Security Threats to Privacy Data of Malaysian Youth’s: Online Transaction and Communication

Shariffah Mamat, Wan Amizah Wan Mahmud, Arina Anis Azlan

Abstract


The new norms during the COVID-19 pandemic contributed to the increased usage of the online medium. The International Labour Organization (ILO) reports that millions of people were forced to stay at home during difficult situations (2020). Both the government and corporate sectors are changing the landscape of their services to online services. Apart from its benefits, the rapid adoption of technology also increases the risk of data breaches among individuals' personal information. This article focuses on the intention factor as a motivation to protect the security of personal data among the youth. A total of 535 respondents in the range of 19 to 30 years old from Putrajaya and Cyberjaya. They are randomly selected using a multistage cluster sampling method. A set of questionnaires were distributed online during the Movement Control Order (MCO) that hit all over the world including Malaysia. To analyse factors affecting the Malaysian youth in protecting the security of personal data the multiple linear regression analysis was applied. This article reports the intention factor has a dominant influence in motivating Malaysian youth to protect the security of their data. Additionally, findings showed that family connection and online banking transactions as the main factors in using online compared to other motives measured in this study. Therefore, Malaysian youths should be given the knowledge and awareness to keep on vigilant and protect their data security. Their motivations need to be nurtured to ensure that Malaysian youth’s personal data remain protected even if they are actively interacting online.

 

Keywords: Intention, threat assessment, coping skills, data privacy, youth, online.

 

https://doi.org/10.17576/JKMJC-2023-3901-19


Full Text:

PDF

References


Ahmad, N. A., & Othman, N. (2019). Information Privacy Awareness Among Young Generation in Malaysia. Journal of Science, Technology and Innovation Policy (JoSTIP), 6(2), 1-10.

Ahmad, N. (2022). Dear free Malaysia Today - Your words matter: COVID-19 and its subtle rhetoric. SEARCH Journal of Media and Communication Research, 14(1), 19-32.

Ajzen, I. (1985). From intention to action: A theory of planned behaviour. In Kuhl J. & Beckman J. (Eds.), Action control: From cognition to behaviour (pp. 11–39). Springer.

Ajzen, I. (1991). The theory of planned behaviour. Organizational Behaviour and Human Decision Processes, 50(2), 179-211. https://doi.org/10.1016/0749-5978(91)90020-T

Ajzen, I. (2020). The theory of planned behavior: Frequently asked questions. Human Behavior and Emerging Technologies, 2(4), 314-324. https://doi.org/10.1002/hbe2.195

Alagaratnam, S. (2021, January 6). Malaysia: Perlindungan data peribadi pekerja di Malaysia - Peraturan perlindungan data am (GDPR) dan Akta Perlindungan Data Peribadi 2010 (PDPA). Mondaq. https://www.mondaq.com/data-protection/1022286/protection-of-employee39s-personal-data-in-malaysia--general-data-protection-regulation-gdpr-and-personal-data-protection-act-2010-pdpa?type=related

Al-Saadi, N. (2021). The impact of COVID-19 on banks in the European Union. Riwqs, 9(102). https://www.academia.edu/52453379/The_Impact_of_the_COVID_19_on_banks_in_the_European_Union

Ali, H. M., & Malaco, O. H. (2022). Public health intervention: Exploring crisis communication elements in media reports on COVID-19 in Bangladesh. SEARCH Journal of Media and Communication Research, 14(1), 33-48.

Allington, D., Duffy, B., Wessely, S., Dhavan, N., & Rubin, J. (2021). Health-protective behaviour, social media usage, and conspiracy belief during the COVID-19 public health emergency. Psychological Medicine, 51(10), 1763-1769.

