1. Abu, S. (2021). Right to privacy, data protection and IOTs: An appraisal of legal issues covering cross border data transfer. [Undergraduate dissertation, University of Lagos]. SSRN. http://dx.doi.org/10.2139/ssrn.3848782
2. Agbeko, M. (2021). Understanding cyber safety behavior among teenagers in Ghana. International Journal of Computer Science and Information Security, 19, 1-7. https://10.5281/zenodo.5111963
3. Ajzen, I. (1985). From intention to action: A theory of planned behaviour. In J. Kuhl & J. Beckmann, (Eds.), Action control: From cognition to behaviour (pp. 11–39). Springer.
4. Ajzen, I. (1991). The theory of planned behaviour. Organizational Behaviour and Human Decision Processes, 50(2), 179-211. https://doi.org/10.1016/0749-5978(91)90020-T
5. Alagaratnam, S. (2021, Januari 21). Malaysia: Perlindungan data peribadi pekerja di Malaysia - Peraturan perlindungan data am (GDPR) dan Akta Perlindungan Data Peribadi 2010 (PDPA). Mondaq. https://www.mondaq.com/data-protection/1022286/protection-of-employee39s-personal-data-in-malaysia--general-data-protection-regulation-gdpr-and-personal-data-protection-act-2010-pdpa?type=related
6. Afiza, N, M. R. (2021, September 2). Perkukuh daya saing harungi cabaran era ekonomi digital. Berita Harian. https://www.bharian.com.my/rencana/lain-lain/2021/09/858864/perkukuh-daya-saing-harungi-cabaran-era-ekonomi-digital
7. Arun, M., Baraneetharan, E., Kanchana, A. and Prabu, S. (2020). Detection and monitoring of the asymptotic COVID-19 patients using IoT devices and sensors. International Journal of Pervasive Computing and Communications. 18(4), 407-418. https://doi.org/10.1108/IJPCC-08-2020-0107
8. Bansal, G. & Nah, F. F. H. (2020). Measuring privacy concerns with government surveillance and right-to-be-forgotten in nomological net of trust and willingness-to-share. AMCIS 2020 Proceedings, 31. https://aisel.aisnet.org/amcis2020/info_security_privacy/info_security_privacy/31
9. Becker, M. (2018). Ethics in the big data era: Privacy as autonomy and privacy as dignity. Tydskrift vir Geesteswetenskappe, Tydskr. Spiritual Law, 58, 669-682. http://dx.doi.org/10.17159/2224-7912/2018/v58n4-1a4
10. Bielinski, L. L., Bur, O. T., Walchli, G., Suter, J. M., Walsh, N., Kley, M. A., Krieger, T. & Berger. T. (2022). Two sides of the same coin? Patient and therapist experiences with a transdiagnostic blended intervention focusing on emotion regulation. Internet Interventions, 30. https://doi.org/10.1016/j.invent.2022.100586
11. Daud, N. S. M. F. & Ahmad Rizal, A. R. M. (2022). Understanding cybercrime and cybersecurity in Malaysia: An observation from the perspective of scholars and intellectuals. Asian Journal of Environment, History and Heritage, 6(1), 11-26. https://spaj.ukm.my/ajehh/index.php/ajehh/article/view/184
12. Dawes, J. (2008). Do data characteristics change according to the number of scale points used? An experiment using 5-point, 7-point and 10-point scales. International Journal of Market Research, 50(1), 61-77. https://doi.org/10.1177/147078530805000106
13. De', R., Pandey, N & Pal, A. (2020). Impact of digital surge during Covid-19 pandemic: A viewpoint on research and practice. International Journal Information Manage, 55, 102171. https://doi.10.1016/j.ijinfomgt.2020.102171
14. Digital Malaysia Berhad. (2021). Membawakan 5G kepada negara. https://www.digital-nasional.com.my/ms#faq
15. Dimodugno, M., Hallman, S., Plaisent, M. & Bernard, P. (2021). The effects of privacy concerns, risk, control and trust on individuals’ decision to share personal information: A game theory-based approach. Journal of Physics: Conference Series 2090. http://doi:10.1088/1742-6596/2090/1/012017
16. Edwards, J. (2021). 6 business benefits of data protection and GDPR compliance. https://www.techtarget.com/searchdatabackup/tip/6-business-benefits-of-data-protection-and-GDPR-compliance
17. Fernandes, B., Biswas, U. N., Mansukhani, R. T., Vallejo, A. & Essau, C. A. (2020). The impact of COVID-19 lockdown on internet use and escapism in adolescents. Revista de Psicología Clínica con Niños y Adolescentes, 7(3), 59-65. https://doi.10.21134/rpcna.2020.mon.2056.
