Main Article Content

Abstract

This study aimed to identify social engineering prevention socialization patterns through website and twitter by six major banks in Indonesia. This qualitative research utilized archival research method and documentary secondary data, namely using the bank's website and twitter media. This qualitative research uses content analysis and data was processed using NVivo 12 software. The results showed that the socialization of social engineering prevention provided by six banks in Indonesia through the website and twitter media contained information about the characteristics of social engineering, bank contact service facilities, and steps to prevent social engineering. Optimization of socialization through the website and twitter could be done by creating content that contains complete and up-to-date information about the characteristics of social engineering, contact service facilities, and preventive measures that could be visualized in the form of videos or attractively designed poster images.

Keywords

prevention socialization website social engineering twitter

Article Details

How to Cite
Putri, R. N. S., & Hendi, H. Y. P. (2024). Analysis of social engineering prevention socialization patterns through websites and Twitter . Journal of Contemporary Accounting, 6(2), 97–112. https://doi.org/10.20885/jca.vol6.iss2.art3

References

  1. Abass, I. A. M. (2018). Social engineering threat and defense: A literature survey. Journal of Information Security, 09(04), 257–264. https://doi.org/10.4236/jis.2018.94018
  2. Aditama, R. (2021). Penegakan hukum cyber crime terhadap tindak pidana pencurian uang nasabah dengan cara pembajakan akun internet banking lewat media sosial. Wajah Hukum, 5(1), 118. https://doi.org/10.33087/wjh.v5i1.360
  3. Airehrour, D., Nair, N. V., & Madanian, S. (2018). Social engineering attacks and countermeasures in the New Zealand banking system: Advancing a user-reflective mitigation model. Information (Switzerland), 9(5). https://doi.org/10.3390/info9050110
  4. Badan Siber dan Sandi Negara. (2020). Rekap serangan siber (Januari – April 2020). https://bssn.go.id/rekap-serangan-siber-januari-april-2020/
  5. Balzer, C., Oktavian, R., Zandi, M., Fairen-Jimenez, D., & Moghadam, P. Z. (2020). Wiz: A web-based tool for interactive visualization of big data. Patterns, 1(8), 100107. https://doi.org/10.1016/j.patter.2020.100107
  6. BSSN. (2022). Berkomitmen kawal tingkat kematangan keamanan siber sektor keuangan, BSSN gandeng OJK selenggarakan workshop penilaian kematangan keamanan siber. https://bssn.go.id/berkomitmen-kawal-tingkat-kematangan-keamanan-siber-sektor-keuangan-bssn-gandeng-ojk-selenggarakan-workshop-penilaian-kematangan-keamanan-siber/
  7. Chetioui, K., Bah, B., Alami, A. O., & Bahnasse, A. (2022). Overview of social engineering attacks on social networks. Procedia Computer Science, 198(2021), 656–661. https://doi.org/10.1016/j.procs.2021.12.302
  8. CNN Indonesia. (2022). BSSN catat 1,6 miliar insiden keamanan siber sepanjang 2021. https://www.cnnindonesia.com/teknologi/20220330181041-192-778082/bssn-catat-16-miliar-insiden-keamanan-siber-sepanjang-2021
  9. Eck, J. (2003). Police problems: The complexity of problem theory, research and evaluation. Crime Prevention Studies, 15, 79–113.
  10. Enrick, M. (2019). Pembobolan ATM menggunakan teknik skimming kaitanya dengan pengajuan restitusi. 2(2), 555–580.
  11. Gibbs, T. (2020). Seeking economic cyber security: a Middle Eastern example. Journal of Money Laundering Control, 23(2), 493–507. https://doi.org/10.1108/JMLC-09-2019-0076
  12. Greenspan, S. (2008). Annal of gullibility: Why we get duped and how to avoid it. Santa Barbara, CA: ABC-CLIO.
  13. Hasan, A., & Febriany, L. (2021). Identifikasi tindakan pengawasan dan pencegahan terhadap kejahatan finansial perbankan syariah selama masa pandemi COVID 19. Jurnal Ilmiah Akuntansi dan Keuangan, 4(4), 1089–1090. https://doi.org/26222191
  14. Hasugian, P. S. (2018). Perancangan website sebagai media promosi dan informasi. Journal of Informatic Pelita Nusantara, 3.
  15. Iryanti, Y. S., & Rahman, M. A. (2019). Promosi perpustakaan melalui media sosial twitter di perpustakaan hukum Daniel S. Lev. Edulib, 9(2), 128–143. https://doi.org/10.17509/edulib.v9i2.17763
  16. Junaedi, D. I. (2017). Antisipasi dampak social engineering pada bisnis perbankan. Jurnal Ilmu-Ilmu Informatika dan Manajemen STMIK, 11(No.1). https://doi.org/1978-3310
  17. Kävrestad, J. (2018). Fundamentals of digital forensics. In Fundamentals of Digital Forensics (Second). Springer Nature Switzerland AG. https://doi.org/10.1007/978-3-319-96319-8
  18. KOMPAS. (2022). Pasutri di Padang jadi korban phising Rp 1,1 miliar, OJK Sumbar minta warga hati-hati. https://regional.kompas.com/read/2022/06/10/181226578/pasutri-di-padang-jadi-korban-phising-rp-11-miliar-ojk-sumbar-minta-warga?page=all&lgn_method=google
  19. Pan, W., Liu, D., & Fang, J. (2021). An examination of factors contributing to the acceptance of online health misinformation. Frontiers in Psychology, 12(March), 1–11. https://doi.org/10.3389/fpsyg.2021.630268
  20. Ratnamulyani, Ike Atikah Maksudi, B. I. (2018). Peran media sosial dalam peningkatan partisipasi pemilih pemula dikalangan pelajar di Kabupaten Bogor. Jurnal Ilmu - Ilmu Sosial Dan Humaniora, 20(2), 154–161. https://doi.org/1411 - 0903
  21. Rebovich, D.J., Layne, J., Jiandani, J., & Hage, S., (2000). The national public survey on white-collar crime. Morgantown, WV: National White Collar Crime Center.
  22. Safitri, E. M., Ameilindra, Z., & Yulianti, R. (2020). Analisis teknik social engineering sebagai ancaman dalam keamanan sistem informasi: Studi literatur. Jurnal Ilmiah Teknologi Informasi Dan Robotika, 2, 21–26. http://jifti.upnjatim.ac.id/index.php/jifti/article/view/26
  23. Saunders, Lewis, & Thornhill. (2012). Research methods for business students. International Journal of the History of Sport, 30(1).
  24. Setiawan, D., Baraja, A., & Sukoco. (2021). Pembuatan company profile berbasis website pada PT Aether Digital Indonesia. Surakarta Informatic Journal, 3. https://doi.org/2621-5330
  25. Shah, A., & Ravi, S. (2012). A to Z of cyber crime. Lexcode Education & Assessment Platform (LEAP).
  26. Titus, R. M., Gover, A. R. (2001). Personal fraud: The victims and the scams. Crime Prevention Studies, 12, 133–151.
  27. Tracy, S. J. . (2013). Qualitative research methods: Collecting evidence, crafting analysis, communicating impact (1st ed.). John Wiley & Sons, Ltd.,. https://doi.org/10.5613/rzs.43.1.6
  28. Wall, D. S. (2017). Towards a conceptualisation of cloud (cyber) crime. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 10292 LNCS(July), 529–538. https://doi.org/10.1007/978-3-319-58460-7_37
  29. We are social. (2022). Indonesian digital report 2022. In We Are Social (p. 113). https://datareportal.com/reports/digital-2021-indonesia