Cybersecurity Awareness and Digital Minimalism towards Cyber Fraud Prevention in Generation Z

Authors

  • Indah Dwi Novianti Magister Akuntansi, Universitas Diponegoro, Indonesia
  • Anis Chariri Magister Akuntansi, Universitas Diponegoro, Indonesia

Keywords:

Cybersecurity Awareness, Digital Minimalism, Cyber Fraud Prevention

Abstract

The increasing adoption of digital banking among Generation Z has also heightened the risk of cybercrime, particularly cyber fraud. This study aims to analyze the influence of Cybersecurity Awareness and Digital Minimalism on Cyber Fraud Prevention, using a quantitative approach and the Protection Motivation Theory (PMT) framework. Data were collected through an online questionnaire from 77 Generation Z respondents who use digital banking services and were analyzed using multiple linear regression. The findings reveal that both independent variables positively and significantly affect cyber fraud prevention. These results suggest that enhancing digital security awareness and managing digital usage consciously can strengthen efforts to prevent cybercrime. This study contributes to the development of behavior-based prevention strategies and advances the field of digital forensic accounting.

References

Akyon, S. H., Akyon, F. C., Onur, G., & Arman, I. H. (2024). Digital Minimalism: Using Technology for Efficient Healthcare. Eurasian Journal of Family Medicine, 13(4), 147–154. https://doi.org/10.33880/ejfm.2024130401

Ali, M. M., & Mohd Zaharon, N. F. (2024). Phishing—A Cyber Fraud: The Types, Implications and Governance. International Journal of Educational Reform, 33(1), 101–121. https://doi.org/10.1177/10567879221082966

Al-Khateeb, H. M., & Epiphaniou, G. (2022). Behavioural aspects of cyber security: Exploring the role of self-efficacy and awareness campaigns. Computers & Security, 115, 102608. https://doi.org/10.1016/j.cose.2022.102608

Ameen, N., Cheah, J. H., Sharma, A., & Rana, N. P. (2023). Cybersecurity behaviour of consumers in the era of digital banking: A protection motivation theory approach. Internet Research, 33(6), 1630–1653. https://doi.org/10.1108/INTR-03-2022-0147

Ariffin, S. K., & Mohamed, Z. (2023). Understanding digital privacy behaviour among young consumers: A study using the Protection Motivation Theory. Journal of Consumer Marketing, 40(4), 407–417. https://doi.org/10.1108/JCM-08-2022-5351

Bada, M., Sasse, A. M., & Nurse, J. R. C. (2019). Cyber security awareness campaigns: Why do they fail to change behaviour? arXiv preprint arXiv:1901.02672. https://arxiv.org/abs/1901.02672

Bognár, L., & Bottyán, L. (2024). Evaluating Online Security Behavior: Development and Validation of a Personal Cybersecurity Awareness Scale for University Students. Education Sciences, 14(6). https://doi.org/10.3390/educsci14060588

Booc, A. C., Moisescu, O. I., & Gică, O.-A. (2024). Digital minimalism and online privacy behaviour: Evidence from young digital users. Technological Forecasting and Social Change, 197, 122886. https://doi.org/10.1016/j.techfore.2023.122886

Booc, N. B. B., Budiongan, K., & Carballo, R. (2024). Cybersecurity Awareness and Cybersecurity Behavior of High School Students in Davao City: A Mediation Role of Perceived Behavioral Control. European Journal of Applied Science, Engineering and Technology, 2(3), 4–9. https://doi.org/10.59324/ejaset.2024.2(3).01

Boss, S. R., Galletta, D. F., Lowry, P. B., Moody, G. D., & Polak, P. (2015). What do users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors. Information Systems Journal, 25(2), 137–170. https://onlinelibrary.wiley.com/doi/abs/10.1111/isj.12030

BSSN. (2022). BSSN: Industri Keuangan Rawan Serangan Siber, Lakukan Update Aplikasi Digital Secara Berkala. Badan Siber Dan Sandi Negara. https://www.bssn.go.id/bssn-industri-keuangan-rawan-serangan-siber-lakukan-update-aplikasi-digital-secara-berkala/

Chouhan, R., & Mehta, D. (2022). Cyber security awareness and practices among young internet users. Information and Computer Security, 30(1), 92–108. https://doi.org/10.1108/ICS-06-2021-0071

Crossler, R. E., & Bélanger, F. (2014). An extended perspective on individual security behaviors: Protection motivation theory and a unified security practices (USP) instrument. Information Systems Journal, 24(1), 61–83. https://www.jstor.org/stable/43825789

Flores, W. R., Antonsen, E., & Ekstedt, M. (2014). Information security knowledge sharing in organizations: Investigating the effect of behavioral information security governance and social incentives. Computers & Security, 43, 33–44. https://doi.org/10.1016/j.cose.2014.02.013

