Bahasa Abstract

Penelitian ini membahas kejahatan siber terhadap individu, jenis kejahatan siber, analisis, dan perkembangannya. Penelitian ini menggunakan penelitian interdispliner dengan pendekatan metode kualitatif. Ditemukan berbagai jenis kejahatan tethadap individu, diantaranya: (1) Rekayasa Sosial dan tipu daya; (2) Pelecehan Daring; (3) Kejahatan terkait Identitas; (4) Peretasan; dan (5) Penolakan Layanan dan Informasi. Penting bagi individu untuk memahami taktik yang digunakan oleh penjahat siber dan untuk mengadopsi praktik keamanan yang kuat dalam penggunaan teknologi. Menjaga kerahasiaan informasi pribadi, menggunakan kata sandi yang kuat, memperbarui perangkat lunak secara teratur, dan menjadi sadar akan tanda-tanda serangan dan penipuan online dapat membantu melindungi diri dari ancaman kejahatan siber. Secara umum kita banyak mengenal kejahatan siber seperti phishing, malware, kejahatan identitas, penipuan online, dan pelecehan online dapat memiliki dampak serius terhadap keamanan, privasi, dan kesejahteraan individu. Penting bagi individu untuk memahami taktik yang digunakan oleh penjahat siber dan untuk mengadopsi praktik keamanan yang kuat dalam penggunaan teknologi. Menjaga kerahasiaan informasi pribadi, menggunakan kata sandi yang kuat, memperbarui perangkat lunak secara teratur, dan menjadi sadar akan tandatanda serangan dan penipuan online dapat membantu melindungi diri dari ancaman kejahatan siber.



AAG. “The Latest 2023 Cyber Crime Statistics (Updated June 2023).” Last modified 2023. Accessed March 26, 2023. https://aag-it.com/the-latest-cyber-crime-statistics/#:~:text=Headline Cyber Crime Statistics&text=1 in 2 American internet,the first half of 2022.

Abulencia, Jesse. “The Cost of Cybercrime in the US Healthcare Sector.” Computer Fraud & Security 11, no. 8–13 (2021).

Acquisti, Alessandro, Leslie K. John, and George Loewenstein. “What Is Privacy Worth?” The Journal of Legal Studies 42, no. 2 (2013): 249–274.

Acquisti, Alessandro, Curtis Taylor, and Liad Wagman. “The Economics of Privacy.” • Journal of Economic Literature 54, no. 2 (2016): 442–492.

Ahmad, Showkat. “Social Engineering Techniques Contrast Study.” International Journal of Engineering Studies. 9, no. 1 (2017): 105–110.

Albalawi (et al), Mariam. “Website Defacement Detection and Monitoring Methods: A ReviewNo Title.” Electronics 2022, 3573. 11 (2022): 1–20. https://doi.org/10.3390/electronics11213573.

Aldawood, Hussain, and Geoffrey Skinner. “A Taxonomy for Social Engineering Attacks via Personal Devices.” International Journal of Computer Applications (0975 – 8887) 178, no. 50 (2019): 19–26.

Alghawazi, Maha, Daniyal Alghazzawi, and Suaad Alarifi. “Detection of SQL Injection Attack Using Machine Learning Techniques: A Systematic Literature Review.” Journal of Cybersecurity and Privacy 2, no. 4 (2022): 764–777.

Almutairi, Bandar S., and Abdurahman Alghamdi. “The Role of Social Engineering in Cybersecurity and Its Impact.” Journal of Information Security 13, no. 4 (2022).

Alshaikh, Hesham, Nagy Ramadan, and Hesham Ahmed Hefny. “Ransomware Prevention and Mitigation Techniques.” International Journal of Computer Applications (0975 – 8887) 177, no. 40 (2020): 31–39.

Anderson, Ross, Chris Barton, Rainer Bölme, Richard Clayton, Carlos Ganán, Tom Grasso, Michael Levi, Tyler Moore, and Marie Vasek. “Easuring the Changing Cost of Cybercrime.” Last modified 2019. Accessed June 27, 2023. https://orca.cardiff.ac.uk/id/eprint/122684/1/Levi_Measuring the Changing Cost of Cybercrime.pdf.

Arora, Bhavna. “Exploring and Analyzing Internet Crimes and Their Behaviours.” Perspectives in Science 8 (2016): 540–542.

