UPSI Digital Repository (UDRep)
|
|
|
Abstract : Universiti Pendidikan Sultan Idris |
In the last decade, virtual attacks in the form of cyber espionage has become more and more rampant. The commission of such crime is through state and non-state backed actors against government websites, public and private networks, individuals and also economic giants. Cyber espionage is seen as a developing crime due to the unlimited connectivity of these cybercriminals to cyberspace which translates it as a visible threat to national security. The risk of cyber espionage is more prevalent and viable as the cyberspace environment facilitates anonymity. The predominant theories adopted to understand cyber espionage is the Risk Society Theory (RST) and the Cyber-Securitisation Theory (CST). However, on their own, these two theories are deficient in that RST relies on the risks and insecurities that come with modernisation, and CST only focuses on the transformation of a domain into a matter of national security. Given these problems, this paper aims at examining each model and expanding and integrating the RST and CST, which would mitigate the understanding of cyber espionage and modalities to prevent such crime. This paper employs a qualitative methodology, with primary data derived from semi-structured interviews with appropriate respondents. The data is triangulated using specialists from two different ministries. Secondary data sources include applicable cyber law, the Penal Code, books, academic publications, online databases, and library-based sources. The findings suggest that focusing on securitisation alone will not be effective in governing such crime, instead, understanding the risks and how to manage and mitigate such risks would be more effective. The integration of both theories would be significant to stakeholders especially government entities that focused on cybersecurity and also endorses the concept of individual responsibility for corporate entities and computer users in protecting themselves against such crime. ? 2021 IEEE. |
References |
Ahmad, A. (2016). A Cyber Exercise Post Assessment Framework.Malaysia Perspectives, Retrieved from www.scopus.com Atlam, H. F., Alenezi, A., Alassafi, M. O., Alshdadi, A. A., & Wills, G. B. (2019). Security, cybercrime and digital forensics for IOT doi:10.1007/978-3-030-33596-0_22 Retrieved from www.scopus.com Banks, W. (2014). Cyber espionage, surveillance, and international law: Finding common ground. SSRN Electronic Journal, Retrieved from www.scopus.com Barnes, I. A. (2018). Implementation of Active Cyber Defense Measures by Private Entities: The Need for an International Accord to Address Disputes, Retrieved from www.scopus.com Beck, U. (2020). Risk society. Essential concepts of global environmental governance (pp. 219-221) Retrieved from www.scopus.com Bederna, Z., & Szadeczky, T. (2019). Cyber espionage through botnets. Security Journal, , 1-20. Retrieved from www.scopus.com Caravelli, J. (2019). The geopolitics of cyber and cyber espionage. Cyber Security: Threats and Responses for Government and Business, 43 Retrieved from www.scopus.com Chesterman, S. (2006). The spy who came in from the cold war: Intelligence and international law. Michigan Journal of International Law, 27(1071), 1071-1130. Retrieved from www.scopus.com Christou, G. (2019). The collective securitisation of cyberspace in the european union. West European Politics, 42(2), 278-301. doi:10.1080/01402382.2018.1510195 Claessen, E. (2020). Reshaping the internet – the impact of the securitisation of internet infrastructure on approaches to internet governance: The case of russia and the EU. Journal of Cyber Policy, 5(1), 140-157. Retrieved from www.scopus.com Claessen, E. (2020). Reshaping the internet – the impact of the securitisation of internet infrastructure on approaches to internet governance: The case of russia and the EU. Journal of Cyber Policy, 5(1), 140-157. Retrieved from www.scopus.com de Amorim, W. S., & de Andrade Guerra, J. B. S. O. (2020). Pandemics, global risks and adaptation: Challenges for a changing world. Research in Globalization, 2 doi:10.1016/j.resglo.2020.100023 Deibert, R. J. (2009). Cyber-security and threat politics: US efforts to secure the