Sonny Zulhuda

Sonny Zulhuda
International Islamic University Malaysia | iium · Department of Civil Law

PhD (Law)

About

39
Publications
27,412
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
256
Citations
Introduction
Sonny Zulhuda does research in Cyberlaw, Data Protection and IT Governance. He is now an Associate Professor at the Faculty of Law (Ahmad Ibrahim Kulliyyah of Laws), International Islamic University Malaysia (IIUM). He blogs at

Publications

Publications (39)
Article
Full-text available
This paper examines the connection between the use of tracing applications such as those in the COVID-19 pandemic and the legal issues pertaining to privacy and data protection. It explores how various contact tracing app designs might either mitigate or increase the risks of privacy infringement and personal data breaches. It finds that the COVID-...
Article
Full-text available
Decentralized cryptocurrencies, such as bitcoin, use peer-to-peer software protocol, disintermediating the traditional intermediaries that used to be banks and other financial intermediaries, effectuating cross-border transfer. In fact, by removing the requirement for a middleman, the technology has the potential to disrupt current financial transa...
Article
Background Indonesia currently could not make it to the top ten global halal due to some external and internal factors, although it is the largest Muslim country. In the external sector, the competition map is getting tougher, while internally, there are handicaps in the form of weak public awareness of competition. As a country with the largest Mu...
Article
Full-text available
This study examines the anti-corruption movement's effect on state officials' asset reporting in Indonesia and China. The purpose of this study is to explore the impact of asset reporting on the level of corruption in Indonesia and compare the impact of asset disclosure on the level of corruption in China. The method used in this study is the norma...
Article
Full-text available
This study investigates the Indonesian Anti-Dumping Committee's role and legal efforts in addressing dumping practices within the context of Indonesia's membership in the World Trade Organization (WTO) and adherence to the General Agreement on Tariffs and Trade (GATT). Previous research has demonstrated the existence of dumping in imported polyeste...
Article
Full-text available
Over recent decades, the boom in information and communication technologies (ICTs) has brought completely new ways of establishing and maintaining relationships. Nevertheless, in very different ways, people are vulnerable to multiple forms of violence that threaten their physical and psychological integrity. Various media and new technologies are e...
Article
Many facts of disputes between creditors and debtors regarding the excesses of fiduciary guarantees and the existence of a decision of the Constitutional Court, which changed the legal provisions regarding the execution of fiduciary securities. This research aims to determine how clauses concerning an agreement over a breach of contract are outline...
Article
Introduction Recently, artificial intelligence (AI) has brought a paradigm transformation in health care. Although the concept of AI is not new, increasing computational power together with the huge volume of data generated through various sources opens up whole new opportunities for health care providers to unravel the full potentiality of AI in p...
Article
Full-text available
The present unbridled advancement in the field of information and communication technology has resulted in individuals being thrust at a crossroad, where refusing to sacrifice one’s privacy would mean the denial of technological benefits. Concern for privacy begins once a child is born into this world where the right to privacy could now be argued...
Article
Full-text available
Juridically, the laws and regulations have weakened the Indonesian Waqf Board (BWI) in the regulation of waqf, so that the set goals of the Indonesian Waqf Board have not fully achieved, including advancing and developing national waqf. The overlapping management and supervision of waqf by other institutions is suspected of causing BWI’s duties and...
Presentation
Full-text available
The Outline of the Presentation • An Introduction • An Overview of the Roadmap • Security & Privacy as Emerging Legal Issues • Current Legal Response • Concluding Remarks
Article
Full-text available
Easy accessibility of electronic devices connected to the internet and the widespread usage of the internet in every aspect of modern lives have made the use of social media an indispensable part of society. These technologically driven and completely-internet dependence means of living have brought detrimental implications as much as they have ben...
Article
Full-text available
The Internet of Things (IoT) is an emerging technology of the 21st century. It is described as the first real evolution of the Internet that could positively or negatively affect all aspects of life. The basic idea of the IoT revolves around connecting things and objects (persons, animals, cars, trees, etc.) to the Internet and enabling them to com...
Chapter
Full-text available
‘Information asset’ has not been perceived only as a jargon of the information age we are living today. Rather, it has increasingly become the reality, where people and society attach more values on business information and information system. The contemporary ‘information age’ is, therefore, not merely about a change of gadgets, but more so about...
Article
Full-text available
The purpose of this study is to examine and to analyze the construction of social functions of Intellectual Property Rights. Furthermore, it is also intended to know the urgency of social functions of Intellectual Property Rights and to reconstruct the social function of Intellectual Property Rights based on the value of Justice. The method used wa...
Article
Full-text available
The adoption of electronic voting has been done in various countries related to cost and time reduction operationally. On the other hand, recent publication has been informed several issues occurred such as technicality, reliability, security and privacy due to the compromised system were used. In small scale, there are certain group of people who...
Article
Full-text available
Cryptocurrency, like Bitcoin, is a digital currency in which encryption techniques are used to regulate the generation of units of currency and verify the transfer of funds, operating independently of a central bank. It is an emerging financial technology enabled by innovation, increasingly popular among global Internet users, and more interestingl...
