p.14
Overview of E-Commerce
What is law?
That which must be obeyed and followed by citizens, subject to sanctions or legal consequences.
p.37
Overview of E-Commerce
What aspect of e-commerce focuses on safeguarding personal information?
Data protection and privacy.
p.19
Major World Legal Systems
What is a key characteristic of Common Law?
It is rights-based and concerned for individuals.
p.32
Cybersecurity Initiatives in Malaysia
What is the role of MyCERT in relation to law enforcement agencies?
MyCERT advises and provides assistance but does not undertake any policing role.
p.33
Digital Forensics and Incident Response
What is CyberCSI?
Cyber Crime Scene Investigation, a digital forensic lab of CyberSecurity Malaysia.
p.37
Overview of E-Commerce
What is a key issue in e-commerce related to legal responsibilities?
Liability and contractual information.
p.24
Challenges in Cyber Law Enforcement
What is a significant resource issue faced by cyber law enforcers?
Insufficient equipment to detect cybercriminals.
p.28
Cybersecurity Initiatives in Malaysia
What is Cyber999?
A Computer Emergency Response service offered by CyberSecurity Malaysia.
p.17
Overview of E-Commerce
How is a website metaphorically described in relation to cyberspace?
It might be said to 'exist in cyberspace.'
p.2
Overview of E-Commerce
What does E-business encompass?
The entire buying, selling goods and services, servicing customers, collaborating with business partners, and conducting e-transactions within an organization.
p.22
Challenges in Cyber Law Enforcement
What is a major challenge for cyber law enforcers in identifying cybercriminals?
The investigations are equipment- and labor-intensive.
p.12
Features and Benefits of E-Commerce
How does e-commerce benefit consumers in terms of product variety?
Consumers can access a large variety of products from many countries.
p.3
Types of E-Commerce Models
What is Business-to-Government (B2G) e-commerce?
A form of B2B where government is considered as a business.
p.19
Major World Legal Systems
What is a key characteristic of Civil Law?
It is duty-based and concerned for the will of the legislature.
p.18
Introduction to Cyber Law
What types of technology does cyber law include?
The Internet and digital processing devices.
p.19
Major World Legal Systems
How does a judge operate in a Civil Law system?
The judge applies elaborate written codes to factual situations with little judicial discretion.
p.16
Overview of E-Commerce
In which publication was the term 'cyberspace' first introduced?
In the novelette 'Burning Chrome' in Omni magazine.
p.22
Challenges in Cyber Law Enforcement
What technologies do cybercriminals use to evade detection?
Encryption, route relay, and other processes.
p.32
Cybersecurity Initiatives in Malaysia
Who are the various parties MyCERT coordinates with?
Internet Service Providers, law enforcement agencies, and international incident response teams.
p.6
Types of E-Commerce Models
What is a key characteristic of C2B e-commerce?
Consumers sell goods and services to organizations.
p.26
Cybersecurity Initiatives in Malaysia
What was established during the 6th National Information Technology Council (NITC) Meeting in January 1998?
The national network security and accreditation agency.
p.3
Types of E-Commerce Models
What does B2B EC stand for?
Business-to-Business E-Commerce.
p.26
Cybersecurity Initiatives in Malaysia
What role did NISER take on in March 2007?
NISER's role was elevated to become CyberSecurity Malaysia.
p.1
Overview of E-Commerce
What is e-commerce?
E-commerce refers to the buying and selling of goods and services over the internet.
p.11
Features and Benefits of E-Commerce
What is one major benefit of e-commerce for organizations?
It expands the marketplace with minimum capital outlay.
p.17
Overview of E-Commerce
Where are events taking place on the Internet considered to occur?
In cyberspace, not in the physical locations of participants or servers.
p.30
Cybersecurity Initiatives in Malaysia
What type of assistance does MyCERT provide?
Coordinate expert advice whilst rendering remedial assistance.
p.11
Features and Benefits of E-Commerce
How does e-commerce affect customer reach for organizations?
