UPSI Digital Repository (UDRep)
|
![]() |
|
|
Abstract : Perpustakaan Tuanku Bainun |
Di Malaysia, kemunculan gerakan cybertroopers dilihat signifikan pada Pilihan Raya
Umum ke-12 dan berkembang pada Pilihan Raya ke-14. Sejajar dengan
perkembangan ini, isu cybertroopers mula mendapat perhatian ramai sarjana yang
mengkaji tentang kewujudan dan peranannya dalam konteks politik di Malaysia.
Namun, kajian berkaitan pendefinisian istilah politik cybertroopers masih lagi terhad
sehingga istilah ini turut disamakan dengan konsep netizen, keyboard warriors, dan
askar siber. Malah, kajian tentang ancaman kumpulan cybertroopers ke atas
keselamatan negara juga kurang dibincangkan di Malaysia. Oleh itu, kajian ini
menyelidiki konsep dan tipologi yang sesuai bagi menggambarkan cybertroopers
dalam konteks Malaysia, ancaman yang dibawa oleh cybertroopers kepada
keselamatan nasional serta mekanisme terbaik bagi mengawai gerakan ini. Kajian ini
menggunakan kaedah campuran iaitu gabungan pendekatan kualitatif dan kuantitatif.
Bagi kaedah kuantitatif, kajian tinjauan menerusi instrumen soal selidik digunakan dan
diedarkan secara rawak kepada seramai 395 belia di Perak dan Selangor. Manakala,
bagi kaedah kualitatif, instrumen temu bual bersama 10 informan yang dipilih secara
bertujuan daripada golongan akademik, cybertroopers dan aktivis politik telah
digunakan. Dapatan kajian menunjukkan definisi istilah cybertroopers merujuk kepada
pihak yang diupah menjadi agen perantara antara pemimpin dengan rakyat untuk
menyampaikan sesuatu isu yang boleh mempengaruhi pemikiran masyarakat di media
sosial. Dapatan kajian juga mendapati bahawa gerakan cybertroopers ini memberi
ancaman yang sederhana (min: 2.29, s.p: 0.36) di mana mereka berupaya
mengganggu gugat kestabilan politik, tetapi tidak memberi ancaman besar terhadap
keselamatan negara. Selain itu, tindakan kerajaan melaksanakan pengawasan dan
penapisan siber (min: 2.50, s.p: 0.33), serta penerapan pendidikan keselamatan siber
(min: 2.79, s.p: 0.45) kepada masyarakat merupakan mekanisme kawalan yang paling
efektif dalam mengawal gerakan ini. Implikasi kajian ini diharap dapat memberi
pendefinisan terkini kepada istilah cybertroopers, sekali gus membantu kerajaan dalam
membangunkan kerangka baharu dalam menangani gerakan cybertroopers di
Malaysia. |
References |
Aceto, G., & Pescapé, A. (2015). Internet censorship detection: A survey. Computer Networks, 83, 381-421. Adibah, I. (2020). Kebebasan dan kawalan media di Malaysia: Kajian perbandingan media baru dan media tradisional. International Journal of Modern Trends in Social Sciences, 3 (13), 24-38. Ahmad Johari, M. A. (2020, 9 September). ‘Rosmah biayai RM100,000 sebulan pasukan cybertrooper’. Berita Harian. https://www.bharian.com.my/berita/kes/2020/09/729516/rosmah-biayai-rm100000-sebulan-pasukan-cybertrooper. Ahmad Sauffiyan, H. (2019). Pendemokrasian media dan cabaran keselamatan dalam era digital. Jurnal Komunikasi: Malaysia Journal of Communication, 35(1), 237-251. Al-Rawi, A., & Anis, R. (2020). Manufacturing rage: The Russian Internet Research Agency’s political astroturfing on social media. First Monday, 25(9). https://doi.org/10.5210/fm.v25i9.10801 Alyaa, A. (2018, 6 Mei). BERSIH: Banyak undi pos belum sampai ke pengundi. Malaysiakini. https://www.malaysiakini.com/news/423347. Amir Ridzuan, I., & Roselan, A. M. (2019, 2 Februari). Peniaga hina Yang di-Pertuan Agong disiasat mengikut Akta Hasutan 1948. Berita Harian. https://www.bharian.com.my/berita/kes/2019/02/526931/peniaga-hina-yang-di-pertuan-agong-disiasat-mengikut-akta-hasutan-1948. Anderson, G., & Arsenault, N. (1998). Fundamentals of educational research. (2nd edition). London: Falmer Press. Astro Awani. (2013, 27 November). Sindiket 'African