Awareness On Online Financial Scams: A Case Study in Malaysia

  • Chin Yoke Kuah Assistant Professor
  • Xian Wen Lee
  • Hia Nya Lim
  • Yi Yan Vivian Lim


Malaysia has seen an increase in digitization in almost all aspects of its people's daily lives, especially in the usage of online banking or e-wallet transactions. However, a rise in online financial scams in Malaysia has been reported recently. People have become unaware of the transparency of their information as a result of their reliance on the Internet. This study aims to identify the awareness on online financial scam in Malaysia using the Technology Threat Avoidance Theory (TTAT) and Theory of Planned Behavior (TPB). Independent variables included are cybersecurity knowledge, perceived severity, subjective norm, as well as security and privacy concerns. The data collection method in this study is primary data and 384 sets survey questionnaires were collected. Partial Least Square Structural Equation Modelling (PLS-SEM) software was used to generate the statistical analysis. The results showed that cybersecurity knowledge, perceived severity, and subjective norm have a significant relationship with the awareness on online financial scam, while security and privacy concerns have an insignificant relationship with the awareness on online financial scam. This study will provide an insight for Malaysians, particularly companies, and policymakers so that they can better understand the ways to increase awareness on online financial scam.


Acquisti, A., & Grossklags, J. (2005). Privacy and rationality in individual decision making. IEEE security & privacy, 3(1), 26-33.
Ahmad, I., Iqbal, S., Jamil, S., & Kamran, M. (2021). A systematic literature review of e-banking frauds: Current scenario and security techniques. Linguistica Antverpiensia, 2(2), 3509-3517.
Alanazi, M., Freeman, M., & Tootell, H. (2022). Exploring the factors that influence the cybersecurity behaviors of young adults. Computers in Human Behavior, 136, 107376.
Alzaidi, M. S., & Agag, G. (2022). The role of trust and privacy concerns in using social media for e-retail services: The moderating role of COVID-19. Journal of Retailing and Consumer Services, 68, 103042.
Ansar, S. A., Yadav, J., Dwivedi, S. K., Pandey, A., Srivastava, S. P., Ishrat, M., Khan, M. W., Pandey, D., & Khan, R. A. (2021). A critical analysis of fraud cases on the Internet. Turkish Journal of Computer and Mathematics Education, 12(1), 424-445.
Apau, R., & Koranteng, F. N. (2019). Impact of cybercrime and trust on the use of e-commerce technologies: An application of the theory of planned behavior. International Journal of Cyber Criminology, 13(2).
Asher, N. B., & Gonzalez, C. (2015). Effects of cyber security knowledge on attack detection. Computers in Human Behavior, 48, 51–61.
Basyir, M. & Harun, H. N. (2022, September 26). Online scam cases increasing in Malaysia. New Straits Times.
Chawla, N., & Kumar, B. (2022). E-commerce and consumer protection in India: the emerging trend. Journal of Business Ethics, 180(2), 581-604.
Chen, D. Q., & Liang, H. (2019). Wishful thinking and IT threat avoidance: An extension to the technology threat avoidance theory. IEEE Transactions on Engineering Management, 66(4), 552-567.
Clark, L. A., & Watson, D. (1995). Constructing validity: Basic issues in objective scale development. Psychological Assessment, 7(3), 309–319.
Cole, T. (2023). How are financial institutions enabling online fraud? A developmental online financial fraud policy review. Journal of Financial Crime, (ahead-of-print).
Cowan, K., Javornik, A., & Jiang, P. (2021). Privacy concerns when using augmented reality face filters? Explaining why and when use avoidance occurs. Psychology & Marketing, 38(10), 1799-1813.
Crossler, R., & Bélanger, F. (2014). An extended perspective on individual security behaviors. ACM SIGMIS Data Base, 45(4), 51–71.
Das, R., & Patel, M. (2017, 04). Cyber security for social networking sites: Issues, challenges and solutions. International Journal for Research in Applied Science and Engineering Technology, 5, 833-838.
Farooq, A., Ndiege, J. R. A., & Isoaho, J. (2019, September). Factors affecting security behavior of kenyan students: an integration of protection motivation theory and theory of planned behavior. In 2019 IEEE AFRICON (pp. 1-8). IEEE.
Fong, F. (2023, February 18). 19-Year-Old Student Lost Nearly RM50k To Love Scam Syndicate. The Rakyat Post.
Glanz, K., Rimer, B. K., & Viswanath, K. (1992). Health Behavior and Health Education: Theory, Research, and Practice. Annals of Internal Medicine, 116(4), 350.
Gomes, V. (2022a, February 28). E-wallet: Digital payments pivotal to Malaysia’s financial services industry. The Edge Market.
Gomes, V. (2022b, September 27). Catalysing Malaysia’s digital economy. The Edge Markets.
Graeff, T. R., & Harmon, S. (2002). Collecting and using personal data: consumers’ awareness and concerns. Journal of consumer marketing, 19(4), 302-318.
Hamid, M. R. A., Sami, W., & Sidek, M. H. M. (2017). Discriminant Validity Assessment: Use of Fornell & Larcker criterion versus HTMT Criterion. Journal of Physics: Conference Series, 890, 012163.
