UPSI Digital Repository (UDRep)
|
|
|
Abstract : Universiti Pendidikan Sultan Idris |
Perkongsian data peribadi yang tidak terkawal di kalangan pelajar dalam penggunaan
perkhidmatan rangkaian sosial dapat mengakibatkan pencerobohan data sekiranya langkah
perlindungan data peribadi tidak diamalkan. Kajian ini dibangunkan untuk meramal pengaruh
motivasi terhadap perubahan tingkah laku perlindungan data peribadi di kalangan pelajar
Kolej Vokasional seluruh Malaysia berdasarkan Teori Motivasi Perlindungan. Reka bentuk
kuantitatif berdasarkan pendekatan kajian korelasi digunakan dalam membangunkan kajian ini
dengan melibatkan seramai 214 orang pelajar Kolej Vokasional yang mengambil jurusan
Teknologi Sistem Komputer dan Rangkaian di seluruh Malaysia. Soal selidik digunakan dalam
mengumpul data dan dianalisis menggunakan analisis deskriptif dan regrasi berganda. Dapatan
menunjukkan ancaman ganjaran maladaptif menyumbang sebanyak 14.9%, ancaman kelemahan
menyumbang sebanyak 4.3% dan tanggapan keyakinan diri menyumbang sebanyak 2% terhadap perubahan
tingkah laku perlindungan data peribadi dalam penggunaan perkhidmatan rangkaian sosial.
Kesimpulan daripada kajian ini membuktikan ancaman ganjaran maladaptif dan ancaman kelemahan
merupakan faktor bagi penilaian ancaman manakala tanggapan keyakinan diri merupakan faktor bagi
penilaian tanggapan yang dapat mempengaruhi perubahan tingkah laku perlindungan data
peribadi dalam penggunaan perkhidmatan rangkaian sosial. Implikasi kajian ini dapat membantu dalam
merangka atau menambah baik program kesedaran dan kurikulum berkaitan keselamatan
siber khususnya perlindungan data peribadi di kalangan pelajar Kolej
Vokasional.
|
References |
Abd Rahim, N. H., Hamid, S., & Mat Kiah, M. L. (2019). Enhancement Of Cybersecurity Awareness Program On Personal Data Protection Among Youngsters In Malaysia: An Assessment. Malaysian Journal of Computer Science, 32(3), 221–245. https://doi.org/10.22452/mjcs.vol32no3.4
Abkooh, E. T. (2016). Predicting Online Safety behaviour Based On Health Belief Model with Internet Literacy and Gender as Moderators. In Universiti Putra Malaysia. Universiti Putra Malaysia.
Adhikari, K., & Panda, R. K. (2018). Users’ Information Privacy Concerns and Privacy Protection Behaviors in Social Networks. Journal of Global Marketing, 31(2), 96– 110. https://doi.org/10.1080/08911762.2017.1412552
Aguayo, J. A. (2020). Personal Self-Disclosure in SNS Leads to Greater Intent to be Followed Due to Parasocial Relationships SNS. Seoul National University.
Alashoor, T., Han, S., & Joseph, R. C. (2017). Familiarity with big data, privacy concerns, and self-disclosure accuracy in social networking websites: An APCO model. Communications of the Association for Information Systems, 41, 62–96.
AlBarashdi, H. S. (2020). Social Networking (SNS) Addiction among University Students: A Literature Review and Research Directions. Journal of Education, Society and Behavioural Science, 33(1), 11–23. https://doi.org/10.9734/jesbs/2020/v33i130191
Alemany, J., del Val, E., Alberola, J., & García-Fornes, A. (2019). Enhancing the privacy risk awareness of teenagers in online social networks through soft- paternalism mechanisms. International Journal of Human Computer Studies, 129, 27–40. https://doi.org/10.1016/j.ijhcs.2019.03.008
Alias, A. (2018). Children’s understanding of online data privacy: a study on Scottish Primary 6 and Primary 7 pupils. https://www.era.lib.ed.ac.uk/handle/1842/29627
Alshaikh, M., Naseer, H., Ahmad, A., & Maynard, S. B. (2019). Toward Sustainable Behaviour Change: an Approach for Cyber Security Education Training and Awareness. Twenty-Seventh European Conference on Information Systems (ECIS2019), 0–14. https://aisel.aisnet.org/ecis2019_rp/100
Anderson, C. L., & Agarwal, R. (2010). Practicing safe computing: A multimethod empirical examination of home computer user security behavioral intentions. MIS Quarterly: Management Information Systems, 34(SPEC. ISSUE 3), 613–643. https://doi.org/10.2307/25750694
Anderson, M., & Jiang, J. (2018). Teens, Social Media & Technology 2018.
