The words you are searching are inside this book. To get more targeted content, please make full-text search by clicking here.
Discover the best professional documents and content resources in AnyFlip Document Base.
Search
Published by Ridzjuan, 2024-05-26 11:40:44

MAISARAH IMS656 E-BOOK

MAISARAH IMS656 E-BOOK

The Battle For The Digital Integrity


The Battle For The Digital Integrity


M A I S A R A H A B D U L P A T A S Maisarah Abdul Patas is a student od UITM Puncak Perdana. She is a cybersecurity expert with a passion for combating cyber scams and exploring the intersection of technology and society. With a background in Information Management and Mathematics, and several years of experience working in the cybersecurity industry, Maisarah is dedicated to raise awareness about online threats and empowering individuals to protect themselves in the digital world by writing this E-book. ———————————————————————————————— Contact Information: Email: [email protected] Instagram/ Twitter: @msrhhapy LinkedIn: linkedin.com/in/maisarahabdulpatas Website:www.maisarahabdulpatas.com AUTHOR PROFILE


ACKNOWLEDGEMENT I would like to express my heartfelt thanks to those who supported me in completing this assignment. Firstly, my deepest gratitude goes to my lecturer, Sir Ahmad Nadzri bin Mohamad, for his invaluable guidance, continuous support, and insightful feedback throughout this project. I am also thankful to University Teknologi MARA Puncak Perdana (UiTM) for providing the necessary resources and a conducive environment for research and learning. I appreciate my team members in the IMS656 subject under the Management of Information Systems Department for their collaboration and hard work on our group projects, enriching my learning experience. Special thanks to my family and friends for their unwavering support and encouragement, which have been a constant source of motivation. Finally, I acknowledge the contributions of all individuals and sources that provided valuable insights and information for my individual assignment on "The Threats of Cyber Scams Using Artificial Intelligence (AI) Technology."


ABSTRACT This research examines the challenges Malaysia faces in combating the global surge of cyber scams and leveraging Artificial Intelligence (AI) to bolster its cybersecurity resilience. Through case studies and analysis, the study highlights the sophisticated tactics employed by cybercriminals in Malaysia, emphasizing the need for enhanced cybersecurity measures and public awareness. The transformative potential of AI technologies in strengthening cybersecurity defenses is explored, alongside ethical considerations and regulatory hurdles. Recommendations are provided to fortify cybersecurity, foster collaboration, improve incident response, enhance regulatory frameworks, and promote cybersecurity education. By implementing these strategies, Malaysia can safeguard its digital future and navigate the evolving cyber threat landscape with resilience and innovation. This e-book, titled "The Threats of Cyber Scams Using Artificial Intelligence (AI) Technology," examines the convergence of AI technologies and fraud detection within the realm of cybersecurity incident response. Drawing insights from a case study involving a financially adept organization's incident response capabilities, the e-book presents a detailed process model to assist organizations in cultivating situational awareness regarding cyber threats and the broader business environment during incident response. Highlighting the crucial significance of situational awareness in navigating the intricacies of incident response within a socio-technical setting, the e-book explores the conventional incident response model and stresses the necessity for organizations to adapt to the ever-evolving cyber threat landscape. Through an examination of the role of cybersecurity incident response and an exploration of situational awareness, the e-book aims to offer valuable perspectives for enhancing organizational incident response capabilities and reinforcing defenses against sophisticated and persistent cyber threats, including those facilitated by AI technologies.


CONTENTS Introduction: Chapter 1: “Unravelling the Organisation of Ivorian Cyberfraudsters: Criminal Networks or Organised Crime?" How can organizations develop situation awareness for incident response: A case study of management practice Chapter 2: Malaysian case studies on cyber scams and AI Research 1: Cyber Scam Threats in Malaysia (2023) Research 2 :Analysis of Human and Artificial Intelligence in Cybersecurity (2023) Chapter 3: Definition and examples of cyber scams and AI terminology Chapter 4: Standard of Procedure (SOP) / Guideline on cyber scams and AI Chapter 5: Issues and challenges of cyber scams and AI technology in Malaysia Chapter 6: Suggestions on how to combat the global rise in cyber scams in Malaysia Conclusion REFERENCES


