1. Acquisti, A., & Grossklags, J. (2005). Privacy and rationality in individual decision making. IEEE security & privacy, 3(1), 26-33. https://doi.org/10.1109/msp.2005.22
2. Ahmad, I., Iqbal, S., Jamil, S., & Kamran, M. (2021). A systematic literature review of e-banking frauds: Current scenario and security techniques. Linguistica Antverpiensia, 2(2), 3509-3517.
3. Alanazi, M., Freeman, M., & Tootell, H. (2022). Exploring the factors that influence the cybersecurity behaviors of young adults. Computers in Human Behavior, 136, 107376. https://doi.org/10.1016/j.chb.2022.107376
4. Alzaidi, M. S., & Agag, G. (2022). The role of trust and privacy concerns in using social media for e-retail services: The moderating role of COVID-19. Journal of Retailing and Consumer Services, 68, 103042. https://doi.org/10.1016/j.jretconser.2022.103042
5. Ansar, S. A., Yadav, J., Dwivedi, S. K., Pandey, A., Srivastava, S. P., Ishrat, M., Khan, M. W., Pandey, D., & Khan, R. A. (2021). A critical analysis of fraud cases on the Internet. Turkish Journal of Computer and Mathematics Education, 12(1), 424-445.
6. Apau, R., & Koranteng, F. N. (2019). Impact of cybercrime and trust on the use of e-commerce technologies: An application of the theory of planned behavior. International Journal of Cyber Criminology, 13(2). http://dx.doi.org/10.5281/zenodo.3697886
7. Asher, N. B., & Gonzalez, C. (2015). Effects of cyber security knowledge on attack detection. Computers in Human Behavior, 48, 51–61. https://doi.org/10.1016/j.chb.2015.01.039
8. Basyir, M. & Harun, H. N. (2022, September 26). Online scam cases increasing in Malaysia. New Straits Times. https://www.nst.com.my/news/nation/2022/09/834531/online-scam-cases-increasing-malaysia
9. Chawla, N., & Kumar, B. (2022). E-commerce and consumer protection in India: the emerging trend. Journal of Business Ethics, 180(2), 581-604. https://doi.org/10.1007/s10551-021-04884-3
10. Chen, D. Q., & Liang, H. (2019). Wishful thinking and IT threat avoidance: An extension to the technology threat avoidance theory. IEEE Transactions on Engineering Management, 66(4), 552-567. https://doi.org/10.1109/TEM.2018.2835461
11. Clark, L. A., & Watson, D. (1995). Constructing validity: Basic issues in objective scale development. Psychological Assessment, 7(3), 309–319. https://doi.org/10.1037/1040-3590.7.3.309.
12. Cole, T. (2023). How are financial institutions enabling online fraud? A developmental online financial fraud policy review. Journal of Financial Crime, (ahead-of-print). https://doi.org/10.1108/JFC-10-2022-0261
13. Cowan, K., Javornik, A., & Jiang, P. (2021). Privacy concerns when using augmented reality face filters? Explaining why and when use avoidance occurs. Psychology & Marketing, 38(10), 1799-1813. https://doi.org/10.1002/mar.21576
14. Crossler, R., & Bélanger, F. (2014). An extended perspective on individual security behaviors. ACM SIGMIS Data Base, 45(4), 51–71. https://doi.org/10.1145/2691517.2691521
15. Das, R., & Patel, M. (2017, 04). Cyber security for social networking sites: Issues, challenges and solutions. International Journal for Research in Applied Science and Engineering Technology, 5, 833-838. https://doi.org/10.22214/ijraset.2017.4153
16. Farooq, A., Ndiege, J. R. A., & Isoaho, J. (2019, September). Factors affecting security behavior of kenyan students: an integration of protection motivation theory and theory of planned behavior. In 2019 IEEE AFRICON (pp. 1-8). IEEE. https://doi.org/10.1109/africon46755.2019.9133764a