Aray, D., Jacobs, L. C., & Sorensen, C. (2010). Introduction to Research in Education. In Wadsworth, Cengage Learning.
Azizi, S. M., Soroush, A., & Khatony, A. (2019). The relationship between social networking addiction and academic performance in Iranian students of medical sciences: A cross-sectional study. BMC Psychology, 7(1). https://doi.org/10.1186/s40359-019-0305-0
Bada, M., & Sasse, A. (2014). Cyber Security Awareness Campaigns: Why They Fail to Change Behavior. July, 38. http://discovery.ucl.ac.uk/1468954/1/Awareness CampaignsDraftWorkingPaper.pdf
Boss, S. R., Galletta, D. F., Lowry, P. B., Moody, G. D., & Polak, P. (2015). What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors. MIS Quarterly: Management Information Systems, 39(4), 837–864. https://doi.org/10.25300/MISQ/2015/39.4.5
Boyd, Danah M., & Ellison, N. B. (2008). Social network sites: Definition, history, and scholarship. Journal of Computer-Mediated Communication, 13(1), 210–230. https://doi.org/10.1111/j.1083-6101.2007.00393.x
Boyd, Danah Michele. (2008). Taken Out of Context American Teen Sociality in Networked Publics. University of California, Berkeley.
Brandtzæg, P. B., & Heim, J. (2011). A typology of social networking sites users. International Journal of Web Based Communities, 7(1), 28–51. https://doi.org/10.1504/IJWBC.2011.038124
Businge, J., Openja, M., Kavaler, D., Bainomugisha, E., Khomh, F., & Filkov, V. (2019). Studying Android App Popularity by Cross-Linking GitHub and Google Play Store. SANER 2019 - Proceedings of the 2019 IEEE 26th International Conference on Software Analysis, Evolution, and Reengineering, 287–297. https://doi.org/10.1109/SANER.2019.8667998
Chen, H., Beaudoin, C. E., & Hong, T. (2016). Protecting oneself online: The effects of negative privacy experiences on privacy protective behaviors. Journalism and Mass Communication Quarterly, 93(2), 409–429. https://doi.org/10.1177/1077699016640224
Chen, M., Cheung, A. S. Y., & Chan, K. L. (2019). Doxing: What adolescents look for and their intentions. International Journal of Environmental Research and Public Health, 16(2). https://doi.org/10.3390/ijerph16020218
Chenoweth, T., Minch, R., & Chenoweth, T. (2014). Application of Protection Motivation Theory to Adoption of Protective Technologies to Adoption of Protective Technologies. Proceedings of the 42nd Hawaii International Conference on System Sciences, May, 1–10. https://doi.org/10.1109/HICSS.2009.74
Chmura, J. (2017). Forming the Awareness of Employees in the Field of Information Security. Journal of Positive Management, 8(1), 78. https://doi.org/10.12775/jpm.2017.006
Choi, M. S. (2013). Assessing the Role of User Computer Self-Efficacy,Cybersecurity Countermeasures Awareness, and Cybersecurity Skills toward Cimputer Misuse Intention at Government Agencies [Nova Southeastern University]. https://nsuworks.nova.edu/gscis_etd
Ciriani, V., De Capitani di Vimercati, S., Foresti, S., & Samarati, P. (2007). Microdata Protection. Advances in Information Security, 33, 291–321.
Cohen-almagor, R. (2011). Internet History. International Journal of Technoethics, 2(2), 45–64. https://doi.org/10.4018/jte.2011040104
Creswell, J. W. (2012). Educational research : planning, conducting, and evaluating quantitative and qualitative research. In Pearson Education, Inc., 501 Boylston Street, Boston, MA 02116.
