A Comprehensive Study of Privacy and Security Risk Awareness Among Mobile Internet Users for Social Networks Sites in Malaysia

  • Nurshuhaida Abdul Razak
  • Hidayahtul Khusna Abdul Malik
  • Fadilla Rentah
  • Mohd Nor Hisham Mazlan

Abstract

In Malaysia, the rate of mobile internet usage is very competitive rapidly growth among the Malaysian community, especially in social networking sites. Most of the mobile internet’s users use the social networking sites as a platform to expand their social activity such as communication between other countries, purchase online, sharing the information each other’s and for business activities. However, the level of privacy and security risk awareness among mobile users in Malaysia is still at a minimum level and does not understand the risk rate of invasion of privacy and information security on social networking sites. The aims of this research paper will investigate the attacks of privacy and security risk on social networking sites towards mobile internet users in Malaysia. In additional, this paper also identify several types of intrusion occurs in social networking sites such as privacy breach, passive attack and active attack. This research explains how to overcome privacy and security attacks via social networking sites for instance Facebook, Instagram, Twitter, LinkedIn, Telegram and YouTube. The findings of this study also found that Telegram is the most secure social networking sites to the mobile internet users in Malaysia with the solution their provided the data information of users.

References

Aida Abdulahi, BehrangSamadi, BehroozGharleghi (2014). A Study on the Negative Effects of Social Networking Sites Such as Facebook among Asia Pacific University Scholars in Malaysia.International Journal of Business and Social Science. Vol. 5, No. 10, pp 133-14.
Al-Jabri, I. M., and Sohail, M. S. (2012).Mobile Banking Adoption: Application of Diffusion of Innovation Theory. Journal of Electronic Commerce Research (13:4), pp. 379-391.
Alay Rameshbhai Patel (2011),"Comparative Study and Analysis of Social Networking Sites, Master of Science in Computer Science, San Diego State University." Journal of Computer Sciency and Technology,pp 267-274.
Andrews, L., Higgins, A., Andrews, M., & J, L. (2012). Classic Grounded Theroy to Analyse Secondary Data: Reality and Reflections. The Grounded Theory Review, 11(1), 12–26
Ardi, R., & Maison, D. (2014). How do Polish and Indonesian disclose in Facebook? Differences In online self-disclosure, need for popularity, need to belong and self-esteem. Journal of Information, Communication and Ethics in Society, 12(3), 195-218, doi: 10.1108/ JICES-01-2014-0006.
Arpaci, I.,Yardimci Cetin,Y., and Turetken, O.(2015).Impact of Perceived Security on Organization Adoption of Smartphones. Cyberpsychology, Behavior, and Social Networking (18:10), pp. 602-608.
Basilisa Mvungi, Mizuho Iwaihara. (2014). Associations between privacy, risk awareness, and interactive motivations of social networking service users, and motivation prediction from observable features. Computers in Human Behavior, Dec 2014; 4(c):20-34.
Benson Vladlena, George Saridakis, Hemamali Tennakoon, Jean Noel Ezingeard, (2015). The role Of security notices and online consumer behaviour: An empirical study of social networking users,International Journal of Human Computer Studies;Aug 2015; 80:36-44.
Boyd Danah and Ellison Nicole (2007) Social Network Sites: Definition, Histoy and Scholarship. Journal of Computer-Mediated Communication, Vol. 13, No. 1.
C. Chen, K. Z. K. Zhang, X. Gong, S. J. Zhao, M. K. O. Lee, and L. Liang.(2017).Understanding compulsive smartphone use: an empirical test of a flow-based model,” International Journal of Information Management, vol. 37, no. 5, pp. 438–454.
Cassidy, S., Carolyn, H.,Timothy, B., Jeffrey,P. (2011). Friend or faculty: Social networking sites,dual relationships, and context collapse in higher education. First Monday, Vol. 20, No.3.
Dinev, T., and Hu, Q. (2007). The centrality of awareness in the formation of user behavioral intention toward protective information technologies, Journal of the AIS, 8, 7, 386-408.
Dwyer, C. (2007). Digital Relationships in the 'MySpace' Generation: Results From a Qualitative Study. Proceedings of the 40th Hawaii International Conference on System Sciences (HICSS), Hawaii.
Eastlick, M. A., Lotz, S. L., and Warrington, P. (2006). Understanding Online B-To-C Relationships: An Integrated Model of Privacy Concerns, Trust, and Commitment,” Journal of Business Research (59:8), pp. 877-886.
Feng, Y., & Xie, W. (2014). Teens‟ concern for privacy when using social networking sites: An analysis of socialization agents and relationships with privacy-protecting behaviors. Computers in Human Behavior, 33.

