{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T17:47:25Z","timestamp":1769881645019,"version":"3.49.0"},"reference-count":158,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"name":"University Malaya Research Grant Program under the Postgraduate Research Grant","award":["PG124-2015B"],"award-info":[{"award-number":["PG124-2015B"]}]},{"name":"Adjunct Professor Program, Batch 3 from the Faculty of Computer Science, Universitas Brawijaya, Indonesia","award":["01479\/UN10.A0101\/B\/TU\/2024"],"award-info":[{"award-number":["01479\/UN10.A0101\/B\/TU\/2024"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/access.2025.3555548","type":"journal-article","created":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T06:08:25Z","timestamp":1743142105000},"page":"70598-70615","source":"Crossref","is-referenced-by-count":3,"title":["Navigating Social Media: How Offline Ethics, Online Etiquette, and Protection Behavior Shape Self-Disclosure"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2718-0892","authenticated-orcid":false,"given":"Azma","family":"Alina Ali Zani","sequence":"first","affiliation":[{"name":"Department of Information Systems, Universiti Malaya, Kuala Lumpur, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5420-0452","authenticated-orcid":false,"given":"Azah Anir","family":"Norman","sequence":"additional","affiliation":[{"name":"Department of Information Systems, Universiti Malaya, Kuala Lumpur, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0804-3916","authenticated-orcid":false,"given":"Norjihan","family":"Abdul Ghani","sequence":"additional","affiliation":[{"name":"Department of Information Systems, Universiti Malaya, Kuala Lumpur, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7853-741X","authenticated-orcid":false,"given":"Riswan","family":"Septriayadi Sianturi","sequence":"additional","affiliation":[{"name":"Department of Information Systems, Universitas Brawijaya, Malang, East Java, Indonesia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1080\/0144929x.2022.2152366"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1057\/9781137312716"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025747"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1080\/0144929x.2024.2304613"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.2217\/fon-2021-1366"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.04.036"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2020.106363"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2012.0328"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.childyouth.2020.105695"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.59588\/2350-8329.1339"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.06.028"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3390\/bs8060058"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998269"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3017431"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2958.1976.tb00494.x"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1177\/14614448241247313"},{"key":"ref17","volume-title":"Self-Disclosure: Theory, Research, and Therapy","volume":"1987","author":"Derlaga","year":"2013"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2020.102188"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2019.09.004"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.04.006"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2025.104102"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2531602.2531672"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1111\/hcre.12053"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2024.104017"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2023.107976"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2013.01.033"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2018.01.018"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2012.10.002"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.01.012"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.pubrev.2015.03.001"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2022.101176"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1080\/10572252.2014.850854"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/S2155-8256(24)00055-3"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.05.059"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.11.018"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1080\/01614576.1997.11074177"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/242857.242875"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2014.0168"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.104025"},{"key":"ref40","volume-title":"C3Matrix\u2014A companion to the augmented technology literacy standards for students","author":"Pruitt-Mentle","year":"2001"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.01.046"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.istr.2009.10.007"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1108\/itp-10-2014-0232"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.scoms.2014.03.012"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/pst.2018.8514186"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2020.106382"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1080\/1369118x.2018.1428652"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.promfg.2015.07.181"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1207\/s15327957pspr0402_05"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.12.030"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.05.043"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.06.006"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.10.010"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.06.008"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2015.08.006"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2011.11.008"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/b978-0-08-097086-8.64122-3"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.11.033"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/j.copsyc.2019.08.003"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/3328529.3328560"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2023.108018"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1016\/j.apjon.2024.100503"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-014-2346-x"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1108\/nbri-02-2015-0005"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1057\/jit.2010.6"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1080\/0144929x.2019.1584644"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2010.15"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2019.04.006"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8903247"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/3400806.3400810"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2021.11.022"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1145\/1125451.1125674"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2021.530722"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.04.055"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.08.063"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1016\/j.avb.2015.07.011"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1111\/jcom.12276"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1177\/0093650218800915"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1080\/1369118x.2016.1229001"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2015.08.012"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1080\/10580530.2015.1117842"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1108\/mrr-04-2013-0085"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2021.10