Structural Equation Modelling (SEM) analysis in determining the mediation effect of collapse avoidance assurance on threat appraisal and intention in forensic accounting
List of Authors
  • Nur Liyana Adila Azman

Keyword
  • Forensic Accounting, Intention, Collapse Avoidance, Threat Appraisal

Abstract
  • The demand for forensic accounting is increasing, along with the fraud level. However, some firms are reluctant to use forensic accounting for fraud mitigation tool. This issue is due to fear to be found guilty and have to face legal consequences for any wrongdoing relates to the firm. This study implementing the element of fraud treat appraisal of Protection Motivation Theory (PMT) and collapse avoidance assurance of Forensic Accounting Theory to determine the intention of firms to use forensic accounting services. The finding shows that the threat appraisal factor has a significant effect on behavioural intention. Besides, the aspect of collapse avoidance significantly mediates and strengthen the effect of threat appraisal of fraud on the behavioural intention in using forensic accounting. The result indicates that firms are more willing to adopt forensic accounting after being assured that the forensic investigation output will only lead to corrective measures of the wrongdoing and not discipline the firm.

Reference
  • 1. Ahadi, S. (2011). Mediating Role of Psychological Empowerment in The Relationships Between Structural Empowerment and Organizational Culture and Workplace Outcomes Among Academics in Malaysian Research Universities. Universiti Putra Malaysia.

    2. Albuquerque, U. (2020, May). Forensic accountants are in demand. The Tribune. Retrieved from https://www.tribuneindia.com/news/schools/forensic-accountants-are-in-demand-92479

    3. Awang, Z. (2015). Validating the Measurement Model: CFA. In SEM Made Simple (pp. 54–74). Bangi: MPWS Publisher.

    4. Azman, N. L. A., & Vaicondam, Y. (2020). Behavioral Intention in Forensic Accounting Services. International Journal of Psychosocial Rehabilitation, 24(2), 1837–1846. https://doi.org/10.37200/IJPR/V24I2/PR200485

    5. Bailey, T. (2015). Why Companies Are Afraid to Fight Fraud: Data breach concerns, distrust of technology and loss of reputation. Retrieved September 6, 2020, from https://www.fraud-magazine.com/article.aspx?id=4294988395

    6. Baker, & McKenzie. (2013). Preventing and investigating Fraud in the workplace. Risk and Compliance, 1–80.

    7. Bashirian, S., Jenabi, E., Khazaei, S., Barati, M., Karimi-Shahanjarini, A., Zareian, S., … Moeini, B. (2020). Factors associated with preventive behaviours of COVID-19 among hospital staff in Iran in 2020: an application of the Protection Motivation Theory. Journal of Hospital Infection, 105, 430–433. https://doi.org/10.1016/j.jhin.2020.04.035

    8. Bhasin, D. M. L. (2017). Integrating Corporate Governance and Forensic Accounting: A Study of an Asian Country. International Journal of Management Sciences and Business Research, 6(1), 31–52.

    9. Chang, J. (2008). The Role of Anonymity in Deindividuated Behavior : A Comparison of Deindividuation Theory and the Social Identity Model of Deindividuation Effects (SIDE). The Pulse, 6(1), 1–8.

    10. Christ, M. H., Sedatole, K. L., & Towry, K. L. (2012). Sticks and Carrots: The Effect of Contract Frame on Effort in Incomplete Contracts. The Accounting Review, 87(6), 1913–1938. https://doi.org/10.2308/accr-50219

    11. Chuah, S. H., Rauschnabel, P. A., Krey, N., Nguyen, B., Ramayah, T., & Lade, S. (2016). Wearable technologies : The role of usefulness and visibility in smartwatch adoption. Computers in Human Behavior, 65, 276–284. https://doi.org/10.1016/j.chb.2016.07.047

    12. Clubb, A. C., & Hinkle, J. C. (2015). Protection motivation theory as a theoretical framework for understanding the use of protective measures. Criminal Justice Studies, 1–20. https://doi.org/10.1080/1478601X.2015.1050590

    13. Fleming, A. S., Kranacher, M.-J., Hermanson, D. R., & Riley, J. R. A. (2016). Financial Reporting Fraud: Public and Private Companies. Journal of Forensic Accounting Research, 1(1), A27–A41. https://doi.org/10.2308/jfar-51475

    14. Frazer, L. (2016). Internal Control : Is it a Benefit or Fad to Small Companies ? A Literature Dependency Perspective. Journal of Accounting and Finance, 16(4), 149–161.

