Cyber fraud profiling with routine activity theory using data mining techniques / Sunardi, Abdul Fadlil and Nur Makkie Perdana Kusuma

-, Sunardi and -, Abdul Fadlil and Perdana Kusuma, Nur Makkie (2023) Cyber fraud profiling with routine activity theory using data mining techniques / Sunardi, Abdul Fadlil and Nur Makkie Perdana Kusuma. Malaysian Journal of Computing (MJoC), 8 (2): 5. pp. 1517-1533. ISSN 2600-8238

Abstract

Cyber profiling, as one of the supporting parts of digital forensics, is not only used to record and investigate cybercriminal behaviour. It can also be used to profile victim demographics based on victim characteristics. This study aims to create a cyber-fraud pattern based on a profile created from RAT. This research is expected to be input for internet users in Indonesia, especially IM users such as Instagram, Facebook, WhatsApp, and Telegram. The data collection method in this study uses data mining technology on structured and unstructured data. Structured data was obtained by conducting data mining on the number of cases registered in district courts in Indonesia from January 2021 to January 2022, and the unstructured data was obtained from socio-demographic victims of online crimes. The analysis using the Naive Bayes Algorithm produces a predictive model, which shows the results of online fraud victim profiles based on the weights for each attribute. Cyber-fraud profiling based on RAT with Naïve Bayes Algorithm yields the following findings: Potential Offender Elements: Male, using Facebook, WhatsApp, and Instagram, and crime scene region in Special Capital Region of Jakarta; Elements Suitable Target: Female, using Instagram, WhatsApp, and Facebook, living in the Special Region of Yogyakarta, spending time on the internet more than 8 hours a day, and have more than three IM applications; and Guardianship: Lack of knowledge about Cyber Fraud.

Metadata

Item Type: Article
Creators:
Creators
Email / ID Num.
-, Sunardi
sunardi@mti.uad.ac.id
-, Abdul Fadlil
fadlil@uad.ac.id
Perdana Kusuma, Nur Makkie
nur2008048034@webmail.uad.ac.id
Subjects: H Social Sciences > HV Social pathology. Social and public welfare. Criminology > Fraud. Swindling. Confidence games
Q Science > QA Mathematics > Evolutionary programming (Computer science). Genetic algorithms
Divisions: Universiti Teknologi MARA, Shah Alam > Faculty of Information Management
Journal or Publication Title: Malaysian Journal of Computing (MJoC)
UiTM Journal Collections: UiTM Journal > Malaysian Journal of Computing (MJoC)
ISSN: 2600-8238
Volume: 8
Number: 2
Page Range: pp. 1517-1533
Keywords: Cyber fraud, cyber profiling, data mining, routine activity theory
Date: October 2023
URI: https://ir.uitm.edu.my/id/eprint/86383
Edit Item
Edit Item

Download

[thumbnail of 86383.pdf] Text
86383.pdf

Download (674kB)

ID Number

86383

Indexing

Statistic

Statistic details