Financial cybercrime avoidance behavior among employees of financial sector companies in Indonesia

Authors

  • Hanifah Zahra Universitas Islam Indonesia, Sleman Regency, Special Region of Yogyakarta, Indonesia
  • Dekar Urumsah Universitas Islam Indonesia, Sleman Regency, Special Region of Yogyakarta, Indonesia https://orcid.org/0000-0002-2937-137X

DOI:

https://doi.org/10.14414/tiar.v14i2.4596

Keywords:

Avoidance behavior, Avoidance motivation, Financial cybercrime

Abstract

This study aims to examine the factors that influence the behavior of avoiding financial cybercrime among employees of financial sector companies in Indonesia. This studyuses Technology Threat Avoidance Theory (TTAT) and Regret Theory as theoretical frameworks. Data are collected through a survey conducted onemployees of financial sector companies in Indonesia, both in paper-based and online formats, resulting in a total of 180 questionnaires for analyses. Data analysis is conducted using Structural Equation Modeling-Partial Least Squares (SEM-PLS) in SmartPLS 4.0. The results of this study show thatperceived susceptibility and perceived severity have a significant positive influence on perceived threat. However, the interaction between perceived susceptibility and perceived severity has no effect on perceived threat. Perceived threat, safeguard effectiveness, and anticipated regret have a significant influence on financial cybercrime avoidance motivation. Conversely, self-efficacy and safeguard cost do not have an effect onfinancial cybercrime avoidance motivation. Furthermore, financial cybercrime avoidance motivation has a significant and positive influence on financial cybercrime avoidance behavior. These findings offer insights for policymakers, financial sector companies, and antivirus software developers to enhance cybersecurity policies, responses to cybercrime, and software features.

Author Biographies

Hanifah Zahra, Universitas Islam Indonesia, Sleman Regency, Special Region of Yogyakarta, Indonesia

Hanifah Zahra is a lecturer in the Accounting Department, Faculty of Business and Economics,
Universitas Islam Indonesia. She earned her Bachelor’s degree in Accounting in 2021 and
completed her Master’s degree in Accounting in 2023, both from Universitas Islam Indonesia.
Her research interests include system usage behavior, financial cybercrime, and cyber
disclosure. She is passionate about exploring how financial and technological systems intersect,
particularly in enhancing transparency and mitigating risks in the digital era. She can be reached
at the Department of Accounting, Faculty of Business and Economics, UII, North Ring Road,
Condongcatur, Depok, Sleman Regency, Special Region of Yogyakarta;
hanifah.zahra@uii.ac.id.

Dekar Urumsah, Universitas Islam Indonesia, Sleman Regency, Special Region of Yogyakarta, Indonesia

Dekar Urumsah is an Associate Professor in the Accounting Department, Faculty of Business
and Economics, Universitas Islam Indonesia (UII). He earned a Bachelor’s degree in Accounting
from UII in 1992 and a Bachelor’s degree in Electronics and Instrumentation from Gadjah Mada
University in 1997. He completed his Master’s in Commerce (Information Systems) in 2004 and
his PhD in Accounting in 2014, both at Curtin University, Australia. His research focuses on
Information Systems, Forensic Audit, and Public Sector Accounting, contributing significantly to
these fields through his academic and professional expertise. With a strong interdisciplinary
background, he bridges accounting, technology, and public sector studies. He can be contacted
at the Department of Accounting, Faculty of Business and Economics, Universitas Islam
Indonesia, North Ring Road, Condongcatur, Depok, Sleman Regency, Special Region of
Yogyakarta; dekar.urumsah@uii.ac.id.

References

Arachchilage, N. A. G., Love, S., & Beznosov, K. (2016). Phishing Threat Avoidance Behaviour: An Empirical Investigation. Computers in Human Behavior, 60, 185–197. https://doi.org/https://doi.org/10.1016/j.chb.2016.02.065.

