Determinants of National Digital Identity Verification Platform Acceptance Among Young Investors in Malaysia


  • Pavitira Manogaran Graduate School of Business, Universiti Sains Malaysia, Malaysia
  • Teoh Ai Ping Graduate School of Business, Universiti Sains Malaysia, Malaysia



National Digital Identity, Verification Platform, Malaysia, Young Investors


This study aims to investigate the determinants of NDIV platform acceptance among young investors in Malaysia within the context of protection motivation theory and uncertainty reduction theory. The study proposed a conceptual model comprising five hypotheses tested using structural equation modelling-partial least squares. Data was collected through an online questionnaire survey from 361 young investors in Malaysia. The results show that acceptance of the NDIV platform is directly influenced by perceived severity, response efficacy, self-efficacy, and transparency. This study extended the protection motivation theory by incorporating uncertainty reduction theory to strengthen the predictions of NDIV platform acceptance among young investors in Malaysia. The study brought meaning by filling the theoretical, empirical, and methodological gaps in the body of knowledge.  This research contributes to the administrators, regulators, industry practitioners, and government to improve the platforms' strategies and increase citizen engagement conclusions.


Aiman, A. (2020). Making MySejahtera compulsory raises privacy concerns, says expert. Available at:

Aruna, P. (2017). More young investors entering into Malaysian market. Available at:

Aun, L. H. and Zhang, K. (2021). The COVID-19 recession: Rough times for young Malaysians. Available at:

Baber, H. (2021). Modelling the acceptance of e-learning during the pandemic of COVID-19: A study of South Korea. The International Journal of Management Education, Vol.19 No. 2, 100503.

Berger, C. R., and Calabrese, R. J. (1974). Some explorations in initial interaction and beyond: Toward a developmental theory of interpersonal communication. Human Communication Research, Vol. 1 No. 2, 99-112.

Chong, L. L., Ong, H. B., and Tan, S. H. (2021). Acceptability of mobile stock trading application: A study of young investors in Malaysia. Technology in Society, Vol. 64, 10149.

Daragmeh, A., Sági, J., and Zéman, Z. (2021). Continuous intention to use e-wallet in the context of the COVID-19 pandemic. Market, and Complexity, Vol. 7 No. 2,132-155.

Du, H., Zhu, G., and Zheng, J. (2021). Why travelers trust and accept self-driving cars: An empirical study. Travel Behaviour and Society, Vol. 22 No. 1, 1-9.

Engeness, I. (2021). Developing teachers' digital identity: Towards the pedagogic design principles of digital environments to enhance students' learning in the 21st century. European Journal of Teacher Education, Vol. 44 No. 1, 96-114.

Fischer-Preßler, D., Bonaretti, D., and Fischbach, K. (2021). A protection-motivation perspective to explain intention to use and continue to use mobile warning systems. Business and Information Systems Engineering, Vol. 64 No. 2, 1-16.

Gao, Y., Li, H., and Luo, Y. (2015). An empirical study of wearable technology acceptance in healthcare. Industrial Management and Data Systems, Vol. 115 No. 9, 1704-1723

Gold, A. H., Malhotra, A., & Segars, A. H. (2001). Knowledge management: An organisational capabilities perspective. Journal of Management Information Systems, 18(1), 185-214.

Gomes, V. (2021). Adoption of national digital identity more timely than ever. Available at:

Guo, X., Han, X., Zhang, X., Dang, Y., and Chen, C. (2015). Investigating m-health acceptance from a protection motivation theory perspective: Gender and age differences. Telemedicine and e-Health, Vol. 21 No. 8, 661-669.

Hafiqah, M. (2020). Netizens concern over data privacy on Gerak Malaysia. Available at:

Hair, J. F., Hult, T. M., Ringle, C. M., and Sarstedt, M. (2017).A Primer On Partial Least Square Structural Equation Modeling (PLS-SEM). Sage Publications, Thousand Oaks.

Harbach, M., Fahl, S., Rieger, M., and Smith, M. (2013). On the acceptance of privacy-preserving authentication technology: the curious case of national identity cards. In International Symposium on Privacy Enhancing Technologies Symposium, Springer, Berlin, Heidelberg, 245-264.

Hartanto, D., and Siregar, S. M. (2021). Determinants of overall public trust in local government: Meditation of government response to COVID-19 in Indonesian context. Transforming Government: People, Process and Policy, Vol. 15 No. 2, 261-274.

Hizam, S. M., Ahmed, W., Fahad, M., Akter, H., Sentosa, I., and Ali, J. (2021). User behaviour assessment towards biometric facial recognition system: A SEM-neural network approach. arXiv preprint arXiv, Vol. 2106, 03371.

