Behavioral Intention in Forensic Accounting Services
DOI:
https://doi.org/10.61841/zgtv5m75Keywords:
Behavioral Intention, Forensic Accounting, FraudAbstract
Forensic Accounting Services (FAS) have played an important role in the prevention and detection of fraud, and the demand for FAS is growing due to the heightened sensitivity to fraud. However, the primary worry in this paper is that FAS has become one of the least used tools in the prevention and detection of fraud, and the increasing number of frauds from three sectors—manufacturing, financial services, and communication industries—may indicate that FAS has not been effectively used. The main objective is to study the behavioral intention of using FAS. The two main theories and the elements used in this study are Theory Planned of Behavior (TPB) and Protection Motivation Theory (PMT), with an additional variable of organizational norms. This study is expected to generate the best model on the development of behavioral intention in FAS in fraud prevention and detection by individuals in listed firms. This study may significantly contribute to the consideration of strengthening the usage of FAS by listed firms and institutions for the prevention and detection of fraud in Malaysia, and institutions in Malaysia may consider implementing a specialized course on forensic accounting to meet the increasing demand in the Malaysian market for FAS.
Downloads
References
[1] Oh, E. (2017, March). Demand for forensic accountants is growing. Accounting and Business Magazine.
[2] Alshurafat, H., Beattie, C., Jones, G., & Sands, J. (2019). Forensic Accounting Core and Interdisciplinary Curriculum Components in Australian Universities: Analysis of Websites. Journal of Forensic & Investigative Accounting, 11(2), 353–365
[3] Ibrahim, M. S. & Abdullah, M. (2011). Overview of Forensic Accounting in Malaysia.
[4] Pors, A. (2018). Fraud and the Evolution of Forensic Accounting Education. Liberty University.
[5] Othman, R., Abdul, N., Mardziyah, A., & Zainan, N. (2015). Fraud Detection and Prevention Methods in the Malaysian Public Sector: Accountants' and Internal Auditors' Perceptions. Procedia Economics and Finance, 28 (April), 59–67.
[6] Ng, S. W., Khamar Tazilah, M. D. A., Sin, S. Y., Chan, H. Y., Saw, W. Y., & Tham, S. J. (2017). Behavioural Intention to Use Forensic Accounting Services among Small and Medium Enterprises in Malaysia. Eastern European Business and Economics Journal, 3(4), 306–349.
[7] Aji, S. S. B. & Urumsah, D. (2016). Factors Affecting the Use of Forensic Accounting Services: An Empirical Study on Indonesian Banks. Asia Pacific Fraud Journal, 1(1), 147–163.
[8] PricewaterhouseCoopers. (2018). The Fight Against Economic Crime and Corruption: Aligning People, Processes and Technology to Emerge Stronger.
[9] Saieed, Z. (2016, August 27). Auditors find it tough to unmask corporate fraud: The Star Online. The Star Online.
[10] Karahoca, A., Karahoca, D., & Aksoz, M. (2019). Examining intention to adopt the internet of things in healthcare technology products. Kybernetes, 47(4), 742–770.
[11] Ajzen, I. (1991). The Theory of Planned Behavior. Organizational Behavior and Human Decision Processes, 50, 179–211.
[12] Efiong, Joel, E., Inyang, Mbu-ogar, I. O., Geraldine, & Ethel. (2016). Accountants’ Behavioural intention to use forensic accounting techniques for fraud prevention and detection in Nigeria. Scholars Journal of Economics, Business, and Management, 3(7), 364–381.
[13] Malimage, K. (2019). Application of Underutilized Theories in Fraud Research: Suggestions for Future Research. Journal of Forensic and Investigation Accounting, 11(1), 33–49.
[14] Westcott, R., Ronan, K., Bambrick, H., & Taylor, M. (2017). Expanding protection motivation theory: investigating an application to animal owners and emergency responders in bushfire emergencies. BMC Psychology, 5(13), 1–14.
[15] Pham, H. C., Brennan, L., & Richardson, J. (2017). REVIEW OF BEHAVIOURAL THEORIES IN SECURITY COMPLIANCE AND RESEARCH CHALLENGES. In Proceedings of the Informing Science + Information Technology Education Conference (pp. 65–76).
[16] Jansen, J. (2015). Studying Safe Online Banking Behaviour : A Protection Motivation Theory Approach. In Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance.
[17] Kessler, W. A. (2016). Effectiveness of the Protection Motivation Theory on Small Business Employee Security Risk Behavior. Northcentral University.
[18] Kusyanti, A. & Catherina, H. P. A. (2018). An Empirical Study of App Permissions: A User Protection Motivation Behaviour. International Journal of Advanced Computer Science and Applications, 9(11), 106–111.
