UPSI Digital Repository (UDRep)
|
|
|
Abstract : Universiti Pendidikan Sultan Idris |
This paper is to discuss the awareness among the youth in UUM related to personal data protection. The cases of personal data protection increased day by day among the youths. Several awareness programs were done. The purpose of this study was to raise awareness of the importance of protecting personal data among the youth in Universiti Utara Malaysia. The method used to do awareness programs by using YouTube and online surveys. Awareness program using YouTube is highly recommended. The finding reveals that it can use this type of media to conduct awareness programs. |
References |
Alharbi, F. S. (2020). Dealing with data breaches amidst changes in technology. International Journal of Computer Science and Security, 14(3), 108-114. Ball, A. L., Ramim, M. M., & Levy, Y. (2015). Examining users’ personal information sharing awareness, habits, and practices in social networking sites and e-learning systems. Online Journal of Applied Knowledge Management, 3(1), 180-207. Baskaran, H., Yussof, S., Rahim, F. A., & Bakar, A. A. (2020). Blockchain and the Personal Data Protection Act 2010 (PDPA) in Malaysia. In 2020 8th International Conference on Information Technology and Multimedia (ICIMU) (pp. 189-193). IEEE. https://doi.org/10.1109/ICIMU49871.2020.9243493 Çelik, M., Alkan, M., & Alkan, A. O. (2020). Protection of Personal Data Transmitted via Web Service Against Software Developers. In 2020 International Conference on Information Security and Cryptology (ISCTURKEY) (pp. 88-92). IEEE. https://doi.org/10.1109/ISCTURKEY51113.2020.9308009 Cristea, L. M. (2020). Current security threats in the national and international context. Journal of Accounting and Management Information Systems, 19(2), 351-378. Gandhi, A., Sucahyo, Y. G., & Ruldeviyani, Y. (2018). Investigating the protection of customers’ personal data in the ridesharing applications: A desk research in indonesia. In 2018 15th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON) (pp. 118-121). IEEE. https://doi.org/10.1109/ECTICon.2018.8619912 Gupta, B. B., Tewari, A., Jain, A. K., & Agrawal, D. P. (2017). Fighting against phishing attacks: state of the art and future challenges. Neural Computing and Applications, 28(12), 3629-3654. https://doi.org/10.1007/s00521-016-2275-y Jang-Jaccard, J., & Nepal, S. (2014). A survey of emerging threats in cybersecurity. Journal of Computer and System Sciences, 80(5), 973-993. https://doi.org/10.1016/j.jcss.2014.02.005 Rafique, G. M. (2017). Personal information sharing behavior of university students via online social networks. Library Philosophy and Practice (e-journal). Richardson, R., & North, M. M. (2017). Ransomware: Evolution, mitigation and prevention. International Management Review, 13(1), 10-21. Romansky, R., & Noninska, I. (2019). Cyber Space Features–Security and Data Protection Requirements. In 2019 International Conference on Information Technologies (InfoTech) (pp. 1-4). IEEE. https://doi.org/10.1109/InfoTech.2019.8860880 Saatci, C., & Gunal, E. S. (2019). Preserving privacy in personal data processing. In 2019 1st International Informatics and Software Engineering Conference (UBMYK) (pp. 1-4). IEEE. https://doi.org/10.1109/UBMYK48245.2019.8965432 Sim, W. L., Chua, H. N., & Tahir, M. (2019). Blockchain for identity management: The implications to personal data protection. In 2019 IEEE Conference on Application, Information and Network Security (AINS) (pp. 30-35). IEEE. https://doi.org/10.1109/AINS47559.2019.8968708 Tiganoaia, B., Cernian, A., & Niculescu, A. (2017). The use of social platforms and personal data protection—An exploratory study. In 2017 16th RoEduNet Conference: Networking in Education and Research (RoEduNet) (pp. 1-5). IEEE. https://doi.org/10.1109/ROEDUNET.2017.8123754 |
This material may be protected under Copyright Act which governs the making of photocopies or reproductions of copyrighted materials. You may use the digitized material for private study, scholarship, or research. |