Security Threats to Privacy Data of Malaysian Youth’s: Online Transaction and Communication
Abstract
The new norms during the COVID-19 pandemic contributed to the increased usage of the online medium. The International Labour Organization (ILO) reports that millions of people were forced to stay at home during difficult situations (2020). Both the government and corporate sectors are changing the landscape of their services to online services. Apart from its benefits, the rapid adoption of technology also increases the risk of data breaches among individuals' personal information. This article focuses on the intention factor as a motivation to protect the security of personal data among the youth. A total of 535 respondents in the range of 19 to 30 years old from Putrajaya and Cyberjaya. They are randomly selected using a multistage cluster sampling method. A set of questionnaires were distributed online during the Movement Control Order (MCO) that hit all over the world including Malaysia. To analyse factors affecting the Malaysian youth in protecting the security of personal data the multiple linear regression analysis was applied. This article reports the intention factor has a dominant influence in motivating Malaysian youth to protect the security of their data. Additionally, findings showed that family connection and online banking transactions as the main factors in using online compared to other motives measured in this study. Therefore, Malaysian youths should be given the knowledge and awareness to keep on vigilant and protect their data security. Their motivations need to be nurtured to ensure that Malaysian youth’s personal data remain protected even if they are actively interacting online.
Keywords: Intention, threat assessment, coping skills, data privacy, youth, online.
Full Text:
PDFReferences
Ahmad, N. A., & Othman, N. (2019). Information Privacy Awareness Among Young Generation in Malaysia. Journal of Science, Technology and Innovation Policy (JoSTIP), 6(2), 1-10.
Ahmad, N. (2022). Dear free Malaysia Today - Your words matter: COVID-19 and its subtle rhetoric. SEARCH Journal of Media and Communication Research, 14(1), 19-32.
Ajzen, I. (1985). From intention to action: A theory of planned behaviour. In Kuhl J. & Beckman J. (Eds.), Action control: From cognition to behaviour (pp. 11–39). Springer.
Ajzen, I. (1991). The theory of planned behaviour. Organizational Behaviour and Human Decision Processes, 50(2), 179-211. https://doi.org/10.1016/0749-5978(91)90020-T
Ajzen, I. (2020). The theory of planned behavior: Frequently asked questions. Human Behavior and Emerging Technologies, 2(4), 314-324. https://doi.org/10.1002/hbe2.195
Alagaratnam, S. (2021, January 6). Malaysia: Perlindungan data peribadi pekerja di Malaysia - Peraturan perlindungan data am (GDPR) dan Akta Perlindungan Data Peribadi 2010 (PDPA). Mondaq. https://www.mondaq.com/data-protection/1022286/protection-of-employee39s-personal-data-in-malaysia--general-data-protection-regulation-gdpr-and-personal-data-protection-act-2010-pdpa?type=related
Al-Saadi, N. (2021). The impact of COVID-19 on banks in the European Union. Riwqs, 9(102). https://www.academia.edu/52453379/The_Impact_of_the_COVID_19_on_banks_in_the_European_Union
Ali, H. M., & Malaco, O. H. (2022). Public health intervention: Exploring crisis communication elements in media reports on COVID-19 in Bangladesh. SEARCH Journal of Media and Communication Research, 14(1), 33-48.
Allington, D., Duffy, B., Wessely, S., Dhavan, N., & Rubin, J. (2021). Health-protective behaviour, social media usage, and conspiracy belief during the COVID-19 public health emergency. Psychological Medicine, 51(10), 1763-1769.
