You are on page 1of 23

SEMINAR ENGINNERING IN SOCIETY

AMRINA BINTI AKMAL HISHAM 2016230086


AHMAD HAFIZZUDDIN BIN AHMAD SHOKOR 2015283568
AHMAD AFIQ HAZIM BIN RUSLI 2016238594
AMIN RAHMAT SALAM BIN ZAINOL 2016238818
ASYRAF NAIK BIN MOHD AMIN 2015441736

Faculty of Mechanical Engineering


UNIVERSITI TEKNOLOGI MARA

29/9/2018

1
Table of Contents

1.0 CHARTERED ACCOUNTS .......................................................................................................................... 3


2. CYBERSECURITY......................................................................................................................................... 5
2.1 Introduction ............................................................................................................................................ 5
2.2 Function of Cybersecurity Malaysia ........................................................................................................ 6
2.3 Risk of Cyber Threats .............................................................................................................................. 7
2.4 Cybersecurity incident category ............................................................................................................. 8
2.5 Facts on child sexual crimes .................................................................................................................... 9
2.6 Cyber999 ................................................................................................................................................. 9
2.7 Ransomware ......................................................................................................................................... 10
2.8 Tips to avoid online shopping scams. ................................................................................................... 12
2.9 Cyber SAFE Program ............................................................................................................................. 13
2.10 Concept of outreach and capacity building ........................................................................................ 13
3.0 IEM MALAYSIA & MIE INDUSTRIAL SDN.BHD. – WORKING EXPERIENCES AND INVOLVMENT IN
SOCIETY ....................................................................................................................................................... 15
4.0 CONCLUSION ......................................................................................................................................... 22
5.0 REFERENCES .......................................................................................................................................... 23

2
1.0 CHARTERED ACCOUNTS

Financial statement is basically a written record that conveys the financial doings and surroundings
of a business that consists of four major mechanisms. Financial statement is meant to present the
financial information of the entity as clearly for both the entity and the readers. Financial
statements for businesses usually include income statements, balance sheets, statements of
retained earnings and cash flows but may also require additional detailed disclosures depending
on the relevant accounting framework. Financial statements are often audited by government
agencies, accountants, and firm to ensure accuracy and for tax, financing or investing purposes.
There are basically two purposes for analyzing the financial statement that is first for funding
decisions and investment decisions. Funding decisions is weather to lend money to company or
give credit to company for purchase or inventory and investment decisions is whether to invest in
the company.

Financial analysts rely on data to analyze the performance of, and make predictions about, the
future direction of a company's stock price. One of the most important resources of reliable and
audited financial data is the annual report, which contains the firm's financial statements. The three
major financial statement reports are the income statement, balance sheet and statement of cash
flows.

Based on the seminar today, there are three types of analytical tools that are used in financial
statement analysis that is horizontal analysis, vertical analysis, and ratio analysis. For the purpose
of today seminar, the focus will be on using the financial ratios in analyzing the financial
statements. Financial ratio can be classified into various categories; some into five categories that
is liquidity and credit, management efficiency, profitability, leverage and solvency and market
values. For analysis of the primary financial statements, ratio can be classified into three categories
that is liquidity ratio, profitability ratio, and leverage ratio.

The profitability ratios measure the income or operating capabilities in business. This is a primary
ratio used by investors and to providers of finance to the company. The ability of the firm to survive
to a large extent is dependent on the amount of profit that could be obtained from the normal

3
operations of the business. Profits provide the means to give a return to the investors to ensure the
providers of finance their returns as well. Profitability can be classified into gross profit ratio, net
profit ratio, return on assets, and also return on equity.

A leverage ratio indicates the level of debts incurred by a business in funding the business. The
higher the level of debts that the company undertakes, the risky of the company is perceived to be.
Thus, this category of ratio is useful for both the outside financiers as well as the inventors. There
are two main leverage ratios that is debt to total assets and debt to equity.

