바로가기메뉴

본문 바로가기 주메뉴 바로가기

logo

  • E-ISSN2233-5382
  • KCI

The Relationship Between Financial Literacy and Public Awareness on Combating the Threat of Cybercrime in Malaysia

The Journal of Industrial Distribution & Business / The Journal of Industrial Distribution & Business, (E)2233-5382
2021, v.12 no.12, pp.1-10
https://doi.org/https://doi.org/10.13106/jidb.2021.vol12.no12.1
ISA, Mohd Yaziz Bin Mohd
IBRAHIM, Wan Nora Binti Wan
MOHAMED, Zulkifflee

Abstract

Purpose: Cyber criminals have affected various markets and the banking system has encountered various kinds of cyberattacks. The purpose of this study is to analyze cybercrime that is an emerging threat and investigate the significant contribution of financial literacy and public awareness on cybercrimes. To understand the security issues and the need for corrective steps, the techniques and strategies used by cyber fraudsters in obtaining unauthorized access and use the financial information for purpose of fraud need to be understood. Research design, data and methodology: A sample of 123 banks employees from 12 commercial banks in Malaysia was surveyed. This study differs from previous studies as it surveyed the employees' awareness, and this approach fills in the gap in existing literature. Results: The financial literacy and public awareness have positive impact on organizational performance effectiveness to combat threat of cybercrime. Some recommendations are also proposed from research findings, for banking industry and government regulations. Conclusion: The present study focuses on banking sector so its findings cannot be generalized to other sectors. Linking these topics has created a new study in combating threat of cybercrimes generally, and specifically in Malaysia. The present study enhances the understanding of customers' role to combat the impact of cybercrimes on performances of banking industry.

keywords
Cybercrime, Banking Sector, Financial Literacy, Public Awareness

Reference

1.

Agnew, R. (1992). Foundation for a general strain theory of crime and delinquency. Criminology, 30(1), 47-88.

2.

Ali, L., Ali, F., Surendran, P., & Thomas, B. (2017). The effects of cyber threats on customer’s behaviour in e-Banking services. International Journal of e-Education, e-Business, e-Management and e-Learning, 7(1), 70-78.

3.

Baker, P., & Glasser, S. (2005). Kremlin rising: Vladimir Putin's Russia and the end of revolution. New York, NY: Scribner.

4.

Bandura, A., Ross, D., & Ross, S. A. (1963). Vicarious reinforcement and imitative learning. The Journal of Abnormal and Social Psychology, 67(6), 601–607.

5.

Carmines, E. G., & Zeller, R. A. (1979). Reliability and validity assessment. Thousand Oaks, CA: Sage Publications.

6.

Cascavilla, G., Tamburri, D.A., and Van Den Heuvel, W.-J. (2021), Cybercrime threat intelligence: A systematic multi-vocal literature review, Computers and Security, 1-29.

7.

Check, J., & Schutt, R. K. (2012). Teacher research and action research. Research methods in education, 255-271.

8.

Chen, C. W. (2014). Are workers more likely to be deviant than managers? A cross-national analysis. Journal of Business Ethics, 123(2), 221-233.

9.

Collins, N. L., & Miller, L. C. (1994). Self-disclosure and liking: a meta-analytic review. Psychological bulletin, 116(3), 457-475.

10.

Connelly, L. M. (2008). Pilot studies. Medsurg Nursing, 17(6), 411-412.

11.

Dzomira, S. (2016). Espousal of combined assurance model in South Africa’s public sector. Public and Municipal Finance, 5(4), 23-30.

12.

Farhana, S. (2020, October 25). The rise of cybercrime in Malaysia - what you need to avoid. Astro AWANI Television Network.

13.

Felson, M., & Cohen, L. E. (2017). Human ecology and crime: A routine activity approach. In Crime Opportunity Theories, (pp. 73-90), Oxfordshire, England: UK.

14.

Gordon, L.A. & Loeb, M.P. (2003). A Framework for Using Insurance for Cyber-Risk Management. Communications of the ACM, 46(3), 81–85.

15.

Gottfredson, M. R., & Hirschi, T. (1990). A general theory of crime. Palo Alto, CA: Stanford University Press.

16.

Gupta, S. (2012). Buffer overflow attack. IOSR Journal of Computer Engineering, 1(1), 10-23.

17.

Hill, J. B., & Marion, N. E. (2016). Introduction to Cybercrime: Computer Crimes, Laws, and Policing in the 21st Century. Westport, CT: Praeger Publishers.