Anderson, B. B., Vance, A., Kirwan, C. B., Eargle, D., & Jenkins, J. L. (2016). How users perceive and respond to security messages: A NeuroIS research agenda and empirical study. European Journal of Information Systems, 25(4), 364-390. https://doi.org/f82s55
Anderson, C. L., & Agarwal, R. (2010). Practicing safe computing: A multimethod empirical examination of home computer user security behavioral intentions. MIS Quarterly, 34(3), 613-643. https://doi.org/10.2307/25750694
Auxier, B., & Anderson M. (2021, April 7). Social media use in 2021. PEW Research Centre. https://www.pewresearch.org/internet/2021/04/07/social-media-use-in-2021
Baker, M. (2020, March 19). Gartner HR survey reveals 88% of organizations have encouraged or required employees to work from home due to Coronavirus. Gartner. https://www.gartner.com/en/newsroom/press-releases/2020-03-19-gartner-hr-survey-reveals-88--of-organizations-have-e
Bank Negara Malaysia (BNM). (2017). Appendix 3: Personal data protection notice. https://www.bnm.gov.my/documents/20124/2493527/edu_Appendix+3.pdf
Bank Negara Malaysia (BNM). (2020). Risk management in technology (RMiT). https://www.bnm.gov.my/documents/20124/963937/Risk+Management+in+Technology+(RMiT).pdf/810b088e-6f4f-aa35-b603-1208ace33619?t=1592866162078
Barnett, J. (2022, March 22). How can you control what you cannot see? Managing control over customer data. CPO Magazine. https://www.cpomagazine.com/data-protection/how-can-you-control-what-you-cannot-see-managing-control-over-customer-data/
Bernama. (2021, February 4). Malaysia dalam keadaan terkawal daripada ancaman siber. https://www.bernama.com/bm//news.php?id=1928266
Berger, R. (2021). Cyber security and data privacy: Key considerations for policymakers. Huawei. https://www-file.huawei.com/-/media/corporate/Local-site/ca/images/2021/cyber-security-and-data-privacy_en.pdf
Bischoff, P. (2021, September 26 ). Which countries have the worst (and best) cybersecurity? Compari Tech. https://www.comparitech.com/blog/vpn-privacy/cybersecurity-by-country
Blank, G., Bolsover, G., & Dubois, E. (2014). A new privacy paradox: Young People and Privacy on Social Network Sites. Prepared for the Annual Meeting of the American Sociological Association, 17 August 2014, San Francisco, California. https://doi.org/gf5p65
Buang, S. (2020, November 29). Selamatkan data pengguna MySejahtera? Sinar Harian. https://www.sinarharian.com.my/article/112441/khas/pendapat/selamatkah-data-pengguna-mysejahtera
Boerman, S. C., Kruikemeier, S., & Borgesius, F. J. Z. (2021). Exploring Motivations for Online Privacy Protection Behavior: Insights from Panel Data. Communication Research, 48(7), 953-977. https://doi.org/10.1177/0093650218800915
Boss, S. R., Galletta, D. F., Lowry, P. B., Moody, G. D., & Polak, P. (2015). What do users have to fear? Using fear appeals to engender threats and fear that motivate protective behaviors in users. MIS Quarterly, 39(4), 837-864.
Chen, H., Beaudoin, C. E., & Hong, T. (2016). Protecting oneself online: The effects of negative privacy experiences on privacy protective behaviors. Journalism and Mass Media Quarterly, 93(2), 409–429. https://doi.org/10.1177/1077699016640224
Chen, T., Hammer, J., & Dabbish, L. (2019). Self-efficacy-based game design to encourage security behavior online (Conference paper). Paper presented at CHI Conference on Human Factors in Computing Systems Extended Abstracts (CHI’19 Extended Abstracts), pp. 1-6. https://doi.org/10.1145/3290607.3312935
Cohen, K., & Yeung, C. (2015). Kids apps disclosure revisited. Federal Trade Commission. https://www.ftc.gov/news-events/blogs/business-blog/2015/09/kids-apps-disclosures-revisited
Cummings, C. L., Chuah, A. S. F., & Ho, S. S. (2018). Protection motivation and communication through nanofood labels: Improving predictive capabilities of attitudes and purchase intentions toward nanofoods. Science, Technology, & Human Values, 43(5), 888–916.
Daisyme, P. (2015, December 24). Why millennials don’t worry that much about online security. Entrepreneur. https://www.entrepreneur.com/science-technology/why-millennials-dont-worry-that-much-about-online-security/254121
Das, G., Cheung, C., Nebeker, C., Bietz, M., & Bloss, C. (2018). Privacy policies for apps targeted toward youth: Descriptive analysis of readability. JMIR Mhealth Uhealth, 6(1), e3. http://doi.org/10.2196/mhealth.7626
Department for Digital, Culture, Media and Sport. (2021). Cyber security breaches survey 2021 - PDF Version. Ipsos MORI. https://www.gov.uk/government/statistics/cyber-security-breaches-survey-2021