Bansla, Neetu, Swati Kunwar, and Khushboo Gupta. “Social Engineering: A Technique for Managing Human Behavior.” Journal of Information Technology and Sciences 5, no. 1 (2019): 18–22.

Başeskioğlu, M. Ö., and A. Tepeci. “Cybersecurity, Computer Networks Phishing, Malware, Ransomware, and Social Engineering Anti-Piracy Reviews.” 3rd International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), Ankara, Turkey, 2021 (2021): 1–5.

Beaman (et al), Craig. “Ransomware: Recent Advances, Analysis, Challenges and Future Research Directions.” Computers & Security 111 (2021): 102490.

Beno, Richard, and Ron Poet. “Hacking Passwords That Satisfy Common Password Policies: Hacking Passwords.” In 13th International Conference on Security of Information and Networks (2020): 1–3.

Bermejo, C., H. Flores, and P. Hui. “Notice of Retraction: Steal Your Life Using 5 Cents: Hacking Android Smartphones with NFC Tags.” Journal of Network and Computer Applications (2020): 1–6.

Borchgrevink, Jonas. “Hacking and Its Legal Consequences.” Last modified 2023. Accessed June 23, 2023. https://hacked.com/hacking-and-its-legal-consequences/.

Broadhurst, Roderic. “Developments in the Global Law Enforcement of Cyber‐crime.” Policing: An International Journal of Police Strategies & Management 29, no. 3 (2006): 408–433.

Chng, Samuel, Han Yu Lu, Ayush Kumar, and David Yau. “Hacker Types, Motivations and Strategies: A Comprehensive Framework.” Computers in Human Behavior Reports 5, no. 100167 (2022).

Conteh, Nabie Y. “The Dynamics of Social Engineering and Cybercrime in the Digital Age.” IGI Global (2021): 144–149.

Conti, Gregory, and Mustaque Ahamad. “A Framework for Countering Denial-of-Information Attacks.” IEEE security & privacy 6, no. 3 (2005): 50–56.

Cui (et al), Lei. “Detecting False Data Attacks Using Machine Learning Techniques in Smart Grid: A Surv.” Journal of Network and Computer Applications 170, no. 102808 (2020).

Deora, Raj Singh, and Dhaval Chudasama. “Brief Study of Cybercrime on an Internet.” Journal of Communication Engineering & Systems 11, no. 1 (2021): 1–6.

Devi, R. S., and M. M. Kumar. “Testing for Security Weakness of Web Applications Using Ethical Hacking.” 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184) 354–361, d (2020).

Dupont, B., and T Holt. “The Human Factor of Cybercrime.” Social Science Computer Review 40, no. 4 (2022): 860–864. https://doi.org/10.1177/08944393211011584.

Englander, Elizabeth, Edward Donnerstein, Robini Kowalsk, Carolyn A. Lin, and Katalin Parti. “Defining Cyberbullying.” Pediatrics 140 140, no. 2 (2017): S148–S151.

Ezenwe, Adaoma, Eoghan Furey, and Kevin Curran. “Mitigating Denial of Service Attacks with Load Balancing.” Journal of Robotics and Control (JRC) 1, no. 4 (2020): 129–135.

Felzmann, Heike, Eduard Fosch Villaronga, and Aurelia Tamò-Larrieux. “Transparency You Can Trust: Transparency Requirements for Artificial Intelligence between Legal Norms and Contextual Concerns.” Big Data & Society (2019): 1–14. https://journals.sagepub.com/doi/epub/10.1177/2053951719860542.

Ghafir, I., V. Prenosil, A. Alhejailan, and M. Hammoudeh. “Social Engineering Attack Strategies and Defense Approaches,” (2016): 45–149.

Heartfield (et al), Ryan. “A Taxonomy of Cyber-Physical Threats and Impact in the Smart Home.” Computers & Security 78 (2018): 398–428.

Hennink, Monique, Inge Hutter, and Ajay Baliley. Qualitative Research Methods. Second Edi. London: Sage Publications Ltd., 2020.

Hussain, Ali. “What Is Identity Theft? Definition, Types, and Examples.” Last modified 2022. Accessed March 27, 2023. https://www.investopedia.com/terms/i/identitytheft.asp.