Baker, A. W., Keshaviah, A., Horenstein, A., Goetter, E. M., Mauro, C., Reynolds, C. F., Zisook, S., Katherine Shear, M., & Simon, N. M. (2016). The Role of Avoidance in Complicated Grief: A Detailed Examination of the Grief-Related Avoidance Questionnaire (GRAQ) in a Large Sample of Individuals with Complicated Grief. Journal of Loss and Trauma, 21(6), 533–547. https://doi.org/10.1080/15325024.2016.1157412.

Bax, S., McGill, T., & Hobbs, V. (2021). Maladaptive Behavior in Response to Email Phishing Threats: The Roles of Rewards and Response Costs. Computers and Security, 106, 1–15. https://doi.org/10.1016/j.cose.2021.102278.

Bell, D. E. (1982). Regret in Decision Making Under Uncertainty. Operations Research, 30(5), 961–981. https://doi.org/doi:10.1287/opre.30.5.961.

Bennett, M., & Galpert, L. (1992). Complex Belief-Desire Reasoning in Children. Social Development, 1(3), 201–210. https://doi.org/https://doi.org/10.1111/j.1467-9507.1992.tb00124.x.

Brewer, N. T., DeFrank, J. T., & Gilkey, M. B. (2016). Anticipated regret and health behavior: A meta-analysis. Health Psychology, 35(11), 1264–1275. https://doi.org/10.1037/hea0000294.

Butler, R. (2020). A Systematic Literature Review of The Factors Affecting Smartphone User Threat Avoidance Behaviour. Information and Computer Security, 28(4), 555–574). https://doi.org/10.1108/ICS-01-2020-0016.

Carpenter, D., Young, D. K., Barrett, P., & McLeod, A. J. (2019). Refining technology threat avoidance theory. Communications of the Asso-ciation for Information Systems, 44(1), 380–407. https://doi.org/10.17705/1CAIS.04422.

Fishburn, P. C. (1982). The Foundations of Expected Utility. D. Reidel. Springer.

Gillam, A. R., & Foster, W. T. (2020). Factors Affecting Risky Cybersecurity Behaviors by U.S. Workers: An Exploratory Study. Computers in Human Behavior, 108, 1–12. https://doi.org/10.1016/j.chb.2020.106319.

Gupta, B. B., Perez, G. M., Agrawal, D. P., & Gupta, D. (2020). Handbook of Computer Networks and Cyber Security (1st ed.). Springer International Publishing.

Hair, J. F., Risher, J. J., Sarstedt, M., & Ringle, C. M. (2019). When to use and how to report the results of PLS-SEM. European Business Review, 31(1), 2–24. https://doi.org/10.1108/EBR-11-2018-0203.

Henseler, J., Ringle, C. M., & Sarstedt, M. (2015). A new criterion for assessing discriminant validity in variance-based structural equation modeling. Journal of the Academy of Marketing Science, 43(1), 115–135. https://doi.org/10.1007/s11747-014-0403-8.

IBM. (2022). X-Force Threat Intelligence Index 2022 Full Report. IBM Security.

Jenab, K., & Moslehpour, S. (2016). Cyber Security Management: A Review. Business Management Dynamics, 5(11), 16–39.

Kasmaei, P., Shokravi, F. A., Hidarnia, A., Hajizadeh, E., Atrkar-Roushan, Z., Shirazi, K. K., & Montazeri, A. (2014). Brushing Behavior Among Young Adolescents: Does Perceived Severity Matter. BMC Public Health, 14(8), 1-6. https://doi.org/10.1186/1471-2458-14-8.

Liang, H., & Xue, Y. (2009). Avoidance of Information Technology Threats: A Theoretical Perspective. MIS Quarterly: Management Information Systems, 33(1), 71–90. https://doi.org/10.2307/20650279.

