Call for Paper - March 2023 Edition
IJCA solicits original research papers for the March 2023 Edition. Last date of manuscript submission is February 20, 2023. Read More

Privacy Concern of Personal Information in the ICT usage, Internet and Social Media Perspective

Print
PDF
IJCA Proceedings on International Conference on Recent Trends in Science, Technology, Management and Social Development
© 2019 by IJCA Journal
ICRTSTMSD 2018 - Number 1
Year of Publication: 2019
Authors:
Jashira Jamin
Noor Arina Md Arifin
Siti Aishah Mokhtar
Nik Nur Izzati Nik Rosli
Amira Idayu Mohd Shukry

Jashira Jamin, Noor Arina Md Arifin, Siti Aishah Mokhtar, Nik Nur Izzati Nik Rosli and Amira Idayu Mohd Shukry. Article: Privacy Concern of Personal Information in the ICT usage, Internet and Social Media Perspective. IJCA Proceedings on International Conference on Recent Trends in Science, Technology, Management and Social Development ICRTSTMSD 2018(1):34-36, August 2019. Full text available. BibTeX

@article{key:article,
	author = {Jashira Jamin and Noor Arina Md Arifin and Siti Aishah Mokhtar and Nik Nur Izzati Nik Rosli and Amira Idayu Mohd Shukry},
	title = {Article: Privacy Concern of Personal Information in the ICT usage, Internet and Social Media Perspective},
	journal = {IJCA Proceedings on International Conference on Recent Trends in Science, Technology, Management and Social Development},
	year = {2019},
	volume = {ICRTSTMSD 2018},
	number = {1},
	pages = {34-36},
	month = {August},
	note = {Full text available}
}

Abstract

The evolution of information technology have rapidly increase the sophisticated online application where accommodates most activities of users. Information and communication technology nowadays has become the importance part of our life. Majority of us are depending on the technology. Agreed or not, we cannot denied that technology helps us a lots in our daily activities. Besides the usage of Information and Communication Technology (ICT), another thing that we need to know is about the privacy concern especially when it comes to the personal information. Nowadays, we used an online transaction for the daily life operation. Online banking, online games, social media networking such as facebook, instagram, twitter and so on are an example of social networking that we used in our daily life with the help of ICT. In fact, we actually expose our personal data by our own without prejudice. This article will identify the use of ICT, internet and social networking that affect the privacy concern of personal information.