Scam' catatkan kerugian sehingga RM33.6 juta tahun lalu. https://www.astroawani.com/berita-malaysia/sindiket-african-scam-catatkan-kerugian-sehingga-rm336-juta-tahun-lalu-26003 Astro Awani. (2020, September 9). Rosmah ‘Biayai’ cybertroopers rm 100,000 sebulan, pantau berita negatif termasuk isu beg tangan mahal. https://www.astroawani.com/berita-malaysia/rosmah-biaya-cybertroopers- rm100000-sebulan-pantau-berita-negatif-termasuk-isu-beg-tangan-mahal-258703 Babbie, E. (2005). The basics of social research. (3rd edition). London: Thomson Wadsworth. Bastos, M.T., & Mercea, D. (2017). The Brexit botnet and user-generated hyperpartisan news. Social Science Computer Review. Advanced online publication, 1–18. http://doi:10.1177/0894439317734157 Baylis J. (2008). The concept of security in international relations. Dalam Brauch H. et al. (eds). Globalization and Environmental Challenge: Reconceptualizing Security in the 21st Century. Hexagon Series on Human and Environmental Security and Peace book series (HSHES, Vol. 3). Berlin, Heidelberg: Springer. Bayu Faris, A. (2019). Strategi Indonesia dalam Menghadapi Konstelasi Siber Global. Tesis Sarjana, Universitas Jember. Bazeley, P. (2007). Qualitative data analysis with NVivo. London: Sage. Bell, J. (1999). Doing your research project: A guide for first-time researchers in education and social science (3rd edition.). Buckingham, Philadelphia: Open University Press. Berg, B.L. (2001). Qualitative research, Message for the Social Sciences. Boston: Allin and Bacon. Biegel, S. (2001). Beyond our control? Confronting the limits of our legal system in the age of cyberspace. Cambridge, MA: MIT Press. Blaikie, N. (2003). Analyzing quantitative data. From description to explanation. Thousand Oaks: Sage Publications. Blank, G., & Reisdorf, B. C. (2012). The participatory web. Information, Communication & Society, 15(4), 537-554. http://doi:10.1080/1369118X.2012.665935 Bond, T. G., & Fox, C. M. (2015). Applying the Rasch Model fundamental measurement in the Human Sciences. London: Routledge. Bradshaw, S. & Howard, P. N. (2019). The global disinformation order: 2019 global inventory of organised social media manipulation. Computational Propaganda Research Project. London: University Of Oxford. Braun, V., & Clarke, V. (2006) Using thematic analysis in psychology. Qualitative Research in Psychology, 3 (2), 77-101. Bryman, A. (2007). Barriers to integrating quantitative and qualitative research. Journal of Mixed Methods Research, 1, 8-22. Bryman, A. (2012). Social research methods (4th edition). Oxford: Oxford University Press. Buzan, B., Waever, O., & de Wilde, J. (1998). Security: A new framework for analysis. Boulder: Lynne Rienner. Case, W. (2010). Malaysia’s 2008 general election-transition from single-party dominance? Journal of current Southeast Asian affairs, 29(2), 121-156. Che, S.C. W. (2006). Siber. Jakarta: Pustaka Rubiah. Chomsky, N. (2002). Media control: The spectacular achievements of propaganda. New York: Seven Stories Press. Cohen, B.C. (1963). The press and foreign policy. Princeton: Princeton University Press. Collins, A. (2016). Contemporary security studies. Oxford: Oxford University Press. Corbin, J., & Strauss, A. (2008) Basics of qualitative research: Techniques and procedures for developing grounded theory. Thousand Oaks, CA: Sage Publications. Creswell, J. W. (2009). Research design: Qualitative, quantitative, and mixed methods research. Thousand Oaks: Sage. Crouch, H. (1996). Government and society in Malaysia. Itacha: Cornell University Press. Dahlgren, P. (2007). Young citizens and new media: Learning for democratic participation. New York: Routledge. Data Reportal. (2023). Digital 2023: Malaysia. https://datareportal.com/reports/digital-2023-malaysia. Davenport