Cryptocurrency Security Risk: Awareness Among General Public in Malaysia
Abstract
In the age of digital payments, cryptocurrencies have gained significant attention as an alternative investment option. However, security risks such as phishing, hacking, and fraudulent exchanges present challenges for investors. This study aims to assess the level of awareness among the general public in Malaysia regarding cryptocurrency security risks. A quantitative research method was employed, using a survey questionnaire distributed to 150 Malaysian citizens via social media platforms. The questionnaire explored respondents' knowledge of cryptocurrencies, awareness of security risks, and protective measures such as security programs, two-factor authentication (2FA), and education. The results of the regression analysis show that the installation of security programs, 2FA, and public education are all significant predictors of increased awareness of cryptocurrency security risks, with a combined R² value of 0.523. This suggests that 52.3% of the variance in awareness is explained by these factors. The study concludes that strengthening security measures and providing education can significantly improve public understanding of cryptocurrency risks, leading to safer investment practices. The implications of these findings highlight the need for targeted education and security initiatives to enhance public confidence in cryptocurrency, making digital currency investments more secure.
Keywords
Full Text:
PDFReferences
Ajupov, A., Sherstobitova, A., Syrotiuk, S., & Karataev, A. (2019). The risk-management theory in modern economic conditions. In E3S Web of Conferences (Vol. 110, p. 02040). EDP Sciences. https://doi.org/10.1051/e3sconf/201911002040
Al-Amri, R., Zakaria, N. H., Habbal, A., & Hassan, S. (2019). Cryptocurrency adoption: current stage, opportunities, and open challenges. International Journal of Advanced Computer Research, 9(44), 293-307. http://dx.doi.org/10.19101/IJACR.PID43
Boerman, S. C., Kruikemeier, S., & Zuiderveen Borgesius, F. J. (2021). Exploring motivations for online privacy protection behavior: Insights from panel data. Communication Research, 48(7), 953-977. https://doi.org/10.1177/0093650218800915
Bouri, E., Gabauer, D., Gupta, R., & Tiwari, A. K. (2021). Volatility connectedness of major cryptocurrencies: The role of investor happiness. Journal of Behavioral and Experimental Finance, 30, 100463. https://doi.org/10.1016/j.jbef.2021.100463
Breuer, F., Goyal, V., & Malavolta, G. (2021, September). Cryptocurrencies with security policies and two-factor authentication. In 2021 IEEE European Symposium on Security and Privacy (EuroS&P) (pp. 140-158). IEEE. https://doi.org/10.1109/EuroSP51992.2021.00020
Britannica Money. (2024). Cryptocurrency. Britannica Money. https://www.britannica.com/money/cryptocurrency
Camp, S. (2024, August 1). The importance of user education in crypto. Fideum. https://www.fideum.com/blog/the-importance-of-user-education-in-crypto
Connecticut’s Official State Website. (n.d.). Cryptocurrency Risks. Connecticut’s Official State Website. Shttps://portal.ct.gov/dob/consumer/consumer-education/cryptocurrency-risks
Edeh, F. O., Aryani, D. N., Kee, D. M. H., Samarth, T., Nair, R. K., Tan, Y. S., & Teh, Y. C. (2021). Impact of COVID-19 pandemic on consumer behavior towards the intention to use E-wallet in Malaysia. International Journal of Accounting & Finance in Asia Pasific, 4(3), 42-59. https://doi.org/10.32535/ijafap.v4i3.1205
Eigbe, O. E. (2018). Investigating the levels of awareness and adoption of digital currency in Nigeria: a case study of bitcoin. The Information Technologist, 15(1), 75-82.
