We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Privacy Concern of Personal Information in the ICT usage, Internet and Social Media Perspective

Published on August 2019 by Jashira Jamin, Noor Arina Md Arifin, Siti Aishah Mokhtar, Nik Nur Izzati Nik Rosli, Amira Idayu Mohd Shukry
International Conference on Recent Trends in Science, Technology, Management and Social Development
Foundation of Computer Science USA
ICRTSTMSD2018 - Number 1
August 2019
Authors: Jashira Jamin, Noor Arina Md Arifin, Siti Aishah Mokhtar, Nik Nur Izzati Nik Rosli, Amira Idayu Mohd Shukry
fc90c4b4-eecd-4e19-8312-bccffc6963a8

Jashira Jamin, Noor Arina Md Arifin, Siti Aishah Mokhtar, Nik Nur Izzati Nik Rosli, Amira Idayu Mohd Shukry . Privacy Concern of Personal Information in the ICT usage, Internet and Social Media Perspective. International Conference on Recent Trends in Science, Technology, Management and Social Development. ICRTSTMSD2018, 1 (August 2019), 34-36.

@article{
author = { Jashira Jamin, Noor Arina Md Arifin, Siti Aishah Mokhtar, Nik Nur Izzati Nik Rosli, Amira Idayu Mohd Shukry },
title = { Privacy Concern of Personal Information in the ICT usage, Internet and Social Media Perspective },
journal = { International Conference on Recent Trends in Science, Technology, Management and Social Development },
issue_date = { August 2019 },
volume = { ICRTSTMSD2018 },
number = { 1 },
month = { August },
year = { 2019 },
issn = 0975-8887,
pages = { 34-36 },
numpages = 3,
url = { /proceedings/icrtstmsd2018/number1/30847-1807/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Recent Trends in Science, Technology, Management and Social Development
%A Jashira Jamin
%A Noor Arina Md Arifin
%A Siti Aishah Mokhtar
%A Nik Nur Izzati Nik Rosli
%A Amira Idayu Mohd Shukry
%T Privacy Concern of Personal Information in the ICT usage, Internet and Social Media Perspective
%J International Conference on Recent Trends in Science, Technology, Management and Social Development
%@ 0975-8887
%V ICRTSTMSD2018
%N 1
%P 34-36
%D 2019
%I International Journal of Computer Applications
Abstract

The evolution of information technology have rapidly increase the sophisticated online application where accommodates most activities of users. Information and communication technology nowadays has become the importance part of our life. Majority of us are depending on the technology. Agreed or not, we cannot denied that technology helps us a lots in our daily activities. Besides the usage of Information and Communication Technology (ICT), another thing that we need to know is about the privacy concern especially when it comes to the personal information. Nowadays, we used an online transaction for the daily life operation. Online banking, online games, social media networking such as facebook, instagram, twitter and so on are an example of social networking that we used in our daily life with the help of ICT. In fact, we actually expose our personal data by our own without prejudice. This article will identify the use of ICT, internet and social networking that affect the privacy concern of personal information.

