Published: 2026-04-01
Preventing Crypto Scams Through Digital Literacy and Cyber Security
DOI: 10.35870/ijsecs.v6i1.6345
Muhammad Dzaky Maulana, Agus Juhana
Article Metrics
- Scopus Citations
- Google Scholar
- Crossref Citations
- Semantic Scholar
- DataCite Metrics
-
If the link doesn't work, copy the DOI or article title for manual search (API Maintenance).
Abstract
Blockchain-based financial technology has reshaped how digital transactions are conducted, yet its rapid adoption has simultaneously expanded the attack surface for a specific class of cybercrime — cryptocurrency fraud. This study examines how digital literacy education and cybersecurity practices, when applied in combination, can reduce the vulnerability of crypto asset holders to scams. A qualitative approach was adopted through a systematic literature review of prior academic studies alongside an evaluation of fraud cases currently documented in Indonesia. The findings indicate that inadequate digital literacy is the primary driver of user susceptibility to online fraud — users who cannot verify token authenticity, assess transaction risks, or identify phishing attempts are structurally exposed. Applying security measures such as two-factor authentication, data encryption, and strong password management demonstrably reduces that exposure by 50–70%. Coordinating digital literacy education, consumer protection regulation, and cybersecurity awareness is necessary to build a safer and more accountable crypto environment. This study is intended to inform the design of educational programs and national policy on digital asset protection within the broader digital economy
Keywords
Crypto Scam; Digital Literacy; Cybersecurity; Digital Crime Prevention; Crypto Assets
Peer Review Process
This article has undergone a double-blind peer review process to ensure quality and impartiality.
Indexing Information
Discover where this journal is indexed at our indexing page.
Open Science Badges
This journal supports transparency in research and encourages authors to meet criteria for Open Science Badges.
How to Cite
Article Information
This article has been peer-reviewed and published in the International Journal Software Engineering and Computer Science (IJSECS). The content is available under the terms of the Creative Commons Attribution 4.0 International License.
-
Issue: Vol. 6 No. 1 (2026)
-
Section: Articles
-
Published: 2026-04-01
-
License: CC BY 4.0
-
Copyright: © 2026 Authors
-
DOI: 10.35870/ijsecs.v6i1.6345
AI Research Hub
This article is indexed and available through various AI-powered research tools and citation platforms. Our AI Research Hub ensures that scholarly work is discoverable, accessible, and easily integrated into the global research ecosystem.
Muhammad Dzaky Maulana, Indonesia University of Education
Department of Multimedia Education, Indonesia University of Education, Bandung City, West Java Province, Indonesia
-
Alsubaei, F., Abuhussein, A., Shandilya, S. K., & Shiva, S. (2023). Trends in cryptocurrency malware and cyber threats: A systematic review. Computers & Security, 125, 103036. https://doi.org/10.1016/j.cose.2022.103036
-
-
Braithwaite, J. (2024). 'Authorized push payment' bank fraud: What does an effective regulatory response look like? Journal of Financial Regulation, 10(2), 174–196. https://doi.org/10.1093/jfr/fjae009
-
Cernera, F., Morgia, M. L., Mei, A., & Mongardini, A. (2025). The blockchain warfare: Investigating the ecosystem of sniper bots on Ethereum and BNB smart chain. ACM Transactions on the Web. https://doi.org/10.1145/3736763
-
Childs, A. (2024). 'I guess that's the price of decentralization…': Understanding scam victimization experiences in an online cryptocurrency community. International Review of Victimology. https://doi.org/10.1177/02697580231215840
-
Cross, C. (2024). Romance baiting, cryptorom, and 'pig butchering': An evolutionary step in romance fraud. Current Issues in Criminal Justice. https://doi.org/10.1080/10345329.2023.2248670
-
Ehsan, A., Iqbal, Z., Abuowaida, S., Aljaidi, M., & Zia, H. (2024). Enhanced anomaly detection in Ethereum: Unveiling and classifying threats with machine learning. IEEE Access. https://ieeexplore.ieee.org/abstract/document/10759631/
-
Fu, B., Wang, Y., & Feng, T. (2024). CT-GCN+: A high-performance cryptocurrency transaction graph convolutional model for phishing node classification. Cybersecurity. https://doi.org/10.1186/s42400-023-00194-5
-
Jenkins, J., & Lettsome, A. (2024). Service of freezing injunction on BVI cryptocurrency issuers by a nonfungible token. American Bankruptcy Institute Journal. https://search.proquest.com/openview/ea55c1d86d525a948ae2fc3bfdd7a4c7/1
-
Jiang, P., & Zhu, L. (2025). Cross-chain abnormal account detection. Blockchain Technology: Cross-Chain Regulation. https://doi.org/10.1007/978-981-96-4395-0_3
-
Kang, J., & Buu, S. (2024). Graph anomaly detection with disentangled prototypical autoencoder for phishing scam detection in cryptocurrency transactions. IEEE Access. https://ieeexplore.ieee.org/abstract/document/10571963/
-
Khan, D., Farman, H., & Hassan, S. (2024). Cryptocurrency crimes: A systematic review on illicit activities using cryptocurrency (Bitcoin) and challenges for law enforcement agencies. Pakistan Journal of Engineering, Technology & Science. https://journals.iobm.edu.pk/index.php/pjets/article/view/1121
