Main Article Content
Abstract
This study aimed to identify social engineering prevention socialization patterns through website and twitter by six major banks in Indonesia. This qualitative research utilized archival research method and documentary secondary data, namely using the bank's website and twitter media. This qualitative research uses content analysis and data was processed using NVivo 12 software. The results showed that the socialization of social engineering prevention provided by six banks in Indonesia through the website and twitter media contained information about the characteristics of social engineering, bank contact service facilities, and steps to prevent social engineering. Optimization of socialization through the website and twitter could be done by creating content that contains complete and up-to-date information about the characteristics of social engineering, contact service facilities, and preventive measures that could be visualized in the form of videos or attractively designed poster images.
Keywords
Article Details
Copyright (c) 2024 Rahmadani Ningtyas Sekar Putri, Hendi Yogi Prabowo Hendi
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
References
- Abass, I. A. M. (2018). Social engineering threat and defense: A literature survey. Journal of Information Security, 09(04), 257–264. https://doi.org/10.4236/jis.2018.94018
- Aditama, R. (2021). Penegakan hukum cyber crime terhadap tindak pidana pencurian uang nasabah dengan cara pembajakan akun internet banking lewat media sosial. Wajah Hukum, 5(1), 118. https://doi.org/10.33087/wjh.v5i1.360
- Airehrour, D., Nair, N. V., & Madanian, S. (2018). Social engineering attacks and countermeasures in the New Zealand banking system: Advancing a user-reflective mitigation model. Information (Switzerland), 9(5). https://doi.org/10.3390/info9050110
- Badan Siber dan Sandi Negara. (2020). Rekap serangan siber (Januari – April 2020). https://bssn.go.id/rekap-serangan-siber-januari-april-2020/
- Balzer, C., Oktavian, R., Zandi, M., Fairen-Jimenez, D., & Moghadam, P. Z. (2020). Wiz: A web-based tool for interactive visualization of big data. Patterns, 1(8), 100107. https://doi.org/10.1016/j.patter.2020.100107
- BSSN. (2022). Berkomitmen kawal tingkat kematangan keamanan siber sektor keuangan, BSSN gandeng OJK selenggarakan workshop penilaian kematangan keamanan siber. https://bssn.go.id/berkomitmen-kawal-tingkat-kematangan-keamanan-siber-sektor-keuangan-bssn-gandeng-ojk-selenggarakan-workshop-penilaian-kematangan-keamanan-siber/
- Chetioui, K., Bah, B., Alami, A. O., & Bahnasse, A. (2022). Overview of social engineering attacks on social networks. Procedia Computer Science, 198(2021), 656–661. https://doi.org/10.1016/j.procs.2021.12.302
- CNN Indonesia. (2022). BSSN catat 1,6 miliar insiden keamanan siber sepanjang 2021. https://www.cnnindonesia.com/teknologi/20220330181041-192-778082/bssn-catat-16-miliar-insiden-keamanan-siber-sepanjang-2021
- Eck, J. (2003). Police problems: The complexity of problem theory, research and evaluation. Crime Prevention Studies, 15, 79–113.
- Enrick, M. (2019). Pembobolan ATM menggunakan teknik skimming kaitanya dengan pengajuan restitusi. 2(2), 555–580.
- Gibbs, T. (2020). Seeking economic cyber security: a Middle Eastern example. Journal of Money Laundering Control, 23(2), 493–507. https://doi.org/10.1108/JMLC-09-2019-0076
- Greenspan, S. (2008). Annal of gullibility: Why we get duped and how to avoid it. Santa Barbara, CA: ABC-CLIO.
- Hasan, A., & Febriany, L. (2021). Identifikasi tindakan pengawasan dan pencegahan terhadap kejahatan finansial perbankan syariah selama masa pandemi COVID 19. Jurnal Ilmiah Akuntansi dan Keuangan, 4(4), 1089–1090. https://doi.org/26222191
- Hasugian, P. S. (2018). Perancangan website sebagai media promosi dan informasi. Journal of Informatic Pelita Nusantara, 3.
- Iryanti, Y. S., & Rahman, M. A. (2019). Promosi perpustakaan melalui media sosial twitter di perpustakaan hukum Daniel S. Lev. Edulib, 9(2), 128–143. https://doi.org/10.17509/edulib.v9i2.17763
- Junaedi, D. I. (2017). Antisipasi dampak social engineering pada bisnis perbankan. Jurnal Ilmu-Ilmu Informatika dan Manajemen STMIK, 11(No.1). https://doi.org/1978-3310
- Kävrestad, J. (2018). Fundamentals of digital forensics. In Fundamentals of Digital Forensics (Second). Springer Nature Switzerland AG. https://doi.org/10.1007/978-3-319-96319-8
- KOMPAS. (2022). Pasutri di Padang jadi korban phising Rp 1,1 miliar, OJK Sumbar minta warga hati-hati. https://regional.kompas.com/read/2022/06/10/181226578/pasutri-di-padang-jadi-korban-phising-rp-11-miliar-ojk-sumbar-minta-warga?page=all&lgn_method=google
- Pan, W., Liu, D., & Fang, J. (2021). An examination of factors contributing to the acceptance of online health misinformation. Frontiers in Psychology, 12(March), 1–11. https://doi.org/10.3389/fpsyg.2021.630268
- Ratnamulyani, Ike Atikah Maksudi, B. I. (2018). Peran media sosial dalam peningkatan partisipasi pemilih pemula dikalangan pelajar di Kabupaten Bogor. Jurnal Ilmu - Ilmu Sosial Dan Humaniora, 20(2), 154–161. https://doi.org/1411 - 0903
- Rebovich, D.J., Layne, J., Jiandani, J., & Hage, S., (2000). The national public survey on white-collar crime. Morgantown, WV: National White Collar Crime Center.
- Safitri, E. M., Ameilindra, Z., & Yulianti, R. (2020). Analisis teknik social engineering sebagai ancaman dalam keamanan sistem informasi: Studi literatur. Jurnal Ilmiah Teknologi Informasi Dan Robotika, 2, 21–26. http://jifti.upnjatim.ac.id/index.php/jifti/article/view/26
- Saunders, Lewis, & Thornhill. (2012). Research methods for business students. International Journal of the History of Sport, 30(1).
- Setiawan, D., Baraja, A., & Sukoco. (2021). Pembuatan company profile berbasis website pada PT Aether Digital Indonesia. Surakarta Informatic Journal, 3. https://doi.org/2621-5330
- Shah, A., & Ravi, S. (2012). A to Z of cyber crime. Lexcode Education & Assessment Platform (LEAP).
- Titus, R. M., Gover, A. R. (2001). Personal fraud: The victims and the scams. Crime Prevention Studies, 12, 133–151.
- Tracy, S. J. . (2013). Qualitative research methods: Collecting evidence, crafting analysis, communicating impact (1st ed.). John Wiley & Sons, Ltd.,. https://doi.org/10.5613/rzs.43.1.6
- Wall, D. S. (2017). Towards a conceptualisation of cloud (cyber) crime. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 10292 LNCS(July), 529–538. https://doi.org/10.1007/978-3-319-58460-7_37
- We are social. (2022). Indonesian digital report 2022. In We Are Social (p. 113). https://datareportal.com/reports/digital-2021-indonesia
References
Abass, I. A. M. (2018). Social engineering threat and defense: A literature survey. Journal of Information Security, 09(04), 257–264. https://doi.org/10.4236/jis.2018.94018
Aditama, R. (2021). Penegakan hukum cyber crime terhadap tindak pidana pencurian uang nasabah dengan cara pembajakan akun internet banking lewat media sosial. Wajah Hukum, 5(1), 118. https://doi.org/10.33087/wjh.v5i1.360
Airehrour, D., Nair, N. V., & Madanian, S. (2018). Social engineering attacks and countermeasures in the New Zealand banking system: Advancing a user-reflective mitigation model. Information (Switzerland), 9(5). https://doi.org/10.3390/info9050110
Badan Siber dan Sandi Negara. (2020). Rekap serangan siber (Januari – April 2020). https://bssn.go.id/rekap-serangan-siber-januari-april-2020/
Balzer, C., Oktavian, R., Zandi, M., Fairen-Jimenez, D., & Moghadam, P. Z. (2020). Wiz: A web-based tool for interactive visualization of big data. Patterns, 1(8), 100107. https://doi.org/10.1016/j.patter.2020.100107
BSSN. (2022). Berkomitmen kawal tingkat kematangan keamanan siber sektor keuangan, BSSN gandeng OJK selenggarakan workshop penilaian kematangan keamanan siber. https://bssn.go.id/berkomitmen-kawal-tingkat-kematangan-keamanan-siber-sektor-keuangan-bssn-gandeng-ojk-selenggarakan-workshop-penilaian-kematangan-keamanan-siber/
Chetioui, K., Bah, B., Alami, A. O., & Bahnasse, A. (2022). Overview of social engineering attacks on social networks. Procedia Computer Science, 198(2021), 656–661. https://doi.org/10.1016/j.procs.2021.12.302
CNN Indonesia. (2022). BSSN catat 1,6 miliar insiden keamanan siber sepanjang 2021. https://www.cnnindonesia.com/teknologi/20220330181041-192-778082/bssn-catat-16-miliar-insiden-keamanan-siber-sepanjang-2021
Eck, J. (2003). Police problems: The complexity of problem theory, research and evaluation. Crime Prevention Studies, 15, 79–113.
