Awareness on online financial scams: A case study in Malaysia
List of Authors
  • Wen Xian, Lee , Yoke Chin, Kuah

Keyword
  • Online, Financial Scam, Malaysia

Abstract
  • Malaysia has seen an increase in digitization in almost all aspects of its people's daily lives, especially in the usage of online banking or e-wallet transactions. However, a rise in online financial scams in Malaysia has been reported recently. People have become unaware of the transparency of their information as a result of their reliance on the Internet. This study aims to identify the awareness on online financial scam in Malaysia using the Technology Threat Avoidance Theory (TTAT) and Theory of Planned Behavior (TPB). Independent variables included are cybersecurity knowledge, perceived severity, subjective norm, as well as security and privacy concerns. The data collection method in this study is primary data and 384 sets survey questionnaires were collected. Partial Least Square Structural Equation Modelling (PLS-SEM) software was used to generate the statistical analysis. The results showed that cybersecurity knowledge, perceived severity, and subjective norm have a significant relationship with the awareness on online financial scam, while security and privacy concerns have an insignificant relationship with the awareness on online financial scam. This study will provide an insight for Malaysians, particularly companies, and policymakers so that they can better understand the ways to increase awareness on online financial scam.

Reference
  • 1. Acquisti, A., & Grossklags, J. (2005). Privacy and rationality in individual decision making. IEEE security & privacy, 3(1), 26-33. https://doi.org/10.1109/msp.2005.22

    2. Ahmad, I., Iqbal, S., Jamil, S., & Kamran, M. (2021). A systematic literature review of e-banking frauds: Current scenario and security techniques. Linguistica Antverpiensia, 2(2), 3509-3517.

    3. Alanazi, M., Freeman, M., & Tootell, H. (2022). Exploring the factors that influence the cybersecurity behaviors of young adults. Computers in Human Behavior, 136, 107376. https://doi.org/10.1016/j.chb.2022.107376

    4. Alzaidi, M. S., & Agag, G. (2022). The role of trust and privacy concerns in using social media for e-retail services: The moderating role of COVID-19. Journal of Retailing and Consumer Services, 68, 103042. https://doi.org/10.1016/j.jretconser.2022.103042

    5. Ansar, S. A., Yadav, J., Dwivedi, S. K., Pandey, A., Srivastava, S. P., Ishrat, M., Khan, M. W., Pandey, D., & Khan, R. A. (2021). A critical analysis of fraud cases on the Internet. Turkish Journal of Computer and Mathematics Education, 12(1), 424-445.

    6. Apau, R., & Koranteng, F. N. (2019). Impact of cybercrime and trust on the use of e-commerce technologies: An application of the theory of planned behavior. International Journal of Cyber Criminology, 13(2). http://dx.doi.org/10.5281/zenodo.3697886

    7. Asher, N. B., & Gonzalez, C. (2015). Effects of cyber security knowledge on attack detection. Computers in Human Behavior, 48, 51–61. https://doi.org/10.1016/j.chb.2015.01.039

    8. Basyir, M. & Harun, H. N. (2022, September 26). Online scam cases increasing in Malaysia. New Straits Times. https://www.nst.com.my/news/nation/2022/09/834531/online-scam-cases-increasing-malaysia

    9. Chawla, N., & Kumar, B. (2022). E-commerce and consumer protection in India: the emerging trend. Journal of Business Ethics, 180(2), 581-604. https://doi.org/10.1007/s10551-021-04884-3

    10. Chen, D. Q., & Liang, H. (2019). Wishful thinking and IT threat avoidance: An extension to the technology threat avoidance theory. IEEE Transactions on Engineering Management, 66(4), 552-567. https://doi.org/10.1109/TEM.2018.2835461

    11. Clark, L. A., & Watson, D. (1995). Constructing validity: Basic issues in objective scale development. Psychological Assessment, 7(3), 309–319. https://doi.org/10.1037/1040-3590.7.3.309.