Anderson, B. B., Vance, A., Kirwan, C. B., Eargle, D., & Jenkins, J. L. (2016). How users perceive and respond to security messages: A NeuroIS research agenda and empirical study. European Journal of Information Systems, 25(4), 364-390. https://doi.org/f82s55

Anderson, C. L., & Agarwal, R. (2010). Practicing safe computing: A multimethod empirical examination of home computer user security behavioral intentions. MIS Quarterly, 34(3), 613-643. https://doi.org/10.2307/25750694

Auxier, B., & Anderson M. (2021, April 7). Social media use in 2021. PEW Research Centre. https://www.pewresearch.org/internet/2021/04/07/social-media-use-in-2021

Baker, M. (2020, March 19). Gartner HR survey reveals 88% of organizations have encouraged or required employees to work from home due to Coronavirus. Gartner. https://www.gartner.com/en/newsroom/press-releases/2020-03-19-gartner-hr-survey-reveals-88--of-organizations-have-e

Bank Negara Malaysia (BNM). (2017). Appendix 3: Personal data protection notice. https://www.bnm.gov.my/documents/20124/2493527/edu_Appendix+3.pdf

Bank Negara Malaysia (BNM). (2020). Risk management in technology (RMiT). https://www.bnm.gov.my/documents/20124/963937/Risk+Management+in+Technology+(RMiT).pdf/810b088e-6f4f-aa35-b603-1208ace33619?t=1592866162078

Barnett, J. (2022, March 22). How can you control what you cannot see? Managing control over customer data. CPO Magazine. https://www.cpomagazine.com/data-protection/how-can-you-control-what-you-cannot-see-managing-control-over-customer-data/

Bernama. (2021, February 4). Malaysia dalam keadaan terkawal daripada ancaman siber. https://www.bernama.com/bm//news.php?id=1928266

Berger, R. (2021). Cyber security and data privacy: Key considerations for policymakers. Huawei. https://www-file.huawei.com/-/media/corporate/Local-site/ca/images/2021/cyber-security-and-data-privacy_en.pdf

Bischoff, P. (2021, September 26 ). Which countries have the worst (and best) cybersecurity? Compari Tech. https://www.comparitech.com/blog/vpn-privacy/cybersecurity-by-country

Blank, G., Bolsover, G., & Dubois, E. (2014). A new privacy paradox: Young People and Privacy on Social Network Sites. Prepared for the Annual Meeting of the American Sociological Association, 17 August 2014, San Francisco, California. https://doi.org/gf5p65

Buang, S. (2020, November 29). Selamatkan data pengguna MySejahtera? Sinar Harian. https://www.sinarharian.com.my/article/112441/khas/pendapat/selamatkah-data-pengguna-mysejahtera

Boerman, S. C., Kruikemeier, S., & Borgesius, F. J. Z. (2021). Exploring Motivations for Online Privacy Protection Behavior: Insights from Panel Data. Communication Research, 48(7), 953-977. https://doi.org/10.1177/0093650218800915

Boss, S. R., Galletta, D. F., Lowry, P. B., Moody, G. D., & Polak, P. (2015). What do users have to fear? Using fear appeals to engender threats and fear that motivate protective behaviors in users. MIS Quarterly, 39(4), 837-864.

Chen, H., Beaudoin, C. E., & Hong, T. (2016). Protecting oneself online: The effects of negative privacy experiences on privacy protective behaviors. Journalism and Mass Media Quarterly, 93(2), 409–429. https://doi.org/10.1177/1077699016640224

Chen, T., Hammer, J., & Dabbish, L. (2019). Self-efficacy-based game design to encourage security behavior online (Conference paper). Paper presented at CHI Conference on Human Factors in Computing Systems Extended Abstracts (CHI’19 Extended Abstracts), pp. 1-6. https://doi.org/10.1145/3290607.3312935

Cohen, K., & Yeung, C. (2015). Kids apps disclosure revisited. Federal Trade Commission. https://www.ftc.gov/news-events/blogs/business-blog/2015/09/kids-apps-disclosures-revisited

Cummings, C. L., Chuah, A. S. F., & Ho, S. S. (2018). Protection motivation and communication through nanofood labels: Improving predictive capabilities of attitudes and purchase intentions toward nanofoods. Science, Technology, & Human Values, 43(5), 888–916.