[19] Cismaru, M., Lavack, A. M., & Markewich, E. (2008). Alcohol consumption among young consumers: a review and recommendations, 9(4), 282–296.
[20] Hastuti, S., Suryaningrum, D. H., Susilowati, L., & Muchtolifah. (2014). Implementation of Decomposed Theory of Planned Behavior on the Adoption of E-Filling Systems Taxation Policy in Indonesia. Expert Journal of Business and Management, 2(1), 1–8.
[21] Saraih, U. N., Aris, A. Z. Z., Mutalib, S. A., Tunku Ahmad, T. S., & Harith, M. (2018). Examining the Relationships between Attitude Towards Behaviour, Subjective Norms, and Entrepreneurial Intention among Engineering Students. In MUATEC Web of Conference. EDP Sciences.
[22] Jokonya, O. (2017). Critical Literature Review of Theory of Planned Behavior in the Information Systems Research. In 2nd International Conference on Advances in Management Engineering and Information Technology (AMEIT) (pp. 177–181).
[23] Burns, S. & Roberts, L. (2013). Applying the Theory of Planned Behaviour to predicting online safety behaviour. Crime Prevention and Community, 15(1), 48–64.
[24] Alselaimi, A. (2010). Using the Theory of Planned Behaviour to Investigate the Antecedents of Physical Activity Participation among Saudi Adolescents. University of Exeter.
[25] Lin, T. T. C. & Bautista, J. R. (2016). Predicting Intention to Take Protective Measures During Haze: The Roles of Efficacy, Threat, Media Trust, and Affective Attitude. Journal of Health Communication, 21(7), 790–799.
[26] Muthusamy, G. (2011). Behavioral intention to use forensic accounting services for the detection and prevention of fraud by large Malaysian companies. Curtin University of Technology.
[27] Jansen, Jurjen, & Schaik, P. Van. (2018). Persuading end users to act cautiously online: a fear appeals study on phishing. Information & Computer Security, 26(3), 264-276.
[28] Batra, R., Keller, P. A., & Strecher, V. J. (2015). Leveraging consumer psychology for effective health communication. Routledge.
[29] Dupuis, M. J., Crossler, R. E., & Endicott-Popovsky, B. (2012). The Information Security Behavior of Home Users: Exploring a User's Risk Tolerance and Past Experiences in the Context of Backing Up Information. In the Dewald Roode Information Security Workshop.
[30] Hameed, M. A., & Arachchilage, N. A. G. (2019). On the Impact of Perceived Vulnerability in the Adoption of Information Systems Security Innovations. International Journal of Computer Network and Information Security, 11(4), 9–18.
[31] Sahdan, M. H. (2018). Organisational Intention to Use Forensic Accounting Services in Detecting and Preventing Fraud: The Case of English Local Authorities. The University of Huddersfield.
[32] Bergner, K. N., Falk, T., Heinrich, D., & Holzing, J. A. (2013). The effects of DTCA on patient compliance: Exploring the impact of endorser selection and message tonality on patients with diabetes. International Journal of Pharmaceutical and Healthcare Marketing, 7(4), 391–409.
[33] Park, O., Hoover, L., Huffman, L., & Feng, D. (2011). The Use of the Modified Protection Motivation Theory to Explore Adult Consumers Functional Foods Consumption Behavior. In Graduate Student Research Conference in Hospitality and Tourism.
[34] Yoon, C., & Kim, H. (2013). Understanding computer security behavioral intention in the workplace: An empirical study of Korean firms. Information Technology & People, 26(4), 401–419.
[35] Janmaimool, P. (2017). Application of Protection Motivation Theory to Investigate Sustainable Waste Management Behaviors. Sustainability, 9, 1–16.
[36] Jolaee, A., Md Nor, K., Khani, N., & Md Yusoff, R. (2014). Factors affecting knowledge sharing intention among academic staff. International Journal of Educational Management, 28(4), 413–431.
[37] Konak, A., Kulturel-konak, S., & Cheung, G. W. (2019). Teamwork attitudes , interest and self-e ffi cacy between online and face-to-face information technology students. Team Performance Management, 25(5), 253–278.
[38] Wee, C. S., Md. Ariff, M. S., Zakuan, N., Mohd Tajudin, M. N., Ismail, K., & Ishak, N. (2014). Consumers Perception, Purchase Intention and Actual Purchase Behavior of Organic Food Products. Reveiew of Integrative Business Economics Research, 3(2), 378–397.
