ISSN: 2222-6990
Open access
Identity theft in Malaysia has emerged as a critical concern, driven by the increasing digitization of personal transactions and the widespread use of online platforms. This research aims to explore the causes, impacts, and preventive strategies related to the residents of Bistari Impian Apartment, Johor, Malaysia. Employing a quantitative methodology, the study examines real-world cases and existing legal frameworks to analyze the mechanisms through which identity theft occurs. The focus is on key elements of identity fraud, including the unauthorized access and misuse of personal data such as MyKad details, banking information, and digital credentials. Technological vulnerabilities and social factors that facilitate identity theft are also explored. The individual consequences of identity theft, such as financial loss and psychological distress, as well as its systemic effects, including damage to public trust in financial institutions and regulatory burdens, are critically analyzed. The research assesses the effectiveness of Malaysia's current legal safeguards, with particular emphasis on the Personal Data Protection Act (PDPA) and evaluates the role of governmental and non-governmental organizations in combating identity theft. Through this analysis, the study offers tailored recommendations for improving Malaysia's legal, technological, and public awareness frameworks to enhance personal identity security. The findings of this research are intended to inform policymakers, law enforcement, and the public, providing actionable insights to mitigate the growing risks of identity theft in Malaysia's evolving digital landscape.
Abd Rahim, N. H., Hamid, S., & Kiah, M. L. M. (2019). Enhancement of cybersecurity awareness program on personal data protection among youngsters in Malaysia: An assessment. Malaysian Journal of Computer Science, 32(3), 221-245. https://doi.org/10.22452/mjcs.vol32no3.4
Copes, H., Kerley, K. R., Huff, R., & Kane, J. (2010). Differentiating identity theft: An exploratory study of victims using a national victimization survey. Journal of Criminal Justice, 38(5), 1045-1052.
Doe, J., & Miller, R. (2023). The impact of the COVID-19 pandemic on cybercrime: A focus on identity theft. Journal of Cybersecurity, 18(1), 45-60.
Etikan, I., Musa, S. A., & Alkassim, R. S. (2016). Comparison of convenience sampling and purposive sampling. American journal of theoretical and applied statistics, 5(1), 1-4.
Hazelah, A., Ismail, N., & Hashim, R. (2011). Identity theft awareness among city dwellers in Malaysia. Journal of Information Assurance & Cybersecurity, 1–8. https://doi.org/10.5171/2011.274080
Isa, M. Y. B. M., Ibrahim, W. N. B. W., & Mohamed, Z. (2021). The Relationship Between Financial Literacy and Public Awareness on Combating the Threat of Cybercrime in Malaysia. The Journal of Industrial Distribution & Business, 12(12), 1-10.
Johnson, A., & Lee, S. (2023). Enhancing public awareness of identity theft through education and technology. Cybersecurity and Information Systems, 27(3), 134-150.
Jones, T., & Patel, S. (2023). Understanding the emotional and financial impacts of identity theft on victims. Financial Security Review, 22(2), 95-112.
Komakula, S., & M., J. (2021). Identity Theft in Cyber Security: Literature Survey. Strad Research, 9(9). https://doi.org/10.37896/sr8.9/014
Koyame-Marsh, R. O., & Marsh, J. L. (2014). Data breaches and identity theft: Costs and responses. IOSR Journal of Economics and Finance (IOSR-JEF), 5, 36-45.
Krejcie, R. V., & Daryle, W. (2015). Morgan.(1970). Determining Sample Size for Research Actives. Journal of Education and Psychological measurement, 25, 25-58.
McMillan, J. H., & Schumacher, S. (2010). Research in Education: Evidence-Based Inquiry, MyEducationLab Series. Pearson.
Omar, S. Z., Kovalan, K., & Bolong, J. (2021). Effect of age on information security awareness level among young internet users in Malaysia. International Journal of Academic Research in Business and Social Sciences, 11(19), 245-255.
Omar, S. Z., Fadzil, M. F. B., & Bolong, J. (2019). The relationship between internet usage and subjective wellbeing among youths in Malaysia. International Journal of Academic Research in Business and Social Sciences, 9(7), 461-469.
https://www.mycert.org.my/portal/statistics
Singh, M. M., Frank, R., & Wan Zainon, W. M. (2021). Cyber-criminology defense in pervasive environment: A study of cybercrimes in Malaysia. Bulletin of Electrical Engineering and Informatics, 10(3), 1658–1668. https://doi.org/10.11591/eei.v10i3.3028
Smith, M. (2022). Cybersecurity challenges in the digital age: A case study of identity theft. Journal of Digital Security, 11(4), 203-218.
Sinnathamby Sehgar, S., & Zukarnain, Z. A. (2021). Online identity theft, security issues, and reputational damage. Preprints 2021.
Schabenberger, O., & Gotway, C. A. (2017). Statistical methods for spatial data analysis. Chapman and Hall/CRC.
Stark, A. K. (2023). Cybercrime During the COVID-19 Pandemic: Cyberspace Identity Theft. Stanislaus?ProQuest Dissertations Publishing.
Taylor, P. C., & Medina, M. (2011). Educational research paradigms: From positivism to pluralism. College Research Journal, 1(1), 1-16.
Wang, W., Yuan, Y., & Archer, N. (2004). McMaster eBusiness Research Centre (MeRC) (Vol. 12). DeGroote School of Business.
Winterdyk, J., & Thompson, N. (2008). Student and non-student perceptions and awareness of identity theft. Canadian Journal of Criminology and Criminal Justice, 50(2), 153-186.
Williams, K. (2023). The role of businesses in preventing identity theft: A comprehensive review. Business Ethics Quarterly, 38(2), 178-192.
Daud, P., Muniandy, N. A., & Nadi, F. (2024). Publics Perception and Awareness towards the Identity Theft among the Residents of Bistari Impian Apartment, Johor, Malaysia. International Journal of Academic Research in Business and Social Sciences, 14(11), 1261–1278.
Copyright: © 2024 The Author(s)
Published by HRMARS (www.hrmars.com)
This article is published under the Creative Commons Attribution (CC BY 4.0) license. Anyone may reproduce, distribute, translate and create derivative works of this article (for both commercial and non-commercial purposes), subject to full attribution to the original publication and authors. The full terms of this license may be seen at: http://creativecommons.org/licences/by/4.0/legalcode