Evolution of Malaysian Cyber Laws and Mechanism for Secured Online Transactions

Yusuf Ibrahim Arowosaiye


Penelitian ini dimaksudkan untuk mendeskripsikan tentang kerangka hukum pengaturan hukum siber dan mekanisme pengamanan transaksi online di Malaysia. Pendekatan analisis adalah perundang-undangan mengenai konsep perlindungan dan proteksi transaksi online. Secara komprehensif pembahasan dilakukan dengan melihat secara historis perjalanan hukum siber di Malaysia sampai pada perkembangan mutakhir. Hasil kajian ini menunjukkan bahwa kemajuan sistem hukum siber Malaysia diarahkan untuk mendukung Visi global 2020 untuk menjadikan Malaysia sebagai salah satu kekuatan dunia dalam kemajuan teknologi informasi, sehingga berbagai produk hukum dibidang teknologi informasi diarahkan menuju tercapainya visi tersebut.


Malaysian Cyber Law; online transaction; information technology

Full Text:



Abdullah, O.Y. 1996. Malaysian Plan for Technology Change. Australian Accountant.

Ali, A.H. Towards Malaysia’s Knowledge Empowerment in the 21st Century in Building Knowledge Society: Access, Empowerment and Governance, MIMOS. Also available at http://www.nite.org.my.

Ariff, I. and Chuan, G.C. 1998. Multimedia Super Corridor. Leeds Publications.

Barlow J. 1994. Selling Wine without Bottles: The Economy of Mind on the Global Net. http://www.eff.org/pub/intelllectual- property/idea-economy.article

David I. Bainbridge, Introduction to Computer Law, Pearson Education, England, 2000, 4th edition, 307, and 310.

Ida Madieha bdul Ghani Azmi. 2002. Digital Technology, Copyright and Education: The Malaysian Perspective. IIUM Law Journal 10 (1).

Jalil, Md. A. 2002. The Impact of Hacking and other Computer Related Offences on the Growth of Electronic Commerce. IIUM Journal 10 : 155 – 177.

John, K.K.. The Malaysian Growth with Equity (GEM) Story: Leaping to a K-Society. Paper presented at the Asian Development Bank 3rd Annual Meeting of Board of Governors, Hawaii, 7th May, 2001. Also available at http://www.nitc.org.my

Mahathir bin Mohamad, the former Prime Minister of Malaysia, in a book titled “Cyber Law: Policies and Challenges” by the author Abu Bakar Munir, (Malaysia: Butterworth Asia,19999).

Malaysia’s Multimedia Super Corridor, An IFTP NG9.4 Position Paper, October, 1998 by Roger W. Harris and Faculty of Information Technology, University Malaysia Sarawak. See http://is2.lse.ac.uk/ifipwg94/pdfs/malaymsc.pdf. Accessed on 12th June, 2010.

Michael L. Closen and R. Jason Richard. 1997. Notaries Public- Lost in Cyberspace, Key Business Professionals of the Future. The John Marshall Journal of Computer & Information Law xv (4).

Munir, A.B. Cyber Law : Policies and Challenges, Butterworths Assia, 1999.

Puteri Nemie Jahn Kassim. 2008. The Development E-medicine in Malaysia and Ethical Implications. (Unpublished Article), Accepted for publication in the next edition International Medical Journal.

Sagal, P.S. 2001. Electronic Commerce Law in Malaysia. Journal of Law and Information Science 11(1).

Supt Lm Hong Shuan, White –Collar Crime in Malaysia, available at http://mpk.rmp.gov.my/jurnal/2005/whitecollarcrime.pdf. Accessed on 12th May, 2010.

Surin, A.J, Cyberlaw and its Implications, Pelanduk Publications, Selangor- Malaysia, 2006, 1.

Tipton. F. 2002. Bridging the Digital Divide in Southeast Asia: Pilot Agencies and the Policy Implementation in Thailand, Malaysia, Vietnam and the Philippines. ASEAN Economic Bulletin.

Yuhai Tu. 2000. How Robust is the Internet?. Nature 406 (6794) : 353.

Zaiton Hamin. 2004. The Legal Response Computer Misuse in Malaysia – The Computer Crimes Act 1997. UiTM Law Review 2.

Section 3 Malaysian Computer Crimes Act 1997

Section 4 Malaysian Computer Crimes Act 1997

Section 5 Malaysian Computer Crimes Act 1997

Section 6 Malaysian Computer Crimes Act 1997

Section 7 Malaysian Computer Crimes Act 1997

DOI: https://doi.org/10.15294/pandecta.v8i2.2679


  • There are currently no refbacks.