The Privacy Paradox of Students' Personal Data Security in the Digital Age
DOI:
https://doi.org/10.54259/satesi.v5i1.3417Keywords:
Data Leak, Personal Data, Data Privacy, University StudentAbstract
This research investigates the "privacy paradox," a phenomenon in which individuals, particularly university students, express concerns about data privacy but fail to implement effective measures to protect their personal information. The study seeks to identify key factors influencing students' awareness and behaviors concerning personal data security while proposing strategies to improve their knowledge and practices in the face of accelerating digital advancements. Employing a Systematic Literature Review using the PRISMA method, this research analyzed articles published between 2014 and 2023 to explore pertinent themes. The results indicate that students frequently disregard privacy policies and security protocols, leaving them susceptible to data breaches. Although they articulate concerns about threats from social media, university networks, and smartphones, their actions often contradict these concerns. This inconsistency arises from limited understanding of data collection processes and a perception of ineffectiveness in privacy protection efforts. The study underscores the importance of educational initiatives, such as cybersecurity training, phishing awareness programs, and the integration of advanced security technologies like blockchain and encryption. Furthermore, the enactment of Indonesia's Personal Data Protection Bill (PDP Bill) is identified as a critical step toward strengthening the legal framework for data security. Collectively, these measures aim to mitigate privacy risks and enhance students' compliance and awareness in safeguarding their personal data.
Downloads
References
A. Mishra, Y. I. Alzoubi, A. Q. Gill, and M. J. Anwar, “Cybersecurity Enterprises Policies: A Comparative Study,” 2022, mdpi.com. doi: 10.3390/s22020538.
W. Yu and F. Shen, “The relationship between online political participation and privacy protection: evidence from 10 Asian societies of different levels of cybersecurity,” Behaviour and Information Technology, vol. 41, no. 13, pp. 2819–2834, 2022, doi: 10.1080/0144929X.2021.1953597.
N. Kshetri, Vasudha, and D. Hoxha, “KnowCC: Knowledge, Awareness of Computer & Cyber Ethics between CS/Non-CS University Students,” Proceedings - 4th IEEE 2023 International Conference on Computing, Communication, and Intelligent Systems, ICCCIS 2023, pp. 298–304, 2023, doi: 10.1109/ICCCIS60361.2023.10425385.
R. Rohan, S. Funilkul, D. Pal, and W. Chutimaskul, “Understanding of Human Factors in Cybersecurity: A Systematic Literature Review,” 2021 International Conference on Computational Performance Evaluation, ComPE 2021, pp. 133–140, 2021, doi: 10.1109/ComPE53109.2021.9752358.
M. Williams, J. R. C. Nurse, and S. Creese, “Smartwatch games: Encouraging privacy-protective behaviour in a longitudinal study,” Comput Human Behav, vol. 99, no. April, pp. 38–54, 2019, doi: 10.1016/j.chb.2019.04.026.
P. Shah and A. Agarwal, “Cybersecurity behaviour of smartphone users in India: an empirical analysis,” Information and Computer Security, vol. 28, no. 2, pp. 293–318, 2020, doi: 10.1108/ICS-04-2019-0041.
H. Robert, “Institutional Knowledge at Singapore Management University ScienceDirect Privacy leakage analysis in online social Privacy leakage analysis in online social networks networks,” pp. 239–254, 2015.
X. Li, C. Zhao, Y. Hu, H. Xie, Y. Wang, and J. Zhao, “Precursor of privacy leakage detection for individual user,” Comput Secur, vol. 142, no. April, 2024, doi: 10.1016/j.cose.2024.103879.
I. Shklovski and E. Grönvall, “CreepyLeaks: Participatory Speculation Through Demos,” ACM International Conference Proceeding Series, 2020, doi: 10.1145/3419249.3420168.
Z. Wang and Z. Chen, “Analysing the Causes and Implications of the Privacy Paradox: Consumer Surveillance and Online Data Collection,” Bull Sci Technol Soc, vol. 43, no. 3–4, pp. 86–93, 2023, doi: 10.1177/02704676231220842.
