PREDICTING DATA LEAK RISK FROM SMARTPHONE DEPENDENCY, DIGITAL MEMORY AND USAGE PATTERNS

Authors

  • ANUAR ALI Faculty of Communication and Media Studies, Universiti Teknologi MARA, Selangor, Malaysia.
  • MOHD NUR NAJMI NUJI Faculty of Communication and Media Studies, Universiti Teknologi MARA, Selangor, Malaysia.
  • MOHD HANAFI AZMAN ONG Faculty of Computer and Mathematical Sciences, Universiti Teknologi MARA, Johor, Malaysia.
  • MOHD AZUL MOHAMAD SALLEH Faculty of Social Sciences and Humanities, Universiti Kebangsaan Malaysia, Selangor, Malaysia.

DOI:

https://doi.org/10.55197/qjssh.v6i4.803

Keywords:

smartphone dependency, digital memory, usage pattern, data leak, structural equation modelling

Abstract

Smartphone is no longer limited to communication purposes but has evolved into a digital tool for managing work, learning, and daily social activities.  This influence has implications for smartphone dependency and the formation of digital memory. However, heavy dependency, reliance on digital memory, and unsafe usage habits increase the risk of data leaks. Despite rising concerns over data privacy, many users especially young adults continue to underestimate how their smartphone dependence, digital memory practices, and usage pattern contribute to potential data leakages. Therefore, this study examines the relationship between smartphone dependency, digital memory, usage patterns and data leak risk among young adults in Malaysia. Using Partial Least Squares Structural Equation Modelling (PLS-SEM) on 353 valid responses, the findings reveal significant positive relationships between smartphone dependency (β = 0.449), digital memory (β = 0.245), and usage patterns (β = 0.235) with data leak risks, explaining 78.5% of the variance. These findings indicate that excessive smartphone dependency, increasing reliance on digital memory, and risky usage behaviors significantly contribute to users' digital vulnerability. This highlights the urgent need for digital literacy to reduce the risk of personal data leaks aimed at building a more informed and digitally responsible society.

References

[1] Adnan, M., Syed, M.H., Anjum, A., Rehman, S. (2025): A framework for privacy-preserving in IoV using federated learning with differential privacy. – IEEE Access 13: 1-12.

[2] Anderson Zorn, A.K. (2021): Portable archives: Using mobile technology for archival education and outreach in a campus community. – Archival Issues 41(1): 23-35.

[3] Ariffin, S.K., Abd Rahman, M.F.R., Muhammad, A.M., Zhang, Q. (2021): Understanding the consumer’s intention to use the e-wallet services. – Spanish Journal of Marketing-ESIC 25(3): 446-461.

[4] Ball-Rokeach, S.J. (2008): Media system dependency theory. – The International Encyclopedia of Communication 4p.

[5] Berry, D.M. (2024): Post-digital humanities: Computation and cultural critique in the arts and humanities. – ArXiv Preprint 3p.

[6] Birch, K., Cochrane, D.T., Ward, C. (2021): Data as asset? The measurement, governance, and valuation of digital personal data by Big Tech. – Big Data & Society 8(1): 1-14.

[7] Calinescu, A. (2024): The impact of digital technologies on memory and memory studies. – Journal of Contemporary Philosophical and Anthropological Studies 2(1): 45-56.

[8] Castells, M. (2023): The network society revisited. – American Behavioral Scientist 67(7): 940-946.

[9] Chauhan, S., Akhtar, A., Gupta, A. (2022): Customer experience in digital banking: A review and future research directions. – International Journal of Quality and Service Sciences 14(2): 311-348.

[10] Chellapan, T., Daud, N.M., Narayanasamy, S. (2024): Smartphone use patterns and the impact on eye convergence among Malaysian teenagers. – International Journal of Ophthalmology 17(11): 2093-2100.

[11] Creswell, J.W., Creswell, J.D. (2017): Research design: Qualitative, quantitative, and mixed methods approaches. – Sage Publications, Thousand Oaks 438p.

[12] Flew, T., Gillett, R. (2021): Platform policy: Evaluating different responses to the challenges of platform power. – Journal of Digital Media & Policy 12(2): 231-246.

[13] Gawer, A., Srnicek, N. (2021): Online platforms: Economic and societal effects. – European Parliament Research Service Study 25p.

[14] Goel, M., Singal, G. (2021): Android OS case study. – ArXiv Preprint 21p.

[15] Goggin, G. (2025): Mobile AI: Communication and mobility after the smartphone. – Communication and Change 1(1): 5-15.

[16] Goggin, G. (2021): Apps: From mobile phones to digital lives. – Wiley, Hoboken 154p.

[17] Greshake, K., Abdelnabi, S., Mishra, S., Endres, C., Holz, T., Fritz, M. (2023): Compromising real-world LLM-integrated apps with indirect prompt injection. – Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security 12p.

[18] Hair, J.F., Risher, J.J., Sarstedt, M., Ringle, C.M. (2019): When to use and how to report the results of PLS-SEM. – European Business Review 31(1): 2-24.

[19] Hair, J.F., Matthews, L.M., Matthews, R.L., Sarstedt, M. (2017): PLS-SEM or CB-SEM: Updated guidelines on which method to use. – International Journal of Multivariate Data Analysis 1(2): 107-123.