Liquidity ratios are measure of the short-term ability of the enterprise to pay its liabilities when it
becomes due and to meet unexpected needs for cash. Short term creditors such as bankers and
suppliers are particularly interested in assessing liquidity, which is evaluating the credit worthiness
of a company, specifically the providers of finance and to a lesser extent potential investor. The
ratios under this category are current ratio, the acid test ratio, the receivable turnover ratio, the
average collection period, the inventory turnover ratio, and the average days in inventory.

For the conclusions, the seminar had illustrated the use of certain financial ratios for analyzing
financial statements. In the complex investing environment, both the quantities and non-
quantities information are important in arriving at investment or funding decisions. Sometimes,
the non-quantities information will be more crucial in the decisions making process.

4
2. CYBERSECURITY

Megat Muazzam bin Abdul Mutalib is Head of the Malaysia Cyber Emergency Response Team
(MyCERT). MyCERT is a department within Cybersecurity Malaysia. He is responsible in
Cyber999 Incident Handling and Emergency Response daily operation, which primarily involve
in incident alert or threat issue, related to Malaysia constituency and the Malware Research Centre.
He has wide experience in IT Security field for more than 10 years such as network security,
penetration testing, web security, malware research and honeypot technology. He is recognised for
his capability for conducting numerous training and talks for various organisations locally
and internationally on topics ranging of security courses. He has a Degree in Computer Science
from University Putra Malaysia (UPM). Actively involves in Cyber Early Warning System project,
focusing in the areas of perimeter defence, detection and intrusion analysis. He is the GIAC
Certified Intrusion Analyst (GCIA) and Certified Penetration Tester (GPEN).

2.1 Introduction

The cabinet meeting on 28 September 2005, through the joint cabinet notes between MDF and
MOSTI agreed to create the National ICT Security Emergency Response Centre (NISER). This
organization is currently known as Cybersecurity Malaysia and will act as a National body to
monitor the national e-Security aspect. From the Ministerial Functions Act 1969 and Federal
Gazette 2013 (No.2), Cybersecurity Malaysia have to provide specialized cybersecurity services
and identify all possible threat to national security and public safety. Cybersecurity Malaysia have
their own service core consist of Cyber Security Emergency Services, Info Security Professional
Development and Outreach, Security Quality Management Services and Strategy Engagement and
Research. Through the new technology development, cyber threat also evolving. From wide
spreading of virus incident into specific targeted attack or from just a script kiddy can evolve into
professional criminals. These are the example of why the existences of Cybersecurity Malaysia is
so important to national and society.

5
2.2 Function of Cybersecurity Malaysia

1. National cyber security policy implementation.

2. National technical coordinate centre.

3. Cyber threat research and risk assessment.

4. Security quality management service.

5. Information security professional development.

6. Cyber emergency service.

7. Malaysia’s computer emergency response team (MyCert).

6
2.3 Risk of Cyber Threats

Cyber threat not only comes in form of technology related but also comes in form of cyber content.
The example of cyber threat that comes in technology related is hack threat, intrusion, online fraud,
spam, malicious code and denial of service attack. Online fraud is the most popular cyber threat
that also comes in with multiple ways such as online shopping scam, auction fraud, lottery scam,
parcel scam, impersonation, loan scam, holiday scam and many more examples of online fraud.
On the other hand, cyber threat also comes in form of cyber content. The example of threats of
cyber content is threat to national security by spreading fake news, sedition, child porn and
defamation. All of these threats will not just affect an individual but it will also affect the whole
nations. Due to all these threat, Cybersecurity Malaysia need to improve and updated their online
protection skills. They also need to overcome the problem regarding the shortage of the cyber
security professionals in Malaysia. To become a professional cyber security, the applicants need
to have some skills and train for years. These requirements are essential because they are not only
to defend against the cyber threats that comes from Malaysia but they also need to defend against
the cyber threats that comes from all around the world.