Eri, Y., Islam, M. A., & Daud, K. A. K. (2011). Factors that influence customers buying intention on shopping online. International Journal of Marketing Studies, 3(1), 128-139. https://doi.org/10.5539/ijms.v3n1p128
Fraga-Lamas, P., Fernández-Caramés, T. M., Suárez-Albela, M., Castedo, L. & González-López, M. (2016). A review on internet of things for defense and public safety. Sensors, 16(10), 1644. https://doi.org/10.3390/s16101644
Gastelú, C. A. T., Zanabria, L. F. M., & Armenta, J. A. (2020). Attitude of Latin American youth towards online security and privacy (Conference paper). Paper presented at 2020 X International Conference on Virtual Campus (JICV), 03-05 December 2020. Tetouan, Morocco. https://doi.org/10.1109/JICV51605.2020.9375820
Gil, D. B., Llinares, F. M., Moneva, A., Kemp, S., & Castano, N. D. (2021). Cybercrime and shifts in opportunities during COVID-19: A preliminary analysis in the UK. European Societies, 23(1), 547-559. https://doi.org/10.1080/14616696.2020.1804973
Grimes, M., & Marquardson, J. (2019). Quality matters: Evoking subjective norms and coping appraisals by system design to increase security intentions. Decision Support Systems, 119, 23-34. https://doi.org/10.1016/j.dss.2019.02.010
Hawdon, J., Parti, K., & Dearden, T. E. (2020). Cybercrime in America amid COVID-19: The Initial Results from a Natural Experiment. American Journal of Criminal Justice, 45, 546-562. https://doi.org/10.1007/s12103-020-09534-4
IBM Security. (2021). Cost of a data breach: A view from the cloud 2021. https://www.ibm.com/downloads/cas/JDALZGKJ
Institute for Youth Research Malaysia (IYRES). (2021). Statistik populasi penduduk & penduduk belia mengikut kategori umur, jantina, etnik, daerah & negeri di Malaysia bagi tahun 2015-2021. Malaysia Youth Data Bank System. https://ydata.iyres.gov.my/iyresbankdataV2/www/index.php?r=pub/home/readcontent4&id=134
International Labour Organisation (ILO). (2020). COVID-19 and the media and culture sector. https://www.ilo.org/wcmsp5/groups/public/---ed_dialogue/---sector/documents/briefingnote/wcms_750548.pdf
Ishak, M. S., Ismail, A., Mat, B., Kassim, A., Mamat, S., & Talib, N. (2016). The influence of television programs on the social development of youth. Malaysian Journal of Youth Studies, 15(9), 29-44.
Jabatan Perangkaan Malaysia (DOSM). (2021a). Siaran akhbar statistik utama tenaga buruh di Malaysia, Februari 2021. https://www.dosm.gov.my/v1/index.php?r=column/pdfPrev&id=UXlFcW1pSnhhZUFSSTc0RDhnR3V3dz09
Jabatan Perangkaan Malaysia (DOSM). (2021b). Kenyataan media penggunaan dan capaian ICT oleh individu dan isi rumah 2020. https://www.dosm.gov.my/v1/uploads/files/5_Gallery/2_Media/4_Stats%40media/4-Press_Statement/2021/20210412-Kenyataan_Media-Penggunaan_dan_Capaian_ICT_oleh_Individu_dan_Isi_Rumah_2020.pdf
Jenkins, J. L., & Durcikova, A. (2013). What, I shouldn’t have done that?: The influence of training and just-in-time reminders on secure behavior. ICIS 2013 Proceedings, 7. https://aisel.aisnet.org/icis2013/proceedings/SecurityOfIS/7
Johnson J. (2021). Digital population worldwide. Statista. https://www.statista.com/statistics/617136/digital-population-worldwide
Kaspersky. (2021, Dec 15). How GDPR changed the world, and privacy regulation’s future. https://kfp.kaspersky.com/news/how-gdpr-changed-the-world-and-privacy-regulations-future
Kemp, S., Gil, B. D., Moneva, A., Llinares, F. M., & Castaño, N. D. (2021). Empty streets, busy internet: A time-series analysis of cybercrime and fraud trends during COVID-19. Journal of Contemporary Criminal Justice, 37(4), 480-501. https://doi.org/gmzdz9
Kemp, S. (2021, January 27). Digital 2021: Global overview report. Data Reportal. https://datareportal.com/reports/digital-2021-global-overview-report
Larose, R., & Rifon, N. J. (2007). Promoting i-safety: Effects of privacy warnings and privacy seals on risks assessment and online privacy behavior. The Journal of Consumers Affairs, 41(1), 127-149. https://www.jstor.org/stable/23860017
Lechner, P. (2020, July 7). GDPR: Three ways the world has changed in privacy law's first two years. CPO Magazine. https://cpomagazine.com/data-protection/gdpr-three-ways-the-world-has-changed-in-the-privacy-laws-first-two-years/
Lee, H., Wong, S. F., & Chang, L. Y. (2016). Confirming the effect of demographic characteristics on information privacy concerns. The 20th Pacific Asia Conference on Information Systems (PACIS 2016), 70. https://aisel.aisnet.org/pacis2016/70
Lee, J. (2021). Responses to media coverage of the COVID-19 pandemic and information behaviour in the Japanese context. SEARCH Journal of Media and Communication, 13(1), 111-126.
