Please use this identifier to cite or link to this item: http://studentrepo.iium.edu.my/handle/123456789/1789
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKenjebaev, Nurbeken_US
dc.date.accessioned2020-08-20T08:44:38Z-
dc.date.available2020-08-20T08:44:38Z-
dc.date.issued2008-
dc.identifier.urihttp://studentrepo.iium.edu.my/jspui/handle/123456789/1789-
dc.description.abstractThe profound changes brought by the development of information technology in the past decade have posed challenges to existing legal concepts. Particularly, a breach of privacy right is taken as new dimension in cyberspace, where the processing of personal data is becoming the norm in cyberspace transactions. The question is whether the existing legal framework is able to meet the challenges of new technology which appears to threaten the privacy of individuals. The present study is aimed at assessing how the threat to privacy takes place in cyberspace and how these threats can be dealt under the existing legal framework pertaining to the protection of privacy. The study mainly used library research to analyse the privacy legal framework in Malaysia and making comparisons with other selected jurisdiction. It is found from this study that the existing laws in Malaysia are not adequate to meet the challenges of new technology to privacy interest. In order to provide an answer, the study provides an analysis of various approaches which have been adopted by the EU, the United States and other common law countries to address privacy issues posed by ICT. The thesis demonstrates that there is no comprehensive solution to the privacy issues and each approach has its own advantages and disadvantages. In suggesting solutions, this thesis recommends the relevant Malaysian authorities to choose an optimal data protection model which takes into consideration the specific local factors. The study recommends that a transaction cost theory should be adopted to assess the advantages and disadvantages of each model. By applying this theory, this study demonstrates that a comprehensive data protection (legislative) regime is not suitable for Malaysia. Hence, the thesis recommends the Malaysian government to formulate its own personal data protection regime which is cost-efficient and effective since the issue is global in nature.en_US
dc.language.isoenen_US
dc.publisherGombak : International Islamic University Malaysia, 2008en_US
dc.rightsCopyright International Islamic University Malaysia
dc.subject.lcshData protection -- Law and legislation -- Malaysiaen_US
dc.subject.lcshData protection -- Law and legislationen_US
dc.subject.lcshPrivacy, Right of -- Malaysiaen_US
dc.subject.lcshPrivacy, Right ofen_US
dc.titleProtection of privacy and the personal data in the information age : the Malaysian approachen_US
dc.typeDoctoral Thesisen_US
dc.identifier.urlhttps://lib.iium.edu.my/mom/services/mom/document/getFile/dCTGmotXmVr1VTsxJWkphGwxHYJMmSYh20090827103519687-
dc.description.identityt00011097881KENJEBAEVNURBEKKPG942.7C65K33P2008en_US
dc.description.identifierThesis : Protection of privacy and the personal data in the information age : the Malaysian approach / by Nurbek Kenjebaeven_US
dc.description.kulliyahAhmad Ibrahim Kulliyyah of Lawsen_US
dc.description.programmeDoctor of Philosophy in Lawen_US
dc.description.degreelevelDoctoral
dc.description.callnumbert KPGKPG942.7C65K33P 2008en_US
dc.description.notesThesis (Ph. D) -- International Islamic University Malaysia, 2008en_US
dc.description.physicaldescriptionxviii, 328 leaves ; 30 cm.en_US
item.openairetypeDoctoral Thesis-
item.grantfulltextopen-
item.fulltextWith Fulltext-
item.languageiso639-1en-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.cerifentitytypePublications-
Appears in Collections:AIKOL Thesis
Files in This Item:
File Description SizeFormat 
t00011097881KENJEBAEVNURBEKKPG942.7C65K33P2008_SEC_24.pdf24 pages file225.3 kBAdobe PDFView/Open
t00011097881KENJEBAEVNURBEKKPG942.7C65K33P2008_SEC.pdf
  Restricted Access
Full text secured file933.89 kBAdobe PDFView/Open    Request a copy
Show simple item record

Page view(s)

16
checked on May 17, 2021

Download(s)

18
checked on May 17, 2021

Google ScholarTM

Check


Items in this repository are protected by copyright, with all rights reserved, unless otherwise indicated. Please give due acknowledgement and credits to the original authors and IIUM where applicable. No items shall be used for commercialization purposes except with written consent from the author.