UPSI Digital Repository (UDRep)
Start | FAQ | About
Menu Icon

QR Code Link :

Type :thesis
Subject :T Technology
Main Author :Muhamad Hasnan Abdullah
Title :Pengaruh motivasi terhadap perlindungan data peribadi pelajar Kolej Vokasional di Malaysia dalam penggunaan perkhidmatan rangkaian sosial
Place of Production :Tanjong Malim
Publisher :Fakulti Seni, Komputeran dan Industri Kreatif
Year of Publication :2021
Corporate Name :Universiti Pendidikan Sultan Idris
PDF Guest :Click to view PDF file

Abstract : Universiti Pendidikan Sultan Idris
Perkongsian data peribadi yang tidak terkawal di kalangan pelajar dalam penggunaan perkhidmatan  rangkaian  sosial  dapat  mengakibatkan  pencerobohan  data  sekiranya langkah   perlindungan  data  peribadi  tidak  diamalkan.  Kajian  ini  dibangunkan  untuk meramal  pengaruh   motivasi  terhadap  perubahan  tingkah  laku  perlindungan  data peribadi  di  kalangan  pelajar   Kolej  Vokasional  seluruh  Malaysia  berdasarkan  Teori Motivasi Perlindungan. Reka bentuk  kuantitatif berdasarkan pendekatan kajian korelasi digunakan  dalam  membangunkan  kajian  ini   dengan  melibatkan  seramai  214  orang pelajar  Kolej  Vokasional  yang mengambil  jurusan  Teknologi  Sistem  Komputer dan Rangkaian  di seluruh  Malaysia.  Soal  selidik  digunakan  dalam   mengumpul  data  dan dianalisis menggunakan analisis deskriptif dan regrasi berganda. Dapatan  menunjukkan ancaman  ganjaran  maladaptif  menyumbang  sebanyak  14.9%,  ancaman  kelemahan  menyumbang sebanyak 4.3% dan tanggapan keyakinan diri menyumbang sebanyak 2% terhadap  perubahan   tingkah  laku  perlindungan  data  peribadi  dalam  penggunaan perkhidmatan rangkaian sosial.  Kesimpulan daripada kajian ini membuktikan ancaman ganjaran maladaptif dan ancaman kelemahan  merupakan faktor bagi penilaian ancaman manakala tanggapan keyakinan diri merupakan faktor bagi  penilaian tanggapan yang dapat  mempengaruhi  perubahan  tingkah  laku  perlindungan  data   peribadi  dalam penggunaan perkhidmatan rangkaian sosial. Implikasi kajian ini dapat membantu dalam  merangka   atau   menambah   baik   program   kesedaran   dan   kurikulum   berkaitan keselamatan   siber  khususnya  perlindungan  data  peribadi  di  kalangan  pelajar  Kolej Vokasional.  

References

Abd  Rahim,  N.  H.,  Hamid,  S.,  &  Mat  Kiah,  M.  L.  (2019).  Enhancement  Of

Cybersecurity   Awareness   Program   On   Personal   Data   Protection   Among Youngsters   In  

Malaysia:  An   Assessment.   Malaysian  Journal  of  Computer Science, 32(3), 221–245. 

https://doi.org/10.22452/mjcs.vol32no3.4

 

Abkooh,  E.  T.  (2016).  Predicting  Online  Safety behaviour  Based  On  Health  Belief Model  

with  Internet  Literacy  and  Gender  as  Moderators.  In  Universiti  Putra Malaysia. Universiti 

Putra Malaysia.

 

Adhikari, K., & Panda, R. K. (2018). Users’ Information Privacy Concerns and Privacy Protection 

Behaviors in Social Networks. Journal of Global Marketing, 31(2), 96– 110. 

https://doi.org/10.1080/08911762.2017.1412552

 

Aguayo, J. A. (2020). Personal Self-Disclosure in SNS Leads to Greater Intent to be Followed Due to 

Parasocial Relationships SNS. Seoul National University.

 

Alashoor,  T.,  Han,  S.,  &  Joseph,  R.  C.  (2017).  Familiarity  with  big  data,  privacy 

concerns, and self-disclosure accuracy in social networking websites: An APCO model. Communications 

of the Association for Information Systems, 41, 62–96.