T. Dienlin and S. Trepte, “Is the privacy paradox a relic of the past? An in-depth analysis of privacy attitudes and privacy behaviors,” Eur J Soc Psychol, vol. 45, no. 3, pp. 285–297, 2015, doi: 10.1002/ejsp.2049.
C. Prince, N. Omrani, and F. Schiavone, “Online privacy literacy and users’ information privacy empowerment: the case of GDPR in Europe,” Information Technology and People, vol. 37, no. 8, pp. 1–24, 2023, doi: 10.1108/ITP-05-2023-0467.
S. Havelka, “Typologies of Mobile Privacy Behavior and Attitude: A Case Study Comparing German and American Library and Information Science Students,” Serials Librarian, vol. 81, no. 1, pp. 42–58, 2021, doi: 10.1080/0361526X.2021.1875961.
A. Farooq, S. R. U. Kakakhel, S. Virtanen, and J. Isoaho, “A taxonomy of perceived information security and privacy threats among IT security students,” 2015 10th International Conference for Internet Technology and Secured Transactions, ICITST 2015, pp. 280–286, 2016, doi: 10.1109/ICITST.2015.7412106.
K. C. Chung, C. H. Chen, H. H. Tsai, and Y. H. Chuang, “Social media privacy management strategies: A SEM analysis of user privacy behaviors,” Comput Commun, vol. 174, no. April, pp. 122–130, 2021, doi: 10.1016/j.comcom.2021.04.012.
H. I. Maseeh et al., “Exploring the privacy concerns of smartphone app users: a qualitative approach,” Marketing Intelligence and Planning, vol. 41, no. 7, pp. 945–969, 2023, doi: 10.1108/MIP-11-2022-0515.
M. Feng, B. Hu, Y. Tian, and H. Wang, “Data leaking scandal, risks, and financial consumption behaviors in online tourism platforms: The role of trust on college students and teachers,” 2022, frontiersin.org. doi: 10.3389/fpsyg.2022.968271.
J. Wang, G. Liu, and G. Zhao, “Two-attribute privacy protection method of MCS based on blockchain smart contract,” Comput Commun, vol. 193, no. June, pp. 126–135, 2022, doi: 10.1016/j.comcom.2022.06.045.
D. Moher et al., “Preferred reporting items for systematic reviews and meta-analyses: The PRISMA statement,” PLoS Med, vol. 6, no. 7, 2009, doi: 10.1371/journal.pmed.1000097.
T. Dienlin, P. K. Masur, and S. Trepte, “A longitudinal analysis of the privacy paradox,” New Media Soc, vol. 25, no. 5, pp. 1043–1064, 2023, doi: 10.1177/14614448211016316.
D. E. Krych and P. McDaniel, “Exposing Android social applications: linking data leakage to privacy policies,” Journal of Cyber Security Technology, vol. 5, no. 3–4, pp. 139–190, 2021, doi: 10.1080/23742917.2019.1630093.
S. Barth, M. D. T. de Jong, M. Junger, P. H. Hartel, and J. C. Roppelt, “Putting the privacy paradox to the test: Online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial resources,” Telematics and Informatics, vol. 41, no. November 2017, pp. 55–69, 2019, doi: 10.1016/j.tele.2019.03.003.
A. Das and H. U. Khan, “Security behaviors of smartphone users,” Information and Computer Security, vol. 24, no. 1, pp. 116–134, 2016, doi: 10.1108/ICS-04-2015-0018.
S. Mujeye, “An analysis of differences in behaviors and practices of security-conscious users and regular users on mobile devices,” Information and Computer Security, vol. 31, no. 5, pp. 624–634, 2023, doi: 10.1108/ICS-05-2023-0086.
P. Fehér-Polgár and Z. Németh, “Safety consciousness of the mobile phone users,” SACI 2016 - 11th IEEE International Symposium on Applied Computational Intelligence and Informatics, Proceedings, pp. 345–348, 2016, doi: 10.1109/SACI.2016.7507399.
A. Jayatilleke, S. Thelijjagoda, and P. Pathirana, “Security Awareness among Smart Speaker Users,” 2019 National Information Technology Conference, NITC 2019, pp. 8–10, 2019, doi: 10.1109/NITC48475.2019.9114497.