More customers can be reached.
p.20
Major World Legal Systems
What is a key concern of Socialist Law?
Acts as they affect the state.
p.1
Major World Legal Systems
What is the significance of major world legal systems in e-commerce?
Major world legal systems provide frameworks that influence how e-commerce is conducted globally.
p.33
Digital Forensics and Incident Response
What is the systematic foundation of digital forensics methodology?
It involves digital evidence collection, preservation, analysis, and presentation.
p.31
Cybersecurity Initiatives in Malaysia
What is the role of MyCERT in Malaysia?
Acts as an independent focal point for Malaysian hosts to facilitate cooperation among local and international experts, incident response teams, vendors, clients, and law enforcement agencies.
p.22
Challenges in Cyber Law Enforcement
Why do cyber law enforcers need to act quickly?
To prevent evidence from fading away.
p.32
Cybersecurity Initiatives in Malaysia
How does MyCERT function as an intermediary?
By coordinating responses between various parties, including Internet Service Providers and law enforcement agencies.
p.20
Major World Legal Systems
Which countries primarily follow Socialist Law?
Russia and the People's Republic of China.
p.8
Types of E-Commerce Models
What is an example of C2C e-commerce?
Consumers reselling books on Lelong Malaysia.
p.24
Challenges in Cyber Law Enforcement
What is a major challenge for cyber law enforcers regarding personnel?
Insufficient trained personnel.
p.14
Overview of E-Commerce
What constitutes a body of law?
A body of rules of action or conduct prescribed by a controlling authority and having binding legal force.
p.14
Overview of E-Commerce
What are the consequences of not following the law?
Sanctions or legal consequences.
p.17
Overview of E-Commerce
What does the term 'cyberspace' refer to?
Objects and identities that exist largely within the computing network.
p.24
Challenges in Cyber Law Enforcement
Why must cyber law enforcers continuously adapt?
Because technology always evolves.
p.2
Overview of E-Commerce
What is E-Commerce (EC)?
The process of buying, selling, or exchanging products, services, and information via computer networks, mostly the Internet.
p.3
Types of E-Commerce Models
Who are the participants in B2B e-commerce?
All participants are businesses or organizations.
p.19
Major World Legal Systems
How do courts operate under Common Law?
They follow the reasoning of other courts (precedent) and interpret the law.
p.12
Features and Benefits of E-Commerce
What is a key benefit of e-commerce for consumers regarding shopping?
Consumers can shop from anywhere at any time.
p.3
Types of E-Commerce Models
Can you name examples of B2B e-commerce platforms?
Dell online, Lapasar.com, and Averest.com.my.
p.19
Major World Legal Systems
Which countries primarily use Common Law?
US, UK, Canada, Australia, Hong Kong, Malaysia, and former British colonies.
p.2
Types of E-Commerce Models
What are the main types of E-Commerce models?
C2B (Consumer to Business), B2B (Business to Business), B2C (Business to Consumer), and C2C (Consumer to Consumer).
p.17
Overview of E-Commerce
What implication does cyberspace have on national laws?
The laws of any particular nation state would not apply.
p.24
Challenges in Cyber Law Enforcement
What practical differences complicate cyber law enforcement between nations?
Differences in enforcement and coordination efforts.
p.37
Overview of E-Commerce
What is essential for ensuring safe online transactions?
Managing fraud and securing electronic transactions.
p.26
Cybersecurity Initiatives in Malaysia
What organization was created as a result of the establishment of the national network security agency?
The National ICT Security and Emergency Response Centre (NISER).
p.30
Cybersecurity Initiatives in Malaysia
What is one of the services offered by MyCERT?
Assist Internet Users Malaysians in detecting, interpreting, and responding to computer security incidents.
p.25
Cybersecurity Initiatives in Malaysia
Under which division does the TCIB operate?
