Browse > Article
http://dx.doi.org/10.22925/apjcr.2022.3.2.17

Clustering Keywords to Define Cybersecurity: An Analysis of Malaysian and ASEAN Countries' Cyber Laws  

Joharry, Siti Aeisha (Universiti Teknologi MARA)
Turiman, Syamimi (Universiti Teknologi MARA)
Nor, Nor Fariza Mohd (Universiti Kebangsaan Malaysia)
Publication Information
Asia Pacific Journal of Corpus Research / v.3, no.2, 2022 , pp. 17-33 More about this Journal
Abstract
While the term is nothing new, 'cybersecurity' still seems to be defined quite loosely and subjectively depending on context. This is problematic especially to legal writers for prosecuting cybercrimes that do not fit a particular clause/act. In fact, what is more difficult is the non-existent single 'cybersecurity law' in Malaysia, rather than the current implementation of 10-related cyber security acts. In this paper, the 10 acts are compiled into a corpus to analyse the language used in these acts via a corpus linguistics approach. A list of frequent words is firstly investigated to see whether the so-called related laws do talk about cybersecurity followed by close inspection of the concordance lines and habitually associated phrases (clusters) to explore use of these words in context. The 'compare 2 wordlist' feature is used to identify similarities or differences between the 10 Malaysian cybersecurity related laws against a corpus of cyber laws from other ASEAN countries. Findings revealed that ASEAN cyber laws refer mostly to three cybersecurity dominant themes identified in the literature: technological solutions, events, and strategies, processes, and methods, whereas Malaysian cybersecurity-related laws revolved around themes like human engagement, and referent objects (of security). Although these so-called cyber related policies and laws in Malaysia are highlighted in the National Cyber Security Agency (NACSA), their practical applications to combat cybercrimes remain uncertain.
Keywords
Corpus Linguistics; Cyber Security; Cybercrimes; Information Security; National Cyber Policy;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Hamin, Z. (2004). The legal response to computer misuse in Malaysia: The computer crimes act 1997. UiTM Law Review, 2, 210-234.
2 Jaspal, R., & Nerlich, B. (2014). When climate science became climate politics: British media representations of climate change in 1988. Public Understanding of Science, 23(2), 122-141.   DOI
3 Kim, D., & Park, J. (2019). Using keyword network analysis. Journal of Arts Psychotherapy, 15(1), 1-20.   DOI
4 Koteyko, N. (2010). Mining the internet for linguistic and social data: An analysis of 'carbon compounds' in web feeds. Discourse & Society, 21(6), 655-674.   DOI
5 Mat, B., Pero, S., Wahid, R., & Sule, B. (2019). Cybersecurity and digital economy in Malaysia: Trusted law for customer and enterprise protection. International Journal of Innovative Technology and Exploring Engineering, 8(3), 214-220.
6 McEnery, T., & Hardie, A. (2011). Corpus Linguistics: Method, Theory and Aractice. Cambridge University Press.
7 Reyes, A., Brittson, R., O'Shea, K., & Steele, J. (2011). The problem at hand. In Reyes, A., Brittson, R., O'Shea, K., & Steele, J. (Eds.), Cyber Crime Investigations: Bridging the Gaps between Security Professionals, Law Enforcement, and Prosecutors (pp. 1-22). Massachusetts: Elsevier.
8 Schatz, D., Bashroush, R., & Wall, J. (2017). Towards a more representative definition of cyber security. Journal of Digital Forensics, Security and Law, 12(2), 52-74.
9 Supayah, G., & Ibrahim, J. (2016). An overview of cyber security in Malaysia. Kuwait Chapter of Arabian Journal of Business and Management Review, 6(4), 12-20.   DOI
10 Zukarnain, Z. A., Hashim, M. Z., Muhammad, N., Mansor, F. A., & Azib, W. N. H. W. (2020). Impact of training on cybersecurity awareness. Gading Journal of Science and Technology, 3(01), 114-120.
11 Leech, G. (1991). The state of the art in corpus linguistics. In Ajimer, K., & Altenberg, B. (Eds.), English Corpus Linguistics (pp. 8-29). London: Longman.
12 Mohamed Mizan, N. S., Ma'arif, M. Y., Mohd Satar, N. S., & Shahar, S. M. (2019). CNDS-cybersecurity: issues and challenges in ASEAN countries. International Journal of Advanced Trends in Computer Science and Engineering, 8(1.4), 113-119.   DOI
13 Skovgaard, J. (2014). EU climate policy after the crisis. Environmental Politics, 23(1), 1-17.   DOI
14 Brenner, S. W., (2010). Cybercrime: Criminal Threats from Cyberspace. Santa Barbara: Praeger.
15 Gabrielatos, C., & Baker, P. (2008). Fleeing, sneaking, flooding: A corpus analysis of discursive constructions of refugees and asylum seekers in the UK press, 1996-2005. Journal of English Linguistics, 36(1), 5-38.   DOI
16 Adolphs, S., Brown, B., Carter, R., Crawford, P., & Sahota, O. (2004). Applying corpus linguistics in a health care context. Journal of Applied Linguistics, 1(1), 9-28.   DOI
17 Arowosaiye, Y. I. (2013). Evolution of Malaysian cyber laws and mechanism for secured online transactions. Pandecta Research Law Journal, 8(2), 117-126.
18 Baker, P., Gabrielatos, C., & McEnery, T. (2013). Sketching Muslims: A corpus driven analysis of representations around the word 'Muslim' in the British press 1998-2009. Applied Linguistics, 34(3), 255-278.   DOI
19 Banaji, S., Mejias, S., Kouts, R., Piedade, F., Pavlopoulos, V., Tzankova, I., Mackova, A., & Amna, E. (2018). Citizenship's tangled web: Associations, gaps and tensions in formulations of European youth active citizenship across disciplines. European Journal of Developmental Psychology, 15(3), 250-269.   DOI
20 Biber, D., Reppen, R., & Friginal, E. (2010). Research in corpus linguistics. In Kaplan, R. B. (Ed.), The Oxford Handbook of Applied Linguistics (pp. 548-570). New York, NY: Oxford University Press.
21 Craigen, D., Diakun-Thibault, N., & Purse, R. (2014). Defining cybersecurity. Technology Innovation Management Review, 4(10), 13-21.   DOI
22 Flottum, K., Gjesdal, A. M., Gjerstad, O., Koteyko, N., & Salway, A. (2014). Representations of the future in English language blogs on climate change. Global Environmental Change, 29, 213-222.   DOI
23 Ghasiya, P., & Okamura, K. (2022). A hybrid approach to analyze cybersecurity news articles by utilizing information extraction & sentiment analysis methods. International Journal of Semantic Computing, 16(01), 135-160.   DOI