18. Global Youth Development Report. (2020). Global Youth Development index and report 2020. https://youth-development-index.thecommonwealth.org/assets/pdf/global-youth-development-report-2020.pdf
19. Guan, A. L. C., Manvalan, M., Ahmed, A. A. A. & Azad, M. M. (2022). Role of internet of things (IOT) In enabling productive work from home (WFH) for Environmental Volatiles. Academy of Marketing Studies Journal, 26, 1-11.
20. Institut Penyelidikan Pembangunan Belia Malaysia. (2021a). Facts and figures: Indeks Belia Malaysia 2021. Putrajaya. Malaysia. https://www.iyres.gov.my/images/penerbitan/Facts%20&%20Figures%20Indeks%20Belia%20Malaysia%202021.pdf
21. Institut Penyelidikan Pembangunan Belia Malaysia. (2021b). Statistik populasi penduduk & penduduk belia mengikut kategori umur, jantina, etnik, daerah & negeri di Malaysia bagi tahun 2015-2021. https://ydata.iyres.gov.my/iyresbankdatav2/www/index.php?R=pub/home/readcontent4&id=134
22. International Labour Organization. (2020). An employers’ guide on working from home in response to the outbreak of COVID-19. https://www.ilo.org/wcmsp5/groups/public/---ed_dialogue/---act_emp/documents/publication/wcms_745024.pdf
23. International Telecommunication Union. (2020). Measuring digital development Facts and figures 2020. https://www.itu.int/en/ITU-D/Statistics/Documents/facts/FactsFigures2020.pdf
24. Jabatan Perangkaan Malaysia. (2022). Penduduk populasi Malaysia 2022. https://newss.statistics.gov.my/newss-portalx/ep/epFreeDownloadContentSearch.seam?cid=95906.
25. Jamil, A. H., Sanusi, Z. M., Yaacob, N. M., Isa, Y. M. & Tarjo. T. (2021). The Covid-19 impact on financial crime and regulatory compliance in Malaysia. Journal of Financial Crime, 29(2), 491-505. https://doi.org/10.1108/JFC-05-2021-0107
26. Jian, N. J. & Kamsin, I. F. (2021). Cybersecurity awareness among the young in Malaysia by gamification. Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021). Atlantis Highlights in Computer Sciences, 4. http://doi.10.2991/ahis.k.210913.061
27. Joshi, A., Kale, S., Chandel, S. & Pal, D. K. (2015). Likert scale: Explored and explained. British Journal of Applied Science & Technology, (BJAST), 7(4), 396-403. https://doi.10.9734/BJAST/2015/14975
28. Kalmus, V., Realo, A. & Siibak, A. (2011). Motives for internet use and their relationships with personality traits and socio-demographic factors. Trames. Journal of the Humanities and Social Sciences, 15. http://doi.10.3176/tr.2011.4.04.
29. Kementerian Belia dan Sukan Malaysia. (2015). Dasar Belia Malaysia 2015-2035. https://www.kbs.gov.my/akta-dasar/dasar.html
30. Kemp, S. (2022, Februari 15). Internet use in Malaysia in 2022. https://datareportal.com/reports/digital-2022-malaysia.
31. Kesatuan Eropah. (2016). General Data Protection Regulation (GDPR). https://gdpr-info.eu/
32. Király, I., Bothe, B., Marki, A. N., Rigo, A. & Orosz, G. (2019). Two sides of the same coin: The differentiating role of need satisfaction and frustration in passion for screen-based activities. European Journal of Social Psychology, 49. https://doi.10.1002/ejsp.2588
33. Lenhart, A. & Madden, M. (2007). Teens, privacy and online social networks. Pew internet & American life project. http://www.pewInternet.org/Reports/2007/Teens-Privacy-and-Online-Social-Networks.aspx
34. Livingstone, S., Stoilova, M. & Nandagiri, R. (2018). Children’s data and privacy online growing up in a digital age. Media and communication. Information Commissioner’s Office (ICO). British Library of Political and Economic Science.
35. Luthfia, A., Triputra, P. & Hendriyani. (2020). The impact of internet motive and access on the opportunities and risks of teenager internet users in Indonesia. Solid State Technology, 63, 981-989.