C. (2007). State repression and the domestic democratic peace. Cambridge, UK: Cambridge University Press. De Vreese, C. H. (2007). Digital renaissance: Young consumer and citizen? The Annals of the American Academy of Political and Social Science, 611, 207-216. Denzin, N.K., & Lincoln, Y.S. (2005). Introduction: The discipline and practice of qualitative research. Dalam N.K. Denzin & Y.S. Lincoln (Eds.). The sage handbook of qualitative research (2nd edition). Thousand Oaks, CA: Sage. Downey, J., & Fenton, N. (2003). New media, counter publicity and the public sphere. New Media Society, 5 (2), 185–202. Easterby-Smith, M., Thorpe, R., & Jackson, P. R. (2012). Management research. New York: Sage Publication. Farid, W. (2019, 2 November). Cybertroopers and rudeness taint online space. The Star, 2. Faugier, J., & Sargeant, M. (1997), Sampling hard to reach populations. Journal Advanced Nursing, 26(4), 790-7. Ferrara, E. (2017). Disinformation and social bot operations in the run up to the 2017 French Presidential Election. First Monday, 22(8). https://doi.org/10.5210/fm.v22i8.8005. Fowler, F.J. (1993). Survey research methods. Newbury Park, USA: Sage Publications, Inc. Freedom House. (2014). Freedom on the net 2014. https://freedomhouse.org/sites/default/files/2020-02/FOTN_2014_Summary_Findings.pdf. Fuchs, C. (2012). The political economy of privacy on Facebook. Television & New Media.13(2), 139-159. George, C. (2017). The EU’s approach to cybersecurity. http://repository.essex.ac.uk/19872/1/EUJapan_9_Cyber_Security_Christous_EU.pdf Golafshani, N. (2003). Understanding reliability and validity in qualitative research. Qualitative Report, 8 (4), 597-607. Goldstein, R. J. (1978). Political repression in modern America: From 1870 to the present. Cambridge, MA: Schenkman. Gomez, E. T., & Surinder Kaur. (2014). Struggling for power: Policies, coalition politics and elections in Malaysia. Ann Arbor, University of Michigan. Grasso, M. & Bessant. J. (2018). Governing youth politics in the age of surveillance. Oxon: Routledge. Haeg, J. (2017). The ethics of olitical bots: Should we allow them for personal use? Journal of Practical Ethics, 5 (2). https://ssrn.com/abstract=3087210. Haikarainen, J. E. (2014). Astroturfing as a global phenomenon. Tesis Sarjana, University of Jyväskylä. Hamdan, O., & Ismail, A. (2015). Ancaman keselamatan internet sebagai isu utama negara: Isu-isu kontemporari, pendekatan, dan penyelesaian. Majalah Ilmiah UNIKOM, 13(2). https://ojs.unikom.ac.id/index.php/jurnal-unikom/article/view/126. Hamid H. (2015, Ogos 9). UMNO needs more keyboard warriors—Najib. Astro Awani. http://english.astroawani.com/politics-news/umno-needs-more-keyboard-warriors-najib-69055. Harris, Z. (2020). Everywhere and nowhere: Cybertroopers and the battle for democracy. https://www.isis.org.my/2020/01/16/everywhere-and-nowhere-cybertroopers-and-the-battle-for-democracy-2/ Hart, S.W., & Klink, M.C. (2017). 1st Troll Battalion: Influencing military and strategic Haspaizi, Z., & Yasmin, R. (2019, 24 Mac). Laskar siber kerjaya lumayan, tapi mencabar. Malaysiakini. https://www.malaysiakini.com/news/469316. Henrie, K. M., Gilde, C. (2019). An examination of the Impact of astroturfing on nationalism: A persuasion knowledge perspective. Social Sciences, 8(2):38. https://doi.org/10.3390/socsci8020038. Hibbs, D. A. (1973). Mass political violence: A cross-national causal analysis. New York: Wiley. Hollande, F. (2015). François Hollande’s Speech Before a Joint Session of Parliament. https://onu.delegfrance.org/Francois-Hollande-s-Speech-Before-a-Joint-Session-of-Parliament. Hong, S. (2013). Who benefits from Twitter? Social media and political competition in the U.S. House of Representatives. Government