Enrick, M. (2019). Pembobolan ATM menggunakan teknik skimming kaitanya dengan pengajuan restitusi. 2(2), 555–580.
Gibbs, T. (2020). Seeking economic cyber security: a Middle Eastern example. Journal of Money Laundering Control, 23(2), 493–507. https://doi.org/10.1108/JMLC-09-2019-0076
Greenspan, S. (2008). Annal of gullibility: Why we get duped and how to avoid it. Santa Barbara, CA: ABC-CLIO.
Hasan, A., & Febriany, L. (2021). Identifikasi tindakan pengawasan dan pencegahan terhadap kejahatan finansial perbankan syariah selama masa pandemi COVID 19. Jurnal Ilmiah Akuntansi dan Keuangan, 4(4), 1089–1090. https://doi.org/26222191
Hasugian, P. S. (2018). Perancangan website sebagai media promosi dan informasi. Journal of Informatic Pelita Nusantara, 3.
Iryanti, Y. S., & Rahman, M. A. (2019). Promosi perpustakaan melalui media sosial twitter di perpustakaan hukum Daniel S. Lev. Edulib, 9(2), 128–143. https://doi.org/10.17509/edulib.v9i2.17763
Junaedi, D. I. (2017). Antisipasi dampak social engineering pada bisnis perbankan. Jurnal Ilmu-Ilmu Informatika dan Manajemen STMIK, 11(No.1). https://doi.org/1978-3310
Kävrestad, J. (2018). Fundamentals of digital forensics. In Fundamentals of Digital Forensics (Second). Springer Nature Switzerland AG. https://doi.org/10.1007/978-3-319-96319-8
KOMPAS. (2022). Pasutri di Padang jadi korban phising Rp 1,1 miliar, OJK Sumbar minta warga hati-hati. https://regional.kompas.com/read/2022/06/10/181226578/pasutri-di-padang-jadi-korban-phising-rp-11-miliar-ojk-sumbar-minta-warga?page=all&lgn_method=google
Pan, W., Liu, D., & Fang, J. (2021). An examination of factors contributing to the acceptance of online health misinformation. Frontiers in Psychology, 12(March), 1–11. https://doi.org/10.3389/fpsyg.2021.630268
Ratnamulyani, Ike Atikah Maksudi, B. I. (2018). Peran media sosial dalam peningkatan partisipasi pemilih pemula dikalangan pelajar di Kabupaten Bogor. Jurnal Ilmu - Ilmu Sosial Dan Humaniora, 20(2), 154–161. https://doi.org/1411 - 0903
Rebovich, D.J., Layne, J., Jiandani, J., & Hage, S., (2000). The national public survey on white-collar crime. Morgantown, WV: National White Collar Crime Center.
Safitri, E. M., Ameilindra, Z., & Yulianti, R. (2020). Analisis teknik social engineering sebagai ancaman dalam keamanan sistem informasi: Studi literatur. Jurnal Ilmiah Teknologi Informasi Dan Robotika, 2, 21–26. http://jifti.upnjatim.ac.id/index.php/jifti/article/view/26
Saunders, Lewis, & Thornhill. (2012). Research methods for business students. International Journal of the History of Sport, 30(1).
Setiawan, D., Baraja, A., & Sukoco. (2021). Pembuatan company profile berbasis website pada PT Aether Digital Indonesia. Surakarta Informatic Journal, 3. https://doi.org/2621-5330
Shah, A., & Ravi, S. (2012). A to Z of cyber crime. Lexcode Education & Assessment Platform (LEAP).
Titus, R. M., Gover, A. R. (2001). Personal fraud: The victims and the scams. Crime Prevention Studies, 12, 133–151.
Tracy, S. J. . (2013). Qualitative research methods: Collecting evidence, crafting analysis, communicating impact (1st ed.). John Wiley & Sons, Ltd.,. https://doi.org/10.5613/rzs.43.1.6
Wall, D. S. (2017). Towards a conceptualisation of cloud (cyber) crime. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 10292 LNCS(July), 529–538. https://doi.org/10.1007/978-3-319-58460-7_37
We are social. (2022). Indonesian digital report 2022. In We Are Social (p. 113). https://datareportal.com/reports/digital-2021-indonesia