Social Media as a National Security Threat: Roles, Limits, and Opportunities for the Malaysian Armed Forces (MAF)
Abstract
The advent of social media has transformed communication and information dissemination, posing significant risks to national security. This study examines the social media threat to Malaysia’s cyber security and the role of the Malaysian Armed Forces (MAF) in maintaining national security. Disinformation involves the intentional spread of false information while misinformation refers to the unintentional dissemination of incorrect information. In Malaysia, such campaigns have been particularly influential during political events like the 2018 General Election. Social media platforms are also used by extremist groups to radicalise and recruit individuals. The MAF play a crucial role in mitigating these threats through advanced cyber defence capabilities, collaboration with government agencies, and public awareness initiatives. However, several research gaps remain, including the need for MAF to contribute to national cyber security. This study employs a qualitative method, using interviews with representatives from Malaysian ministries, agencies, and experts to analyse current cybersecurity threats and the role of the MAF in safeguarding national security. The findings underscore the importance of a proactive and collaborative approach, leveraging advanced technologies, enhancing inter-agency cooperation, and promoting public awareness to effectively mitigate social media threats. By implementing these strategies, the MAF can play a pivotal role in protecting Malaysia's national security in the digital age.
Full Text:
PDFReferences
Allcott, H., & Gentzkow, M. (2017). Social media and fake news in the 2016 election. Journal of Economic Perspectives, 31(2), 211-236. https://doi.org/10.1257/jep.31.2.211
Arpinar, I., Kursuncu, U., & Achilov, D. (2016). Social Media Analytics to Identify and Counter Islamist Extremism: Systematic Detection, Evaluation, and Challenging of Extremist Narratives Online. 2016 International Conference on Collaboration Technologies and Systems (CTS), 611-612. https://doi.org/10.1109/CTS.2016.0113
Awan, I. (2017). Cyber-extremism: Isis and the power of social media. Society, 54(2), 138–149. https://doi.org/10.1007/s12115-017-0114-0
Baldwin, D. A. (1997). The concept of security. Review of International Studies, 23(1), 5–26. https://doi.org/10.1017/S0260210597000053
Bernama. (2021, June 28). Cyber security complements efforts to accelerate economic growth – PM Muhyiddin. Bernama. https://www.bernama.com/en/news.php?id=1976434
Bernama. (2022, October 10). Three PMs in one parliamentary term, Malaysia makes its own history. Bernama. https://www.bernama.com/en/news.php?id=2127958
Bhandari, D., & Gyawali, N. (2020). COVID-19 and Public health infrastructure in Nepal. Health Policy and Planning, 35(6), 686-693. https://doi.org.10.3126/unityj.v6i1.75629
Budhathoki, I. (2025). Multi-dimensional strategy for combating non-traditional security threats in Nepal. Unity Journal, 6(1), 202–215. https://doi.org/10.3126/unityj.v6i1.75629
Buzan, B., Wæver, O., & de Wilde, J. (1998). Security: A new framework for analysis. Lynne Rienner Publishers.
Coker, C. (2009). War in an age of risk. Polity Press.
Communications and Multimedia Act 1998 (Malaysia).
Computer Crimes Act 1997 (Malaysia).