Crossler, R. E. (2010). Protection motivation theory: Understanding determinants to backing up personal data. Proceedings of the Annual Hawaii International Conference on System Sciences, 1–10. https://doi.org/10.1109/HICSS.2010.311
Crossler, R. E., Johnston, A. C., Lowry, P. B., Hu, Q., Warkentin, M., & Baskerville, R. (2013). Future directions for behavioral information security research. Computers and Security, 32, 90–101. https://doi.org/10.1016/j.cose.2012.09.010
Cyber Security, M. (2014). Safeguard Children From Cyberbullying. In CyberSecurity Malaysia.
CyberSecurity Malaysia. (2019). Malaysia Threat Landscape 2018 - Based on Incidents Reported to CyberSecurity Malaysia (Issue March). https://www.mycert.org.my/portal/publicationdoc?id=270d8ee0-cdd1-49fb- 827d-f8fca7752155
CyberSecurity Malaysia. (2020). Overview of Malaysia’s Cyber Security Landscape.
D’Arcy, J., Gupta, A., Tarafdar, M., & Turel, O. (2014). Reflecting on the “Dark side” of information technology use. Communications of the Association for Information Systems, 35, 109–118. https://doi.org/10.17705/1CAIS.03505
Dark, M., & Mirkovic, J. (2015). Evaluation theory and practice applied to cybersecurity education. IEEE Security and Privacy, 13(2), 75–80. https://doi.org/10.1109/MSP.2015.27
Darussalam, G., & Hussin, S. (2018). Metodologi Penyelidikan dalam Pendidikan (Edisi kedu). Penerbit Universiti Malaya.
Daugherty, T., Eastin, M. S., & Bright, L. (2008). Exploring Consumer Motivations for Creating User-Generated Content. Journal of Interactive Advertising, 8(2), 16–25. https://doi.org/10.1080/15252019.2008.10722139
Demirbilek, M., & Talan, T. (2018). The effect of social media multitasking on classroom performance. Active Learning in Higher Education, 19(2), 117–129. https://doi.org/10.1177/1469787417721382
Dobberstein, N., Gerdemann, D., Pereira, G., & Hoe, G. (2018). Cybersecurity in ASEAN: An Urgent Call to Action. https://www.southeast- asia.atkearney.com/web/southeast-asia/article?/a/cybersecurity-in-asean-an- urgent-call-to-action
Fansher, A. K., & Randa, R. (2019). Risky Social Media Behaviors and the Potential for Victimization: A Descriptive Look at College Students Victimized by Someone Met Online. Violence and Gender, 6(2), 115–123. https://doi.org/10.1089/vio.2017.0073
Forum Ekonomi Dunia. (2019). Global risks 2019 Insight report (14th Edition). http://www3.weforum.org/docs/WEF_Global_Risks_Report_2019.pdf
Forza, C. (2002). Survey research in operations management: a process-based perspective. International Journal of Operations & Production Management, 22(2), 152–194.http://www.adolphus.me.uk/emx/surveys/ops_man_files/p152.htm
Fotis, J. N. (2015). The use of social media and its impacts on consumer behaviour : the context of holiday travel (Issue May). Bournemouth University.
García-Domingo, M., Aranda, M., & Fuentes, V. M. (2017). Facebook Use in University Students: Exposure and Reinforcement Search. Procedia - Social and Behavioral Sciences, 237(June 2016), 249–254. https://doi.org/10.1016/j.sbspro.2017.02.071
Gavison, R. (1980). Privacy and the Limits of Law. The Yale Law Journal, 89(3), 421. https://doi.org/10.2307/795891
Gemalto. (2019). The Breach Index Level. https://breachlevelindex.com/top-data- breaches
Gogus, A., & Sayg?n, Y. (2019). Privacy perception and information technology utilization of high school students. Heliyon, 5(5). https://doi.org/10.1016/j.heliyon.2019.e01614
Greenlaw, C., & Brown-Welty, S. (2009). A comparison of web-based and paper-based survey methods: Testing assumptions of survey mode and response cost. Evaluation Review, 33(5), 464–480. https://doi.org/10.1177/0193841X09340214
Gross, R., Acquisti, A., & Heinz, H. J. (2005). Information revelation and privacy in online social networks. WPES’05: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, 71–80. https://doi.org/10.1145/1102199.1102214
Guedon, J. C. (1997). A brief history of internet. Studies in Health Technology and Informatics, 36, 121–132. https://doi.org/10.3233/978-1-60750-880-9-121
Gurung, A., Luo, X., & Liao, Q. (2009). Consumer motivations in taking action against spyware: An empirical investigation. Information Management and Computer Security, 17(3), 276–289. https://doi.org/10.1108/09685220910978112
Gwena, C., Chinyamurindi, W. T., & Marange, C. (2018). Motives influencing Facebook usage as a social networking site: An empirical study using international students. Acta Commercii, 18(1), 1–11. https://doi.org/10.4102/ac.v18i1.521
Haddon, L., & Livingstone, S. (2014). The meaning of online problematic situations for children: The UK Report. EU Kids Online.