Henseler, J., Ringle, C. M., & Sarstedt, M. (2015). A new criterion for assessing discriminant validity in variance-based structural equation modeling. Journal of the Academy of Marketing Science, 43(1), 115-135.
Ifinedo, P. (2012). Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory. Computers & Security, 31, 83–95.
Inan, F. N., Namin, A. S., Pogrund, R. L., & Jones, K. S. (2016). Internet Use and Cybersecurity Concerns of Individuals with Visual Impairments. Journal of Educational Technology & Society, 19(1), 28–40.
Johnson, D. P. (2017). How attitude toward the behavior, subjective norm, and perceived behavioral control affects information security behavior intention (Doctoral dissertation, Walden University).
Kemp, S., & Erades Pérez, N. (2023). Consumer Fraud against Older Adults in Digital Society: Examining Victimization and Its Impact. International Journal of Environmental Research and Public Health, 20(7), 5404.
Kline, R. B. (2011). Principles and practice of structural equation modeling. New York: Guilford Press.
Kubilay, E., Raiber, E., Spantig, L., Cahlíková, J., & Kaaria, L. (2023). Can you spot a scam? Measuring and improving scam identification ability.
Lee, C. (2020, December 9). How the government can protect people with mental health problems from online scam. Money and Mental Health Policy Institute.,living%20on%20a%20low%20income.
Lee, Y. J. (2020, November 20). Malaysian Loses RM30,000 Within 5 Minutes After Scammers Pull Off Complex Bank Fraud. Says.
Liang, H., & Xue, Y. (2009). Avoidance of information technology threats: A theoretical perspective. MIS quarterly, 71-90.
Macovei, O. I. (2015). Applying the theory of planned behavior in predicting proenvironmental behaviour: The case of energy conservation. Acta Universitatis Danubius. Œconomica, 11(4), 15-32.
Milne, G. R., Rohm, A. J., & Bahl, S. (2004). Consumers’ protection of online privacy and identity. Journal of Consumer Affairs, 38(2), 217-232.
Norris, G., & Brookes, A. (2021). Personality, emotion and individual differences in response to online fraud. Personality and Individual Differences, 169, 109847.
Persada, S. F., Dalimunte, I., Nadlifatin, R., Miraja, B. A., Redi, A. A. N. P., Prasetyo, Y. T., ... & Lin, S. C. (2021). Revealing the behavior intention of tech-savvy generation Z to use electronic wallet usage: A theory of planned behavior based measurement. International Journal of Business and Society, 22(1), 213-226.
Purkait, S., De, S. K., & Suar, D. (2014). An empirical investigation of the factors that influence Internet user’s ability to correctly identify a phishing website. Information Management & Computer Security, 22(3), 194–234.
Ray, S., Ow, T., & Kim, S. S. (2011). Security assurance: How online service providers can influence security control perceptions and gain trust. Decision Sciences, 42(2), 391-412.
Rogers, R. W. (1975). A protection motivation theory of fear appeals and attitude change1. The journal of psychology, 91(1), 93-114.
Sheehan, K. B., & Hoy, M. G. (2000). Dimensions of privacy concern among online consumers. Journal of public policy & marketing, 19(1), 62-73.
Thompson, N., Mcgill, T. J., & Ferreira, X. (2017). Security begins at home: Determinants of home computer and mobile device security behavior. Computers & Security, 70, 376–391.
Tsai, H., Jiang, M., Alhabash, S., LaRose, R., Rifon, N. J., & Cotten, S. R. (2016). Understanding online safety behaviors: A protection motivation theory perspective. Computers & Security, 59, 138–150.
Vafaei-Zadeh, A., Thurasamy, R., & Hanifah, H. (2019). Modeling anti-malware use intention of university students in a developing country using the theory of planned behavior. Kybernetes, 48(8), 1565-1585.
Verkijika, S. F. (2019). "If you know what to do, will you take action to avoid mobile phishing attacks”: Self-efficacy, anticipated regret, and gender. Computers in Human Behavior, 101, 286–296.
Williams, E., & Joinson, A. (2020). Developing a measure of information seeking about phishing. Journal of Cybersecurity, 6(1).
Wopperer, W. (2002). Fraud risks in E-commerce transactions. The Geneva papers on risk and insurance. Issues and Practice, 27(3), 383-394.
Xu, H., Dinev, T., Smith, J., & Hart, P. (2011). Information privacy concerns: Linking individual perceptions with institutional privacy assurances. Journal of the Association for Information Systems, 12(12), 798-824.
Yahya, K. (2022, December 22). Raub housewife duped by scammer using e-wallet redemption ruse. New Straits Times.
Youn, S. (2009). Determinants of online privacy concern and its influence on privacy protection behaviors among young adolescents. Journal of Consumer affairs, 43(3), 389-418.
Zwilling, M., Klien, G. H., Lesjak, D., Wiechetek, Ł., Çetin, F., & Basim, H. N. (2020). Cyber security awareness, knowledge and behavior: A comparative study. Journal of Computer Information Systems, 62(1), 82-97.
How to Cite
KUAH, Chin Yoke et al. Awareness On Online Financial Scams: A Case Study in Malaysia. International Journal of Advanced Research in Economics and Finance, [S.l.], v. 6, n. 1, p. 101-116, mar. 2024. ISSN 2682-812X. Available at: <>. Date accessed: 21 may 2024.
English Section