Daisyme, P. (2015, December 24). Why millennials don’t worry that much about online security. Entrepreneur. https://www.entrepreneur.com/science-technology/why-millennials-dont-worry-that-much-about-online-security/254121

Das, G., Cheung, C., Nebeker, C., Bietz, M., & Bloss, C. (2018). Privacy policies for apps targeted toward youth: Descriptive analysis of readability. JMIR Mhealth Uhealth, 6(1), e3. http://doi.org/10.2196/mhealth.7626

Department for Digital, Culture, Media and Sport. (2021). Cyber security breaches survey 2021 - PDF Version. Ipsos MORI. https://www.gov.uk/government/statistics/cyber-security-breaches-survey-2021

Eri, Y., Islam, M. A., & Daud, K. A. K. (2011). Factors that influence customers buying intention on shopping online. International Journal of Marketing Studies, 3(1), 128-139. https://doi.org/10.5539/ijms.v3n1p128

Fraga-Lamas, P., Fernández-Caramés, T. M., Suárez-Albela, M., Castedo, L. & González-López, M. (2016). A review on internet of things for defense and public safety. Sensors, 16(10), 1644. https://doi.org/10.3390/s16101644

Gastelú, C. A. T., Zanabria, L. F. M., & Armenta, J. A. (2020). Attitude of Latin American youth towards online security and privacy (Conference paper). Paper presented at 2020 X International Conference on Virtual Campus (JICV), 03-05 December 2020. Tetouan, Morocco. https://doi.org/10.1109/JICV51605.2020.9375820

Gil, D. B., Llinares, F. M., Moneva, A., Kemp, S., & Castano, N. D. (2021). Cybercrime and shifts in opportunities during COVID-19: A preliminary analysis in the UK. European Societies, 23(1), 547-559. https://doi.org/10.1080/14616696.2020.1804973

Grimes, M., & Marquardson, J. (2019). Quality matters: Evoking subjective norms and coping appraisals by system design to increase security intentions. Decision Support Systems, 119, 23-34. https://doi.org/10.1016/j.dss.2019.02.010

Hawdon, J., Parti, K., & Dearden, T. E. (2020). Cybercrime in America amid COVID-19: The Initial Results from a Natural Experiment. American Journal of Criminal Justice, 45, 546-562. https://doi.org/10.1007/s12103-020-09534-4

IBM Security. (2021). Cost of a data breach: A view from the cloud 2021. https://www.ibm.com/downloads/cas/JDALZGKJ

Institute for Youth Research Malaysia (IYRES). (2021). Statistik populasi penduduk & penduduk belia mengikut kategori umur, jantina, etnik, daerah & negeri di Malaysia bagi tahun 2015-2021. Malaysia Youth Data Bank System. https://ydata.iyres.gov.my/iyresbankdataV2/www/index.php?r=pub/home/readcontent4&id=134

International Labour Organisation (ILO). (2020). COVID-19 and the media and culture sector. https://www.ilo.org/wcmsp5/groups/public/---ed_dialogue/---sector/documents/briefingnote/wcms_750548.pdf

Ishak, M. S., Ismail, A., Mat, B., Kassim, A., Mamat, S., & Talib, N. (2016). The influence of television programs on the social development of youth. Malaysian Journal of Youth Studies, 15(9), 29-44.

