Cybercrime Threat Landscape amid the Movement Control Order in Malaysia
The COVID-19 pandemic has evolved rapidly and affected almost all the world's countries, creating unprecedented chaos on human lives, physical health, mental wellbeing, and the world economy. During this time, digital space has become an indispensable global means of communication, entertainment, and social interaction. However, high reliance on digital tools increases the risk of being prey to cyberattacks. In order to explore the cybercrime threat landscape, empirical research was conducted to examine the shared experiences related to cybercrime threats during the enforcement of the Movement Control Order in Malaysia. Data was collected using an online survey among 332 respondents across Malaysia. The finding stipulated that most of the respondents comprised females aged between 18 and 28 years old. The result also indicated that majority of female became victims of online phishing/malware distribution [(M = 0.58, SD = 0.13); t (113) = 2.24, p = 0.02] and online sexual harassment [(M = 0.56, SD = 0.11); t (107) = 2.38, p = 0.01]. The understanding of cybercrime experiences faced by the public during MCO is essential to help law enforcement agencies to stay vigilant on issues related to public safety and security during unprecedented conditions.
Abbas, H., Mahmoodzahed, M. Q., Aslam Khan, F., & Pasha, M. (2014). Identifying an OpenID Anti-Phishing Scheme for Cyberspace. Security and Communication Networks, 9, 481-491. https://doi.org/10.1002/sec.1027
Abbasi, A., Zhang, Z., Zimbra, D., & Chen, H. (2010). Detecting Fake Websites: The Contribution of Statistical Learning Theory. MIS Quarterly, 34(3), 435-461. https://doi.org/10.2307/25750686
Allodi, L. (2017). Economic Factors of Vulnerability Trade and Exploitation: Empirical Evidence from a Prominent Russian Cybercrime Market. Springer International Publishing. https://doi.org/10.1145/3133956.3133960
Anastasi, A., & Urbina. S. (1997). Psychological Testing (7th ed). Upper Saddle River, NJ: Prentice Hall.
Arfi, N., & Agarwal, S. (2013). Knowledge of Cybercrime among Elderly. International Journal of Scientific and Engineering Research, 4(7), 1463.
Bateman, P. J., Pike, J. C., & Butler, B. S. (2011). To Disclose or Not: Publicness in Social Networking Sites. Information Technology & People, 24, 78-100. https://doi.org/10.1108/09593841111109431
Baumgartner, S. E., Valkenburg, P. M., & Peter, J. (2010). Unwanted Online Sexual Solicitation and Risky Sexual of a Phishing Attack. Journal of Computer-Mediated Communication, 20, 570-584.
Boss, S. R., Galletta, D. F., Lowry, P. B., Moody, G. D., & Polak, P. (2015). What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear That Motivate Protective Security Behaviours. MIS Quarterly, 39(4), 837-864. https://doi.org/10.25300/MISQ/2015/39.4.5
Business Today. (2020). KPMG: Hackers Exploiting Global Uncertainty during COVID-19 Pandemic. https://www.businesstoday.com.my/2020/04/22/kpmg-hackers-exploiting-global-uncertainty-during-covid-19-pandemic/
Button, M., Nicholls, C. M., Kerr, J., & Owen, R. (2014). Online Frauds: Learning from Victims Why They Fall for These Scams. Australian and New Zealand Journal of Criminology, 47(3), 391-408. https://doi.org/10.1177/0004865814521224
Cohen, L. E., & Felson, M. (1979). Social Change and Crime Rate Trends: A Routine Activity Approach. American Sociological Review, 44(4), 588-608. https://doi.org/10.2307/2094589
Coyne, M. (2020). Crime Rates Across U.S. Drop Amid the Coronavirus Pandemic. https://www.forbes.com/sites/marleycoyne/2020/04/11/crime-rates-across-us-drop-amid-the.
