International Journal of Academic Research in Business and Social Sciences

search-icon

Developing A Model for The Security of Malaysian Youth Privacy Data: MyPROTECT

Open access
The personal data safety of cyber users is a threat in today's digital world. The public knows that the Covid-19 pandemic has become a catalyst for the digital technology transformation in the history of human civilization. This article aspires to test a model created to examine the factors protecting the safety of Malaysian youth's data. The questionnaire is circulated online among young people aged 19 years to 30 years using multistage random sampling. A total of 535 respondents were selected from Putrajaya and Cyberjaya as a free trial spot area provided by the government. The instruments are developed based on 11 constructs attitude, subjective norms, behavioral control, intention, environment support, usefulness, ease of use, trust, treatment assessment, coping skills, and self-efficacy. The model was analyzed using Structural Equation Modeling with IBM-SPSS AMOS 27.0 software. This approach is employed to test the developed model yielded from several established theories such as the Theory of Planned Behavior (TPB), Decomposed Theory of Planned Behavior (DTPB), Protection Motivation Theory (PMT), and Social Cognitive Theory (SCT). The results of this study show that all constructs referred to as MyPROTECT achieved the goodness fit model for this study.
Afthanorhan, A., Awang, Z., Rashid, N., Foziah, H., and Ghazali, P. L. (2019). Assessing the effects of service quality on customer satisfaction. Management Science Letters, 9(1), 13-24.
Afthanorhan, A., Awang, Z., & Aimran, N. (2020). An extensive comparison of cb-sem and pls-sem for reliability and validity. International Journal of Data and Network Science, 4(4), 357-364. https://doi.org/10.5267/j.ijdns.2020.9.003.
Afthanorhan, A., Ghazali, P. L., & Rashid, N. (2021). Discriminant validity: A comparison of CBSEM and consistent PLS using Fornell & Larcker and HTMT approaches. Paper presented at the Journal of Physics: Conference Series, 1874(1). https://doi.org10.1088/1742-6596/1874/1/012085
Afthanorhan, W. (2014) Hierarchical Component Using Reflective-Formative Measurement Model in Partial Least Square Structural Equation Modeling (Pls-Sem). International Journal of Mathematics, 2, 33-49.
Agarwal & Bansal. (2016). Application of Decomposed Theory of Planned Behavior for M-commerce Adoption in India. Proceedings of the 18th International Conference on Enterprise Information Systems (ICEIS 2016), (2), 357-367.
Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50(2), 179–211.
Alice, E., and Shelly, C. (1993). The psychology of attitudes. Harcourt Brace. Fort Worth, TX.
Arifain, S. M. K., Yusof, F., Aziz, S., Suhaini, N., Suhaini, N. (2021). The Influence of Social Support on Marriage Satisfaction among Working Women in Selangor, Negeri Sembilan and Melaka. International Journal of Academic Research in Business and Social Science, 11(2), 587–595. Doi.10.6007/IJARBSS/v11-i2/8874.
Awang, Z., Hui, L. S., & Syahira, N. F. (2018). Pendekatan mudah SEM: Structural Equation Model. MPSW Rich Resources Sdn. Bhd. Bandar Baru Bangi. 978-967-0942-58-2.
Bandura, A. (1991). Social cognitive theory of self-regulation. Organizational behavior and human decision processes, 50(2), 248-287.
Bentler, P. M. and Bonnet, D. C. (1980). Significance Tests and Goodness of Fit in the Analysis of Covariance Structures. Psychological Bulletin, 88(3), 588-606.
Bencheikh, I., Azoulay, K., Mabrouki, J., Hajjaji, S. E., Moufti, Labjar, N. (2021). The use and the performance of chemically treated artichoke leaves for textile industrial effluents treatment. Chemical Data Collections, 31(2021), 100597. doi.org/10.1016/j.cdc.2020.100597.
Blog Data Privacy Manager. (2021). How to Protect Your Privacy on Social Media? https://dataprivacymanager.net/how-to-protect-your-privacy-on-social-media.
Browne, M. W., & Cudeck, R. (1993). Alternative ways of assessing model fit. In K. A. Bollen and J. S. Long (Eds.), Testing structural equation models (pp. 136-162). Newbury Park, CA: Sage.
Byrne, B. M. (2010). Structural equation modelling with AMOS: Basic concept, application and programming (2nd. ed). Routledge/Taylor & Francis Group.
Chewae, M., Hayikader, S., Hasan, M. H. & Ibrahim, J. (2015). How much privacy do we still have on social network? International Journal of science and research publication, 5 (1).
Consumerinfo.my. (2020). How to protect your online privacy and privacy data. Digital World. https://consumerinfo.my/lindungi-data-peribadi-privasi-dalam- talian/?lang=ms