 

AlBarashdi,  H.  S.  (2020).  Social  Networking  (SNS)  Addiction  among  University Students: A  

Literature  Review  and Research  Directions.  Journal  of  Education, Society            and       

     Behavioural            Science,            33(1),            11–23. 

https://doi.org/10.9734/jesbs/2020/v33i130191

 

Alemany,  J.,  del  Val,  E.,  Alberola,  J.,  &  García-Fornes,  A.  (2019).  Enhancing  the 

privacy  risk  awareness  of  teenagers  in  online  social  networks  through  soft- paternalism 

mechanisms. International Journal of Human Computer Studies, 129, 27–40. 

https://doi.org/10.1016/j.ijhcs.2019.03.008

 

Alias, A. (2018). Children’s understanding of online data privacy: a study on Scottish Primary 6 

and Primary 7 pupils. https://www.era.lib.ed.ac.uk/handle/1842/29627

 

Alshaikh, M., Naseer, H., Ahmad, A., & Maynard, S. B. (2019). Toward Sustainable Behaviour  Change: 

 an  Approach  for  Cyber  Security  Education  Training  and Awareness.   Twenty-Seventh   

European   Conference   on   Information   Systems (ECIS2019), 0–14. 

https://aisel.aisnet.org/ecis2019_rp/100

 

Anderson,  C.  L., &  Agarwal, R. (2010).  Practicing safe computing: A multimethod empirical 

examination of home computer user security behavioral intentions. MIS Quarterly:  Management  

Information  Systems,  34(SPEC.  ISSUE  3),  613–643. https://doi.org/10.2307/25750694

 

Anderson, M., & Jiang, J. (2018). Teens, Social Media & Technology 2018.

 

Aray, D., Jacobs, L. C., & Sorensen, C. (2010). Introduction to Research in Education.

In Wadsworth, Cengage Learning.

 

Azizi,  S.  M.,  Soroush,  A.,  &  Khatony,  A.  (2019).  The  relationship  between  social

networking addiction and academic performance in Iranian students of medical sciences:       A      

 cross-sectional       study.       BMC       Psychology,       7(1). 

https://doi.org/10.1186/s40359-019-0305-0

 

Bada, M., & Sasse, A. (2014). Cyber Security Awareness Campaigns: Why They Fail to  Change  

Behavior.  July,  38.  http://discovery.ucl.ac.uk/1468954/1/Awareness 

CampaignsDraftWorkingPaper.pdf

 

Boss, S. R., Galletta, D. F., Lowry, P. B., Moody, G. D., & Polak, P. (2015). What do systems users 

have to fear? Using fear appeals to engender threats and fear that motivate protective security 

behaviors. MIS Quarterly: Management Information Systems, 39(4), 837–864. 

https://doi.org/10.25300/MISQ/2015/39.4.5

 

Boyd, Danah M., & Ellison, N. B. (2008). Social network sites: Definition, history, and 

scholarship.  Journal  of  Computer-Mediated  Communication,  13(1),  210–230. 

https://doi.org/10.1111/j.1083-6101.2007.00393.x

 

Boyd,  Danah  Michele.  (2008).  Taken  Out  of  Context  American  Teen  Sociality  in Networked 

Publics. University of California, Berkeley.

 

Brandtzæg,  P.  B.,  &  Heim,  J.  (2011).  A  typology  of  social  networking  sites  users. 

International     Journal     of     Web     Based     Communities,     7(1),     28–51. 

https://doi.org/10.1504/IJWBC.2011.038124

 

Businge,  J.,  Openja,  M.,  Kavaler,  D.,  Bainomugisha,  E.,  Khomh,  F.,  &  Filkov,  V. (2019). 

Studying Android App Popularity by Cross-Linking GitHub and Google Play  Store.  SANER  2019  -  

Proceedings  of  the  2019  IEEE  26th  International Conference  on  Software  Analysis,  

Evolution,  and  Reengineering,  287–297. https://doi.org/10.1109/SANER.2019.8667998

 

Chen, H., Beaudoin, C. E., & Hong, T. (2016). Protecting oneself online: The effects of negative 

privacy experiences on privacy protective behaviors. Journalism and Mass              Communication 

             Quarterly,              93(2),              409–429. 

https://doi.org/10.1177/1077699016640224

 

Chen, M., Cheung, A. S. Y., & Chan, K. L. (2019). Doxing: What adolescents look for and their 

intentions. International Journal of Environmental Research and Public Health, 16(2). 

https://doi.org/10.3390/ijerph16020218

 

Chenoweth,  T.,  Minch,  R.,  &  Chenoweth,  T.  (2014).  Application  of  Protection Motivation  

Theory  to  Adoption  of  Protective  Technologies  to  Adoption  of Protective   Technologies.   

Proceedings   of   the   42nd   Hawaii   International Conference             on             System 

            Sciences,             May,             1–10. https://doi.org/10.1109/HICSS.2009.74

 

Chmura, J. (2017). Forming the Awareness of Employees in the Field of Information Security.         

Journal         of         Positive         Management,         8(1),         78.

https://doi.org/10.12775/jpm.2017.006

 

Choi, M. S. (2013). Assessing the Role of User Computer Self-Efficacy,Cybersecurity

Countermeasures Awareness, and Cybersecurity Skills toward Cimputer Misuse Intention     at     

Government     Agencies     [Nova     Southeastern     University]. 

https://nsuworks.nova.edu/gscis_etd

 

Ciriani, V., De Capitani di Vimercati, S., Foresti, S., & Samarati, P. (2007). Microdata 

Protection. Advances in Information Security, 33, 291–321.

