1 |
Hamin, Z. (2004). The legal response to computer misuse in Malaysia: The computer crimes act 1997. UiTM Law Review, 2, 210-234.
|
2 |
Jaspal, R., & Nerlich, B. (2014). When climate science became climate politics: British media representations of climate change in 1988. Public Understanding of Science, 23(2), 122-141.
DOI
|
3 |
Kim, D., & Park, J. (2019). Using keyword network analysis. Journal of Arts Psychotherapy, 15(1), 1-20.
DOI
|
4 |
Koteyko, N. (2010). Mining the internet for linguistic and social data: An analysis of 'carbon compounds' in web feeds. Discourse & Society, 21(6), 655-674.
DOI
|
5 |
Mat, B., Pero, S., Wahid, R., & Sule, B. (2019). Cybersecurity and digital economy in Malaysia: Trusted law for customer and enterprise protection. International Journal of Innovative Technology and Exploring Engineering, 8(3), 214-220.
|
6 |
McEnery, T., & Hardie, A. (2011). Corpus Linguistics: Method, Theory and Aractice. Cambridge University Press.
|
7 |
Reyes, A., Brittson, R., O'Shea, K., & Steele, J. (2011). The problem at hand. In Reyes, A., Brittson, R., O'Shea, K., & Steele, J. (Eds.), Cyber Crime Investigations: Bridging the Gaps between Security Professionals, Law Enforcement, and Prosecutors (pp. 1-22). Massachusetts: Elsevier.
|
8 |
Schatz, D., Bashroush, R., & Wall, J. (2017). Towards a more representative definition of cyber security. Journal of Digital Forensics, Security and Law, 12(2), 52-74.
|
9 |
Supayah, G., & Ibrahim, J. (2016). An overview of cyber security in Malaysia. Kuwait Chapter of Arabian Journal of Business and Management Review, 6(4), 12-20.
DOI
|
10 |
Zukarnain, Z. A., Hashim, M. Z., Muhammad, N., Mansor, F. A., & Azib, W. N. H. W. (2020). Impact of training on cybersecurity awareness. Gading Journal of Science and Technology, 3(01), 114-120.
|
11 |
Leech, G. (1991). The state of the art in corpus linguistics. In Ajimer, K., & Altenberg, B. (Eds.), English Corpus Linguistics (pp. 8-29). London: Longman.
|
12 |
Mohamed Mizan, N. S., Ma'arif, M. Y., Mohd Satar, N. S., & Shahar, S. M. (2019). CNDS-cybersecurity: issues and challenges in ASEAN countries. International Journal of Advanced Trends in Computer Science and Engineering, 8(1.4), 113-119.
DOI
|
13 |
Skovgaard, J. (2014). EU climate policy after the crisis. Environmental Politics, 23(1), 1-17.
DOI
|
14 |
Brenner, S. W., (2010). Cybercrime: Criminal Threats from Cyberspace. Santa Barbara: Praeger.
|
15 |
Gabrielatos, C., & Baker, P. (2008). Fleeing, sneaking, flooding: A corpus analysis of discursive constructions of refugees and asylum seekers in the UK press, 1996-2005. Journal of English Linguistics, 36(1), 5-38.
DOI
|
16 |
Adolphs, S., Brown, B., Carter, R., Crawford, P., & Sahota, O. (2004). Applying corpus linguistics in a health care context. Journal of Applied Linguistics, 1(1), 9-28.
DOI
|
17 |
Arowosaiye, Y. I. (2013). Evolution of Malaysian cyber laws and mechanism for secured online transactions. Pandecta Research Law Journal, 8(2), 117-126.
|
18 |
Baker, P., Gabrielatos, C., & McEnery, T. (2013). Sketching Muslims: A corpus driven analysis of representations around the word 'Muslim' in the British press 1998-2009. Applied Linguistics, 34(3), 255-278.
DOI
|
19 |
Banaji, S., Mejias, S., Kouts, R., Piedade, F., Pavlopoulos, V., Tzankova, I., Mackova, A., & Amna, E. (2018). Citizenship's tangled web: Associations, gaps and tensions in formulations of European youth active citizenship across disciplines. European Journal of Developmental Psychology, 15(3), 250-269.
DOI
|
20 |
Biber, D., Reppen, R., & Friginal, E. (2010). Research in corpus linguistics. In Kaplan, R. B. (Ed.), The Oxford Handbook of Applied Linguistics (pp. 548-570). New York, NY: Oxford University Press.
|
21 |
Craigen, D., Diakun-Thibault, N., & Purse, R. (2014). Defining cybersecurity. Technology Innovation Management Review, 4(10), 13-21.
DOI
|
22 |
Flottum, K., Gjesdal, A. M., Gjerstad, O., Koteyko, N., & Salway, A. (2014). Representations of the future in English language blogs on climate change. Global Environmental Change, 29, 213-222.
DOI
|
23 |
Ghasiya, P., & Okamura, K. (2022). A hybrid approach to analyze cybersecurity news articles by utilizing information extraction & sentiment analysis methods. International Journal of Semantic Computing, 16(01), 135-160.
DOI
|