European Union Agency for Law Enforcement Cooperation. (EUROPOL) (2019). IOCTA. Internet Organized Crime Threat Assessment. The Hague, The Netherlands: European Union Agency for Law Enforcement Cooperation. https://www.europol.europa.eu/iocta-report https://doi.org/10.1016/S1361-3723(19)30114-9
European Union Agency for Law Enforcement Cooperation. (EUROPOL) (2020). Pandemic Profiteering: How Criminals Exploit the COVID-19 Cri¬sis. The Hague, The Netherlands: European Union Agency for Law Enforcement Cooperation. https://www.europol.europa.eu/publications-documents/pandemic-profiteering-how-criminals-exploit-covid-19-crisis
Federal Commercial Crime Investigation Department. (2020). Jabatan Siasatan Jenayah Komersil. https://www.rmp.gov.my/infor-korporate/jabatan---jabatan/jabatan-siasatan-jenayah-komersil
Ferreira, A., Coventry, L., & Lenzini, G. (2015). Principles of Persuasion in Social Engineering and Their Use in Phishing. Springer International Publishing. https://doi.org/10.1007/978-3-319-20376-8_4
Fredrickson, B. L., & Branigan, C. (2005). Positive Emotions Broaden the Scope of Attention and Thought-Action Repertoires. Cognition and Emotion, 19(3), 313-332. https://doi.org/10.1080/02699930441000238
Futter, A. (2016). Is Trident Safe from Cyber Attack? https://www.europeanleadershipnetwork.org/wp-content/uploads/2017/10/Is-Trident-safe-from-cyber-attack-1.pdf
Gradon, K. (2020). Crime in the Time of the Plague: Fake News Pandemic and the Challenges to Law-Enforcement and Intelligence Community. Society Register, 4(2), 133-148. https://doi.org/10.14746/sr.2020.4.2.10
Henson, B., Reyns, B. W., & Fisher, B. S. (2013). Does Gender Matter in the Virtual World? Examining the Effect of Gender on the Link between Online Social Network Activity, Security, and Interpersonal Victimization. Security Journal, 26(4), 315-330. https://doi.org/10.1057/sj.2013.21
Holt, T. J., & Bossler, A. M. (2008). Examining the Applicability of Lifestyle-Routine Activities Theory for Cybercrime Victimization. Deviant Behaviour, 30(1), 1-25. https://doi.org/10.1080/01639620701876577
Holtfreter, K., & Meyers, T. J. (2015). Challenges for Cybercrime Theory, Research, and Policy. Behavioural Emerging Situations, 105-155. In G. C. Lajeunesse (Ed.), The Norwich Review of International and Transnational Crime (pp. 54-65). Norwich University: NUARI.
Interpol. (2020). COVID-19 Crime: INTERPOL Issues New Guidelines for Law Enforcement. https://www.interpol.int/en/News-and-Events/News/2020/COVID-19-crime-INTERPOL-issues-new-guidelines-for-law-enforcement
Jain, S. & Agrawal, S. (2020). Perceived Vulnerability of Cyberbullying on Social Networking Sites: Effects of Security Measures, Addiction and Self-Disclosure. Indian Growth and Development Review, 14(2), 149-171. https://doi.org/10.1108/IGDR-10-2019-0110
Jayabalan, P., Ibrahim, R., & Abdul Manaf, A. (2014). Understanding Cybercrime in Malaysia: An Overview. Sains Humanika, 2(2), 109-115.
Jensen, M. L., Dinger, M., Wright, R. T., & Thatcher, J. B. (2017). Training to Mitigate Phishing Attacks Using Mindfulness Techniques. Journal of Management Information Systems, 34(2), 597-626. https://doi.org/10.1080/07421222.2017.1334499
Jiloha, R. (2020). Internet Abuse: A Newer Form of Sexual Harassment. Journal of Advanced Research in Psychology and Psychotherapy, 3(1), 13-18. https://doi.org/10.24321/2581.5822.202003
Kaur, M. (2020). Online Gambling "Rampant" Since MCO Began. Free Malaysia Today. https://www.freemalaysiatoday.com/category/nation/2020/04/06/online-gambling-rampant-since-mco-began/
Lopes, P. N, Salovey, P., & Straus, R. (2003). Emotional Intelligence, Personality, and the Perceived Quality of Social Relationships. Personality and Individual Differences, 35(3), 641-658. https://doi.org/10.1016/S0191-8869(02)00242-8
Lynn, M. R. (1986). Determination and Quantification of Content Validity. Nursing Research, 35(6), 382-386. https://doi.org/10.1097/00006199-198611000-00017
Tee, K. (2020, April 6). IGP Vows Crackdown on Rampant Cigarette Smuggling, Online Gambling During MCO. Malay Mail. https://www.malaymail.com/news/malaysia/2020/04/06/igp-vows-crackdown-on-rampant-cigarette-smuggling-online-gambling-during-mc/1854103
Malaysian National Cyber Security Agency. (2020). MyCERT - The Malaysian Computer Emergency Response Team. https://www.cybersecurity.my/en/our_services/mycert/main/detail/2328/index.html
Maras, M. H. (2016). Cyber Criminology. New York: Oxford University Press.
