Skip to main content

Personal Data Protection Act Enforcement with PETs Adoption: An Exploratory Study on Employees’ Working Process Change

  • Conference paper
  • First Online:
IT Convergence and Security 2017

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 450))

Abstract

It is often that personal data were being misused by organizations for their own benefits. To tackle this issue, different countries had introduced and enforced personal data protection regulations. With the enforcement, organizations in the relevant countries need to comply with the law enforcement to protect personal data as their legal responsibility. Privacy Enhancing Technologies (PETs) act as a form of technology that protects individual privacy data in organizations. The purpose of this research is to discover the impact of personal data protection act enforcement with PETs adoption on organization employees’ working experience and performance through the study of their working process change. This research adopts a qualitative single case study on one of the telecommunication companies in Malaysia. The targeted participants are employees come from different work nature, i.e., use personal data, process personal data or setup system to protect personal data. The finding of this research will enable organizations to have better understanding in future PETs adoption and provide insights on the measures to be taken to comply with personal data protection. This paper presents our preliminary results based on semi-structured interviews with 8 participants from different groups of work nature.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Personal Data Protection Act 2010.: Malaysia Attorney General’s Chambers (2010)

    Google Scholar 

  2. Blarkom, G.W.V., Borking, J.J., Verhaar, P.: PET. Handbook of privacy and privacy-enhancing technologies. In: Blarkom, G.W.V., Borking, J.J., Olk, J.G.E. (eds.) Handbook of Privacy and Privacy-Enhancing Technologies: The case of Intelligent Software Agents, Cambridge (2003)

    Google Scholar 

  3. Chua, H.N., Wong, S.F., Chang, Y.H., Tan, C.M., Gan, M.F.: Personal data protection policy adoption: an exploratory study of Telco Industry’s Implementation. In: 21st Biennial Conference of the International Telecommunications Society, Taipei, 26–29 June 2016

    Google Scholar 

  4. Cao, Q., Jones, D.R., Sheng, H.: Contained nomadic information environments: technology, organization, and environment influences on adoption of hospital RFID patient tracking. Inf. Manage. 51(2), 225–239 (2014)

    Article  Google Scholar 

  5. Taneva, S., Law, E., Higgins, J., Easty, A., Plattner, B.: Operating room coordination with the eWhiteboard: the fine line between successful and challenged technology adoption. Health Technol. 1(2–4), 81–92 (2011)

    Article  Google Scholar 

  6. Aboelmaged, M.G.: Predicting e-readiness at firm-level: an analysis of technological, organizational and environmental (TOE) effects on e-maintenance readiness in manufacturing firms. Int. J. Inf. Manage. 34(5), 639–651 (2014)

    Article  Google Scholar 

  7. Delaney, R., D’Agostino, R.: The Challenges of Integrating New Technology into an Organization. Mathematics and Computer Science Capstones, 25 (2015)

    Google Scholar 

  8. Zolkepli, F.: ‘Zeus’ Targets Mobile Phone User. The Star Online (2014). http://www.thestar.com.my/News/Nation/2014/09/25/Zeus-targets-mobile-phone-users-Scammers-rake-in-thousands-through-malware-virus

  9. Bergström, A.: Online privacy concerns: a broad approach to understanding the concerns of different groups for different uses. Comput. Hum. Behav. 53, 419–426 (2015)

    Article  Google Scholar 

  10. Gellman, R.: The digital person: technology and privacy in the information age. Gov. Inf. Q. 22(3), 530–532 (2005)

    Article  Google Scholar 

  11. Seničar, V., Jerman-Blažič, B., Klobučar, T.: Privacy-enhancing technologies—approaches and development. Comput. Stand. Interfaces 25(2), 147–158 (2003)

    Article  Google Scholar 

  12. London Economics.: Study on the Economic Benefits of Privacy-Enhancing Technologies (PETs) (2010). http://ec.europa.eu/justice/policies/privacy/docs/studies/final_report_pets_16_07_10_en.pdf

