Trend berkomunikasi dan transaksi dalam talian: selamatkah data peribadi belia Malaysia?
List of Authors
  • Shariffah Mamat , Wan Amizah Wan Mahmud

Keyword
  • Keselamatan data peribadi, komunikasi, ancaman siber, belia, online

Abstract
  • Isu keselamatan data peribadi pengguna secara dalam talian menjadi perdebatan hangat seantero dunia termasuk di Malaysia. Krisis kesihatan pandemik Covid-19 menjadi pemangkin kepesatan penggunaan teknologi dalam pelbagai aspek kehidupan. Global Threat Report 2021 menggesa penduduk dunia untuk menjadikan keselamatan siber sebagai budaya sementara pakar teknologi berjuang mengesan dan menghentikan ancaman siber sepenuhnya. Justeru, artikel ini bertujuan mengkaji tingkah laku golongan belia agar sentiasa melindungi data peribadi yang dikongsikan secara dalam talian. Kajian kuantitatif dengan menggunakan borang soal selidik yang diedarkan secara dalam talian ini dijalankan ke atas belia Malaysia semasa Perintah Kawalan Pergerakan (PKP) masih berkuatkuasa. Seramai 535 orang belia berumur 19 hingga 30 tahun di Putrajaya dan Cyberjaya telah dipilih sebagai sampel kajian. Pemilihan ini menggunakan pendekatan multi tahap iaitu berdasarkan kategori umur, jantina, etnik dan lokasi. Data dianalisis menggunakan perisian Statistical Packages for Social Science (SPSS) versi 28.0. Analisis regresi berganda mendapati bahawa faktor kawalan tingkah laku (R2 = .819) merupakan menyumbang paling besar dan signifikan dalam usaha melindungi keselamatan data peribadi berbanding faktor lain seperti sikap, norma subjektif, niat, mudah guna, kepercayaan dan faedah. Dapatan ini menjelaskan bahawa bagi memastikan belia Malaysia cenderung untuk menjadi pengguna secara dalam talian yang selamat mereka perlu memiliki sifat kawalan tingkah laku yang tinggi untuk melindungi keselamatan data peribadi mereka. Budaya menghindari diri daripada menjadi mangsa ancaman siber ini perlu disemai dalam diri setiap individu belia seiring dengan kepesatan teknologi bagi menangani cabaran era digital dewasa ini.

Reference
  • 1. Abu, S. (2021). Right to privacy, data protection and IOTs: An appraisal of legal issues covering cross border data transfer. [Undergraduate dissertation, University of Lagos]. SSRN. http://dx.doi.org/10.2139/ssrn.3848782
    2. Agbeko, M. (2021). Understanding cyber safety behavior among teenagers in Ghana. International Journal of Computer Science and Information Security, 19, 1-7. https://10.5281/zenodo.5111963
    3. Ajzen, I. (1985). From intention to action: A theory of planned behaviour. In J. Kuhl & J. Beckmann, (Eds.), Action control: From cognition to behaviour (pp. 11–39). Springer.