Hair, J. F., Black, W. C., Babin, B. J., & Anderson, R. E. (2019). Multivariate Data Analysis (8th Editio). Annabel Ainscow. https://doi.org/10.1002/9781119409137.ch4
Herath, T., & Rao, H. R. (2009). Protection motivation and deterrence: A framework for security policy compliance in organisations. European Journal of Information Systems, 18(2), 106–125. https://doi.org/10.1057/ejis.2009.6
Ifinedo, P. (2012). Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory. Computers and Security, 31(1), 83–95. https://doi.org/10.1016/j.cose.2011.10.007
International Telecommunication Union. (2009). Guidelines for Children on Child Online Protection. In International Telecommunication Union. https://doi.org/10.1109/FIE.1998.736797
Jin, G., Tu, M., Kim, T.-H., Heffron, J., & White, J. (2018). Evaluation of Game-Based Learning in Cybersecurity Education for High School Students. Journal of Education and Learning (EduLearn), 12(1), 150. https://doi.org/10.11591/edulearn.v12i1.7736
Johnson, T. J., Kaye, B. K., Bichard, S. L., & Wong, W. J. (2007). Every blog has its day: Politically-interested internet users’ perceptions of blog credibility. Journal of Computer-Mediated Communication, 13(1), 100–122. https://doi.org/10.1111/j.1083-6101.2007.00388.x
Jordaan, Y., & Heerden, G. Van. (2017). Online privacy-related predictors of Facebook usage intensity. Computers in Human Behavior, 70, 90–96. https://doi.org/10.6009/jjrt.KJ00003532530
Kaplan, A. M., & Haenlein, M. (2010). Users of the world , unite ! The challenges and opportunities of Social Media. Business Horizons., 53, 59–68. https://doi.org/10.1016/j.bushor.2009.09.003
Kim, H. (2016). Human centred design of software agent in social network service against privacy concerns [Brunel University London]. In PQDT - UK & Ireland (Issue January). https://search.proquest.com/docview/1794949649?accountid=14169
Krairit, D. (2018). The new face of internet user typology: The case of Thailand. Journal of Theoretical and Applied Electronic Commerce Research, 13(2), 58–79. https://doi.org/10.4067/S0718-18762018000200106
Lampe, C., Ellison, N. B., & Steinfield, C. (2008). Changes in use and perception of facebook. Proceedings of the ACM Conference on Computer Supported Cooperative Work, CSCW, 721–730. https://doi.org/10.1145/1460563.1460675
Lebek, B., Uffen, J., Breitner, M. H., Neumann, M., & Hohler, B. (2013). Employees’ information security awareness and behavior: A literature review. Proceedings of the Annual Hawaii International Conference on System Sciences, 2978–2987. https://doi.org/10.1109/HICSS.2013.192
Liang, H., & Xue, Y. (2010). Understanding security behaviors in personal computer usage: A threat avoidance perspective. Journal of the Association for Information Systems, 11(7), 394–413. https://doi.org/10.17705/1jais.00232
Livingstone, S. (2008). Taking risky opportunities in youthful content creation: Teenagers’ use of social networking sites for intimacy, privacy and self- expression. New Media and Society, 10(3), 393–411. https://doi.org/10.1177/1461444808089415
Livingstone, S., & Bober, M. (2004). Taking up Online Opportunities? Children’s Uses of the Internet for Education, Communication and Participation. E-Learning and Digital Media, 1(3), 395–419. https://doi.org/10.2304/elea.2004.1.3.5
Livingstone, S., & Brake, D. R. (2010). On the rapid rise of social networking sites: New findings and policy implications. Children and Society, 24(1), 75–83. https://doi.org/10.1111/j.1099-0860.2009.00243.x
Livingstone, S., Stoilova, M., & Nandagiri, R. (2019). Children’s data and privacy online Growing up in a digital age. An evidence rewiev. 1–47. http://www.lse.ac.uk/media-and- communications/assets/documents/research/projects/childrens-privacy- online/Evidence-review.pdf
Maddux, J. E., & Rogers, R. W. (1983). Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change. Journal of Experimental Social Psychology, 19(5), 469–479. https://doi.org/10.1016/0022-1031(83)90023-9
Makki, M. H., Abd-El-Khalick, F., & Boujaoude, S. (2003). Lebanese Secondary School Students’ Environmental Knowledge and Attitudes. Environmental Education Research, 9(1), 21–33. https://doi.org/10.1080/13504620303468
Mangold, L. V. (2016). An Analysis of Knowledge Gain in Youth Cybersecurity Education Programs. Northcentral University Graduate.
