Download as pdf or txt
Download as pdf or txt
You are on page 1of 18

STUDENTS’ PERCEPTION OF THE POSSIBLE DRAWBACKS

AND UPHOLDING ISLAMIC ETHICS IN INTERNET USAGE

2 1 3
MUHAMMAD ALFIKRA , GHOZI FIKRI ROBBANI , SITI NUR AISYAH BINTI SHAINI ,
4
ZATUL HANNISA BINTI MOHD KHOIRIL
1-2
Kulliyah of Information Communication Technology, 3Kulliyah of Islamic Revealed

Knowledge and Human Sciences, 4Kulliyyah of Economics and Management Sciences.


Corresponding email : (alfikramuhammad11@gmail.com)

UNGS 2380: Ethics and Fiqh Of Contemporary Issues

Section 3

Dr. Abdul Latif Bin Abd. Razak

28 January 2024
TABLE OF CONTENTS

ABSTRACT 3
INTRODUCTION 4
METHODOLOGY 5
FINDINGS 7
DISCUSSION 13
CONCLUSION 16
REFERENCES 18

2
TITLE: Students’ Perception of The Possible Drawbacks and Upholding Islamic Ethics in
Internet Usage

ABSTRACT:

This study explores the perceptions of students regarding the potential drawbacks associated with
internet usage and the concurrent efforts to uphold Islamic ethics in the digital realm. As the
internet becomes an integral part of academic, social, and professional spheres, concerns arise
about its impact on individuals' ethical values, particularly within the context of Islamic
principles. The research employs a mixed-methods approach, combining qualitative and
quantitative data to gather comprehensive insights from a diverse student population at the
International Islamic University Malaysia (IIUM).

The survey was conducted to delve deeper into the quantitative aspects of students' experiences,
perceptions, and awareness of and implementation of Islamic values and ethics when engaging in
online interactions, including communication on social media platforms. Meanwhile, the
qualitative component explores the students’ opinions on the practice of Islamic ethics to ensure
that everyone benefits from the use of ICT.

The findings of this research aim to contribute to a nuanced understanding of students'


perceptions, shedding light on the challenges they face in maintaining ethical standards while
utilizing the internet. By identifying potential drawbacks and strategies for upholding Islamic
ethics, the study seeks to inform educational institutions, policymakers, and technology
developers on the necessary measures to foster a digital environment that aligns with Islamic
ethical values. Ultimately, the research endeavors to bridge the gap between technological
advancements and the preservation of ethical principles within the framework of Islamic
teachings.

KEYWORDS: Islam, ethics, scam, online, internet.

3
INTRODUCTION
Technology-based tools and resources used for information creation, sharing, transmission,
storing, and exchange are collectively referred to as information and communication
technologies, or ICTs by (UNESCO’s International Institute for Educational Planning,2023).
With the advancement related to the Information and Communication Technology (ICT), various
online crimes have arisen and a few unlucky people have fallen into the trap of the chiselers. Our
team realized the main three components that are quite related to the drawbacks encompass
various components such as scams, security issues, and transparency. Therefore, the purpose of
this study is to explore the students’ perspective and understanding of how they are related to
Islamic ethics.
Scams can be defined as the activity of getting money or any other advantage using an
illegal approach, such as tricking someone by providing false information or making promises
that are too good to be true, mostly through online platforms. For instance, investment scams,
especially in gold investments, are widely regulated on the Telegram platform in Malaysia.
Meanwhile, security issues arise, which can expose us to various risks that would invade our
personal details and so on. Thus, when one careless person engages in unethical behavior that
betrays the confidence of those who depend on or believe in them, security problems result.
Moreover, most consumers only rely on product reviews when making purchases online.
Transparency requires being clear when disseminating information. It can be shown in, for
example, reviews of products bought by customers in the review section of the shop platform.
The negative impact of the possible drawbacks of scamming and security issues can be
speculated to make our personal data vulnerable to security breaches, malware, and
cyber-attacks. Concurrently, transparency would affect purchasing power because of the lack of
trust to procure something. It would lead to a bigger issue, which is a decline in economic
growth. One possible factor contributing to these problems is a lack of knowledge about the
Islamic ethical precepts. To highlight, the objective of the research is to contribute to a nuanced
understanding of students' perceptions, shedding light on the challenges they face in maintaining
ethical standards while utilizing the internet.