[39] Temitope, O. A., Nasieku, T., & Muturi, W. (2016). The Relationship Between Forensic Accountants ’ Skepticism and Audit Expectation Gap Among Nigerian Money Deposit Banks. Journal of Finance and Accounting, 4(1), 9–17.
[40] Chen, H., & Li, W. (2017). Mobile device users ’ privacy security assurance behavior: A technology threat avoidance perspective. Journal of Information & Computer Security, 25(3), 330–344.
[41] Karahoca, A., Karahoca, D., & Aksoz, M. (2019). Examining intention to adopt to internet of things in healthcare technology products. Kybernetes, 47(4), 742–770.
[42] Hong, I. B. (2018). Social and Personal Dimensions as Predictors of Sustainable Intention to Use Facebook in Korea : An Empirical Analysis. Sustainability, 10.
[43] Eckhardt, A., Laumer, S., & Weitzel, T. (2008). Reconsidering Subjective Norm - A Multilayer- Framework for Modeling Normative Beliefs in IT Adoption. In Proceedings of the Fourteenth Americas Conference on Information Systems. Toronto: AIS Electronic Library (AISeL).
[44] Altawallbeh, M., Soon, F., Thiam, W., & Alshourah, S. (2015). Mediating Role of Attitude , Subjective Norm And Perceived Behavioural Control In The Relationships Between Their Respective Salient Beliefs And Behavioural Intention To Adopt E-Learning Among Instructors In Jordanian Universities. Journal of Education and Practice, 6(11), 152–159.
[45] Ajzen, I., & Fishbein, M. (2014). The Influence of Attitudes on Behavior. In The Handbook of Attitudes (2nd ed.). Psychology Press.
[46] Yean, T. F., Johari, J., & Mohd Sukery, A. F. (2015). The Influence of Attitude, Subjective Norms, and Perceived Behavioural Control On Intention To Return To Work: A Case of SOCSO’S Insured Employes. Kajian Malaysia, 33(1), 141–154.
[47] Saraih, U. N., Aris, A. Z. Z., Mutalib, S. A., Tunku Ahmad, T. S., & Harith, M. (2018). Examining The Relationships between Attitude Towards Behaviour, Subjective Norms and Entrepreneurial Intention among Engineering Students. In MUATEC Web of Conference. EDP Sciences.
[48] Alqasa, K. M., Isa, F. M., Othman, S. N., & Zolait, A. H. S. (2014). The impact of students ’ attitude and subjective norm on the behavioural intention to use services of banking system. International Journal of Business Information System, 15(1), 105–122.
[49] Fadilla, P. R., Setiawan, M., & Rohman, F. (2018). The Effect Of Attitude, Subjective Norm And Behavioral Control On Decision Repurchase Intention Via Intent. Management and Economics Journal, 2(3), 279–292.
[50] Fang, W., Ng, E., Wang, C. M., & Hsu, M. L. (2017). Normative Beliefs , Attitudes , and Social Norms : People Reduce Waste as an Index of Social Relationships When Spending Leisure Time. Sustainability, (9).
[51] Ismail, D. N., & Lim, J. (2018). The Predicting Role of Attitude and Subjective Norms on Youth Intention to Pursue Music Education in Malaysia. A Contemporary Business Journal, 7(1), 21–39.
[52] Pitchay, A. A., Meera, A. K. M., & Saleem, M. Y. (2015). Factors Influencing the Behavioral Intentions of Muslim Employees to Contribute to Cash- Waqf Through Salary Deductions. JKAU: Islamic Econ, 28(1), 57–90.
[53] Yau, H. K., & Ho, T. C. (2015). The Influence of Subjective Norm on Behavioral Intention In Using E-Learning : An Empirical Study in Hong Kong Higher Education. In Proceedings of the International MultiConference of Engineers and Computer Scientists (Vol. 2, pp. 18–20).
[54] Lin, T. T. C., & Bautista, J. R. (2016). Predicting Intention to Take Protective Measures During Haze : The Roles of Efficacy, Threat, Media Trust, and Affective Attitude. Journal of Health Communication, 21(7), 790–799.
[55] Saunders, M., Lewis, P., & Thornhill, a. (2009). Research Methods for Business Students. Business (Vol. 5th).
[56] Chua, Y. P. (2016). Mastering Research Methods (2nd ed.). Selangor: McGraw-Hill Education (Malaysia) Sdn Bhd.
[57] Pricewaterhouse Coopers. (2014). Threats to the Financial Services sector.
[58] Chuan, C. L. (2006). Sample Size Estimation Using Krejcie And Morgan And Cohen Statistical Power Analysis: A Comparison. Jurnal Penyelidikan IPBL, 7.
Downloads
Published
Issue
Section
License
Copyright (c) 2020 AUTHOR
This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.