Professional Documents
Culture Documents
OUMH1203
MATRICULATION NO : 960112145975001
IC NO. : 960112145975
TELEFON NO. : 010 2501128
E-MAIL : shankaran96@oum.edu.my
No Title Page
4.0 Conclusion 9
5.0 Reference 10
2
TITLE
- Social Medial Brings More Harm Than Good
INTRODUCTION
- Introduction to the Internet and a detailed introduction on the thesis statement
- Some of the key people involved in the thesis statement
Type 1
Type 2
Type 3
Type 4
CONCLUSION
REFERENCE
3
The Internet is a powerful global media that has great potential to dominate the
entire world. The existence of the Internet plays a very important role in the world of
communication and information. This is because the Internet is used as a medium for delivery
and acquiring information. With the Internet, we humans also get to enjoy two different
worlds; the real world and the virtual world where we get to be anything or anyone we desire.
With search engines such as Google, Yahoo, Ask and video sharing sites such as
YouTube, we have the means of literally having the world at our finger tips.
But with all these said, the growing cyber world also brings many negative effects
to us Internet users such as cyber crime and internet scams.
For example, based on statistical reports issued by the RMP's Commercial Crime
Investigation Department (CCID) Criminal Investigation Division Cyber and Multimedia
PDRM, a case of cyber love fraud or better known as African Scams are in a state of alarm.
The number of these fraud cases increased in 2019 at which cases were reported as many as
1095 cases compared to only 814 cases in 2018.
The question is, do parents fulfil their responsibilities to their children in this context?
Another point, peers as socializing agents are also very important to enhance the level of
awareness and practices of cyber security among consumers. An individual will feel more fun
together with friends because they get to enjoy hanging out, gossiping, joking and so on. In
4
progress the upbringing of a child to adolescence, morals and activities taught by parents will
also be influenced by peers. Therefore, the selection of peers also plays an important part in
the process of self-formation of an individual.
Peers play the function of a family successor. This is because, when parents are busy
with work affairs then children will find peers to ask questions and discuss stuff. In addition,
peers also serve as a group reference where in the process of raising a child or adolescent
often is by comparing themselves with peers and at one level children or adolescents will
change their behaviour along with their peers. Furthermore, peers are also always counsellors
where they seek views and advice on something.
In the context of cyber security, friends or peers should be used as a platform to increase the
level of awareness about cyber security. This is because they have the opportunity to share,
advice and chat amongst themselves on aspects of cyber security such as advice on usage
antivirus, dissemination of false information and so on. However, it is now becoming a
question to the extent to which these peers play a role in providing awareness about cyber
security?
5
In general, Internet Fraud or Cyber Crime can be categorized as one of the crimes of
the virtual world that cunningly cannot be identified by current internet technology users.
Technology and communication facilities today make it easy for users to do a lot of daily
business with using just fingertips. Nevertheless, this facility has created many types of
scams in the virtual worlds by parties who are only interested in their own profit. The types of
internet scams that exist are mostly unnoticed by the victims. In fact, the majority of victims
are fed with lucrative rewards which are only intended to trap the victim to invest money
without any interest. Internet scams nowadays have also been identified as increasingly
cunning and sophisticated because there are various types of scams that have been committed
in society.
6
want to profit from every loan offered. So, it is impossible for companies to provide
their services without expecting a profit.
3.2 Phishing
‘Phishing’ is the act of stealing someone’s personal data or biodata,
starting from the full name, date of birth, mother's name, and victim’s address up to
the victim's identity number. The purpose of "phishing" is to access the victim's bank
pin number, or to deliver something which is defamatory by using the identity of the
said victim. ‘Phishing’ is usually side by side with ‘spam’ or in other words
‘spammer’ which launches attacks to thousands to millions of prospective victims via
e-mail or telephone claiming to be insurance officers, employees banks, and various
parties who according to the victim have the right to request all the victim's personal
data.
- Post pictures of handsome men or sexy women and claim it’s them.
- Disguised as a widower who is newly divorced and wants to find a life partner.
- Have a great and successful career.
- A former refugee.
- Fake social site accounts.
7
- Take a long time to reply to messages.
- Try to avoid communication via computer webcam.
- Use sentences to seduce.
- Promise marriage.
- Promise to send a package containing special gifts.
- Promise to come to Malaysia to meet the victim and their families.
- Using a third party account (owned by a local).
- The victim is asked to pay for the package to be sent.
- Asking for money even though never met the victim.
8
4.0 Conclusion
Malaysia is indeed proud if its people that are IT literate but at the same time they
are too need to be IT-related security literacy. Technology will continue to evolve and
criminals will always looking for new ways to commit crimes with the help of such
technology. Sometimes the crime that occurs is due to the actions of the individual himself.
Facebook users can avoid becoming a victim of cyber spying among their cyber partners if
they are smart in using this social networking site. Among the actions that can be taken by
them are to avoid using the original identity when registering on Facebook because the
revelation of real identity can make them easily recognizable by cyber spies, do not post
personal photos or complete personal information, avoid meeting in person face to face with
new acquaintances of cyber, using social sites for that purpose beneficial only and choose a
social partner by controlling the cyber partner's environment be required. Indeed the wise use
by social site users can be a barrier to cybercrime.
We hope that the crime scene that occurs in foreign countries does not occur in
Malaysia due to self-forgetfulness. Cyber spying crime can actually be avoided. Because of
the negative effects of using this social site, parents need to equip themselves with adequate
knowledge so that their children do not become the future of technological sophistication
today. Parents can play a role in restraint abuse of social sites by their children by means of
monitoring children. Lack of parental monitoring of children will invite problems that are
expected in the future such as running away from home by following social friends and so on.
In the context of the use of social media among teenagers today, parents can play an effective
role in preventing them from becoming victims of this new crime. Parents can ASK to be
friends on their children's Facebook. Indirectly, they will find out the extent to which their
children are involved in relationships in this virtual world. In addition that is, they can also
find out who their children's friends are. Even so, it is quite difficult to implement if children
use names other than real names and theirs do not want parents to be their cyber friends.
9
5.0 REFERENCE
https://www.thestar.com.my/news/regional/2019/04/05/nigerian-and-malaysian-arrested-
over-11-internet-love-scams
https://www.nst.com.my/news/crime-courts/2019/04/481918/woman-loses-rm16-million-
love-scam
10