Conway, M. (2017). Determining the role of the internet in violent extremism and terrorism: Six suggestions for progressing research. Studies in Conflict & Terrorism, 40(1), 77-98. https://doi.org/10.1080/1057610X.2016.1157408
Conway, M., Scrivens, R., & Macnair, L. (2019). Right-wing extremists' persistent online presence: History and contemporary trends. International Centre for Counter-Terrorism. http://www.jstor.org/stable/resrep19623
Cudjoe, D. (2025). Cybersecurity technology as a tool for small-state securitization: A comparative case study of Estonia and Iceland (Master’s thesis). University of Iceland. https://skemman.is/bitstream/1946/49951/1/Final%20Thesis%20-%20Daniel%20Cudjoe.pdf
Daud, M. (2020). Fake News in the Malaysian 14th General Election: Shall the Net Be Free Forever? IIUM Law Journal, 28(S1), 587-615. https://doi.org/10.31436/IIUMLJ.V28I(S1).587
Elzinga, A. (2025). Securitization of cyber threats: A Foucauldian discourse analysis of cyber news articles in “The Australian” between 2023 and 2024 [Master’s thesis, Leiden University]. https://hdl.handle.net/1887/4210790
Fallis, D. (2015). What is disinformation? Library Trends, 63(3), 401–426. https://doi.org/10.1353/lib.2015.0014
Federal Constitution (Malaysia). (1957, rev. 2010). https://www.agc.gov.my
Floyd, R. (2011). Can securitization theory be used in normative analysis? Towards a just securitization theory. Security Dialogue, 42(4–5), 427–439. https://doi.org/10.1177/0967010611418712
Gatra, S. (2024). ASEAN's Cyber Initiatives: A Select List. Centre for Strategic and International Studies (CSIS). https://www.csis.org/blogs/strategic-technologies-blog/aseans-cyber-initiatives-select-list
Harib, A., Sarijan, S., & Hussin, N. (2017). Information Security Challenges: A Malaysian Context. International Journal of Academic Research in Business and Social Sciences, 7(9), 397-403. https://doi.org/10.6007/IJARBSS/V7-I9/3335
Hassan, A., & Ismail, B. (2016, July 1). Puchong bar blast linked to ISIS. New Straits Times Online. https://www.nst.com.my/news/crime-courts/puchong-bar-blast-linked-isis
Hoffman, B. (2017). Inside terrorism (3rd ed.). Columbia University Press.
Ibrahim, A., Mahmud, N., Isnin, N., Hazelbella Dillah, D., & Nurfauziah Fauz Dillah, D. (2019). Cyber warfare impact to national security - Malaysia experiences. KnE Social Sciences, 3(22), 206–224. https://doi.org/10.18502/kss.v3i22.5052
Ismail, N., Jawhar, J., Yusof, D., Ismail, A., & Akhtar, R. (2022). Understanding Malaysian youth's social media practices and their attitude towards violent extremism. Intellectual Discourse, 30(1), 187-213. https://doi.org/10.31436/id.v30i1.1855
Jaafar, M., Akhmetova, E., & Aminudin, R. (2020). The factors contributing to the rise of religious extremism in Malaysia. Jurnal Islam dan Masyarakat Kontemporari, 21(2), 16-27. https://doi.org/10.37231/JIMK.2020.21.2.482
Jackson, N. J. (2024). The securitisation of foreign disinformation. Security and Defence Quarterly, 46(2), 118–138. https://doi.org/10.35467/sdq/190799
Jalal, B., Suparman, M., Basiron, M., & Jamsari, E. (2022). OP BENTENG: Media planning by the National Task Force of Malaysia in creating people awareness in eradicating crime. International Journal of Advanced Research, 10(10), 809-816. https://doi.org/10.21474/ijar01/15571
Johns, A. (2020). 'This will be the WhatsApp election': Crypto-publics and digital citizenship in Malaysia's GE14 election. First Monday, 25(12). https://doi.org/10.5210/fm.v25i12.10381
Kenny, C. (2021, October 5). ASEAN-S'pore centre for training national cyber-security teams opens new campus. The Straits Times. https://www.straitstimes.com/tech/tech-news/asean-spore-centre-for-training-national-cyber-security-teams-opens-new-campus
Klausen, J. (2015). Tweeting the Jihad: Social media networks of Western foreign fighters in Syria and Iraq. Studies in Conflict & Terrorism, 38(1), 1–22. https://doi.org/10.1080/1057610X.2014.974948
Lazer, D. M. J., Baum, M. A., Benkler, Y., Berinsky, A. J., Greenhill, K. M., Menczer, F., Metzger, M. J., Nyhan, B., Pennycook, G., Rothschild, D., Schudson, M., Sloman, S. A., Sunstein, C. R., Thorson, E. A., Watts, D. J., & Zittrain, J. L. (2018). The science of fake news. Science, 359(6380), 1094-1096. https://doi.org/10.1126/science.aao2998
Lim, M. (2017). Freedom to hate: Social media, algorithmic enclaves, and the rise of tribal nationalism in Indonesia. Critical Asian Studies, 49(3), 411-427. https://doi.org/10.1080/14672715.2017.1341188
Malaysia Cyber Security Strategy 2020-2024. (2019). Government of Malaysia.