Information Quarterly, 30 (4), 464-472. Hopkins, J. (2014). Cybertroopers and tea parties: Government use of the Internet in Malaysia. Asian Journal of Communication, 24 (1), 5-24. DOI: 10.1080/01292986.2013.851721. https://kualaselangor.selangor.gov.my/kualaselangor.php/pages/view/98?mid=102 https://www.orangperak.com/senarai-daerah-di-perak.html Human Rights Watch. (2015). Malaysia risks a political meltdown with its attack on free speech. https://www.hrw.org/news/2015/10/30/malaysia-risks-political-meltdown-its-attack-free-speech. Hunter, A. (1995). Local knowledge and local power: Notes on the ethnography of local community elites. Journal of Contemporary Ethnography, 22, 36–58. Irma Syarlina, C. I. (2021). ‘Cybertroopers’ dan implikasinya. https://rootofscience.com/blog/2021/sains-komputer/cybertroopers-dan-implikasinya/. Irwan, S. S. (2017). Inisiatif siber dalam konteks keamanan siber di Filipina. Jurnal Prodi Peperangan Asimetris, 3(2), 65-80. Johns. A & Cheong. N. (2019). Feeling the Chill: Bersih 2.0, state censorship, and “networked affect” on malaysian social media 2012–2018. Social Media + Society, 5(2), 1-12. https://doi.org/10.1177/2056305118821801. Johnson, R., Onwuegbuzie, A. & Turner, L. (2007) Toward a definition of mixed methods research. Journal of Mixed Methods Research, 1 (2),112-133. Jones, H. G. (2013). Plants and microclimate: A quantitative approach to environmental plant physiology. Cambridge: Cambridge University Press. Junaidi, A. B., Mohd Fuad, M. J., & Mohd Nizar, S. (2018). Pilihan Raya Umum Ke-14, 2018: Analisis Terhadap Persaingan Antara BN, PH, PAS dan Parti-Parti Politik Lain. The 12th International Conference on Malaysia-Indonesia Relations (PAHMI12, 2018). Fakulti Sastera dan Sains Sosial, Universiti Malaya, Kuala Lumpur, Malaysia. Junaidi, A. B., Rosmadi, F., Amer Saifude, G., Mohd Azlan, A., Mazlan, A., & Ahmad Rizal. M. Y. (2014). Pilihan Raya Umum (PRU) 2013 di Malaysia: Suatu analisis ‘tsunami politik bandar’. Geografia: Malaysian Journal of Society and Space, 10(4), 28-38. Kahn, K. F., & Kenney, P. J. (1999). Do negative campaigns mobilize or suppress turnout? Clarifying the relationship between negativity and participation. The American Political Science Review, 93 (4), 877–889. Keats, D. (2000). Interviewing: A practical guide for students and professionals. Buckingham: Open University Press. Keller, F. B., Schoch, D., Stier, S., & Yang J. (2020) Political astroturfing on Twitter: How to coordinate a disinformation campaign. Political Communication, 37(2), 256-280. DOI: 10.1080/10584609.2019.1661888. Kementerian Pertahanan Republik Indonesia. (2014). Pedoman pertahanan siber. https://www.kemhan.go.id/pothan/wp-content/uploads/2016/10/Permenhan-No.-82-Tahun-2014-tentang-Pertahanan-Siber.pdf. Kerlinger, F.N. (1986). Foundations of behavioral research. New York: Holt, Rinehart and Winston. Khoo Boo Teik. (2013). 13th general election in Malaysia: Issues, outcome and implications. http://www.ide.go.jp/Japanese/Publish/Download/Kidou/pdf/2013_malaysia_03.pdf. King, G., Pan, J., & Roberts, M.E. (2017). How the Chinese government fabricates social media posts for strategic distraction, not engaged argument. American Political Science Review, 111(3), 484–501. https://doi:10.1017/S0003055417000144. Kovic, M., Rauchfleisch, A., Sele, M., & Caspar, C. (2018). Digital astroturfing in politics: Definition, typology, and countermeasures. Studies in Communication Sciences, 18(1), 69–85. https://doi.org/10.24434/j.scoms.2018.01.005. Krejcie, R.V. & Morgan, D.W. (1970). Determining sample size for research activities. Educational and Psychological Measurement, 30 (3), 607-610. Kumar S, Cheng J, Leskovec J, et al. (2017) An army of me: Sockpuppets in