Cyber Fraud in the Pandemic Age: Causes and Consequences

Authors

Mazurina Mohd Ali

Faculty of Accountancy, Universiti Teknologi MARA, Cawangan Selangor, Kampus Puncak Alam, Selangor (Malaysia)

Noor Hasniza Haron

Faculty of Accountancy, Universiti Teknologi MARA, Cawangan Selangor, Kampus Puncak Alam, Selangor (Malaysia)

Article Information

DOI: 10.47772/IJRISS.2025.910000260

Subject Category: Accounting

Volume/Issue: 9/10 | Page No: 3220-3226

Publication Timeline

Submitted: 2025-10-08

Accepted: 2025-10-14

Published: 2025-11-10

Abstract

The COVID-19 pandemic was an important factor that has reshaped how individuals and organization’s function, accelerating global reliance on digital technologies for work, communication, education, and commerce. While this shift ensured continuity during lockdowns, it also created opportunities for cybercriminals. The purpose of this study is to examine the surge in cyber fraud during the pandemic, its causes, and socio-economic impacts. Past studies determine that cyber fraud leads to financial losses and psychological distress. To counter these risks, the paper recommends enhancing cybersecurity literacy, enforcing data protection, maintaining vigilance, and strengthening institutional and governmental measures. It concludes by stressing the need for ongoing public awareness, policy action, and personal responsibility in combating cyber fraud in the post-pandemic digital era.

Keywords

COVID-19 pandemic; cybercrime; online scams; socio-economic impact; preventive measures

Downloads

References

1. Al-Harrasi, A., Shaikh, A. K., & Al-Badi, A. (2023). Towards protecting organisations’ data by preventing data theft by malicious insiders. International Journal of Organizational Analysis, 31(3), 875-888. [Google Scholar] [Crossref]

2. Ali, M. M., & Mohd Zaharon, N. F. (2024). Phishing—A cyber fraud: The types, implications and governance. International Journal of Educational Reform, 33(1), 101-121. [Google Scholar] [Crossref]

3. Alkhalil, Z., Hewage, C., Nawaf, L., & Khan, I. (2021). Phishing attacks: A recent comprehensive study and a new anatomy. Frontiers in Computer Science, 3, 563060. [Google Scholar] [Crossref]

4. Alzaabi, F. R., & Mehmood, A. (2024). A review of recent advances, challenges, and opportunities in malicious insider threat detection using machine learning methods. IEEE Access, 12, 30907-30927. [Google Scholar] [Crossref]

5. Anazodo, R. O. (2025). Cyber Security Administration in Developing Countries: A Nigerian Perspective. International Journal of Finance, Accounting and Management Studies, 1(4), 122-139. [Google Scholar] [Crossref]

6. Ayinla, O. A. (2024). The Impact of Crime on Economic Hardship In Oyo State, Nigeria. Journal of Business Development and Management Research. [Google Scholar] [Crossref]

7. Bhowmik, S. (2023). The Evolution of Crime: The Dynamic Definition of Crime as per Society. Issue 3 Int'l JL Mgmt. & Human., 6, 3638. [Google Scholar] [Crossref]

8. Button, M., & Whittaker, J. (2021). Exploring the voluntary response to cyber-fraud: From vigilantism to responsibilisation. International Journal of Law, Crime and Justice, 66, 100482. [Google Scholar] [Crossref]

9. Chhabra Roy, N., & P, S. (2024). Proactive cyber fraud response: a comprehensive framework from detection to mitigation in banks. Digital Policy, Regulation and Governance, 26(6), 678-707. [Google Scholar] [Crossref]

10. Chen, S., Hao, M., Ding, F., Jiang, D., Dong, J., Zhang, S., ... & Gao, C. (2023). Exploring the global geography of cybercrime and its driving forces. Humanities and Social Sciences Communications, 10(1), 1-10. [Google Scholar] [Crossref]

11. Choudhary, A., Choudhary, G., Pareek, K., Kunndra, C., Luthra, J., & Dragoni, N. (2022). Emerging cyber security challenges after COVID pandemic: a survey. Journal of Internet Services and Information Security, 12(2), 21-50. [Google Scholar] [Crossref]

12. Gryszczyńska, A. (2021). The impact of the COVID-19 pandemic on cybercrime. Bulletin of the Polish Academy of Sciences. Technical Sciences, 69(4). [Google Scholar] [Crossref]

13. Harold, C. M., Hu, B., & Koopman, J. (2022). Employee time theft: Conceptualization, measure development, and validation. Personnel Psychology, 75(2), 347-382. [Google Scholar] [Crossref]

14. Homoliak, I., Toffalini, F., Guarnizo, J., Elovici, Y., & Ochoa, M. (2019). Insight into insiders and it: A survey of insider threat taxonomies, analysis, modeling, and countermeasures. ACM Computing Surveys (CSUR), 52(2), 1-40. [Google Scholar] [Crossref]

15. INTERPOL. (2020, August 4). INTERPOL report shows alarming rate of cyberattacks during COVID-19. https://www.interpol.int/News-and-Events/News/2020/INTERPOL-report-shows-alarming-rate-of-cyberattacks-during-COVID-19. [Google Scholar] [Crossref]

16. Juneja, A., Goswami, S. S., & Mondal, S. (2024). Cyber security and digital economy: opportunities, growth and challenges. Journal of technology innovations and energy, 3(2), 1-22. [Google Scholar] [Crossref]