Moreover, there are great possible that cyber threat will involves women and children. As for
women, they exposed to threats such as love scam that also called the Nigerian scam, blackmail
through webcam, fraud, cyber violence, internet mule, prostitution and terrorism. Nowadays,
online terrorism involving women is increasing cause threat to the national security. Besides
women, children also one of the favourites targets and they are not only mentally threated but also
physically threated such as pornography and kidnapping. School age-children exposed to cyber
harassment and bullying that can cause serious depression. Other than that, cyber sexual grooming
among children will lead to the physical threat. The criminals will build connection with the
victims to lure them. Cyber sexual grooming is a form of illegal business such as child trafficking
and child pornography.

7
2.4 Cybersecurity incident category

1. Intrusion

In other word is hacking. Hacking is an attempt to exploit unauthorised access or control over
computer network security systems for not good purpose.

2. Spam

Unwanted advertising or same message on the Internet that sent to a large number of internet user.

3. Denial-of-service (Dos)

Cyber-attack which is to make a machine or network resource unavailable to its users by


disrupting it services system connected to the internet.

4. Ransomware

Ransomware is a type of malicious software that sent into our computer system through internet
connection.

5. Fraud

The thief tries to trick or scam someone using the internet. In other word, the person who being
trick loses money to that thief. The thief usually tries to trick people in social media such as
chatroom, email and so on. Scam that usually happen are advertisements that pop up on the
internet.

6. Cyber bulling

Cyber bullying is misuse of information technology to humanise or harass other people. Their
main intention is to embarrass or humiliate him/her in public in form of posting rumour about
another person on internet social.

8
2.5 Facts on child sexual crimes

The statistics by Polis Di Raja Malaysia (PDRM) shows some facts of children sexual crimes via
social media. The criminals use the social media as a medium to lure children and find their
victims. The most application involve in these threats is WeChat and comes with WhatsApp,
Facebook, Bee Talk and Instagram. The criminals use of this medium and use cyber grooming
technique to lure their victims. From the facts, 89 percent of the offenders are known to the
victimized children and 87 percent of the reported rape cases involved children. From the rape
cases that involved children, the most cases come from the victim’s boyfriend. This shows how
powerful the media social medium used by the offender to build connection with the children and
take the advantage from the victims. This are the example of how the cyber threat are not just
mentally threatens but also threated in physically. Most of the victims age are about 13 to 15 years
and they are just entered the secondary schools. Hence, it was important for parents to keep eye
on their children when using social media.

2.6 Cyber999

Next, Malaysian Computer Emergency Response Team (MyCERT) also provide a service for
internet users to report regarding the computer security incident. There are many reports that that
Cyber999 gets within 21 years after it being introduced. All the reports are based on problem
regarding fraud, cyber bullying, cyber sexual harassment, data theft, data intrusion, online
commercial fraud, defamation, malicious code and spam. From the reports, Cyber999 will give
full support to the victims to overcome the problems. During Kuala Lumpur Sea Games 2017,
Cybersecurity Malaysia launch OPs BENDERA due to cyberattack that received by Cyber999 on
20 August. Cyberattack that take place is web defacement, confidential info leak and Distributed
Denial of Services (DDOS) attack. This shows how Malaysia is now very serious in fighting
against these cyber threat as it will give negative effect not only to the mentality but also can affect
physically especially to the children and this cyberattack clearly give bad impact to the nation.

9
2.7 Ransomware

Ransomware is a type of malicious software that sent into our computer system through internet
connection. It is created to ransom by blocking our access to computer system until the ransom is
paid. However, by paying the ransom it’s not usually guarantee that the system will be recovered

What to do if infected by Ransomware?

1. Disconnect

If we are infected, we should immediately disconnect all our device from network. This because
we want to prevent the data being transmitted to the criminal as soon as possible. This is the right
way to immediately stop to the attack. We can also disconnect our internet connection by
physically unplugging from all connection. If an attack occurs at our workplace, we should contact
the IT department immediately. The IT department will recover the damage information by taking
the right steps to recover it.