Gail-Joon Ahn, Mohamed Shehab, Anna Squicciarini. (2011). Security and Privacy in Social Networks. IEEE Internet Computing; 2011; 15(3): 10-12.
Gross, R. & Acquisti, A. (2005). Information revelation and privacy in online social networks. In Proceedings of the Workshop on Privacy in the Electronic Society 2005 (pp. 71-80). Alexandria, VA: ACM.
Jamiah et. Al (2016) Penggunaan dan Implikasi Media Sosial Terhadap Remaja Generasi Z. International Conference on Social And Economic Development (ICSED) 2016, 1-3.
Jeon, G.-S.; Choi, K.-W.; Jang, K.-S. (2020)Social Networking Site Usage and Its’ Impact on Depressive Symptoms among Older Men and Women in South Korea. Int. J. Environ. Res. Public Health 2020, 17, 2670.
Johnston, M. P. (2014). Secondary Data Analysis : A Method of which the Time Has Come. Qualitatve and Quantative Methods in Libraryes (QQML), 3, 619–626.
Josang, A. and Sanderud, G. (2003). Security in Mobile Communications: Challenges and Opportunities. In Proc. First Australasian Information Security Workshop (AISW2003), Adelaide, Australia. CRPIT, 21. Johnson, C., Montague, P. and Steketee, C., Eds. ACS. 43-48.
Joshana Shibchurn, Xiangbin Yan. (2015). Information disclosure on social networking sites: An intrinsic extrinsic motivation perspective. Computers in Human Behavior. 2015; 44:103-117.
Ishak, I., Sidi, F., Jabar, M. A. et al., 2012. A Survey on Security Awareness among Social Networking Users in Malaysia. Australian Journal of Basic and Applied Science, 6(12), pp. 23-29.
Kaplan, A. M. & Haenlein, M. (2010). Users of the world, unite, the challenges and opportunity of social media. Business Horizons, 53 (1), 6.
Koch, M., Richter, A. and Schlosser, A. (2007). Services and applications for IT-supported social networking in companies. Wirtschaftsinformatik (49:6) pp 448-455.
Lallmahamood, M. (2007). An Examination of Individual’s Perceived Security and Privacy of the Internet in Malaysia and the Influence of This on Their Intention to Use E-Commerce: Using An Extension of the Technology Acceptance Model. Journal of Internet Banking and Commerce;12(3), 1-26.
Lapolla, K. (2014). The Pinterest project: Using social media in an undergraduate second year fashion design course at a United States University. Art, Design & Communication in Higher Education 13(2): 175-187.
M. Theoharidou, A. Mylonas, and D. Gritzalis, (2012). A risk assessment method for smartphones in Proceedings of the Information Security and Privacy Research (SEC), IFIP AICT, Heraklion, Greece, June 2012.
Mohammad Rezal. (2016). Predictors of health information seeking behaviour in social media among Malaysian students in public universities (Unpublished PhD Dissertation, National University of Malaysia, Malaysia).
Muniandy, L. and Muniandy, B. (2013).The impact of social media in social and political aspects in Malaysia: An Overview. International Journal of Humanities and Social Science, 3 (11), 71- 76.
Nader Yahya Alkeinay, Norita Md. Norwawi. (2013). User Oriented Privacy Model for Social Networks. International Conference on Innovation, Management and Technology Research, Malaysia; 22 – 23 September, 2013; 191-197.
Nissenbaum, H. (2004). Privacy as contextual integrity. Washington Law Review, 79(1), 101–158.
N. Sethil Kumar,K.Saravanakumar & K.Deepa., (2016). On Privacy and Security in Social Media, Procedia Computer Science 78 pg 114-119.
Papoola, M. (2014). New Media Usage for Communication and Self Concept among Journalism And Mass Communication Students in Oyo State, Nigeria. New Media and Mass Communication, 26, 22-34.
Patrick Van Eecke, Maarten Truyens,(2010). Privacy and social networks, Computer Law & Security Review; 2010; 26(5):535-546.
Pitchan, M. A., Omar, S. Z., Bolong, J. & Ghazali, A. H. A. 2017. Analisis Keselamatan Siber Dari Perspektifpersekitaran Sosial : Kajian Terhadap Pengguna Internet Di Lembah Klang. Journal of Social Sciences and Humanities 12(2): 16–29. doi:ISSN: 1823-884x.
Rosenblum, D. (2007). What anyone can know: The privacy risks of social networking sites. IEEE Security and Privacy, 5(3), 40-49. http://dx.doi.org/10.1109/MSP.2007.75.
Shohrowardhy, H.S., Hassan, H.M.K. (2014). Students' perception of social networking for academic purposes in Bangladesh. Management & Marketing. Challenges for the Knowledge Society, Vol. 9, No. 4, pp. 459‐470.
Y. Zheng, L. Li, and F. Zeng,(2010). Social media support for knowledge management in International Conference on Management and Service Science (MASS), Wuhan, 2010.
Published
2021-03-01
How to Cite
ABDUL RAZAK, Nurshuhaida et al. A Comprehensive Study of Privacy and Security Risk Awareness Among Mobile Internet Users for Social Networks Sites in Malaysia. International Journal of Business and Technology Management, [S.l.], v. 3, n. 1, p. 1-20, mar. 2021. ISSN 2682-7646. Available at: <https://myjms.mohe.gov.my/index.php/ijbtm/article/view/12433>. Date accessed: 10 nov. 2024.
Section
Articles