Cybersecurity Behavior as a Reflection of Ḥifẓ al-Māl in Islamic Banking A Behavioral Model Based on Protection Motivation Theory

Main Article Content

Muhammad Wandisyah R Hutagalung
Saparuddin Siregar
Mhd. Furqan
Ismail Pulungan
Furkan Elce

Abstract

This study examines psychological determinants of cybersecurity protection behavior among Islamic banking customers by applying Protection Motivation Theory (PMT) within a maqāṣid al-sharīʿah framework. Using a quantitative survey (N = 384) and PLS-SEM, it tests the effects of perceived vulnerability, severity, self-efficacy, response efficacy, response cost, and social influence, as well as the moderating role of cybersecurity education. Results show that vulnerability, severity, response efficacy, and social influence significantly predict protection behavior, while self-efficacy and response cost do not. Cybersecurity education has no significant moderating effect. The model explains 69.6% of the variance, indicating strong explanatory power. The study contributes by linking PMT to Islamic economic principles, particularly ḥifẓ al-māl and amānah. It suggests that Islamic banks need community-based, values-driven cybersecurity education to foster sustainable protective behavior.

Downloads

Download data is not yet available.

Article Details

How to Cite
Hutagalung, Muhammad Wandisyah R, Saparuddin Siregar, Mhd. Furqan, Ismail Pulungan, and Furkan Elce. 2025. “Cybersecurity Behavior As a Reflection of Ḥifẓ Al-Māl in Islamic Banking: A Behavioral Model Based on Protection Motivation Theory”. El-Qist: Journal of Islamic Economics and Business (JIEB) 15 (2). Surabaya, Indonesia:127-53. https://doi.org/10.15642/elqist.2025.15.2.127-153.
Section
Articles

References

Ahyani, Hisam, Sérgio António Neves Lousada, Sartono Sartono, Andrey Kotyazhov, and Miftakhul Huda. “Protecting Yourself from Online Fraud and Hacking: An Islamic Perspective.” Abdurrauf Journal of Islamic Studies 4, no. 1 (2025): 46–65. https://doi.org/10.58824/arjis.v4i1.277.

Al-Ghazali, Imam. Al-Mustashfa Jilid 2: Rujukan Utama Ushul Fikih. Vol. 2. Pustaka Al-Kautsar, 2022.

Alalwan, Ali Abdallah, Yogesh K. Dwivedi, Nripendra P.P. Rana, and Michael D. Williams. “Consumer Adoption of Mobile Banking in Jordan: Examining the Role of Usefulness, Ease of Use, Perceived Risk and Self-Efficacy.” Journal of Enterprise Information Management 29, no. 1 (February 1, 2016): 118–39. https://doi.org/10.1108/JEIM-04-2015-0035.

Alshaikh, Asma. “The Impact of KWL Plus Strategy on the Development of Perceived Self-Efficacy among Students in the Biology Department at Prince Sattam Bin Abdul-Aziz University (PSAU)—Al-Kharj Governorate.” The International Journal of Pedagogy and Curriculum 30, no. 1 (2023): 37–53. https://doi.org/10.18848/2327-7963/CGP/v30i01/37-53.

Apau, Richard, Elzbieta Titis, and Harjinder Singh Lallie. “Towards a Better Understanding of Mobile Banking App Adoption and Use: Integrating Security, Risk, and Trust into UTAUT2.” Computers 14, no. 4 (2025). https://doi.org/10.3390/computers14040144.

Apaua, Richard, and Harjinder Singh Lallie. “Measuring User Perceived Security of Mobile Banking Applications,” 2022, 1–36. http://arxiv.org/abs/2201.03052.

Bansal, G., F.M. Zahedi, and D. Gefen. The Moderating Influence of Privacy Concern on the Efficacy of Privacy Assurance Mechanisms for Building Trust: A Multiple-Context Investigation | L’effet Modérateur Du Souci de Confidentialité Sur l’efficacité Des Mécanismes de Respect de La Vie Privée À. ICIS 2008 Proceedings - Twenty Ninth International Conference on Information Systems, 2008.

Chanda, Razib Chandra, Ali Vafaei-Zadeh, Haniruzila Hanifah, and Davoud Nikbin. “Assessing Cybersecurity Awareness among Bank Employees: A Multi-Stage Analytical Approach Using PLS-SEM, ANN, and FsQCA in a Developing Country Context.” Computers and Security 149 (2025): 104208. https://doi.org/10.1016/j.cose.2024.104208.

Hair, Jr., Joseph F., G. Tomas M. Hult, Christian M. Ringle, Sarstedt, and Marko. A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM) [3 Ed]. Sage Publishing. Vol. 3, 2022.

Herath, Tejaswini, and H. Raghav Rao. “Protection Motivation and Deterrence: A Framework for Security Policy Compliance in Organisations.” European Journal of Information Systems 18, no. 2 (2009): 106–25. https://doi.org/10.1057/ejis.2009.6.

Hong, Yuxiang, and Steven Furnell. “Understanding Cybersecurity Behavioral Habits: Insights from Situational Support.” Journal of Information Security and Applications 57 (January 7, 2021): 102710. https://doi.org/10.1016/j.jisa.2020.102710.

Hu, Yilin, and Carol Hsu. “Effect of Perceived Cost, Altruistic and Egoistic Benefits on Security Policy Compliance Intention: A Rational Choice Persepective.” PACIS 2021 Proceedings, 2021, 1–8. https://aisel.aisnet.org/pacis2021/156.

Ifinedo, Princely. “Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory.” Computers and Security 31, no. 1 (2012): 83–95. https://doi.org/10.1016/j.cose.2011.10.007.