  13. Kenny, S.: An Introduction to Privacy Enhancing Technologies (2008). https://iapp.org/news/a/2008-05-introduction-to-privacy-enhancing-technologies/

  14. Chan, J.M.J., Chua, H.N., Lee, H.S., Iranmanesh, V.: Privacy and security: how to differentiate them using privacy-security tree (PST) classification. In: International Conference on Information Science and Security (2016)

    Google Scholar 

  15. Olivier, M.S.: A layered architecture for privacy-enhancing technologies. S. Afr. Comput. J. 31, 53–61 (2003)

    Google Scholar 

  16. Borking, J.J.: Why adopting privacy enhancing technologies (PETs) takes so much time. In: Gutwirth, S., Poullet, Y., De Hert, P., Leenes, R. (eds.) Computers, Privacy and Data Protection: An Element of Choice, pp. 309–341. Springer, Dordrecht (2011)

    Chapter  Google Scholar 

  17. Goldberg, I.: Privacy Enhancing Technologies for the Internet III: Ten Years Later (2007). http://www.cypherpunks.ca/~iang/pubs/pet3.pdf

  18. Wang, Y.-S., Li, H.-T., Li, C.-R., Zhang, D.-Z.: Factors affecting hotels’ adoption of mobile reservation systems: a technology-organization-environment framework. Tour. Manag. 53, 163–172 (2016)

    Article  Google Scholar 

  19. MalaysianDigest: Cybersecurity Threats: The Risk is Real in Malaysia (2016). http://www.malaysiandigest.com/technology/605954-cybersecurity-threats-the-risk-is-real-in-malaysia.html

  20. Weerd, I.V.D., Mangula, I.S., Brinkkemper, S.: Adoption of software as a service in Indonesia: examining the influence of organizational factors. Inf. Manag. 53(7), 915–928 (2016)

    Article  Google Scholar 

  21. Yin, R.K.: Case Study Research: Design and Methods, 5th edn. SAGE Publications, Thousand Oaks (2009)

    Google Scholar 

  22. McGivern, Y.: The Practice of Market and Social Research: An Introduction. Pearson Education, Essex (2007)

    Google Scholar 

  23. Bloomberg, L.D., Volpe, M.: Completing Your Qualitative Dissertation. Sage Publications, Thousand Oaks (2012)

    Google Scholar 

  24. Creswell, J.W.: Research Design: Qualitative, Quantitative, and Mixed Methods Approaches. Sage Publications, Thousand Oaks (2013)

    Google Scholar 

  25. Proctor, E.K., Landsverk, J., Aarons, G., Chambers, D., Glisson, C., Mittman, B.: Implementation research in mental health services: an emerging science with conceptual, methodological, and training challenges. Adm. Policy Ment. Health Ment. Health Serv. Res. 36(1), 24–34 (2009)

    Article  Google Scholar 

  26. Durlak, J.A., DuPre, E.P.: Implementation matters: a review of research on the influence of implementation on program outcomes and the factors affecting implementation. Am. J. Community Psychol. 41(3–4), 327 (2008)

    Article  Google Scholar 

  27. Moulton, S., Sandfort, J.R.: The strategic action field framework for policy implementation research. Policy Stud. J. 45(1), 144–169 (2017)

    Article  Google Scholar 

Download references

Acknowledgement

This research is supported by the Malaysian Government FRGS Grant (FRGS/1/2015/SS03/SYUC/02/1).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hui Na Chua .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Gan, M.F., Chua, H.N., Wong, S.F. (2018). Personal Data Protection Act Enforcement with PETs Adoption: An Exploratory Study on Employees’ Working Process Change. In: Kim, K., Kim, H., Baek, N. (eds) IT Convergence and Security 2017. Lecture Notes in Electrical Engineering, vol 450. Springer, Singapore. https://doi.org/10.1007/978-981-10-6454-8_25

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-6454-8_25

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-6453-1

  • Online ISBN: 978-981-10-6454-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics