This study delves into the nuanced interplay of direct and indirect relationships between depression, anxiety, emotional exhaustion, and susceptibility, with low internal control acting as a mediator in the context of online scams among the working adult population. Centralizing on the Conservation of Resources (COR) theory, data collection involved the administration of a meticulous survey questionnaire, yielding a robust dataset of 306 clean responses. Employing the sophisticated analytical capabilities of SmartPLS 4, the findings illuminate low internal control as a pivotal determinant, wielding the most substantial influence on intention while concurrently showcasing the lowest performance score. The implications of these findings are extensive, suggesting targeted interventions to alleviate depression, anxiety, and emotional exhaustion as impactful strategies for fortifying internal control. This, in turn, holds the promise of reducing susceptibility to online scams within the demographic of working adults. Emphasizing practical relevance, the study underscores the significance of workplace initiatives promoting mental health, while advocating for future research endeavors to explore the multifaceted impact of emerging technologies and organizational culture on the dynamic landscape of cybersecurity. Adopting a holistic approach, the study's insights offer actionable recommendations for individuals and organizations alike, fostering the development of comprehensive strategies to elevate cybersecurity resilience within the contemporary digital workplace.
Alhaddad, M., Mohd, M., Qamar, F., & Imam, M. (2023). Study of Student Personality Trait on
Spear-Phishing Susceptibility Behavior. International Journal of Advanced Computer Science and Applications, 14(5).
Ayaburi, E. W., & Andoh-Baidoo, F. K. (2023). How do technology use patterns influence
phishing susceptibility? A two-wave study of the role of reformulated locus of control. European Journal of Information Systems, 1-21.
Boyle, P. A., Yu, L., Mottola, G., Innes, K., & Bennett, D. A. (2022). Degraded rationality and
suboptimal decision-making in old age: A silent epidemic with major economic and public health implications. Public Policy & Aging Report, 32(2), 45-50.
Burns, A. J., Roberts, T. L., Posey, C., Lowry, P. B., & Fuller, B. (2023). Going beyond
deterrence: a middle-range theory of motives and controls for insider computer abuse. Information Systems Research, 34(1), 342-362.
Cavaliere, L. P. L., Lourens, M. E., Muda, I., Kumar, A., Chabani, Z., Swadia, B. U., ... & Regin,
R. (2021). The impact of internal control practices on minimizing fraud in companies. Natural Volatiles and Essential Oils; 8(5).
Cohen, J. (1992). A power primer. Psychological Bulletin, 112, 155–159. doi:10.1037/0033-
2909.112.1.155
DeLiema, M., Li, Y., & Mottola, G. (2023). Correlates of responding to and becoming
victimized by fraud: Examining risk factors by scam type. International Journal of Consumer Studies, 47(3), 1042-1059.
Ebner, N. C., Ellis, D. M., Lin, T., Rocha, H. A., Yang, H., Dommaraju, S., ... & Oliveira, D. S.
(2020). Uncovering susceptibility risk to online deception in aging. The Journals of Gerontology: Series B, 75(3), 522-533.
Fainstad, T., Mann, A., Suresh, K., Shah, P., Dieujuste, N., Thurmon, K., & Jones, C. D. (2022).
Effect of a novel online group-coaching program to reduce burnout in female resident physicians: a randomized clinical trial. JAMA network open, 5(5), e2210752-e2210752.
Guerra, A., & Taylor, K. (2021). Scam Susceptibility: Determining the Dominant Factor for an
Adolescent’s Decision-making. Journal of Student Research, 10(4).
Hair, J. F., Hult, G. T. M., Ringle, C. M., & Sarstedt, M. (2017). A primer on partial least squares structural equation modeling (PLS-SEM) (2nd ed.). Thousand
Oaks, CA: SAGE.
Hair, J. F., Hult, G. T. M., Ringle, C. M., & Sarstedt, M. (2022). A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM) (3 ed.). Thousand Oaks, CA: Sage.
Hall, L., Moray, J., Gross, E., & Lichtenberg, P. A. (2022). The relationship between financial
decision-making and financial exploitation in older Black adults. Journal of aging and health, 34(3), 472-481.
Henseler, J., Ringle, C. M., and Sarstedt, M. (2015). A new criterion for assessing discriminant validity in variance-based structural equation modeling, Journal of the Academy of Marketing Science, 43(1): 115-135.
Hobfoll, S. E. (1989). Conservation of resources: A new attempt at conceptualizing
stress. American Psychologist, 44(3), 513–524. https://doi.org/10.1037/0003-066X.44.3.513
Kock, N., & Lynn, G. S. (2012). Lateral collinearity and misleading results in variance-based SEM: An illustration and recommendations. Journal of the Association for
Information Systems, 13(7), 546-580.
Kock, N. (2015). Common method bias in PLS-SEM: A full collinearity assessment approach.
International Journal of e-Collaboration, 11(4), 1-10.
Lazarus, S., Whittaker, J. M., McGuire, M. R., & Platt, L. (2023). What do we know about
online romance fraud studies? A systematic review of the empirical literature (2000 to 2021). Journal of Economic Criminology, 100013.
Lee, Y. Y., Gan, C. L., & Liew, T. W. (2022). Phishing victimization among Malaysian young
adults: cyber routine activities theory and attitude in information sharing online. The Journal of Adult Protection, 24(3/4), 179-194.