Md Zain, R. (2019). UiTM akan siasat kebocoran maklumat pelajar, alumni. Berita Harian. https://www.bharian.com.my/berita/nasional/2019/01/524012/uitm- akan-siasat-kebocoran-maklumat-pelajar-alumni
Mesch, G. S., & Beker, G. (2010). Are Norms of Disclosure of Online and Offline Personal Information Associated with the Disclosure of Personal Information Online? Human Communication Research, 36(4), 570–592. https://doi.org/10.1111/j.1468-2958.2010.01389.x
Meso, P., Ding, Y., & Xu, S. (2013). Applying Protection Motivation Theory to Information Security Training for College Students. Journal of Information Privacy and Security, 9(1), 47–67. https://doi.org/10.1080/15536548.2013.10845672
Mohamed, N., & Ahmad, I. H. (2012). Information privacy concerns, antecedents and privacy measure use in social networking sites: Evidence from Malaysia. Computers in Human Behavior, 28(6), 2366–2375. https://doi.org/10.1016/j.chb.2012.07.008
MyCERT. (2018). Reported Incidents based on General Incident Classification Statistics. https://www.mycert.org.my/portal/statistics-content?menu=b75e037d- 6ee3-4d11-8169-66677d694932&id=ac188e88-67b5-4e39-bfed-5512036b87ac
Ng, B. Y., Kankanhalli, A., & Xu, Y. (Calvin). (2009). Studying users’ computer security behavior: A health belief perspective. Decision Support Systems, 46(4), 815–825. https://doi.org/10.1016/j.dss.2008.11.010
Nunnally, J. C., & Bernstein, I. H. (1994). Psychometric Theory. In McGraw Hill (3rd ed., Vol. 5, Issue 3). https://doi.org/10.2307/1161962
Nur, B., Kamil, M., Zuhair, M., & Muazzam, M. (2017). 2017 Data Breaches Known So Far. MyCERT, 32–35. https://www.mycert.org.my/portal/publicationdoc?id=28cc0040-95dd-44f3- bdc2-8f7698ae4f2a
OfCom. (2019). Children and Parents: Media Use and Attitudes. In Ofcom. http://stakeholders.ofcom.org.uk/binaries/research/media-literacy/october- 2013/research07Oct2013.pdf
Osatuyi, B., Passerini, K., Ravarini, A., & Grandhi, S. A. (2018). “Fool me once, shame on you… then, I learn.” An examination of information disclosure in social networking sites. Computers in Human Behavior, 83, 73–86. https://doi.org/10.1016/j.chb.2018.01.018
Ostendorf, S., Müller, S. M., & Brand, M. (2020). Neglecting Long-Term Risks: Self- Disclosure on Social Media and Its Relation to Individual Decision-Making Tendencies and Problematic Social-Networks-Use. Frontiers in Psychology, 11(October), 1–17. https://doi.org/10.3389/fpsyg.2020.543388
PADU. (2015). Transformasi Pendidikan Vokasional. Buletin Anjakan - Buletin Transformasi Pendidikan Malaysia.