 

Cohen-almagor,  R.  (2011).  Internet  History.  International  Journal  of  Technoethics, 2(2), 

45–64. https://doi.org/10.4018/jte.2011040104

 

Creswell, J.  W.  (2012).  Educational  research : planning,  conducting,  and  evaluating 

quantitative and qualitative research. In Pearson Education, Inc., 501 Boylston Street, Boston, MA 

02116.

 

Crossler, R. E. (2010). Protection motivation theory: Understanding determinants to backing  up  

personal  data.  Proceedings  of  the  Annual  Hawaii  International Conference on System Sciences, 

1–10. https://doi.org/10.1109/HICSS.2010.311

 

Crossler, R. E., Johnston, A. C., Lowry, P. B., Hu, Q., Warkentin, M., & Baskerville,

R.   (2013).   Future   directions   for   behavioral   information   security   research.

Computers and Security, 32, 90–101. https://doi.org/10.1016/j.cose.2012.09.010

 

Cyber Security, M. (2014). Safeguard Children From Cyberbullying. In CyberSecurity Malaysia.

 

CyberSecurity  Malaysia.  (2019).   Malaysia  Threat  Landscape  2018   -  Based  on Incidents      

Reported      to      CyberSecurity      Malaysia      (Issue      March). 

https://www.mycert.org.my/portal/publicationdoc?id=270d8ee0-cdd1-49fb- 827d-f8fca7752155

 

CyberSecurity Malaysia. (2020). Overview of Malaysia’s Cyber Security Landscape. 

 

D’Arcy, J., Gupta, A., Tarafdar, M., & Turel, O. (2014). Reflecting on the “Dark side”

of   information   technology   use.   Communications   of   the   Association   for Information 

Systems, 35, 109–118. https://doi.org/10.17705/1CAIS.03505

 

Dark,   M.,   &   Mirkovic,   J.   (2015).   Evaluation   theory   and   practice   applied   to 

cybersecurity    education.    IEEE    Security    and    Privacy,    13(2),    75–80. 

https://doi.org/10.1109/MSP.2015.27

 

Darussalam,  G.,  &  Hussin,  S.  (2018).  Metodologi  Penyelidikan  dalam  Pendidikan

(Edisi kedu). Penerbit Universiti Malaya.

 

Daugherty, T., Eastin, M. S., & Bright, L. (2008). Exploring Consumer Motivations for Creating 

User-Generated Content. Journal of Interactive Advertising, 8(2), 16–25. 

https://doi.org/10.1080/15252019.2008.10722139

 

Demirbilek,  M.,  &  Talan,  T.  (2018).  The  effect  of  social  media  multitasking  on 

classroom performance. Active Learning in Higher Education, 19(2), 117–129.

https://doi.org/10.1177/1469787417721382

 

Dobberstein,  N.,  Gerdemann,  D.,  Pereira,  G.,  &  Hoe,  G.  (2018).  Cybersecurity  in

ASEAN:       An       Urgent       Call       to       Action.       https://www.southeast- 

asia.atkearney.com/web/southeast-asia/article?/a/cybersecurity-in-asean-an- urgent-call-to-action

 

Fansher, A. K., & Randa, R. (2019). Risky Social Media Behaviors and the Potential for  

Victimization:  A  Descriptive   Look   at  College  Students  Victimized  by Someone      Met      

Online.      Violence      and      Gender,      6(2),      115–123. 

https://doi.org/10.1089/vio.2017.0073

 

Forum  Ekonomi  Dunia.  (2019).  Global  risks  2019  Insight  report  (14th  Edition). 

http://www3.weforum.org/docs/WEF_Global_Risks_Report_2019.pdf

 

Forza,   C.   (2002).   Survey  research   in  operations   management:  a   process-based 

perspective.  International  Journal  of  Operations  &  Production  Management, 22(2),             

152–194.http://www.adolphus.me.uk/emx/surveys/ops_man_files/p152.htm

 

Fotis, J. N. (2015). The use of social media and its impacts on consumer behaviour : the context of 

holiday travel (Issue May). Bournemouth University.

 

García-Domingo,  M.,  Aranda,  M.,  &  Fuentes,  V.  M.  (2017).  Facebook  Use  in University 

Students: Exposure and Reinforcement Search. Procedia - Social and Behavioral              

Sciences,              237(June              2016),              249–254. 

https://doi.org/10.1016/j.sbspro.2017.02.071

 

Gavison, R. (1980). Privacy and the Limits of Law. The Yale Law Journal, 89(3), 421. 

https://doi.org/10.2307/795891

 

Gemalto.  (2019).  The  Breach  Index  Level.  https://breachlevelindex.com/top-data- breaches

 

Gogus,  A.,  &  Sayg?n,  Y.  (2019).  Privacy  perception  and  information  technology utilization 

         of          high          school          students.          Heliyon,          5(5). 

https://doi.org/10.1016/j.heliyon.2019.e01614

 

Greenlaw, C., & Brown-Welty, S. (2009). A comparison of web-based and paper-based survey   methods: 