Jansen, Jurjen, and Rutger Leukfeldt. “Phishing and Malware Attacks on Online Banking Customers in the Netherlands: A Qualitative Analysis of Factors Leading to Victimization.” International Journal of Cyber Criminology 10, no. 1 (2016): 79–91. https://doi.org/10.5281/zenodo.58523.

Jasser Auda. “MAQASID AL-SHARIAH AS PHILOSOPHY OF ISLAMIC LAW,” 2008, 1–332.

Johri, Amar, and Shailendra Kumar. “Exploring Customer Awareness towards Their Cyber Security in the Kingdom of Saudi Arabia: A Study in the Era of Banking Digital Transformation.” Human Behavior and Emerging Technologies 2023 (2023). https://doi.org/10.1155/2023/2103442.

Kamali, Mohammad Hashim. “Between Separation and Unity: The Interplay of Law and Morality in Islamic Jurisprudence.” In Sharia Law In The Twenty-First Century, 21–46. World Scientific, 2022.

Ketchen, David J. “A Primer on Partial Least Squares Structural Equation Modeling.” Long Range Planning 46, no. 1–2 (2013): 184–85. https://doi.org/10.1016/j.lrp.2013.01.002.

Khan, Habib Ullah, Muhammad Zain Malik, Shah Nazir, and Faheem Khan. “Utilizing Bio Metric System for Enhancing Cyber Security in Banking Sector: A Systematic Analysis.” IEEE Access 11 (2023): 80181–98. https://doi.org/10.1109/ACCESS.2023.3298824.

Khan, Naurin Farooq, Naveed Ikram, Hajra Murtaza, and Mehwish Javed. “Evaluating Protection Motivation Based Cybersecurity Awareness Training on Kirkpatrick’s Model.” Computers and Security 125 (2023): 103049. https://doi.org/10.1016/j.cose.2022.103049.

Kornitasari, Yenny, Langlang Jati Sura, and Dita Nurul Aini Mustika Dewi. “How Cybercrime Sentiment Shapes Mobile Banking Adoption in Islamic Banking.” Jurnal Ekonomi & Keuangan Islam 10, no. 2 (2024): 217–32. https://doi.org/10.20885/jeki.vol10.iss2.art6.

Lameck Mkilia, Emmanuel, Emmanuel Lameck, Mkilia Jones, T Kaleshu, and Alfred S Sife. “Cybersecurity Risks and Customers’ Protective Behavior on Usage of Mobile Banking Services: Evidence from Selected Banks in Tanzania.” Local Administration Journal 16, no. 3 (2023): 329–54. https://so04.tci-thaijo.org/index.php/colakkujournals/article/view/264954.

Maddux, James E., and Ronald W. Rogers. “Protection Motivation and Self-Efficacy: A Revised Theory of Fear Appeals and Attitude Change.” Journal of Experimental Social Psychology 19, no. 5 (1983): 469–79. https://doi.org/10.1016/0022-1031(83)90023-9.

Masruchin, Masruchin, Arief Wicaksono, Nur Manna Silvia, and Amelia Eka Dimawan. “Enhancing Maqasid Syariah through E-Banking: A Qualitative Analysis of Syariah-Compliant Financial Transactions.” Indonesian Journal of Law and Economics Review 18, no. 3 (2023): 6–14. https://doi.org/10.21070/ijler.v18i3.934.

Purwanto, Agus, and Yuli Sudargini. “Partial Least Squares Structural Squation Modeling (PLS-SEM) Analysis for Social and Management Research : A Literature Review.” Journal of Industrial Engineering & Management Research 2, no. 4 (2021): 114–23.

Riza, Alex Fahrur, and Dwi Marlina Wijayanti. “Strengthening a Sustainable Islamic Financial Industry through Digital Banking.” Journal of Islamic Marketing 15, no. 11 (June 3, 2024): 2732–58. https://doi.org/10.1108/JIMA-01-2023-0025.

Rogers, Ronald W. “A Protection Motivation Theory of Fear Appeals and Attitude Change1.” The Journal of Psychology 91, no. 1 (1975): 93–114. https://doi.org/10.1080/00223980.1975.9915803.

Sylvester, F. Ley. “Mobile Device Users’ Susceptibility to Phishing Attacks.” International Journal of Computer Science and Information Technology 14, no. 1 (2022): 1–18. https://doi.org/10.5121/ijcsit.2022.14101.

Tambariki, Canitgia, Octavianie Bernadette Sondakh, Virgino Agassie Dondokambey, and Evelyn Hendriana. “Drivers of Banking Consumers’ Cybersecurity Behavior: Applying the Extended Protection Motivation Theory.” GATR Journal of Management and Marketing Review 9, no. 1 (2024): 01–12. https://doi.org/10.35609/jmmr.2024.9.1(1).

Tavakol, Mohsen, and Reg Dennick. “Making Sense of Cronbach’s Alpha.” International Journal of Medical Education 2 (2011): 53–55. https://doi.org/10.5116/ijme.4dfb.8dfd.

Vardari, Luan, and Kujtim Hameli. “Perceived Benefits, Trust and Social Influence in FinTech: Pathways to Adoption and Satisfaction in a Developing Economy.” Global Knowledge, Memory and Communication, September 11, 2025. https://doi.org/10.1108/GKMC-02-2025-0137.

Zhang, Zizhong, and Xiaoxue Zhang. “Why Not Use Facial Recognition Payment? From the Perspective of the Extended Protection Motivation Theory.” Journal of Retailing and Consumer Services 81 (2024). https://doi.org/10.1016/j.jretconser.2024.104016.

Similar Articles

<< < 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.