Palaniappan, A. K. (2009). Penyelidikan dan SPSS (PASW). Pearson Malaysia Sdn.Bhd.
Papathanassopoulos, S., Athanasiadis, E., & Xenofontos, M. (2016). Athenian University Students on Facebook and Privacy: A Fair “Trade-Off ”? Social Media and Society, 2(3). https://doi.org/10.1177/2056305116662171
Park, S. K., Lee, S. H., Kim, T. Y., Jun, H. J., & Kim, T. S. (2017). A performance evaluation of information security training in public sector. Journal of Computer Virology and Hacking Techniques, 13(4), 289–296. https://doi.org/10.1007/s11416-017-0305-7
Parlimen Malaysia. (2010). Akta Perlindungan Data Peribadi.
Perna, L. K. (2020). Need to Belong, Fear of Missing Out, and Social Media Use: Predictors of Perceived Social Rejection [Walden University]. http://faculty.waldenu.edu/User/Default.aspx?ReturnUrl=%2FFacultyHome%2F default.aspx
Peter, J., & Valkenburg, P. M. (2013). Adolescents’ Online Privacy: Toward a Developmental Perspective. Privacy Online, 15(8), 221–234. https://doi.org/10.1177/1461444813500461a
Poleon, V. (2020). Millennials’ Information Security Habits And Protection Motivation Intention: A Quantitative Study (Issue April). Capella University.
Ponemon Institute. (2019). Cost of a Data Breach. In IBM Security. https://doi.org/10.1016/b978-0-12-419967-5.00003-x
Ponemon Institute. (2020). Cost of a Data Breach Report 2020.
Posey, C., Roberts, T. L., & Lowry, P. B. (2015). The impact of organizational commitment on insiders motivation to protect organizational information assets. Journal of Management Information Systems, 32(4), 179–214. https://doi.org/10.1080/07421222.2015.1138374
Pruitt-Mentle, D. (2011). National C3 Baseline Study : State of Cyberethics , Safety and Security Awareness in US Schools. CISSE ’11 - Proceedings of the 15th Colloquium for Information Systems Security Education, 37–46. https://cisse.info/resources/archives/category/16-papers
Robertson, B. W., & Kee, K. F. (2017). Social media at work: The roles of job satisfaction, employment status, and Facebook use with co-workers. Computers in Human Behavior, 70, 191–196. https://doi.org/10.1016/j.chb.2016.12.080
Rogers, R. W. (1975). A Protection Motivation Theory of Fear Appeals and Attitude Change1. The Journal of Psychology, 91(1), 93–114. https://doi.org/10.1080/00223980.1975.9915803
Roopchund, R., Ramesh, V., & Jaunky, V. (2019). Use of Social Media for Improving Student Engagement at Université des Mascareignes (UDM). Proceedings of Fifth International Conference INDIA 2018, 2(January). https://doi.org/10.1007/978- 81-322-2247-7
Sadaghiani-Tabrizi, A. (2018). Integrating cybersecurity education in K-6 curriculum: Schoolteachers, it experts, and parents’ perceptions. In Dissertation Abstracts International Section A: Humanities and Social Sciences (Vol. 79, Issues 8-A(E)). http://ovidsp.ovid.com/ovidweb.cgi?T=JS&PAGE=reference&D=psyc14&NEW S=N&AN=2018-26095-020
Sardaryzadeh, A. (2017). Identifying Effective Cybersecurity Team Behaviors In Order to Transform Cybersecurity (Issue December). Brandman University.
Schipper, C., & Latham, A. (2019). Embracing Social Media for Stakeholder Management within NPOs – A Case Study. 6th European Conference on Social Media, June.
Sedek, M., Ahmad, R., & Othman, N. F. (2018). Motivational Factors in Privacy Protection Behaviour Model for Social Networking. MATEC Web of Conferences, 150, 1–5. https://doi.org/10.1051/matecconf/201815005014
Shillair, R. J. (2018). Mind the Gap: Perceived self-efficacy, domain knowledge and their effects on responses to a cybersecurity compliance message. Michigan State University.
