1.0 INTRODUCTIONBefore the innovation existed tofabricate the Internet, numerous researchers had officially foreseen thepresence of overall systems of data. The first workable prototype of theInternet came in the late 1960s with the creation of ARPANET. Specialiststarted to amass the “network of networks” that turned into thecutting edge Internet, since the ARPANET, or the Advanced Research Projects AgencyNetwork, had embraced TCP/IP on January 1, 1983 (Evan, 2013). The Internet has been quite a handy invention ever forged bymankind.

Thus, being grateful for the creation of the Internet, interactivesocial platforms were brought to life. In 1997, Six Degrees was created, andwas the first Social Media site to be established. It allows the users tocreate a profile and make acquaintance with other users (Drew, 2013). The social media has been used by many people to stay connectedwith each other across the world. The social platform has become a dailyroutine in every person’s life to gain or even share information with others.Social media is increasingly being examined and used as an importantinformation source.

The lifespan for a post on the web is much lesser than thelifespan of a story shared on social media, with a difference of 23% sincepeople across the world use the internet daily (Maryanne, 2017). The objective for this chapter is to highlight views on thebackground of study, problem statement, research objectives, researchquestions, scope of study and significance of study.      1.1RESEARCH BACKGROUNDFigure 1.1 Number of social network users in Malaysia from 2015 to2022In Figure 1.2, it shows about thenumber of social network users in Malaysia from 2015 to 2022 (Statista). Itshows an increment of the number of social users each and every year.

Thestatistics shows the number of social network users in Malaysia from 2015 to2022. In 2017, the number of social network users was 18.62 million, and isestimated to be at around 20.42 million of users. In a common sense, when thenumber of online social users is increasing, the number of risks also increasesas well as the severity of the risks itself.

Using Social Media as a medium forsharing information is very good indeed, either for businesses or individuals,as people from outside of the region could get in touch with the other.Social Media is very distinctive,when compared to Social Networking. Social Media is a phrase that humansfrequently used since its creation, usually to communicate what they post ononline social sites such as Facebook, Twitter, Instagram and others (Daniel,2017). The common features usually found on Social Medias are user accounts,profile pages, friends or followers, notifications, and the list goes on.Social Media knows no boundaries. The word “Media” interpolate to theinformation that a user share – regardless of whether a connection to anarticle, recordings, PDF archives, or even a simple status updates. By sharing the information throughonline platforms, user can expect that the words are travelling faster thanthey anticipated. When people are getting addicted to social media, they mightshare information a little bit too much.

When wanted to share what theypossessed or going through with other people, some may post it online. Thereason for sharing information is what made them felt motivated to do so. Thereare several factors that act as motivations that led to information sharing insocial media. According to Reb (2012), people share information to bringsignificant and engaging materials, to show their characters to others, todevelop relationships, for self-satisfaction, and to let other knows that theyare being responsive to issues happened.                                        1.

2 PROBLEM STATEMENTWhen using social sites, the risksare inevitable and can lead to severe consequences. The British ComputerSociety (2012) has stated that there are risks that can be associated to theusage of Social Media to share information, such as reputational, financial,strategic and also operational.In the world of social media, nothing is moreimportant than the privacy itself. Privacy is the main currency of the socialweb, and like any other type of currency system, there is trade (Mollie, 2010).

She also added that the common ground would be at the time people clicked onthe box where they had read the Privacy Policy of certain sources, when theywere actually not. This is too common as users nowadays are too lazy to evenbother to read the policy that was provided by the sites.Figure1.2 Malicious data breach victims in 2016 according to respective geographiclocationThe crime in terms of cyber isdifferent in every country. In Figure 1.2 gives information about the victimlocations of malicious data breaches in 2016, ranked according to the share ofcyber-attacks.

The figure shows that North America has the highest share ofcyber-attacks and the lowest is Latin America & Carribean. According toJoel Lee (2016), we should not share 9 things: when going for a trip, locations(check-Ins), freedom to internal data, grievances, self-compromising proof,brand-new purchases, offering privy guidance, fraud or request, and remorsefulupdates. The excitement to share things on the social media is inevitable, thuspeople may have underestimated privacy issue.Social media is real. It is not justabout the social media that most people had used. It’s more of a frame of mindand a state of being. It’s about how a user utilise it enhance therelationships with other people in real life. Amusingly, we have a tendency todepend on innovation and online networking so much that it can really destroythose connections into further distant (Elise, 2015).

