Awareness On Online Financial Scams: A Case Study in Malaysia

  • Chin Yoke Kuah Assistant Professor
  • Xian Wen Lee
  • Hia Nya Lim
  • Yi Yan Vivian Lim

Abstract

Malaysia has seen an increase in digitization in almost all aspects of its people's daily lives, especially in the usage of online banking or e-wallet transactions. However, a rise in online financial scams in Malaysia has been reported recently. People have become unaware of the transparency of their information as a result of their reliance on the Internet. This study aims to identify the awareness on online financial scam in Malaysia using the Technology Threat Avoidance Theory (TTAT) and Theory of Planned Behavior (TPB). Independent variables included are cybersecurity knowledge, perceived severity, subjective norm, as well as security and privacy concerns. The data collection method in this study is primary data and 384 sets survey questionnaires were collected. Partial Least Square Structural Equation Modelling (PLS-SEM) software was used to generate the statistical analysis. The results showed that cybersecurity knowledge, perceived severity, and subjective norm have a significant relationship with the awareness on online financial scam, while security and privacy concerns have an insignificant relationship with the awareness on online financial scam. This study will provide an insight for Malaysians, particularly companies, and policymakers so that they can better understand the ways to increase awareness on online financial scam.

References

Acquisti, A., & Grossklags, J. (2005). Privacy and rationality in individual decision making. IEEE security & privacy, 3(1), 26-33. https://doi.org/10.1109/msp.2005.22
Ahmad, I., Iqbal, S., Jamil, S., & Kamran, M. (2021). A systematic literature review of e-banking frauds: Current scenario and security techniques. Linguistica Antverpiensia, 2(2), 3509-3517.
Alanazi, M., Freeman, M., & Tootell, H. (2022). Exploring the factors that influence the cybersecurity behaviors of young adults. Computers in Human Behavior, 136, 107376. https://doi.org/10.1016/j.chb.2022.107376
Alzaidi, M. S., & Agag, G. (2022). The role of trust and privacy concerns in using social media for e-retail services: The moderating role of COVID-19. Journal of Retailing and Consumer Services, 68, 103042. https://doi.org/10.1016/j.jretconser.2022.103042
Ansar, S. A., Yadav, J., Dwivedi, S. K., Pandey, A., Srivastava, S. P., Ishrat, M., Khan, M. W., Pandey, D., & Khan, R. A. (2021). A critical analysis of fraud cases on the Internet. Turkish Journal of Computer and Mathematics Education, 12(1), 424-445.
Apau, R., & Koranteng, F. N. (2019). Impact of cybercrime and trust on the use of e-commerce technologies: An application of the theory of planned behavior. International Journal of Cyber Criminology, 13(2). http://dx.doi.org/10.5281/zenodo.3697886
Asher, N. B., & Gonzalez, C. (2015). Effects of cyber security knowledge on attack detection. Computers in Human Behavior, 48, 51–61. https://doi.org/10.1016/j.chb.2015.01.039
Basyir, M. & Harun, H. N. (2022, September 26). Online scam cases increasing in Malaysia. New Straits Times. https://www.nst.com.my/news/nation/2022/09/834531/online-scam-cases-increasing-malaysia
Chawla, N., & Kumar, B. (2022). E-commerce and consumer protection in India: the emerging trend. Journal of Business Ethics, 180(2), 581-604. https://doi.org/10.1007/s10551-021-04884-3
Chen, D. Q., & Liang, H. (2019). Wishful thinking and IT threat avoidance: An extension to the technology threat avoidance theory. IEEE Transactions on Engineering Management, 66(4), 552-567. https://doi.org/10.1109/TEM.2018.2835461
Clark, L. A., & Watson, D. (1995). Constructing validity: Basic issues in objective scale development. Psychological Assessment, 7(3), 309–319. https://doi.org/10.1037/1040-3590.7.3.309.
Cole, T. (2023). How are financial institutions enabling online fraud? A developmental online financial fraud policy review. Journal of Financial Crime, (ahead-of-print). https://doi.org/10.1108/JFC-10-2022-0261
Cowan, K., Javornik, A., & Jiang, P. (2021). Privacy concerns when using augmented reality face filters? Explaining why and when use avoidance occurs. Psychology & Marketing, 38(10), 1799-1813. https://doi.org/10.1002/mar.21576