The Commercial Crime Investigation Division.
p.28
Cybersecurity Initiatives in Malaysia
What type of service is Cyber Forensics?
A service offered by CyberSecurity Malaysia to investigate cyber incidents.
p.16
Overview of E-Commerce
What does the term 'cyberspace' refer to?
A common idea that can mean several different types of virtual reality.
p.28
Cybersecurity Initiatives in Malaysia
What does Security Assurance involve?
Ensuring the security of systems and data through various measures.
p.33
Digital Forensics and Incident Response
Who does CyberCSI offer digital forensics services to?
Law enforcement agencies, government agencies, organizations, and the general public.
p.16
Overview of E-Commerce
Who coined the term 'cyberspace'?
William Gibson, a Canadian science fiction writer.
p.32
Cybersecurity Initiatives in Malaysia
Which industries has MyCERT served?
Banking, finance, multinational companies, government, and education.
p.4
Types of E-Commerce Models
Name some examples of B2C E-Commerce platforms.
Lazada, Shopee, Amazon, Yahoo, and AirAsia.
p.11
Features and Benefits of E-Commerce
What inventory-related advantage does e-commerce provide?
It allows low inventories.
p.1
Introduction to Cyber Law
How do cyber laws impact cyberspace?
Cyber laws establish rules for behavior in cyberspace, ensuring security and legal compliance.
p.9
Features and Benefits of E-Commerce
What is meant by 'universal standards' in EC technology?
One set of Internet standards shared by all nations.
p.22
Challenges in Cyber Law Enforcement
What makes cybercriminals almost undetectable by law enforcers?
Their use of advanced technology and processes.
p.5
Types of E-Commerce Models
Name two examples of C2C EC platforms.
eBay.com and LelongMalaysia.com.
p.31
Cybersecurity Initiatives in Malaysia
Who can cooperate with MyCERT during a computer security incident?
Local and international experts, incident response teams, vendors, clients, and law enforcement agencies.
p.12
Features and Benefits of E-Commerce
How can e-commerce improve public services?
E-commerce can improve public services and quality of life.
p.11
Features and Benefits of E-Commerce
What communication cost benefit does e-commerce provide?
It lowers communication costs.
p.27
Cybersecurity Initiatives in Malaysia
How does CyberSecurity Malaysia aim to promote cyber security?
By nurturing a culture of cyber security among users and critical sectors.
p.9
Features and Benefits of E-Commerce
What multimedia capabilities does EC technology offer?
It allows for rich content and interaction.
p.6
Types of E-Commerce Models
Which other platforms are examples of C2B e-commerce?
Upwork.com, Etsy.com, Shutterstock.
p.34
Digital Forensics and Incident Response
What is one of the primary services offered in digital forensics?
Preservation and authentication of electronic evidence.
p.15
Overview of E-Commerce
What function of law helps to maintain existing social structures?
Maintaining the status quo.
p.15
Overview of E-Commerce
How does law contribute to societal progress?
By facilitating orderly change.
p.4
Types of E-Commerce Models
What does B2C EC stand for?
Business-to-Consumer E-Commerce.
p.30
Cybersecurity Initiatives in Malaysia
How does MyCERT help Internet Users Malaysians during a security breach?
By alerting them in the event of a security breach.
p.25
Cybersecurity Initiatives in Malaysia
What kind of assistance does the TCIB provide to overseas enforcement agencies?
Assistance in investigating online gambling, hacking, and illegal distribution of pirated software.
p.28
Cybersecurity Initiatives in Malaysia
What is the purpose of Security Management and Best Practices?
To implement effective security measures and protocols.
p.9
Features and Benefits of E-Commerce
How does EC technology facilitate communication between merchants and users?
Through interactivity, allowing two-way communication.
p.23
Challenges in Cyber Law Enforcement
What is a major challenge for cyber law enforcers when dealing with cybercriminals in different countries?