Leonardo Cavaliere, L. P., Subhash, N., Durga Rao, P. V., Mittal, P., Koti, K., Chakravarthi, M.
K., ... & Regin, R. (2021). The Impact of Internet Fraud on Financial Performance of Banks. Turkish Online Journal of Qualitative Inquiry, 12(6).
Liengaard, B. D., Sharma, P. N., Hult, G. T. M., Jensen, M. B., Sarstedt, M., Hair, J. F., & Ringle, C. M. (2021). Prediction: Coveted, Yet Forsaken? Introducing a Cross-validated Predictive Ability Test in Partial Least Squares Path Modeling. Decision Sciences, 52(2), 362-392.
Mann, A., Shah, A. N., Thibodeau, P. S., Dyrbye, L., Syed, A., Woodward, M. A., ... & Fainstad,
T. (2023). Online well-being group coaching program for women physician trainees: a randomized clinical trial. JAMA Network Open, 6(10), e2335541-e2335541.
McDowell, J. (2023). Exploring the Relationship Between Self-Esteem, Financial Egocentrism,
and Fraud Susceptibility in Cyber-Enabled Fraud Schemes Involving Crypto Assets.
Nolte, J., Hanoch, Y., Wood, S., & Hengerer, D. (2021). Susceptibility to COVID-19 scams: The
roles of age, individual difference measures, and scam-related perceptions. Frontiers in Psychology, 12, 789883.
Palmieri, M., Shortland, N., & McGarry, P. (2021). Personality and online deviance: The role
of reinforcement sensitivity theory in cybercrime. Computers in human behavior, 120, 106745.
Nugroho, D. S., & Diyanty, V. (2022). Hexagon Fraud in Fraudulent Financial Statements: the
Moderating Role of Audit Committee. Jurnal Akuntansi Dan Keuangan I Indonesia, 19(1), 3.
Reeves, A., Delfabbro, P., & Calic, D. (2021). Encouraging employee engagement with
cybersecurity: How to tackle cyber fatigue. SAGE open, 11(1), 21582440211000049.
Ringle, C. M., and Sarstedt, M. (2016). Gain more insight from your PLS-SEM results: The
importance-performance map analysis. Industrial Management & Data Systems. 116: 1865–1886.
Sarno, D. M., & Black, J. (2023). Who Gets Caught in the Web of Lies?: Understanding
Susceptibility to Phishing Emails, Fake News Headlines, and Scam Text Messages. Human Factors, 00187208231173263.
Shmueli, G., M. Sarstedt, J.F. Hair, J.-H. Cheah, H. Ting, S. Vaithilingam, and C.M. Ringle.
(2019). Predictive model assessment in PLS-SEM: Guidelines for using PLSpredict.
European Journal of Marketing. 53: 2322–2347.
Singh, M. M., Frank, R., & Zainon, W. M. N. W. (2021). Cyber-criminology defense in pervasive
environment: A study of cybercrimes in Malaysia. Bulletin of Electrical Engineering and Informatics, 10(3), 1658-1668.
Smith, R. E., & Ascough, J. C. (2016). Promoting emotional resilience cognitive-affective stress
management training. New York, NY: Guilford Publication, Inc.
Sur, A., DeLiema, M., & Brown, E. (2021). Contextual and social predictors of scam
susceptibility and fraud victimization. Available at SSRN 4053903.
Tang, J., Akram, U., & Shi, W. (2021). Why people need privacy? The role of privacy fatigue
in app users' intention to disclose privacy: based on personality traits. Journal of Enterprise Information Management, 34(4), 1097-1120.
Thomas, M. F., Binder, A., & Matthes, J. (2021). RETRACTED ARTICLE: Sexting during social
isolation: Predicting sexting-related privacy management during the COVID-19 pandemic. Cyberpsychology: Journal of Psychosocial Research on Cyberspace, 15(3).
Ting, T. T., Cheah, K. M., Khiew, J. X., Lee, Y. C., Chaw, J. K., & Teoh, C. K. (2024). Validation of
cyber security behaviour among adolescents at Malaysia university: Revisiting gender as a role. International Journal of Innovative Research and Scientific Studies, 7(1), 127-137.
Ulo, E. D. A. F. E. (2022). Socio-Economic Status and Peer Influence as Correlate of Juvenile
Involvement In Internet Fraud In Delta State, Nigeria. International Journal of Scientific and Research Publications, 12(11), 305.
Wen, X., Xu, L., Wang, J., Gao, Y., Shi, J., Zhao, K., ... & Qian, X. (2022). Mental States: A Key
Point in Scam Compliance and Warning Compliance in Real Life. International Journal of Environmental Research and Public Health, 19(14), 8294.
Wilson, S., Hassan, N. A., Khor, K. K., Sinnappan, S., Abu Bakar, A. R., & Tan, S. A. (2023). A
holistic qualitative exploration on the perception of scams, scam techniques and effectiveness of anti-scam campaigns in Malaysia. Journal of Financial Crime.
Yong, H. N. A., Kuah, Y. C., Wei, C. Y., & Rafay, A. (2023). Consumer Risk Perception Towards
Cybercrimes and E-Commerce: The Case of Malaysia. In Theory and Practice of Illegitimate Finance (pp. 184-202). IGI Global.