INTRODUCTION


In the modern interconnected digital environment, the rise of online fraudulent activities poses a significant risk to both individuals and businesses, threatening financial stability and data security. As cybercriminals continuously enhance their deceptive strategies, the importance of strong defenses against scams is more crucial than ever.Artificial Intelligence (AI) has become a valuable asset in the ongoing effort to combat cyber scams discreetly. By utilizing machine learning algorithms and data analysis, AI tools can rapidly examine large volumes of data, identify unusual patterns that suggest fraudulent behavior, and take proactive measures to reduce risks. Whether it's phishing attempts, ransomware incidents, identity theft, or online fraud, AI provides a proactive defense strategy to counter various cyber threats. INTRODUCTION THIS E-BOOK EXPLORES THE LATEST ADVANCEMENTS IN AI TECHNOLOGIES FOR IDENTIFYING AND PREVENTING CYBER SCAMS WITHOUT REVEALING AI INVOLVEMENT. IT DELVES INTO THE CORE CONCEPTS BEHIND AI-DRIVEN CYBERSECURITY, PRESENTS REALWORLD EXAMPLES DEMONSTRATING SUCCESSFUL AI APPLICATIONS IN FRAUD DETECTION, AND CONSIDERS THE FUTURE IMPACT OF AI ON THE BATTLE AGAINST CYBERCRIME. BY UNDERSTANDING HOW AI STRENGTHENS CYBERSECURITY DEFENSES, ORGANIZATIONS CAN ENHANCE THEIR SECURITY MEASURES, PROTECT SENSITIVE DATA, AND STAY AHEAD OF CYBER ADVERSARIES IN AN INCREASINGLY DIGITAL WORLD.


CHAPTER 1


RESEARCH TOPIC 1: “UNRAVELLING THE ORGANISATION OF IVORIAN CYBERFRAUDSTERS: CRIMINAL NETWORKS OR ORGANISED CRIME?" Authors: Cristina Cretu-Adatte, Josselin Wilfred Azi, Olivier BeaudetLabrecque, Hazel Bunning, Luca Brunoni, Renaud Zbinden Journal: Journal of Economic Criminology Year: 2024 The study explores the organizational arrangements of Ivorian cyberfraudsters, commonly known as "brouteurs," who engage in romance scams and sextorsion. By examining data obtained through semi-structured interviews with cyber-fraudsters in Abidjan, the research aims to uncover the complex network of roles and activities within these fraudulent groups. It differentiates between two categories of cybercriminal groups: decentralized groups involved in sextorsion and structured groups participating in romance scams, both with international connections to collaborators, money couriers, underground financiers, or complicit officials. The study poses a fundamental question on whether these groups should be labeled as criminal networks or organized crime entities, shedding light on the blurred lines between the two classifications. It stresses the significance of global cooperation in combating cyber fraud and underscores the necessity for Ivorian institutions to strengthen their capabilities and resources to effectively address the challenges posed by cybercriminal activities.


The research by Cretu-Adatte et al. in the Journal of Economic Criminology in 2024 offers a detailed examination of the organizational structures of Ivorian cyberfraudsters, focusing on their involvement in romance scams and sextorsion. Through insights gained from interviews with cyber-fraudsters in Abidjan, the study reveals the intricate roles and operations within these fraudulent groups, distinguishing between decentralized and structured setups with international connections. The study initiates a critical examination into whether these groups should be classified as criminal networks or organized crime entities, emphasizing the importance of international collaboration and the urgent need for Ivorian institutions to enhance their capabilities in effectively combating cyber fraud.


RESEARCH TOPIC 2: “HOW CAN ORGANIZATIONS DEVELOP SITUATION AWARENESS FOR INCIDENT RESPONSE: A CASE STUDY OF MANAGEMENT PRACTICE" Authors: Atif Ahmad, Sean B. Maynard, Kevin C. Desouza, James Kotsias, Monica T. Whitty, Richard L. Baskerville Journal: Journal of Computers & Security Year: 2021 The article by Atif Ahmad et al. titled "How can organizations develop situation awareness for incident response: A case study of management practice" published in Computers & Security in 2021 delves into the critical issue of cybersecurity and incident response in the face of organized cyber-threat-actors targeting large enterprises. The research underscores the significance of situational awareness in successfully combating cyber-attacks and safeguarding sensitive organizational data. ne of the key strengths of the article is its emphasis on the practical perspective in developing incident response proficiencies. By presenting an in-depth case study of a leading financial institution with a mature incident response capability, the authors provide practical insights into how organizations can navigate the complex cyber-threat landscape. The process model proposed in the study outlines a structured approach for organizations to enhance their incident response practices and cultivate situational awareness.


