Abstract
It is often that personal data were being misused by organizations for their own benefits. To tackle this issue, different countries had introduced and enforced personal data protection regulations. With the enforcement, organizations in the relevant countries need to comply with the law enforcement to protect personal data as their legal responsibility. Privacy Enhancing Technologies (PETs) act as a form of technology that protects individual privacy data in organizations. The purpose of this research is to discover the impact of personal data protection act enforcement with PETs adoption on organization employees’ working experience and performance through the study of their working process change. This research adopts a qualitative single case study on one of the telecommunication companies in Malaysia. The targeted participants are employees come from different work nature, i.e., use personal data, process personal data or setup system to protect personal data. The finding of this research will enable organizations to have better understanding in future PETs adoption and provide insights on the measures to be taken to comply with personal data protection. This paper presents our preliminary results based on semi-structured interviews with 8 participants from different groups of work nature.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Personal Data Protection Act 2010.: Malaysia Attorney General’s Chambers (2010)
Blarkom, G.W.V., Borking, J.J., Verhaar, P.: PET. Handbook of privacy and privacy-enhancing technologies. In: Blarkom, G.W.V., Borking, J.J., Olk, J.G.E. (eds.) Handbook of Privacy and Privacy-Enhancing Technologies: The case of Intelligent Software Agents, Cambridge (2003)
Chua, H.N., Wong, S.F., Chang, Y.H., Tan, C.M., Gan, M.F.: Personal data protection policy adoption: an exploratory study of Telco Industry’s Implementation. In: 21st Biennial Conference of the International Telecommunications Society, Taipei, 26–29 June 2016
Cao, Q., Jones, D.R., Sheng, H.: Contained nomadic information environments: technology, organization, and environment influences on adoption of hospital RFID patient tracking. Inf. Manage. 51(2), 225–239 (2014)
Taneva, S., Law, E., Higgins, J., Easty, A., Plattner, B.: Operating room coordination with the eWhiteboard: the fine line between successful and challenged technology adoption. Health Technol. 1(2–4), 81–92 (2011)
Aboelmaged, M.G.: Predicting e-readiness at firm-level: an analysis of technological, organizational and environmental (TOE) effects on e-maintenance readiness in manufacturing firms. Int. J. Inf. Manage. 34(5), 639–651 (2014)
Delaney, R., D’Agostino, R.: The Challenges of Integrating New Technology into an Organization. Mathematics and Computer Science Capstones, 25 (2015)
Zolkepli, F.: ‘Zeus’ Targets Mobile Phone User. The Star Online (2014). http://www.thestar.com.my/News/Nation/2014/09/25/Zeus-targets-mobile-phone-users-Scammers-rake-in-thousands-through-malware-virus
Bergström, A.: Online privacy concerns: a broad approach to understanding the concerns of different groups for different uses. Comput. Hum. Behav. 53, 419–426 (2015)
Gellman, R.: The digital person: technology and privacy in the information age. Gov. Inf. Q. 22(3), 530–532 (2005)
Seničar, V., Jerman-Blažič, B., Klobučar, T.: Privacy-enhancing technologies—approaches and development. Comput. Stand. Interfaces 25(2), 147–158 (2003)
London Economics.: Study on the Economic Benefits of Privacy-Enhancing Technologies (PETs) (2010). http://ec.europa.eu/justice/policies/privacy/docs/studies/final_report_pets_16_07_10_en.pdf
Kenny, S.: An Introduction to Privacy Enhancing Technologies (2008). https://iapp.org/news/a/2008-05-introduction-to-privacy-enhancing-technologies/
Chan, J.M.J., Chua, H.N., Lee, H.S., Iranmanesh, V.: Privacy and security: how to differentiate them using privacy-security tree (PST) classification. In: International Conference on Information Science and Security (2016)
Olivier, M.S.: A layered architecture for privacy-enhancing technologies. S. Afr. Comput. J. 31, 53–61 (2003)
Borking, J.J.: Why adopting privacy enhancing technologies (PETs) takes so much time. In: Gutwirth, S., Poullet, Y., De Hert, P., Leenes, R. (eds.) Computers, Privacy and Data Protection: An Element of Choice, pp. 309–341. Springer, Dordrecht (2011)
Goldberg, I.: Privacy Enhancing Technologies for the Internet III: Ten Years Later (2007). http://www.cypherpunks.ca/~iang/pubs/pet3.pdf
Wang, Y.-S., Li, H.-T., Li, C.-R., Zhang, D.-Z.: Factors affecting hotels’ adoption of mobile reservation systems: a technology-organization-environment framework. Tour. Manag. 53, 163–172 (2016)
MalaysianDigest: Cybersecurity Threats: The Risk is Real in Malaysia (2016). http://www.malaysiandigest.com/technology/605954-cybersecurity-threats-the-risk-is-real-in-malaysia.html
Weerd, I.V.D., Mangula, I.S., Brinkkemper, S.: Adoption of software as a service in Indonesia: examining the influence of organizational factors. Inf. Manag. 53(7), 915–928 (2016)
Yin, R.K.: Case Study Research: Design and Methods, 5th edn. SAGE Publications, Thousand Oaks (2009)
McGivern, Y.: The Practice of Market and Social Research: An Introduction. Pearson Education, Essex (2007)
Bloomberg, L.D., Volpe, M.: Completing Your Qualitative Dissertation. Sage Publications, Thousand Oaks (2012)
Creswell, J.W.: Research Design: Qualitative, Quantitative, and Mixed Methods Approaches. Sage Publications, Thousand Oaks (2013)
Proctor, E.K., Landsverk, J., Aarons, G., Chambers, D., Glisson, C., Mittman, B.: Implementation research in mental health services: an emerging science with conceptual, methodological, and training challenges. Adm. Policy Ment. Health Ment. Health Serv. Res. 36(1), 24–34 (2009)
Durlak, J.A., DuPre, E.P.: Implementation matters: a review of research on the influence of implementation on program outcomes and the factors affecting implementation. Am. J. Community Psychol. 41(3–4), 327 (2008)
Moulton, S., Sandfort, J.R.: The strategic action field framework for policy implementation research. Policy Stud. J. 45(1), 144–169 (2017)
Acknowledgement
This research is supported by the Malaysian Government FRGS Grant (FRGS/1/2015/SS03/SYUC/02/1).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Gan, M.F., Chua, H.N., Wong, S.F. (2018). Personal Data Protection Act Enforcement with PETs Adoption: An Exploratory Study on Employees’ Working Process Change. In: Kim, K., Kim, H., Baek, N. (eds) IT Convergence and Security 2017. Lecture Notes in Electrical Engineering, vol 450. Springer, Singapore. https://doi.org/10.1007/978-981-10-6454-8_25
Download citation
DOI: https://doi.org/10.1007/978-981-10-6454-8_25
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-6453-1
Online ISBN: 978-981-10-6454-8
eBook Packages: EngineeringEngineering (R0)