Social Medias are indeed very useful to mankindas to get connected with the people across the globe in a jiffy, but due to itsexponential growth, it may be difficult to be control. Social Media is not aspecific place on the Internet or just a thing users use to see what other peopleare doing. Social media is vague when it comes to describing how real;emotional transmission is sparked to affect our real lives, not just ourInternet lives.                     1.3 RESEARCH OBJECTIVES ·                        To investigate the relationship between privacyand the social media risk through information sharing.·                        To investigate the relationship between themotivations to share and the social media risk through information sharing.·                        To investigate the relationship betweensecurity and the social media risk through information sharing.

   1.4 RESEARCH QUESTIONS ·                             What are the relationship between privacy andthe social media risk through information sharing?·                             What are the relationship between motivation toshare and the social media risk through information sharing?·                             What are the relationship between security andthe social media risk through information sharing?                      1.5 SCOPE OF STUDY AND LIMITATIONSThe study will be conducted at AonInsurance Brokers (M) Sdn Bhd. This study will focus on the factors thattrigger the risks of information sharing through Social Media among the staffat the company. The respondents will be randomly selected from the variousdepartments. There are several constraints that may occur during this study,such as:1.5.

1 ExperienceIn order to generate a good research, theresearcher usually required to gain more experience in executing research.Thus, the researcher should meticulously plan the study because differentstudies might have identified different kinds of variables. 1.5.2 Time Aspect           This is the utmost significant in terms ofbarriers when implementing this study.

The reason is that the study has to beconducted and completed within given period of time. Since the study has to bedone at the same time as the researcher doing his practical training, theresearcher may have difficulty to balance out the practical training task, andthe analysis of the data to be collected. 1.5.

3 Respondent            The respondent could be not filling thequestionnaire properly because nowadays people did not have much time to fillin questionnaire and they want everything to be fast. In addition, there isprobability that the respondent would not return the questionnaire or completedthe questionnaire accordingly. 1.5.4 Data AccessibilityThis limitation contributed a lot to theresearcher. The main reason would be due to the information to be used, such asjournals, articles and previous thesis published are not publicly accessibleand some requires the researcher to purchase in order to access more into acertain reference.

    1.6 SIGNIFICANCE OF STUDYThis research is useful andimportant because the information gather from this study can be practice andmake known to the society. This research will provide benefit for:Ø  Aon Insurance Brokers (M) Sdn BhdstaffsThis research will produce better understanding of the factors thatinfluence the social media risk through information sharing amongst the staffsitself. This study will be able to assist them to understand the trends ofsharing information by using the Social Media as the platform to exchangeknowledges that they know to others, and gaining knowledge from others to them,and also to be aware of not to post anything that may affect their company’simage. Ø  SocietyThis research can improve public awarenessabout the privacy, motivations and security.

The public may be more cautiouswhen share or post anything that is either personal or for public viewing.Awareness on the three aspects can help to avoid extreme unwanted consequencesto occur in our society by doing something that may offend other people throughthe contents that they shared.              1.7 SUMMARYIn summary, the researcher wants tofocus on the main objective which is to study between independent variable anddependent variable on whether they are significantly related to each other ornot. From the background of the study, the researcher focus on the factors thatinfluence the social media risks through information sharing among the AonInsurance Brokers (M) Sdn Bhd staff.

This research is consists of five chapters.  Chapter one will explain about backgroundstudy, problem statement, research objectives, research questions, scope ofstudy and limitations, and significance of the study. Chapter two will presentabout literature review, theoretical framework, definition of key terms andhypothesis.

The following, chapter three, will explain about the researchmethodology. It includes the research design, population and sampling size,data collection method, and data analysis.


I'm Erica!

Would you like to get a custom essay? How about receiving a customized one?

Check it out