 Testing   assumptions   of   survey  mode   and   response   cost. Evaluation Review, 33(5), 

464–480. https://doi.org/10.1177/0193841X09340214

 

Gross, R., Acquisti, A., & Heinz, H. J. (2005). Information revelation and privacy in online social 

networks. WPES’05: Proceedings of the 2005 ACM Workshop on Privacy              in              the 

             Electronic              Society,              71–80. 

https://doi.org/10.1145/1102199.1102214

 

Guedon, J. C. (1997). A brief history of internet.  Studies in Health Technology and Informatics, 

36, 121–132. https://doi.org/10.3233/978-1-60750-880-9-121

 

Gurung, A., Luo, X., & Liao, Q. (2009). Consumer motivations in taking action against spyware:  An  

empirical  investigation.  Information  Management  and  Computer

Security, 17(3), 276–289. https://doi.org/10.1108/09685220910978112

 

Gwena,  C.,  Chinyamurindi,  W.  T.,  &  Marange,  C.  (2018).  Motives  influencing

Facebook usage as a social networking site: An empirical study using international students. Acta 

Commercii, 18(1), 1–11. https://doi.org/10.4102/ac.v18i1.521

 

Haddon, L., & Livingstone, S. (2014). The meaning of online problematic situations for children: 

The UK Report. EU Kids Online.

 

Hair, J. F., Black, W. C., Babin, B. J., & Anderson, R. E. (2019). Multivariate Data Analysis       

          (8th                 Editio).                 Annabel                 Ainscow. 

https://doi.org/10.1002/9781119409137.ch4

 

Herath, T., & Rao, H. R. (2009). Protection motivation and deterrence: A framework for security 

policy compliance in organisations. European Journal of Information Systems, 18(2), 106–125. 

https://doi.org/10.1057/ejis.2009.6

 

Ifinedo, P. (2012). Understanding information systems security policy compliance: An integration of 

the theory of planned behavior and the protection motivation theory. Computers and Security, 31(1), 

83–95. https://doi.org/10.1016/j.cose.2011.10.007

 

International  Telecommunication  Union.  (2009).  Guidelines  for  Children  on  Child Online      

 Protection.       In       International       Telecommunication       Union. 

https://doi.org/10.1109/FIE.1998.736797

 

Jin, G., Tu, M., Kim, T.-H., Heffron, J., & White, J. (2018). Evaluation of Game-Based Learning  in 

 Cybersecurity  Education  for  High  School  Students.  Journal  of Education           and        

   Learning           (EduLearn),           12(1),           150.

https://doi.org/10.11591/edulearn.v12i1.7736

 

Johnson, T. J., Kaye, B. K., Bichard, S. L., & Wong, W. J. (2007). Every blog has its day: 

Politically-interested internet users’ perceptions of blog credibility. Journal of           

Computer-Mediated           Communication,           13(1),           100–122. 

https://doi.org/10.1111/j.1083-6101.2007.00388.x

 

Jordaan, Y., & Heerden, G. Van. (2017). Online privacy-related predictors of Facebook usage      

intensity.      Computers      in      Human      Behavior,      70,      90–96. 

https://doi.org/10.6009/jjrt.KJ00003532530

 

Kaplan, A. M., & Haenlein, M. (2010). Users of the world , unite ! The challenges and opportunities 

    of     Social     Media.     Business     Horizons.,     53,     59–68. 

https://doi.org/10.1016/j.bushor.2009.09.003

 

Kim,  H.  (2016).  Human  centred  design  of  software  agent in  social  network  service against 

privacy concerns [Brunel University London]. In PQDT - UK & Ireland (Issue                          

                                                                                January).

https://search.proquest.com/docview/1794949649?accountid=14169

 

Krairit,  D.  (2018).  The  new  face  of  internet  user  typology:  The  case  of  Thailand.

Journal of Theoretical and Applied Electronic Commerce Research, 13(2), 58–79.

https://doi.org/10.4067/S0718-18762018000200106

 

Lampe, C., Ellison, N. B., & Steinfield, C. (2008). Changes in use and perception of

facebook.   Proceedings   of   the   ACM   Conference   on   Computer   Supported Cooperative Work, 

CSCW, 721–730. https://doi.org/10.1145/1460563.1460675

 

Lebek, B., Uffen, J., Breitner, M. H., Neumann, M., & Hohler, B. (2013). Employees’ information 

security awareness and behavior: A literature review. Proceedings of the  Annual  Hawaii  

International  Conference  on  System  Sciences,  2978–2987. https://doi.org/10.1109/HICSS.2013.192

 

Liang, H., & Xue, Y. (2010). Understanding security behaviors in personal computer usage: A threat 

avoidance perspective. Journal of the Association for Information Systems, 11(7), 394–413. 

https://doi.org/10.17705/1jais.00232

 

Livingstone,  S.  (2008).  Taking  risky  opportunities  in  youthful  content  creation: 

Teenagers’  use  of  social  networking  sites  for  intimacy,  privacy  and  self- expression.     