Jabatan Perangkaan Malaysia (DOSM). (2021a). Siaran akhbar statistik utama tenaga buruh di Malaysia, Februari 2021. https://www.dosm.gov.my/v1/index.php?r=column/pdfPrev&id=UXlFcW1pSnhhZUFSSTc0RDhnR3V3dz09

Jabatan Perangkaan Malaysia (DOSM). (2021b). Kenyataan media penggunaan dan capaian ICT oleh individu dan isi rumah 2020. https://www.dosm.gov.my/v1/uploads/files/5_Gallery/2_Media/4_Stats%40media/4-Press_Statement/2021/20210412-Kenyataan_Media-Penggunaan_dan_Capaian_ICT_oleh_Individu_dan_Isi_Rumah_2020.pdf

Jenkins, J. L., & Durcikova, A. (2013). What, I shouldn’t have done that?: The influence of training and just-in-time reminders on secure behavior. ICIS 2013 Proceedings, 7. https://aisel.aisnet.org/icis2013/proceedings/SecurityOfIS/7

Johnson J. (2021). Digital population worldwide. Statista. https://www.statista.com/statistics/617136/digital-population-worldwide

Kaspersky. (2021, Dec 15). How GDPR changed the world, and privacy regulation’s future. https://kfp.kaspersky.com/news/how-gdpr-changed-the-world-and-privacy-regulations-future

Kemp, S., Gil, B. D., Moneva, A., Llinares, F. M., & Castaño, N. D. (2021). Empty streets, busy internet: A time-series analysis of cybercrime and fraud trends during COVID-19. Journal of Contemporary Criminal Justice, 37(4), 480-501. https://doi.org/gmzdz9

Kemp, S. (2021, January 27). Digital 2021: Global overview report. Data Reportal. https://datareportal.com/reports/digital-2021-global-overview-report

Larose, R., & Rifon, N. J. (2007). Promoting i-safety: Effects of privacy warnings and privacy seals on risks assessment and online privacy behavior. The Journal of Consumers Affairs, 41(1), 127-149. https://www.jstor.org/stable/23860017

Lechner, P. (2020, July 7). GDPR: Three ways the world has changed in privacy law's first two years. CPO Magazine. https://cpomagazine.com/data-protection/gdpr-three-ways-the-world-has-changed-in-the-privacy-laws-first-two-years/

Lee, H., Wong, S. F., & Chang, L. Y. (2016). Confirming the effect of demographic characteristics on information privacy concerns. The 20th Pacific Asia Conference on Information Systems (PACIS 2016), 70. https://aisel.aisnet.org/pacis2016/70

Lee, J. (2021). Responses to media coverage of the COVID-19 pandemic and information behaviour in the Japanese context. SEARCH Journal of Media and Communication, 13(1), 111-126.

Luthfia, A., Triputra, P., & Hendriyani. (2020). The impact of internet motive and access on the opportunities and risks of teenager internet users in Indonesia. Solid State Technology, 63(4), 981-989.

Majid, A., & Alizan, T. A. T. (2019). Data protection- Malaysia's World Ranking. Mondaq. https://www.mondaq.com/data-protection/867540/data-protection-malaysia39s-world-ranking

Majlis Keselamatan Negara (MKN). (2022). SOP pelan pemulihan negara (PPN). https://www.mkn.gov.my/web/ms/sop-perintah-kawalan-pergerakan/

Mahbob M. H., Sulaiman, W. I. W., Rahim, S. A., Jaafar, W. A. W., & Sulaiman, W. S. W. (2013). Acceptance of social innovation in Malaysia Advocacy and the impact of government transformation programme (GTP). Journal of Asian Pacific Communication, 23(2), 223-238. https://doi.org/10.1075/japc.23.2.04mah

Malaysian Communications and Multimedia Commission (MCMC). (2020). Internet users survey 2020. https://www.mcmc.gov.my/en/resources/statistics/internet-users-survey#

Mekovec, R., & Vrček, N. (2020). Factors that influence internet users privacy perception. Proceedings of the ITI 2011, 33rd International Conference on Information Technology Interfaces, 27-30 June 2011 (pp. 227-232). Cavtat, Croatia.