Silva-López, R. B., Silva-López, M. I., & Fallad Chávez, J. (2017). A Flipped Learning Approach Using Social Media. Study Case: Elemental Programming in Higher Education. EDULEARN17 Proceedings, 1, 4342–4347. https://doi.org/10.21125/edulearn.2017.1936
Smahel, D., & Wright, M. F. (2014). The meaning of online problematic situations for children - Results of qualitative cross-cultural investigation in nine European countries. EU Kids Online, June, 1–171.
Solove, D. J. (2008). Understanding Privacy. Harvard University Press.
Sommestad, T., Karlzén, H., & Hallberg, J. (2015). A meta-Analysis of studies on protection motivation theory and information security behaviour. International Journal of Information Security and Privacy, 9(1), 26–46. https://doi.org/10.4018/IJISP.2015010102
Song, A. (2018). Evaluation of the Intents of Noncomplience with the Organizational Information Systems Security Policy. University of Phoenix.
Soomro, Z. A., Shah, M. H., & Ahmed, J. (2016). Information security management needs more holistic approach: A literature review. International Journal of Information Management, 36(2), 215–225. https://doi.org/10.1016/j.ijinfomgt.2015.11.009
Stanton, J. M., Stam, K. R., Mastrangelo, P., & Jolton, J. (2005). Analysis of end user security behaviors. Computers and Security, 24(2), 124–133. https://doi.org/10.1016/j.cose.2004.07.001
Sundaram, A., & Radha, P. (2019). Social media security and privacy protection concerning youths. “How to be safe, secure and social.” International Journal of Business Innovation and Research, 18(4), 453–471. https://doi.org/10.1504/IJBIR.2019.098761
Suruhanjaya Komunikasi dan Multimedia Malaysia. (2014). CyberSafe Survey Report 2014.
Suruhanjaya Komunikasi dan Multimedia Malaysia. (2015). Media matters: Networked Media Content. ACME: Action Coalition for Media Education, 2. http://www.getcited.org/pub/103175514
Suruhanjaya Komunikasi dan Multimedia Malaysia. (2018). Internet User Survey 2018.
Syazwan, B., Lukman, W., & Azhar, M. (2017). Dangers of Social Media : Borders in a Borderless World. E-Securtiy, 47–48. https://www.cybersecurity.my/data/content_files/12/1761.pdf
Symantec. (2019). Internet Security Threat Report VOLUME 21, February 2019. Network Security, 21(February). https://doi.org/10.1016/S1353-4858(05)00194-7
Tavani, H. T. (2007). Philosophical Theories of Privacy: Implications for an Adequate Online Privacy Policy. Metaphilosophy, 38(1), 1–22. https://doi.org/10.1111/j.1467-9973.2006.00474.x
Thomas, R. M. (2003). Blending Qualitative and Quantitative Research Methods in Theses and Disertation. Corwin Press.
Thurairaj, S., Hoon, E. P., Roy, S. S., & Fong, P. W. (2015). Reflections of Students’ language Usage in Social Networking Sites: Making or Marring Academic English. Electronic Journal of E-Learning, 13(4), 302–316.
