Browse > Article
http://dx.doi.org/10.13106/jidb.2021.vol12.no12.1

The Relationship Between Financial Literacy and Public Awareness on Combating the Threat of Cybercrime in Malaysia  

ISA, Mohd Yaziz Bin Mohd (Graduate School of Business, Universiti Tun Abdul Razak)
IBRAHIM, Wan Nora Binti Wan (Graduate School of Business, Universiti Tun Abdul Razak)
MOHAMED, Zulkifflee (School of Accounting & Taxation, Universiti Tun Abdul Razak)
Publication Information
The Journal of Industrial Distribution & Business / v.12, no.12, 2021 , pp. 1-10 More about this Journal
Abstract
Purpose: Cyber criminals have affected various markets and the banking system has encountered various kinds of cyberattacks. The purpose of this study is to analyze cybercrime that is an emerging threat and investigate the significant contribution of financial literacy and public awareness on cybercrimes. To understand the security issues and the need for corrective steps, the techniques and strategies used by cyber fraudsters in obtaining unauthorized access and use the financial information for purpose of fraud need to be understood. Research design, data and methodology: A sample of 123 banks employees from 12 commercial banks in Malaysia was surveyed. This study differs from previous studies as it surveyed the employees' awareness, and this approach fills in the gap in existing literature. Results: The financial literacy and public awareness have positive impact on organizational performance effectiveness to combat threat of cybercrime. Some recommendations are also proposed from research findings, for banking industry and government regulations. Conclusion: The present study focuses on banking sector so its findings cannot be generalized to other sectors. Linking these topics has created a new study in combating threat of cybercrimes generally, and specifically in Malaysia. The present study enhances the understanding of customers' role to combat the impact of cybercrimes on performances of banking industry.
Keywords
Cybercrime; Banking Sector; Financial Literacy; Public Awareness;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Hill, J. B., & Marion, N. E. (2016). Introduction to Cybercrime: Computer Crimes, Laws, and Policing in the 21st Century. Westport, CT: Praeger Publishers.
2 Agnew, R. (1992). Foundation for a general strain theory of crime and delinquency. Criminology, 30(1), 47-88.   DOI
3 Ali, L., Ali, F., Surendran, P., & Thomas, B. (2017). The effects of cyber threats on customer's behaviour in e-Banking services. International Journal of e-Education, e-Business, e-Management and e-Learning, 7(1), 70-78.   DOI
4 Baker, P., & Glasser, S. (2005). Kremlin rising: Vladimir Putin's Russia and the end of revolution. New York, NY: Scribner.
5 Bandura, A., Ross, D., & Ross, S. A. (1963). Vicarious reinforcement and imitative learning. The Journal of Abnormal and Social Psychology, 67(6), 601-607.   DOI
6 Carmines, E. G., & Zeller, R. A. (1979). Reliability and validity assessment. Thousand Oaks, CA: Sage Publications.
7 Cascavilla, G., Tamburri, D.A., and Van Den Heuvel, W.-J. (2021), Cybercrime threat intelligence: A systematic multi-vocal literature review, Computers and Security, 1-29.
8 Chen, C. W. (2014). Are workers more likely to be deviant than managers? A cross-national analysis. Journal of Business Ethics, 123(2), 221-233.   DOI
9 Gordon, L.A. & Loeb, M.P. (2003). A Framework for Using Insurance for Cyber-Risk Management. Communications of the ACM, 46(3), 81-85.   DOI
10 Johanson, G. A., & Brooks, G. P. (2010). Initial scale development: sample size for pilot studies. Educational and psychological measurement, 70(3), 394-400.   DOI
11 Krishna V. V., & Purandare, P. A Qualitative Research on the Impact and Challenges of Cybercrimes (2021), Journal of Physics: Conference Series, 1-12.
12 Lakomski, G. (2001). Organizational change, leadership and learning: culture as cognitive process. International Journal of Educational Management. 79-88.
13 Lowry, R. (2014). Concepts and applications of inferential statistics. Computer Science.
14 Maslina D., Rajah R., Mary G., David A. & Govindamal T. (2018). Bridging the gap between organizational practices and cyber security compliance: Can cooperation promote compliance in organizations? International Journal of Business and Society, 19(1), 161-180.
15 Nachmias, D. (1972). Political alienation and political behavior. Oxfordshire,UK: Routledge.
16 Nunnally, J. C., & Bernstein, I. H. (1994). Psychometric theory (3rd ed.). NY: McGraw-Hill.
17 Ponto, J. (2015). Understanding and evaluating survey research. Journal of the advanced practitioner in oncology, 6(2), 168-171.
