1. Ahadi, S. (2011). Mediating Role of Psychological Empowerment in The Relationships Between Structural Empowerment and Organizational Culture and Workplace Outcomes Among Academics in Malaysian Research Universities. Universiti Putra Malaysia.
2. Albuquerque, U. (2020, May). Forensic accountants are in demand. The Tribune. Retrieved from https://www.tribuneindia.com/news/schools/forensic-accountants-are-in-demand-92479
3. Awang, Z. (2015). Validating the Measurement Model: CFA. In SEM Made Simple (pp. 54–74). Bangi: MPWS Publisher.
4. Azman, N. L. A., & Vaicondam, Y. (2020). Behavioral Intention in Forensic Accounting Services. International Journal of Psychosocial Rehabilitation, 24(2), 1837–1846. https://doi.org/10.37200/IJPR/V24I2/PR200485
5. Bailey, T. (2015). Why Companies Are Afraid to Fight Fraud: Data breach concerns, distrust of technology and loss of reputation. Retrieved September 6, 2020, from https://www.fraud-magazine.com/article.aspx?id=4294988395
6. Baker, & McKenzie. (2013). Preventing and investigating Fraud in the workplace. Risk and Compliance, 1–80.
7. Bashirian, S., Jenabi, E., Khazaei, S., Barati, M., Karimi-Shahanjarini, A., Zareian, S., … Moeini, B. (2020). Factors associated with preventive behaviours of COVID-19 among hospital staff in Iran in 2020: an application of the Protection Motivation Theory. Journal of Hospital Infection, 105, 430–433. https://doi.org/10.1016/j.jhin.2020.04.035
8. Bhasin, D. M. L. (2017). Integrating Corporate Governance and Forensic Accounting: A Study of an Asian Country. International Journal of Management Sciences and Business Research, 6(1), 31–52.
9. Chang, J. (2008). The Role of Anonymity in Deindividuated Behavior : A Comparison of Deindividuation Theory and the Social Identity Model of Deindividuation Effects (SIDE). The Pulse, 6(1), 1–8.
10. Christ, M. H., Sedatole, K. L., & Towry, K. L. (2012). Sticks and Carrots: The Effect of Contract Frame on Effort in Incomplete Contracts. The Accounting Review, 87(6), 1913–1938. https://doi.org/10.2308/accr-50219
11. Chuah, S. H., Rauschnabel, P. A., Krey, N., Nguyen, B., Ramayah, T., & Lade, S. (2016). Wearable technologies : The role of usefulness and visibility in smartwatch adoption. Computers in Human Behavior, 65, 276–284. https://doi.org/10.1016/j.chb.2016.07.047
12. Clubb, A. C., & Hinkle, J. C. (2015). Protection motivation theory as a theoretical framework for understanding the use of protective measures. Criminal Justice Studies, 1–20. https://doi.org/10.1080/1478601X.2015.1050590
13. Fleming, A. S., Kranacher, M.-J., Hermanson, D. R., & Riley, J. R. A. (2016). Financial Reporting Fraud: Public and Private Companies. Journal of Forensic Accounting Research, 1(1), A27–A41. https://doi.org/10.2308/jfar-51475
14. Frazer, L. (2016). Internal Control : Is it a Benefit or Fad to Small Companies ? A Literature Dependency Perspective. Journal of Accounting and Finance, 16(4), 149–161.
15. Hair Jr, Joe F, Matthews, L. M., Matthews, R. L., & Sarstedt, M. (2017). PLS-SEM or CB-SEM: updated guidelines on which method to use. International Journal Multivariate Data Analysis, 1(2), 107–122.
16. Hair Jr, Joseph F, Black, W. C., Babin, B. J., & Anderson, R. E. (2019). Multivariate Data Analysis (8th ed.). Annabel Ainscow.
17. Hallford, D., Austin, D. W., Raes, F., & Takano, K. (2018). A test of the functional avoidance hypothesis in the development of overgeneral autobiographical memory. Memory & Cognition, 1–38. https://doi.org/10.3758/s13421-018-0810-z
18. Hubley, A. M. (2014). Discriminant Validity. In M. A. C. (eds) (Ed.), Encyclopedia of Quality of Life and Well-Being Research. Springer, Dordrecht. https://doi.org/https://doi.org/10.1007/978-94-007-0753-5
19. Ireland, R. D. (2011). Signaling Theory: A Review and Assessment. Journal of Management, 37(1), 39–67. https://doi.org/10.1177/0149206310388419
20. Janmaimool, P. (2017). Application of Protection Motivation Theory to Investigate Sustainable Waste Management Behaviors. Sustainability, 9, 1–16. https://doi.org/10.3390/su9071079
21. Jansen, J., & Schaik, P. Van. (2018). Persuading end users to act cautiously online : a fear appeals study on phishing. Information & Computer Security, 26(3), 264–276. https://doi.org/10.1108/ICS-03-2018-0038
22. Kessler, W. A. (2017). Effectiveness of the Protection Motivation Theory on Small Business Employee Security Risk Behavior. Northcentral University. https://doi.org/10.13140/RG.2.2.20954.95688
23. Kline, R. B. (2016). Principles and Practice of Structural Equation Modeling (4th ed.). New York: The Guilford Press.
24. Lukawitz, J. M., & Steinbart, P. J. (1995). Investor Reaction To Disclosures Of Employee Fraud. Journal of Managerial Issues, 7(3), 358–367. Retrieved from http://www.jstor.org/stable/40604073
25. Nor, N. M., Embong, R., Muda, H., & Yunus, K. (2018). Mediation Role of Holistic Centered Learning Style in the Relationships of Teachers’ Teaching Competency and Students’ Academic Achievement. Journal of Academic Research in Progressive Education and Development.
26. Ozili, P. K. (2020). Forensic Accounting Theory. Finance, Insurance and Risk Management Theory and Practices, 1, 1–16.
27. Popoola, O. M. J., Che-ahmad, A., & Samsudin, R. S. (2013). Forensic Accounting Knowledge and Skills on Task Performance Fraud Risk Assessment: Nigerian Public Sector Experience. In Conference Proceedings of the Global Symposium on Social Sciences. Okinawa.
28. PricewaterhouseCoopers. (2020). Fraud and corruption Malaysia has its say: PwC’s Global Economic Crime and Fraud Survey-Malaysia report. Retrieved from https://www.pwc.com/my/en/assets/publications/2020/PwC-Global-Economic-Crime-and-Fraud-Survey-2020-Malaysia-report.pdf
29. Ruan, W., Kang, S., & Song, H. (2020). Applying protection motivation theory to understand international tourists’ behavioural intentions under the threat of air pollution: A case of Beijing, China. Journal of Current Issues in Tourism, 23(16), 2027–2041. https://doi.org/10.1080/13683500.2020.1743242
30. Sulaiman, S., Danbatta, B. L., & Rahman, R. A. (2014). Figure massaging practices in Malaysian firms: are they fraudulent? In Procedia - Social and Behavioral Sciences (Vol. 145, pp. 29–39). Elsevier B.V. https://doi.org/10.1016/j.sbspro.2014.06.008
31. Weinberger, M., Zhitomirsky-geffet, M., & Bouhnik, D. (2017). Factors affecting users ’ online privacy literacy among students in Israel. Online Information Review, 41(5), 655–671. https://doi.org/10.1108/OIR-05-2016-0127
32. Westcott, R., Ronan, K., Bambrick, H., & Taylor, M. (2017). Expanding protection motivation theory : investigating an application to animal owners and emergency responders in bushfire emergencies. BMC Psychology, 5(13), 1–14. https://doi.org/10.1186/s40359-017-0182-3