17. Fong, F. (2023, February 18). 19-Year-Old Student Lost Nearly RM50k To Love Scam Syndicate. The Rakyat Post. https://www.therakyatpost.com/news/malaysia/2023/02/18/19-year-old-student-lost-nearly-rm50k-to-love-scam-syndicate/
18. Glanz, K., Rimer, B. K., & Viswanath, K. (1992). Health Behavior and Health Education: Theory, Research, and Practice. Annals of Internal Medicine, 116(4), 350. https://doi.org/10.7326/0003-4819-116-4-350_1
19. Gomes, V. (2022a, February 28). E-wallet: Digital payments pivotal to Malaysia’s financial services industry. The Edge Market. https://www.theedgemarkets.com/article/ewallet-digital-payments-pivotal-malaysias-financial-services-industry
20. Gomes, V. (2022b, September 27). Catalysing Malaysia’s digital economy. The Edge Markets. https://www.theedgemarkets.com/article/catalysing-malaysias-digital-economy
21. Graeff, T. R., & Harmon, S. (2002). Collecting and using personal data: consumers’ awareness and concerns. Journal of consumer marketing, 19(4), 302-318. https://doi.org/10.1108/07363760210433627
22. Hamid, M. R. A., Sami, W., & Sidek, M. H. M. (2017). Discriminant Validity Assessment: Use of Fornell & Larcker criterion versus HTMT Criterion. Journal of Physics: Conference Series, 890, 012163. https://doi.org/10.1088/1742-6596/890/1/012163
23. Henseler, J., Ringle, C. M., & Sarstedt, M. (2015). A new criterion for assessing discriminant validity in variance-based structural equation modeling. Journal of the Academy of Marketing Science, 43(1), 115-135. https://doi.org/10.1007/s11747-014-0403-8
24. Ifinedo, P. (2012). Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory. Computers & Security, 31, 83–95. https://doi.org/10.1016/j.cose.2011.10.007.
25. Inan, F. N., Namin, A. S., Pogrund, R. L., & Jones, K. S. (2016). Internet Use and Cybersecurity Concerns of Individuals with Visual Impairments. Journal of Educational Technology & Society, 19(1), 28–40. http://www.jstor.org/stable/jeductechsoci.19.1.28
26. Johnson, D. P. (2017). How attitude toward the behavior, subjective norm, and perceived behavioral control affects information security behavior intention (Doctoral dissertation, Walden University).
https://scholarworks.waldenu.edu/dissertations/4454
27. Kemp, S., & Erades Pérez, N. (2023). Consumer Fraud against Older Adults in Digital Society: Examining Victimization and Its Impact. International Journal of Environmental Research and Public Health, 20(7), 5404. https://doi.org/10.3390/ijerph20075404
28. Kline, R. B. (2011). Principles and practice of structural equation modeling. New York: Guilford Press.
29. Kubilay, E., Raiber, E., Spantig, L., Cahlíková, J., & Kaaria, L. (2023). Can you spot a scam? Measuring and improving scam identification ability. https://dx.doi.org/10.2139/ssrn.4344411
30. Lee, C. (2020, December 9). How the government can protect people with mental health problems from online scam. Money and Mental Health Policy Institute. https://www.moneyandmentalhealth.org/online-scams-mental-health/#:~:text=The%20impact%20of%20an%20online,living%20on%20a%20low%20income.
31. Lee, Y. J. (2020, November 20). Malaysian Loses RM30,000 Within 5 Minutes After Scammers Pull Off Complex Bank Fraud. Says. https://says.com/my/news/malaysian-loses-rm-30000-over-bank-fraud-security
32. Liang, H., & Xue, Y. (2009). Avoidance of information technology threats: A theoretical perspective. MIS quarterly, 71-90. https://doitsa.org/10.2307/20650279
33. Macovei, O. I. (2015). Applying the theory of planned behavior in predicting proenvironmental behaviour: The case of energy conservation. Acta Universitatis Danubius. Œconomica, 11(4), 15-32.