Flores, W. R., Holm, H., & Nohlberg, M. (2014). Investigating personal determinants of phishing and the effect of national culture. Computers & Security, 46, 28–47. https://www.sciencedirect.com/science/article/pii/S0167404814000296

Hadlington, L. (2017). Human factors in cybersecurity: Examining the link between Internet addiction, impulsivity, attitudes towards cybersecurity, and risky cybersecurity behaviours. Heliyon, 3(7), e00346. https://doi.org/10.1016/j.heliyon.2017.e00346

Hadlington, L., & Parsons, K. (2017). Qualitative perceptions of employee security behaviour and challenges in organizational settings: A thematic analysis. Journal of Cybersecurity and Digital Forensics, 2(1), 1–12. https://onlinelibrary.wiley.com/doi/full/10.1002/cbdv.201700032

Ifinedo, P. (2012). Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory. Computers & Security, 31(1), 83–95. https://doi.org/10.1016/j.cose.2011.10.007

Ifinedo, P. (2012). Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory. Computers & Security, 31(1), 83–95. https://www.sciencedirect.com/science/article/pii/S0268401218302093

Johnston, A. C., & Warkentin, M. (2010). Fear appeals and information security behaviors: An empirical study. MIS Quarterly, 34(3), 549–566. https://onlinelibrary.wiley.com/doi/abs/10.1111/j.1540-5915.2009.00245.x

Kiran, U., Khan, N. F., Murtaza, H., Farooq, A., & Pirkkalainen, H. (2025). Explanatory and predictive modeling of cybersecurity behaviors using protection motivation theory. Computers and Security, 149(October 2024), 104204. https://doi.org/10.1016/j.cose.2024.104204

Kircaburun, K., Griffiths, M. D., & Billieux, J. (2020). Trait emotional intelligence and problematic online behaviors among adolescents: The mediating role of Internet use motives. Computers in Human Behavior, 108, 106327. https://doi.org/10.1016/j.chb.2020.106327

Kuzior, A., Tiutiunyk, I., Zielińska, A., & Kelemen, R. (2024). Cybersecurity and cybercrime: Current trends and threats. Journal of International Studies, 17(2), 220–239. https://doi.org/10.14254/2071-8330.2024/17-2/12

Li, Y., & Siponen, M. (2024). The role of digital well-being and minimalism in predicting cybersecurity behavior. Information & Management, 61(1), 103755. https://doi.org/10.1016/j.im.2023.103755

Liang, H., & Xue, Y. (2010). Understanding security behaviors in personal computer usage: A threat avoidance perspective. Journal of the Association for Information Systems, 11(7), 394–413. https://www.sciencedirect.com/science/article/pii/S0167404816300190

Lisnayanti, N. W. S., & Sukma, P. (2025). Dampak Penggunaan E-Wallet terhadap Efisiensi Pengelolaan Keuangan dengan Dimoderasi oleh Digital Native pada Gen Z. 14(03), 317–329. https://doi.org/10.24843/EEB.2025.v14.i03.p03

Lowry, P. B., Posey, C., Bennett, R. J., & Roberts, T. L. (2015). Leveraging fairness and reactance theories to deter reactive computer abuse following enhanced organizational information security policies: An empirical study of the influence of counterfactual thinking and organizational trust. Information Systems Journal, 25(3), 193–273. https://doi.org/10.1111/isj.12050

Maier, C., Laumer, S., Eckhardt, A., & Weitzel, T. (2015). Giving too much social support: Social overload on social networking sites. European Journal of Information Systems, 24(5), 447–464. https://www.sciencedirect.com/science/article/pii/S0040162521000329

Newport, C. (2019). Digital minimalism: Choosing a focused life in a noisy world. Penguin Publishing Group.

Nurdien, F. G., & Galuh, A. K. (2023). Pengaruh Literasi Keuangan dan Literasi Digital terhadap Preferensi Menggunakan Qris Bsi Mobile (Studi Kasus Gen Z Di Kota Malang). Islamic Economics and Finance in Focus, 2(4), 588–601. https://doi.org/10.21776/ieff.2023.02.04.02

Nurhakim, M. I., & Asbari, M. (2023). Digital Minimalism: Filosofi Efisiensi Penggunaan Teknologi Digital. Literaksi: Jurnal Manajemen Pendidikan, 1(2), 49–54. https://doi.org/10.30596/jimb.v22i1.4888

Pramesti, I. G. A. I. S., & Kresnandra, A. A. N. A. (2024). Pengaruh Persepsi Kemudahan Penggunaan, Kualitas Layanan, dan Risiko Keamanan Informasi terhadap Penggunaan Dompet Digital. E-Jurnal Ekonomi Dan Bisnis Universitas Udayana, 13(7), 1443–1453. https://journalpedia.com/1/index.php/dkms/article/view/1775%0Ahttps://journalpedia.com/1/index.php/dkms/article/download/1775/1809