The authors effectively highlight the adverse impacts of cyberattacks on organizations, encompassing the loss of competitive edge, public trust, legal penalties, and financial stability. By drawing attention to the evolving cybersecurity landscape and the tactics employed by cyber-threat-actors, the article underscores the urgency for organizations to fortify their cybersecurity measures and incident response strategies. Furthermore, the reference to Verizon's Data Breaches Investigations report, which indicates a substantial portion of cybersecurity incidents being perpetrated by external actors, adds credibility to the research findings. This statistic reinforces the need for organizations to proactively address cybersecurity threats and invest in robust incident response capabilities to safeguard their assets and data. In conclusion, the article "How can organizations develop situation awareness for incident response: A case study of management practice" provides a comprehensive and insightful analysis of the challenges posed by cyber-threat-actors and the importance of situational awareness in incident response. The practical recommendations and process model outlined in the study offer valuable guidance for organizations looking to enhance their cybersecurity posture and effectively mitigate the risks associated with cyber-attacks.


CHAPTER 2


WHAT THIS CASE STUDY FOCUSES ON THE INCREASING PREVALENCE OF CYBER SCAMS IN MALAYSIA, PARTICULARLY THOSE TARGETING INDIVIDUALS THROUGH PHISHING, SOCIAL ENGINEERING, AND FRAUDULENT ONLINE TRANSACTIONS. THE STUDY HIGHLIGHTS THE VARIOUS METHODS USED BY CYBERCRIMINALS TO DECEIVE VICTIMS AND STEAL SENSITIVE INFORMATION OR MONEY. WHO THE PRIMARY VICTIMS OF THESE CYBER SCAMS ARE MALAYSIAN CITIZENS, INCLUDING BOTH INDIVIDUALS AND BUSINESSES. THE PERPETRATORS ARE OFTEN ORGANIZED CYBERCRIMINAL GROUPS OPERATING BOTH LOCALLY AND INTERNATIONALLY. THE STUDY ALSO INVOLVES CYBERSECURITY AGENCIES LIKE MYCERT (MALAYSIA COMPUTER EMERGENCY RESPONSE TEAM) AND LAW ENFORCEMENT AUTHORITIES WORKING TO COMBAT THESE THREATS. WHY THE RISE IN CYBER SCAMS IS ATTRIBUTED TO THE INCREASED USE OF DIGITAL PLATFORMS FOR COMMUNICATION, BANKING, AND SHOPPING, ESPECIALLY DURING THE COVID-19 PANDEMIC. CYBERCRIMINALS EXPLOIT THE LACK OF AWARENESS AND INADEQUATE CYBERSECURITY MEASURES AMONG USERS TO CARRY OUT THEIR SCHEMES. THE STUDY AIMS TO UNDERSTAND THE TACTICS USED BY SCAMMERS AND DEVELOP STRATEGIES TO MITIGATE THESE THREATS. Cyber Scam Threats in Malaysia (2023)


WHEN THE CASE STUDY COVERS INCIDENTS REPORTED BETWEEN 2021 AND 2023, A PERIOD MARKED BY A SIGNIFICANT INCREASE IN ONLINE ACTIVITIES DUE TO PANDEMIC-RELATED RESTRICTIONS. THIS TIMEFRAME ALSO SAW A CORRESPONDING RISE IN CYBER SCAM INCIDENTS. HOW THE STUDY ANALYZES DATA FROM REPORTED CYBER SCAM CASES, INCLUDING THE TYPES OF SCAMS, METHODS USED, AND THE IMPACT ON VICTIMS. IT ALSO EXAMINES THE RESPONSE MEASURES TAKEN BY CYBERSECURITY AGENCIES AND LAW ENFORCEMENT, SUCH AS PUBLIC AWARENESS CAMPAIGNS, CYBERSECURITY ADVISORIES, AND LEGAL ACTIONS AGAINST PERPETRATORS. THE STUDY SUGGESTS ENHANCING CYBERSECURITY EDUCATION AND IMPLEMENTING STRONGER SECURITY MEASURES TO PROTECT AGAINST SUCH THREATS. Cyber Scam Threats in Malaysia (2023)


