International Journal of Academic Research in Business and Social Sciences

search-icon

Personal Data Privacy Protection: A Review on Malaysia’s Cyber Security Policies

Open access
Personal data privacy is a crucial aspect of information management. Strategic information management must consider the data security and must take all the necessary practices to ensure personal data protected in a closed or open network environment. Data privacy legislation has been formulated by the government to ensure the ethics of handling sensitive information such as personal, banking and another aspect of information like health and medical information must be according to law stipulated by the acts. Malaysia as a growing electronic government provider in the region has adopted several legislation to ensure the enforcement of the data protection achieved the international standard to ensure global recognition especially by international business in enhancing foreign direct investment (FDI) and to protect local enterprises.
Bygrave, L.A (2010), ‘Privacy and Data Protection in an International Perspective’, Scandinavian Studies in Law, Vol. 56, pp. 165-200.

Gutwirth, S, (2002) Privacy and the Information Age, Lanham/Boulder/NewYork/Oxford/Rowman & Littlefield Publ.

Miltgen, H.C.L. & Smith. J. (2015), Exploring information privacy regulation, risks, trust, and behavior, Information & Management, (52)6, 741-759

Judith, D.C (2018), "Privacy", The Stanford Encyclopedia of Philosophy (Spring 2018 Edition), Edward N. Zalta (ed.), retrienved from https://plato.stanford.edu/archives/spr2018/entries/privacy/ on 11thNovember 2018

Dhillon, G., Oliveira, T., & Syed, R. (2018), Value-based information privacy objectives for Internet Commerce, Computers in Human Behavior, (87),292-307, https://doi.org/10.1016/j.chb.2018.05.043.

Herring, J. (2016), Medical Law and Ethics, London, Oxford University Press

Fletcher, K. (2001), Privacy: The Achilles' heel of the new marketing;. Interactive Marketing. (3)2 . 141-153 retrieved online at https://link.springer.com/content/pdf/10.1057/palgrave.im.4340123.pdf on 11 November 2018.

Alshehri, M. & Drew. S (2010), Implementation of e-Government: Advantages
and Challenges IASK E- ALT2010 CONFERENCE PROCEEDINGS. Retrieved at https://core.ac.uk/download/pdf/143886366.pdf on 11 September 2018

Mason, R. O. (1986). Four Ethical Issues of the Information Age.
MIS Quarterly, 10, 5-12. http://dx.doi.org/10.2307/248873

Mittal, Prashant (2009) Programme Management Managing Multiple Projects Successfully, India: GlobalIndia Pubns.

Ahmad, M. & Othman, R. (2006) Implementation of Electronic Government In Malaysia: The Status And Potential For Bettewr Service To The Public In Public Sector ICT Management Review, Oct 2006- Mar 2007 (1) 1, 2-9




Daniel, J.S. (2008). Understanding Privacy. Cambridge, Massachusetts: Harvard University Press. Warren and Brandeis (1890) “The Right to Privacy”, Harvard Law Review Vol. IV, December 15, 1890 No. 5, retrievehttp://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Privacy_brand_warr2.html on11 November 2018.

MCMC, Our Responsibility. Retrieved online https://www.mcmc.gov.my/about-us/our-responsibility on 11 November 2018
In-Text Citation: (Hamzah, Ahmad, Hussin, & Ibrahim, 2018)
To Cite this Article: Hamzah, M. A., Ahmad, A. R., Hussin, N., & Ibrahim, Z. (2018). Personal Data Privacy Protection: A Review on Malaysia’s Cyber Security Policies. International Journal of Academic Research in Business and Social Sciences, 8(12), 1475–1483.