17. Kenneth, A., Hayashi, B. B., Lionardi, J., Richie, S., Achmad, S., & Junior, F. A. (2023, August). Phishing attack awareness among college students. In 2023 3rd International Conference on Electronic and Electrical Engineering and Intelligent System (ICE3IS) (pp. 344-348). IEEE. [Google Scholar] [Crossref]

18. Kont, K. R. (2023). Cyber literacy skills of Estonians: activities and policies for encouraging knowledge-based cyber security attitudes. Information & Media, (96), 80-94. [Google Scholar] [Crossref]

19. Kovandzic, T. V., & Vieraitis, L. M. (2006). The effect of county‐level prison population growth on crime rates. Criminology & Public Policy, 5(2), 213-244. [Google Scholar] [Crossref]

20. Ma, K. W. F., & McKinnon, T. (2022). COVID-19 and cyber fraud: Emerging threats during the pandemic. Journal of Financial Crime, 29(2), 433-446. [Google Scholar] [Crossref]

21. Mali, P., Sodhi, J. S., Singh, T., & Bansal, S. (2018). Analysing the awareness of cybercrime and designing a relevant framework with respect to cyber warfare: an empirical study. International Journal of Mechanical Engineering and Technology, 9(2), 110-124. [Google Scholar] [Crossref]

22. Mallick, M. A. I., & Nath, R. (2024). Navigating the cyber security landscape: A comprehensive review of cyber-attacks, emerging trends, and recent developments. World Scientific News, 190(1), 1-69. [Google Scholar] [Crossref]

23. MohamedAli, R. S., & Abduhameed, R. A. (2024, May). Phishing email detection: Survey. In International Conference on Advanced Engineering, Technology and Applications (pp. 551-570). Cham: Springer Nature Switzerland. [Google Scholar] [Crossref]

24. Moreno-Fernández, M. M., Blanco, F., Garaizar, P., & Matute, H. (2017). Fishing for phishers. Improving Internet users' sensitivity to visual deception cues to prevent electronic fraud. Computers in Human Behavior, 69, 421-436. [Google Scholar] [Crossref]

25. Muku, A., Singh, S. K., Kumar, S., Sharma, A., Rai, P., Upadhyaya, B., ... & Sharma, V. (2025). Phishing prevention solutions and mechanisms. In Critical Phishing Defense Strategies and Digital Asset Protection (pp. 49-72). IGI Global Scientific Publishing. [Google Scholar] [Crossref]

26. Nadji, B. (2024). Data security, integrity, and protection. In Data, Security, and Trust in Smart Cities (pp. 59-83). Cham: Springer Nature Switzerland. [Google Scholar] [Crossref]

27. Pandey, P., & Kapoor, A. (2025). Cybercrime In the Digital Era: Impacts, Awareness, And Strategic Solutions for a Secure Future. Sachetas, 4(1), 32-37. [Google Scholar] [Crossref]

28. Pinjarkar, L., Hete, P. R., Mattada, M., Nejakar, S., Agrawal, P., & Kaur, G. (2024, July). An Examination of Prevalent Online Scams: Phishing Attacks, Banking Frauds, and E-Commerce Deceptions. In 2024 Second, International Conference on Advances in Information Technology (ICAIT) (Vol. 1, pp. 1-6). IEEE. [Google Scholar] [Crossref]

29. Ramalingam, D., & Chinnaiah, V. (2018). Fake profile detection techniques in large-scale online social networks: A comprehensive review. Computers & Electrical Engineering, 65, 165-177. [Google Scholar] [Crossref]

30. Ray, R. L., Abeysingha, N. S., Deegala, D. M. B. M., Gurau, S., & Dissanayake, S. (2025). Review of the effects of the COVID 19 pandemic on the environmental economy and human wellbeing. Discover Sustainability, 6(1), 965. [Google Scholar] [Crossref]

31. Ryan, J. M. (2021). Timeline of COVID-19. COVID-19: Global Pandemic, Societal Responses, Ideological Solutions. Routledge. [Google Scholar] [Crossref]

32. Saini, H., Rao, Y. S., & Panda, T. C. (2012). Cyber-crimes and their impacts: A review. International Journal of Engineering Research and Applications, 2(2), 202-209. [Google Scholar] [Crossref]

33. Singh, N. K., Behera, B., Dash, D. P., Balsalobre-Lorente, D., & Sethi, N. (2025). What determines crime in tropical and sub-tropical countries? Exploring the dynamics of climate change, corruption, and information & communication technology. Economic Change and Restructuring, 58(4), 71. [Google Scholar] [Crossref]

34. South, S. J., & Messner, S. F. (2000). Crime and demography: Multiple linkages, reciprocal relations. Annual Review of Sociology, 26(1), 83-106. [Google Scholar] [Crossref]

35. Stenson, K. (2012). The new politics of crime control. In Crime, risk and justice (pp. 15-28). Willan. [Google Scholar] [Crossref]

36. Stummvoll, G. (2012). Governance through norms and standards: The normative force behind design-led crime prevention. Criminology & Criminal Justice, 12(4), 377-396. [Google Scholar] [Crossref]

37. Taodang, D., & Gundur, R. V. (2023). How frauds in times of crisis target people. Victims & Offenders, 18(5), 889-914. [Google Scholar] [Crossref]

38. Wright, R. T., Jensen, M. L., Thatcher, J. B., Dinger, M., & Marett, K. (2014). Research note—influence techniques in phishing attacks: an examination of vulnerability and resistance. Information systems research, 25(2), 385-400. [Google Scholar] [Crossref]

Metrics

Views & Downloads

Similar Articles