Cybersecurity Awareness and Digital Minimalism towards Cyber Fraud Prevention in Generation Z
Keywords:
Cybersecurity Awareness, Digital Minimalism, Cyber Fraud PreventionAbstract
The increasing adoption of digital banking among Generation Z has also heightened the risk of cybercrime, particularly cyber fraud. This study aims to analyze the influence of Cybersecurity Awareness and Digital Minimalism on Cyber Fraud Prevention, using a quantitative approach and the Protection Motivation Theory (PMT) framework. Data were collected through an online questionnaire from 77 Generation Z respondents who use digital banking services and were analyzed using multiple linear regression. The findings reveal that both independent variables positively and significantly affect cyber fraud prevention. These results suggest that enhancing digital security awareness and managing digital usage consciously can strengthen efforts to prevent cybercrime. This study contributes to the development of behavior-based prevention strategies and advances the field of digital forensic accounting.
References
Akyon, S. H., Akyon, F. C., Onur, G., & Arman, I. H. (2024). Digital Minimalism: Using Technology for Efficient Healthcare. Eurasian Journal of Family Medicine, 13(4), 147–154. https://doi.org/10.33880/ejfm.2024130401
Ali, M. M., & Mohd Zaharon, N. F. (2024). Phishing—A Cyber Fraud: The Types, Implications and Governance. International Journal of Educational Reform, 33(1), 101–121. https://doi.org/10.1177/10567879221082966
Al-Khateeb, H. M., & Epiphaniou, G. (2022). Behavioural aspects of cyber security: Exploring the role of self-efficacy and awareness campaigns. Computers & Security, 115, 102608. https://doi.org/10.1016/j.cose.2022.102608
Ameen, N., Cheah, J. H., Sharma, A., & Rana, N. P. (2023). Cybersecurity behaviour of consumers in the era of digital banking: A protection motivation theory approach. Internet Research, 33(6), 1630–1653. https://doi.org/10.1108/INTR-03-2022-0147
Ariffin, S. K., & Mohamed, Z. (2023). Understanding digital privacy behaviour among young consumers: A study using the Protection Motivation Theory. Journal of Consumer Marketing, 40(4), 407–417. https://doi.org/10.1108/JCM-08-2022-5351
Bada, M., Sasse, A. M., & Nurse, J. R. C. (2019). Cyber security awareness campaigns: Why do they fail to change behaviour? arXiv preprint arXiv:1901.02672. https://arxiv.org/abs/1901.02672
Bognár, L., & Bottyán, L. (2024). Evaluating Online Security Behavior: Development and Validation of a Personal Cybersecurity Awareness Scale for University Students. Education Sciences, 14(6). https://doi.org/10.3390/educsci14060588
Booc, A. C., Moisescu, O. I., & Gică, O.-A. (2024). Digital minimalism and online privacy behaviour: Evidence from young digital users. Technological Forecasting and Social Change, 197, 122886. https://doi.org/10.1016/j.techfore.2023.122886
Booc, N. B. B., Budiongan, K., & Carballo, R. (2024). Cybersecurity Awareness and Cybersecurity Behavior of High School Students in Davao City: A Mediation Role of Perceived Behavioral Control. European Journal of Applied Science, Engineering and Technology, 2(3), 4–9. https://doi.org/10.59324/ejaset.2024.2(3).01
Boss, S. R., Galletta, D. F., Lowry, P. B., Moody, G. D., & Polak, P. (2015). What do users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors. Information Systems Journal, 25(2), 137–170. https://onlinelibrary.wiley.com/doi/abs/10.1111/isj.12030
BSSN. (2022). BSSN: Industri Keuangan Rawan Serangan Siber, Lakukan Update Aplikasi Digital Secara Berkala. Badan Siber Dan Sandi Negara. https://www.bssn.go.id/bssn-industri-keuangan-rawan-serangan-siber-lakukan-update-aplikasi-digital-secara-berkala/
Chouhan, R., & Mehta, D. (2022). Cyber security awareness and practices among young internet users. Information and Computer Security, 30(1), 92–108. https://doi.org/10.1108/ICS-06-2021-0071