online discussion communities. Dalam Barrett, R., & Cummings, R. (eds). Proceedings of the 26th international conference on world wide web. Geneva, Switzerland: International World Wide Web Conference Committee, pp. 857–866. Lanigan, R.L. (2016). Netizen. Dalam Barney Warf. The SAGE Encyclopedia of the internet. Beverly Hills, CA: SAGE. Lazarotto, B. D R. (2023). The grass is not always greener on the other side: The use of digital astroturfing to spread disinformation and the erosion of the rule of law. LSU Law Journal for Social Justice & Policy, 3 (9), 113-124. Lee Kuok, Rizal Zamani, & Rafiq (2018). Propaganda dan disinformasi: Politik persepsi dalam Pilihan Raya Umum ke-14 (PRU-14) Malaysia. https://www.researchgate.net/publication/332321218_Propaganda_dan_Disinformasi_Politik_Persepsi_dalam_Pilihan_Raya_ke-14_Malaysia. Lee, Y. C. (2014). Berita televisyen dan kebebasan media di Malaysia: Suatu kajian terhadap berita televisyen Bahasa Inggeris TV2 dan NTV7. Jurnal Komunikasi: Malaysian Journal of Communication, 30(2). Leong, H. K. (2010). Political consolidation in Singapore: Connecting the party, the government and the expanding state. Dalam Terence Chong. Management of Success: Singapore Revisited. Singapore: ISEAS Publishing. Leong, P. (2015). Poitical communication in Malaysia: A study on the use of new media in politics. eJournal of eDemocracy, 7(1), 46-71. Levitsky, S., & Way, L. (2010). Competitive authoritarianism: Hybrid regimes after the cold war. Cambridge: Cambridge University Press. Lippmann, W. (1922). Public opinion. New York: MacMillan Co. Littlejohn, S. W., & Foss, K. A. (2011). Theories of human communication. USA: Waveland Press. Loh, B. Y. H., & Sarah, A. (2023). Increased cybertrooper activity in Malaysia’s State Elections and increased voter apathy on social media. FULCRUM, https://fulcrum.sg/increased-cybertrooper-activity-in-malaysias-state-elections-and-increased-voter-apathy-on-social-media/. Loh, B.Y.H., & Zhang, K. (2020). Sabah elections 2020: Sentiments trending on social media. Perspective, 2020 (106), 1-7. Lyon, T.P., & Maxwell, J.W. (2004). Astroturf: Interest group lobbying and corporate strategy. Journal of Economics & Management Strategy, 13, 561-597. https://doi.org/10.1111/j.1430-9134.2004.00023.x. Malaysia kini. (2020, 7 Julai). Apandi terganggu dengan serangan Cybetroopers dibayar Najib. https://www.malaysiakini.com/news/533412 Malaysia Youth Data Bank System. (2022). Statistik populasi penduduk & penduduk belia mengikut kategori umur, jantina, etnik, daerah & negeri di Malaysia bagi tahun 2015 -2022. https://ydata.iyres.gov.my/iyresbankdataV2/www/index.php?r=pub/home/readcontent4&id=134. Mandiberg, M. (2012). The social media reader. NYU Press. http://www.jstor.org/stable/j.ctt16gzq5m. Marimuthu, N. (2016). Pembelian secara online catat kes penipuan paling tinggi pada 2015. https://www.nccc.org.my/v2/index.php/home/1763-pembelian-secara-online-catat-kes-penipuan-paling-tinggi-pada-2015. Mason, J. (2002). Qualitative researching (2nd edition). London: Sage Publications. Mastura, M., Siti Zobidah, O., & Krauss, S.E. (2020). Is citizen journalism to keyboard warriors and cybertroopers? an exploration and meaning form citizen journalist experience. International Journal of Academic Research in Business and Social Sciences, 10(6), 813–830. McAdam, D. (1988). Micromobilisation contexts and the recruitment to activism. Dalam B. Klandermans, H. Kriesi & S. Tarrow (eds.). From Structure to Action. Greenwich: JAI Press. McAdam, D., McCarthy, J., & Zald, M. (1996). Comparative perspectives on social movements: Political opportunities, mobilizing structures, and cultural framings. Cambridge: Cambridge University Press. McCombs, M. E. & Shaw, D. L. (1972). The