References
  1. Baek, Y. M. , & et. al. , (2014). Changing the default setting for information privacy protection: What and whose personal information can be better protected? The Social Science Journal, 51, 523–533. http://dx. doi. org/10. 1016/j. soscij. 2014. 07. 002
  2. Bharadwaj, S. S. , & Lal, P. (2012). Exploring the impact of cloud computing adoption on organizational flexibility: A client perspective. In Proceedings of international of cloud computing, technologies, applications & management
  3. Castaneda, J. A. , Montoso, F. J. , & Luque, T. (2007). The dimensionality of customer privacy concern on the internet. Online Information Review, 31(4), 420 - 439. http://dx. doi. org/10. 1108/14684520710780395
  4. Cenka, B. A. N. , & Hasibuan, Z. A. (2013). Enhancing educational services using cloud technology. In International conference of information and communication technology, March 20–22 (pp. 155–160). Bandung, Indonesia.
  5. Choi, S. S. , & Choi, M. K. (2007). Consumer's Privacy Concerns and Willingness to Provide Personal Information in Location-Based Services. ICACT, 2196-2199. doi:10. 1109/ICACT. 2007. 358809
  6. Chung, W. , & Paynter, J. (2002). Privacy Issues on the Internet. Hawaii International Conference on System Sciences. http://www. computer. org/csdl/proceedings/hicss/2002/1435/07/14350193b. pdf
  7. Collis, J. , & Hussey, R. (2009). Business Research: A practical guide for undergraduate and postgraduate student (3rd ed. ).
  8. Drevin, L. , Kruger, H. A. , & Steyn, T. (2007). Value-focused assessment of ICT security awareness in an academic environment. computers & security, 26, 36–43. doi:10. 1016/j. cose. 2006. 10. 006
  9. Englehardt, S. , Acar, G. & Narayanan, A. (2018). No boundaries for Facebook data: third-party trackers abuse Facebook Login. Retrieved April 24, 2018 from https://freedom-to-tinker. com/2018/04/18/no-boundaries-for-facebook-data-third-party-trackers-abuse-facebook-login/
  10. Hsu, C. W. (2006). Privacy concerns, privacy practices and web site categories: Toward a situational paradigm. Online Information Review, 30(5), 569 - 586. Retrieved from http://dx. doi. org/10. 1108/14684520610706433
  11. Ibrahim Arpaci, Kerem Kilicer, & Salih Bardakci. (2015). Effects of security and privacy concerns on educational use of cloud services. Computers in Human Behavior,45, 93–98. http://dx. doi. org/10. 1016/j. chb. 2014. 11. 075
  12. Lee, H. S. (2008). Selected Antecedents of Customer Loyalty within A Restaurant Loyalty Program: Perceived Control, Privacy Concern, Perceived Value of A Loyalty Program, And Willingness to Disclose Information (3441060) (Doctoral dissertation). Retrieved from ProQuest Dissertations and Theses database. (3441060)
  13. Lukka, K. (2010). The roles and effects of paradigms in accounting research. Management Accounting Research, 21, 110–115. doi:10. 1016/j. mar. 2010. 02. 002
  14. Nam, C. , Song, C. , Lee, E. , & Park, C. I. (2006). Consumers' Privacy Concerns and Willingness to Provide Marketing-Related Personal Information Online. Advances in Consumer Research, 33, 212-218. http://www. acrwebsite. org/volumes/v33/v33_10084. pdf
  15. Norshidah Mohamed, & Ili Hawa Ahmad. (2012). Information privacy concerns, antecedents and privacy measure use in social networking sites: Evidence from Malaysia. Computers in Human Behavior, 28, 2366–2375.
  16. Olivero, N. , & Lunt, P. (2004). Privacy versus willingness to disclose in e-commerce exchanges: The effect of risk awareness on the relative role of trust and control. Journal of Economic Psychology, 25, 243–262. doi:10. 1016/S0167-4870(02)00172-1
  17. Online Dictionary of Techopedia. (2018). Internet: What does internet mean? https://www. techopedia. com/definition/2419/internet
  18. Otopah, F. O. , & Dadzie, P. (2013). Personal information management practices of students and its implications for library services. Aslib Proceedings, 65(2), 143 - 160. Retrieved from http://dx. doi. org/10. 1108/00012531311313970
  19. Saunders, M. , & Tosey, P. (2013). Te Layers of Research Design. Research, 58-59. http://www. academia. edu/4107831/The_Layers_of_Research_Design
  20. Syed H. Akhter. (2014). Privacy concern and online transactions: the impact of internet self-efficacy and internet involvement. Journal of Consumer Marketing, 31(2), 118 - 125. http://dx. doi. org/10. 1108/JCM-06-2013-0606
  21. Taylor, J. F. , Ferguson, J. , & Ellen, P. S. (2015). From trait to state: understanding privacy concerns. Journal of Consumer Marketing, 32(2), 99 - 112. Retrieved from http://dx. doi. org/10. 1108/JCM-07-2014-107
  22. Wang, Z. , & Wang, P. (2015). A double-loop adaptive sampling approach for sensitivity-free dynamic reliability analysis. Reliability Engineering and System Safety, 142, 346–356. http://dx. doi. org/10. 1016/j. ress. 2015. 05. 007
  23. Wu, Y. A. , & et. al. , (2012). A nomological model of RFID privacy concern. Business Process Management Journal, 18(3), 420 - 444. http://dx. doi. org/10. 1108/14637151211232623
  24. Wu, K. W. , Huang, S. Y. , Yen, D. C. , & Popova, I. (2012). The effect of online privacy policy on consumer privacy concern and trust. Computers in Human Behavior, 28, 889–897. doi:10. 1016/j. chb. 2011. 12. 008
  25. Xu, H. (2007). Consumer responses to the introduction of Privacy Protection Measures: an exploratory research framework. International Journal of E-Business Research, 5(2), 21-47. Retrieved from http://www. irma-international. org/viewtitle/3923/
Index Terms

Computer Science
Information Sciences

Keywords

Personal Information Privacy Concern Internet Information And Communication Technology (ict) Social Media Information Management