Trustwave. (2019). 2019 Trustwave Global Security Report. Security Report. https://www.shift4.com/pdf/TW_GSR_2019_Final.pdf
Tunc-Aksan, A., & Akbay, S. E. (2019). Smartphone addiction, fear of missing out, and perceived competence as predictors of social media addiction of adolescents. European Journal of Educational Research, 8(2), 559–566. https://doi.org/10.12973/eu-jer.8.2.559
Twenge, J. M., Martin, G. N., & Spitzberg, B. H. (2018). Trends in U.S. Adolescents’ media use, 1976–2016: The rise of digital media, the decline of TV, and the (near) demise of print. Psychology of Popular Media Culture. https://doi.org/10.1037/ppm0000203
van Schaik, P., Jeske, D., Onibokun, J., Coventry, L., Jansen, J., & Kusev, P. (2017). Risk perceptions of cyber-security and precautionary behaviour. Computers in Human Behavior, 75, 547–559. https://doi.org/10.1016/j.chb.2017.05.038
Vance, A., Siponen, M., & Pahnila, S. (2012). Motivating IS security compliance: Insights from Habit and Protection Motivation Theory. Information and Management, 49(3–4), 190–198. https://doi.org/10.1016/j.im.2012.04.002
Vishwanath, A., Xu, W., & Ngoh, Z. (2018). How people protect their privacy on facebook: A cost-benefit view. Journal of the Association for Information Science and Technology, 69(5), 700–709. https://doi.org/10.1002/asi.23894
Wang, Y., & Fesenmaier, D. . (2003). Assessing Motivation of Contribution in Online Communities: An Empirical Investigation of an Online Travel Community. Electronic Markets, 13(1), 33–45. https://doi.org/10.1080/1019678032000052934
Wang, Z., & Liu, Y. (2014). Identifying key factors affecting information disclosure intention in online shopping. International Journal of Smart Home, 8(4), 47–58. https://doi.org/10.14257/ijsh.2014.8.4.05
Warkentin, M., Johnston, A. C., Shropshire, J., & Barnett, W. D. (2016). Continuance of protective security behavior: A longitudinal study. Decision Support Systems, 92(May 2018), 25–35. https://doi.org/10.1016/j.dss.2016.09.013
Westin, A. F. (1968). Privacy And Freedom. Washington and Lee Law Review, 25(1). Wiederhold, B. K. (2014). The role of psychology in enhancing cybersecurity. Cyberpsychology, Behavior, and Social Networking, 17(3), 131–132. https://doi.org/10.1089/cyber.2014.1502
Williams, M., Nurse, J. R. C., & Creese, S. (2019). (Smart)Watch Out! encouraging privacy-protective behavior through interactive games. International Journal of Human-Computer Studies, 132, 121–137. https://doi.org/10.1016/j.ijhcs.2019.07.012
Woon, I. M. Y., Tan, G. W., & Low, R. T. (2005). A protection motivation theory approach to home wireless security. Association for Information Systems - 26th International Conference on Information Systems, ICIS 2005: Forever New Frontiers, 367–380.
Xie, W., & Karan, K. (2019). Consumers’ Privacy Concern and Privacy Protection on Social Network Sites in the Era of Big Data: Empirical Evidence from College Students. Journal of Interactive Advertising, 0(0), 1–15. https://doi.org/10.1080/15252019.2019.1651681
Yetter, R. B. (2015). Darknets , Cybercrime & The Onion Router : Anonymity & Security In Cyberspace.
Yoon, C., Hwang, J. W., & Kim, R. (2012). Exploring Factors That Influence Students’ Behaviors in Information Security. Journal of Information Systems Education, 23(4), 407–415. https://proxy.library.mcgill.ca/login?url=http://search.ebscohost.com/login.aspx? direct=true&db=eft&AN=89084300&site=ehost-live&scope=site
Youn, S., & Shin, W. (2019). Adolescents’ responses to social media newsfeed advertising: the interplay of persuasion knowledge, benefit-risk assessment, and ad scepticism in explaining information disclosure. International Journal of Advertising. https://doi.org/10.1080/02650487.2019.1585650
Zahari, A., Bilu, R., & Said, J. (2019). The Role of Familiarity, Trust And Awareness Towards Online Fraud. Journal of Research and Opinion, 6(9), 2470–2480. https://doi.org/10.15520/jro.v6i9.
Zahri, Y., Susanty, A. H. R., Mustaffa, A., & Approach, A. O. (2017). Cyber Security Situational Awareness among Students: A Case Study in Malaysia. International Journal of Educational and Pedagogical Sciences, 11(7), 1704–1710. https://waset.org/publications/10007340/cyber-security-situational-awareness- among-students-a-case-study-in-malaysia
Zhang, L., & McDowell, W. C. (2009). Am i really at risk? Determinants of online users’ intentions to use strong passwords. Journal of Internet Commerce, 8(3–4), 180–197. https://doi.org/10.1080/15332860903467508
Zhang, X., Liu, S., Chen, X., Wang, L., Gao, B., & Zhu, Q. (2018). Health information privacy concerns, antecedents, and information disclosure intention in online health communities. Information and Management, 55(4), 482–493. https://doi.org/10.1016/j.im.2017.11.003
|
This material may be protected under Copyright Act which governs the making of photocopies or reproductions of copyrighted materials. You may use the digitized material for private study, scholarship, or research. |