    15. Hair Jr, Joe F, Matthews, L. M., Matthews, R. L., & Sarstedt, M. (2017). PLS-SEM or CB-SEM: updated guidelines on which method to use. International Journal Multivariate Data Analysis, 1(2), 107–122.

    16. Hair Jr, Joseph F, Black, W. C., Babin, B. J., & Anderson, R. E. (2019). Multivariate Data Analysis (8th ed.). Annabel Ainscow.

    17. Hallford, D., Austin, D. W., Raes, F., & Takano, K. (2018). A test of the functional avoidance hypothesis in the development of overgeneral autobiographical memory. Memory & Cognition, 1–38. https://doi.org/10.3758/s13421-018-0810-z

    18. Hubley, A. M. (2014). Discriminant Validity. In M. A. C. (eds) (Ed.), Encyclopedia of Quality of Life and Well-Being Research. Springer, Dordrecht. https://doi.org/https://doi.org/10.1007/978-94-007-0753-5

    19. Ireland, R. D. (2011). Signaling Theory: A Review and Assessment. Journal of Management, 37(1), 39–67. https://doi.org/10.1177/0149206310388419

    20. Janmaimool, P. (2017). Application of Protection Motivation Theory to Investigate Sustainable Waste Management Behaviors. Sustainability, 9, 1–16. https://doi.org/10.3390/su9071079

    21. Jansen, J., & Schaik, P. Van. (2018). Persuading end users to act cautiously online : a fear appeals study on phishing. Information & Computer Security, 26(3), 264–276. https://doi.org/10.1108/ICS-03-2018-0038

    22. Kessler, W. A. (2017). Effectiveness of the Protection Motivation Theory on Small Business Employee Security Risk Behavior. Northcentral University. https://doi.org/10.13140/RG.2.2.20954.95688

    23. Kline, R. B. (2016). Principles and Practice of Structural Equation Modeling (4th ed.). New York: The Guilford Press.

    24. Lukawitz, J. M., & Steinbart, P. J. (1995). Investor Reaction To Disclosures Of Employee Fraud. Journal of Managerial Issues, 7(3), 358–367. Retrieved from http://www.jstor.org/stable/40604073

    25. Nor, N. M., Embong, R., Muda, H., & Yunus, K. (2018). Mediation Role of Holistic Centered Learning Style in the Relationships of Teachers’ Teaching Competency and Students’ Academic Achievement. Journal of Academic Research in Progressive Education and Development.

    26. Ozili, P. K. (2020). Forensic Accounting Theory. Finance, Insurance and Risk Management Theory and Practices, 1, 1–16.

    27. Popoola, O. M. J., Che-ahmad, A., & Samsudin, R. S. (2013). Forensic Accounting Knowledge and Skills on Task Performance Fraud Risk Assessment: Nigerian Public Sector Experience. In Conference Proceedings of the Global Symposium on Social Sciences. Okinawa.

    28. PricewaterhouseCoopers. (2020). Fraud and corruption Malaysia has its say: PwC’s Global Economic Crime and Fraud Survey-Malaysia report. Retrieved from https://www.pwc.com/my/en/assets/publications/2020/PwC-Global-Economic-Crime-and-Fraud-Survey-2020-Malaysia-report.pdf

    29. Ruan, W., Kang, S., & Song, H. (2020). Applying protection motivation theory to understand international tourists’ behavioural intentions under the threat of air pollution: A case of Beijing, China. Journal of Current Issues in Tourism, 23(16), 2027–2041. https://doi.org/10.1080/13683500.2020.1743242

    30. Sulaiman, S., Danbatta, B. L., & Rahman, R. A. (2014). Figure massaging practices in Malaysian firms: are they fraudulent? In Procedia - Social and Behavioral Sciences (Vol. 145, pp. 29–39). Elsevier B.V. https://doi.org/10.1016/j.sbspro.2014.06.008

    31. Weinberger, M., Zhitomirsky-geffet, M., & Bouhnik, D. (2017). Factors affecting users ’ online privacy literacy among students in Israel. Online Information Review, 41(5), 655–671. https://doi.org/10.1108/OIR-05-2016-0127

    32. Westcott, R., Ronan, K., Bambrick, H., & Taylor, M. (2017). Expanding protection motivation theory : investigating an application to animal owners and emergency responders in bushfire emergencies. BMC Psychology, 5(13), 1–14. https://doi.org/10.1186/s40359-017-0182-3