    New         Media         and         Society,         10(3),         393–411. 

https://doi.org/10.1177/1461444808089415

 

Livingstone, S., & Bober, M. (2004). Taking up Online Opportunities? Children’s Uses of the 

Internet for Education, Communication and Participation. E-Learning and Digital Media, 1(3), 

395–419. https://doi.org/10.2304/elea.2004.1.3.5

 

Livingstone, S., & Brake, D. R. (2010). On the rapid rise of social networking sites: New  findings 

 and  policy  implications.  Children  and  Society,  24(1),  75–83. 

https://doi.org/10.1111/j.1099-0860.2009.00243.x

 

Livingstone,  S.,  Stoilova,  M.,  &  Nandagiri,  R.  (2019).  Children’s  data  and privacy online 

   Growing    up    in    a    digital    age.    An    evidence    rewiev.    1–47. 

http://www.lse.ac.uk/media-and- 

communications/assets/documents/research/projects/childrens-privacy- online/Evidence-review.pdf

 

Maddux,  J. E., &  Rogers,  R.  W.  (1983). Protection motivation and self-efficacy:  A revised 

theory of fear appeals and attitude change. Journal of Experimental Social Psychology, 19(5), 

469–479. https://doi.org/10.1016/0022-1031(83)90023-9

 

Makki,  M.  H.,  Abd-El-Khalick,  F.,  &  Boujaoude,  S.  (2003).  Lebanese  Secondary School   

Students’   Environmental   Knowledge   and   Attitudes.   Environmental Education Research, 9(1), 

21–33. https://doi.org/10.1080/13504620303468

 

Mangold,  L.  V.  (2016).  An  Analysis  of  Knowledge  Gain  in  Youth  Cybersecurity Education 

Programs. Northcentral University Graduate.

 

Md Zain, R. (2019). UiTM akan siasat kebocoran maklumat pelajar, alumni.  Berita Harian.         

https://www.bharian.com.my/berita/nasional/2019/01/524012/uitm- 

akan-siasat-kebocoran-maklumat-pelajar-alumni

 

Mesch, G.  S., &  Beker, G. (2010).  Are Norms of Disclosure of Online and Offline Personal  

Information  Associated  with  the  Disclosure  of  Personal  Information Online?        Human      

  Communication        Research,        36(4),        570–592.

https://doi.org/10.1111/j.1468-2958.2010.01389.x

 

Meso,  P.,  Ding,  Y.,  &  Xu,  S.  (2013).  Applying  Protection  Motivation  Theory  to

Information  Security  Training  for  College  Students.  Journal  of  Information Privacy          

          and                    Security,                    9(1),                    47–67. 

https://doi.org/10.1080/15536548.2013.10845672

 

Mohamed, N., & Ahmad, I. H. (2012). Information privacy concerns, antecedents and privacy  measure  

 use  in   social   networking  sites:  Evidence   from  Malaysia. Computers           in           

Human           Behavior,           28(6),           2366–2375. 

https://doi.org/10.1016/j.chb.2012.07.008

 

MyCERT.  (2018).  Reported  Incidents  based  on  General  Incident  Classification Statistics.  

https://www.mycert.org.my/portal/statistics-content?menu=b75e037d- 

6ee3-4d11-8169-66677d694932&id=ac188e88-67b5-4e39-bfed-5512036b87ac

 

Ng,  B.  Y.,  Kankanhalli,  A.,  &  Xu,  Y.  (Calvin).  (2009).  Studying  users’  computer 

security behavior: A health belief perspective. Decision Support Systems, 46(4), 815–825. 

https://doi.org/10.1016/j.dss.2008.11.010

 

Nunnally, J. C., & Bernstein, I. H. (1994). Psychometric Theory. In McGraw Hill (3rd ed., Vol. 5, 

Issue 3). https://doi.org/10.2307/1161962

 

Nur, B., Kamil, M., Zuhair, M., & Muazzam, M. (2017). 2017 Data Breaches Known So                   

            Far.                               MyCERT,                               32–35.

https://www.mycert.org.my/portal/publicationdoc?id=28cc0040-95dd-44f3- bdc2-8f7698ae4f2a

 

OfCom.   (2019).   Children   and   Parents:   Media   Use   and   Attitudes.   In   Ofcom. 

http://stakeholders.ofcom.org.uk/binaries/research/media-literacy/october- 

2013/research07Oct2013.pdf

 

Osatuyi, B., Passerini, K., Ravarini, A., & Grandhi, S. A. (2018). “Fool me once, shame on  you…  

then,  I  learn.”  An  examination  of  information  disclosure  in  social networking      sites.  

    Computers      in      Human      Behavior,      83,      73–86. 

https://doi.org/10.1016/j.chb.2018.01.018

 

Ostendorf, S., Müller, S. M., & Brand, M. (2020). Neglecting Long-Term Risks: Self- Disclosure  on  

Social  Media  and  Its  Relation  to  Individual  Decision-Making Tendencies  and  Problematic  

Social-Networks-Use.  Frontiers  in  Psychology, 11(October), 1–17. 

https://doi.org/10.3389/fpsyg.2020.543388

 

PADU.  (2015).  Transformasi  Pendidikan  Vokasional.  Buletin  Anjakan  -  Buletin Transformasi 

Pendidikan Malaysia.