2. Alert/report to CSM/cyber999

After we been infected, we must report to the Cybersecurity Malaysia. They will tell us all the
thing we need to do before making changes to existing accounts. This because it’s the best way to
control the damage done by the hacker can do to our stolen information.

3. Backup

We can make backups by using backup software. Moreover, we can also use another hard drive or
removable media such as CD and flash drive. It is a good thing to create backups for our files and
folder. While the main reason is to prevent anyone to steal information, we can also prevent the
information from lost or destroyed during the recovery process.

4. Reinstall our operating system

We must reinstall the operating system of our computer after an attack occurs. This because some
threats are very complicated and can hide deep in the system and also sometime it cannot be notice

10
by antivirus software. Therefore, the safest step after recover our file and we must then reinstall
our operating system

5. Install an anti-ransomware software

We need to install some of anti-ransomware software to scan the infected system and clean it.
Some of the software are Windows Defender, Microsoft Safety Scanner and so on. We also must
do periodic diagnostic scans to make sure our device always safe.

11
2.8 Tips to avoid online shopping scams.

1. E-commerce

The E-commerce is the buying and selling or service or transmitting funds over electronic network
thorough internet. Many trusted online businesses using this website for online service. Therefore,
before we buy the product we must check if the e-commerce site has clear description of their
products

2. Check the company

If we are in doubt, check with the companies Commission of Malaysia (SSM) to ensure that the
company is registered or not.

3. Terms and Condition

We must read and understand the teams and condition of the purchase before buying it to avoid
any scams activity.

4. Inspect and Refund

Inspect our good as soon them arrive and notify the immediately if there is any problem with them.
We have the right as customer to cancel an order and get refund if the orders are late or damaged.
If they refuse to refund, we can make report to the authorities.

5. Avoid social media site

We must avoid making purchase via social media site such as Facebook, WhatsApp and other
social media platforms. This because scammer sometime prey on people over social media sites.
Therefore, we must avoid accepting friend requests from strangers in order to protect our self.

6. Market price

Know the market price of the product you wish to buy. If a product being offered is way below
market price, use your discretion and make an informed decision.

12
2.9 Cyber SAFE Program

Due to all the threats Malaysian received, Cybersecurity Malaysia have introduced an initiative
known Cyber Security Awareness for Everyone (Cyber SAFE). This Cyber SAFE introduced is to
educate and to enhance awareness to public on the technological and social issue facing all internet
users, particularly on the dangers of getting online. The objective of Cyber SAFE is to teach
everyone that internet safety is everyone’s responsibility. Thus, from this initiative it will enhance
internet safety awareness to everyone. Moreover, Cyber SAFE objective is to tell people that we
have to practice a safe online habit and always use Cyber999 as help centre. In Malaysia, we can
divide Industry and Regulatory Response in three types. The types are for national level,
Institutional level and Existing Laws and Legislation. All of this regulatory response is so
important as it will give a guideline to all internet users to use the internet in a proper way.

2.10 Concept of outreach and capacity building

The demand for cyber security is increasing. Hence, everyone needs to commit ourselves to cyber
security. There are many questions regarding how to gain knowledge about cyber security and the
answer is by mastering the system fundamental as much as we can. Other than that, we need to
enhance our technical skills on handling programs. Therefore, we are required to learn the
operating system, coding language, assembler and shell coding, Metasploit and Nessus. Then, we
can set up a lab at home either physical lab or virtual lab and always subscribe to security forum
or follow security expert. To become an expert in cyber security, we also need to be active in a
local security community. We can join OWASP Malaysia community, DurianConf, NanoSec or
RawSec. In Cybersecurity Malaysia, there have their own concept of outreach and capability
building. The first concept is known as competency training towards developing competent cyber
security workforce and practitioners for the nation. Next, building and accrediting competent cyber
security professionals through the global ACE scheme. Lastly, produce a competent professional
cyber security by investigating cyberattack designed.