Marchum, C. D., Ricketts, M. L., & Higgins, G. E. (2010). Assessing Sex Experiences of Online Victimization: An Examination of Adolescent Online Behaviours Using Routine Activity Theory. Criminal Justice Review, 35, 412-437. https://doi.org/10.1177/0734016809360331
Masuwai, A., Mohd Tajudin, N., & Shah. N. S. (2016). Evaluating the Face and Content Validity of a Teaching Guiding Principles Instrument (TLGPI): A Perspective Study of Malaysian Teacher Educators. Malaysian Journal of Society and Space, 12(3), 11-21.
Naidoo, R. (2020). A Multi-Level Influence Model of COVID-19 Themed Cybercrime. European Journal of Information Systems, 29(3), 306-321. https://doi.org/10.1080/0960085X.2020.1771222
Nguyen, T. V. (2020). Cybercrime in Vietnam: An Analysis on Routine Activity Theory. International Journal of Cyber Criminology, 14(1), 156-173.
Norris, G., Brookes, A. & Dowell, D. (2019). The Psychology of Internet Fraud Victimisation: A Systematic Review. Journal of Police and Criminal Psychology, 19(34), 231-245. https://doi.org/10.1007/s11896-019-09334-5
Norton Cybercrime Report. (2010). Norton's Cybercrime Report: The Human Impact Reveals Global Cybercrime Epidemic and Our Hidden Hypocrisy. https://community.norton.com/en/blogs/symantec-cyber-education/norton%E2%80%99s-cybercrime-report-human-impact-reveals-global-cybercrime
Oluwatayo. J. A. (2012). Validity and Reliability Issues in Educational Research. Journal of Educational and Social Research, 2(2), 391-400.
Police Act. (1967). Laws of Malaysia: Online Version of Updated Text of Print (Act 344). chrome-extension://efaidnbmnnnibpcajpcglclefindmkaj/viewer.html?pdfurl=https%3A%2F%2Fwww.ilo.org%2Fdyn%2Fnatlex%2Fdocs%2FELECTRONIC%2F103083%2F124971%2FF1234758774%2FMYS103083.pdf&clen=483809
Prevention and Control of Infectious Disease Act. (1988). The Prevention and Control of Infectious Diseases (Measure Within the Infected Local Areas) Regulation 2020 - Containing the COVID-19 Outbreak in Malaysia. https://www.christopherleeong.com/media/3887/clo_2020_03_the-prevention-and-control-of-infectious-diseases.pdf
Reich, P. C., & Gelbstein, E. (2012). Law, Policy and Technology: Cyberterrorism, Information Warfare and Internet Immobilisation. USA: Hershey. https://doi.org/10.4018/978-1-61520-831-9
Reja, U., Manfreda, K. L., Hlebec, V., & Vehovar, V. (2003). Open-Ended VS Closed-Ended Questions in Web Questionnaires. Development Application Statistic, 19, 159-177.
Roberts, J. A., & Manolis, C. (2012). Cooking up a Recipe for Self-Control: The Three Ingredients of Self-Control and its Impact on Impulse Buying. Journal of Marketing Theory and Practice, 20(2), 173-188. https://doi.org/10.2753/MTP1069-6679200204
Ronchi, E., & Kinsey, M. (2011). Evacuation Models of the Future: Insights from an Online Survey on User's Experiences and Needs. In J. Capote & D. Alvear (Eds.), Proceedings of the Advanced Research Workshop: "Evacuation and Human Behaviour in Emergency Situations" (pp. 145-155). Universidad de Cantabria.