    12. Cole, T. (2023). How are financial institutions enabling online fraud? A developmental online financial fraud policy review. Journal of Financial Crime, (ahead-of-print). https://doi.org/10.1108/JFC-10-2022-0261

    13. Cowan, K., Javornik, A., & Jiang, P. (2021). Privacy concerns when using augmented reality face filters? Explaining why and when use avoidance occurs. Psychology & Marketing, 38(10), 1799-1813. https://doi.org/10.1002/mar.21576

    14. Crossler, R., & Bélanger, F. (2014). An extended perspective on individual security behaviors. ACM SIGMIS Data Base, 45(4), 51–71. https://doi.org/10.1145/2691517.2691521

    15. Das, R., & Patel, M. (2017, 04). Cyber security for social networking sites: Issues, challenges and solutions. International Journal for Research in Applied Science and Engineering Technology, 5, 833-838. https://doi.org/10.22214/ijraset.2017.4153

    16. Farooq, A., Ndiege, J. R. A., & Isoaho, J. (2019, September). Factors affecting security behavior of kenyan students: an integration of protection motivation theory and theory of planned behavior. In 2019 IEEE AFRICON (pp. 1-8). IEEE. https://doi.org/10.1109/africon46755.2019.9133764a

    17. Fong, F. (2023, February 18). 19-Year-Old Student Lost Nearly RM50k To Love Scam Syndicate. The Rakyat Post. https://www.therakyatpost.com/news/malaysia/2023/02/18/19-year-old-student-lost-nearly-rm50k-to-love-scam-syndicate/

    18. Glanz, K., Rimer, B. K., & Viswanath, K. (1992). Health Behavior and Health Education: Theory, Research, and Practice. Annals of Internal Medicine, 116(4), 350. https://doi.org/10.7326/0003-4819-116-4-350_1

    19. Gomes, V. (2022a, February 28). E-wallet: Digital payments pivotal to Malaysia’s financial services industry. The Edge Market. https://www.theedgemarkets.com/article/ewallet-digital-payments-pivotal-malaysias-financial-services-industry

    20. Gomes, V. (2022b, September 27). Catalysing Malaysia’s digital economy. The Edge Markets. https://www.theedgemarkets.com/article/catalysing-malaysias-digital-economy

    21. Graeff, T. R., & Harmon, S. (2002). Collecting and using personal data: consumers’ awareness and concerns. Journal of consumer marketing, 19(4), 302-318. https://doi.org/10.1108/07363760210433627

    22. Hamid, M. R. A., Sami, W., & Sidek, M. H. M. (2017). Discriminant Validity Assessment: Use of Fornell & Larcker criterion versus HTMT Criterion. Journal of Physics: Conference Series, 890, 012163. https://doi.org/10.1088/1742-6596/890/1/012163

    23. Henseler, J., Ringle, C. M., & Sarstedt, M. (2015). A new criterion for assessing discriminant validity in variance-based structural equation modeling. Journal of the Academy of Marketing Science, 43(1), 115-135. https://doi.org/10.1007/s11747-014-0403-8

    24. Ifinedo, P. (2012). Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory. Computers & Security, 31, 83–95. https://doi.org/10.1016/j.cose.2011.10.007.

    25. Inan, F. N., Namin, A. S., Pogrund, R. L., & Jones, K. S. (2016). Internet Use and Cybersecurity Concerns of Individuals with Visual Impairments. Journal of Educational Technology & Society, 19(1), 28–40. http://www.jstor.org/stable/jeductechsoci.19.1.28

    26. Johnson, D. P. (2017). How attitude toward the behavior, subjective norm, and perceived behavioral control affects information security behavior intention (Doctoral dissertation, Walden University).

    https://scholarworks.waldenu.edu/dissertations/4454

    27. Kemp, S., & Erades Pérez, N. (2023). Consumer Fraud against Older Adults in Digital Society: Examining Victimization and Its Impact. International Journal of Environmental Research and Public Health, 20(7), 5404. https://doi.org/10.3390/ijerph20075404

    28. Kline, R. B. (2011). Principles and practice of structural equation modeling. New York: Guilford Press.

    29. Kubilay, E., Raiber, E., Spantig, L., Cahlíková, J., & Kaaria, L. (2023). Can you spot a scam? Measuring and improving scam identification ability. https://dx.doi.org/10.2139/ssrn.4344411

    30. Lee, C. (2020, December 9). How the government can protect people with mental health problems from online scam. Money and Mental Health Policy Institute. https://www.moneyandmentalhealth.org/online-scams-mental-health/#:~:text=The%20impact%20of%20an%20online,living%20on%20a%20low%20income.

    31. Lee, Y. J. (2020, November 20). Malaysian Loses RM30,000 Within 5 Minutes After Scammers Pull Off Complex Bank Fraud. Says. https://says.com/my/news/malaysian-loses-rm-30000-over-bank-fraud-security

    32. Liang, H., & Xue, Y. (2009). Avoidance of information technology threats: A theoretical perspective. MIS quarterly, 71-90. https://doitsa.org/10.2307/20650279

    33. Macovei, O. I. (2015). Applying the theory of planned behavior in predicting proenvironmental behaviour: The case of energy conservation. Acta Universitatis Danubius. Œconomica, 11(4), 15-32.