13
Enhancement of Capacity Building

To produce competent cyber security, there are enhancement of competency and capacity building
made by Cybersecurity Malaysia. The enhancement is by provides incident response training for
APCERT and OIC CERT members. They also provide competency and professional training
program before they give a job placement to the APCERT and OIC members. Besides, they also
build interest in cyber security by partnership with local universities to produce local talents. This
partnership enhances through local university when cyber security is on the academic courses and
also apply when some university organized competition based on the cyber security. As for
conclusion towards the cyber security, the world is witnessing the widespread adoption of digital
and constantly evolving of cyber threats. Hence, to stay ahead, we need sufficient and competent
cyber security people.

14
3.0 IEM MALAYSIA & MIE INDUSTRIAL SDN.BHD. – WORKING
EXPERIENCES AND INVOLVMENT IN SOCIETY

The Accreditation Board for Engineering defines that “engineering is the profession in which a
knowledge of the mathematical and natural sciences gained by study, experience and practice is
applied with judgment to develop ways to utilize economically, the materials and forces of nature
for the benefit of mankind”.

The focus of an engineer’s work typically falls into one or more of the areas. One of the areas is
research where the person will explore and discover a new thing to be added into the engineering
knowledge. They also can apply new principles into the engineering knowledge if their conducted
experiment can be accepted by the rules of engineering concepts and rules. They are commonly
known as scientist who deal with unknown knowledge yet. Besides of research, they also can be
involved into the development areas which is to transform ideas or concepts into reality or
production processes. They are commonly known as engineer who deal with known knowledge
discovered by scientist. Another field that they can be involved with is in the design area which
they will link the generation of ideas and the production. They must be very creative and
knowledgeable as the products they design must fulfil the both abstract and logic criteria. One of
the universal designing applications being used today for designers is CATIA. Usually in
automotive industries.

If someone does not fulfil the qualification required to involve with one of the above fields, there
is more field to get be involved with. One of them is in the production and testing line. They can
gather their experience here before become the true engineer. The production area is the section
where the products is made. Before it goes into the market, the quality and its characteristics must
be tested for a several times first to ensure it is safe and in a good quality for users. Engineering
also involving with sales where the marketing of engineering products happened. Without sales,
the producer will not survive if there is low rate of customer buying the product. While the
operations in engineering field is involving with in maintaining the equipment and facility in the
industry for example. Without maintenance, the equipment will breakdown easily causing loss in
operation. The last filed involving engineering is the construction field. This is where the big

15
machine or equipment is made. All of engineer’s members involve and working together in this
type of field.

The career paths for engineers consist at least seven for graduating students. One of them is the
corporate leader. A corporate leader is not defined by the size of the companies they manage. They
are the one who founded the company and has given a job opportunity to many people. They are
in leadership position meaning they are responsible for making any decisions that can affect a lot
on their business units or departments. However, this type of path is very hard and need a lot of
money to begin with. The second path they can choose is to become an independent entrepreneur.
This is where they are going to make profit, taking the financial risks and the extent of the business
activity and the generality thereof, publicity, independence and risk of losing the invested capital
all on their own. It is very risky if compared to corporate engineers.

The third path of career is to become involved with the military or government. If they are involved
with military, they will have asked for the construction and demolition tasks. They are called
sappers or pioneers but often combat engineers. They also will receive training in Infantry tactics
and weapons for their own defence and protection and for cases where the situation is desperate.
Some of the graduating students will choose the path to become engineering and social service
aboard. The major factor for this type of path is the chance of getting a better salary is higher at
the other country than local company. Besides, the job opportunity there is better. A few of
graduating students has become a professor. Becoming a professor is very hard due to very strict
selection. However, being a professor will give a lot of academic freedom and teach every
interesting subjects and considerable and secure salary until retirement. The next path is quite
common in graduating students in engineering profession. This path is where they graduate work
totally outside or not related to their field. This is because they find an engineering is stressful
work to do and they have become interested in another field. The last path is where the graduating
students has their path mixed.