Liang, H., & Xue, Y. (2010). Understanding Security Behaviors in Personal Com-puter Usage: A Threat Avoidance Perspective. Journal of the Association for Information Systems, 11(7), 394–413. https://doi.org/10.17705/1jais.00232

Loomes, G., & Sugden, R. (1982). Regret Theory: An Alternative Theory of Rational Choice Under Uncertainty. The Economic Journal, 92(368), 805–824. https://doi.org/https://doi.org/10.2307/2232669.

Mark, M. S., Borda, O., Stroman, J., Member, C., & Wilson, T. C. (2021). An Analysis of Factors Influencing Phishing Threat Avoidance Behavior: A Quantitative Study. Computers in Human Behavior, 60, 185–197.

NCSI. (2022). National Cyber Security Index - Indonesia. National Cyber ​​Security Index.

PwC. (2022). PwC’s Global Economic Crime and Fraud Survey 2022. PwC.

Saidi, K., & Prayudi, Y. (2021). Analisis Indikator Utama Dalam Information Security-Personality Threat Terhadap Phishing Attack Menggunakan Metode Technology Threat Avoidance Theory (TTAT). JUSTINDO (Jurnal Sistem dan Teknologi Informasi Indonesia), 6(1), 21-30

Shih, E., & Schau, H. J. (2011). To Justify or Not to Justify: The Role of Anticipated Regret on Consumers’ Decisions to Upgrade Technological Innovations. Journal of Retailing, 87(2), 242–251. https://doi.org/https://doi.org/10.1016/j.jretai.2011.01.006.

Shmueli, G., Sarstedt, M., Hair, J. F., Cheah, J. H., Ting, H., Vaithilingam, S., & Ringle, C. M. (2019). Predictive model assessment in PLS-SEM: guidelines for using PLSpredict. European Journal of Marketing, 53(11), 2322–2347. https://doi.org/10.1108/EJM-02-2019-0189.

Sukamulja, S., Meilita, A. Y. N., & Senoputri, D. (2019). Regret Aversion Bias, Mental Accounting, Overconfidence, and Risk Perception in Investment Decision Making on Generation Y Workers in Yogyakarta. International Journal of Economics and Management Studies, 6(7), 102–110. https://doi.org/10.14445/23939125/ijems-v6i7p116.

Sylvester, F. L. (2022). Mobile Device Users’ Susceptibility to Phishing Attacks. International Journal of Computer Science and Information Technology, 14(1), 1–18. https://doi.org/10.5121/ijcsit.2022.14101.

Tang, Z., Miller, A. S., Zhou, Z., & Warkentin, M. (2021). Does government social media promote users’ information security behavior towards COVID-19 scams? Cultivation effects and protective motivations. Government Information Quarterly, 38(2), 1-11. https://doi.org/10.1016/j.giq.2021.101572.

Verkijika, S. F. (2019). If You Know What to Do, Will You Take Action to Avoid Mobile Phishing Attacks: Self-Efficacy, Anticipated Regret, and Gender. Computers in Human Behavior, 101, 286–296. https://doi.org/https://doi.org/10.1016/j.chb.2019.07.034.

Xiling, H., Yuli, Z., Yiran, L., & Yan-ping, P. (2018). A Theoretical Framework for Counterfactual Thinking in The Context of Entrepreneurial Failure. Foreign Economics and Management, 40, 3–15. https://doi.org/10.16538/j.cnki.fem.2018.04.001.

Downloads

Submitted

2024-06-13

Published

2025-08-08

How to Cite

Financial cybercrime avoidance behavior among employees of financial sector companies in Indonesia. (2025). The Indonesian Accounting Review, 14(2), 223-238. https://doi.org/10.14414/tiar.v14i2.4596

How to Cite

Financial cybercrime avoidance behavior among employees of financial sector companies in Indonesia. (2025). The Indonesian Accounting Review, 14(2), 223-238. https://doi.org/10.14414/tiar.v14i2.4596