    4. Ajzen, I. (1991). The theory of planned behaviour. Organizational Behaviour and Human Decision Processes, 50(2), 179-211. https://doi.org/10.1016/0749-5978(91)90020-T
    5. Alagaratnam, S. (2021, Januari 21). Malaysia: Perlindungan data peribadi pekerja di Malaysia - Peraturan perlindungan data am (GDPR) dan Akta Perlindungan Data Peribadi 2010 (PDPA). Mondaq. https://www.mondaq.com/data-protection/1022286/protection-of-employee39s-personal-data-in-malaysia--general-data-protection-regulation-gdpr-and-personal-data-protection-act-2010-pdpa?type=related
    6. Afiza, N, M. R. (2021, September 2). Perkukuh daya saing harungi cabaran era ekonomi digital. Berita Harian. https://www.bharian.com.my/rencana/lain-lain/2021/09/858864/perkukuh-daya-saing-harungi-cabaran-era-ekonomi-digital
    7. Arun, M., Baraneetharan, E., Kanchana, A. and Prabu, S. (2020). Detection and monitoring of the asymptotic COVID-19 patients using IoT devices and sensors. International Journal of Pervasive Computing and Communications. 18(4), 407-418. https://doi.org/10.1108/IJPCC-08-2020-0107
    8. Bansal, G. & Nah, F. F. H. (2020). Measuring privacy concerns with government surveillance and right-to-be-forgotten in nomological net of trust and willingness-to-share. AMCIS 2020 Proceedings, 31. https://aisel.aisnet.org/amcis2020/info_security_privacy/info_security_privacy/31
    9. Becker, M. (2018). Ethics in the big data era: Privacy as autonomy and privacy as dignity. Tydskrift vir Geesteswetenskappe, Tydskr. Spiritual Law, 58, 669-682. http://dx.doi.org/10.17159/2224-7912/2018/v58n4-1a4
    10. Bielinski, L. L., Bur, O. T., Walchli, G., Suter, J. M., Walsh, N., Kley, M. A., Krieger, T. & Berger. T. (2022). Two sides of the same coin? Patient and therapist experiences with a transdiagnostic blended intervention focusing on emotion regulation. Internet Interventions, 30. https://doi.org/10.1016/j.invent.2022.100586
    11. Daud, N. S. M. F. & Ahmad Rizal, A. R. M. (2022). Understanding cybercrime and cybersecurity in Malaysia: An observation from the perspective of scholars and intellectuals. Asian Journal of Environment, History and Heritage, 6(1), 11-26. https://spaj.ukm.my/ajehh/index.php/ajehh/article/view/184
    12. Dawes, J. (2008). Do data characteristics change according to the number of scale points used? An experiment using 5-point, 7-point and 10-point scales. International Journal of Market Research, 50(1), 61-77. https://doi.org/10.1177/147078530805000106
    13. De', R., Pandey, N & Pal, A. (2020). Impact of digital surge during Covid-19 pandemic: A viewpoint on research and practice. International Journal Information Manage, 55, 102171. https://doi.10.1016/j.ijinfomgt.2020.102171
    14. Digital Malaysia Berhad. (2021). Membawakan 5G kepada negara. https://www.digital-nasional.com.my/ms#faq
    15. Dimodugno, M., Hallman, S., Plaisent, M. & Bernard, P. (2021). The effects of privacy concerns, risk, control and trust on individuals’ decision to share personal information: A game theory-based approach. Journal of Physics: Conference Series 2090. http://doi:10.1088/1742-6596/2090/1/012017
    16. Edwards, J. (2021). 6 business benefits of data protection and GDPR compliance. https://www.techtarget.com/searchdatabackup/tip/6-business-benefits-of-data-protection-and-GDPR-compliance
    17. Fernandes, B., Biswas, U. N., Mansukhani, R. T., Vallejo, A. & Essau, C. A. (2020). The impact of COVID-19 lockdown on internet use and escapism in adolescents. Revista de Psicología Clínica con Niños y Adolescentes, 7(3), 59-65. https://doi.10.21134/rpcna.2020.mon.2056.
    18. Global Youth Development Report. (2020). Global Youth Development index and report 2020. https://youth-development-index.thecommonwealth.org/assets/pdf/global-youth-development-report-2020.pdf
    19. Guan, A. L. C., Manvalan, M., Ahmed, A. A. A. & Azad, M. M. (2022). Role of internet of things (IOT) In enabling productive work from home (WFH) for Environmental Volatiles. Academy of Marketing Studies Journal, 26, 1-11.