Being an engineer is hard, but being a good engineer is harder. It is because they must creative in
problem solving. Which is when they facing a problem, they must find an alternative solution
besides using an ordinary solution that can save a lot of money and time. Besides of that, they also
must have a good interpersonal skill where they good in verbal and non-verbal communication,
listening skill, negotiation, problem solving, decision making and assertiveness. These skills will

16
help them to become a good engineer. Furthermore, they also must have a good attitude and
aptitude towards engineering and also capable of handling critical situation meaning they have a
good knowledge. They also must be a good team player by involving in every work they had to
do. And the last one they also must become alive as a long learner meaning that they always learn
something new in their life so that they can improve their knowledge and skill that can be used
practically in life.

Every profession has their own ethics code and the same goes as the engineer. The engineers’
fundamental cannon of the ethic’s code is they must hold paramount the safety, health and welfare
of the public. This means they must prioritize the safety over all thing. Every design or every
project must be ensuring the safety first. They also can perform services only in areas of their
competence. Do not try doing things outside their knowledge as it ca lead to serious incident to
happen. Besides, they also must only issue public statements in an objective and truthful manner.
Not being a rude engineer. Furthermore, they must act for each employer or client as faithful agents
or trustees so they can build their good reputation of themselves thus increasing the opportunity to
get a new project or jobs. They also must avoid any deceptive acts and conduct themselves
honourably, responsibly, ethically and lawfully so as to enhance the honour, reputation and
usefulness of the profession.

One of the main branches in engineering is automation. Surprisingly the history of Malaysia
automotive is started on 1965 where the automotive in Malaysia mainly involved in distribution
and sales. Later on, year 1967, after an imposed protection tariff on all imported vehicles, 12
assembly plants are built by 20 foreign manufacturers for Malaysia market. On year 1979, low
level technology of component part supply being produced to support localisation plans such as
tyres, batteries, exhaust systems and paints. Malaysia for automotive has three primary national
objectives. One of them is to spearhead or become the first to achieve automotive industrialization
process and manufacturing industries. The second is to achieve and upgrade technology and
industrial skills within the automotive manufacturing industry. For the last one is to strengthen the
international competitiveness of Malaysia’s industrial capability.

The life of an Automotive Engineer in Research and Development is not so bad but very exciting
experience. They will experience in making and designing a new type of car that can be potentially
marketable. The process in making a new car model is very complicated and take a long time to

17
finish. They may be working as Noise and Vibration Engineer. They also may be working in
Styling Department inside the Clay Modelling Studio containing the 5 Axis Milling Machine
whereabouts. This is also where the virtual reality is presented about the next car model. While in
Design Department they will do some Package Layout Drawing and CAE Simulation for the new
designed model to testing it virtually before testing it in reality. In the Testing Department the new
car’s model will be tested by two test which is the cold test where the car will be driven in the cold
environment, and the hot test where the car will be driven in a hot environment. The new car’s
model also will go through aerodynamic, wading water and high-speed test. Although the new
car’s model pass all of the test, the accident still can happen. So, every accident involving the car’s
model will be investigated the factor of accident to improve the level of safety in using the car.

There are challenges for Automotive Engineer. One of the challenges is the Automotive Industries
is a sophisticated business requirement which is the cost must be to make low as possible, must
produce high quality product, must use the latest technology and have a governing regulatory and
shorter development period. Besides there are also Ever-changing Regulations, Policies and
Legislation which is Domestic and export market. Automotive Engineers also must be determining
the voice of customer or feedback and identifying the criteria the misleading of voice of customers
(VOC). The work cultural issues during development with consultants is common problem that
the Automotive Engineering have to face.