18 Rameli, M. N. F., Mohd-Sanusi, Z., Mat-Isa, Y., & Omar, N. (2013). Fraud occurrences in bank branches: The importance of internal control and risk management. The 5th International Conference on Financial Criminology (ICFC). (p. 77-89). May 28-29, Kuala Lumpur, Malaysia.
19 Rubin, D. S., & Levin, R. I. (1998). Statistics for management. Language, 16(1026p), 25.
20 Singh, J., & Singh, H. (2012). Continuous improvement approach: state-of-art review and future implications. International Journal of Lean Six Sigma. 3 (2), 88-111.   DOI
21 Siyanda Dlamini & Candice Mbambo (2019). Understanding policing of cyber-crime in South Africa: The phenomena, challenges and effective responses, Cogent Social Sciences, 5:1, DOI: 10.1080/23311886.2019.1675404   DOI
22 Suter, W. N. (2012). Qualitative data, analysis, and design. Introduction to educational research: A critical thinking approach, 2, 342-386.   DOI
23 Xu, J., & Gordon, J. I. (2003). Honor thy symbionts. Proceedings of the National Academy of Sciences, 100(18), 0452-10459.
24 Connelly, L. M. (2008). Pilot studies. Medsurg Nursing, 17(6), 411-412.
25 Schell, B. H., & Martin, C. (2004). Cybercrime: A reference handbook. Santa Barbara, CA: ABC-CLIO.
26 Neuman, S. B., & Roskos, K. (1997). Literacy knowledge in practice: Contexts of participation for young writers and readers. Reading Research Quarterly, 32(1), 10-32.   DOI
27 Mark M., Greg P, & Dikla S, (2006) Self-control depletion and the general theory of crime Journal of Quantitative Criminology, 22, 263-277.   DOI
28 Check, J., & Schutt, R. K. (2012). Teacher research and action research. Research methods in education, 255-271.
29 Collins, N. L., & Miller, L. C. (1994). Self-disclosure and liking: a meta-analytic review. Psychological bulletin, 116(3), 457-475.   DOI
30 Farhana, S. (2020, October 25). The rise of cybercrime in Malaysia - what you need to avoid. Astro AWANI Television Network.
31 Felson, M., & Cohen, L. E. (2017). Human ecology and crime: A routine activity approach. In Crime Opportunity Theories, (pp. 73-90), Oxfordshire, England: UK.
32 Gottfredson, M. R., & Hirschi, T. (1990). A general theory of crime. Palo Alto, CA: Stanford University Press.
33 Kuder, G. F., & Richardson, M. W. (1937). The theory of the estimation of test reliability. Psychometrika, 2(3), 151-160.   DOI
34 Gupta, S. (2012). Buffer overflow attack. IOSR Journal of Computer Engineering, 1(1), 10-23.   DOI
35 Hill, R. (1998). The mathematical theory of plasticity. Oxford,UK: Oxford University press.
36 Isaac, S., & Michael, W. B. (1995). Handbook in research and evaluation: A collection of principles, methods, and strategies useful in the planning, design, and evaluation of studies in education and the behavioral sciences. Washington, DC: American Psychological Association.
37 Khalid, K., Abdullah, H. H., & Kumar M, D. (2012). Get along with quantitative research process. International Journal of Research in Management, 79-88.
38 Krejcie, R. V., & Morgan, D. W. (1970). Determining sample size for research activities. Educational and psychological measurement, 30(3), 607-610.   DOI
39 Raghavan, A. R., & Parthiban, L. (2014). The effect of cybercrime on a Bank's finances. International Journal of Current Research & Academic Review, 2(2), 173-178.
40 Santoso, Edy (2012), Consumer Protection for Online Banking Scams via e-mail in Malaysia, UUM Journal of Legal Studies, 3, 1-22.
41 Singleton, R. A., & Straits, B. C. (2012). Survey interviewing. In SAGE handbook of interview research: The complexity of the craft, (pp. 77-98), Newcastle upon Tyne, UK: Sage Publications.
42 Vladimir. G., (2005). International cooperation in fighting cybercrime. [Online]. Available: https://www.crime-research.org/articles/Golubev0405
43 Dzomira, S. (2016). Espousal of combined assurance model in South Africa's public sector. Public and Municipal Finance, 5(4), 23-30.   DOI