Crossler, R., & Bélanger, F. (2014). An extended perspective on individual security behaviors. ACM SIGMIS Data Base, 45(4), 51–71. https://doi.org/10.1145/2691517.2691521
Das, R., & Patel, M. (2017, 04). Cyber security for social networking sites: Issues, challenges and solutions. International Journal for Research in Applied Science and Engineering Technology, 5, 833-838. https://doi.org/10.22214/ijraset.2017.4153
Farooq, A., Ndiege, J. R. A., & Isoaho, J. (2019, September). Factors affecting security behavior of kenyan students: an integration of protection motivation theory and theory of planned behavior. In 2019 IEEE AFRICON (pp. 1-8). IEEE. https://doi.org/10.1109/africon46755.2019.9133764a
Fong, F. (2023, February 18). 19-Year-Old Student Lost Nearly RM50k To Love Scam Syndicate. The Rakyat Post. https://www.therakyatpost.com/news/malaysia/2023/02/18/19-year-old-student-lost-nearly-rm50k-to-love-scam-syndicate/
Glanz, K., Rimer, B. K., & Viswanath, K. (1992). Health Behavior and Health Education: Theory, Research, and Practice. Annals of Internal Medicine, 116(4), 350. https://doi.org/10.7326/0003-4819-116-4-350_1
Gomes, V. (2022a, February 28). E-wallet: Digital payments pivotal to Malaysia’s financial services industry. The Edge Market. https://www.theedgemarkets.com/article/ewallet-digital-payments-pivotal-malaysias-financial-services-industry
Gomes, V. (2022b, September 27). Catalysing Malaysia’s digital economy. The Edge Markets. https://www.theedgemarkets.com/article/catalysing-malaysias-digital-economy
Graeff, T. R., & Harmon, S. (2002). Collecting and using personal data: consumers’ awareness and concerns. Journal of consumer marketing, 19(4), 302-318. https://doi.org/10.1108/07363760210433627
Hamid, M. R. A., Sami, W., & Sidek, M. H. M. (2017). Discriminant Validity Assessment: Use of Fornell & Larcker criterion versus HTMT Criterion. Journal of Physics: Conference Series, 890, 012163. https://doi.org/10.1088/1742-6596/890/1/012163
Henseler, J., Ringle, C. M., & Sarstedt, M. (2015). A new criterion for assessing discriminant validity in variance-based structural equation modeling. Journal of the Academy of Marketing Science, 43(1), 115-135. https://doi.org/10.1007/s11747-014-0403-8
Ifinedo, P. (2012). Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory. Computers & Security, 31, 83–95. https://doi.org/10.1016/j.cose.2011.10.007.
Inan, F. N., Namin, A. S., Pogrund, R. L., & Jones, K. S. (2016). Internet Use and Cybersecurity Concerns of Individuals with Visual Impairments. Journal of Educational Technology & Society, 19(1), 28–40. http://www.jstor.org/stable/jeductechsoci.19.1.28
Johnson, D. P. (2017). How attitude toward the behavior, subjective norm, and perceived behavioral control affects information security behavior intention (Doctoral dissertation, Walden University).
https://scholarworks.waldenu.edu/dissertations/4454
Kemp, S., & Erades Pérez, N. (2023). Consumer Fraud against Older Adults in Digital Society: Examining Victimization and Its Impact. International Journal of Environmental Research and Public Health, 20(7), 5404. https://doi.org/10.3390/ijerph20075404
Kline, R. B. (2011). Principles and practice of structural equation modeling. New York: Guilford Press.
Kubilay, E., Raiber, E., Spantig, L., Cahlíková, J., & Kaaria, L. (2023). Can you spot a scam? Measuring and improving scam identification ability. https://dx.doi.org/10.2139/ssrn.4344411
Lee, C. (2020, December 9). How the government can protect people with mental health problems from online scam. Money and Mental Health Policy Institute. https://www.moneyandmentalhealth.org/online-scams-mental-health/#:~:text=The%20impact%20of%20an%20online,living%20on%20a%20low%20income.
Lee, Y. J. (2020, November 20). Malaysian Loses RM30,000 Within 5 Minutes After Scammers Pull Off Complex Bank Fraud. Says. https://says.com/my/news/malaysian-loses-rm-30000-over-bank-fraud-security
Liang, H., & Xue, Y. (2009). Avoidance of information technology threats: A theoretical perspective. MIS quarterly, 71-90. https://doitsa.org/10.2307/20650279
Macovei, O. I. (2015). Applying the theory of planned behavior in predicting proenvironmental behaviour: The case of energy conservation. Acta Universitatis Danubius. Œconomica, 11(4), 15-32.