-
Kimber, J., Branca, E., & Natadze, A. (2025). An end-to-end analysis of crypto scams on Ethereum. ACM Transactions on the Web. https://doi.org/10.1145/3737874
-
Kirobo, A. (2024). Security vulnerabilities of cryptocurrency wallets: A systematic review. FUOYE Journal of Engineering and Technology. https://www.ajol.info/index.php/fuoyejet/article/view/289954
-
Klein, G., Assadi, D., & Zwilling, M. (2024). Fighting fire with fire: Combating criminal abuse of cryptocurrency with a P2P mindset. Information Systems Frontiers. https://doi.org/10.1007/s10796-024-10498-7
-
Krause, D. (2025). The dangers of cryptocurrency hype and deregulation: Why oversight matters in the digital asset economy. SSRN. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=5136389
-
-
Liu, E., Kappos, G., Mugnier, E., & Invernizzi, L. (2024). Give and take: An end-to-end investigation of giveaway scam conversion rates. Proceedings of the ACM on Measurement and Analysis of Computing Systems. https://doi.org/10.1145/3646547.3689005
-
Luo, B., Zhang, Z., Wang, Q., Ke, A., Lu, S., & He, B. (2024). AI-powered fraud detection in decentralized finance: A project life cycle perspective. ACM Computing Surveys. https://doi.org/10.1145/3705296
-
Luong, H., & Ngo, H. (2024). Understanding the nature of the transnational scam-related fraud: Challenges and solutions from Vietnam's perspective. Laws, 13(6), 70. https://doi.org/10.3390/laws13060070
-
Morgia, M. L., Mei, A., Mongardini, A., & Wu, J. (2025). Pretending to be a VIP! Characterization and detection of fake and clone channels on Telegram. ACM Transactions on the Web. https://doi.org/10.1145/3705014
-
Park, S., & Kang, J. (2023). Digital financial literacy and consumer security behavior in crypto-asset ownership. Finance Research Letters, 52, 103428. https://doi.org/10.1016/j.frl.2023.103428
-
Rehman, M., & Salah, K. (2020). Blockchain for cybersecurity and privacy: Architectures, challenges, and solutions. IEEE Access, 8, 173–207. https://doi.org/10.1109/ACCESS.2019.2957999
-
Rosa, P. D., Queyrut, S., Bromberg, Y., & Felber, P. (2025). PhishingHook: Catching phishing Ethereum smart contracts leveraging EVM opcodes. arXiv preprint. https://arxiv.org/abs/2506.19480
-
Rufai, A. H., & Bunce, L. (2022). The influence of digital literacy on online fraud vulnerability among young adults. Journal of Cybersecurity, 8(1). https://doi.org/10.1093/cybsec/tyac012
-
Sharma, T., & Shukla, S. (2025). Discovering NFT rug pulls: Matching behavior patterns using graph isomorphism networks. ACM Transactions on Internet Technology. https://doi.org/10.1145/3744561
-
Staddon, A., Woodruff, A., & Chaudhry, A. (2021). Enhancing online privacy literacy: A user-centered approach to digital security education. Computers & Security, 103, 102159. https://doi.org/10.1016/j.cose.2020.102159
-
Taha, D., & Jabar, H. (2024). A machine learning algorithm for detecting phishing websites: A comparative study. Iraqi Journal for Computer Science and Mathematics. https://ijcsm.researchcommons.org/ijcsm/vol5/iss3/13/
-
-
Yang, C., & Kim, J. (2022). The effectiveness of two-factor authentication against emerging cybercrime. IEEE Transactions on Information Forensics and Security, 17, 2591–2603. https://doi.org/10.1109/TIFS.2022.3156789
-
Zin, N., Muda, S., Kasim, E., & Ismail, N. (2024). Understanding the vulnerabilities contributing to investor victimization in scams. Pakistan Journal of Criminology. https://www.pjcriminology.com/wp-content/uploads/2024/05/68-Understanding-the-Vulnerabilities.pdf

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
1. Copyright Retention and Open Access License
Authors retain copyright of their work and grant the journal non-exclusive right of first publication under the Creative Commons Attribution 4.0 International License (CC BY 4.0).
This license allows unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
2. Rights Granted Under CC BY 4.0
Under this license, readers are free to:
- Share — copy and redistribute the material in any medium or format
- Adapt — remix, transform, and build upon the material for any purpose, including commercial use
- No additional restrictions — the licensor cannot revoke these freedoms as long as license terms are followed
3. Attribution Requirements
All uses must include:
- Proper citation of the original work
- Link to the Creative Commons license
- Indication if changes were made to the original work
- No suggestion that the licensor endorses the user or their use
4. Additional Distribution Rights
Authors may:
- Deposit the published version in institutional repositories
- Share through academic social networks
- Include in books, monographs, or other publications
- Post on personal or institutional websites
Requirement: All additional distributions must maintain the CC BY 4.0 license and proper attribution.
5. Self-Archiving and Pre-Print Sharing
Authors are encouraged to:
- Share pre-prints and post-prints online
- Deposit in subject-specific repositories (e.g., arXiv, bioRxiv)
- Engage in scholarly communication throughout the publication process
6. Open Access Commitment
This journal provides immediate open access to all content, supporting the global exchange of knowledge without financial, legal, or technical barriers.