Personal Data Protection Awareness through the Use of YouTube among the Youths in UUM
This paper is to discuss the awareness among the youth in UUM related to personal data protection. The cases of personal data protection increased day by day among the youths. Several awareness programs were done. The purpose of this study was to raise awareness of the importance of protecting personal data among the youth in Universiti Utara Malaysia. The method used to do awareness programs by using YouTube and online surveys. Awareness program using YouTube is highly recommended. The finding reveals that it can use this type of media to conduct awareness programs.
Alharbi, F. S. (2020). Dealing with data breaches amidst changes in technology. International Journal of Computer Science and Security, 14(3), 108-114.
Ball, A. L., Ramim, M. M., & Levy, Y. (2015). Examining users’ personal information sharing awareness, habits, and practices in social networking sites and e-learning systems. Online Journal of Applied Knowledge Management, 3(1), 180-207.
Baskaran, H., Yussof, S., Rahim, F. A., & Bakar, A. A. (2020). Blockchain and the Personal Data Protection Act 2010 (PDPA) in Malaysia. In 2020 8th International Conference on Information Technology and Multimedia (ICIMU) (pp. 189-193). IEEE. https://doi.org/10.1109/ICIMU49871.2020.9243493
Çelik, M., Alkan, M., & Alkan, A. O. (2020). Protection of Personal Data Transmitted via Web Service Against Software Developers. In 2020 International Conference on Information Security and Cryptology (ISCTURKEY) (pp. 88-92). IEEE. https://doi.org/10.1109/ISCTURKEY51113.2020.9308009
Cristea, L. M. (2020). Current security threats in the national and international context. Journal of Accounting and Management Information Systems, 19(2), 351-378.
Gandhi, A., Sucahyo, Y. G., & Ruldeviyani, Y. (2018). Investigating the protection of customers’ personal data in the ridesharing applications: A desk research in indonesia. In 2018 15th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON) (pp. 118-121). IEEE. https://doi.org/10.1109/ECTICon.2018.8619912
Gupta, B. B., Tewari, A., Jain, A. K., & Agrawal, D. P. (2017). Fighting against phishing attacks: state of the art and future challenges. Neural Computing and Applications, 28(12), 3629-3654. https://doi.org/10.1007/s00521-016-2275-y
Jang-Jaccard, J., & Nepal, S. (2014). A survey of emerging threats in cybersecurity. Journal of Computer and System Sciences, 80(5), 973-993. https://doi.org/10.1016/j.jcss.2014.02.005
Rafique, G. M. (2017). Personal information sharing behavior of university students via online social networks. Library Philosophy and Practice (e-journal).
Richardson, R., & North, M. M. (2017). Ransomware: Evolution, mitigation and prevention. International Management Review, 13(1), 10-21.
Romansky, R., & Noninska, I. (2019). Cyber Space Features–Security and Data Protection Requirements. In 2019 International Conference on Information Technologies (InfoTech) (pp. 1-4). IEEE. https://doi.org/10.1109/InfoTech.2019.8860880
Saatci, C., & Gunal, E. S. (2019). Preserving privacy in personal data processing. In 2019 1st International Informatics and Software Engineering Conference (UBMYK) (pp. 1-4). IEEE. https://doi.org/10.1109/UBMYK48245.2019.8965432
Sim, W. L., Chua, H. N., & Tahir, M. (2019). Blockchain for identity management: The implications to personal data protection. In 2019 IEEE Conference on Application, Information and Network Security (AINS) (pp. 30-35). IEEE. https://doi.org/10.1109/AINS47559.2019.8968708
Tiganoaia, B., Cernian, A., & Niculescu, A. (2017). The use of social platforms and personal data protection—An exploratory study. In 2017 16th RoEduNet Conference: Networking in Education and Research (RoEduNet) (pp. 1-5). IEEE. https://doi.org/10.1109/ROEDUNET.2017.8123754
Copyright (c) 2021 UPSI Press
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.