agenda-setting function of mass media. Public Opinion Quarterly, 36 (2), 176–187. McCracken, G. (1988). The long interview. Beverly Hills, CA: Sage. Meyer, D. (2004). Protest and political opportunities. Annual Review of Sociology, 30: 125-145. Milne, R. S., & Mauzy, D. K. (1999). Malaysian politics under Mahathir. London: Routledge. Mohd Azlim, Z. (2019, November 11). Perselisihan kaum, agama, Ahli politik dan media sosial jadi punca. Sinar Harian. https://www.google.com.my/amp/s/www.sinarharian.com.my/ampArticle/56621 Mohd Azul, M. S., & Nurul Madiha, M. I. (2017). Pengalaman dan kesedaran pengguna dewasa terhadap isu pengawasan di Media Sosial. Jurnal Komunikasi: Malaysian Journal of Communication, 33(1), 502-514. Mohd Fuad, M. J., Yahaya, I., Noor Aziah, M. A., Abdul Halim, S., & Khaidzir, I. (2009). Minat, aspirasi dan sokongan politik Belia IPT Malaysia. Malaysian Journal of Youth Studies. 1 (6), 99-116. Mohd Majid, K. (2005). Kaedah pengkajian pendidikan (Edisi Ke-7). Kuala Lumpur, Malaysia: Dewan Bahasa dan Pustaka. Mohd Yusri, I. (2010). Analisis data penyelidikan untuk Pendidikan dan Sains Muhamad Asyraf, A. T., Rosele, M.I., Meerangani, K.A., Marinsah, S.A., & Ramli, M.A. (2013). Jenayah siber: Pengelasan di antara Al-Jaraim dan Al-Jina’i menurut sistem perundangan Islam. Dalam International Seminar on Islamic Jurisprudence in Contemporary Society 2013, 30 Nov- 01 Dec 2013, Kuala Terengganu. Muhammad Adnan, Siti Zobidah, O., Jusang, B., & Akmar, H A. G. (2017). Analisis keselamatan siber dari perspektif persekitaran sosial: Kajian terhadap pengguna internet di Lembah Klang. e-Bangi: Journal of Social Sciences and Humanities, 14 (2), 16-29. Muhammad Adnan. (2017). Kesedaran dan amalan siber dalam kalangan pengguna internet di Malaysia. http://psasir.upm.edu.my/id/eprint/68481/1/FBMK%202018%2016%20IR.pdf. Muhammad Ismail, M. (2007). Menjadi belia cemerlang. Kuala Lumpur: Kementerian Belia dan Sukan. Nadia, F. (2017). Penggunaan media sosial dalam dunia tanpa sempadan: Suatu kebaikan atau keburukan? www.ilkap.gov.my/kertaspenyelidikan/PMSDDTS18122017.pdf. Najib R. (2016, February 26). Netizens for the greater good. https://www.najibrazak.com/en/blog/netizens-for-the-greater-good/. Nate Lord. (2017). What Is Cyber security? https://digitalguardian.com/blog/what-cyber-security New Straits Times. (2008, 26 Mac). Internet served a painful lesson, 2. Nonnecke, B., Perez de Acha, G., Choi, A., Crittenden, C., Gutiérrez Cortés, F. I., Del Campo. A. M., & Miranda-Villanueva, O. M. (2022). Harass, mislead, & polarize: An analysis of Twitter political bots’ tactics in targeting the immigration debate before the 2018 U.S. midterm election. Journal of Information Technology & Politics, 19(4), 423-434. DOI: 10.1080/19331681.2021.2004287. Nor Anita, A. (2017). Belia vs Mahasiswa: Pengaruh sosialisasi politik. Journal of Humanities, Language, Culture and Bussiness, 1(4), 127-134. Norhafiza, M. H. (2012). Partisipasi politik pengundi muda Malaysia: Dari reformasi ke tsunami politik. Tesis Sarjana. Universiti Kebangsaan Malaysia. Norhafiza, M.H. (2020). Being a young political activist in contemporary Malaysia: Motivations and challenges. International Journal of Advanced Science and Technology, 29 (8), 3993-4003. Nurharyani. (2006). Isu-isu keselamatan siber di Malaysia. Dalam Abdul Manaf, B. (2006). Isu-isu profesional ICT di Malaysia. Kuala Lumpur: IRS Rook Publication. Nuruddin. (2007). Pengantar komunikasi massa. Jakarta: Raja Grafindo Persada. O’Reilly, T. (2005). What is Web 2.0 design patterns and business models for the next generation of software. http://www.oreilly.com/pub/a/web2/archive/what-is-web-20.html. O’Reilly, T., & Batelle, J. (2009). Web squared: Web 2.0 five years on. Special