4
METHODOLOGY

Research Design
This study employs a mixed-methods approach, combining both qualitative and
quantitative research methods. The use of mixed methods allows for a comprehensive
exploration of students' perceptions regarding the drawbacks of internet usage and their efforts to
uphold Islamic ethics in the digital realm. The study involves a diverse sample of 40 participants
from the International Islamic University Malaysia (IIUM). Participants were selected to
represent various faculties within the university.

Data Collection
1. Quantitative Data: Survey
● A structured survey was conducted to gather quantitative data on students' experiences,
perceptions, and awareness of Islamic values and ethics in online interactions.
● Survey questions covered aspects such as gender, age, kulliyyah (faculty), types of
scams experienced, security practices, transparency expectations in e-commerce, and
adherence to Islamic ethics.
2. Qualitative Data: In-Depth Interviews
● In-depth interviews were conducted to explore students' opinions and insights on the
practice of Islamic ethics in the digital realm.
● Open-ended questions were used to encourage participants to share their thoughts on
challenges and strategies related to upholding Islamic values while using the internet.

Procedure
1. Survey Administration:
● The survey was distributed electronically to the selected participants.
● Participants were briefed on the purpose of the study and provided with informed
consent before participating.
2. In-Depth Interviews:
● Participants were selected based on their survey responses to ensure a diverse range of
experiences.

5
● In-depth interviews were conducted via video calls and in-person sessions, allowing for
a deeper exploration of qualitative insights.

Data Analysis
1. Quantitative Data Analysis:
● Statistical analysis was performed on survey responses using appropriate methods.
● Descriptive statistics were used to analyze demographic data, and inferential statistics
were applied to examine relationships between variables.
2. Qualitative Data Analysis:
● Thematic analysis was employed to identify recurring themes and patterns in
participants' qualitative responses.
● Codes and categories were developed to organize and interpret qualitative data.

Conclusion
The combination of quantitative and qualitative methods aims to provide a holistic
understanding of students' perceptions, challenges, and strategies related to internet usage and
the upholding of Islamic ethics. The findings will contribute valuable insights to educational
institutions, policymakers, and technology developers for fostering a digital environment in line
with Islamic ethical values.

6
FINDINGS

The digital landscape is crucial to understanding the complex dynamics of online


behaviors and perceptions. According to the Islamic perspective, digital technology used by
individuals should be considered as a trust, and users are responsible for its use, including issues
related to data security and privacy (Mohammad & Fauzi, 2021). This study examines various
aspects of students' experiences and attitudes toward internet usage, cybersecurity, and the
application of Islamic ethics in the digital world. The research involves a diverse sample of 40
participants from the International Islamic University Malaysia (IIUM). It combines quantitative
and qualitative methods to understand the intricate tapestry of students' experiences with online
scams, attitudes towards security issues, expectations of transparency in e-commerce, and
adherence to Islamic values.

Figure 1. The result of the survey was to determine the gender of the respondents.

Figure 2. The result of the survey was to determine the age of the respondents.

7
Figure 3. The result of the survey was to determine the kulliyyah of the respondents.

Firstly, the demographic profile can be seen in Figure 1 the survey was conducted with a
group of 40 individuals, out of which the majority were 25 (62.5%) females as compared to 15
(37.5%) males. Most of the respondents 26 (65%) belonged to the age bracket of 23-27 years,
while 14 (35%) respondents were aged between 18-22 years old as stated in figure 2.
Interestingly, based on figure 3 there were no participants over the age of 32, or between the ages
of 28-32. The respondents represented different faculties, with AHAS KIRKHS having the
highest percentage of participants (37.5%) which is 15 participants, followed by KENMS 13
(32.5%) participants and KICT 7 (17.5%) participants. Other faculties such as KAED, KOED,
KOE, and AIKOL had lower representation ranging from 0 participants to 7 (7.5%) participants.

Figure 4. The result of the survey was to determine the type of scams.

8
Figure 5. The result of the survey showed suspicious links.

Figure 6. The result of the survey showed types of platforms.

Furthermore, according to our recent survey in Figure 4, investment scams are the most
common and damaging form of online scamming, as identified by 21 (52.5%) of respondents.
Online shopping scams were reported by 14 (35%) of respondents, while only 4 (10%) and 1
(2.5%) of respondents reported being affected by job scams and dating scams, respectively.
Additionally, a significant 38 (95%) of respondents reported having received suspicious links.
WhatsApp was found to be the most common platform for receiving these links with 20 (50%),
followed by advertisements with 13 (32.5%), email with 4 (10%), and Google with 3 (7.5%).