Malterud, K., Siersma, V. D., & Guassora, A. D. (2016). Sample size in qualitative interview studies: Guided by information power. Qualitative Health Research, 26(13), 1753-1760. https://doi.org/10.1177/1049732316665344
Mikhael, D., & Norman, J. (2018). Refugee youth, unemployment and extremism: Countering the myth. Forced Migration Review, 57, 57–58. https://www.fmreview.org/syria2018/mikhael-norman
Mutimer, D. (1997). Reimagining security: The metaphors of proliferation. In K. Krause & M. C. Williams (Eds.), Critical security studies: Concepts and cases (pp. 187–213). UCL Press.
Nor, M., & Gale, P. (2021). Growing fear of Islamisation: Representation of online media in Malaysia. Journal of Muslim Minority Affairs, 41(1), 17-33. https://doi.org/10.1080/13602004.2021.1903161
Othman, Z. (2018). Jaringan komunikasi dan media: Satu analisis dari perspektif keselamatan insan. Jurnal Komunikasi: Malaysian Journal of Communication, 34(3). https://doi.org/10.17576/JKMJC
Penal Code (Malaysia). https://www.agc.gov.my
Rahim, S. S. I., Mohd Huda, M. I., Sa'ad, S., & Moorthy, R. (2024). Cyber security crisis/threat: Analysis of Malaysia National Security Council (NSC) involvement through the perceptions of government, private and people based on the 3P Model. e-Bangi: Journal of Social Sciences and Humanities, 21(2), 191-201. http://ejournal.ukm.my/ebangi
Sabtu, S., & Mohamad, K. (2020). Critical information infrastructure protection framework development: Preliminary findings from the Malaysian public sector. 2020 8th International Conference on Information Technology and Multimedia (ICIMU), 1-6. https://doi.org/10.1109/ICIMU49871.2020.9263397
Seman, R., Laidey, N., & Ali, R. (2019). Netizens' political engagement in Malaysia: Impact of Anti Fake News Act 2018. Jurnal Pengajian Media Malaysia, 21(1), 103-116. https://doi.org/10.22452/jpmm.vol21no1.6
Tan, J. J. (2024). Social media political information use and political participation of the next generation. e-Bangi: Journal of Social Sciences and Humanities, 21(1), 198-211. https://doi.org/10.17576/ebangi.2024.2101.17
Tapsell, R. (2018). The smartphone as the 'weapon of the weak': Assessing the role of communication technologies in Malaysia's regime change. Journal of Current Southeast Asian Affairs, 37(3), 9-29. https://doi.org/10.1177/186810341803700302
Tay, K. L. (2023). ASEAN cyber-security cooperation: Towards a regional emergency-response framework. The International Institute for Strategic Studies.
Vosoughi, S., Roy, D., & Aral, S. (2018). The spread of true and false news online. Science, 359(6380), 1146–1151. https://doi.org/10.1126/science.aap9559
Wæver, O. (2004). Discursive approaches. In A. Wiener & T. Diez (Eds.), European integration theory (pp. 197–215). Oxford University Press.
Wardle, C., & Derakhshan, H. (2017). Information disorder: Toward an interdisciplinary framework for research and policy making (Report No. DGI(2017)09). Council of Europe.
Wibowo, S. E., Hartono, A., Kiswanto, H., Primawanti, H., Louerens, J. T. A., & Torang, J. (2024). Securitization of cyber threats to the Indonesian government: A study of cyber defense strategy. Global Political Studies Journal, 8(2), 97–108. https://doi.org/10.34010/gpsjournal.v8i2.13817
Williams, M. C. (2003). Words, images, enemies: Securitization and international politics. International Studies Quarterly, 47(4), 511–531. https://doi.org/10.1111/j.0020-8833.2003.00277
DOI: http://dx.doi.org/10.17576/ebangi.2026.2301.08
Refbacks
- There are currently no refbacks.
-
_________________________________________________
eISSN 1823-884x
Faculty of Social Sciences & Humanities
Universiti Kebangsaan Malaysia
43600 UKM Bangi, Selangor Darul Ehsan
MALAYSIA
© Copyright UKM Press, Universiti Kebangsaan Malaysia