36. Mai, P. & Tick, A. (2021). Cyber security awareness and behavior of youth in smartphone usage: A comparative study between university students in Hungary and Vietnam. Acta Polytechnica Hungarica, 18, 67-89. https://10.12700/APH.18.8.2021.8.4.
37. Majlis Keselamatan Negara. (2022). SOP Perintah Kawalan Pergerakan. https://www.mkn.gov.my/web/ms/sop-perintah-kawalan-pergerakan/
38. Majlis Keselamatan Negara. (2020). Malaysia Cyber security strategi 2020-2024. https://asset.mkn.gov.my/wp-content/uploads/2020/10/MalaysiaCyberSecurityStrategy2020-2024.pdf
39. Mamat, S., Mahmud, W. A. W. & Azlan, A. A. (2020). Belia Malaysia dan akta keselamatan data peribadi secara dalam talian: Perbandingan antara Negara Kesatuan Eropah (EU), Kanada, Brazil, Jepun, Australia, Singapura & Thailand. Prosiding POGRESS 2020, 416-422.
40. Martiny, K., Briesemeister, L., Denker, G., John, M. S. & Moore, R. (2021). Protecting privacy during a pandemic outbreak. International Conference on Information Systems Security and Privacy (ICISSP), 308-318. http://doi.10.5220/0010186603080318
41. Maurya, A. K. (2021). Privacy rights during a pandemic: A comparative study. Psychology and Education Journal, 58(2). http://psychologyandeducation.net/pae/index.php/pae/article/view/3256
42. Mohd, S., Senadjki, A., Rahim, S. R. M., Nathan, T. M., Lee, C. Y. & Wahab, M. A. (2017). Cybercrime among Malaysian youth. Malaysian Journal of Youth Studies (MJYS), 17-51.
43. Moscardelli, D. M. & Divine, R. (2007). Adolescents' concern for privacy when using the internet: An empirical analysis of predictors and relationships with privacy-protecting behaviors. Family and Consumer Sciences Research Journal, 35(3), 232-252.
44. Moscardelli, D. M. & Heyes, L. C. (2004). Teens surfing the net: how do they learn to protect their privacy?. Journal of Business and Economics Research, 2(9), 43-56.
45. MyCERT. (2022). Incident statistics. Cybersecurity Malaysia. https://mycert.org.my/portal/statistics
46. Organisation for Economic Co-operation and Development. (2010). The economic and social role of internet intermediaries. https://www.oecd.org/digital/ieconomy/44949023.pdf
47. Personal Data Protection Commission Singapore. (2012). Overview: What is personal data? Personal data protection commission Singapore. http//:www.pdpc.gov.sg/ Legislation and-Guidelines/Personel Data-Protection-Act-Overview
48. Sundaram, A. & Radha, P. (2019). Social media security and privacy protection concerning youths. 'How to be safe, secure and social. International Journal of Business Innovation and Research, 18(4), 453-471. http://doi.10.1504/IJBIR.2019.098761
49. Steeves, V. & Regan, P. (2014). Young people online and the social value of privacy. Journal of Information, Communication and Ethics in Society, 2(4), 298-313. http://dx.doi.org/10.1108/JICES-01-2014-0004
50. Taylor & Todd. (1995). Understanding information technology usage: A test of competing models. Information System Research, 6(2), 144-176.
51. United Nation for Children Fund. (2016). Situation analysis of adolescents in Malaysia. https://www.unicef.org/malaysia/media/1521/file/Situation%20Analysis%20of%20Adolescents%20in%20Malaysia.pdf
52. Venuleo, C., Marino, C., Ferrante, L., Rollo, S. & Schimmenti, A. (2020). Internet use and well-being during the COVID-19 outbreak: Examining the role of gender, age, motives for using the internet and relational resources in an Italian adult sample. Research Square. https://doi.10.21203/rs.3.rs-104082/v1.
53. Yusuf, S., Al-Majdhoub, F. M., Mubin, N. N., Chaniago, R. H. & Khan, F. R. (2021). Cyber aggression-victimization among malaysians youth. Asian Journal of University Education (AJUE), 17(1), 240-260.
54. Zukarnain, Z. A., Hashim, M. Z., Muhammad, N., Mansor, F. A. & Azib, N. H. W. (2020). Impact training on cybersecurity awareness. Gading Journal of Science and Technology, 3(1), 114-120.