Prosecuting and imposing sentences on cybercriminals who commit crimes against information systems in Malaysia from another country.
p.11
Features and Benefits of E-Commerce
How does e-commerce enhance product offerings?
It enables customized products and services.
p.12
Features and Benefits of E-Commerce
How does e-commerce enhance information access for consumers?
Consumers can search quickly for detailed information.
p.36
Overview of E-Commerce
What was promised regarding the delivery time of the item?
The item was promised to arrive within 1 month.
p.8
Types of E-Commerce Models
How do consumers aggregate in e-commerce?
Consumers aggregate to bulk purchase from Amazon.
p.13
Types of E-Commerce Models
What is a key characteristic of traditional transactions?
Operate in a physical store.
p.11
Features and Benefits of E-Commerce
How does e-commerce contribute to customer service?
It leads to better customer service.
p.20
Major World Legal Systems
How are judges viewed in Islamic Law?
They are answerable to God.
p.35
Significance of Cyber Law
What is the biggest challenge faced by Cyber Law?
Integrating with the legacy system of laws applicable to the physical world.
p.7
Types of E-Commerce Models
What is Mobile-Commerce (M-Commerce)?
Transactions conducted in a wireless environment using smartphones.
p.27
Cybersecurity Initiatives in Malaysia
What does CyberSecurity Malaysia seek to strengthen in Malaysia?
Self-reliance in terms of technology and human resources.
p.7
Types of E-Commerce Models
What are some examples of M-Commerce transactions?
E-banking and stock market transactions via smartphone.
p.21
Malaysian Cyber Laws and Statutes
What does the Computer Crimes Act 1997 address?
It addresses offenses related to computer systems and data.
p.29
Cybersecurity Initiatives in Malaysia
Who manages and coordinates the incident response services in Malaysia?
Malaysian Computer Emergency Response Team (MyCERT).
p.21
Malaysian Cyber Laws and Statutes
What does the E-Commerce Act 2006 facilitate?
It facilitates and regulates electronic commerce activities.
p.25
Cybersecurity Initiatives in Malaysia
What type of training do officers in the TCIB receive?
Special training in cybercriminal investigation methods.
p.1
Introduction to Cyber Law
What are cyber laws?
Cyber laws are regulations that govern the use of the internet and digital technologies.
p.18
Introduction to Cyber Law
What does cyber law encompass?
A wide variety of legal issues related to the use of communications technology.
p.4
Types of E-Commerce Models
What is the primary focus of B2C E-Commerce?
Online businesses selling to individual shoppers.
p.11
Features and Benefits of E-Commerce
What impact does e-commerce have on information costs?
It decreases the cost of creating, storing, retrieving, and distributing information.
p.28
Cybersecurity Initiatives in Malaysia
What role does Training and Outreach play in CyberSecurity Malaysia?
To educate and raise awareness about cybersecurity issues.
p.5
Types of E-Commerce Models
What does C2C EC stand for?
Consumers selling to other consumers.
p.31
Cybersecurity Initiatives in Malaysia
How does MyCERT help minimize damage from cyber attacks?
By rapidly analyzing solutions to prevent further unauthorized activity and mitigate damage.
p.23
Challenges in Cyber Law Enforcement
Why is the harmonisation of a cyber law framework important?
Because the Internet is borderless and does not respect the laws of sovereign nations.
p.4
Types of E-Commerce Models
What types of services do B2C E-Commerce include?
Portals, online retailers, content providers, transaction brokers, market creators, service providers, and community providers.
p.9
Features and Benefits of E-Commerce
How does EC technology contribute to cost reduction?
By reducing information costs and raising quality.
p.27
Cybersecurity Initiatives in Malaysia
What is CyberSecurity Malaysia?
The national reference and specialist centre for cyber security under the Ministry of Science, Technology and Innovation (MOSTI).
p.20
Major World Legal Systems
In which countries is Islamic Law (Sharia Law) primarily practiced?
