Acknowledgement
This work was supported by the Ministry of Education, Malaysia under the Fundamental Research Grant Scheme for Research Acculturation of Early Career Researchers (FRGS-RACER) [grant number 600-IRMI/FRGS-RACER 5/3 (111/2019)].
References
- Adolphs, S., Brown, B., Carter, R., Crawford, P., & Sahota, O. (2004). Applying corpus linguistics in a health care context. Journal of Applied Linguistics, 1(1), 9-28. https://doi.org/10.1558/japl.v1i1.9
- Arowosaiye, Y. I. (2013). Evolution of Malaysian cyber laws and mechanism for secured online transactions. Pandecta Research Law Journal, 8(2), 117-126.
- Baker, P., Gabrielatos, C., & McEnery, T. (2013). Sketching Muslims: A corpus driven analysis of representations around the word 'Muslim' in the British press 1998-2009. Applied Linguistics, 34(3), 255-278. https://doi.org/10.1093/applin/ams048
- Banaji, S., Mejias, S., Kouts, R., Piedade, F., Pavlopoulos, V., Tzankova, I., Mackova, A., & Amna, E. (2018). Citizenship's tangled web: Associations, gaps and tensions in formulations of European youth active citizenship across disciplines. European Journal of Developmental Psychology, 15(3), 250-269. https://doi.org/10.1080/17405629.2017.1367278
- Biber, D., Reppen, R., & Friginal, E. (2010). Research in corpus linguistics. In Kaplan, R. B. (Ed.), The Oxford Handbook of Applied Linguistics (pp. 548-570). New York, NY: Oxford University Press.
- Brenner, S. W., (2010). Cybercrime: Criminal Threats from Cyberspace. Santa Barbara: Praeger.
- Craigen, D., Diakun-Thibault, N., & Purse, R. (2014). Defining cybersecurity. Technology Innovation Management Review, 4(10), 13-21. https://doi.org/10.22215/timreview835
- Flottum, K., Gjesdal, A. M., Gjerstad, O., Koteyko, N., & Salway, A. (2014). Representations of the future in English language blogs on climate change. Global Environmental Change, 29, 213-222. https://doi.org/10.1016/j.gloenvcha.2014.10.005
- Gabrielatos, C., & Baker, P. (2008). Fleeing, sneaking, flooding: A corpus analysis of discursive constructions of refugees and asylum seekers in the UK press, 1996-2005. Journal of English Linguistics, 36(1), 5-38. https://doi.org/10.1177/0075424207311247
- Ghasiya, P., & Okamura, K. (2022). A hybrid approach to analyze cybersecurity news articles by utilizing information extraction & sentiment analysis methods. International Journal of Semantic Computing, 16(01), 135-160. https://doi.org/10.1142/S1793351X22500015
- Hamin, Z. (2004). The legal response to computer misuse in Malaysia: The computer crimes act 1997. UiTM Law Review, 2, 210-234.
- Jaspal, R., & Nerlich, B. (2014). When climate science became climate politics: British media representations of climate change in 1988. Public Understanding of Science, 23(2), 122-141. https://doi.org/10.1177/0963662512440219
- Kim, D., & Park, J. (2019). Using keyword network analysis. Journal of Arts Psychotherapy, 15(1), 1-20. https://doi.org/10.32451/kjoaps.2019.15.1.001
- Koteyko, N. (2010). Mining the internet for linguistic and social data: An analysis of 'carbon compounds' in web feeds. Discourse & Society, 21(6), 655-674. https://doi.org/10.1177/0957926510381220
- Leech, G. (1991). The state of the art in corpus linguistics. In Ajimer, K., & Altenberg, B. (Eds.), English Corpus Linguistics (pp. 8-29). London: Longman.
- Mat, B., Pero, S., Wahid, R., & Sule, B. (2019). Cybersecurity and digital economy in Malaysia: Trusted law for customer and enterprise protection. International Journal of Innovative Technology and Exploring Engineering, 8(3), 214-220.
- McEnery, T., & Hardie, A. (2011). Corpus Linguistics: Method, Theory and Aractice. Cambridge University Press.
- Mohamed Mizan, N. S., Ma'arif, M. Y., Mohd Satar, N. S., & Shahar, S. M. (2019). CNDS-cybersecurity: issues and challenges in ASEAN countries. International Journal of Advanced Trends in Computer Science and Engineering, 8(1.4), 113-119. https://doi.org/10.30534/ijatcse/2019/1781.42019
- Reyes, A., Brittson, R., O'Shea, K., & Steele, J. (2011). The problem at hand. In Reyes, A., Brittson, R., O'Shea, K., & Steele, J. (Eds.), Cyber Crime Investigations: Bridging the Gaps between Security Professionals, Law Enforcement, and Prosecutors (pp. 1-22). Massachusetts: Elsevier.
- Schatz, D., Bashroush, R., & Wall, J. (2017). Towards a more representative definition of cyber security. Journal of Digital Forensics, Security and Law, 12(2), 52-74.
- Skovgaard, J. (2014). EU climate policy after the crisis. Environmental Politics, 23(1), 1-17. https://doi.org/10.1080/09644016.2013.818304
- Supayah, G., & Ibrahim, J. (2016). An overview of cyber security in Malaysia. Kuwait Chapter of Arabian Journal of Business and Management Review, 6(4), 12-20. https://doi.org/10.12816/0036698
- Zukarnain, Z. A., Hashim, M. Z., Muhammad, N., Mansor, F. A., & Azib, W. N. H. W. (2020). Impact of training on cybersecurity awareness. Gading Journal of Science and Technology, 3(01), 114-120.