April 2014. http://www.ebizmba.com/articles/social-networking-websites (27 Julai 2015).
Ellison, L & Akdeniz, Y. (1998). “Cyber-Stalking: The regulation of harassment on the Internet.†dalam Criminal Law Review. December Special Edition: Crime, Criminal Justice and the Internet. h. 29-48.
Harvey, D. (2012). “Cyberstalking and Internet harassment: What the law can do.†http://www.netsafe.org.nz/Doc_Library/netsafepapers_davidharvey_cyberstalking.pdf (25 Februari 2012).
Jerat Internet (2009). Khamis 26 November. Harian Metro, www.cybersecurity.my/en/knowledge_bank/news/2009/main/detail/1810/index.html (22 Februari 2012).
Kamus Dewan Edisi Keempat. (2007). Kuala Lumpur: Dewan Bahasa dan Pustaka.
Khairunnisa Sulaiman. (2010). Khamis 7 Januari. Kaedah canggih kesan jenayah. Utusan Online,
http://ww1.utusan.com.my/utusan/info.asp?y=2010&dt=0107&pub=utusan_malaysia&sec=Sains_%26_Teknologi&pg=st_01.htm&arc=hive (27 Julai 2015).
Manitoba Justice Victim Services. “Stalking is a crimeâ€. www.gov.mb.ca/justice/domestic/pdf/stalkingweb.pdf (26 Februari 2012).
Megat Ishak. (2010). The impact of social networking. h. 50-54. http://woulibrary.wou.edu.my/weko/eed502/The_Impact_of_Social_Networking.pdf (27 Julai 2015).
Miller, C. (2006). Cyber stalking & bullying – What law enforcement needs to know. dalam Law Enforcement Technology. Jilid 33 Bil 4, h. 1-6.
Ogilvie, E. (2010). “Stalking: Policing & prosecuting practices in three Australian jurisdictionsâ€. dalam Trends & Issues in Crime & Criminal Justice. No 76, h. 1-6.
Paulett, K.L., Rota, D.R. and Swan, T.T. (2009). Cyberstalking: An exploratory study of students at a Mid-Atlantic University. dalam Issues in Information Systems. Jilid X No 2, h. 640-649.
Rosen, C. (2007). “Virtual Friendship and New Narcissism.†dalam The New Atlantis: A Journal of Technology & Society. Summer 2007. h. 15-31.
Social Networking Watch. (2010). “Malaysia the Most SN Active Country.†http://www.socialnetworkingwatch.com/2010/04/malaysia-the-most-sn-active-country.htm (22 Februari 2012).
Social Networking Web Sites. (2006). http://drcoop.pbworks.com/f/Social%20Networking%20Web%20Sites.pdf (26 Februari 2012).
Stalking and domestic violence report to Congress. (2001). New York: U.S Department of Justice. https://www.ncjrs.gov/pdffiles1/ojp/186157.pdf (22 Februari 2012).
Syahrir Mat Ali & Fatin Hasnan. (2012). Kesan aplikasi rangkaian sosial terhadap pengguna Internet. www.cybersecurity.my/data/content_files/13/615.pdf (22 Februari 2012).
Zainal Abidin Safarwan (1995). Kamus Besar Bahasa Melayu Utusan. Kuala Lumpur: Utusan Publication & Distributors Sdn. Bhd.
Zaiton Hamim. (2004). “The legal response to computer misuse in Malaysia: The Computer Crimes Act 1997â€. dalam UiTM Law Review. Jilid 2, h 210-234.
Downloads
Published
Issue
Section
License
Submission of an article implies that the work described has not been published previously (except in the form of an abstract or as part of a published lecture or academic thesis), that it is not under consideration for publication elsewhere, that its publication is approved by all authors and tacitly or explicitly by the responsible authorities where the work was carried out, and that, if accepted, will not be published elsewhere in the same form, in English or in any other language, without the written consent of the Publisher. The Editors reserve the right to edit or otherwise alter all contributions, but authors will receive proofs for approval before publication.
Copyrights for articles published in JIMK journals are retained by the authors, with first publication rights granted to the journal. The journal/publisher is not responsible for subsequent uses of the work. It is the author's responsibility to bring an infringement action if so desired by the author.