information age. International Studies Review, 11(2), 373-375. Retrieved from www.scopus.com Dhanapal, S., & Sabaruddin, J. S. (2017). Prevention of terrorism: An initial exploration of malaysia's POTA 2015. Pertanika Journal of Social Sciences and Humanities, 25(2), 783-804. Retrieved from www.scopus.com Dixit, P., & Silakari, S. (2021). Deep learning algorithms for cybersecurity applications: A technological and status review. Computer Science Review, 39 doi:10.1016/j.cosrev.2020.100317 Dunn Cavelty, M. (2013). From cyber-bombs to political fallout: Threat representations with an impact in the cyber-security discourse. International Studies Review, 15(1), 105-122. doi:10.1111/misr.12023 Fidler, D. P. (2013). Economic cyber espionage and international law: Controversies involving government acquisition of trade secrets through cyber technologies. ASIL Insights, 17(10) Retrieved from www.scopus.com Fouad, S. A., & Ghaleb, A. A. (2020). Niles Journal for Geriatric and Gerontology, 3, 70-73. Retrieved from www.scopus.com Giddens, A. (1999). Risk and responsibility. Modern Law Review, 62(1), 1-10. Retrieved from www.scopus.com Hamin, Z., & Rosli, W. R. W. (2018). Cloaked by cyber space: A legal response to the risks of cyber stalking in malaysia. International Journal of Cyber Criminology, 12(1), 316-332. doi:10.5281/zenodo.1467931 Hamin, Z., & Rosli, W. R. W. (2018). Cloaked by cyber space: A legal response to the risks of cyber stalking in malaysia. International Journal of Cyber Criminology, 12(1), 316-332. doi:10.5281/zenodo.1467931 Hansen, L. P. (2020). The spy who never has to go out into the cold: Cyber espionage. Encyclopedia of Criminal Activities and the Deep Web, , 258-270. Retrieved from www.scopus.com Harris, J. (2020). China–US tensions: Is globalisation dead? International Critical Thought, 10(2), 263-281. doi:10.1080/21598282.2020.1775026 Herrmann, D. (2019). Cyber espionage and cyber defence. Information technology for peace and security: IT applications and infrastructures in conflicts, crises, war, and peace (pp. 83-106) doi:10.1007/978-3-658-25652-4_5 Retrieved from www.scopus.com Hersee, S. (2020). The Cyber Security Dilemma and the Securitisation of Cyberspace, Retrieved from www.scopus.com Hore, S., & Raychaudhuri, K. (2021). Cyber Espionage—An ethical analysis doi:10.1007/978-981-15-6067-5_5 Retrieved from www.scopus.com Jalali, M. (2021). Espionage in modern international law and necessity of codification of global provisions. Public Law Studies Quarterly, 51, 329-354. Retrieved from www.scopus.com Jalil, J. A., Hassan, H., Rahman, N. A., Ali, R. B. R. M., Mohamed, D., & Najib, A. (2020). Business under threat: The criminal liability of trade secret theft in malaysia? International Journal of Business and Society, 21(S1), 49-65. Retrieved from www.scopus.com Kamaruddin, S., Rosli, W. R. W., Abd Rani, A. R., Azlinbte Md Zaki, N. Z., & Omar, M. F. (2020). When love is jeopardized: Governing online love scams in malaysia. International Journal of Advanced Science and Technology, 29(6), 391-397. Retrieved from www.scopus.com Khan, S., Khan, N., & Tan, O. (2020). Efficiency of legal and regulatory framework in combating cybercrime in malaysia. Understanding Digital Industry: Proceedings of the Conference on Managing Digital Industry, Technology and Entrepreneurship (Comdite 2019), , 333-336. Retrieved from www.scopus.com Kittichaisaree, K. (2019). Cyber espionage. Public International Law of Cyberspace, , 233-262. Retrieved from www.scopus.com Libicki, M. C. (2018). Drawing inferences from cyber espionage. Paper presented at the International Conference on Cyber Conflict, CYCON, , 2018-May 109-121. doi:10.23919/CYCON.2018.8405013 Retrieved from www.scopus.com Longobardo, M. (2018). Cyber espionage and international law. Israel Law Review, 53(2), 294-297. Retrieved from www.scopus.com Mohamad, A. M., Hamin, Z., & Othman, M. (2017). Balancing open justice and privacy rights in adopting ICT in the malaysian courts. Advanced Science Letters, 23(8), 7996-8000. doi:10.1166/asl.2017.9629 Nardi, M. L. (2020). Origin of cyber warfare and how the espionage changed: A historical overview. Transdisciplinary perspectives on risk management and cyber intelligence (pp. 