Puspadini, M. (2025). Transaksi Bank Digital Tumbuh 40,1%, Didominasi Gen Z & Milenial. CNBC Indonesia. https://www.cnbcindonesia.com/market/20250314201903-17-618812/transaksi-bank-digital-tumbuh-401-didominasi-gen-z-milenial

Renaud, K., Volkamer, M., & Renkema-Padmos, A. (2014). Why doesn’t Jane protect her privacy? The influence of usability, risk perception, and social norms on security and privacy behaviour. Information & Computer Security, 22(1), 30–49. https://doi.org/10.1108/ICS-03-2013-0010

Rogers, R. W. (1975). A Protection Motivation Theory of Fear Appeals and Attitude Change1. The Journal of Psychology, 91(91–1144). https://doi.org/https://doi.org/10.1080/00223980.1975.9915803

Sikdar, S., & Maiti, M. (2023). Phishing vulnerability and user behavior: The role of cyber hygiene and social engineering awareness. Journal of Enterprise Information Management, 36(2), 303–323. https://doi.org/10.1108/JEIM-06-2022-0274

Simanjuntak, M. H. (2024). OJK: Kerugian Konsumen Akibat Scam dan Fraud Mencapai Rp2,5 Triliun. Antara. https://www.antaranews.com/berita/4523695/ojk-kerugian-konsumen-akibat-scam-dan-fraud-mencapai-rp25-triliun

Sulaiman, F. (2024). Survei Populix Ungkap Gen Z Dominasi Pengguna Bank Digital di Indonesia. Warta Ekonomi. https://wartaekonomi.co.id/read538862/survei-populix-ungkap-gen-z-dominasi-pengguna-bank-digital-di-indonesia

Sulaiman, N. S., Fauzi, M. A., Hussain, S., & Wider, W. (2022). Cybersecurity Behavior among Government Employees: The Role of Protection Motivation Theory and Responsibility in Mitigating Cyberattacks. Information (Switzerland), 13(9). https://doi.org/10.3390/info13090413

Tariq, E., Akour, I., Al-Shanableh, N., Alquqa, E. K., Alzboun, N., Al-Hawary, S. I. S., & Alshurideh, M. T. (2024). How cybersecurity influences fraud prevention: An empirical study on Jordanian commercial banks. International Journal of Data and Network Science, 8(1), 69–76. https://doi.org/10.5267/j.ijdns.2023.10.016

Tsai, H. Y. S., Jiang, M., Alhabash, S., LaRose, R., Rifon, N. J., & Cotten, S. R. (2022). Understanding online safety behaviors: A protection motivation theory perspective. Computers & Security, 114, 102582. https://www.sciencedirect.com/science/article/pii/S0167404822004412

Vafaei-Zadeh, A., Nikbin, D., Teoh, K. Y., & Hanifah, H. (2024). Cybersecurity awareness and fear of cyberattacks among online banking users in Malaysia. International Journal of Bank Marketing, 43(3), 476–505. https://doi.org/10.1108/IJBM-03-2024-0138

Vance, A., Anderson, B. B., Kirwan, C. B., & Eargle, D. (2014). Using measures of risk perception to predict information security behavior: Insights from electroencephalography (EEG). Journal of the Association for Information Systems, 15(10), 679–722. https://www.jstor.org/stable/43825953

Warkentin, M., Johnston, A. C., & Shropshire, J. (2016). The influence of the informal social learning environment on information privacy policy compliance efficacy and intention. European Journal of Information Systems, 25(4), 344–361. https://onlinelibrary.wiley.com/doi/abs/10.1111/isj.12050

Zahedi, F. M., Abbasi, A., & Chen, Y. (2013). Fake website detection tools: Identifying elements that promote their usage. arXiv preprint arXiv:1309.7262. https://arxiv.org/abs/1309.7262

Zwilling, M., Klien, G., Lesjak, D., Wiechetek, L., Cetin, F., & Basim, H. N. (2022). Cyber security awareness, knowledge and behavior: A comparative study. Journal of Computer Information Systems, 62(1), 82–93. https://doi.org/10.1080/08874417.2020.1712269

Downloads

Published

30-09-2025

How to Cite

Indah Dwi Novianti, & Anis Chariri. (2025). Cybersecurity Awareness and Digital Minimalism towards Cyber Fraud Prevention in Generation Z. E-Jurnal Akuntansi, 35(9). Retrieved from https://ejournal1.unud.ac.id/index.php/akuntansi/article/view/2088

Issue

Section

Articles