Conference Paper
The myriad of successive technological waves has affected social lives and challenged legal norms in modern societies. The Internet of Things (‘IoT’) is one of those technological waves and is considered by many as the first real evolution of the Internet. It is about the digitization of physical things and objects, which enable them to communicate...
Article
Full-text available
In general, electronic election as the technology advancement offers the opportunities to reduce the time and budget of implementation which present the greater advantages than traditional approach. It seeks establish the privacy framework in the context of electronic voting that aligns with the mutual comprehension of relevant factors and measures...
Conference Paper
The rapid growth of computer technologies has resulted in a corresponding increase in the creation of new loopholes in systems which eventually might result in data leak. Data leakage is an incident in which sensitive information is released to any unauthorized party intentionally or unintentionally. There is a large set of software available which...
Conference Paper
Full-text available
Nowadays, in a highly computerized system, people have tendency to have not expect privacy to be maintained and continue in its current form if individual control is required and monitored. Especially, in contemporary campaigns for higher office, the candidates often use mass media to deliver political message or having certain campaign developed b...
Conference Paper
Full-text available
The strongest benefit has been offered for the implementation of electronic voting related to cost and time reduction. Therefore, recent publicity concerning the reliability, security and privacy issue of various e-voting systems has increased public scrutiny of the machines themselves as well as the election process as a whole. In the greater scal...
Article
Full-text available
People today live in a connected environment that can negatively or positively affect almost all aspects of life. The Internet of Things (IoT) is a term used to describe the ubiquitous smart devices that can connect to the Internet. The IoT was described by advocates as “the first real evolution of the Internet” that can improve the way people live...
Article
Full-text available
Many hypes are currently surrounding the “datafication” such as the Big Data, Cloud and BYOD. The proliferation of data from ubiquitous sources is often not counter-balanced with adequate awareness and prudent risk management by the end-users, making it easier for others to take advantage of the new technology and reap from the abundant data availa...
Article
Full-text available
ABSTRACT Identity theft is one of the crimes that threaten both society and individuals. Millions of people have been badly affected by identity theft following misuse of their identities by criminals. The term ‘identity theft’ is used to include all illicit activities (gathering, utilising, buying selling, etc.) that target personal information (i...
Conference Paper
Full-text available
The aim of this paper is to explore on essential factors that influence the decision of eligible voters to cast their vote during the general election if it is conducted as electronic voting (e-voting) in Indonesia. It is Indonesian government plan to implement the electronic voting mechanism as a way to minimize the high cost of conducting general...
Article
Full-text available
Indonesia has enacted the first cyberlaw, UU ITE 11/2008 as legal certainty and foothold to support transaction of electronic commerce in the Internet, within the boundaries of Indonesia. Generally, the regulation can be divided into two parts, the rule about concept of information, contract, certification and prohibition of illegal practice in ter...
Conference Paper
Full-text available
The recent massive critical data leaks by Wikileaks suggest how fragile national security is from the perspective of information system and network sustainability. This incident raises some causes of concern. Firstly, critical infrastructure such as military and diplomatic systems is not spared from security breach. Secondly, such leak causes far-r...
Article
Full-text available
Electronic payment has emerged in the past decade as an alternative of payment system between business-to-business as well as when involving individuals. Electronic payment is made much easier and affordable today by the emergence of products and services offered by various parties including financial institutions and web-based online portals. Ther...
Article
Full-text available
This paper investigates the need for Malaysia to relook at and redefine the concept of national security amid the changing circumstances especially in relation to the country's increased reliance on the information and communications technology (hereinafter, ICT). The more a governance system is exposed to the Internet and ICT, the bigger the risks...
Conference Paper
Full-text available
This paper examines the extent to which Islamic principles and practices (in this respect, as found mainly in the Prophet Muhammad's traditions) reinforce the notion of information security as a measure to protect information assets. This paper is historical and doctrinal in nature, attempting to discover the Islamic formulation that corresponds to...
Article
Full-text available
Central to the infrastructure of electronic commerce activities is the electronic payment system. This encompasses not only the issues of technical sophistication but also legal readiness. In the context of electronic commerce environment in Malaysia, this paper seeks to highlight and examine the Malaysian legal readiness in the aspect of electroni...
Article
Full-text available
This paper examines the intersection between the industrial standards and the legal framework in defining the scope of information security obligations in relation to the management of data and information assets. It undertakes two primary tasks; namely assessing the scope of legal compliance as stated in the internationally-accepted information se...
Article
Full-text available
The increasing reliance of critical infrastructures (such as those operating the national communications, energy, transport, and defence systems) on a computerized and networked environment imposes an enormous security task for both their operators and users. The fact that attack to critical infrastructure is not merely an ordinary criminal matter...

Network

Cited By