    34. Milne, G. R., Rohm, A. J., & Bahl, S. (2004). Consumers’ protection of online privacy and identity. Journal of Consumer Affairs, 38(2), 217-232. https://doi.org/10.1111/j.1745-6606.2004.tb00865.x

    35. Norris, G., & Brookes, A. (2021). Personality, emotion and individual differences in response to online fraud. Personality and Individual Differences, 169, 109847. https://doi.org/10.1016/j.paid.2020.109847

    36. Persada, S. F., Dalimunte, I., Nadlifatin, R., Miraja, B. A., Redi, A. A. N. P., Prasetyo, Y. T., ... & Lin, S. C. (2021). Revealing the behavior intention of tech-savvy generation Z to use electronic wallet usage: A theory of planned behavior based measurement. International Journal of Business and Society, 22(1), 213-226. https://doi.org/10.33736/ijbs.3171.2021

    37. Purkait, S., De, S. K., & Suar, D. (2014). An empirical investigation of the factors that influence Internet user’s ability to correctly identify a phishing website. Information Management & Computer Security, 22(3), 194–234. https://doil.org/10.1108/imcs-05-2013-0032

    38. Ray, S., Ow, T., & Kim, S. S. (2011). Security assurance: How online service providers can influence security control perceptions and gain trust. Decision Sciences, 42(2), 391-412. https://doi.org/10.1111/j.1540-5915.2011.00316.x

    39. Rogers, R. W. (1975). A protection motivation theory of fear appeals and attitude change1. The journal of psychology, 91(1), 93-114. https://doi.org/10.1080/00223980.1975.9915803

    40. Sheehan, K. B., & Hoy, M. G. (2000). Dimensions of privacy concern among online consumers. Journal of public policy & marketing, 19(1), 62-73. https://doi.org/10.1509/jppm.19.1.62.16949

    41. Thompson, N., Mcgill, T. J., & Ferreira, X. (2017). Security begins at home: Determinants of home computer and mobile device security behavior. Computers & Security, 70, 376–391. https://doi.org/10.1016/j.cose.2017.07.003

    42. Tsai, H., Jiang, M., Alhabash, S., LaRose, R., Rifon, N. J., & Cotten, S. R. (2016). Understanding online safety behaviors: A protection motivation theory perspective. Computers & Security, 59, 138–150. https://doi.org/10.1016/j.cose.2016.02.009

    43. Vafaei-Zadeh, A., Thurasamy, R., & Hanifah, H. (2019). Modeling anti-malware use intention of university students in a developing country using the theory of planned behavior. Kybernetes, 48(8), 1565-1585. https://doi.org/10.1108/K-05-2018-0226

    44. Verkijika, S. F. (2019). "If you know what to do, will you take action to avoid mobile phishing attacks”: Self-efficacy, anticipated regret, and gender. Computers in Human Behavior, 101, 286–296. https://doi.org/10.1016/j.chb.2019.07.034

    45. Williams, E., & Joinson, A. (2020). Developing a measure of information seeking about phishing. Journal of Cybersecurity, 6(1). https://doi.org/10.1093/cybsec/tyaa001

    46. Wopperer, W. (2002). Fraud risks in E-commerce transactions. The Geneva papers on risk and insurance. Issues and Practice, 27(3), 383-394. https://doi.org/10.1111/1468-0440.00180

    47. Xu, H., Dinev, T., Smith, J., & Hart, P. (2011). Information privacy concerns: Linking individual perceptions with institutional privacy assurances. Journal of the Association for Information Systems, 12(12), 798-824. https://doi.org/10.17705/1jais.00281

    48. Yahya, K. (2022, December 22). Raub housewife duped by scammer using e-wallet redemption ruse. New Straits Times. https://www.nst.com.my/news/crime-courts/2022/12/865937/raub-housewife-duped-scammer-using-e-wallet-redemption-ruse

    49. Youn, S. (2009). Determinants of online privacy concern and its influence on privacy protection behaviors among young adolescents. Journal of Consumer affairs, 43(3), 389-418. https://doi.org/10.1111/j.1745-6606.2009.01146.x

    50. Zwilling, M., Klien, G. H., Lesjak, D., Wiechetek, Ł., Çetin, F., & Basim, H. N. (2020). Cyber security awareness, knowledge and behavior: A comparative study. Journal of Computer Information Systems, 62(1), 82-97. https://doi.org/10.1080/08874417.2020.1712269