9
Figure 7. The result of the survey about security issues.

Figure 8. The result of the survey about sharing personal accounts.

Figure 9. The result of the survey about risk in sharing accounts.

10
Regarding security issues, a recent survey in Figure 7 revealed that a large percentage of
respondents acknowledged the importance of regularly changing passwords. 18 (45%) of the
respondents strongly agreed with this practice and an additional 14 (35%) agreed, indicating an
overall awareness of the significance of password security. However, the survey also revealed
that 26 (65%) of respondents admitted to sharing their personal banking passwords with close
friends or family members. Despite this, a significant 32 (80%) of respondents viewed sharing
passwords of accounts that do not belong to the individual as unethical and a potential risk.

Figure 10. The result of the survey about rating on products.

Figure 11. The result of the survey about transparency on product ratings.

11
Figure 12. The result of the survey about the importance of product descriptions.

Moreover, according to Figure 10 on transparency in e-commerce, it was found that an


overwhelming majority of customers 39 (97.5%) rely on reviews or ratings given by other
customers on e-commerce platforms to make informed decisions about the reliability of products
or services. Moreover, 37 (92.5%) of the respondents claimed to maintain transparency while
writing reviews of the products they have purchased. On a scale of 1-10, a substantial 21 (52.5%)
of the participants rated transparency in e-commerce product descriptions as highly important,
with a rating of 10.

Figure 13. The result of the survey about Islamic ethics.

Hence, according to the findings in Figure 13 of a study on Islamic ethics in the digital
world, 35 (87.5%) of the participants claimed to have knowledge about and abide by Islamic

12
values and ethics while interacting online. However, a small fraction of the respondents 5
(12.5%) either showed uncertainty or lacked awareness of these principles.

To conclude, the study provides a nuanced understanding of students' perceptions and


behaviors in the digital realm. Islamic ethics emphasize responsibility, integrity, and the common
welfare in every aspect of life, including the use of digital technology (Mohammad & Fauzi,
2021). Despite high awareness of security issues and the importance of transparency in online
activities, challenges such as password sharing and susceptibility to online scams persist. The
study also underscores the significance of Islamic ethics in the digital space, with a substantial
portion of respondents expressing awareness and implementation. As expressed by Osman Bakar
in his book titled "Ethics and the Philosophy of Technology: An Islamic Perspective," the
integration of Islamic ethics in the digital realm can shape a more ethical and harmonious
technological environment that respects human dignity and applies principles of justice and
honesty. These insights can inform educational institutions and policymakers in developing
strategies to enhance cybersecurity awareness and uphold ethical standards in the digital age,
particularly within the context of Islamic teachings.

DISCUSSION

ICT is known for its nature in changing one's life becoming more convenient and easier
to manage due to many things that can be done at the tip of the finger such as paying bills online,
buying things without even needing to step out of the home and one can even generate side or
monthly income from the use of it. As time passes, the development of ICT brings more and
more benefits to every aspect of human life, especially in this modern era. However, with every
benefit, there comes a potential risk. This part of the study will discuss students’ perceptions of
the possible drawbacks and upholding Islamic ethics in internet usage.

The first drawback of the usage of ICT is online scamming, as many businesses and
transactions now can be done online, thus the chance for it to happen. Certain individuals might
become targets of this type of scam in different ways. One of them is by receiving suspicious
links or what some may call phishing links through platforms they have encountered daily in
their work or personal life such as advertisements, email, Google and most often WhatsApp
(Gillis, 2024)​​. The reason why WhatsApp is the platform most favored by scammers to hunt for

13
their potential victims is that the majority of individuals use this app as a default messaging
platform as it is cost-efficient and has many advanced features substituting the ordinary Short
Message Service (SMS). Usually, the links will come along with a message that pretends to be
from someone we know or ‘representing’ an organization that may be related to an individual in
order to make it sound convincing. There are many types of online scams nowadays, for
example, job scams, dating scams, online shopping scams and the most famous one is investment
scams. This current time where the cost of living can be unbearable at times, has attracted some
people led by their desire and greed to become rich quickly, join the investment as it gives them
a promising picture, the returns would be high and they will be able to live a lavish lifestyle as
what has been advertised by the scammers.

