Ontology of Protection Motivation Theory on Digital Risk–A Systematic Literature Review
Abstract
The world of technology is advancing at a breakneck pace. There is no doubt that the convenience of this technology simplifies and expedites everything. The services made available with digitization technology are vast to start with, such as government services, online sales, e-learning, e-banking and many more. Among the areas of importance that shall be highlighted via this article would be any routines involving digital payments. The availability of digital payments facilitates the buying process, business transactions, and bill payments, among other things. Risks related to digital payment usage shall be accelerated if individuals lack experience, disclosure, and much more information related to the procedure of digital payments itself. Not to mention, the risks of cyber security hacking which also on the rise courtesy of the increasing usage of digitalized technology per se. As a result, risks that occur will negatively affect the public's perception, trust and confidence. Simultaneously, this will impact the economic environment, business, and society. As a result, precautionary behavior among customers shall be studied rather than technology acceptance. The protection motivation theory (PMT) shall be adopted for this study since it is well-suited to identifying users' adaptive behavior towards the usage of technology as well as determining whether or not they are aware of the risks associated with the relevant technology involved. The study uses the method of Systematic Literature Review using 11 extant studies to evaluate the protection behavior of digital payment risk.
Downloads
References
Afridi, F. E. A., Ayaz, B., & Irfan, M. (2021). Adoption of online retail banking practices as a precautionary protective. Int. J. Hum. Capital Urban Manage, 6, 1–10. https://doi.org/10.22034/IJHCUM.2021.04.0 DOI: https://doi.org/10.34069/AI/2021.41.05.17
Alsaad, A., & Al-Okaily, M. (2021). Acceptance of protection technology in a time of fear: the case of COVID-19 exposure detection apps. Information Technology & People, ahead-of-p(ahead-of-print). https://doi.org/10.1108/ITP-10-2020-0719 DOI: https://doi.org/10.1108/ITP-10-2020-0719
Chen, L., Ho, S. S., & Lwin, M. O. (2017). A meta-analysis of factors predicting cyberbullying perpetration and victimization: From the social cognitive and media effects approach. New Media and Society, 19(8), 1194–1213. https://doi.org/10.1177/1461444816634037 DOI: https://doi.org/10.1177/1461444816634037
Fatokun, F. B., Hamid, S., Norman, A., & Fatokun, J. O. (2019). The Impact of Age, Gender, and Educational level on the Cybersecurity Behaviors of Tertiary Institution Students: An Empirical investigation on Malaysian Universities. Journal of Physics: Conference Series, 1339(1). https://doi.org/10.1088/1742-6596/1339/1/012098 DOI: https://doi.org/10.1088/1742-6596/1339/1/012098
J.P.Morgan. (2020). E-commerce Payments Trends : Malaysia's e-commerce market has gone from strength to strength Strong cross-border spending and delivery infrastructure are key to boosting Malaysia's e-commerce growth. 1–9.
Jansen, J., & van Schaik, P. (2018). Persuading end users to act cautiously online: a fear appeals study on phishing. Information and Computer Security, 26(3), 264–276. https://doi.org/10.1108/ICS-03-2018-0038 https://www.khazanah.com.my/downloads/Full-Financial-Statements-2020.pdf DOI: https://doi.org/10.1108/ICS-03-2018-0038
Kuhlicke, C., Seebauer, S., Hudson, P., Begg, C., Bubeck, P., Dittmer, C., Grothmann, T., Heidenreich, A., Kreibich, H., Lorenz, D. F., Masson, T., Reiter, J., Thaler, T., Thieken, A. H., & Bamberg, S. (2020). The behavioral turn in flood risk management, its assumptions and potential implications. WIREs Water, 7(3), 1–22. DOI: https://doi.org/10.1002/wat2.1418
Malaysian Communications and Multimedia Commission. (2020). Internet Users Survey 2020. In The Internet Users Survey. https://doi.org/ISSN 1823-2523
Medeiros, A. S., Martinez, L. F., & Martinez, L. M. (2020). Assessing the Determinants of Millennials’ Online Protective Behavior: How Their Protection Motivation Translates into Actual Use Behavior, 153–162. https://doi.org/10.1007/978-3-030-47595-6_20 DOI: https://doi.org/10.1007/978-3-030-47595-6_20
