Ontology of Protection Motivation Theory on Digital Risk–A Systematic Literature Review

  • Khairunnisa’ Binti Yussof Universiti Teknologi MARA
  • Noraznira Abd Razak Universiti Teknologi MARA
  • Siti Musliha Binti Mohd Idris Universiti Teknologi MARA
  • Norfaezah Binti Mohd Shahren Universiti Teknologi MARA
Keywords: digital payment; cyber risk; protection behavior; protection motivation theory.

Abstract

The world of technology is advancing at a breakneck pace. There is no doubt that the convenience of this technology simplifies and expedites everything. The services made available with digitization technology are vast to start with, such as government services, online sales, e-learning, e-banking and many more. Among the areas of importance that shall be highlighted via this article would be any routines involving digital payments. The availability of digital payments facilitates the buying process, business transactions, and bill payments, among other things. Risks related to digital payment usage shall be accelerated if individuals lack experience, disclosure, and much more information related to the procedure of digital payments itself. Not to mention, the risks of cyber security hacking which also on the rise courtesy of the increasing usage of digitalized technology per se. As a result, risks that occur will negatively affect the public's perception, trust and confidence. Simultaneously, this will impact the economic environment, business, and society. As a result, precautionary behavior among customers shall be studied rather than technology acceptance. The protection motivation theory (PMT) shall be adopted for this study since it is well-suited to identifying users' adaptive behavior towards the usage of technology as well as determining whether or not they are aware of the risks associated with the relevant technology involved. The study uses the method of Systematic Literature Review using 11 extant studies to evaluate the protection behavior of digital payment risk.

Downloads

Download data is not yet available.

References

Afridi, F. E. A., Ayaz, B., & Irfan, M. (2021). Adoption of online retail banking practices as a precautionary protective. Int. J. Hum. Capital Urban Manage, 6, 1–10. https://doi.org/10.22034/IJHCUM.2021.04.0 DOI: https://doi.org/10.34069/AI/2021.41.05.17

Alsaad, A., & Al-Okaily, M. (2021). Acceptance of protection technology in a time of fear: the case of COVID-19 exposure detection apps. Information Technology & People, ahead-of-p(ahead-of-print). https://doi.org/10.1108/ITP-10-2020-0719 DOI: https://doi.org/10.1108/ITP-10-2020-0719

Chen, L., Ho, S. S., & Lwin, M. O. (2017). A meta-analysis of factors predicting cyberbullying perpetration and victimization: From the social cognitive and media effects approach. New Media and Society, 19(8), 1194–1213. https://doi.org/10.1177/1461444816634037 DOI: https://doi.org/10.1177/1461444816634037

Fatokun, F. B., Hamid, S., Norman, A., & Fatokun, J. O. (2019). The Impact of Age, Gender, and Educational level on the Cybersecurity Behaviors of Tertiary Institution Students: An Empirical investigation on Malaysian Universities. Journal of Physics: Conference Series, 1339(1). https://doi.org/10.1088/1742-6596/1339/1/012098 DOI: https://doi.org/10.1088/1742-6596/1339/1/012098

J.P.Morgan. (2020). E-commerce Payments Trends : Malaysia's e-commerce market has gone from strength to strength Strong cross-border spending and delivery infrastructure are key to boosting Malaysia's e-commerce growth. 1–9.

Jansen, J., & van Schaik, P. (2018). Persuading end users to act cautiously online: a fear appeals study on phishing. Information and Computer Security, 26(3), 264–276. https://doi.org/10.1108/ICS-03-2018-0038 https://www.khazanah.com.my/downloads/Full-Financial-Statements-2020.pdf DOI: https://doi.org/10.1108/ICS-03-2018-0038

Kuhlicke, C., Seebauer, S., Hudson, P., Begg, C., Bubeck, P., Dittmer, C., Grothmann, T., Heidenreich, A., Kreibich, H., Lorenz, D. F., Masson, T., Reiter, J., Thaler, T., Thieken, A. H., & Bamberg, S. (2020). The behavioral turn in flood risk management, its assumptions and potential implications. WIREs Water, 7(3), 1–22. DOI: https://doi.org/10.1002/wat2.1418

Malaysian Communications and Multimedia Commission. (2020). Internet Users Survey 2020. In The Internet Users Survey. https://doi.org/ISSN 1823-2523