WHAT THIS CASE STUDY EXPLORES THE ROLE OF ARTIFICIAL INTELLIGENCE (AI) IN ENHANCING CYBERSECURITY MEASURES IN MALAYSIA. IT EXAMINES HOW AI TECHNOLOGIES ARE BEING INTEGRATED WITH HUMAN EFFORTS TO DETECT, PREVENT, AND RESPOND TO CYBER THREATS, INCLUDING SCAMS AND OTHER MALICIOUS ACTIVITIES. WHO THE STUDY INVOLVES VARIOUS STAKEHOLDERS, INCLUDING CYBERSECURITY PROFESSIONALS, AI RESEARCHERS, AND ORGANIZATIONS IMPLEMENTING AI-BASED SECURITY SOLUTIONS. IT ALSO CONSIDERS THE ROLE OF GOVERNMENT AGENCIES AND PRIVATE SECTOR COMPANIES IN ADOPTING AND PROMOTING AI TECHNOLOGIES FOR CYBERSECURITY. WHY THE INCREASING COMPLEXITY AND VOLUME OF CYBER THREATS NECESSITATE ADVANCED SOLUTIONS THAT CAN KEEP PACE WITH EVOLVING ATTACK METHODS. AI OFFERS SIGNIFICANT POTENTIAL IN AUTOMATING THREAT DETECTION, ANALYZING LARGE VOLUMES OF DATA, AND PROVIDING REALTIME RESPONSES TO CYBER INCIDENTS. THE STUDY AIMS TO EVALUATE THE EFFECTIVENESS OF AI IN COMPLEMENTING HUMAN EFFORTS AND IMPROVING OVERALL CYBERSECURITY RESILIENCE. Analysis of Human and Artificial Intelligence in Cybersecurity (2023)


WHEN THE CASE STUDY FOCUSES ON DEVELOPMENTS AND IMPLEMENTATIONS OF AI IN CYBERSECURITY FROM 2021 TO 2023. THIS PERIOD HAS SEEN RAPID ADVANCEMENTS IN AI TECHNOLOGIES AND THEIR APPLICATION IN VARIOUS SECTORS, INCLUDING CYBERSECURITY. HOW THE STUDY ANALYZES VARIOUS AI-BASED CYBERSECURITY TOOLS AND THEIR APPLICATIONS, SUCH AS MACHINE LEARNING ALGORITHMS FOR THREAT DETECTION, NATURAL LANGUAGE PROCESSING FOR ANALYZING PHISHING EMAILS, AND AUTOMATED RESPONSE SYSTEMS. IT ALSO EXAMINES CASE STUDIES OF ORGANIZATIONS THAT HAVE SUCCESSFULLY IMPLEMENTED AI SOLUTIONS TO ENHANCE THEIR CYBERSECURITY POSTURE. THE STUDY HIGHLIGHTS THE BENEFITS AND CHALLENGES OF INTEGRATING AI WITH HUMAN EFFORTS, EMPHASIZING THE NEED FOR CONTINUOUS IMPROVEMENT AND COLLABORATION BETWEEN TECHNOLOGY DEVELOPERS AND CYBERSECURITY PROFESSIONALS. Analysis of Human and Artificial Intelligence in Cybersecurity (2023)


CHAPTER 3


PHISHING: DECEPTIVE ATTEMPTS TO ACQUIRE SENSITIVE INFORMATION THROUGH FRAUDULENT COMMUNICATION. RANSOMWARE: MALICIOUS SOFTWARE THAT ENCRYPTS DATA AND DEMANDS PAYMENT FOR DECRYPTION. SOCIAL ENGINEERING: MANIPULATING INDIVIDUALS TO DISCLOSE CONFIDENTIAL DATA OR PERFORM COMPROMISING ACTIONS. IDENTITY THEFT: UNAUTHORIZED USE OF PERSONAL INFORMATION FOR FRAUDULENT PURPOSES. CYBER SCAMS


C E O F R A U D : Impersonating a company executive to deceive employees into transferring funds or sensitive information. F A K E A N T I V I R U S S O F T W A R E : Malicious programs that masquerade as legitimate antivirus software to trick users into installing malware. O N L I N E S H O P P I N G S C A M S : Fraudulent websites or sellers that lure customers with fake products or deals to steal payment information. TYPES OF CYBER SCAMS


AI-POWERED MALWARE: MALWARE THAT USES AI ALGORITHMS TO EVADE DETECTION AND ADAPT ITS BEHAVIOR TO TARGET SYSTEMS. AUTOMATED PHISHING CAMPAIGNS: USING AI TO PERSONALIZE PHISHING EMAILS AND INCREASE THEIR EFFECTIVENESS IN TRICKING RECIPIENTS. ADVERSARIAL MACHINE LEARNING: TECHNIQUES WHERE AI MODELS ARE MANIPULATED TO GENERATE MALICIOUS OUTPUTS, BYPASS SECURITY MEASURES, OR DECEIVE DETECTION SYSTEMS. INSTANCES OF AI TECHNOLOGIES IN CYBER ATTACKS:


CHAPTER 4


RECOGNITION AND RESPONSE: DEVELOP PROTOCOLS FOR RECOGNIZING COMMON CYBER SCAMS LIKE PHISHING, RANSOMWARE, SOCIAL ENGINEERING, AND IDENTITY THEFT. OUTLINE STEPS FOR IMMEDIATE RESPONSE AND MITIGATION. DATA ANALYSIS AND RISK ASSESSMENT: IMPLEMENT PROCEDURES FOR ANALYZING DATA RELATED TO CYBER SCAMS TO IDENTIFY PATTERNS AND VULNERABILITIES. CONDUCT RISK ASSESSMENTS TO PRIORITIZE RESPONSE ACTIONS. INCIDENT REPORTING AND INVESTIGATION: DEFINE THE PROCESS FOR REPORTING CYBER INCIDENTS, CONDUCTING THOROUGH INVESTIGATIONS, AND DOCUMENTING FINDINGS FOR FUTURE REFERENCE AND ANALYSIS. TRAINING AND AWARENESS: ESTABLISH TRAINING PROGRAMS TO EDUCATE EMPLOYEES ON RECOGNIZING AND REPORTING CYBER SCAMS. PROMOTE AWARENESS OF EVOLVING SCAM TACTICS AND PREVENTIVE MEASURES.


Understanding AI Terminologies: Provide a glossary of key AI terms relevant to cybersecurity, such as machine learning, neural networks, natural language processing, and anomaly detection. Ethical Considerations: Emphasize the importance of ethical AI practices, including transparency, security, privacy, and data governance. Highlight the need for compliance with ethical norms and principles. Real-World Examples: Showcase instances where AI technologies have been utilized in cyber attacks, like AI-powered malware, automated phishing campaigns, and adversarial machine learning. Illustrate the evolving sophistication of cyber threats in the AI era. AI in Fraud Detection: Discuss the role of AI in fraud detection, emphasizing its benefits, risks, and real-world use cases. Highlight the significance of AI in enhancing cybersecurity and fraud prevention efforts. GUIDELINES FOR AI INTEGRATION:


CHAPTER 5


Issues and challenges of cyber scams in Malaysia Advanced Scam Techniques: The growing use of AI by cybercriminals in Malaysia has led to the development of more sophisticated scam methods, such as deepfakes, voice cloning, and social media manipulation. These enhanced tactics make it harder for individuals to distinguish genuine communications from fraudulent ones. Increasing Phishing and Ransomware Incidents: Phishing remains a prevalent form of cyber attack in Malaysia, posing a significant threat to individuals and organizations. Additionally, the rise of ransomware attacks, including ransomware-as-a-service, presents a growing concern for cybersecurity professionals. Data Theft and Privacy Risks: The underground market of data theft in Malaysia raises serious concerns about data privacy and security. Cybercriminals exploit vulnerabilities to steal personal and financial information, leading to financial losses and reputational damage for victims. Shortage of Skilled Cybersecurity Talent: Malaysia faces a shortage of skilled cybersecurity professionals, hindering the country's ability to effectively combat cyber threats. The demand for cybersecurity knowledge workers is expected to increase, emphasizing the need for enhanced training and education in the field.


Misuse of AI in Scams: The misuse of AI technologies in generating scam content poses a significant challenge for cybersecurity efforts in Malaysia. Scammers leverage AI-driven techniques like deepfakes and voice cloning to deceive individuals and perpetrate fraudulent activities, making it harder to detect and combat such scams. Ethical Implications: The ethical implications of AI-powered scams raise questions about the responsible use of technology. Issues related to privacy, data governance, and transparency in AI applications for cyber scams need to be addressed to ensure the ethical deployment of AI in cybersecurity practices. Regulatory and Enforcement Hurdles: The lack of specific laws and enforcement mechanisms to hold social media platforms accountable for hosting scam content created using AI technology presents regulatory challenges. Strengthening regulations and enforcement actions against platforms facilitating scam ads is crucial to combatting AI-powered scams effectively. Collaboration and Awareness Needs: Enhancing collaboration between cybersecurity agencies, law enforcement, and technology experts is essential to stay ahead of evolving cyber threats. Increasing public awareness about the risks of cyber scams and the role of AI in cybersecurity is vital to empower individuals to protect themselves against fraudulent activities. Issues and challenges of AI technology in Malaysia