It happened because of the malicious behavior of the scammers who are experts in lying
and lacked empathy towards the victims regardless of their financial background and age. The
money they get from scamming people is considered an income obtained through unlawful
means or business, which to put it in simple word; haram. Consequences from this the victim
experiences losses, and the scammer will be punished by Allah SWT as it is forbidden to seek
sustenance in a wrong way as has been highlighted in the Surah Al-Baqarah verses 188.

)١٨٨( َ‫س بِٱِإْل ْث ِم َوَأنتُ ْم تَ ْعلَ ُمون‬ ۟ ُ‫وا بِ َهٓا ِإلَى ٱ ْل ُح َّك ِام لِتَْأ ُكل‬
ِ ‫وا فَ ِري ۭقًا ِّمنْ َأ ْم ٰ َو ِل ٱلنَّا‬ ۟ ُ‫َواَل تَْأ ُكلُ ٓو ۟ا َأ ْم ٰ َولَ ُكم بَ ْينَ ُكم بِٱ ْلبَ ٰـ ِط ِل َوتُ ْدل‬
“And eat up not one another’s property unjustly (in any illegal way, e.g. stealing, robbing,
deceiving)”

The next drawback is the security issue that puts its users’ privacy details at risk. Security
issues happen when the password of the user’s account is leaked to a third party, maybe with or
without being known by the owner. This is due to the fact that they possibly used to share their
password with their close friends or family members although it is highly not recommended to
do so. Other than that it could be because a hacker gains access through someone’s account by
doing a credential stuffing attack where they use the leaked password and username to log in to
multiple accounts where the unlucky user has reused the same login information. Trusting close
friends and family members seems so easy because they are the last people that most would think
to do the act of betrayal, however, as the saying goes caution is the eldest child of wisdom.

14
Sharing a password allows room for some risks to happen such as loss of ownership and privacy
breaches by the individual with whom they shared it (Garakh, 2023). This act is immoral in
Islam as our religion emphasizes the importance of privacy, which one’s supposed to not violate
at all (Onifade et al., 2019). Prophet Muhammad SAW once said, "He, who looks into a letter
belonging to his brother, looks into the Hellfire" (Abu Daud, Book 8:1480).

It is important for a person to regularly change their passwords, most recommended by


IT experts is three months once. It is also important to note that, one must refrain from using the
same password across different accounts as once the hackers can identify a password for an
account, they might try it for other accounts as well (Wright, 2017). A strong password which
consists of combinations of uppercase and lowercase letters, numbers and symbols will make it
difficult for the third party to try to get access to the account (Sangrey & Wang, 2022). An
advanced move to secure the accounts is by activating two-factor authentication in every app or
platform that requires a password when logging in.

The last one is the lack of transparency especially in e-commerce. Transparency in this
context can be explained as an honest product description by the seller and a sincere review by
customers whose orders have been completed. When purchasing things online, potential
customers depend a lot on the images that are advertised and detailed product descriptions by the
sellers as they cannot see or touch the item in person. Some of the criteria that customers will
take into account before buying a product online are size, material, weight or even taste of a
product. Therefore, for a thorough evaluation, they will go for the review section on the
e-commerce platforms by the previous customers to see whether the products meet the
description from the seller or not. Some of the descriptions and reviews however do not maintain
transparency resulting in a customer feeling disappointed with their purchase and not wanting to
repeat it again (eClear, 2022). The dishonest act could be because the seller wants to gain
maximum profit without considering the effect of this misbehavior towards their business. The
review section, on the other hand, should be utilized by the customer to express their comments
or suggestions about their purchase, the fake or biased reviews could be coming from those who
are closely associated with the sellers with the intention of supporting the seller’s business.
However, as the saying goes, the end doesn't justify the means (PMWP, 2018). Therefore, as a
good believer of Islam and servant to Allah SWT, transparency must be practiced in every aspect

15
of life. Islam preaches that those who do business must always practice honesty when they deal
with their customers as in the Quran:

"Woe to those who cheat the people who, when they receive by measure from men, take full and
otherwise when they measure or weigh for others they cut (the measurement or weight)" (Surat
al-Mutaffifin 83: 1-3).

Practicing Islamic ethics in ICT is very important, especially in the era where most
people use it in their daily lives. It provides guidance on how one should behave with those they
interact with because sometimes we do not know what type of people we deal with behind the
screen. It can be a safe, positive and harmonious environment for the users if everyone practices
Islamic ethics when using ICT as it gives people little to no room to be afraid of the risks such as
scams and security issues. In addition, it can also help people build trust between each other,
especially when dealing with business as everyone maintains transparency.