Jamil (et al), Abid. “MPMPA: A Mitigation and Prevention Model for Social Engineering Based Phishing Attacks on Facebook.” 2018 IEEE International Conference on Big Data (Big Data), Seattle, WA, USA,.2018.8622505. doi: 10.11 (2018): 5040–5048.

Jhaver, S., Ghoshal, S., Bruckman, A. and Gilbert, E. “Online Harassment and Content Moderation: The Case of Blocklists.” ACM Transactions on Computer-Human Interaction (TOCHI) 25, no. 2 (2018): 1–33.

Jones, Keith S, Miriam E. Armstrong, McKenna K. Tornblad, and Akbar Siami Namin. “How Social Engineers Use Persuasion Principles during Vishing Attacks.” Information & Computer Security 29, no. 2 (2021): 314–331.

Karali, Y, S. Panda, and C. S. Panda. “Cyber Crime: An Analytical Study of Cyber Crime Cases at the Most Vulnerable States and Cities in India.” al Journal of Engineering and Management Research (IJEMR) 5, no. 2 (2015): 43–48.

Kaspersky. “What Is Hacking? And How to Prevent It.” Last modified 2023. Accessed March 27, 2023. https://www.kaspersky.com/resource-center/definitions/what-is-hacking.

Khurana, Atika, Amy Bleakley, Amy B. Jordan, and Daniel Romer. “The Protective Effects of Parental Monitoring and Internet Restriction on Adolescents’ Risk of Online Harassment.” Journal of Youth and Adolescence 44 (2015): 1039–1047.

Kumar, Anshul, Mansi Chaudhary, and Nagresh Kumar. “Social Engineering Threats and Awareness: A Survey.” European Journal of Advances in Engineering and Technology 2, no. 11 (2015): 15–19.

Lau, Felix, Stuart H. Rubin, Michael H. Smith, and Ljiljana Trajkovic. “Distributed Denial of Service Attacks.” IEEE 3 (2000): 2275–2280.

Lee, Chunghun, Choong C. Lee, and Suhyun Kim. “Understanding Information Security Stress: Focusing on the Type of Information Security Compliance Activity.” Computers & Security 59 (2016): 60–70.

Lenhard, T.H. “Website Hacking.” Data Security. Springer, Wiesbaden (2022).

Li, Yuchong, and Qinghui Liu. “A Comprehensive Review Study of Cyber-Attacks and Cyber Security; Emerging Trends and Recent Developments.” Energy Reports 7 (2021): 8176–8186.

Lohani, Shivam. “Social Engineering: Hacking into Humans.” International Journal of Advanced Studies of Scientific Research 4, no. 1 (2019).

Lubua, E.W.’, and P.D Pretorius. “Ranking Cybercrimes Based on Their Impact to Organisations’ Welfare.” HREAT Conference Proceedings (2019): 1–11.

Luthiya, Adik Nur, Benny Irawan, and Rena Yulia. “Kebijakan Hukum Pidana Terhadap Pengaturan Pencurian Data Pribadi Sebagai Penyalahgunaan Teknologi Komunikasi Dan Informasi.” urnal Hukum Pidana dan Kriminologi 2, no. 2 (2021): 14–29.

Mandalla, Achmad Zaki. “Deteksi Penipuan Pada Transaksi Kartu Kredit Menggunakan Metode Stochastic Gradient Descent Dengan Momentum.” Institut Teknologi Sepuluh Nopember, 2023.

Maseno, Elijah M. “Vishing Attack Detection Model For Mobile Users.” KCA University (2017). Attack Detection Model For Mobile Users..pdf?sequence=1&isAllowed=y.

McGuire, Mike, and ( Samantha Dowling. “Cyber Crime: A Review of the Evidence Research Report 75.” Last modified 2013. Accessed June 27, 2023. https://citeseerx.ist.psu.edu/document?repid=rep1&type=pdf&doi=5e089b9bac3cdba577724cf0cd23f648a4f952d9.

Mehmood, A., I. Natgunanathan, Y. Xiang, G. Hua, and S. Guo. “Protection of Big Data Privacy.” IEEE Access 4, no. 1821–1834 (2016). https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7460114.