18.

Hill, R. (1998). The mathematical theory of plasticity. Oxford,UK: Oxford University press.

19.

Isaac, S., & Michael, W. B. (1995). Handbook in research and evaluation: A collection of principles, methods, and strategies useful in the planning, design, and evaluation of studies in education and the behavioral sciences. Washington, DC: American Psychological Association.

20.

Johanson, G. A., & Brooks, G. P. (2010). Initial scale development: sample size for pilot studies. Educational and psychological measurement, 70(3), 394-400.

21.

Khalid, K., Abdullah, H. H., & Kumar M, D. (2012). Get along with quantitative research process. International Journal of Research in Management, 79-88.

22.

Krejcie, R. V., & Morgan, D. W. (1970). Determining sample size for research activities. Educational and psychological measurement, 30(3), 607-610.

23.

Krishna V. V., & Purandare, P. A Qualitative Research on the Impact and Challenges of Cybercrimes (2021), Journal of Physics: Conference Series, 1-12.

24.

Kuder, G. F., & Richardson, M. W. (1937). The theory of the estimation of test reliability. Psychometrika, 2(3), 151-160.

25.

Lakomski, G. (2001). Organizational change, leadership and learning: culture as cognitive process. International Journal of Educational Management. 79-88.

26.

Lowry, R. (2014). Concepts and applications of inferential statistics. Computer Science.

27.

Mark M., Greg P, & Dikla S, (2006) Self-control depletion and the general theory of crime Journal of Quantitative Criminology, 22, 263-277.

28.

Maslina D., Rajah R., Mary G., David A. & Govindamal T. (2018). Bridging the gap between organizational practices and cyber security compliance: Can cooperation promote compliance in organizations? International Journal of Business and Society, 19(1), 161-180.

29.

Nachmias, D. (1972). Political alienation and political behavior. Oxfordshire,UK: Routledge.

30.

Neuman, S. B., & Roskos, K. (1997). Literacy knowledge in practice: Contexts of participation for young writers and readers. Reading Research Quarterly, 32(1), 10-32.

31.

Nunnally, J. C., & Bernstein, I. H. (1994). Psychometric theory (3rd ed.). NY: McGraw-Hill.

32.

Ponto, J. (2015). Understanding and evaluating survey research. Journal of the advanced practitioner in oncology, 6(2), 168-171.

33.

Raghavan, A. R., & Parthiban, L. (2014). The effect of cybercrime on a Bank’s finances. International Journal of Current Research & Academic Review, 2(2), 173-178.

34.

Rameli, M. N. F., Mohd-Sanusi, Z., Mat-Isa, Y., & Omar, N. (2013). Fraud occurrences in bank branches: The importance of internal control and risk management. The 5th International Conference on Financial Criminology (ICFC). (p. 77-89). May 28-29, Kuala Lumpur, Malaysia.

35.

Rubin, D. S., & Levin, R. I. (1998). Statistics for management. Language, 16(1026p), 25.

36.

Santoso, Edy (2012), Consumer Protection for Online Banking Scams via e-mail in Malaysia, UUM Journal of Legal Studies, 3, 1-22.

37.

Schell, B. H., & Martin, C. (2004). Cybercrime: A reference handbook. Santa Barbara, CA: ABC- CLIO.

38.

Singh, J., & Singh, H. (2012). Continuous improvement approach: state‐of‐art review and future implications. International Journal of Lean Six Sigma. 3 (2), 88-111.

39.

Singleton, R. A., & Straits, B. C. (2012). Survey interviewing. In SAGE handbook of interview research: The complexity of the craft, (pp. 77-98), Newcastle upon Tyne, UK: Sage Publications.

40.

Siyanda Dlamini & Candice Mbambo (2019). Understanding policing of cyber-crime in South Africa: The phenomena, challenges and effective responses, Cogent Social Sciences, 5:1, DOI: 10.1080/23311886.2019.1675404

41.

Suter, W. N. (2012). Qualitative data, analysis, and design. Introduction to educational research: A critical thinking approach, 2, 342-386.

42.

Vladimir. G., (2005). International cooperation in fighting cybercrime. [Online]. Available: https://www.crime-research.org/articles/Golubev0405

43.

Xu, J., & Gordon, J. I. (2003). Honor thy symbionts. Proceedings of the National Academy of Sciences, 100(18), 0452-10459.

The Journal of Industrial Distribution & Business