Implementasi Data Mining dengan Algoritma Naïve Bayes untuk Profiling Korban Penipuan Online di Indonesia

Authors

  • Sunardi Sunardi Universitas Ahmad Dahlan, Yogyakarta
  • Abdul Fadlil Universitas Ahmad Dahlan, Yogyakarta
  • Nur Makkie Perdana Kusuma Universitas Ahmad Dahlan, Yogyakarta

DOI:

https://doi.org/10.30865/mib.v6i3.3999

Keywords:

Online Fraud, Phising, Profiling, Cybercrime Victim, Data Mining

Abstract

Profiling of victims of crime is intended to facilitate the targeting of information dissemination and carry out prevention efforts. Profiling is helpful to increase the awareness of internet users against cybercrime. This study aims to create a sociodemographic profile based on online fraud victims using Instant Messengers in Indonesia based on the sociodemography of online fraud victims, namely age, gender, education level, domicile, occupation, duration of using the internet in a day, and Instant Messenger media used. The method used in this research is the descriptive statistical method, namely Data Mining using the snowball sampling method by sharing a link via WhatsApp. Participants were given a link to fill out several survey questions about the sociodemographic of the victim, such as age, gender, occupation, domicile, and online fraud that had been experienced through the IM application. The survey was created using GoogleForms and sent online via WhatsApp to participants who had been victims of online fraud. The Data Mining technique was used to analyze the responses of 1910 participants and then classified using the Naïve Bayes Algorithm. The results showed that the Naïve Bayes Algorithm has an accuracy percentage of 75.28%. The prediction model for the vulnerability of online fraud victims is a female respondent, aged 27.3 years, using Instagram and WhatsApp, currently living in Central Java Province, education background is high school, and the duration of using the internet more than eight hours a day, and status as a Student/College Student.

References

K. O. Oseni, K. Dingley, and P. Hart, “Instant Messaging and Social Networks — The Advantages in Online Research Methodology,†Int. J. Inf. Educ. Technol., vol. 8, no. 1, pp. 56–62, 2018, doi: 10.18178/ijiet.2018.8.1.1012.

R. K. Merton, Social Theory and Social Structure. New York: The Free Press, 1968.

Ž. Bjelajac, J. Matijašević, and D. Dimitrijević1, “Computer Fraud as a Part of Contemporary Security Challenges,†Rev. Int. Aff., vol. LXIII, no. 1147, pp. 5–21, 2012.

S. Schjolberg, “Computer-related offences,†Counc. Eur. Octopus Interface, no. September, pp. 225–229, 2004, [Online]. Available: http://www.cybercrimelaw.net/documents/Strasbourg.pdf

C. M. M. Reep-van den Bergh and M. Junger, “Victims of cybercrime in Europe: a review of victim surveys,†Crime Sci., vol. 7, no. 1, 2018, doi: 10.1186/s40163-018-0079-3.

Study.com, “Role of Instant Messaging in Cybercrime,†2018. https://study.com/academy/lesson/role-of-instant-messaging-in-cybercrime.html

E. Earley, “Understanding social engineering,†2010. https://www.helpnetsecurity.com/2010/03/18/understanding-social-engineering/

N. Y. Conteh and M. D. Royer, “The Unprecedented Rise in Cybercrime and the Role of the Human Vulnerability Factor,†pp. 32–43, 2021, doi: 10.4018/978-1-7998-6504-9.ch003.

T. N. Jagatic, N. A. Johnson, M. Jakobsson, and F. Menczer, “Social phishing,†Commun. ACM, vol. 50, pp. 94–100, 2007.

F. Zhou, “Phishing Sites and Prevention Measures,†Int. J. Secur. its Appl., pp. 1–10, 2015.

F. Howard and O. Komili, “Poisoned search results : How hackers have automated search engine poisoning attacks to distribute malware .,†Sophos Tech. Pap., no. March, pp. 1–15, 2010.

M. Zulfadhilah, Y. Prayudi, and I. Riadi, “Cyber Profiling Using Log Analysis And K-Means Clustering,†Int. J. Adv. Comput. Sci. Appl., vol. 7, no. 7, 2016, doi: 10.14569/ijacsa.2016.070759.

T. Theodorus M, Akuntansi Forensik dan Audit Investigatif. Jakarta: Salemba Empat, 2012.

R. Saroha, “Profiling a Cyber Criminal,†Int. J. Inf. Comput. Technol., vol. 4, no. 3, pp. 253–258, 2014.

A. S. Ritonga and I. Muhandhis, “Teknik Data Mining Untuk Mengklasifikasikan Data Ulasan Destinasi Wisata Menggunakan Reduksi Data Principal Component Analysis (Pca),†Edutic - Sci. J. Informatics Educ., vol. 7, no. 2, 2021, doi: 10.21107/edutic.v7i2.9247.

G. Michael, “Knowledge Based System for Predicting Cyber Crime Patterns Using Data Mining,†J. Crit. Rev., vol. 7, no. 10, pp. 2043–2053, 2020.

A. Alzubaidi, “Measuring the level of cyber-security awareness for cybercrime in Saudi Arabia,†Heliyon, vol. 7, no. 1, p. e06016, 2021, doi: 10.1016/j.heliyon.2021.e06016.

A. Alzubaidi, “Cybercrime Awareness among Saudi Nationals: Dataset,†Data Br., vol. 36, p. 106965, 2021, doi: 10.1016/j.dib.2021.106965.

Sugiyono, Metode Penelitian Kuantitatif, Kualitatif, dan R&D. Bandung: Alfabeta, 2017.

M. Rita and R. Kusumawati, “PENGARUH VARIABEL SOSIO DEMOGRAFI DAN KARAKTERISTIK FINANSIAL TERHADAP SIKAP, NORMA SUBYEKTIF DAN KONTROL PERILAKU MENGGUNAKAN KARTU KREDIT (Studi Pada Pegawai di UKSW Salatiga),†J. Manaj. dan Keuang., vol. 9, no. 2, pp. 109–128, 2011.

S. Palaniappan, A. Mustapha, C. F. M. Foozy, and R. Atan, “Customer profiling using classification approach for bank telemarketing,†Int. J. Informatics Vis., vol. 1, no. 4–2, pp. 214–217, 2017, doi: 10.30630/joiv.1.4-2.68.

H. F. Putro, R. T. Vulandari, and W. L. Y. Saptomo, “Penerapan Metode Naive Bayes Untuk Klasifikasi Pelanggan,†J. Teknol. Inf. dan Komun., vol. 8, no. 2, 2020, doi: 10.30646/tikomsin.v8i2.500.

Dr.J.Arunadevi, S.Ramya, and M. R. Raja, “A study of classification algorithms using Rapidminer,†Int. J. Pure Appl. Math., vol. Volume 119, no. 12, pp. 15977–15988, 2018.

M. Server, R. Excel, T. Rapidminer, and R.-M. Value, “Analysis of classification algorithms with rapidminer,†pp. 517–520.

M. Widyastuti, A. G. Fepdiani Simanjuntak, D. Hartama, A. P. Windarto, and A. Wanto, “Classification Model C.45 on Determining the Quality of Custumer Service in Bank BTN Pematangsiantar Branch,†J. Phys. Conf. Ser., vol. 1255, no. 1, 2019, doi: 10.1088/1742-6596/1255/1/012002.

Downloads

Published

2022-07-25

Issue

Section

Articles