Report. http://assets.en.oreilly.com/1/event/28/web2009_websqared-whitepaper.pdf. operations through cyber-personas. In 2017 International Conference on Cyber Conflict (CyCon U.S.) (pp. 97–104). DOI:https://doi/10.1109/CYCONUS.2017.8167503. Peta Google. (2021a). Google Publications Ltd. Peta Google. (2021b). Google Publications Ltd. Pew Research Center (2013). Teens, social media, and privacy. Massachusetts: The Berkman Center for Internet & Society, Harvard University. Punch, K. F (2005). Introduction to social research: Quantitative and qualitative approaches. New York: SAGE Publication. Razali, S. Z. (2017). The case of an ‘ambiguous regime’: Malaysia’s political experience. Pertanika Journal Social Sciences and Humanities, 25 (1): 373-384. Ridenour, C. S., & Newman, I. (2008). Mixed methods research: Exploring the interactive continuum. Carbondale, IL: Southern Illinois University Press. Rohana (2003). Penyelidikan sains sosial. Kuala Lumpur: Pts Publications & Distributors Sdn. Bhd. Romagna, M. (2020). Hacktivism: Conceptualization, Techniques and Historical Sabah Gazette. (2020, 25 September). Rapahi dakwa Warisan upah Cybertroopers semenanjng ratusan ribu RM. https://www.sabahgazette.com/rapahi-dakwa-warisan-upah-cybertroopers-semenanjung-ratusan-ribu-rm/ Safeek Affendy, R. (2023, 25 Mei). Pemilik akaun Twitter di tahan muat naik hantaran hina raja, provokasi kaum. Berita Harian, 6. Salomon, A. M. B. (2021). Ancaman perang siber di era digital dan solusi keamanan nasional Indonesia. Jurnal Oratio Directa, 3 (1), 425-442. Samsudin, A. R. (2008). Media, demokrasi dan generasi muda: Analisis keputusan pilihan raya umum ke-12. Jurnal komunikasi, 26(2), 1-15. Sarinastiti, E. N., & Vardhani, N. K. (2017). Internet dan terorisme: Menguatnya aksi global Cyber-Terrorism New Media. Jurnal Gama Societa, 1(1), 40-52. DOI: http://dx.doi.org/10.22146/jgs.34048. Schoch, D., Keller, F.B., Stier, S. (2022). Coordination patterns reveal online political astroturfing across the world. Sci Rep 12, (4572). https://doi.org/10.1038/s41598-022-08404-9 Sekaran, U. (1992). Research methods for business: A skill-building approach. New York: John Wiley & Sons, Inc. Shukla, V. K., & Moosavi, S. (2013). Role of Censorship, Privacy and Laws in Internet. National Conference in Ras-Al-Khaima, May 2013. Sidek, M.N. (2002). Reka bentuk penyelidikan: Falsafah, teori dan praktis. Serdang, Selangor: Penerbit UPM. Silverman D. (2009). Doing qualitative research. Newbury Park, London: SAGE Publications Ltd. Snow, D.A., Soule, S.A., & Kriesi, H. (2007). The Blackwell companion to social movements. Oxford, UK: Blackwell Publishing. Sosial. Kuantan: Bandar Ilmu. Soule, S., & Davenport, C. (2009). Velvet glove, iron fist and even hand: Protest policing in the United States, 1960–1990. Mobilization, 14(1), 1–22. Stiles, W.B. (1993). Quality control in qualitative research. Clinical Psychology Review. 13, 593-618. Stoycheff, E., Burgess, G. S., & Martucci, M. C. (2020). Online censorship and digital surveillance: The relationship between suppression technologies and democratization across countries. Information, Communication & Society, 23(4), 474-490. DOI: 10.1080/1369118X.2018.1518472 Suruhanjaya Komunikasi dan Multimedia Malaysia. (2020). Peratusan penggunaan aplikasi internet di Malaysia, 2018-2020. https://www.mcmc.gov.my/skmmgovmy/media/General/pdf/IUS-2020-infographic.pdf Syahputra, I. (2017). Demokrasi virtual dan perang siber di media sosial: Perspektif netizen Indonesia. ASPIKOM, 3 (3), 457–475. Tan, J. J. (2022). Social media political information use and voting behavior of the Malaysian youth. Malaysian Journal of Social Sciences and Humanities (MJSSH), 7(9), 1-15. doi: 10.47405/mjssh.v7i9.1725. Tan, L. O. (2010). Dinamik