Data leak, critical information infrastructure and the legal options: what does Wikileaks teach us?
The massive data leaks by Wikileaks suggest how fragile a national security is from the perspective of information system and network sustainability. What Wikileaks have done and achieved raises some causes of concern. How do we view such leaks? Are they an act of whistle-blowing or disclosure of go...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
The Society of Digital Information and Wireless Communications (SDIWC)
2012
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/27232/ http://irep.iium.edu.my/27232/ http://irep.iium.edu.my/27232/1/IJCSDF_2012_Wikileaks.pdf |
id |
iium-27232 |
---|---|
recordtype |
eprints |
spelling |
iium-272322014-05-30T08:17:05Z http://irep.iium.edu.my/27232/ Data leak, critical information infrastructure and the legal options: what does Wikileaks teach us? Abdul Ghani Azmi, Ida Madieha Zulhuda, Sonny Jarot, Sigit Puspito Wigati K Law (General) T58.5 Information technology The massive data leaks by Wikileaks suggest how fragile a national security is from the perspective of information system and network sustainability. What Wikileaks have done and achieved raises some causes of concern. How do we view such leaks? Are they an act of whistle-blowing or disclosure of government misconduct in the interest of the public? Are they the champion of free press? Or are they a form of data breach or information security attack? What if it involves the critical information infrastructure (CII)? Could they be classified as ‘cyber-terrorist’? The objective this paper is to outline the problems and challenges that Malaysia should anticipate and address in maintaining its national CII. The paper first looks at Wikileaks as it is the ‘icon’ of data leaks. Then it examines the causes of data breach before proceeding to foray into the concept of ‘critical information infrastructure’ in the US and Malaysia. Finally, the paper explores legal options that Malaysia can adopt in preparing herself to possible data breaches onslaught. It is the contention of the paper that the existing traditional legal framework should be reformed in line with the advances of the information and communications technologies, especially in light of the onslaught of data leaks by the new media typically represented by Wikileaks. The Society of Digital Information and Wireless Communications (SDIWC) 2012-11 Article PeerReviewed application/pdf en http://irep.iium.edu.my/27232/1/IJCSDF_2012_Wikileaks.pdf Abdul Ghani Azmi, Ida Madieha and Zulhuda, Sonny and Jarot, Sigit Puspito Wigati (2012) Data leak, critical information infrastructure and the legal options: what does Wikileaks teach us? International Journal of Cyber-Security and Digital Forensics (IJCSDF), 1 (3). pp. 226-231. ISSN 2305-0012 http://sdiwc.net/digital-library/web-admin/upload-pdf/00000312.pdf |
repository_type |
Digital Repository |
institution_category |
Local University |
institution |
International Islamic University Malaysia |
building |
IIUM Repository |
collection |
Online Access |
language |
English |
topic |
K Law (General) T58.5 Information technology |
spellingShingle |
K Law (General) T58.5 Information technology Abdul Ghani Azmi, Ida Madieha Zulhuda, Sonny Jarot, Sigit Puspito Wigati Data leak, critical information infrastructure and the legal options: what does Wikileaks teach us? |
description |
The massive data leaks by Wikileaks suggest how fragile a national security is from the perspective of information system and network sustainability. What Wikileaks have done and achieved raises some causes of concern. How do we view such leaks? Are they an act of whistle-blowing or disclosure of government misconduct in the interest of the public? Are they the champion of free press? Or are they a form of data breach or information security attack? What if it involves the critical information infrastructure (CII)? Could they be classified as ‘cyber-terrorist’? The objective this paper is to outline the problems and challenges that Malaysia should anticipate and address in maintaining its national CII. The paper first looks at Wikileaks as it is the ‘icon’ of data leaks. Then it examines the causes of data breach before proceeding to foray into the concept of ‘critical information infrastructure’ in the US and Malaysia. Finally, the paper explores legal options that Malaysia can adopt in preparing herself to possible data breaches onslaught. It is the contention of the paper that the existing traditional legal
framework should be reformed in line with the advances of the information and communications technologies, especially in light of the onslaught of data leaks by the new media typically represented by Wikileaks. |
format |
Article |
author |
Abdul Ghani Azmi, Ida Madieha Zulhuda, Sonny Jarot, Sigit Puspito Wigati |
author_facet |
Abdul Ghani Azmi, Ida Madieha Zulhuda, Sonny Jarot, Sigit Puspito Wigati |
author_sort |
Abdul Ghani Azmi, Ida Madieha |
title |
Data leak, critical information infrastructure and the legal options: what does Wikileaks teach us? |
title_short |
Data leak, critical information infrastructure and the legal options: what does Wikileaks teach us? |
title_full |
Data leak, critical information infrastructure and the legal options: what does Wikileaks teach us? |
title_fullStr |
Data leak, critical information infrastructure and the legal options: what does Wikileaks teach us? |
title_full_unstemmed |
Data leak, critical information infrastructure and the legal options: what does Wikileaks teach us? |
title_sort |
data leak, critical information infrastructure and the legal options: what does wikileaks teach us? |
publisher |
The Society of Digital Information and Wireless Communications (SDIWC) |
publishDate |
2012 |
url |
http://irep.iium.edu.my/27232/ http://irep.iium.edu.my/27232/ http://irep.iium.edu.my/27232/1/IJCSDF_2012_Wikileaks.pdf |
first_indexed |
2023-09-18T20:40:31Z |
last_indexed |
2023-09-18T20:40:31Z |
_version_ |
1777409333437399040 |