Development in technology has created many opportunities for the Muslims to explore and acquire knowledge. Some Muslims are conscious when using the technology while some others are behaving inappropriately. The later groups are those who commit unlawful act which sometimes across the boundaries. These offences may cause harm not only to individuals but the country as a whole. Among the offences that have affected the society include internet fraud, internet pornography, unauthorised access to others computer data, internet defamation, cyber terrorism and many others. The Government of Malaysia has made several efforts to curb these activities from spreading. One of them is by introducing cyberlaws in addition to the existing laws of Penal ...
Cyber crimes are committed regardless of boundaries. The crimes continue to threaten public security...
The Kingdom of Saudi Arabia (KSA) is in danger of falling behind other nations in combatting cybercr...
An examination of the nature of cyber attacks (meaning attacks on computer systems and the disruptio...
Development in technology has created many opportunities for the Muslims to explore and acquire know...
Development in information communication technology (ICT) has created new ways for everyone to inter...
The paper presents a comparative study between the existing cyber laws in Malaysia and the Islamic p...
The Islamic world has populated cyberspace and opened up websites propagating Islamic rhetoric and i...
This research aims to uncover how Islamic criminal acts towards social media crimes. This study also...
The purpose of this research is to study cyber crime in e-commerce transactions from the perspective...
Cybercrimes are computer-related crimes that are difficult to find out through computer ethics. They...
This project focuses on the laws governing cyber terrorism in Malaysia. Currently, cyber terrorism i...
Good ethics and professionalism when using computer or Internet should be strictly observed and ex...
Rapid growths of computers, mobile phones and Internet technology have created ways for irresponsib...
The threat of terrorism is exacerbated by technology. It leads to a new term called Cyberterrorism. ...
Cyberbullying and doxing are problems that are closely related to one of the effects of social media...
Cyber crimes are committed regardless of boundaries. The crimes continue to threaten public security...
The Kingdom of Saudi Arabia (KSA) is in danger of falling behind other nations in combatting cybercr...
An examination of the nature of cyber attacks (meaning attacks on computer systems and the disruptio...
Development in technology has created many opportunities for the Muslims to explore and acquire know...
Development in information communication technology (ICT) has created new ways for everyone to inter...
The paper presents a comparative study between the existing cyber laws in Malaysia and the Islamic p...
The Islamic world has populated cyberspace and opened up websites propagating Islamic rhetoric and i...
This research aims to uncover how Islamic criminal acts towards social media crimes. This study also...
The purpose of this research is to study cyber crime in e-commerce transactions from the perspective...
Cybercrimes are computer-related crimes that are difficult to find out through computer ethics. They...
This project focuses on the laws governing cyber terrorism in Malaysia. Currently, cyber terrorism i...
Good ethics and professionalism when using computer or Internet should be strictly observed and ex...
Rapid growths of computers, mobile phones and Internet technology have created ways for irresponsib...
The threat of terrorism is exacerbated by technology. It leads to a new term called Cyberterrorism. ...
Cyberbullying and doxing are problems that are closely related to one of the effects of social media...
Cyber crimes are committed regardless of boundaries. The crimes continue to threaten public security...
The Kingdom of Saudi Arabia (KSA) is in danger of falling behind other nations in combatting cybercr...
An examination of the nature of cyber attacks (meaning attacks on computer systems and the disruptio...