ruang siber dalam gerakan reformasi di Malaysia. Bangi: Penerbit UKM. Tapsell, R. (2013). Negotiating media ‘balance’ in Malaysia’s 2013 General Election. Journal of Current Southeast Asian Affairs, 32, (2), 39–60. Tariq Banday, M., & Mattoo, M. (2013) Social media in e-Governance: A study with special reference to India. Social Networking, 2, 47-56. doi: 10.4236/sn.2013.22006. Tarrow, S. (1998). Power in movement: Social movements and contentious politics. Cambridge: Cambridge University Press. The Commonwealth. (t.t). Youth. https://thecommonwealth.org/our-work/youth#:~:text=The%20Commonwealth%20sees%20young%20people,empowered%20to%20realise%20their%20potential. Tilly, C. (1978). From Mobilization to Revolution. Reading: Addison-Wesley. Tilly, C. (2006). Regimes and Repertoires. Chicago: University of Chicago. Trochim, W. M. K. (2006). The qualitative debate. Research Methods Knowledge Base. http://www.socialresearchmethods.net/kb/qualmeth.php. United Nations. (2008). Definition of youth. http://undesadspd.org/Youth.aspx. View. Dalam Holt, T., Bossler, A. The Palgrave Handbook of International Cybercrime and Cyberdeviance. London: Palgrave Macmilan. Wahlström, M., & Peterson, A. (2006). Between the state and the market: Expanding the concept of ‘Political Opportunity Structure’. Acta Sociologica, 49(4), 363-377. https://doi.org/10.1177/0001699306071677. Walker, E. T. (2014). Grassroots for hire: Public affairs consultants in American democracy. New York, NY: Cambridge University Press. Waltz, K. (1979). Theory of international politics. New York: Random House. Wan Amizah (2008). Perkembangan dan pembangunan sistem dan dasar penapisan filem di malaysia. Jurnal komunikasi, 27(1), 34-52. Wan Amizah., & Muhammad Adnan. (2017). Media baharu dan institusi raja di Malaysia: Kes Penghinaan Raja-raja di media sosial. Jurnal komunikasi, 33(1), 406-422. Wang, D., & Mark, G. (2015). Internet censorship in China: Examining user awareness and attitudes. ACM Transactions on Computer-Human Interaction (TOCHI), 22(6), 1-22. https://escholarship.org/uc/item/48x7k7j2. Wang, G., Wilson, C., Zhao, Y., Mohanlal, M., Zheng, H. & Zhao, B. Y. (2012). Serf and turf: Crowdturfing for fun and profit. WWW 2012, April 16–20, 2012, Lyon, France. Weiss, M. L. (2008). Malaysia 12th general election: Causes and consequences of the opposition’s surge. http://www.eastwestcenter.org/sites/default/files/private/apb012.pdf. Weiss, M. L. (2013). Malaysia’s 13th general elections: Same result, different outcome. Asian Survey, 53 (6), 1135-1158. Welsh, E. (2002). Dealing with data: Using NVivo in the qualitative data analysis process. Forum Qualitative Sozialforschung Forum: Qualitative Social Research, 3(2). https://doi.org/10.17169/fqs-3.2.865. Winter, P. (2014). Measuring and circumventing Internet censorship. Tesis PhD, Karlstad University. Wolfers, A. (1962). Discord and collaboration: Essays on International Politics. Baltimore: The Johns Hopkins University Press. Yin, R. K. (2003). Case study research: design and methods. Thousand Oaks, CA: Sage Publications. Zerback, T., Töpfl, F., & Knöpfle, M. (2021). The disconcerting potential of online disinformation: Persuasive effects of astroturfing comments and three strategies for inoculation against them. New Media & Society, 23(5), 1080–1098. https://doi.org/10.1177/1461444820908530 Zurawski, N (2005). I know where you live: Aspects of watching, surveilllance and social control in a conflict zone (Northern Ireland). Surveillance and Society, 2 (4). 498-512.
|
This material may be protected under Copyright Act which governs the making of photocopies or reproductions of copyrighted materials. You may use the digitized material for private study, scholarship, or research. |