Luthfia, A., Triputra, P., & Hendriyani. (2020). The impact of internet motive and access on the opportunities and risks of teenager internet users in Indonesia. Solid State Technology, 63(4), 981-989.
Majid, A., & Alizan, T. A. T. (2019). Data protection- Malaysia's World Ranking. Mondaq. https://www.mondaq.com/data-protection/867540/data-protection-malaysia39s-world-ranking
Majlis Keselamatan Negara (MKN). (2022). SOP pelan pemulihan negara (PPN). https://www.mkn.gov.my/web/ms/sop-perintah-kawalan-pergerakan/
Mahbob M. H., Sulaiman, W. I. W., Rahim, S. A., Jaafar, W. A. W., & Sulaiman, W. S. W. (2013). Acceptance of social innovation in Malaysia Advocacy and the impact of government transformation programme (GTP). Journal of Asian Pacific Communication, 23(2), 223-238. https://doi.org/10.1075/japc.23.2.04mah
Malaysian Communications and Multimedia Commission (MCMC). (2020). Internet users survey 2020. https://www.mcmc.gov.my/en/resources/statistics/internet-users-survey#
Mekovec, R., & Vrček, N. (2020). Factors that influence internet users privacy perception. Proceedings of the ITI 2011, 33rd International Conference on Information Technology Interfaces, 27-30 June 2011 (pp. 227-232). Cavtat, Croatia.
Menard, P., Warkentin, M., & Lowry, P. B. (2018). The impact of collectivism and psychological ownership on protection motivation: A cross-cultural examination. Computers & Security, 75(June), 147-166. https://doi.org/10.1016/j.cose.2018.01.020
Milne, S., Sheeran, P., & Orbell, S. (2000). Prediction and intervention in health-related behavior: A meta-analytic review of protection motivation theory. Journal Application Social Psychology, 30(1), 106-143. https://doi.org/cdbqcf
Ministry of Health Malaysia (MOH). (2021, August 20). Situasi terkini COVID-19 di Malaysia 20 OGOS 2021. https://covid-19.moh.gov.my/terkini/2021/08/situasi-terkini-covid-19-di-malaysia-20082021
Ministry of Health Malaysia (MOH). (2022, January 2). Situasi terkini COVID-19 di Malaysia 01 JAN 2022. Covid-19 Malaysia. https://covid-19.moh.gov.my/terkini/2022/01/situasi-terkini-covid-19-di-malaysia-01012022
Ministry of Youth and Sports Malaysia. (1997). National Youth Development Policy 1997.
Ministry of Youth and Sports Malaysia. (2007). Youth Association and Youth Development Act. (Act 668).
Ministry of Youth and Sports Malaysia. (2015). Malaysian Youth Policy 2015-2035.
Moody, G. D., Siponen, M., & Pahnila, S. (2018). Toward a unified model of information security policy compliance. MIS Quarterly, 42(1), 285-311. https://doi.org/gdsh6z
Muller, J. (2021). Social media users as a percentage of the total population in Malaysia 2021. Statista.
Nasir, A., Arshah, R. A., & Hamid, M. R. A. (2018). The significance of main constructs of theory of planned behavior in recent information security policy compliance behavior study: A comparison among top three behavioral theories. International Journal of Engineering & Technology, 7(2.29), 737-741. https://doi.org/j4gc
Neubauer, L. (n.d). Cybersecurity series: Make cybersecurity essential to the business. Gartner. https://www.gartner.com/en/webinar/451821/1064701
Pallant, J. (2011). SPSS survival manual: A step by step guide to data analysis using SPSS. (4th ed.). Allen & Unwin. Australia.
Pang, S. M., Tan, B. C., & Lau, T. C. (2021). Antecedents of consumers’ purchase intention towards organic food: Integration of theory of planned behavior and protection motivation theory. Sustainability, 13(9), 5218. https://doi.org/10.3390/su13095218
Parliament of Malaysia. (2010). Personal Data Protection Act (PDPA) 2010 (Act 709). Department of Personal Data Protection. https://www.pdp.gov.my/jpdpv2/laws-of-malaysia-pdpa/personal-data-protection-act-2010/?lang=en
Payne, B. K. (2020). Criminals work from home during pandemics too: A public health approach to respond to fraud and crimes against those 50 and above. American Journal of Criminal Justice, 45(4), 563-577.
Pitchan, M. A., Mahmud, W. A. W., Sannussi, S. N., & Salman, A. (2015). Control and freedom of the Internet: Challenges faced by the government. Journal of Asian Pacific Communication, 25(2), 243-252.