Milne, G. R., Rohm, A. J., & Bahl, S. (2004). Consumers’ protection of online privacy and identity. Journal of Consumer Affairs, 38(2), 217-232. https://doi.org/10.1111/j.1745-6606.2004.tb00865.x
Norris, G., & Brookes, A. (2021). Personality, emotion and individual differences in response to online fraud. Personality and Individual Differences, 169, 109847. https://doi.org/10.1016/j.paid.2020.109847
Persada, S. F., Dalimunte, I., Nadlifatin, R., Miraja, B. A., Redi, A. A. N. P., Prasetyo, Y. T., ... & Lin, S. C. (2021). Revealing the behavior intention of tech-savvy generation Z to use electronic wallet usage: A theory of planned behavior based measurement. International Journal of Business and Society, 22(1), 213-226. https://doi.org/10.33736/ijbs.3171.2021
Purkait, S., De, S. K., & Suar, D. (2014). An empirical investigation of the factors that influence Internet user’s ability to correctly identify a phishing website. Information Management & Computer Security, 22(3), 194–234. https://doil.org/10.1108/imcs-05-2013-0032
Ray, S., Ow, T., & Kim, S. S. (2011). Security assurance: How online service providers can influence security control perceptions and gain trust. Decision Sciences, 42(2), 391-412. https://doi.org/10.1111/j.1540-5915.2011.00316.x
Rogers, R. W. (1975). A protection motivation theory of fear appeals and attitude change1. The journal of psychology, 91(1), 93-114. https://doi.org/10.1080/00223980.1975.9915803
Sheehan, K. B., & Hoy, M. G. (2000). Dimensions of privacy concern among online consumers. Journal of public policy & marketing, 19(1), 62-73. https://doi.org/10.1509/jppm.19.1.62.16949
Thompson, N., Mcgill, T. J., & Ferreira, X. (2017). Security begins at home: Determinants of home computer and mobile device security behavior. Computers & Security, 70, 376–391. https://doi.org/10.1016/j.cose.2017.07.003
Tsai, H., Jiang, M., Alhabash, S., LaRose, R., Rifon, N. J., & Cotten, S. R. (2016). Understanding online safety behaviors: A protection motivation theory perspective. Computers & Security, 59, 138–150. https://doi.org/10.1016/j.cose.2016.02.009
Vafaei-Zadeh, A., Thurasamy, R., & Hanifah, H. (2019). Modeling anti-malware use intention of university students in a developing country using the theory of planned behavior. Kybernetes, 48(8), 1565-1585. https://doi.org/10.1108/K-05-2018-0226
Verkijika, S. F. (2019). "If you know what to do, will you take action to avoid mobile phishing attacks”: Self-efficacy, anticipated regret, and gender. Computers in Human Behavior, 101, 286–296. https://doi.org/10.1016/j.chb.2019.07.034
Williams, E., & Joinson, A. (2020). Developing a measure of information seeking about phishing. Journal of Cybersecurity, 6(1). https://doi.org/10.1093/cybsec/tyaa001
Wopperer, W. (2002). Fraud risks in E-commerce transactions. The Geneva papers on risk and insurance. Issues and Practice, 27(3), 383-394. https://doi.org/10.1111/1468-0440.00180
Xu, H., Dinev, T., Smith, J., & Hart, P. (2011). Information privacy concerns: Linking individual perceptions with institutional privacy assurances. Journal of the Association for Information Systems, 12(12), 798-824. https://doi.org/10.17705/1jais.00281
Yahya, K. (2022, December 22). Raub housewife duped by scammer using e-wallet redemption ruse. New Straits Times. https://www.nst.com.my/news/crime-courts/2022/12/865937/raub-housewife-duped-scammer-using-e-wallet-redemption-ruse
Youn, S. (2009). Determinants of online privacy concern and its influence on privacy protection behaviors among young adolescents. Journal of Consumer affairs, 43(3), 389-418. https://doi.org/10.1111/j.1745-6606.2009.01146.x
Zwilling, M., Klien, G. H., Lesjak, D., Wiechetek, Ł., Çetin, F., & Basim, H. N. (2020). Cyber security awareness, knowledge and behavior: A comparative study. Journal of Computer Information Systems, 62(1), 82-97. https://doi.org/10.1080/08874417.2020.1712269
Published
2024-03-31
How to Cite
KUAH, Chin Yoke et al. Awareness On Online Financial Scams: A Case Study in Malaysia. International Journal of Advanced Research in Economics and Finance, [S.l.], v. 6, n. 1, p. 101-116, mar. 2024. ISSN 2682-812X. Available at: <https://myjms.mohe.gov.my/index.php/ijaref/article/view/25678>. Date accessed: 21 may 2024.
Section
English Section