Extance, A. (2015). Bitcoin and beyond. Nature, 526(7571), 21. https://doi.org/10.1038/526021a
Fu, B., Yu, X., & Feng, T. (2022). CT-GCN: A phishing identification model for blockchain cryptocurrency transactions. International Journal of Information Security, 21(6), 1223-1232. https://doi.org/10.1007/s10207-022-00606-6
Gan, K. H., Lim, S. H., Aronkar, P., Lim, W. S., Lin, X., Hashim, M. B. M., ... & Kee, D. M. H. (2024). Investigating the relationship between key factors and customer satisfaction in an online shopping platform. Journal of the Community Development in Asia, 7(2), 149-162. https://doi.org/10.32535/jcda.v7i2.3213
Hayes, A. S. (2017). Cryptocurrency value formation: An empirical study leading to a cost of production model for valuing bitcoin. Telematics and Informatics, 34(7), 1308-1321. https://doi.org/10.1016/j.tele.2016.05.005
Human, K. B. (2023). A systematic review of cryptocurrencies use in cybercrimes [Master’s thesis, University of Central Florida]. STARS Library UCF. https://purls.library.ucf.edu/go/DP0028045
Kee, D. M. H., Lai, K. H., Lee, J. C., Lee, K. J., Lee, J. L., Yosanti, I., & Aryani, D. N. (2022a). Do you have a digital wallet? A study of e-wallet during the Covid-19 pandemic. International Journal of Accounting & Finance in Asia Pasific, 5(1), 24-38. https://doi.org/10.32535/ijafap.v5i1.1413
Kee, D. M. H., Ow, A. L., Ooi, Z. J., Sathiaseelan, P., Pang, K., Sathyan, K. A., & Madhan, S. (2022b). Have you touched? A case study of Touch n Go e-wallet. International Journal of Accounting & Finance in Asia Pasific, 5(1), 84-94. https://doi.org/10.32535/ijafap.v5i1.1416
Kee, D. M. H., Sin, L. G., Yuan, N. Z., Ni, N. L. Y., Wen, N. K., Fang, N. S., ... & Muhsyi, U. A. (2023). The influence of customer satisfaction, brand trust and brand loyalty on purchase intention: A study of McDonald’s in Malaysia. International Journal of Tourism and Hospitality in Asia Pasific, 6(2), 88-101. https://doi.org/10.32535/ijthap.v6i2.2343
Khonji, M., Iraqi, Y., & Jones, A. (2013). Phishing detection: A literature survey. IEEE Communications Surveys & Tutorials, 15(4), 2091-2121. https://doi.org/10.1109/SURV.2013.032213.00009
Liu, K., Zhou, Z., Cao, Q., Xu, G., Wang, C., Gao, Y., ... & Xu, G. (2023). A robust and effective Two-Factor Authentication (2FA) protocol based on ECC for mobile computing. Applied Sciences, 13(7), 4425. https://doi.org/10.3390/app13074425
Luchkin, A. G., Lukasheva, O. L., Novikova, N. E., Melnikov, V. A., Zyatkova, A. V., & Yarotskaya, E. V. (2020, August). Cryptocurrencies in the global financial system: problems and ways to overcome them. In Russian Conference on Digital Economy and Knowledge Management (RuDEcK 2020) (pp. 423-430). Atlantis Press. https://doi.org/10.2991/aebmr.k.200730.077
Madavaram, R. (2022, May 16). Malaysia's crypto scene is booming. What are the risks?. NST Online. https://www.nst.com.my/business/2022/05/796525/malaysias-crypto-scene-booming-what-are-risks
Mallik, A. (2019). Man-in-the-middle-attack: Understanding in simple words. Cyberspace: Jurnal Pendidikan Teknologi Informasi, 2(2), 109-134. http://dx.doi.org/10.22373/cj.v2i2.3453
Mir?evski, J., Popovi?, N. B., Andri?, M., & Stanojev, B. (2023). Security of financial software to support cryptocurrency trading. In BISEC’22: 13th International Conference on Business Information Security, December 03, 2022, Belgrade, Serbia.
Notabene. (2023, June 6). Travel Rule Crypto regulation in Malaysia. Notabene. https://notabene.id/world/malaysia
Oswego State University of New York. (n.d.). The Basics About Cryptocurrency. Oswego State University of New York. https://www.oswego.edu/cts/basics-about-cryptocurrency#:~:text=A%20cryptocurrency%20is%20a%20digital,you%20need%20a%20cryptocurrency%20wallet.