References

  • Baek, Y. M. , & et. al. , (2014). Changing the default setting for information privacy protection: What and whose personal information can be better protected? The Social Science Journal, 51, 523–533. http://dx. doi. org/10. 1016/j. soscij. 2014. 07. 002
  • Bharadwaj, S. S. , & Lal, P. (2012). Exploring the impact of cloud computing adoption on organizational flexibility: A client perspective. In Proceedings of international of cloud computing, technologies, applications & management
  • Castaneda, J. A. , Montoso, F. J. , & Luque, T. (2007). The dimensionality of customer privacy concern on the internet. Online Information Review, 31(4), 420 - 439. http://dx. doi. org/10. 1108/14684520710780395
  • Cenka, B. A. N. , & Hasibuan, Z. A. (2013). Enhancing educational services using cloud technology. In International conference of information and communication technology, March 20–22 (pp. 155–160). Bandung, Indonesia.
  • Choi, S. S. , & Choi, M. K. (2007). Consumer's Privacy Concerns and Willingness to Provide Personal Information in Location-Based Services. ICACT, 2196-2199. doi:10. 1109/ICACT. 2007. 358809
  • Chung, W. , & Paynter, J. (2002). Privacy Issues on the Internet. Hawaii International Conference on System Sciences. http://www. computer. org/csdl/proceedings/hicss/2002/1435/07/14350193b. pdf
  • Collis, J. , & Hussey, R. (2009). Business Research: A practical guide for undergraduate and postgraduate student (3rd ed. ).
  • Drevin, L. , Kruger, H. A. , & Steyn, T. (2007). Value-focused assessment of ICT security awareness in an academic environment. computers & security, 26, 36–43. doi:10. 1016/j. cose. 2006. 10. 006
  • Englehardt, S. , Acar, G. & Narayanan, A. (2018). No boundaries for Facebook data: third-party trackers abuse Facebook Login. Retrieved April 24, 2018 from https://freedom-to-tinker. com/2018/04/18/no-boundaries-for-facebook-data-third-party-trackers-abuse-facebook-login/
  • Hsu, C. W. (2006). Privacy concerns, privacy practices and web site categories: Toward a situational paradigm. Online Information Review, 30(5), 569 - 586. Retrieved from http://dx. doi. org/10. 1108/14684520610706433
  • Ibrahim Arpaci, Kerem Kilicer, & Salih Bardakci. (2015). Effects of security and privacy concerns on educational use of cloud services. Computers in Human Behavior,45, 93–98. http://dx. doi. org/10. 1016/j. chb. 2014. 11. 075
  • Lee, H. S. (2008). Selected Antecedents of Customer Loyalty within A Restaurant Loyalty Program: Perceived Control, Privacy Concern, Perceived Value of A Loyalty Program, And Willingness to Disclose Information (3441060) (Doctoral dissertation). Retrieved from ProQuest Dissertations and Theses database. (3441060)
  • Lukka, K. (2010). The roles and effects of paradigms in accounting research. Management Accounting Research, 21, 110–115. doi:10. 1016/j. mar. 2010. 02. 002
  • Nam, C. , Song, C. , Lee, E. , & Park, C. I. (2006). Consumers' Privacy Concerns and Willingness to Provide Marketing-Related Personal Information Online. Advances in Consumer Research, 33, 212-218. http://www. acrwebsite. org/volumes/v33/v33_10084. pdf
  • Norshidah Mohamed, & Ili Hawa Ahmad. (2012). Information privacy concerns, antecedents and privacy measure use in social networking sites: Evidence from Malaysia. Computers in Human Behavior, 28, 2366–2375.
  • Olivero, N. , & Lunt, P. (2004). Privacy versus willingness to disclose in e-commerce exchanges: The effect of risk awareness on the relative role of trust and control. Journal of Economic Psychology, 25, 243–262. doi:10. 1016/S0167-4870(02)00172-1
  • Online Dictionary of Techopedia. (2018). Internet: What does internet mean? https://www. techopedia. com/definition/2419/internet
  • Otopah, F. O. , & Dadzie, P. (2013). Personal information management practices of students and its implications for library services. Aslib Proceedings, 65(2), 143 - 160. Retrieved from http://dx. doi. org/10. 1108/00012531311313970
  • Saunders, M. , & Tosey, P. (2013). Te Layers of Research Design. Research, 58-59. http://www. academia. edu/4107831/The_Layers_of_Research_Design
  • Syed H. Akhter. (2014). Privacy concern and online transactions: the impact of internet self-efficacy and internet involvement. Journal of Consumer Marketing, 31(2), 118 - 125. http://dx. doi. org/10. 1108/JCM-06-2013-0606
  • Taylor, J. F. , Ferguson, J. , & Ellen, P. S. (2015). From trait to state: understanding privacy concerns. Journal of Consumer Marketing, 32(2), 99 - 112. Retrieved from http://dx. doi. org/10. 1108/JCM-07-2014-107
  • Wang, Z. , & Wang, P. (2015). A double-loop adaptive sampling approach for sensitivity-free dynamic reliability analysis. Reliability Engineering and System Safety, 142, 346–356. http://dx. doi. org/10. 1016/j. ress. 2015. 05. 007
  • Wu, Y. A. , & et. al. , (2012). A nomological model of RFID privacy concern. Business Process Management Journal, 18(3), 420 - 444. http://dx. doi. org/10. 1108/14637151211232623
  • Wu, K. W. , Huang, S. Y. , Yen, D. C. , & Popova, I. (2012). The effect of online privacy policy on consumer privacy concern and trust. Computers in Human Behavior, 28, 889–897. doi:10. 1016/j. chb. 2011. 12. 008
  • Xu, H. (2007). Consumer responses to the introduction of Privacy Protection Measures: an exploratory research framework. International Journal of E-Business Research, 5(2), 21-47. Retrieved from http://www. irma-international. org/viewtitle/3923/