Sangoseni, O., Hellman, M., & Hill, C. (2013). Development and Validation of a Questionnaire to Assess the Effect of Online Learning on Behaviours, Attitudes, and Clinical Practices of Physical Therapists in the United States Regarding Evidence-Based Clinical Practice. The Internet Journal of Allied Health Sciences and Practice, 11(2), 113. https://doi.org/10.46743/1540-580X/2013.1439
Segal, S. (2020). Breaking Down the G20 COVID-19 Fiscal Response. Centre for Strategies and International Studies (CSIS). https://www.csis.org/analysis/breaking-down-g20-covid-19-fiscal-response
Stickle, B. & Felson, M. (2020). Crime Rates in a Pandemic: The Largest Criminological Experiment in History. American Journal of Criminal Justice, 45, 525-536. https://doi.org/10.1007/s12103-020-09546-0
Sun, J. C. (2016). The Mediating Effect of Anti-Phishing Self-Efficacy between College: Internet Self-Efficacy and Anti-Phishing Behavior and Gender. Computers in Human Behaviour, 59, 12-14. https://doi.org/10.1016/j.chb.2016.02.004
Symantec. (2018). We Stop Threats Hiding in Plain Sight. https://securitycloud.symantec.com/cc/#/landing
Van Wilsem, J. (2013). Bought It but Never Got It: Assessing Risk Factors for Online Consumer Fraud Victimization. European Sociological Review, 29(2), 168-178. https://doi.org/10.1093/esr/jcr053
Vishwanath, A. (2015). Examining the Distinct Antecedents of E-Mail Habits and its Influence on the Outcome. Journal of Computer-Mediated Communication, 20(5), 570-584. https://doi.org/10.1111/jcc4.12126
World Economic Forum. (2019). The Cybersecurity Guide for Leaders in Today's Digital World. https://www3.weforum.org/docs/WEF_Cybersecurity_Guide_for_Leaders.pdf
Ybarra, M. L., Mitchell, K. J., & Finkelhor, D. (2007). Internet Prevention Messages: Targeting the Right Online Behaviors. Arch Paediatric Adolescent Medicine, 161, 138-45. https://doi.org/10.1001/archpedi.161.2.138D
Copyright (c) 2021 N.K. Tharshini
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Copyright Transfer Statement for Journal
1) In signing this statement, the author(s) grant UNIMAS Publisher an exclusive license to publish their original research papers. The author(s) also grant UNIMAS Publisher permission to reproduce, recreate, translate, extract or summarize, and to distribute and display in any forms, formats, and media. The author(s) can reuse their papers in their future printed work without first requiring permission from UNIMAS Publisher, provided that the author(s) acknowledge and reference publication in the Journal.
2) For open access articles, the author(s) agree that their articles published under UNIMAS Publisher are distributed under the terms of the CC-BY-NC-SA (Creative Commons Attribution-Non Commercial-Share Alike 4.0 International License) which permits unrestricted use, distribution, and reproduction in any medium, for non-commercial purposes, provided the original work of the author(s) is properly cited.
3) For subscription articles, the author(s) agree that UNIMAS Publisher holds copyright, or an exclusive license to publish. Readers or users may view, download, print, and copy the content, for academic purposes, subject to the following conditions of use: (a) any reuse of materials is subject to permission from UNIMAS Publisher; (b) archived materials may only be used for academic research; (c) archived materials may not be used for commercial purposes, which include but not limited to monetary compensation by means of sale, resale, license, transfer of copyright, loan, etc.; and (d) archived materials may not be re-published in any part, either in print or online.
4) The author(s) is/are responsible to ensure his or her or their submitted work is original and does not infringe any existing copyright, trademark, patent, statutory right, or propriety right of others. Corresponding author(s) has (have) obtained permission from all co-authors prior to submission to the journal. Upon submission of the manuscript, the author(s) agree that no similar work has been or will be submitted or published elsewhere in any language. If submitted manuscript includes materials from others, the authors have obtained the permission from the copyright owners.
5) In signing this statement, the author(s) declare(s) that the researches in which they have conducted are in compliance with the current laws of the respective country and UNIMAS Journal Publication Ethics Policy. Any experimentation or research involving human or the use of animal samples must obtain approval from Human or Animal Ethics Committee in their respective institutions. The author(s) agree and understand that UNIMAS Publisher is not responsible for any compensational claims or failure caused by the author(s) in fulfilling the above-mentioned requirements. The author(s) must accept the responsibility for releasing their materials upon request by Chief Editor or UNIMAS Publisher.
6) The author(s) should have participated sufficiently in the work and ensured the appropriateness of the content of the article. The author(s) should also agree that he or she has no commercial attachments (e.g. patent or license arrangement, equity interest, consultancies, etc.) that might pose any conflict of interest with the submitted manuscript. The author(s) also agree to make any relevant materials and data available upon request by the editor or UNIMAS Publisher.