CONCLUSION

In conclusion, this study at the International Islamic University Malaysia explored


students' perceptions of internet drawbacks and efforts to uphold Islamic ethics. Using a
mixed-methods approach, it revealed insights into challenges faced by students in maintaining
ethical standards online. Findings highlighted prevalent online scams, security contradictions,
transparency concerns, and a substantial awareness of Islamic values. The study emphasizes the
role of Islamic ethics in shaping a more ethical technological environment. This research
provides valuable insights for educational institutions and policymakers to enhance cybersecurity
awareness and uphold ethical standards in the digital age within the context of Islamic teachings.
Addressing Islamic ethics in the digital realm, the findings highlighted a substantial
awareness and implementation of Islamic values among the participants. However, a small
fraction showed uncertainty or lacked awareness of these principles. The study concluded by
emphasizing the role of Islamic ethics in shaping a more ethical and harmonious technological
environment, as outlined by Osman Bakar's perspectives on ethics and the philosophy of
technology.
In light of these findings, recommendations for educational institutions, policymakers,
and technology developers are imperative. Firstly, educational institutions should integrate

16
comprehensive courses on Islamic ethics in their curricula, focusing on the digital context. This
will empower students with the knowledge and principles necessary to navigate the digital world
ethically.
Policymakers should consider developing regulations and guidelines that promote ethical
internet usage, with a particular focus on safeguarding against online scams and enhancing
transparency in e-commerce. Collaborative efforts with educational institutions and technology
developers can ensure the effective implementation of these policies.
Technology developers are encouraged to design platforms and applications with built-in
features that prioritize user security, discourage unethical practices, and promote transparency.
Incorporating Islamic ethical principles into the design process can contribute to a digital
environment that aligns with Islamic teachings.
Overall, these recommendations aim to bridge the gap between technological
advancements and the preservation of ethical principles within the framework of Islamic
teachings. By adopting these measures, stakeholders can collectively contribute to a more
responsible and ethical use of the internet in accordance with Islamic values.

17
REFERENCES

Mohammad, H., & Fauzi, I. (2021). Amanah (Trustworthiness) in Utilizing Digital Technology
from Islamic Perspectives. Journal of Social Studies Education Research,10(3), 120-130.
Osman Bakar. (2003). Islam and the Philosophy of Technology. In Islamic Science and the
Making of the European Renaissance (pp. 185-204). ABC-CLIO.
IIEP-UNESCO. (n.d.). IIEP-UNESCO. https://www.iiep.unesco.org/en

Gillis, A. S. (2024, January 17). What is phishing and how does it work?: Definition from
TechTarget. Security. https://www.techtarget.com/searchsecurity/definition/phishing

Garakh, I. (2023, July 5). The 5 risks of sharing your password - techopedia. Techopedia.
https://www.techopedia.com/the-5-risks-of-sharing-your-password/2/34897

Wright, J. (2017, November 21). Why is it important to change your password?. Small Business
- Chron.com. https://smallbusiness.chron.com/important-change-password-65933.html

Sangrey, D., & Wang, P. (2022). Password change requirements and the effective strength of
passwords. Issues In Information Systems, 23(2), 29–41.
https://doi.org/10.48009/2_iis_2022_103

Onifade, A. B., Akinwande, K. A., & Shehu, H. (2019). Information ethics: Islamic perspectives
on privacy and hacking. Journal of Knowledge & Communication Management,
9(1), 29–44. https://doi.org/10.5958/2277-7946.2019.00004.4

eClear. (2022, October 31). Transparency on product details: Prevent disappointments. eClear
AG.
https://eclear.com/article/more-transparency-on-product-details-in-the-online-shop-preve
nts-disappointments/

PMWP, P. (2018, December 15). IRSYAD USUL AL-FIQH SERIES 26: ISLAMIC LEGAL
MAXIM REGARDING THE METHOD OF ACHIEVING ONE’S GOALS. Pejabat Mufti
Wilayah Persekutuan.
https://muftiwp.gov.my/en/artikel/irsyad-usul-fiqh/2880-irsyad-usul-al-fiqh-series-26-isla
mic-legal-maxim-regarding-the-method-of-reaching-one-s-goals

18

You might also like