    20. Institut Penyelidikan Pembangunan Belia Malaysia. (2021a). Facts and figures: Indeks Belia Malaysia 2021. Putrajaya. Malaysia. https://www.iyres.gov.my/images/penerbitan/Facts%20&%20Figures%20Indeks%20Belia%20Malaysia%202021.pdf
    21. Institut Penyelidikan Pembangunan Belia Malaysia. (2021b). Statistik populasi penduduk & penduduk belia mengikut kategori umur, jantina, etnik, daerah & negeri di Malaysia bagi tahun 2015-2021. https://ydata.iyres.gov.my/iyresbankdatav2/www/index.php?R=pub/home/readcontent4&id=134
    22. International Labour Organization. (2020). An employers’ guide on working from home in response to the outbreak of COVID-19. https://www.ilo.org/wcmsp5/groups/public/---ed_dialogue/---act_emp/documents/publication/wcms_745024.pdf
    23. International Telecommunication Union. (2020). Measuring digital development Facts and figures 2020. https://www.itu.int/en/ITU-D/Statistics/Documents/facts/FactsFigures2020.pdf
    24. Jabatan Perangkaan Malaysia. (2022). Penduduk populasi Malaysia 2022. https://newss.statistics.gov.my/newss-portalx/ep/epFreeDownloadContentSearch.seam?cid=95906.
    25. Jamil, A. H., Sanusi, Z. M., Yaacob, N. M., Isa, Y. M. & Tarjo. T. (2021). The Covid-19 impact on financial crime and regulatory compliance in Malaysia. Journal of Financial Crime, 29(2), 491-505. https://doi.org/10.1108/JFC-05-2021-0107
    26. Jian, N. J. & Kamsin, I. F. (2021). Cybersecurity awareness among the young in Malaysia by gamification. Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021). Atlantis Highlights in Computer Sciences, 4. http://doi.10.2991/ahis.k.210913.061
    27. Joshi, A., Kale, S., Chandel, S. & Pal, D. K. (2015). Likert scale: Explored and explained. British Journal of Applied Science & Technology, (BJAST), 7(4), 396-403. https://doi.10.9734/BJAST/2015/14975
    28. Kalmus, V., Realo, A. & Siibak, A. (2011). Motives for internet use and their relationships with personality traits and socio-demographic factors. Trames. Journal of the Humanities and Social Sciences, 15. http://doi.10.3176/tr.2011.4.04.
    29. Kementerian Belia dan Sukan Malaysia. (2015). Dasar Belia Malaysia 2015-2035. https://www.kbs.gov.my/akta-dasar/dasar.html
    30. Kemp, S. (2022, Februari 15). Internet use in Malaysia in 2022. https://datareportal.com/reports/digital-2022-malaysia.
    31. Kesatuan Eropah. (2016). General Data Protection Regulation (GDPR). https://gdpr-info.eu/
    32. Király, I., Bothe, B., Marki, A. N., Rigo, A. & Orosz, G. (2019). Two sides of the same coin: The differentiating role of need satisfaction and frustration in passion for screen-based activities. European Journal of Social Psychology, 49. https://doi.10.1002/ejsp.2588
    33. Lenhart, A. & Madden, M. (2007). Teens, privacy and online social networks. Pew internet & American life project. http://www.pewInternet.org/Reports/2007/Teens-Privacy-and-Online-Social-Networks.aspx
    34. Livingstone, S., Stoilova, M. & Nandagiri, R. (2018). Children’s data and privacy online growing up in a digital age. Media and communication. Information Commissioner’s Office (ICO). British Library of Political and Economic Science.
    35. Luthfia, A., Triputra, P. & Hendriyani. (2020). The impact of internet motive and access on the opportunities and risks of teenager internet users in Indonesia. Solid State Technology, 63, 981-989.
    36. Mai, P. & Tick, A. (2021). Cyber security awareness and behavior of youth in smartphone usage: A comparative study between university students in Hungary and Vietnam. Acta Polytechnica Hungarica, 18, 67-89. https://10.12700/APH.18.8.2021.8.4.