 

Palaniappan,  A.  K.  (2009).   Penyelidikan  dan  SPSS  (PASW).  Pearson  Malaysia Sdn.Bhd.

 

Papathanassopoulos,   S.,   Athanasiadis,   E.,   &   Xenofontos,   M.   (2016).   Athenian 

University Students on Facebook and Privacy: A Fair “Trade-Off ”? Social Media

and Society, 2(3). https://doi.org/10.1177/2056305116662171

 

Park, S. K., Lee, S. H., Kim, T. Y., Jun, H. J., & Kim, T. S. (2017). A performance

evaluation of information security training in public sector. Journal of Computer Virology          

 and           Hacking           Techniques,           13(4),           289–296. 

https://doi.org/10.1007/s11416-017-0305-7

 

Parlimen Malaysia. (2010). Akta Perlindungan Data Peribadi.

 

Perna,  L.  K.  (2020).  Need  to  Belong, Fear  of  Missing  Out,  and  Social  Media  Use: 

Predictors      of      Perceived      Social      Rejection      [Walden      University]. 

http://faculty.waldenu.edu/User/Default.aspx?ReturnUrl=%2FFacultyHome%2F default.aspx

 

Peter,  J.,  &  Valkenburg,  P.  M.  (2013).  Adolescents’  Online  Privacy:  Toward  a 

Developmental       Perspective.        Privacy        Online,        15(8),        221–234. 

https://doi.org/10.1177/1461444813500461a

 

Poleon, V. (2020). Millennials’ Information Security Habits And Protection Motivation Intention: A 

Quantitative Study (Issue April). Capella University.

 

Ponemon    Institute.    (2019).    Cost    of    a    Data    Breach.    In    IBM    Security. 

https://doi.org/10.1016/b978-0-12-419967-5.00003-x

 

Ponemon Institute. (2020). Cost of a Data Breach Report 2020.

 

Posey,  C.,  Roberts,  T.  L.,  &  Lowry,  P.  B.  (2015).  The  impact  of  organizational 

commitment on insiders motivation to protect organizational information assets. Journal      of     

 Management      Information      Systems,      32(4),      179–214. 

https://doi.org/10.1080/07421222.2015.1138374

 

Pruitt-Mentle, D. (2011). National C3 Baseline Study : State of Cyberethics , Safety and  Security  

Awareness  in  US  Schools.  CISSE  ’11  -  Proceedings  of  the  15th Colloquium      for      

Information      Systems      Security      Education,      37–46. 

https://cisse.info/resources/archives/category/16-papers

 

Robertson,  B.  W.,  &  Kee,  K.  F.  (2017).  Social  media  at  work:  The  roles  of  job 

satisfaction, employment status, and Facebook use with co-workers. Computers in Human Behavior, 70, 

191–196. https://doi.org/10.1016/j.chb.2016.12.080

 

Rogers, R. W. (1975). A Protection Motivation Theory of Fear Appeals and Attitude Change1.         

The         Journal         of         Psychology,         91(1),         93–114. 

https://doi.org/10.1080/00223980.1975.9915803

 

Roopchund, R., Ramesh, V., & Jaunky, V. (2019). Use of Social Media for Improving Student 

Engagement at Université des Mascareignes (UDM). Proceedings of Fifth International  Conference  

INDIA  2018,  2(January).  https://doi.org/10.1007/978-

81-322-2247-7

 

Sadaghiani-Tabrizi, A. (2018). Integrating cybersecurity education in K-6 curriculum:

Schoolteachers,  it  experts,  and  parents’  perceptions.  In  Dissertation  Abstracts 

International Section A: Humanities and Social Sciences (Vol. 79, Issues 8-A(E)). 

http://ovidsp.ovid.com/ovidweb.cgi?T=JS&PAGE=reference&D=psyc14&NEW S=N&AN=2018-26095-020

 

Sardaryzadeh, A. (2017). Identifying Effective Cybersecurity Team Behaviors In Order to Transform 

Cybersecurity (Issue December). Brandman University.

 

Schipper,   C.,  &   Latham,   A.   (2019).   Embracing  Social   Media   for  Stakeholder 

Management within NPOs – A Case Study. 6th European Conference on Social Media, June.

 

Sedek,  M.,  Ahmad,  R.,  &  Othman,  N.  F.  (2018).  Motivational  Factors  in  Privacy 

Protection Behaviour Model for Social Networking. MATEC Web of Conferences, 150, 1–5. 

https://doi.org/10.1051/matecconf/201815005014

 

Shillair, R. J. (2018). Mind the Gap: Perceived self-efficacy, domain knowledge and their effects 

on responses to a cybersecurity compliance message. Michigan State University.