Menard, P., Warkentin, M., & Lowry, P. B. (2018). The impact of collectivism and psychological ownership on protection motivation: A cross-cultural examination. Computers & Security, 75(June), 147-166. https://doi.org/10.1016/j.cose.2018.01.020

Milne, S., Sheeran, P., & Orbell, S. (2000). Prediction and intervention in health-related behavior: A meta-analytic review of protection motivation theory. Journal Application Social Psychology, 30(1), 106-143. https://doi.org/cdbqcf

Ministry of Health Malaysia (MOH). (2021, August 20). Situasi terkini COVID-19 di Malaysia 20 OGOS 2021. https://covid-19.moh.gov.my/terkini/2021/08/situasi-terkini-covid-19-di-malaysia-20082021

Ministry of Health Malaysia (MOH). (2022, January 2). Situasi terkini COVID-19 di Malaysia 01 JAN 2022. Covid-19 Malaysia. https://covid-19.moh.gov.my/terkini/2022/01/situasi-terkini-covid-19-di-malaysia-01012022

Ministry of Youth and Sports Malaysia. (1997). National Youth Development Policy 1997.

Ministry of Youth and Sports Malaysia. (2007). Youth Association and Youth Development Act. (Act 668).

Ministry of Youth and Sports Malaysia. (2015). Malaysian Youth Policy 2015-2035.

Moody, G. D., Siponen, M., & Pahnila, S. (2018). Toward a unified model of information security policy compliance. MIS Quarterly, 42(1), 285-311. https://doi.org/gdsh6z

Muller, J. (2021). Social media users as a percentage of the total population in Malaysia 2021. Statista.

Nasir, A., Arshah, R. A., & Hamid, M. R. A. (2018). The significance of main constructs of theory of planned behavior in recent information security policy compliance behavior study: A comparison among top three behavioral theories. International Journal of Engineering & Technology, 7(2.29), 737-741. https://doi.org/j4gc

Neubauer, L. (n.d). Cybersecurity series: Make cybersecurity essential to the business. Gartner. https://www.gartner.com/en/webinar/451821/1064701

Pallant, J. (2011). SPSS survival manual: A step by step guide to data analysis using SPSS. (4th ed.). Allen & Unwin. Australia.

Pang, S. M., Tan, B. C., & Lau, T. C. (2021). Antecedents of consumers’ purchase intention towards organic food: Integration of theory of planned behavior and protection motivation theory. Sustainability, 13(9), 5218. https://doi.org/10.3390/su13095218

Parliament of Malaysia. (2010). Personal Data Protection Act (PDPA) 2010 (Act 709). Department of Personal Data Protection. https://www.pdp.gov.my/jpdpv2/laws-of-malaysia-pdpa/personal-data-protection-act-2010/?lang=en

Payne, B. K. (2020). Criminals work from home during pandemics too: A public health approach to respond to fraud and crimes against those 50 and above. American Journal of Criminal Justice, 45(4), 563-577.

Pitchan, M. A., Mahmud, W. A. W., Sannussi, S. N., & Salman, A. (2015). Control and freedom of the Internet: Challenges faced by the government. Journal of Asian Pacific Communication, 25(2), 243-252.

Quaglio, G., & Millar, S. (2020). Potentially negative effects of internet use. European Parliament STOA. https://www.europarl.europa.eu/stoa/en/document/EPRS_IDA(2020)641540

Raines, C. (2003). Connecting generations: The sourcebook for a new workplace. Boston, MA: Crisp Learning.

Ribeiro, S., Burkhardt, C., & Caneppele, S. (2021). Covid-19 crime and criminal justice: Mapping criminological research project around the world. Research Briefs (Series UNILCRIM, Université de Lausanne, Switzerland). Serval. https://serval.unil.ch/en/notice/serval:BIB_8D794DDA3C3D

Rogers, R. W. (1975). A protection motivation theory of fear appeals and attitude change. Journal of Psychology, 91(1), 93-114.