Today challenges for Malaysian is the competition for getting a top job is intense. This is because
there are too many graduating students in Engineering Profession. There are 17 Universities under
IPTA and about 70 Universities under IPTS. To compete in this situation, the students must have
a good criterion that the employers looking for. The criteria are the students must have a good
academic record, have evidence of participation in extra-curricular, good communication skills,
personality and positive attitude which also during the interview and standing of Universities from
which they graduated.

Another challenges that students must face nowadays is the customer focus where they must
investigate the market trend nowadays that can satisfy the customer. Besides of that is enterprise
integration where nowadays we are using an integrated communications system which make
information sharing is easier. All of the communication is using the wireless applications such as
email. The next one is supply strategy which are work outsource, integrated parts suppliers and

18
integrated service organizations. Knowledge management which is one of the challenges is
preservation of know-how critical to knowledge-intensive companies, dissemination, wide spread
applications to add value and supply chains of knowledge agents and centres. Furthermore,
changes in organizational setting have two type which are the type one is assemble and market
products/services to consumers and type two which is supply specialized products/services to
client companies. The next one is population diversity or migration of jobs. Finally, the last one is
globalization where the clear trend in the new Millennium where most companies will be actively
involved.

Ir Mohamad Faizal Malek show us that most graduated student from engineering faculty are
divided into 2 scenarios after they finish their studies, the first scenario is finding job and looking
for highest salary which is RM4000 while in the second scenario is to find a job and gain
experiences with lower salary. 80% of the graduated student chooses scenario one and the rest
with scenario two. Graduated student does not have right for high salary due to lack of experience
in the field of working as engineer. Gaining experience is the best option so that we can increase
our value as an engineer. Ir Mohamad Faizal Malek share with us the experience as Mechanical
engineer. There are six experience which are find the right company, find the right job, find the
right senior, find the right boss, always give reasons, and explore the world. In finding the right
company, the choices come between two types of company which are small company and a big
company. The best decision will be the smaller company because it can help us to gain more
experience even though it offers lower salary. We can involve in more part of the project in smaller
company. Big company tends to give more experience engineer in their projects. Finding the right
job is about the job that involves mechanical engineering when we are working. It’s better to work
in our field so that it helps us to improve ourselves. Working in other field is okay but only for a
short time. If the company did not give the right job, then it’s better to find other company. Next,
finding the right senior. Senior engineer can help our career to grow much better and guide us to
be an excellent engineer. By finding the right senior engineer, it can lead us to success and see the
real situation in working as an engineer. Finding the right boss is another experience as mechanical
engineer. In reality of working, we will have either a good boss or bad boss. We need to identify
the type of boss that we will work for and decide whether it is good for our career or not. If it does
not suit us or he did not understand the mechanical engineering working principle, then it is better
to find other company so that it can help us to enjoy our working experiences. Always give reasons

19
is the experience that Ir Mohamad Faizal Malek encounters when a fresh graduate comes for work.
This bad attitude is bad for engineers. If we face a problem or given a task that are not in our
studies, we should not give the reasons for not doing well in the task. As engineers we can learn
from the senior or make research to overcome this problem. In the early stages of working, gaining
experience through hard work is so important and the attitude of giving reasons should be thrown
away. The last point is exploring the world. After four years working as an engineer, the title junior
engineer will be drop. From here it is better for us to explore the world. Working on our own so
that we can improve ourselves as an engineer and learn to make the right decision. In first four
years, our working as an engineer will always have a guide which is through the senior engineer.
Challenge ourselves and increase our experiences by working on our own will be a better option.
Working outside of our nation will give much valuable experience.