[20] Harkin, L.J., Kuss, D. (2021): “My smartphone is an extension of myself”: A qualitative exploration. – Psychology of Popular Media 10(1): 28-38.

[21] Henseler, J., Ringle, C.M., Sarstedt, M. (2015): A new criterion for assessing discriminant validity in variance-based SEM. – Journal of the Academy of Marketing Science 43(1): 115-135.

[22] Irwin, R. (2021): Heidegger and Stiegler on failure and technology. – In Bernard Stiegler and the Philosophy of Education, Routledge, London 14p.

[23] Kehtarnavaz, N., Parris, S., Sehgal, A. (2022): Smartphone-based real-time digital signal processing. – Springer Nature, Cham 155p.

[24] Kim, Y.C. (2020): Media system dependency theory. – The International Encyclopedia of Media Psychology 3: 1-17.

[25] Koswara, A. (2025): E-commerce rivalry in Southeast Asia: Google Trends analysis of TikTok Shop, Shopee and Lazada. – Mingzhi International Journal of Business 1(1): 23-34.

[26] Lee, M. (2024): Hacks, leaks, and revelations: The art of analyzing hacked and leaked data. – No Starch Press, San Francisco 544p.

[27] Leith, D.J. (2021): Mobile handset privacy: Measuring the data iOS and Android send to Apple and Google. – Proceedings of International Conference on Security and Privacy in Communication Systems 10p.

[28] Li, X., Fu, S., Fu, Q., Zhong, B. (2021): Youths’ habitual use of smartphones alters sleep quality and memory: Insights from a national sample of Chinese students. – International Journal of Environmental Research and Public Health 18(5): 12p.

[29] Linden, T., Nawaz, S., Mitchell, M. (2021): Adults’ perspectives on smartphone usage and dependency in Australia. – Computers in Human Behavior Reports 3: 9p.

[30] Lotfy, A.Y., Zaki, A.M., Abd-El-Hafeez, T., Mahmoud, T.M. (2021): Privacy issues of public Wi-Fi networks. – Proceedings of the International Conference on Artificial Intelligence and Computer Vision 12p.

[31] McLuhan, M. (1975): McLuhan’s laws of the media. – Technology and Culture 16(1): 74-78.

[32] Miller, D., Abed Rabho, L., Awondo, P., De Vries, M., Duque, M., Garvey, P., Haapio-Kirk, L., Hawkins, C., Otaegui, A., Walton, S. (2021): The global smartphone: Beyond a youth technology. – UCL Press, London 105p.

[33] Niu, G.F., Shi, X.H., Zhang, Z.L., Yang, W.C., Jin, S.Y., Sun, X.J. (2022): Can smartphone presence affect cognitive function? Fear of missing out as moderator. – Computers in Human Behavior 136: 6p.

[34] Reading, A. (2009): Memobilia: The mobile phone and the emergence of wearable memories. – In Save As… Digital Memories, Springer, London 15p.

[35] Saritepeci, M., Yildiz Durak, H., Özüdoğru, G., Atman Uslu, N. (2024): Digital literacy and security awareness in online privacy concerns: Gender differences. – Online Information Review 48(5): 983-1001.

[36] Shukla, M., Jain, V., Misra, R. (2022): Factors influencing smartphone-based online shopping: Evidence from young women shoppers. – Asia Pacific Journal of Marketing and Logistics 34(5): 1060-1077.

[37] Skatova, A., McDonald, R., Ma, S., Maple, C. (2023): Unpacking privacy: Valuation of personal data protection. – PLOS ONE 18(5): 21p.

[38] Spath, D., Gausemeier, J., Dumitrescu, R., Winter, J., Steglich, S., Drewel, M. (2023): Digitalisation of society. – In Handbook of Engineering Systems Design, Springer, Cham 27p.

[39] Tehlan, R., Sharma, B.K., Walia, M., Dhillon, D., Saini, D.K. (2021): Assessment of authenticity of face recognition by AI techniques in smartphones. – In Handbook of AI in Engineering Applications, Springer, Cham 12p.

[40] Van Zandwijk, J.P., Boztas, A. (2021): The phone reveals your motion: Digital traces of walking, driving and other movements on iPhones. – Forensic Science International: Digital Investigation 37: 10p.

[41] Vaterlaus, J.M., Aylward, A., Tarabochia, D., Martin, J.D. (2021): “A smartphone made my life easier”: Age of adolescent smartphone acquisition and well-being. – Computers in Human Behavior 114: 10p.

[42] Vezzoli, M., Colombo, A., Marano, A., Zoccatelli, G., Zogmaister, C. (2023): Test for mobile phone dependence: Psychometric properties and confirmatory factor analysis. – Current Psychology 42(1): 714-725.

[43] Zhang, Y., Yang, Y., Lin, Z. (2023): Don’t leak your keys: Exploiting AppSecret leaks in mini-programs. – Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security 12p.

Downloads

Published

2025-08-31

Issue

Section

Articles

How to Cite

PREDICTING DATA LEAK RISK FROM SMARTPHONE DEPENDENCY, DIGITAL MEMORY AND USAGE PATTERNS. (2025). Quantum Journal of Social Sciences and Humanities, 6(4), 666-679. https://doi.org/10.55197/qjssh.v6i4.803