Medeiros, A. S., Martinez, L. F., & Martinez, L. M. (2020). Assessing the Determinants of Millennials’ Online Protective Behavior: How Their Protection Motivation Translates into Actual Use Behavior, 153–162. https://doi.org/10.1007/978-3-030-47595-6_20 DOI: https://doi.org/10.1007/978-3-030-47595-6_20

MKN. (2019). Malaysia Cyber Security Strategy 2020-2024. 44(8). https://doi. org/10. 1088/175.-8113/44/8/085201

Ojo, A. O., Fawehinmi, O., Ojo, O. T., Arasanmi, C., & Tan, C. N. L. (2022). Consumer usage intention of electronic wallets during the COVID-19 pandemic in Malaysia. Cogent Business and Management, 9(1). DOI: https://doi.org/10.1080/23311975.2022.2056964

Rogers, R. W. (2017). Protection Motivation and Self-Efficacy : A Revised Theory of Fear Appeals and Attitude Change Protection Motivation and Self-Efficacy : A Revised Theory of Fear Appeals and Attitude Change. 1031. https://doi.org/10.1016/0022-1031(83)90023-9

Rohiman, H. (2020). E-wallet gaining traction in Malaysia. The New Straits Times, February, 1–4. https://www.nst.com.my/opinion/columnists/2020/07/605958/e-wallet-gaining-traction-malaysia

Sahi, A. M., Khalid, H., Abbas, A. F., Zedan, K., Khatib, S. F. A., & Amosh, H. Al. (2022). The Research Trend of Security and Privacy in Digital Payment. Informatics, 9(2). https://doi.org/10.3390/informatics9020032 DOI: https://doi.org/10.3390/informatics9020032

Sartiges, D. De, Bharadwaj, A., Khan, I., Tasiaux, J., & Witschi, P. (2020). Southeast Asian Consumers Are Driving a Digital Payment Revolution. Bcg. https://www.bcg.com/publications/2020/southeast-asian-consumers-digital-payment-revolutions

Tsai, H. Y. S., Jiang, M., Alhabash, S., Larose, R., Rifon, N. J., & Cotten, S. R. (2016). Understanding online safety behaviors: A protection motivation theory perspective. Computers and Security, 59, 138–150. DOI: https://doi.org/10.1016/j.cose.2016.02.009

van Bavel, R., Rodríguez-Priego, N., Vila, J., & Briggs, P. (2019). Using protection motivation theory in the design of nudges to improve online security behavior. International Journal of Human-Computer Studies, 123, 29–39. https://doi.org/10.1016/j.ijhcs.2018.11.003 DOI: https://doi.org/10.1016/j.ijhcs.2018.11.003

Westcott, R., Ronan, K., Bambrick, H., & Taylor, M. (2017). Expanding protection motivation theory: Investigating an application to animal owners and emergency responders in bushfire emergencies. BMC Psychology, 5(1), 1–14. https://doi.org/10.1186/s40359-017-0182-3 DOI: https://doi.org/10.1186/s40359-017-0182-3

Wei, Q., Xiao, W., Yaqub, R. M., Irfan, M., Murad, M. & Yaqub, M. (2023). Adoption of digital money (e-wallet) in the post-COVID-19 era: The moderating role of low distribution charges and low transit time in impulsive buying: A developing country perspective. Frontiers in Environmental Science. 10. 10.3389/fenvs.2022.984316. DOI: https://doi.org/10.3389/fenvs.2022.984316

Wong, W. H., & Mo, W. Y. (2019). A Study of Consumer Intention of Mobile Payment in Hong Kong, Based on Perceived Risk, Perceived Trust, Perceived Security and Technological Acceptance Model. Journal of Advanced Management Science, 7(2), 33–38. https://doi.org/10.18178/joams.7.2.33-38 DOI: https://doi.org/10.18178/joams.7.2.33-38

Yoon, S., Elinich, K., Wang, J., Steinmeier, C., & Tucker, S. (2012). Using augmented reality and knowledge-building scaffolds to improve learning in a science museum. International Journal of Computer Supported Collaborative Learning, 7(4), 519–541. DOI: https://doi.org/10.1007/s11412-012-9156-x

Published
2024-12-05
How to Cite
Binti Yussof, K., Abd Razak, N., Binti Mohd Idris, S. M., & Binti Mohd Shahren, N. (2024). Ontology of Protection Motivation Theory on Digital Risk–A Systematic Literature Review. Information Management and Business Review, 16(4(S)I), 426-432. https://doi.org/10.22610/imbr.v16i4(S)I.4282
Section
Research Paper