Holmes, M., and Ophoff, J. (2019). Online security behaviour: Factors influencing intention to adopt two-factor authentication. In 14th International Conference on Cyber Warfare and Security, Academic Conferences and Publishing International Limited, Stellenbosch, pp. 123-132.

Hsieh, P. J., and Lai, H. M. (2020). Exploring peoples intentions to use the health passbook in self-management: An extension of the technology acceptance and health behaviour theoretical perspectives in health literacy. Technological Forecasting and Social Change, Vol. 161, 120328.

Juetten. M. (2020). Adopting Technology. Available at:

Karahoca, A., Karahoca, D., and Aksöz, M. (2018). Examining intention to adopt to internet of things in healthcare technology products. Kybernetes, Vol. 47 No. 4, 742-770.

Kee, Y. A., Nee, Y. C., Beng, L. Y., and Fun, T. S. (2012). Security issues on identity card in Malaysia. International Journal of Engineering and Technology, Vol. 4 No. 5, 617-621.

Khuen, L. W. (2022). Implications of soaring inflation on unit trust fund industry. Available at:

Kim, T. B., and Ho, C. T. (2021). Validating the moderating role of age in multi-perspective acceptance model of wearable healthcare technology. Telematics and Informatics, Vol. 61, 101603.

Kline, R. B. (2011). Convergence of structural equation modeling and multilevel modeling. In R. B. Kline, The Sage Handbook of Innovation in Social Research Methods (pp. 562-589). Thousand Oaks: Sage Publication.

Korać, D., Damjanović, B., and Simić, D. (2021). A model of digital identity for better information security in e-learning systems. The Journal of Supercomputing, Vol. 78 No. 7, 1-30.

Koya, Z. (2020). Malaysians give mixed reactions to Gerak Malaysia app. Available at:

Li, X., Yuen, K. F., Wang, X., and Wong, Y. D. (2021). Contactless technologies adoption during the coronavirus pandemic: A combined technology acceptance and health belief perspective. Technology Analysis and Strategic Management, Vol. 33 No. 1, 1-14.

Lunn, E. (2021). Young people and men targeted by social media investment scammers. Available at:

Luo, Y., Wang, G., Li, Y., and Ye, Q. (2021). Examining protection motivation and network externality perspective regarding the continued intention to use m-health apps. International Journal of Environmental Research and Public Health, Vol. 18 No. 11, 5684.

Madon, S., and Schoemaker, E. (2021). Digital identity as a platform for improving refugee management. Information Systems Journal, Vol. 31 No. 6, 929-953.

Martinus, M. (2022). Smart City and Privacy Concerns During COVID-19: Lessons from Singapore, Malaysia, and Indonesia. Smart Cities in Asia, Springer, Singapore, 33-47.

Microsoft. (2018). Securing the modern enterprise in a digital world. Available at:

Mir, U., Kar, A. K., and Gupta, M. P. (2021). AI-enabled digital identity inputs for stakeholders and policymakers. Journal of Science and Technology Policy Management, Vol. 12 No. 3, 1-28.

Miraz, M. H., Hasan, M. T., Rekabder, M. S., and Akhter, R. (2022). Trust, transaction transparency, volatility, facilitating condition, performance expectancy towards cryptocurrency adoption through intention to use. Journal of Management Information and Decision Sciences, Vol. 25 No 1S, 1-20.

Mukhopadhyay, S., Basak, R., Carpenter, D., and Reithel, B. J. (2019). Patient use of online medical records: An application of technology acceptance framework. Information and Computer Security, Vol. 28 No.1, 97-115.

MyCERT. (2022). Reported incidents based on general incident classification statistics 2022. Available at:

OECD. (2019). Digital government in Chile digital identity. OECD Publishing, Paris.

Oldeweme, A., Märtins, J., Westmattelmann, D., and Schewe, G. (2021). The role of transparency, trust, and social influence on uncertainty reduction in times of pandemics: Empirical study on the adoption of COVID-19 tracing apps. Journal of Medical Internet, Vol. 23 No. 2, e25893.

Pang, Q., Meng, H., Fang, M., Xing, J., and Yao, J. (2021). Social distancing, health concerns, and digitally empowered consumption behaviour under COVID-19: A study on livestream shopping technology. Frontiers in Public Health, Vol. 9, 748048.

Peng, M. H., and Hwang, H. G. (2021). An empirical study to explore the adoption of e-learning social media platform in Taiwan: An integrated conceptual adoption framework based on technology acceptance model and technology threat avoidance theory. Sustainability, Vol. 13 No. 17, 9946.

Rad, R. E., Mohseni, S., Takhti, H. K., Azad, M. H., Shahabi, N., Aghamolaei, T., and Norozian, F. (2021). Application of the protection motivation theory for predicting COVID-19 preventive behaviours in Hormozgan, Iran: A cross-sectional study. BMC Public Health, Vol. 21 No. 1, 1-11.

Rahi, S., Khan, M. M., and Alghizzawi, M. (2021). Factors influencing the adoption of telemedicine health services during COVID-19 pandemic crisis: An integrative research model. Enterprise Information Systems, Vol. 15 No. 6, 769-793.

Ramayah, T., Cheah, J., Chuah, F., Ting, H., and Memon, M. A. (2018). Partial least squares structural equation modeling (PLS-SEM) using SmartPLS 3.0: An updated guide and practical guide to statistical analysis (2nd ed.). Pearson, Kuala Lumpur, Malaysia.

Rivera, R., Robledo, J. G., Larios, V. M., and Avalos, J. M. (2017). How digital identity on blockchain can contribute in a smart city environment", in International Smart Cities Conference, IEEE, Wuxi, 1-4.

Rogers, R. (1983). Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protected motivation. J. Cacioppo, and R. Petty, Social Psychophysiology: A Sourcebook, Guilford Press, New York, 153-176.

Saunders, M., Lewis, P., and Thornhill, A. (2019). Research Methods for Business Students 8th Edition. Pearson Education, Harlow.

Schoemaker, E., Baslan, D., Pon, B., and Dell, N. (2021). Identity at the margins: Data justice and refugee experiences with digital identity systems in Lebanon, Jordan, and Uganda. Information Technology for Development, Vol. 27 No. 1, 13-36.

Securities Commision. (2020). Annual report. Securities Commission Malaysia, Kuala Lumpur.

Sule, M. J., Zennaro, M., and Thomas, G. (2021). Cybersecurity through the lens of digital identity and data protection: Issues and trends. Technology in Society, Vol. 67, 101734.

Sun, Y., Wang, N., Guo, X., and Peng, Z. (2013). Understanding the acceptance of mobile health services: A comparison and integration of alternative models. Journal of Electronic Commerce Research, Vol. 14 No. 2, 183-200.

Sun, Y., Wang, N., Guo, X., and Peng, Z. (2013). Understanding the acceptance of mobile health services: A comparison and integration of alternative models. Journal of Electronic Commerce Research, Vol. 14 No. 2, 183-200.

The Edge Market. (2020). New CDS accounts opened in January to July soared 125% to 218,000 Bursa. Available at:

Thrasher, J. F., Swayampakala, K., Borland, R., Nagelhout, G., Yong, H. H., Hammond, D., and Hardin, J. (2016). Influences of self-efficacy, response efficacy, and reactance on responses to cigarette health warnings: A longitudinal study of adult smokers in Australia and Canada. Health Communication, Vol. 31 No. 12, 517-1526.

Tsap, V., Lips, S., and Draheim, D. (2020). Analysing eID public acceptance and user preferences for current authentication options in Estonia. In International Conference on Electronic Government and the Information Systems Perspective, Springer, Bratislava, pp.159-179.

Vassilikopoulou, A., Lepetsos, A., and Siomkos, G. (2018). Crises through the consumer lens: The role of trust, blame and risk. Journal of Consumer Marketing, Vol. 35 No. 10, 1-11.

Venkatesh, V., Thong, J. Y., Chan, F. K., and Hu, P. J. (2016). Managing citizens' uncertainty in e-government services: The mediating and moderating roles of transparency and trust. Information Systems Research, Vol. 27 No. 1, 87-111.

Wei, S. L. (2019. In Estonia, 99% of public services are online. Available at:

Witte. (1992). Putting the fear back into fear appeals: The extended parallel process model. Communication Monographs, Vol. 59 No. 4, 329-349.

Yan, Y., Jacques-Tiura, A. J., Chen, X., Xie, N., Chen, J., Yang, N., and MacDonell, K. K. (2014). Application of the protection motivation theory in predicting cigarette smoking among adolescents in China. Addictive Behaviours, Vol. 39 No. 1, 181-188.

Zhang, X., Han, X., Dang, Y., Meng, F., Guo, X., and Lin, J. (2017). User acceptance of mobile health services from users' perspectives: The role of self-efficacy and response-efficacy in technology acceptance. Informatics for Health and Social Care, Vol. 42 No. 2,194-206.

Zhao, Y., Ni, Q., and Zhou, R. (2018). What factors influence the mobile health service adoption? A meta-analysis and the moderating role of age. International Journal of Information Management, Vol. 43 No. 1, pp.342-350

Zhe, K. S. (2017). Cover story: Detecting cryptocurrency scams. Available at:




How to Cite

Manogaran, P. ., & Teoh Ai Ping. (2023). Determinants of National Digital Identity Verification Platform Acceptance Among Young Investors in Malaysia. Journal of Governance and Integrity, 5(3), 308–316.



JGI Vol. 5 Issue 3, December 2022