 

Silva-López, R. B., Silva-López, M. I., & Fallad Chávez, J. (2017). A Flipped Learning Approach 

Using Social Media. Study Case: Elemental Programming in Higher Education.           EDULEARN17     

      Proceedings,           1,           4342–4347. https://doi.org/10.21125/edulearn.2017.1936

 

Smahel, D., & Wright, M. F. (2014). The meaning of online problematic situations for children  -  

Results  of  qualitative  cross-cultural  investigation  in  nine  European countries. EU Kids 

Online, June, 1–171.

 

Solove, D. J. (2008). Understanding Privacy. Harvard University Press.

 

Sommestad,  T.,  Karlzén,  H.,  &  Hallberg,  J.  (2015).  A  meta-Analysis  of  studies  on 

protection  motivation  theory and  information  security behaviour.  International Journal      of 

     Information      Security      and      Privacy,      9(1),      26–46. 

https://doi.org/10.4018/IJISP.2015010102

 

Song, A. (2018). Evaluation of the Intents of Noncomplience with the Organizational Information 

Systems Security Policy. University of Phoenix.

 

Soomro, Z. A., Shah, M. H., & Ahmed, J. (2016). Information security management needs  more  

holistic  approach:  A  literature  review.  International  Journal  of Information                 

     Management,                      36(2),                      215–225. 

https://doi.org/10.1016/j.ijinfomgt.2015.11.009

 

Stanton, J. M., Stam, K. R., Mastrangelo, P., & Jolton, J. (2005). Analysis of end user security    

  behaviors.       Computers      and      Security,      24(2),      124–133.

https://doi.org/10.1016/j.cose.2004.07.001

 

Sundaram,  A.,  &  Radha,  P.  (2019).  Social  media  security  and  privacy  protection

concerning youths. “How to be safe, secure and social.” International Journal of Business           

Innovation          and          Research,           18(4),          453–471. 

https://doi.org/10.1504/IJBIR.2019.098761

 

Suruhanjaya Komunikasi dan Multimedia Malaysia. (2014). CyberSafe Survey Report 2014.

 

Suruhanjaya Komunikasi dan Multimedia Malaysia. (2015). Media matters: Networked Media    Content.  

  ACME:    Action    Coalition    for    Media    Education,    2. 

http://www.getcited.org/pub/103175514

 

Suruhanjaya Komunikasi dan Multimedia Malaysia. (2018). Internet User Survey 2018.

 

Syazwan, B., Lukman, W., & Azhar, M. (2017). Dangers of Social Media : Borders in a                 

 Borderless                  World.                  E-Securtiy,                  47–48. 

https://www.cybersecurity.my/data/content_files/12/1761.pdf

 

Symantec.  (2019).  Internet  Security  Threat  Report  VOLUME  21,  February  2019.

Network Security, 21(February). https://doi.org/10.1016/S1353-4858(05)00194-7

 

Tavani, H. T. (2007). Philosophical Theories of Privacy: Implications for an Adequate Online        

  Privacy          Policy.          Metaphilosophy,          38(1),          1–22. 

https://doi.org/10.1111/j.1467-9973.2006.00474.x

 

Thomas, R. M. (2003). Blending Qualitative and Quantitative Research Methods in Theses and 

Disertation. Corwin Press.

 

Thurairaj, S., Hoon, E. P., Roy, S. S., & Fong, P. W. (2015). Reflections of Students’ language  

Usage  in  Social  Networking  Sites:  Making  or  Marring  Academic English. Electronic Journal of 

E-Learning, 13(4), 302–316.

 

Trustwave.   (2019).   2019   Trustwave   Global   Security   Report.   Security   Report. 

https://www.shift4.com/pdf/TW_GSR_2019_Final.pdf

 

Tunc-Aksan, A., & Akbay, S. E. (2019). Smartphone addiction, fear of missing out, and perceived 

competence as predictors of social media addiction of adolescents. European       Journal       of  

     Educational       Research,       8(2),       559–566. https://doi.org/10.12973/eu-jer.8.2.559

 

Twenge, J. M., Martin, G. N., & Spitzberg, B. H. (2018). Trends in U.S. Adolescents’ media use, 

1976–2016: The rise of digital media, the decline of TV, and the (near) demise       of       

print.       Psychology       of       Popular       Media       Culture. 

https://doi.org/10.1037/ppm0000203

 

van Schaik, P., Jeske, D., Onibokun, J., Coventry, L., Jansen, J., & Kusev, P. (2017). Risk  

perceptions  of  cyber-security  and  precautionary behaviour.  Computers  in

Human Behavior, 75, 547–559. https://doi.org/10.1016/j.chb.2017.05.038

 

Vance,  A.,  Siponen,  M.,  &  Pahnila,  S.  (2012).  Motivating  IS  security  compliance:

Insights   from   Habit   and   Protection   Motivation   Theory.   Information   and Management, 

49(3–4), 190–198. https://doi.org/10.1016/j.im.2012.04.002

 