The challenges as mechanical engineer are communication skills, comfort zone, continuous
learning, project management skills, survivor mode, lateral thinking, and gender. As an engineer
our soft skills and communication skill are so important because we will be working in a group
that also consist of other departments. This communication skill will improve the working process
of any projects that engineer involves. After graduated as an engineer, we must come out of our
comfort zone. We usually work with friends and have guide from lecturers. We will be working
in completely different situation which is working with unknown people and will be the person
who guide for sometimes. Continuous learning is important so that we can increase our value as
an engineer. We should try to gain as many experiences as we can and continue to learn something
new. Project management skills is the required skill when we are engineers. This skill will come
after we experience to handle project. We can learn it from senior engineer on how to manage the
project. The more the project we try to handle, the more it will help to improve this skill. In survivor
mode, it means that we must do anything to keep the work done and to keep our job safe. This
challenge comes after four years of working which the title junior engineer is no longer with us.
We might be working with people we never met, we might have to handle a big project on our
own and more challenges. Keep surviving by not quitting, it will improve ourselves as an engineer
a lot and try to gain as many knowledges as we can during this time. Lateral thinking is the solving
of problems by an indirect and creative approach, typically through viewing the problem in a new
and unusual light. Not many people have creative thinking when it comes to solving problems. By
gaining this skill, it will help us a lot in being an engineer. This skill can be polished through many

20
readings and working experience. The last challenge as an engineer will be gender. As a man this
will not be a problem because usually they can directly involve many working processes. As a
woman engineer, it might be problem because the company might give only certain type of work.
Challenge yourself and try to ask for the company a better working field and prove it to them that
you can work like another engineer.

Mechanical engineer can involve in many industries such as oil and gas, manufacturing, power
industries and general sector. As we can see here, mechanical engineer is needed in many
industries. The most important thing if we applied for this sector is to have good attitude and able
to overcome all the challenges stated in the paragraph before. Engineer in society means a
professional organization for engineers of various disciplines. In Malaysia, the two most important
organization for engineer in society are Board of Engineers Malaysia (BEM) and Institution of
Engineer Malaysia (IEM). BEM aims to raise the prestige of the engineering as well as those
involved in the field. BEM is under the administration of the Ministry of Works (Malaysia) and
established under the Registration of Engineers Act 1967. [5] The institute is responsible for the
maintenance of the registration of engineering Graduates and Professional Engineers. In addition,
BEM also serves as the controller that determines conduct and ethics for those involved with
engineering in Malaysia. IEM is a professional learned society for the aspiring engineering
students and practicing engineers to work together for the betterment of the engineering profession.
There were benefits as IEM student member which are networking with practicing engineers,
technical talks and courses, technical visits. The primary benefits as an IEM member are
networking among engineers, a route to become professional engineer, provider for Professional
Development Program (PDP) for graduate members and much more benefits.

21
4.0 CONCLUSION

It was a great advantage for us to begin exploring the real world of working industry from this
seminar. A lot of information has been delivered which provides us opportunities to gain a lot of
knowledge especially in financial, cyber security, MIE Industry, and also IEM Malaysia.

This also serves as a platform for us to gain as much skills as for our future career in the mechanical
industry. The seminar has successfully developed our communication and behavioral skills,
lifetime learning capacity, technical and management skills, practical aptitude as well as solution
synthesis ability through all exposures.

I would like to recommend UiTM to give more information to the students about the mechanical
industry and real-life working experiences. We believe this would help the student to identify the
main job scope in the mechanical industry thus allowing them to choose either to do more technical
or management works. By identifying the category of the job scope, the student will also be able
to plan their future career in specific expertise.

22
5.0 REFERENCES

1. Prof Dr Syed Noh (2018, September 29). Financial Statement. Speech presented at Seminar
in Engineering Society, Uitm Shah Alam.
2. Megat Muazzam (2018, September 29). Cybersecurity. Speech presented at Seminar in
Engineering Society, Uitm Shah Alam.
3. Prof Madya Ir Dr Zainal Fitri (2018, September 29). IEM Malaysia. Speech presented at
Seminar in Engineering Society, Uitm Shah Alam.
4. Ir Mohamad Faizal (2018, September 29). MIE Industrial Sdn.Bhd. Speech presented at
Seminar in Engineering Society, Uitm Shah Alam.

23

You might also like