Rogers, R. W. (1983). Attitude change and information integration in fear appeals. Psychological Reports, 56(1), 179–182. https://doi.org/10.2466/pr0.1985.56.1.179

Rozlan, N. I. (2021, September 29). Data empat juta rakyat Malaysia dalam bahaya. Sinar Harian. https://www.sinarharian.com.my/article/164055/berita/nasional/data-empat-juta-rakyat-malaysia-dalam-bahaya

Saizan, Z., & Singh, D. (2018). Cyber security awareness among social media users: A case study in German-Malaysian Institute (GMI). Asia-Pacific Journal of Information Technology and Multimedia, 7(2), 111-127.

Schaik, P. V., Jansen, J., Onibokun, J., Camp, J., & Kusev, P. (2018). Security and privacy in online social networking: Risk perceptions and precautionary behaviour. Computers in Human Behavior, 78, 283-297. https://doi.org/10.1016/j.chb.2017.10.007

Sen, J. (2014). Security and privacy issues in cloud computing. In A. Ruiz-Martinez, R. Marin-Lopez, & F. Pereniguez-Garcia (Eds.), Architectures and protocols for secure information technology infrastructures (pp. 1-45). IGI Global. https://doi.org/j4gf

Shin, W. (2020). Youth media consumption and privacy risks in the digital era . In M. Filimowicz & V. Tzankova (Eds.), Reimagining communication: Experience (Vol 2, Chapter 12, pp. 195-208). Routledge.

Singh, A., & Singh, S. K. (2019). Technology revolution gives cybercrime a boost: Cyber-attacks and cybersecurity. International Journal of Advance Computational Engineering and Networking (IJACEN), 7(8), 5-9. https://iraj.in/journal/IJACEN/paper_detail.php?paper_id=15929&name=Technology_Revolution_gives_Cybercrime_a_Boost:_Cyber-Attacks_and_Cyber_Security

Tabachnick, B. G., & Fidell, L. S. (2013). Using multivariate statistics (6th ed.). Pearson.

Tang, Z., Miller, A. S., Zhaou, Z., & Warkentin, M. (2021). Does government social media promote users information security behavior towards COVID-19 scams? Cultivation effects and protective motivations. Government Information Quarterly, 38(2), 101572.

Tsang, M. M., Ho, S. C., & Liang, T. P. (2004). Consumer attitudes toward mobile advertising. International Journal of Electronic Commerce, 83(3), 65-78.

Vance, A., Siponen, M., & Pahnila, S. (2012). Motivating IS security compliance: Insights from habit and protection motivation theory. Information & Management, 49(3-4), 190-198. https://doi.org/10.1016/j.im.2012.04.002

Vasenska, I., Dimitrov, P., Davidkova, B. K., Krastev, V., Durana, P., & Paulaki, I. (2021). Financial transitions using FINTECH during the COVID-19 crisis in Bulgaria. Risks, 9(3), 48. https://doi.org/10.3390/risks9030048

Wagen, W. V. D., & Pieters, W. (2020). The hybrid victim: Reconceptualizing high-tech cyber victimization through actor-network theory. European Journal of Criminology, 17(4), 480-497.

World Health Organisation (WHO). (2020, March 11). WHO Director-General's opening remarks at the media briefing on COVID-19 - 11 March 2020. https://www.who.int/director-general/speeches/detail/who-director-general-s-opening-remarks-at-the-media-briefing-on-covid-19---11-march-2020

Zarouali, B., Poels, K., Ponnet, K. & Walrare, M. (2018). Everything under control? Privacy control salience influences both critical processing and perceived persuasiveness of targeted advertising among adolescents. Cyberpsychology: Journal of Psychosocial Research on Cyberspace, 12(1). https://doi.org/10.5817/CP2018-1-5


Refbacks

  • There are currently no refbacks.


e-ISSN: 2289-1528