Iran, Iraq, Saudi Arabia, and Pakistan.
p.27
Cybersecurity Initiatives in Malaysia
What is the primary aim of CyberSecurity Malaysia?
To reduce the vulnerability of ICT systems and networks.
p.20
Major World Legal Systems
What is a characteristic of 'modern' Middle Eastern countries regarding law?
They mix Islamic and Civil law, e.g., Egypt.
p.20
Major World Legal Systems
What legal systems are combined in Pakistan?
Common law and Islamic law.
p.15
Overview of E-Commerce
What function of law aims to ensure fairness in society?
Promoting social justice.
p.21
Malaysian Cyber Laws and Statutes
What is the purpose of the Personal Data Protection Act 2010?
To protect personal data and privacy of individuals.
p.13
Types of E-Commerce Models
What is a financial advantage of electronic transactions?
Less investment and small fixed cost.
p.22
Challenges in Cyber Law Enforcement
How do cybercriminals operate differently from traditional criminals?
They operate in a virtual world and do not leave physical clues or paper trails.
p.12
Features and Benefits of E-Commerce
What financial advantage does e-commerce typically offer consumers?
Consumers usually pay less.
p.9
Features and Benefits of E-Commerce
What does the term 'ubiquity' refer to in the context of EC technology?
The availability of technology everywhere and at any time.
p.12
Features and Benefits of E-Commerce
What customization option do consumers have in e-commerce?
Consumers can get customized products and services.
p.31
Cybersecurity Initiatives in Malaysia
What may prompt MyCERT to publish new advisories?
New trends of security incidents.
p.20
Major World Legal Systems
What does 'Islam' mean?
Submission to Allah’s will.
p.16
Overview of E-Commerce
How is 'cyberspace' primarily used today?
In a primarily metaphoric sense, mostly associated with the Internet.
p.7
Types of E-Commerce Models
How do peer computers interact in P2P technology?
They share and process files between each other.
p.6
Types of E-Commerce Models
What is meant by 'demand aggregate' in C2B?
Consumers group together to request services through public sites.
p.35
Significance of Cyber Law
What factors can lead to conflicts when viewing the rights of Netizens?
Factors such as Sex, Age, etc.
p.34
Digital Forensics and Incident Response
What type of analysis is performed on computer hard drives in digital forensics?
Analysis of computer hard drives and other electronic media.
p.29
Cybersecurity Initiatives in Malaysia
What is one of the core competencies of CyberSecurity Malaysia?
Computer Emergency and Incident response.
p.21
Malaysian Cyber Laws and Statutes
What is the significance of the Digital Signature (Amendment) Act 2001?
It amends provisions related to digital signatures for better clarity and enforcement.
p.8
Types of E-Commerce Models
What is an example of B2C e-commerce?
Consumers buying thousands of books from Amazon.
p.1
Malaysian Cyber Laws and Statutes
What role do Malaysian cyber laws play in e-commerce?
Malaysian cyber laws regulate online transactions and protect consumers in Malaysia.
p.33
Digital Forensics and Incident Response
What are the core services of CyberSecurity Malaysia?
Digital forensics services through CyberCSI.
p.18
Introduction to Cyber Law
What are some key areas covered by cyber law?
Intellectual property, privacy, and jurisdiction.
p.36
Overview of E-Commerce
How did the buyer pay for the item on e-Bay?
Using a Maybank credit card via PayPal.
p.19
Major World Legal Systems
Which regions primarily follow Civil Law?
Europe, Japan, and Germany.
p.18
Introduction to Cyber Law
What forms the basis of cyber law?
State and federal constitutional, statutory, and case law.
p.18
Introduction to Cyber Law
How does cyber law relate to traditional laws?
It builds on traditional laws that apply to brick-and-mortar companies.
p.6
Types of E-Commerce Models
How do consumers participate in C2B e-commerce?
By requesting specific services from businesses.
p.18
Introduction to Cyber Law
What is a significant aspect of cyber law regarding freedom?