National Cyber Security Centre. “Denial of Service (DoS) Guidance.” Last modified 2023. Accessed March 26, 2023. https://www.ncsc.gov.uk/collection/denial-service-dos-guidance-collection#:~:text=%22Denial of service%22 or %22,frequently reported by the media.

Nissim, Kobbi, and Alexandra Wood. “Is Privacy Privacy?” Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 376, no. 2128 (2018). https://royalsocietypublishing.org/doi/pdf/10.1098/rsta.2017.0358.

Nurse, Jason R. C. “Cybercrime and You: How Criminals Attack and the Human Factors That They Seek to Exploit.” arXiv preprint arXiv:1811.06624 (2018). https://arxiv.org/abs/1811.06624.

Pande, Sagar, Aditya Khamparia, Deepak Gupta, and Dang N. H. Thanh. “DDOS Detection Using Machine Learning Technique.” In Recent Studies on Computational Intelligence: Doctoral Symposium on Computational Intelligence (DoSCI 2020), Springer Singapore. (2020): 59–68.

Parti, Katalin, Akos Szigeti, and Sandro Serpa. “The Future of Interdisciplinary Research in the Digital Era: Obstacles and Perspectives of Collaboration in Social and Data Sciences - An Empirical Study.” Cogent Social Sciences 7, no. 1 (2021). https://www.tandfonline.com/doi/full/10.1080/23311886.2021.1970880.

Pelechrinis, Konstantinos, Marios Iliofotou, and Srikanth V. Krishnamurthy. “Denial of Service Attacks in Wireless Networks: The Case of Jammers.” IEEE Communications surveys & tutorials 13, no. 2 (2010): 245–257.

Perwej (et al), Yusuf. “A Systematic Literature Review on the Cyber Security.” tional Journal of scientific research and managemen 9, no. 12 (2021): 669–710.

Rasool (et al), Raihan ur. “A Survey of Link Flooding Attacks in Software Defined Network Ecosystems.” Journal of Network and Computer Applications (2020).

Rumlus, M.H., and H Hartadi. “Kebijakan Penanggulangan Pencurian Data Pribadi Dalam Media Elektronik.” Jurnal HAM 11, no. 2 (2020): 285–299.

Salahdine, Fatima, and Naima Kaabouch. “Social Engineering Attacks: A Survey.” Future Internet, 11 (2019): 89.

Schwab, Klaus. “The Fourth Industrial Revolution: What It Means, How to Respond.” Currency (2017). https://jmss.vic.edu.au/wp-content/uploads/2021/06/The_Fourth_Industrial_Revolution.pdf.

Siegner, Alana B. “Experiential Climate Change Education: Challenges of Conducting Mixed-Methods, Interdisciplinary Research in San Juan Islands, WA and Oakland, CA.” Energy Research & Social Science 45 (2018): 374–384.

Sinha, Shivanshi, and Dr Yojna Arora. “Ethical Hacking: The Story of a White Hat Hacker.” International Journal of Innovative Research in Computer Science & Technology (IJIRCST) ISSN (2020 (2020): 131–136.

Thorns, David, and Michael Nuth. “Beyond The Hype: Intellectual Property and The Knowledge Society/Knowledge Economy.” Journal of Economic Surveys 20, no. 4 (2006): 633–690.

Vitak, Jessica, Linda Steiner, and Zahra Ashktorab. “Identifying Women’s Experiences With and Strategies for Mitigating Negative Effects of Online Harassment.” In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computingx (2017): 1231–1245.

Vogels, Emily A. “The State of Online Harassment.” Pew Research Center 13 (2021). https://www.pewresearch.org/internet/wp-content/uploads/sites/9/2021/01/PI_2021.01.13_Online-Harassment_FINAL-1.pdf.

Wang, Zuoguang, Limin Sun, and Hongsong Zhu. “Defining Social Engineering in Cybersecurity.” IEEE Access 8 (2020): 85094–85115.

Watts (et al), Lynette K. “Cyberbullying in Higher Education: A Literature Review.” Computers in Human Behavior 69 (2017): 268–274.

Whittaker, E. and Kowalski, R.M. “Cyberbullying Via Social Media.” Journal of school violence 14, no. 1 (2015): 11–29.

Zulkurnain (et al), Ahmad Uways. “Social Engineering Attack Mitigation.” International Journal of Mathematics and Computational Science 1, no. 4 (2015): 188–198.