The relationship of personal data protection towards internet addiction: Cyber crimes, pornography and reduced physical activity
Internet as a platform has provided negative implications in the form of addiction, where certain users can present harm and damage to the other individual or community due to its availability and accessibility of personal data. Consequently, cybercrime, to the other individual or community due to...
Saved in:
Main Authors: | , |
---|---|
Format: | Conference or Workshop Item |
Language: | English English |
Published: |
Elsevier Ltd
2022
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/96935/1/1-s2.0-S187705092102353X-main.pdf http://irep.iium.edu.my/96935/7/96935_The%20relationship%20of%20personal%20data%20protection%20towards%20internet%20addiction.pdf http://irep.iium.edu.my/96935/ http://www.sciencedirect.com/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Internet as a platform has provided negative implications in the form of addiction, where certain users can present harm and damage
to the other individual or community due to its availability and accessibility of personal data. Consequently, cybercrime,
to the other individual or community due to its availability and accessibility of personal data. Consequently, cybercrime,
pornography, and reduced physical activity are several examples of user misdirection to achieve objective based on their desire
pornography, and reduced physical activity are several examples of user misdirection to achieve objective based on their desire
toward prestige, curiosity, independence, pleasure, wealth, and so on, which drive user behavior in the process. Since the essence
toward prestige, curiosity, independence, pleasure, wealth, and so on, which drive user behavior in the process. Since the essence
of communication and interaction is to process different types of information about individuals in utilizing the service or product,
of communication and interaction is to process different types of information about individuals in utilizing the service or product,
it is important to be clear about how this data is processed and protected. This study explores the proper framework based on
it is important to be clear about how this data is processed and protected. This study explores the proper framework based on
previous research in certain fields by aligning the expectancy and satisfaction to meet the requirement in applying the technology
previous research in certain fields by aligning the expectancy and satisfaction to meet the requirement in applying the technology
devices. It will define four layers of protection in channels, factors, measures, and outcomes by understanding the variance and the
devices. It will define four layers of protection in channels, fac2tors, measures, and outcomes by understanding the variance and the relationship strength to predict the utilization. It showed that Q of respective variables are greater than zero while privacy concerns
relationship strength to predict the utilization. It showed that Q2 of respective variables are greater than zero while privacy concerns
have the largest T-statistics of 10.003 compared to the others. |
---|