It addresses issues of privacy and freedom of expression.
p.31
Cybersecurity Initiatives in Malaysia
What is a key function of MyCERT in response to security incidents?
Conducting vital technical and remedial action at affected sites.
p.9
Features and Benefits of E-Commerce
How does EC technology enhance the quality of information?
By increasing information density and quality.
p.15
Overview of E-Commerce
How does law influence societal values?
By shaping moral standards.
p.7
Types of E-Commerce Models
What payment methods can be used in M-Commerce?
TnG, Grab, FPX, Duitnow, etc.
p.15
Overview of E-Commerce
How does law assist in resolving disputes?
Providing a basis for compromise.
p.35
Significance of Cyber Law
What is a significant characteristic of Cyber Space?
It has no geographical boundaries.
p.36
Overview of E-Commerce
What issue did the buyer encounter after receiving the item?
The item was not as described on e-Bay.
p.35
Significance of Cyber Law
What conflict is highlighted in the context of Cyber Law?
The conflict between Trademark Laws and the system of Domain Names.
p.7
Types of E-Commerce Models
What types of digital products can be exchanged using P2P technology?
Music, videos, software, games, and other digital products.
p.21
Malaysian Cyber Laws and Statutes
What is the purpose of the Trade Marks Act 1976?
To regulate the registration and protection of trademarks in Malaysia.
p.36
Introduction to Cyber Law
Is cyber law relevant in resolving the issue with the e-Bay purchase?
Yes, it may be relevant depending on the circumstances.
p.21
Malaysian Cyber Laws and Statutes
What does the Patents Act 1983 cover?
It governs the protection of inventions and patents in Malaysia.
p.21
Malaysian Cyber Laws and Statutes
What is the significance of the Digital Signature Act 1997?
It provides legal recognition for digital signatures in electronic transactions.
p.34
Digital Forensics and Incident Response
What can be recovered in digital forensics?
Deleted files, partitions, and formatted drives.
p.29
Cybersecurity Initiatives in Malaysia
What type of issues does MyCERT help Malaysian Internet users with?
Computer abuses and information security breaches.
p.34
Digital Forensics and Incident Response
What role can digital forensics experts play in legal proceedings?
Expert witness testimony.
p.23
Challenges in Cyber Law Enforcement
What complicates the prosecution of cybercriminals operating internationally?
The lack of a unified legal framework across different countries.
p.12
Features and Benefits of E-Commerce
What societal benefit does e-commerce provide in terms of traffic?
E-commerce leads to less traffic and pollution.
p.8
Types of E-Commerce Models
What is the relationship in B2B e-commerce?
Business originating from one business and selling to another.
p.36
Overview of E-Commerce
What options does the buyer have to resolve the issue?
Ask e-Bay, the bank, or PayPal for assistance.
p.13
Types of E-Commerce Models
What is a limitation of traditional transactions?
Time and place limitation.
p.29
Cybersecurity Initiatives in Malaysia
What is MyCERT?
Malaysian Computer Emergency Response Team.
p.27
Cybersecurity Initiatives in Malaysia
What role does CyberSecurity Malaysia serve in the national context?
It acts as a one-stop coordination centre for all national cyber security initiatives.
p.21
Malaysian Cyber Laws and Statutes
What is the focus of the Copyright Act 1987?
To protect the rights of creators of original works.
p.21
Malaysian Cyber Laws and Statutes
What does the Communications and Multimedia Act 1998 regulate?
It regulates the communications and multimedia industry in Malaysia.
p.29
Cybersecurity Initiatives in Malaysia
What is the primary role of MyCERT?
To serve Internet users in Malaysia in dealing with computer security incidents.
p.21
Malaysian Cyber Laws and Statutes
What does the Trade Marks Act 2019 update?
It updates the provisions related to trademark registration and protection.
p.15
Overview of E-Commerce
What is a key function of law regarding personal liberties?
Maximizing individual freedom.