.002"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2017.1394083"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2021.102744"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.02.009"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1016\/j.adolescence.2011.06.007"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.01.003"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2020.113323"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2017.05.003"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2022.107188"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1016\/0022-1031(83)90023-9"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.02.010"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1111\/0272-4332.205065"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2018.01.028"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2018.11.003"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1108\/lht-04-2015-0033"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1080\/21532974.2011.10784684"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.7821\/naer.2022.1.848"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1108\/13563289910288465"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.3390\/ijerph18031212"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1016\/j.sbspro.2011.11.299"},{"key":"ref103","volume-title":"Netiquette","author":"Shea","year":"1994"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.7249\/r3283"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1007\/978-90-481-2370-4"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2019.102070"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.14349\/rlp.2022.v54.12"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.4324\/9780429352621"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2016.03.005"},{"issue":"2","key":"ref110","first-page":"145","article-title":"Akhlak dalam perspektif alqur\u0101n (kajian Terhadap Tafs\u012br almar\u0101g\u012b Karya Ahmad Mustafa al-mar\u0101g\u012b)","volume":"11","author":"Qodariyah","year":"2017","journal-title":"J. Al-Fath"},{"key":"ref111","first-page":"2464","article-title":"A proposed model of akhlak from al-ghazali discourse","volume":"2028","author":"Ahmat","year":"2018","journal-title":"Turkish Online J. Design, Art Commun."},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-1494-6_3"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1108\/14779961011071088"},{"key":"ref114","first-page":"7","article-title":"Al-Akhlaq (Ethics) perceptions in Islam?: A textual interpretation through imam","volume-title":"Proc. Int. Conf. Empower. Islam. Civiliz.","author":"Al-Shafi\u2019i"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1016\/j.sbspro.2013.12.768"},{"key":"ref116","doi-asserted-by":"crossref","DOI":"10.2307\/j.ctvk8w1zv","volume-title":"Islamic Bus. Ethics","author":"Beekun","year":"1997"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.24035\/ijit.19.2021.195"},{"key":"ref118","volume-title":"The Refinement of Character (Tahdhib Al-Akhlaq)","author":"Miskawayh","year":"2002"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.7763\/ijssh.2013.v3.293"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1007\/s11245-021-09792-9"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.37231\/jimk.2015.9.0.82"},{"key":"ref122","volume-title":"Revival of Religious Learnings: Imam Al-Ghazzali\u2019s Ihya Ulum-Id-Din","volume":"3","year":"1993"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1163\/9789004451131"},{"key":"ref124","volume-title":"The refinement of character=Tahdhi\u012bb al-akhla\u0101q","author":"Ibn","year":"2002"},{"key":"ref125","first-page":"1","article-title":"The impact of al-Ghazali\u2019s virtues on organizational commitment and performance: A case study at private education institutions in Kurdistan region of Iraq","volume-title":"Proc. Int. Conf. Accounting, Bus., Econ. Politics","author":"Budur"},{"key":"ref126","volume-title":"Ghazali\u2019s Theory of Virtue","author":"Sherif","year":"1975"},{"key":"ref127","volume-title":"Partial Least Squares Structural Equation Modeling (PLS-SEM) using SmartPLS 3.0: An Updated and Practical Guide to Statistical Analysis","author":"Ramayah","year":"2018"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.47263\/jasem.4(2)01"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/cse.2009.483"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2018.10.017"},{"key":"ref131","volume-title":"Research Methods for Business: A Skill-building Approach","author":"Sekaran","year":"2010"},{"issue":"385","key":"ref132","first-page":"71","article-title":"Research design","volume":"86","author":"Creswell","year":"1990","journal-title":"N. Z. Dent. J."},{"key":"ref133","first-page":"1","volume-title":"Best practices on social networking sites (SNSs)","author":"Apau","year":"2011"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2923.2007.02793.x"},{"key":"ref135","volume-title":"Safeguard Children From Cyberbullying, CyberSecurity Malaysia","year":"2014"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-397181-4.00008-6"},{"key":"ref137","first-page":"28","volume-title":"Nat. Centre for Sustain","author":"Siber","year":"2017"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1016\/j.pse.2016.04.001"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1016\/j.childyouth.2014.04.002"},{"key":"ref140","first-page":"353","article-title":"Rediscovering the netiquette?: The role of propagated values and personal patterns in defining self-identity of the Internet user","volume":"8","author":"Pr\u0229gowski","year":"2009","journal-title":"Obs. J."},{"key":"ref141","first-page":"374","volume-title":"A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM)","author":"Hair","year":"2016"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1007\/s11747-014-0403-8"},{"key":"ref143","first-page":"3088","article-title":"Predictive validity and formative measurement in structural equation modeling: Embracing practical relevance","volume-title":"Proc. Int. Conf. Inf. Syst. Reshaping Soc. Through Inf. Syst. Des.","volume":"4","author":"Becker"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.2753\/mtp1069-6679190202"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-8551.2006.00500.x"},{"key":"ref146","first-page":"295","article-title":"The partial least squares approach to structural equation modeling","volume-title":"Modern Methods for business Research","author":"Chin","year":"1998"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2010.01522.x"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/tpc.2022.3184428"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300256"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376854"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-020-04635-w"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1080\/0144929x.2020.1831608"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.11.004"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2015.12.051"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.05.023"},{"key":"ref156","volume-title":"Statistical Power Analysis for the Behavioral Sciences","author":"Cohen","year":"1988"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-6684-6859-3.ch009"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.103071"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10820123\/10943132.pdf?arnumber=10943132","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,9]],"date-time":"2025-05-09T18:02:19Z","timestamp":1746813739000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10943132\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":158,"URL":"https:\/\/doi.org\/10.1109\/access.2025.3555548","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}