Cyber fraud profiling with routine activity theory using data mining techniques / Sunardi, Abdul Fadlil and Nur Makkie Perdana Kusuma

Cyber profiling, as one of the supporting parts of digital forensics, is not only used to record and investigate cybercriminal behaviour. It can also be used to profile victim demographics based on victim characteristics. This study aims to create a cyber-fraud pattern based on a profile created fro...

Full description

Saved in:
Bibliographic Details
Main Authors: -, Sunardi, -, Abdul Fadlil, Perdana Kusuma, Nur Makkie
Format: Article
Language:English
Published: Universiti Teknologi MARA Press (Penerbit UiTM) 2023
Subjects:
Online Access:https://ir.uitm.edu.my/id/eprint/86383/1/86383.pdf
https://ir.uitm.edu.my/id/eprint/86383/
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Teknologi Mara
Language: English
id my.uitm.ir.86383
record_format eprints
spelling my.uitm.ir.863832023-10-31T17:28:57Z https://ir.uitm.edu.my/id/eprint/86383/ Cyber fraud profiling with routine activity theory using data mining techniques / Sunardi, Abdul Fadlil and Nur Makkie Perdana Kusuma mjoc -, Sunardi -, Abdul Fadlil Perdana Kusuma, Nur Makkie Fraud. Swindling. Confidence games Evolutionary programming (Computer science). Genetic algorithms Cyber profiling, as one of the supporting parts of digital forensics, is not only used to record and investigate cybercriminal behaviour. It can also be used to profile victim demographics based on victim characteristics. This study aims to create a cyber-fraud pattern based on a profile created from RAT. This research is expected to be input for internet users in Indonesia, especially IM users such as Instagram, Facebook, WhatsApp, and Telegram. The data collection method in this study uses data mining technology on structured and unstructured data. Structured data was obtained by conducting data mining on the number of cases registered in district courts in Indonesia from January 2021 to January 2022, and the unstructured data was obtained from socio-demographic victims of online crimes. The analysis using the Naive Bayes Algorithm produces a predictive model, which shows the results of online fraud victim profiles based on the weights for each attribute. Cyber-fraud profiling based on RAT with Naïve Bayes Algorithm yields the following findings: Potential Offender Elements: Male, using Facebook, WhatsApp, and Instagram, and crime scene region in Special Capital Region of Jakarta; Elements Suitable Target: Female, using Instagram, WhatsApp, and Facebook, living in the Special Region of Yogyakarta, spending time on the internet more than 8 hours a day, and have more than three IM applications; and Guardianship: Lack of knowledge about Cyber Fraud. Universiti Teknologi MARA Press (Penerbit UiTM) 2023-10 Article PeerReviewed text en https://ir.uitm.edu.my/id/eprint/86383/1/86383.pdf Cyber fraud profiling with routine activity theory using data mining techniques / Sunardi, Abdul Fadlil and Nur Makkie Perdana Kusuma. (2023) Malaysian Journal of Computing (MJoC) <https://ir.uitm.edu.my/view/publication/Malaysian_Journal_of_Computing_=28MJoC=29/>, 8 (2): 5. pp. 1517-1533. ISSN 2600-8238
institution Universiti Teknologi Mara
building Tun Abdul Razak Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Mara
content_source UiTM Institutional Repository
url_provider http://ir.uitm.edu.my/
language English
topic Fraud. Swindling. Confidence games
Evolutionary programming (Computer science). Genetic algorithms
spellingShingle Fraud. Swindling. Confidence games
Evolutionary programming (Computer science). Genetic algorithms
-, Sunardi
-, Abdul Fadlil
Perdana Kusuma, Nur Makkie
Cyber fraud profiling with routine activity theory using data mining techniques / Sunardi, Abdul Fadlil and Nur Makkie Perdana Kusuma
description Cyber profiling, as one of the supporting parts of digital forensics, is not only used to record and investigate cybercriminal behaviour. It can also be used to profile victim demographics based on victim characteristics. This study aims to create a cyber-fraud pattern based on a profile created from RAT. This research is expected to be input for internet users in Indonesia, especially IM users such as Instagram, Facebook, WhatsApp, and Telegram. The data collection method in this study uses data mining technology on structured and unstructured data. Structured data was obtained by conducting data mining on the number of cases registered in district courts in Indonesia from January 2021 to January 2022, and the unstructured data was obtained from socio-demographic victims of online crimes. The analysis using the Naive Bayes Algorithm produces a predictive model, which shows the results of online fraud victim profiles based on the weights for each attribute. Cyber-fraud profiling based on RAT with Naïve Bayes Algorithm yields the following findings: Potential Offender Elements: Male, using Facebook, WhatsApp, and Instagram, and crime scene region in Special Capital Region of Jakarta; Elements Suitable Target: Female, using Instagram, WhatsApp, and Facebook, living in the Special Region of Yogyakarta, spending time on the internet more than 8 hours a day, and have more than three IM applications; and Guardianship: Lack of knowledge about Cyber Fraud.
format Article
author -, Sunardi
-, Abdul Fadlil
Perdana Kusuma, Nur Makkie
author_facet -, Sunardi
-, Abdul Fadlil
Perdana Kusuma, Nur Makkie
author_sort -, Sunardi
title Cyber fraud profiling with routine activity theory using data mining techniques / Sunardi, Abdul Fadlil and Nur Makkie Perdana Kusuma
title_short Cyber fraud profiling with routine activity theory using data mining techniques / Sunardi, Abdul Fadlil and Nur Makkie Perdana Kusuma
title_full Cyber fraud profiling with routine activity theory using data mining techniques / Sunardi, Abdul Fadlil and Nur Makkie Perdana Kusuma
title_fullStr Cyber fraud profiling with routine activity theory using data mining techniques / Sunardi, Abdul Fadlil and Nur Makkie Perdana Kusuma
title_full_unstemmed Cyber fraud profiling with routine activity theory using data mining techniques / Sunardi, Abdul Fadlil and Nur Makkie Perdana Kusuma
title_sort cyber fraud profiling with routine activity theory using data mining techniques / sunardi, abdul fadlil and nur makkie perdana kusuma
publisher Universiti Teknologi MARA Press (Penerbit UiTM)
publishDate 2023
url https://ir.uitm.edu.my/id/eprint/86383/1/86383.pdf
https://ir.uitm.edu.my/id/eprint/86383/
_version_ 1781709359637594112