-
1
Cryptographic Algorithm Using Matrix Inversion as Data Protection
Published 2011Get full text
Article -
2
Smart home user's information in cloud system: A comparison between Malaysian personal data protection act 2010 and EU general data protection regulation
Published 2017“…However, immense of benefits offered by the cloud system are associated with numbers of uncertainties which has created the issue of confidentiality and data safety.This article adopts doctrinal legal study that analyses the Personal Data Protection Act 2010 on the aspect of protection conferred to the cloud users and with reference to additional point that is well addressed in European Union General Data Protection Regulation.The overall finding shows that there is still loopholes in the Act which need to be looked into for the purpose of improving as well as to cater the needs of legal policy in protecting personal data of smart home users in cloud.…”
Get full text
Article -
3
Smart Home Users’ Information in Cloud System: A Comparison Between Malaysian Personal Data Protection Act 2010 And EU General Data Protection Regulation
Published 2017“…This article adopts a doctrinal legal study that analyses the Personal Data Protection Act 2010 on the aspect of protection conferred to cloud users and with reference to an additional point that is well addressed in the European Union General Data Protection Regulation. …”
Get full text
Article -
4
Personal Data Protection Act 2010: Protection of Smart Home Users’ Information in Cloud System
Published 2016“…This article adopts doctrinal legal study that analyzes the Personal Data Protection Act 2010 on the aspect of protection conferred to the cloud users.The overall finding shows that there is still loopholes in the Act which need to be looked into for the purpose of improvement as well as to cater the needs of legal policy in protecting personal data of smart home users in cloud.…”
Get full text
Conference or Workshop Item -
5
Identifying barriers to data protection and investor privacy in equity crowdfunding: Experiences from Indonesia and Malaysia
Published 2022“…This study aimed to examine the barriers faced in data protection and privacy related to equity crowdfunding in Indonesia and Malaysia. …”
Get full text
Get full text
Article -
6
E-commerce and data protection legal framework in Malaysia: Lessons from the experiences of the European Union and the United Kingdom
Published 2006“…This paper is drawn from an ongoing doctoral research which is aimed at evaluating the state of global data protection legal framework from various regional and national perspectives and identifying a viable model for a comprehensive data protection law viable for Malaysia, that would enable the reconciliation of conflicting interests between the policy maker, organization and society, as well as between individual information privacy and trade interest.Examination into the Malaysian proposed Bill on Personal Data Protection, the European Union’s Directive 95/46/EC and the Data Protection Act in United Kingdom in 1998 will be made.…”
Get full text
Conference or Workshop Item -
7
Understanding GDPR: Its legal implications and relevance to South Asian Privacy Regimes
Published 2022“…Emerging as a buzzword, the General Data Protection Regulation (GDPR) has had immense implications on global data protection regimes. …”
Get full text
Get full text
Article -
8
Privacy protection legislative scenario in select countries
Published 2016“…One of the greatest challenges faced by privacy and data protection professionals is demonstrating that their organizations have complied with the requirements of the various laws governing the handling of personal data. …”
Get full text
Article -
9
Transborder data flows: Protection of medical tourist personal data in Malaysia and Indonesia
Published 2022“…It was found that the need for personal data protection is a necessity since boundaries among jurisdictions are becoming “borderless”. …”
Get full text
Article -
10
Secured MyVirtualPDA using advanced encryption standard
Published 2009“…As the writing of secret message cryptography, also known as science and mathematical lock and key (Schafer, 2003), evolved people rely on the encryption process to increase their level of data protection.…”
Get full text
Article -
11
Equity Crowdfunding Vs Cybercrime: A Legal Protection
Published 2022“…The study found that there are numerous legal problems concerning ECF Company in Malaysia; Issuers and Recognized Market Operator contracts, privacy and personal data protection, cybercrime, compliance with public offering rules and guidelines, and registration procedures and their challenges. …”
Get full text
Article -
12
Workplace privacy in Malaysia: A legal comparison
Published 2008“…Furthermore, the Malaysian Federal Constitution does not specifically recognise privacy as one of the fundamental rights and the Personal Data Protection Bill is yet to be enforced. As such, this paper will discuss the extent of protection available to the workers relating to their privacy under related laws in Malaysia.…”
Get full text
Book Section -
13
Protection of children's online privacy in Malaysia
Published 2017“…Moreover, children are unconcern with their privacy, or do not know how to protect their informational privacy and data protection which are of concern to adults (Allen, 2001) and they are unaware the consequence and the impact of revealing their personal information, either their own data or their family data. …”
Get full text
Conference or Workshop Item -
14
A new secure proxy-based distributed virtual machines management in mobile cloud computing
Published 2019“…Nevertheless, the existing cloud virtualization systems are not secure enough regarding the mediocre degree of data protection, which avoids individuals and organizations to engage with this technology. …”
Get full text
Article -
15
An assessment of privacy regime in Bangladesh: A legal analysis
Published 2022“…This article concluded by offering some workable suggestions, and especially, urged for enacting comprehensive data protection legislation in Bangladesh. Presumably, this research will enlighten all stakeholders regarding an overall picture of the privacy protection regime of Bangladesh. …”
Get full text
Get full text
Article -
16
Privasi di Tempat Kerja: Tinjauan Dari Sudut Perundangan di Malaysia
Published 2019“…The Malaysian Federal Constitution does not specifically recognize privacy as a fundamental right, while the Personal Data Protection Act 2010 only protects the handling of personal data in commercial transactions. …”
Get full text
Article