Quaglio, G., & Millar, S. (2020). Potentially negative effects of internet use. European Parliament STOA. https://www.europarl.europa.eu/stoa/en/document/EPRS_IDA(2020)641540
Raines, C. (2003). Connecting generations: The sourcebook for a new workplace. Boston, MA: Crisp Learning.
Ribeiro, S., Burkhardt, C., & Caneppele, S. (2021). Covid-19 crime and criminal justice: Mapping criminological research project around the world. Research Briefs (Series UNILCRIM, Université de Lausanne, Switzerland). Serval. https://serval.unil.ch/en/notice/serval:BIB_8D794DDA3C3D
Rogers, R. W. (1975). A protection motivation theory of fear appeals and attitude change. Journal of Psychology, 91(1), 93-114.
Rogers, R. W. (1983). Attitude change and information integration in fear appeals. Psychological Reports, 56(1), 179–182. https://doi.org/10.2466/pr0.1985.56.1.179
Rozlan, N. I. (2021, September 29). Data empat juta rakyat Malaysia dalam bahaya. Sinar Harian. https://www.sinarharian.com.my/article/164055/berita/nasional/data-empat-juta-rakyat-malaysia-dalam-bahaya
Saizan, Z., & Singh, D. (2018). Cyber security awareness among social media users: A case study in German-Malaysian Institute (GMI). Asia-Pacific Journal of Information Technology and Multimedia, 7(2), 111-127.
Schaik, P. V., Jansen, J., Onibokun, J., Camp, J., & Kusev, P. (2018). Security and privacy in online social networking: Risk perceptions and precautionary behaviour. Computers in Human Behavior, 78, 283-297. https://doi.org/10.1016/j.chb.2017.10.007
Sen, J. (2014). Security and privacy issues in cloud computing. In A. Ruiz-Martinez, R. Marin-Lopez, & F. Pereniguez-Garcia (Eds.), Architectures and protocols for secure information technology infrastructures (pp. 1-45). IGI Global. https://doi.org/j4gf
Shin, W. (2020). Youth media consumption and privacy risks in the digital era . In M. Filimowicz & V. Tzankova (Eds.), Reimagining communication: Experience (Vol 2, Chapter 12, pp. 195-208). Routledge.
Singh, A., & Singh, S. K. (2019). Technology revolution gives cybercrime a boost: Cyber-attacks and cybersecurity. International Journal of Advance Computational Engineering and Networking (IJACEN), 7(8), 5-9. https://iraj.in/journal/IJACEN/paper_detail.php?paper_id=15929&name=Technology_Revolution_gives_Cybercrime_a_Boost:_Cyber-Attacks_and_Cyber_Security
Tabachnick, B. G., & Fidell, L. S. (2013). Using multivariate statistics (6th ed.). Pearson.
Tang, Z., Miller, A. S., Zhaou, Z., & Warkentin, M. (2021). Does government social media promote users information security behavior towards COVID-19 scams? Cultivation effects and protective motivations. Government Information Quarterly, 38(2), 101572.
Tsang, M. M., Ho, S. C., & Liang, T. P. (2004). Consumer attitudes toward mobile advertising. International Journal of Electronic Commerce, 83(3), 65-78.
Vance, A., Siponen, M., & Pahnila, S. (2012). Motivating IS security compliance: Insights from habit and protection motivation theory. Information & Management, 49(3-4), 190-198. https://doi.org/10.1016/j.im.2012.04.002
Vasenska, I., Dimitrov, P., Davidkova, B. K., Krastev, V., Durana, P., & Paulaki, I. (2021). Financial transitions using FINTECH during the COVID-19 crisis in Bulgaria. Risks, 9(3), 48. https://doi.org/10.3390/risks9030048
Wagen, W. V. D., & Pieters, W. (2020). The hybrid victim: Reconceptualizing high-tech cyber victimization through actor-network theory. European Journal of Criminology, 17(4), 480-497.
World Health Organisation (WHO). (2020, March 11). WHO Director-General's opening remarks at the media briefing on COVID-19 - 11 March 2020. https://www.who.int/director-general/speeches/detail/who-director-general-s-opening-remarks-at-the-media-briefing-on-covid-19---11-march-2020
Zarouali, B., Poels, K., Ponnet, K. & Walrare, M. (2018). Everything under control? Privacy control salience influences both critical processing and perceived persuasiveness of targeted advertising among adolescents. Cyberpsychology: Journal of Psychosocial Research on Cyberspace, 12(1). https://doi.org/10.5817/CP2018-1-5
Refbacks
- There are currently no refbacks.
e-ISSN: 2289-1528