Pacheco, R. (2024, April 24). Cryptocurrency Security in 2024: Essential Guide to Protecting Your Crypto. Swiss Money. https://swissmoney.com/cryptocurrency-security/
Peter, J. A., & Ogunlade, O. O. (2024). Connectivism theory in education and its applications to curriculum and instruction. ASEAN Journal of Educational Research and Technology, 3(3), 215-222.
Rahman, I. A., & Wulandari, H. D. (2022). Cryptocurrency price volatility analysis on bitcoin and altcoins before and during the COVID-19 Pandemic in Indonesia. Journal of International Conference Proceedings, 5(5), 182-194. https://doi.org/10.32535/jicp.v5i5.2008
Reese, K., Smith, T., Dutson, J., Armknecht, J., Cameron, J., & Seamons, K. (2019). A usability study of five {two-factor} authentication methods. In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019) (pp. 357-370).
Rice, M. (2019). Cryptocurrency: History, advantages, disadvantages, and the future [Senior honor theses, Liberty University Honors Program]. Scholars Crossing: The Institutional Repository of Liberty University https://digitalcommons.liberty.edu/honors/933
Roppelt, J. C. (2019). Security risks surrounding cryptocurrency usage: a study on the security risks of cryptocurrencies and how security perception affects usage [Master's thesis, University of Twente]. University of Twente Student Theses. http://essay.utwente.nl/79471/
Shahzad, M. F., Xu, S., Lim, W. M., Hasnain, M. F., & Nusrat, S. (2024). Cryptocurrency awareness, acceptance, and adoption: The role of trust as a cornerstone. Humanities and Social Sciences Communications, 11(1), 1-14. https://doi.org/10.1057/s41599-023-02528-7
Shaik, C. (2021). Defeating MITM attacks on cryptocurrency exchange accounts with individual user keys. International Journal of Network Security & Its Applications, 13(1).
Suruhanjaya Sekuriti. (n.d.). The trading, issuance and safekeeping of Digital Assets in Malaysia are regulated by the Securities Commission. Suruhanjaya Sekuriti. https://www.sc.com.my/digital-assets
Xia, P., Wang, H., Zhang, B., Ji, R., Gao, B., Wu, L., ... & Xu, G. (2020). Characterizing cryptocurrency exchange scams. Computers & Security, 98, 101993. https://doi.org/10.1016/j.cose.2020.101993
Zaineldeen, S., Hongbo, L., Koffi, A. L., & Hassan, B. M. A. (2020). Technology acceptance model’concepts, contribution, limitation, and adoption in education. Universal Journal of Educational Research, 8(11), 5061-5071. http://dx.doi.org/10.13189/ujer.2020.081106
Zubir, D. A. S. B. H. M., Aishah, D. N., Ali, D. A., Mokhlis, D. S., & Sulong, D. F. (2020). Doing business using cryptocurrency in Malaysia. International Journal of Management and Humanities, 4(9), 148-157. https://doi.org/10.35940/ijmh.I0899.054920
DOI: https://doi.org/10.32535/ijafap.v7i3.3619
Refbacks
- There are currently no refbacks.
Copyright (c) 2024 Azura Abdullah Effendi, Boon Keong Teow, Kai Guan Teh, Yin Ann Tan, Hsue Li Tay, Yuxin Tang, Simran Chaudhary, Daisy Mui Hung Kee

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
International Journal of Accounting and Finance in Asia Pacific (IJAFAP)
ISSN 2684-9763 (Print) | ISSN 2655-6502 (Online)
DOI Prefix: 10.32535 by CrossRef
Published by AIBPM Publisher
JL. Kahuripan No. 9, Hotel Sahid Montana, Malang, Indonesia
Email: adm.ijafap@gmail.com
Phone: +62 341 366222
Website: https://ejournal.aibpmjournals.com/index.php/IJAFAP
Governed by
Association of International Business and Professional Management
Email: admin@aibpm.org
Website: https://www.aibpm.org/
Licensing Information
International Journal of Accounting and Finance in Asia Pacific (IJAFAP) is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.