34. Milne, G. R., Rohm, A. J., & Bahl, S. (2004). Consumers’ protection of online privacy and identity. Journal of Consumer Affairs, 38(2), 217-232. https://doi.org/10.1111/j.1745-6606.2004.tb00865.x
35. Norris, G., & Brookes, A. (2021). Personality, emotion and individual differences in response to online fraud. Personality and Individual Differences, 169, 109847. https://doi.org/10.1016/j.paid.2020.109847
36. Persada, S. F., Dalimunte, I., Nadlifatin, R., Miraja, B. A., Redi, A. A. N. P., Prasetyo, Y. T., ... & Lin, S. C. (2021). Revealing the behavior intention of tech-savvy generation Z to use electronic wallet usage: A theory of planned behavior based measurement. International Journal of Business and Society, 22(1), 213-226. https://doi.org/10.33736/ijbs.3171.2021
37. Purkait, S., De, S. K., & Suar, D. (2014). An empirical investigation of the factors that influence Internet user’s ability to correctly identify a phishing website. Information Management & Computer Security, 22(3), 194–234. https://doil.org/10.1108/imcs-05-2013-0032
38. Ray, S., Ow, T., & Kim, S. S. (2011). Security assurance: How online service providers can influence security control perceptions and gain trust. Decision Sciences, 42(2), 391-412. https://doi.org/10.1111/j.1540-5915.2011.00316.x
39. Rogers, R. W. (1975). A protection motivation theory of fear appeals and attitude change1. The journal of psychology, 91(1), 93-114. https://doi.org/10.1080/00223980.1975.9915803
40. Sheehan, K. B., & Hoy, M. G. (2000). Dimensions of privacy concern among online consumers. Journal of public policy & marketing, 19(1), 62-73. https://doi.org/10.1509/jppm.19.1.62.16949
41. Thompson, N., Mcgill, T. J., & Ferreira, X. (2017). Security begins at home: Determinants of home computer and mobile device security behavior. Computers & Security, 70, 376–391. https://doi.org/10.1016/j.cose.2017.07.003
42. Tsai, H., Jiang, M., Alhabash, S., LaRose, R., Rifon, N. J., & Cotten, S. R. (2016). Understanding online safety behaviors: A protection motivation theory perspective. Computers & Security, 59, 138–150. https://doi.org/10.1016/j.cose.2016.02.009
43. Vafaei-Zadeh, A., Thurasamy, R., & Hanifah, H. (2019). Modeling anti-malware use intention of university students in a developing country using the theory of planned behavior. Kybernetes, 48(8), 1565-1585. https://doi.org/10.1108/K-05-2018-0226
44. Verkijika, S. F. (2019). "If you know what to do, will you take action to avoid mobile phishing attacks”: Self-efficacy, anticipated regret, and gender. Computers in Human Behavior, 101, 286–296. https://doi.org/10.1016/j.chb.2019.07.034
45. Williams, E., & Joinson, A. (2020). Developing a measure of information seeking about phishing. Journal of Cybersecurity, 6(1). https://doi.org/10.1093/cybsec/tyaa001
46. Wopperer, W. (2002). Fraud risks in E-commerce transactions. The Geneva papers on risk and insurance. Issues and Practice, 27(3), 383-394. https://doi.org/10.1111/1468-0440.00180
47. Xu, H., Dinev, T., Smith, J., & Hart, P. (2011). Information privacy concerns: Linking individual perceptions with institutional privacy assurances. Journal of the Association for Information Systems, 12(12), 798-824. https://doi.org/10.17705/1jais.00281
48. Yahya, K. (2022, December 22). Raub housewife duped by scammer using e-wallet redemption ruse. New Straits Times. https://www.nst.com.my/news/crime-courts/2022/12/865937/raub-housewife-duped-scammer-using-e-wallet-redemption-ruse
49. Youn, S. (2009). Determinants of online privacy concern and its influence on privacy protection behaviors among young adolescents. Journal of Consumer affairs, 43(3), 389-418. https://doi.org/10.1111/j.1745-6606.2009.01146.x
50. Zwilling, M., Klien, G. H., Lesjak, D., Wiechetek, Ł., Çetin, F., & Basim, H. N. (2020). Cyber security awareness, knowledge and behavior: A comparative study. Journal of Computer Information Systems, 62(1), 82-97. https://doi.org/10.1080/08874417.2020.1712269