Before the innovation existed to
fabricate the Internet, numerous researchers had officially foreseen the
presence of overall systems of data. The first workable prototype of the
Internet came in the late 1960s with the creation of ARPANET. Specialist
started to amass the “network of networks” that turned into the
cutting edge Internet, since the ARPANET, or the Advanced Research Projects Agency
Network, had embraced TCP/IP on January 1, 1983 (Evan, 2013).


The Internet has been quite a handy invention ever forged by
mankind. Thus, being grateful for the creation of the Internet, interactive
social platforms were brought to life. In 1997, Six Degrees was created, and
was the first Social Media site to be established. It allows the users to
create a profile and make acquaintance with other users (Drew, 2013).


The social media has been used by many people to stay connected
with each other across the world. The social platform has become a daily
routine in every person’s life to gain or even share information with others.
Social media is increasingly being examined and used as an important
information source. The lifespan for a post on the web is much lesser than the
lifespan of a story shared on social media, with a difference of 23% since
people across the world use the internet daily (Maryanne, 2017).


The objective for this chapter is to highlight views on the
background of study, problem statement, research objectives, research
questions, scope of study and significance of study.








Figure 1.1 Number of social network users in Malaysia from 2015 to

In Figure 1.2, it shows about the
number of social network users in Malaysia from 2015 to 2022 (Statista). It
shows an increment of the number of social users each and every year. The
statistics shows the number of social network users in Malaysia from 2015 to
2022. In 2017, the number of social network users was 18.62 million, and is
estimated to be at around 20.42 million of users. In a common sense, when the
number of online social users is increasing, the number of risks also increases
as well as the severity of the risks itself. Using Social Media as a medium for
sharing information is very good indeed, either for businesses or individuals,
as people from outside of the region could get in touch with the other.

Social Media is very distinctive,
when compared to Social Networking. Social Media is a phrase that humans
frequently used since its creation, usually to communicate what they post on
online social sites such as Facebook, Twitter, Instagram and others (Daniel,
2017). The common features usually found on Social Medias are user accounts,
profile pages, friends or followers, notifications, and the list goes on.
Social Media knows no boundaries. The word “Media” interpolate to the
information that a user share – regardless of whether a connection to an
article, recordings, PDF archives, or even a simple status updates.


By sharing the information through
online platforms, user can expect that the words are travelling faster than
they anticipated. When people are getting addicted to social media, they might
share information a little bit too much.

When wanted to share what they
possessed or going through with other people, some may post it online. The
reason for sharing information is what made them felt motivated to do so. There
are several factors that act as motivations that led to information sharing in
social media. According to Reb (2012), people share information to bring
significant and engaging materials, to show their characters to others, to
develop relationships, for self-satisfaction, and to let other knows that they
are being responsive to issues happened.




















When using social sites, the risks
are inevitable and can lead to severe consequences. The British Computer
Society (2012) has stated that there are risks that can be associated to the
usage of Social Media to share information, such as reputational, financial,
strategic and also operational.

In the world of social media, nothing is more
important than the privacy itself. Privacy is the main currency of the social
web, and like any other type of currency system, there is trade (Mollie, 2010).
She also added that the common ground would be at the time people clicked on
the box where they had read the Privacy Policy of certain sources, when they
were actually not. This is too common as users nowadays are too lazy to even
bother to read the policy that was provided by the sites.

1.2 Malicious data breach victims in 2016 according to respective geographic

The crime in terms of cyber is
different in every country. In Figure 1.2 gives information about the victim
locations of malicious data breaches in 2016, ranked according to the share of
cyber-attacks. The figure shows that North America has the highest share of
cyber-attacks and the lowest is Latin America & Carribean. According to
Joel Lee (2016), we should not share 9 things: when going for a trip, locations
(check-Ins), freedom to internal data, grievances, self-compromising proof,
brand-new purchases, offering privy guidance, fraud or request, and remorseful
updates. The excitement to share things on the social media is inevitable, thus
people may have underestimated privacy issue.

Social media is real. It is not just
about the social media that most people had used. It’s more of a frame of mind
and a state of being. It’s about how a user utilise it enhance the
relationships with other people in real life. Amusingly, we have a tendency to
depend on innovation and online networking so much that it can really destroy
those connections into further distant (Elise, 2015).

Social Medias are indeed very useful to mankind
as to get connected with the people across the globe in a jiffy, but due to its
exponential growth, it may be difficult to be control. Social Media is not a
specific place on the Internet or just a thing users use to see what other people
are doing. Social media is vague when it comes to describing how real;
emotional transmission is sparked to affect our real lives, not just our
Internet lives.
























To investigate the relationship between privacy
and the social media risk through information sharing.

To investigate the relationship between the
motivations to share and the social media risk through information sharing.

To investigate the relationship between
security and the social media risk through information sharing.






What are the relationship between privacy and
the social media risk through information sharing?

What are the relationship between motivation to
share and the social media risk through information sharing?

What are the relationship between security and
the social media risk through information sharing?       
















The study will be conducted at Aon
Insurance Brokers (M) Sdn Bhd. This study will focus on the factors that
trigger the risks of information sharing through Social Media among the staff
at the company. The respondents will be randomly selected from the various
departments. There are several constraints that may occur during this study,
such as:

1.5.1 Experience

In order to generate a good research, the
researcher usually required to gain more experience in executing research.
Thus, the researcher should meticulously plan the study because different
studies might have identified different kinds of variables.


1.5.2 Time Aspect          

This is the utmost significant in terms of
barriers when implementing this study. The reason is that the study has to be
conducted and completed within given period of time. Since the study has to be
done at the same time as the researcher doing his practical training, the
researcher may have difficulty to balance out the practical training task, and
the analysis of the data to be collected.


1.5.3 Respondent           

The respondent could be not filling the
questionnaire properly because nowadays people did not have much time to fill
in questionnaire and they want everything to be fast. In addition, there is
probability that the respondent would not return the questionnaire or completed
the questionnaire accordingly.


1.5.4 Data Accessibility

This limitation contributed a lot to the
researcher. The main reason would be due to the information to be used, such as
journals, articles and previous thesis published are not publicly accessible
and some requires the researcher to purchase in order to access more into a
certain reference.






This research is useful and
important because the information gather from this study can be practice and
make known to the society. This research will provide benefit for:

Ø  Aon Insurance Brokers (M) Sdn Bhd

This research will produce better understanding of the factors that
influence the social media risk through information sharing amongst the staffs
itself. This study will be able to assist them to understand the trends of
sharing information by using the Social Media as the platform to exchange
knowledges that they know to others, and gaining knowledge from others to them,
and also to be aware of not to post anything that may affect their company’s


Ø  Society

This research can improve public awareness
about the privacy, motivations and security. The public may be more cautious
when share or post anything that is either personal or for public viewing.
Awareness on the three aspects can help to avoid extreme unwanted consequences
to occur in our society by doing something that may offend other people through
the contents that they shared.
















In summary, the researcher wants to
focus on the main objective which is to study between independent variable and
dependent variable on whether they are significantly related to each other or
not. From the background of the study, the researcher focus on the factors that
influence the social media risks through information sharing among the Aon
Insurance Brokers (M) Sdn Bhd staff.

This research is consists of five chapters.  Chapter one will explain about background
study, problem statement, research objectives, research questions, scope of
study and limitations, and significance of the study. Chapter two will present
about literature review, theoretical framework, definition of key terms and
hypothesis. The following, chapter three, will explain about the research
methodology. It includes the research design, population and sampling size,
data collection method, and data analysis.


I'm Erica!

Would you like to get a custom essay? How about receiving a customized one?

Check it out