CHAPTER 6


Suggestions on how to combat the global rise in cyber scams in Malaysia STRENGTHEN CYBERSECURITY MEASURES ENHANCE COLLABORATION AND INFORMATION EXCHANGE IMPROVE INCIDENT RESPONSE AND SUPPORT FOR VICTIMS STRENGTHEN REGULATORY FRAMEWORK AND ENFORCEMENT PROMOTE AWARENESS AND EDUCATION ON CYBERSECURITY


Strengthen Cybersecurity Measures Implement strong security protocols like multi-factor authentication, robust encryption, and regular software updates to defend against scams Invest in trusted antivirus and anti-malware solutions to identify and counter malicious activities Educate employees and the public on cybersecurity best practices, including recognizing phishing attempts and avoiding suspicious links or downloads Enhance Collaboration and Information Exchange Foster partnerships between government entities, law enforcement, and the cybersecurity sector to share threat intelligence and coordinate responses Engage in global cooperation through platforms like APCERT to combat cybercrime across borders Establish common objectives and frameworks to address mutual cybersecurity challenges Improve Incident Response and Support for Victims Enhance capabilities for incident response to swiftly detect, analyze, and mitigate cyber scams Provide assistance and guidance to victims of cyber scams through dedicated support channels and resources Encourage reporting of cyber scam incidents to aid investigations and enhance preventive measures Strengthen Regulatory Framework and Enforcement Enhance cybersecurity regulations and guidelines, such as those from Bank Negara Malaysia, to enforce stringent security practices in financial institutions Intensify enforcement actions against cybercriminals and hold platforms responsible for hosting scam content Allocate adequate resources to agencies like CyberSecurity Malaysia to enhance monitoring and response capabilities Promote Awareness and Education on Cybersecurity Launch public awareness campaigns to educate individuals on the risks of cyber scams and the importance of online safety Collaborate with educational institutions to develop cybersecurity training programs to address the shortage of skilled professionals Encourage continuous learning about evolving cyber threats and proactive adoption of security measures


CONCLUSION In conclusion, the research and case studies presented highlight the critical challenges Malaysia faces in addressing the growing global threat of cyber scams and harnessing the potential of Artificial Intelligence (AI) to enhance its cybersecurity resilience. This multifaceted issue requires a comprehensive and proactive approach to protect the nation's digital landscape. The first case study delves into the complex web of cyber scam threats affecting Malaysia, emphasizing the sophisticated tactics used by cybercriminals to deceive individuals and organizations. The rise of phishing, social engineering, and fraudulent online transactions, exacerbated by the increased reliance on digital platforms during the pandemic, underscores the urgent need for strengthened cybersecurity measures and enhanced public awareness to mitigate the impact of these scams. Conversely, the second case study explores the transformative potential of AI technologies in bolstering Malaysia's cybersecurity defenses. AI-powered tools offer advanced capabilities in threat detection, data analysis, and real-time response, presenting a promising avenue for enhancing cyber resilience. However, the ethical considerations and regulatory challenges surrounding the use of AI in cybersecurity underscore the importance of responsible deployment and robust governance frameworks. By embracing a holistic strategies or recommendations stated, Malaysia can safeguard its digital landscape, harness the potential of AI for cybersecurity, and pave the way for a resilient and secure future. Through concerted efforts and strategic investments, Malaysia can navigate the evolving cyber threat landscape with vigilance, innovation, and resilience.


REFERENCES Ahmad, A., Maynard, S. B., Desouza, K. C., Kotsias, J., Whitty, M. T., & Baskerville, R. L. (2021). How can organizations develop situation awareness for incident response: A case study of management practice. Computers & Security, 101, 102122. Cretu-Adatte, C., Azi, J. W., Beaudet-Labrecque, O., Bunning, H., Brunoni, L., & Zbinden, R. (2024). Unravelling the Organisation of Ivorian Cyberfraudsters: Criminal Networks or Organised Crime?. Journal of Economic Criminology, 100056. MyCERT. (2023). Advisory on Cyber Scams. Malaysia Computer Emergency Response Team. Retrieved from https://www.mycert.org.my/portal/advisory?id=SR021.012023 Lee, P. Y. (2023). Analysis of Human and Artificial Intelligence in Cybersecurity (Unpublished final year project). Universiti Tunku Abdul Rahman. Retrieved from http://eprints.utar.edu.my/6061/1/fyp_FN_2023_LPY.pdf


Click to View FlipBook Version