DOI QR코드

DOI QR Code

Clustering Keywords to Define Cybersecurity: An Analysis of Malaysian and ASEAN Countries' Cyber Laws

  • Received : 2022.11.02
  • Accepted : 2022.12.15
  • Published : 2022.12.31

Abstract

While the term is nothing new, 'cybersecurity' still seems to be defined quite loosely and subjectively depending on context. This is problematic especially to legal writers for prosecuting cybercrimes that do not fit a particular clause/act. In fact, what is more difficult is the non-existent single 'cybersecurity law' in Malaysia, rather than the current implementation of 10-related cyber security acts. In this paper, the 10 acts are compiled into a corpus to analyse the language used in these acts via a corpus linguistics approach. A list of frequent words is firstly investigated to see whether the so-called related laws do talk about cybersecurity followed by close inspection of the concordance lines and habitually associated phrases (clusters) to explore use of these words in context. The 'compare 2 wordlist' feature is used to identify similarities or differences between the 10 Malaysian cybersecurity related laws against a corpus of cyber laws from other ASEAN countries. Findings revealed that ASEAN cyber laws refer mostly to three cybersecurity dominant themes identified in the literature: technological solutions, events, and strategies, processes, and methods, whereas Malaysian cybersecurity-related laws revolved around themes like human engagement, and referent objects (of security). Although these so-called cyber related policies and laws in Malaysia are highlighted in the National Cyber Security Agency (NACSA), their practical applications to combat cybercrimes remain uncertain.

Keywords

Acknowledgement

This work was supported by the Ministry of Education, Malaysia under the Fundamental Research Grant Scheme for Research Acculturation of Early Career Researchers (FRGS-RACER) [grant number 600-IRMI/FRGS-RACER 5/3 (111/2019)].

References

  1. Adolphs, S., Brown, B., Carter, R., Crawford, P., & Sahota, O. (2004). Applying corpus linguistics in a health care context. Journal of Applied Linguistics, 1(1), 9-28. https://doi.org/10.1558/japl.v1i1.9
  2. Arowosaiye, Y. I. (2013). Evolution of Malaysian cyber laws and mechanism for secured online transactions. Pandecta Research Law Journal, 8(2), 117-126.
  3. Baker, P., Gabrielatos, C., & McEnery, T. (2013). Sketching Muslims: A corpus driven analysis of representations around the word 'Muslim' in the British press 1998-2009. Applied Linguistics, 34(3), 255-278. https://doi.org/10.1093/applin/ams048
  4. Banaji, S., Mejias, S., Kouts, R., Piedade, F., Pavlopoulos, V., Tzankova, I., Mackova, A., & Amna, E. (2018). Citizenship's tangled web: Associations, gaps and tensions in formulations of European youth active citizenship across disciplines. European Journal of Developmental Psychology, 15(3), 250-269. https://doi.org/10.1080/17405629.2017.1367278
  5. Biber, D., Reppen, R., & Friginal, E. (2010). Research in corpus linguistics. In Kaplan, R. B. (Ed.), The Oxford Handbook of Applied Linguistics (pp. 548-570). New York, NY: Oxford University Press.
  6. Brenner, S. W., (2010). Cybercrime: Criminal Threats from Cyberspace. Santa Barbara: Praeger.
  7. Craigen, D., Diakun-Thibault, N., & Purse, R. (2014). Defining cybersecurity. Technology Innovation Management Review, 4(10), 13-21. https://doi.org/10.22215/timreview835
  8. Flottum, K., Gjesdal, A. M., Gjerstad, O., Koteyko, N., & Salway, A. (2014). Representations of the future in English language blogs on climate change. Global Environmental Change, 29, 213-222. https://doi.org/10.1016/j.gloenvcha.2014.10.005
  9. Gabrielatos, C., & Baker, P. (2008). Fleeing, sneaking, flooding: A corpus analysis of discursive constructions of refugees and asylum seekers in the UK press, 1996-2005. Journal of English Linguistics, 36(1), 5-38. https://doi.org/10.1177/0075424207311247
  10. Ghasiya, P., & Okamura, K. (2022). A hybrid approach to analyze cybersecurity news articles by utilizing information extraction & sentiment analysis methods. International Journal of Semantic Computing, 16(01), 135-160. https://doi.org/10.1142/S1793351X22500015
  11. Hamin, Z. (2004). The legal response to computer misuse in Malaysia: The computer crimes act 1997. UiTM Law Review, 2, 210-234.
  12. Jaspal, R., & Nerlich, B. (2014). When climate science became climate politics: British media representations of climate change in 1988. Public Understanding of Science, 23(2), 122-141. https://doi.org/10.1177/0963662512440219
  13. Kim, D., & Park, J. (2019). Using keyword network analysis. Journal of Arts Psychotherapy, 15(1), 1-20. https://doi.org/10.32451/kjoaps.2019.15.1.001
  14. Koteyko, N. (2010). Mining the internet for linguistic and social data: An analysis of 'carbon compounds' in web feeds. Discourse & Society, 21(6), 655-674. https://doi.org/10.1177/0957926510381220
  15. Leech, G. (1991). The state of the art in corpus linguistics. In Ajimer, K., & Altenberg, B. (Eds.), English Corpus Linguistics (pp. 8-29). London: Longman.
  16. Mat, B., Pero, S., Wahid, R., & Sule, B. (2019). Cybersecurity and digital economy in Malaysia: Trusted law for customer and enterprise protection. International Journal of Innovative Technology and Exploring Engineering, 8(3), 214-220.
  17. McEnery, T., & Hardie, A. (2011). Corpus Linguistics: Method, Theory and Aractice. Cambridge University Press.
  18. Mohamed Mizan, N. S., Ma'arif, M. Y., Mohd Satar, N. S., & Shahar, S. M. (2019). CNDS-cybersecurity: issues and challenges in ASEAN countries. International Journal of Advanced Trends in Computer Science and Engineering, 8(1.4), 113-119. https://doi.org/10.30534/ijatcse/2019/1781.42019
  19. Reyes, A., Brittson, R., O'Shea, K., & Steele, J. (2011). The problem at hand. In Reyes, A., Brittson, R., O'Shea, K., & Steele, J. (Eds.), Cyber Crime Investigations: Bridging the Gaps between Security Professionals, Law Enforcement, and Prosecutors (pp. 1-22). Massachusetts: Elsevier.
  20. Schatz, D., Bashroush, R., & Wall, J. (2017). Towards a more representative definition of cyber security. Journal of Digital Forensics, Security and Law, 12(2), 52-74.
  21. Skovgaard, J. (2014). EU climate policy after the crisis. Environmental Politics, 23(1), 1-17. https://doi.org/10.1080/09644016.2013.818304
  22. Supayah, G., & Ibrahim, J. (2016). An overview of cyber security in Malaysia. Kuwait Chapter of Arabian Journal of Business and Management Review, 6(4), 12-20. https://doi.org/10.12816/0036698
  23. Zukarnain, Z. A., Hashim, M. Z., Muhammad, N., Mansor, F. A., & Azib, W. N. H. W. (2020). Impact of training on cybersecurity awareness. Gading Journal of Science and Technology, 3(01), 114-120.