Crossler, R. E., & Bélanger, F. (2014). An extended perspective on individual security behaviors: Protection motivation theory and a unified security practices (USP) instrument. Information Systems Journal, 24(1), 61–83. https://www.jstor.org/stable/43825789
Flores, W. R., Antonsen, E., & Ekstedt, M. (2014). Information security knowledge sharing in organizations: Investigating the effect of behavioral information security governance and social incentives. Computers & Security, 43, 33–44. https://doi.org/10.1016/j.cose.2014.02.013
Flores, W. R., Holm, H., & Nohlberg, M. (2014). Investigating personal determinants of phishing and the effect of national culture. Computers & Security, 46, 28–47. https://www.sciencedirect.com/science/article/pii/S0167404814000296
Hadlington, L. (2017). Human factors in cybersecurity: Examining the link between Internet addiction, impulsivity, attitudes towards cybersecurity, and risky cybersecurity behaviours. Heliyon, 3(7), e00346. https://doi.org/10.1016/j.heliyon.2017.e00346
Hadlington, L., & Parsons, K. (2017). Qualitative perceptions of employee security behaviour and challenges in organizational settings: A thematic analysis. Journal of Cybersecurity and Digital Forensics, 2(1), 1–12. https://onlinelibrary.wiley.com/doi/full/10.1002/cbdv.201700032
Ifinedo, P. (2012). Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory. Computers & Security, 31(1), 83–95. https://doi.org/10.1016/j.cose.2011.10.007
Ifinedo, P. (2012). Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory. Computers & Security, 31(1), 83–95. https://www.sciencedirect.com/science/article/pii/S0268401218302093
Johnston, A. C., & Warkentin, M. (2010). Fear appeals and information security behaviors: An empirical study. MIS Quarterly, 34(3), 549–566. https://onlinelibrary.wiley.com/doi/abs/10.1111/j.1540-5915.2009.00245.x
Kiran, U., Khan, N. F., Murtaza, H., Farooq, A., & Pirkkalainen, H. (2025). Explanatory and predictive modeling of cybersecurity behaviors using protection motivation theory. Computers and Security, 149(October 2024), 104204. https://doi.org/10.1016/j.cose.2024.104204
Kircaburun, K., Griffiths, M. D., & Billieux, J. (2020). Trait emotional intelligence and problematic online behaviors among adolescents: The mediating role of Internet use motives. Computers in Human Behavior, 108, 106327. https://doi.org/10.1016/j.chb.2020.106327
Kuzior, A., Tiutiunyk, I., Zielińska, A., & Kelemen, R. (2024). Cybersecurity and cybercrime: Current trends and threats. Journal of International Studies, 17(2), 220–239. https://doi.org/10.14254/2071-8330.2024/17-2/12
Li, Y., & Siponen, M. (2024). The role of digital well-being and minimalism in predicting cybersecurity behavior. Information & Management, 61(1), 103755. https://doi.org/10.1016/j.im.2023.103755
Liang, H., & Xue, Y. (2010). Understanding security behaviors in personal computer usage: A threat avoidance perspective. Journal of the Association for Information Systems, 11(7), 394–413. https://www.sciencedirect.com/science/article/pii/S0167404816300190
Lisnayanti, N. W. S., & Sukma, P. (2025). Dampak Penggunaan E-Wallet terhadap Efisiensi Pengelolaan Keuangan dengan Dimoderasi oleh Digital Native pada Gen Z. 14(03), 317–329. https://doi.org/10.24843/EEB.2025.v14.i03.p03
Lowry, P. B., Posey, C., Bennett, R. J., & Roberts, T. L. (2015). Leveraging fairness and reactance theories to deter reactive computer abuse following enhanced organizational information security policies: An empirical study of the influence of counterfactual thinking and organizational trust. Information Systems Journal, 25(3), 193–273. https://doi.org/10.1111/isj.12050
Maier, C., Laumer, S., Eckhardt, A., & Weitzel, T. (2015). Giving too much social support: Social overload on social networking sites. European Journal of Information Systems, 24(5), 447–464. https://www.sciencedirect.com/science/article/pii/S0040162521000329
Newport, C. (2019). Digital minimalism: Choosing a focused life in a noisy world. Penguin Publishing Group.