J. Liu and S. Zhou, “Application Research of Data Mining Technology in Personal Privacy Protection and Material Data Analysis,” Integrated Ferroelectrics, vol. 216, no. 1, pp. 29–42, 2021, doi: 10.1080/10584587.2021.1911255.
A. H. M. Bradley and A. L. Howard, “Stress and Mood Associations With Smartphone Use in University Students: A 12-Week Longitudinal Study,” Clinical Psychological Science, vol. 11, no. 5, pp. 921–941, 2023, doi: 10.1177/21677026221116889.
J. Rastenis, S. Ramanauskaite, J. Janulevicius, and A. Cenys, “Credulity to Phishing Attacks: A Real-World Study of Personnel with Higher Education,” 2019 Open Conference of Electrical, Electronic and Information Sciences, eStream 2019 - Proceedings, 2019, doi: 10.1109/eStream.2019.8732169.
G. Alsadoon, “Comparisons and appropriate solutions to prevent data threats of cloud computing, applied in green environment,” 2019 8th International Conference on Modeling Simulation and Applied Optimization, ICMSAO 2019, 2019, doi: 10.1109/ICMSAO.2019.8880344.
J. Walls and K. K. R. Choo, A Study of the Effectiveness Abs Reliability of Android Free Anti-Mobile Malware Apps. Elsevier Inc., 2017. doi: 10.1016/B978-0-12-804629-6.00008-0.
R. Isus, K. Kolesnikova, I. Khlevna, T. Oleksandr, and K. Liubov, “Development of a model of personal data protection in the context of digitalization of the educational sphere using information technology tools,” Procedia Comput Sci, vol. 231, no. 2023, pp. 347–352, 2024, doi: 10.1016/j.procs.2023.12.215.
P. Schmidt et al., “Twitter Users’ Privacy Behavior: A Reasoned Action Approach,” Social Media and Society, vol. 8, no. 3, 2022, doi: 10.1177/20563051221126085.
M. Guri, R. Puzis, K. K. R. Choo, S. Rubinshtein, G. Kedma, and Y. Elovici, “Using malware for the greater good: Mitigating data leakage,” Journal of Network and Computer Applications, vol. 145, no. September 2018, p. 102405, 2019, doi: 10.1016/j.jnca.2019.07.006.
Y. Wang, Y. Chen, F. Ye, H. Liu, and J. Yang, “Implications of smartphone user privacy leakage from the advertiser’s perspective,” Pervasive Mob Comput, vol. 53, pp. 13–32, 2019, doi: 10.1016/j.pmcj.2018.12.006.
R. Belen Saglam, J. R. C. Nurse, and D. Hodges, “Personal information: Perceptions, types and evolution,” Journal of Information Security and Applications, vol. 66, no. March, p. 103163, 2022, doi: 10.1016/j.jisa.2022.103163.
G. Heo and I. Doh, “Blockchain and differential privacy-based data processing system for data security and privacy in urban computing,” Comput Commun, vol. 222, no. April, pp. 161–176, 2024, doi: 10.1016/j.comcom.2024.04.027.
S. Gabrielli, S. Rizzi, O. Mayora, S. More, J. C. P. Baun, and W. Vandevelde, “Multidimensional Study on Users’ Evaluation of the KRAKEN Personal Data Sharing Platform,” 2022, mdpi.com. doi: 10.3390/app12073270.
M. T. B. Hoang, D. Dang-Pham, A. P. Hoang, B. Le Gia, and M. Nkhoma, “Network Analytics for Improving Students’ Cybersecurity Awareness in Online Learning Systems,” Proceedings - 2020 RIVF International Conference on Computing and Communication Technologies, RIVF 2020, 2020, doi: 10.1109/RIVF48685.2020.9140781.
S. D. Rosadi, A. Noviandika, R. Walters, and F. R. Aisy, “Indonesia’s personal data protection bill, 2020: does it meet the needs of the new digital economy?,” International Review of Law, Computers and Technology, vol. 37, no. 1, pp. 78–90, 2023, doi: 10.1080/13600869.2022.2114660.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Camilia Indah Novia Taufik, Agus Juhana

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).