MKN. (2019). Malaysia Cyber Security Strategy 2020-2024. 44(8). https://doi. org/10. 1088/175.-8113/44/8/085201
Ojo, A. O., Fawehinmi, O., Ojo, O. T., Arasanmi, C., & Tan, C. N. L. (2022). Consumer usage intention of electronic wallets during the COVID-19 pandemic in Malaysia. Cogent Business and Management, 9(1). DOI: https://doi.org/10.1080/23311975.2022.2056964
Rogers, R. W. (2017). Protection Motivation and Self-Efficacy : A Revised Theory of Fear Appeals and Attitude Change Protection Motivation and Self-Efficacy : A Revised Theory of Fear Appeals and Attitude Change. 1031. https://doi.org/10.1016/0022-1031(83)90023-9
Rohiman, H. (2020). E-wallet gaining traction in Malaysia. The New Straits Times, February, 1–4. https://www.nst.com.my/opinion/columnists/2020/07/605958/e-wallet-gaining-traction-malaysia
Sahi, A. M., Khalid, H., Abbas, A. F., Zedan, K., Khatib, S. F. A., & Amosh, H. Al. (2022). The Research Trend of Security and Privacy in Digital Payment. Informatics, 9(2). https://doi.org/10.3390/informatics9020032 DOI: https://doi.org/10.3390/informatics9020032
Sartiges, D. De, Bharadwaj, A., Khan, I., Tasiaux, J., & Witschi, P. (2020). Southeast Asian Consumers Are Driving a Digital Payment Revolution. Bcg. https://www.bcg.com/publications/2020/southeast-asian-consumers-digital-payment-revolutions
Tsai, H. Y. S., Jiang, M., Alhabash, S., Larose, R., Rifon, N. J., & Cotten, S. R. (2016). Understanding online safety behaviors: A protection motivation theory perspective. Computers and Security, 59, 138–150. DOI: https://doi.org/10.1016/j.cose.2016.02.009
van Bavel, R., Rodríguez-Priego, N., Vila, J., & Briggs, P. (2019). Using protection motivation theory in the design of nudges to improve online security behavior. International Journal of Human-Computer Studies, 123, 29–39. https://doi.org/10.1016/j.ijhcs.2018.11.003 DOI: https://doi.org/10.1016/j.ijhcs.2018.11.003
Westcott, R., Ronan, K., Bambrick, H., & Taylor, M. (2017). Expanding protection motivation theory: Investigating an application to animal owners and emergency responders in bushfire emergencies. BMC Psychology, 5(1), 1–14. https://doi.org/10.1186/s40359-017-0182-3 DOI: https://doi.org/10.1186/s40359-017-0182-3
Wei, Q., Xiao, W., Yaqub, R. M., Irfan, M., Murad, M. & Yaqub, M. (2023). Adoption of digital money (e-wallet) in the post-COVID-19 era: The moderating role of low distribution charges and low transit time in impulsive buying: A developing country perspective. Frontiers in Environmental Science. 10. 10.3389/fenvs.2022.984316. DOI: https://doi.org/10.3389/fenvs.2022.984316
Wong, W. H., & Mo, W. Y. (2019). A Study of Consumer Intention of Mobile Payment in Hong Kong, Based on Perceived Risk, Perceived Trust, Perceived Security and Technological Acceptance Model. Journal of Advanced Management Science, 7(2), 33–38. https://doi.org/10.18178/joams.7.2.33-38 DOI: https://doi.org/10.18178/joams.7.2.33-38
Yoon, S., Elinich, K., Wang, J., Steinmeier, C., & Tucker, S. (2012). Using augmented reality and knowledge-building scaffolds to improve learning in a science museum. International Journal of Computer Supported Collaborative Learning, 7(4), 519–541. DOI: https://doi.org/10.1007/s11412-012-9156-x
Copyright (c) 2024 Khairunnisa’ Binti Yussof, Noraznira Abd Razak, Siti Musliha Binti Mohd Idris, Norfaezah Binti Mohd Shahren
This work is licensed under a Creative Commons Attribution 4.0 International License.
Author (s) should affirm that the material has not been published previously. It has not been submitted and it is not under consideration by any other journal. At the same time author (s) need to execute a publication permission agreement to assume the responsibility of the submitted content and any omissions and errors therein. After submission of revised paper in the light of suggestions of the reviewers, the editorial team edits and formats manuscripts to bring uniformity and standardization in published material.
This work will be licensed under Creative Commons Attribution 4.0 International (CC BY 4.0) and under condition of the license, users are free to read, copy, remix, transform, redistribute, download, print, search or link to the full texts of articles and even build upon their work as long as they credit the author for the original work. Moreover, as per journal policy author (s) hold and retain copyrights without any restrictions.