Nurdien, F. G., & Galuh, A. K. (2023). Pengaruh Literasi Keuangan dan Literasi Digital terhadap Preferensi Menggunakan Qris Bsi Mobile (Studi Kasus Gen Z Di Kota Malang). Islamic Economics and Finance in Focus, 2(4), 588–601. https://doi.org/10.21776/ieff.2023.02.04.02
Nurhakim, M. I., & Asbari, M. (2023). Digital Minimalism: Filosofi Efisiensi Penggunaan Teknologi Digital. Literaksi: Jurnal Manajemen Pendidikan, 1(2), 49–54. https://doi.org/10.30596/jimb.v22i1.4888
Pramesti, I. G. A. I. S., & Kresnandra, A. A. N. A. (2024). Pengaruh Persepsi Kemudahan Penggunaan, Kualitas Layanan, dan Risiko Keamanan Informasi terhadap Penggunaan Dompet Digital. E-Jurnal Ekonomi Dan Bisnis Universitas Udayana, 13(7), 1443–1453. https://journalpedia.com/1/index.php/dkms/article/view/1775%0Ahttps://journalpedia.com/1/index.php/dkms/article/download/1775/1809
Puspadini, M. (2025). Transaksi Bank Digital Tumbuh 40,1%, Didominasi Gen Z & Milenial. CNBC Indonesia. https://www.cnbcindonesia.com/market/20250314201903-17-618812/transaksi-bank-digital-tumbuh-401-didominasi-gen-z-milenial
Renaud, K., Volkamer, M., & Renkema-Padmos, A. (2014). Why doesn’t Jane protect her privacy? The influence of usability, risk perception, and social norms on security and privacy behaviour. Information & Computer Security, 22(1), 30–49. https://doi.org/10.1108/ICS-03-2013-0010
Rogers, R. W. (1975). A Protection Motivation Theory of Fear Appeals and Attitude Change1. The Journal of Psychology, 91(91–1144). https://doi.org/https://doi.org/10.1080/00223980.1975.9915803
Sikdar, S., & Maiti, M. (2023). Phishing vulnerability and user behavior: The role of cyber hygiene and social engineering awareness. Journal of Enterprise Information Management, 36(2), 303–323. https://doi.org/10.1108/JEIM-06-2022-0274
Simanjuntak, M. H. (2024). OJK: Kerugian Konsumen Akibat Scam dan Fraud Mencapai Rp2,5 Triliun. Antara. https://www.antaranews.com/berita/4523695/ojk-kerugian-konsumen-akibat-scam-dan-fraud-mencapai-rp25-triliun
Sulaiman, F. (2024). Survei Populix Ungkap Gen Z Dominasi Pengguna Bank Digital di Indonesia. Warta Ekonomi. https://wartaekonomi.co.id/read538862/survei-populix-ungkap-gen-z-dominasi-pengguna-bank-digital-di-indonesia
Sulaiman, N. S., Fauzi, M. A., Hussain, S., & Wider, W. (2022). Cybersecurity Behavior among Government Employees: The Role of Protection Motivation Theory and Responsibility in Mitigating Cyberattacks. Information (Switzerland), 13(9). https://doi.org/10.3390/info13090413
Tariq, E., Akour, I., Al-Shanableh, N., Alquqa, E. K., Alzboun, N., Al-Hawary, S. I. S., & Alshurideh, M. T. (2024). How cybersecurity influences fraud prevention: An empirical study on Jordanian commercial banks. International Journal of Data and Network Science, 8(1), 69–76. https://doi.org/10.5267/j.ijdns.2023.10.016
Tsai, H. Y. S., Jiang, M., Alhabash, S., LaRose, R., Rifon, N. J., & Cotten, S. R. (2022). Understanding online safety behaviors: A protection motivation theory perspective. Computers & Security, 114, 102582. https://www.sciencedirect.com/science/article/pii/S0167404822004412
Vafaei-Zadeh, A., Nikbin, D., Teoh, K. Y., & Hanifah, H. (2024). Cybersecurity awareness and fear of cyberattacks among online banking users in Malaysia. International Journal of Bank Marketing, 43(3), 476–505. https://doi.org/10.1108/IJBM-03-2024-0138
Vance, A., Anderson, B. B., Kirwan, C. B., & Eargle, D. (2014). Using measures of risk perception to predict information security behavior: Insights from electroencephalography (EEG). Journal of the Association for Information Systems, 15(10), 679–722. https://www.jstor.org/stable/43825953
Warkentin, M., Johnston, A. C., & Shropshire, J. (2016). The influence of the informal social learning environment on information privacy policy compliance efficacy and intention. European Journal of Information Systems, 25(4), 344–361. https://onlinelibrary.wiley.com/doi/abs/10.1111/isj.12050
Zahedi, F. M., Abbasi, A., & Chen, Y. (2013). Fake website detection tools: Identifying elements that promote their usage. arXiv preprint arXiv:1309.7262. https://arxiv.org/abs/1309.7262
Zwilling, M., Klien, G., Lesjak, D., Wiechetek, L., Cetin, F., & Basim, H. N. (2022). Cyber security awareness, knowledge and behavior: A comparative study. Journal of Computer Information Systems, 62(1), 82–93. https://doi.org/10.1080/08874417.2020.1712269
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 E-Jurnal Akuntansi

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.