145-153) doi:10.4018/978-1-7998-4339-9.ch011 Retrieved from www.scopus.com O'Hara, G. (2010). Cyber-espionage: A growing threat to the american economy. CommLaw Conspectus, 19(1) Retrieved from www.scopus.com Olatubosun, P., Charles, E., & Omoyele, T. (2021). Rethinking luxury brands and sustainable fashion business models in a risk society. Journal of Design, Business and Society, 7(1), 49-81. doi:10.1386/dbs_00020_1 Paterson, T., & Hanley, L. (2020). Political warfare in the digital age: Cyber subversion, information operations and ‘deep fakes’. Australian Journal of International Affairs, 74(4), 439-454. doi:10.1080/10357718.2020.1734772 Perlroth, N. (2019). Chinese and Iranian Hackers Renew their Attacks on U.S.Companies, Retrieved from www.scopus.com Perumal, S., Pitchay, S. A., Samy, G. N., Shanmugam, B., Magalingam, P., & Albakri, S. H. (2018). Transformative cyber security model for malaysian government agencies. International Journal of Engineering and Technology(UAE), 7(4), 87-92. doi:10.14419/ijet.v7i4.15.21377 Plotnek, J. J., & Slay, J. (2021). Cyber terrorism: A homogenized taxonomy and definition. Computers and Security, 102 doi:10.1016/j.cose.2020.102145 Reveron, D. S. (2012). Cyberspace and national security: Threats, opportunities, and power in a virtual world. Cyberspace and national security: Threats, opportunities, and power in a virtual world (pp. 1-246) Retrieved from www.scopus.com Reyns, B., Henson, B., Fisher, B., Fox, K. A., & Nobles, M. R. (2015). A gendered lifestyle-routine activity approach to explaining stalking victimization in canada. Journal of Interpersonal Violence, , 9066. Retrieved from www.scopus.com Robinson, N., & Hardy, A. (2021). Estonia: From the "bronze night" to cybersecurity pioneers. Routledge companion to global cyber-security strategy (pp. 211-225) Retrieved from www.scopus.com Rodricks, A., & Puri, J. (2020). Unravelling the translucent theories on espionage: A periodical study on crime and security. Journal of Legal Studies and Criminal Justice, 1 Retrieved from www.scopus.com Rosli, W. R. W., Kamaruddin, S., & Hamin, Z. (2020). A legal intervention in combatting terrorism and violent extremism in malaysia. International Journal of Innovation, Creativity and Change, 12(1), 104-114. Retrieved from www.scopus.com Sardoc, M. (2021). The ethics of securitisation: An interview with rita floyd. Critical Studies on Terrorism, 14(1), 139-148. doi:10.1080/17539153.2021.1886506 Setiawan, D., & Heriyanto, N. (2020). International regulatory vacuum of cyber espionage. Advances in Social Science, Education and Humanities Research, 436, 106-111. Retrieved from www.scopus.com Skinner, C. (2014). An international law response to economic cyber espionage. Conn.L.Rev., 46, 1165. Retrieved from www.scopus.com SPATARO, J. G. (2019). Iranian cyber espionage. Iranian Cyber Espionage, Retrieved from www.scopus.com Stevens, T. (2016). Cyber Security and the Politics of Time, Retrieved from www.scopus.com Studies, I. (2021). Significant Cyber Incidents, Retrieved from www.scopus.com Teoh, C. S., Mahmood, A. B., & Dzazali, S. B. (2017). Is NIST CSF applicable for developing nations? A case study on government sector in malaysia. Paper presented at the Proceedings Ot the 21st Pacific Asia Conference on Information Systems: ''Societal Transformation through IS/IT'', PACIS 2017, Retrieved from www.scopus.com Wangen, G. (2015). The role of malware in reported cyber espionage: A review of the impact and mechanism. Information (Switzerland), 6(2), 183-211. doi:10.3390/info6020183 Watt, E. (2019). Russell buchan, cyber espionage and international law. Journal of Conflict and Security Law, 24(3), 638-642. Retrieved from www.scopus.com Yoon, S. (2019). Why is there no securitisation theory in the korean nuclear crisis? Pacific Review, 32(3), 336-364. doi:10.1080/09512748.2018.1476401 Yuan, T. (2020). Identifying Hackers' Roles and Examining the Evolution Pattern of Hackers on Hacker Forums by Clustering and Semisupervised Learning Algorithms, Retrieved from www.scopus.com |
This material may be protected under Copyright Act which governs the making of photocopies or reproductions of copyrighted materials. You may use the digitized material for private study, scholarship, or research. |