    37. Majlis Keselamatan Negara. (2022). SOP Perintah Kawalan Pergerakan. https://www.mkn.gov.my/web/ms/sop-perintah-kawalan-pergerakan/
    38. Majlis Keselamatan Negara. (2020). Malaysia Cyber security strategi 2020-2024. https://asset.mkn.gov.my/wp-content/uploads/2020/10/MalaysiaCyberSecurityStrategy2020-2024.pdf
    39. Mamat, S., Mahmud, W. A. W. & Azlan, A. A. (2020). Belia Malaysia dan akta keselamatan data peribadi secara dalam talian: Perbandingan antara Negara Kesatuan Eropah (EU), Kanada, Brazil, Jepun, Australia, Singapura & Thailand. Prosiding POGRESS 2020, 416-422.
    40. Martiny, K., Briesemeister, L., Denker, G., John, M. S. & Moore, R. (2021). Protecting privacy during a pandemic outbreak. International Conference on Information Systems Security and Privacy (ICISSP), 308-318. http://doi.10.5220/0010186603080318
    41. Maurya, A. K. (2021). Privacy rights during a pandemic: A comparative study. Psychology and Education Journal, 58(2). http://psychologyandeducation.net/pae/index.php/pae/article/view/3256
    42. Mohd, S., Senadjki, A., Rahim, S. R. M., Nathan, T. M., Lee, C. Y. & Wahab, M. A. (2017). Cybercrime among Malaysian youth. Malaysian Journal of Youth Studies (MJYS), 17-51.
    43. Moscardelli, D. M. & Divine, R. (2007). Adolescents' concern for privacy when using the internet: An empirical analysis of predictors and relationships with privacy-protecting behaviors. Family and Consumer Sciences Research Journal, 35(3), 232-252.
    44. Moscardelli, D. M. & Heyes, L. C. (2004). Teens surfing the net: how do they learn to protect their privacy?. Journal of Business and Economics Research, 2(9), 43-56.
    45. MyCERT. (2022). Incident statistics. Cybersecurity Malaysia. https://mycert.org.my/portal/statistics
    46. Organisation for Economic Co-operation and Development. (2010). The economic and social role of internet intermediaries. https://www.oecd.org/digital/ieconomy/44949023.pdf
    47. Personal Data Protection Commission Singapore. (2012). Overview: What is personal data? Personal data protection commission Singapore. http//:www.pdpc.gov.sg/ Legislation and-Guidelines/Personel Data-Protection-Act-Overview
    48. Sundaram, A. & Radha, P. (2019). Social media security and privacy protection concerning youths. 'How to be safe, secure and social. International Journal of Business Innovation and Research, 18(4), 453-471. http://doi.10.1504/IJBIR.2019.098761
    49. Steeves, V. & Regan, P. (2014). Young people online and the social value of privacy. Journal of Information, Communication and Ethics in Society, 2(4), 298-313. http://dx.doi.org/10.1108/JICES-01-2014-0004
    50. Taylor & Todd. (1995). Understanding information technology usage: A test of competing models. Information System Research, 6(2), 144-176.
    51. United Nation for Children Fund. (2016). Situation analysis of adolescents in Malaysia. https://www.unicef.org/malaysia/media/1521/file/Situation%20Analysis%20of%20Adolescents%20in%20Malaysia.pdf
    52. Venuleo, C., Marino, C., Ferrante, L., Rollo, S. & Schimmenti, A. (2020). Internet use and well-being during the COVID-19 outbreak: Examining the role of gender, age, motives for using the internet and relational resources in an Italian adult sample. Research Square. https://doi.10.21203/rs.3.rs-104082/v1.
    53. Yusuf, S., Al-Majdhoub, F. M., Mubin, N. N., Chaniago, R. H. & Khan, F. R. (2021). Cyber aggression-victimization among malaysians youth. Asian Journal of University Education (AJUE), 17(1), 240-260.
    54. Zukarnain, Z. A., Hashim, M. Z., Muhammad, N., Mansor, F. A. & Azib, N. H. W. (2020). Impact training on cybersecurity awareness. Gading Journal of Science and Technology, 3(1), 114-120.