Vishwanath,  A.,  Xu,  W.,  &  Ngoh,  Z.  (2018).  How  people  protect  their  privacy  on 

facebook: A cost-benefit view. Journal of the Association for Information Science and Technology, 

69(5), 700–709. https://doi.org/10.1002/asi.23894

 

Wang, Y., & Fesenmaier, D. . (2003). Assessing Motivation of Contribution in Online Communities:  

An  Empirical  Investigation  of  an  Online  Travel  Community. Electronic Markets, 13(1), 33–45. 

https://doi.org/10.1080/1019678032000052934

 

Wang, Z., & Liu, Y. (2014). Identifying key factors affecting information disclosure intention in 

online shopping. International Journal of Smart Home, 8(4), 47–58. 

https://doi.org/10.14257/ijsh.2014.8.4.05

 

Warkentin, M., Johnston, A. C., Shropshire, J., & Barnett, W. D. (2016). Continuance of protective 

security behavior: A longitudinal study. Decision Support Systems, 92(May 2018), 25–35. 

https://doi.org/10.1016/j.dss.2016.09.013

 

Westin, A. F. (1968). Privacy And Freedom. Washington and Lee Law Review, 25(1). Wiederhold,  B.  

K.  (2014).  The  role  of  psychology  in  enhancing  cybersecurity.

Cyberpsychology,    Behavior,    and    Social    Networking,    17(3),    131–132. 

https://doi.org/10.1089/cyber.2014.1502

 

Williams, M., Nurse, J. R. C., & Creese, S. (2019). (Smart)Watch Out! encouraging 

privacy-protective behavior through interactive games.  International Journal of Human-Computer     

                 Studies,                      132,                      121–137. 

https://doi.org/10.1016/j.ijhcs.2019.07.012

 

Woon,  I. M.  Y., Tan,  G. W.,  &  Low, R.  T. (2005). A protection motivation theory approach to 

home wireless security. Association for Information Systems - 26th International  Conference  on  

Information  Systems,  ICIS  2005:  Forever  New Frontiers, 367–380.

 

Xie, W., & Karan, K. (2019). Consumers’ Privacy Concern and Privacy Protection on Social Network 

Sites in the Era of Big Data: Empirical Evidence from College Students.        Journal        of    

    Interactive        Advertising,        0(0),        1–15. 

https://doi.org/10.1080/15252019.2019.1651681

 

Yetter,  R.  B.  (2015).  Darknets  ,  Cybercrime  &  The  Onion  Router :  Anonymity  & Security 

In Cyberspace.

 

Yoon, C., Hwang, J. W., & Kim, R. (2012). Exploring Factors That Influence Students’ Behaviors  in  

Information  Security.  Journal  of  Information  Systems  Education, 23(4),                        

                                                                                  407–415.

https://proxy.library.mcgill.ca/login?url=http://search.ebscohost.com/login.aspx?

direct=true&db=eft&AN=89084300&site=ehost-live&scope=site

 

Youn,  S.,  &  Shin,  W.  (2019).  Adolescents’  responses  to  social  media  newsfeed

advertising: the interplay of persuasion knowledge, benefit-risk assessment, and ad  scepticism  in 

 explaining  information  disclosure.  International  Journal  of Advertising. 

https://doi.org/10.1080/02650487.2019.1585650

 

Zahari, A., Bilu, R., & Said, J. (2019). The Role of Familiarity, Trust And Awareness Towards  

Online  Fraud.  Journal  of  Research  and  Opinion,  6(9),  2470–2480. 

https://doi.org/10.15520/jro.v6i9.

 

Zahri, Y., Susanty, A. H. R., Mustaffa, A., & Approach, A. O. (2017). Cyber Security Situational 

Awareness among Students: A Case Study in Malaysia. International Journal    of    Educational    

and    Pedagogical    Sciences,    11(7),    1704–1710. 

https://waset.org/publications/10007340/cyber-security-situational-awareness- 

among-students-a-case-study-in-malaysia

 

Zhang,  L., & McDowell, W. C. (2009). Am i really at risk? Determinants of online users’ intentions 

to use strong passwords. Journal of Internet Commerce, 8(3–4), 180–197. 

https://doi.org/10.1080/15332860903467508

 

Zhang, X., Liu, S., Chen, X., Wang, L., Gao, B., & Zhu, Q. (2018). Health information privacy  

concerns,  antecedents,  and  information  disclosure  intention  in  online health     

communities.     Information     and     Management,     55(4),     482–493.

https://doi.org/10.1016/j.im.2017.11.003

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 


This material may be protected under Copyright Act which governs the making of photocopies or reproductions of copyrighted materials.
You may use the digitized material for private study, scholarship, or research.

Back to previous page

Installed and configured by Bahagian Automasi, Perpustakaan Tuanku Bainun, Universiti Pendidikan Sultan Idris
If you have enquiries, kindly contact us at pustakasys@upsi.edu.my or 016-3630263. Office hours only.