Preliminary Literature Review on Data Breach
In Malaysia, the digital economic revolution is seen as significant especially when the country is hit by the Covid-19 disaster. Various products, especially food, are ordered through digital systems. This is due to the movement control order (MCO) imposed by the government which limits the travel of the people. Indirectly, this also causes an increase in data in the virtual world as a result of ordering goods earlier. What is worrying is that this scenario could attract data rogue or cybercrime, especially data breaches. Worried about being too passionate about filling out personal data on a website, not realizing that it is a fake website. Thus, the users or customers were exposed to his or her data to an authorized party. This certainly threatens consumers when their personal information can be misused for personal or criminal purposes. Thus, this paper will discuss the importance of implication issues and challenges in the data breach.
Augustin, S. (2020). Malindo Air hauled to court over Data Breach. FMT News.https://www.freemalaysiatoday.com/category/nation/2020/02/20/malindo-air-hauled-tocourt-
Awani, A. (2019). KKMM masih tunggu laporan isu pencerobohan data penumpang. Astro Awani. http://www.astroawani.com/video-malaysia/kkmm-masih-tunggu-laporan-isupencerobohan-data-penumpang-1810075
Bernama. (2019). Kebocoran data pelanggan telah ditangani, kata Malindo Air. Astro Awani. http://www.astroawani.com/berita-malaysia/kebocoran-data-pelanggan-telahditangani-kata-malindo-air-218664
Cheng, L., Liu, F., & Yao, D. D. (2017). Enterprise Data Breach: Causes, Challenges, Prevention & Future Directions. Wiley Interdisciplinary Reviews: Data Mining and
Knowledge Discovery, 7(5), 1–14. https://doi.org/10.1002/widm.1211
Cisco. (2022). What Is Data Loss Prevention (DLP)? https://www.cisco.com/c/en/us/products/security/email-security-appliance/data-lossprevention-
Comparitech. (2021). 13 Best Data Loss Prevention Software Tools. Comparitech Limited. https://www.comparitech.com/data-recovery-software/data-loss-prevention-toolssoftware/
Hakim, A. (2020). Sensitive TLDM Documents Hacked & Leaked On Dark Web. New Strait Times. https://www.msn.com/en-my/news/national/sensitive-tldm-documents-hackedand-leaked-on-dark-web/ar-BB182UxE?li=BBr8Hnu&ocid=mailsignout
IBM. (2019). Cost of a Data Breach Report 2019. In IBM Security.
Imperva. (2021). Data Loss Prevention (DLP). Imperva Website. https://www.imperva.com/learn/data-security/data-loss-prevention-dlp/
Personal Data Protection Act 2010, 1 (2010).
Jabatan Perlindungan Data Peribadi Malaysia. (2018). Laporan Tahunan Jabatan
Perlindungan Data Peribadi Malaysia 2018.
JPDP. (2020a). Data Peribadi. JPDP. https://www.pdp.gov.my/jpdpv2/awam/data-peribadi/
JPDP. (2020b). Data Terbuka. JPDP. https://www.pdp.gov.my/jpdpv2/pusat-media/dataterbuka/
Khan, F., Kim, J. H., Moore, R., & Mathiassen, L. (2019). Data breach risks and resolutions: A literature synthesis. 25th Americas Conference on Information Systems, AMCIS 2019, 1–10.
Kude, T., Hoehle, H., & Sykes, T. A. (2017). Big Data Breaches & Customer Compensation Strategies: Personality traits and social influence as antecedents of Perceived
Compensation. International Journal of Operations and Production Management, 37(1), 1–20. https://doi.org/10.1108/IJOPM-03-2015-0156
Lab, M. S. (2020). Top 10 E-Commerce Site in Malaysia 2020. Marketing Signal Lab. https://marketingsignallab.com/top-ecommerce-sites-in-malaysia/
Malaysia, C. (2020). General Incident Statistics 2020 (p. 1). MyCert Malaysia.
Micro, T. (2020). Data Breach. Trend Micro. https://www.trendmicro.com/vinfo/us/security/definition/data-breach
Mutalib, Z. A. (2019). Kerajaan kaji perketat Akta Perlindungan Data Peribadi 2010. BH Online. https://www.bharian.com.my/berita/nasional/2019/11/628206/kerajaan-kajiperketat-akta-perlindungan-data-peribadi-2010
NCSC. (2022). Data Breaches: Guidance for individuals and families. How to protect yourself from the impact of data breaches. NCSC Website. ttps://www.ncsc.gov.uk/guidance/data-breaches#section_1
NICCS. (2017). Cybersecurity Glossary. NICCS. https://niccs.us-cert.gov/aboutniccs/cybersecurity-glossary#C
Norton. (2021). Data loss prevention: What is DLP + how does it work ? https://us.norton.com/internetsecurity-emerging-threats-data-loss-prevention.html
Tanriverdi, H., Nwankpa, J., & Hall, E. (2019). Structural Complexity & Data Breach Risk. Fortieth International Conference on Information Systems, Munich, 1–18.
All materials contained within this journal are protected by Intellectual Property Corporation of Malaysia, Copyright Act 1987 and may not be reproduced, distributed, transmitted, displayed, published, or
broadcast without the prior, express written permission of Centre for Graduate Studies, Universiti Selangor, Malaysia. You may not alter or remove any copyright or other notice from copies of this content.