Copriadya, J., Zulnaidi, H., Alimin, M., Albeta, S. W. (2021). In-service training and teaching resource proficiency amongst Chemistry teachers: the mediating role of teacher collaboration. Heliyon 7. Doi.10.1016/j.heliyon.2021.e06995
European Union Agency for Network and Information Security. (2017). Handbook on Security of Personal Data Processing. Doi.10.2824/569768
Fornell & Larcker. (1981). Evaluating Structural Equation Models with Unobservable Variables and Measurement Error Author(s). Journal of Marketing Research, 18(1), 39- 50.
Gastelú, C. A. T., Zanabria, L. F. M., and Armenta, J. A. (2020). The attitude of Latin American Youth towards Online Security and Privacy. International conference on virtual campus (JIVC). 1-5. Doi: 10.1109/JICV51605.2020.9375820.
Global Digital Report 2018. (2018). Digital in 2018: World's internet users pass the 4 Billion Mark. https://wearesocial.com.
Global Cybersecurity Index 2018. (2019). International Telecommunication Union. Available at https://www.itu.int.
Global Cybersecurity Index. (2020). 4. https://www.itu.int/epublications/publication/D-STR-GCI.01-2021-HTM-E
Hair, J. F., Black, W. C., Babin, B. J., & Anderson, R. E. (2010). Multivariate Data Analysis. 7th ed. New Jersey, USA: Pearson Education, Inc, Prentice Hall.
Hammouchi, H., Cherqia, O., Mezzoura, G., Ghoghoa, M., Koutb, M. E. (2019). Digging Deeper into Data Breaches: An Exploratory Data Analysis of Hacking Breaches Over Time. Procedia Computer Science. 151, 1004-1009.
Institute for Youth Research Malaysia. (2020). Facts and figures Malaysian Youth Index 2020.
Ministry of Youth and Sports Malaysia. Putrajaya. Malaysia.
Institute for Youth Research Malaysia. (2017). Facts and figures Malaysian Youth Index 2017.
Ministry of Youth and Sports Malaysia. Putrajaya. Malaysia.
Joreskog, K., & Sorbon, D. (1999). Interactive LISREL. User’s Guide, Scientific Software
Internatiol. (1998). Prelis: A Program for Multivariate Data Screening and Data Summarization, Second edition, Scientific Software International, Inc., Mooresville.
Kumar, A., Gupta, S. K., Rai, A. K., Sinha, S. (2013). Social networking sites and their security issues. International Journal of Scientific and Research Publications, 3(4), 1-5.
Nunnally, J. C. (1978). Psychometric theory (2nd ed.). New York: McGraw-Hill.
Pallant, J. (2011). SPSS Survival Manual: A step by step guide to data analysis using SPSS 4ed. Allen & Unwin. Australia.
Safa, N. S., Sookhak, M., Solms, R. V., Furnell, S., Ghani, N. A. & Herawan. T. (2015). Information security conscious care behaviour formation in organizations. Computer and security journal, (53). 65-78.
Shih, Y. Y., & Kwoting, F. (2004). The use of a decomposed theory of planned behavior to study Internet banking in Taiwan. Internet Research, 14(3), 213-223.
Suki, N. M., & Ramayah, T. (2010). User Acceptance of the E-Government Services in Malaysia: Structural Equation Modelling Approach. Interdisciplinary Journal of Information, Knowledge, and Management, 5, 395-423.
Taylor & Todd. (1995). Understanding information technology usage: A test of competing models. Information system research, 6(2), 144-176.
The Crowdstrike. (2022). Global Treat Report 2022. https://go.crowdstrike.com/global-threat-report-2022-thank-you.html
Tsai, M. J., Alhabash S., LaRose R., Rifon N. J., and Cotton S. R. (2016). Understanding online safety behaviors: A protection motivation theory perspective. Computers and Security, 59, 138-150.
Tsang, M. M., Ho, S. H., and Liang, T. P. (2004). Consumer Attitudes Toward Mobile Advertising. International Journal of Electronic Commerce, 83(3), 65-78.
Ramayah, T., Aafaqi, B., & Jantan, M. (2003). Internet usage among students of an institution of higher learning: The role of motivational variables. The Proceedings of the 1st International Conference on Asian Academy of Applied Business Conference, Sabah, Malaysia 10-12 July, 2003.
Sadasivuni, K. K., Panchal, H., Awasthi, A., Israr, M., Essa, F. A., Shanmugan, S., and Khechekhouche, A. (2020). Groundwater treatment using solar radiation-vaporization and condensation techniques by solar desalination system. International Journal of Ambient Energy, 1-7
Stewart, E. J. (2012). Growing unculturable bacteria. Journal of Bacteriology, 194(16), 4151- 4160.
Wagen & Pieters. (2020). The hybrid victim: Reconceptualizing high-tech cyber victimization through actor-network theory. European Journal of Criminology, 17(4), 480-497.
Xue, B., Warkentin, M., Mutchler, L. A., & Balozian, P. (2021). Self-efficacy in Information Security: A Replication Study. Journal of Computer Information Systems. DOI: 10.1080/08874417.2021.2015725.