CYBER FRAUD PROFILING WITH ROUTINE ACTIVITY THEORY USING DATA MINING TECHNIQUES
DOI:
https://doi.org/10.24191/mjoc.v8i2.23391Keywords:
Cyber Fraud, Cyber Profiling, Data Mining, Routine Activity TheoryAbstract
Cyber profiling, as one of the supporting parts of digital forensics, is not only used to record and investigate cybercriminal behaviour. It can also be used to profile victim demographics based on victim characteristics. This study aims to create a cyber-fraud pattern based on a profile created from RAT. This research is expected to be input for internet users in Indonesia, especially IM users such as Instagram, Facebook, WhatsApp, and Telegram. The data collection method in this study uses data mining technology on structured and unstructured data. Structured data was obtained by conducting data mining on the number of cases registered in district courts in Indonesia from January 2021 to January 2022, and the unstructured data was obtained from socio-demographic victims of online crimes. The analysis using the Naive Bayes Algorithm produces a predictive model, which shows the results of online fraud victim profiles based on the weights for each attribute. Cyber-fraud profiling based on RAT with Naïve Bayes Algorithm yields the following findings: Potential Offender Elements: Male, using Facebook, WhatsApp, and Instagram, and crime scene region in Special Capital Region of Jakarta; Elements Suitable Target: Female, using Instagram, WhatsApp, and Facebook, living in the Special Region of Yogyakarta, spending time on the internet more than 8 hours a day, and have more than three IM applications; and Guardianship: Lack of knowledge about Cyber Fraud.
References
Agustina, J. R. (2015). Understanding cyber victimization: Digital architectures and the disinhibition effect. International Journal of Cyber Criminology, 9(1), 35–54. https://doi.org/10.5281/zenodo.22239
Ahmad, R., & Thurasamy, R. (2022). A Systematic Literature Review of Routine Activity Theory’s Applicability in Cybercrimes. Journal of Cyber Security and Mobility, 11(3), 405–432. https://doi.org/10.13052/jcsm2245-1439.1133
Aimran, N., Rambli, A., Afthanorhan, A., Mahmud, A., Sapri, A., & Aireen, A. (2022). Prediction of Malaysian Women Divorce Using. 7(2), 1067–1081. https://doi.org/10.24191/mjoc.v7i2.17077
Alzubaidi, A. (2021a). Cybercrime Awareness among Saudi Nationals: Dataset. Data in Brief, 36, 106965. https://doi.org/10.1016/j.dib.2021.106965
Alzubaidi, A. (2021b). Measuring the level of cyber security awareness for cybercrime in Saudi Arabia. Heliyon, 7(1), e06016. https://doi.org/10.1016/j.heliyon.2021.e06016
Bjelajac, Ž., Matijašević, J., & Dimitrijević1, D. (2012). Computer Fraud as a Part of Contemporary Security Challenges. The Review of International Affairs, LXIII(1147), 5–21.
Bock, K., Shannon, S., Movahedi, Y., & Cukier, M. (2017). Application of Routine Activity Theory to Cyber Intrusion Location and Time. Proceedings - 2017 13th European Dependable Computing Conference, EDCC 2017, 139-146. https://doi.org/10.1109/EDCC.2017.24
Choi, K. (2008). Computer Crime Victimization and Integrated Theory: An Empirical Assessment. International Journal of Cyber Criminology, 2(1), 308–333.
Erdoğdu, M., & Koçyiğit, M. (2021). The Correlation between Social Media Use and Cyber Victimization: A Research on Generation Z in Turkey. Connectist: Istanbul University Journal of Communication Sciences, 101–125. https://doi.org/10.26650/connectist2021-817567
Goni, O. (2022). Cyber Crime and Its Classification. Int. J.of Electronics Engineering and Applications, May. https://doi.org/10.30696/IJEEA.X.I.2021.01-17
Hassan, M. M., & Mirza, T. (2018). Customer Profiling and Segmentation in Retail BanksUsing Data Mining Techniques. International Journal of Advanced Research in Computer Science, 9(4), 24–29. https://doi.org/10.26483/ijarcs.v9i4.6172
Hawdon, J., Costello, M., Ratliff, T., Hall, L., & Middleton,J. (2017). Conflict Management Styles and Cybervictimization: Extending Routine Activity Theory. Sociological Spectrum, 37(4), 250–266. https://doi.org/10.1080/02732173.2017.1334608K.
Sindhu, K., & B. Meshram, B. (2012). Digital Forensics and Cyber Crime Datamining. Journal of Information Security, 03(03), 196–201. https://doi.org/10.4236/jis.2012.33024
Kigerl, A. (2012). Routine Activity Theory and the Determinants of High Cybercrime Countries. Social Science Computer Review, 30(4), 470-486. https://doi.org/10.1177/0894439311422689
Leukfeldt, E. R. (2014). Phishing for suitable targets inthe Netherlands: Routine activity theory and phishing victimization. Cyberpsychology, Behavior, and Social Networking, 17(8), 551–555. https://doi.org/10.1089/cyber.2014.0008
Li, X. (2020). Analysis of Criminal Activities Exploiting Social Media: With Special Regardsto Criminal Cases of Wechat Fraud in Chinese Jurisdiction. Journal of Legal Studies, 26(40), 19–36. https://doi.org/10.2478/jles-2020-0009
Mahmud, S., Chakraborty, D., Tasnim, L., Tahira, N. J., & Ferdous, M. F. (2020). The Economic Impact of Social Media Fraud and it’s Remedies. International Journal of Machine Learning and Networked Collaborative Engineering, 4(1), 30–39. https://doi.org/10.30991/ijmlnce.2020v04i01.004
Mamade, B. K., & Dabala, D. M. (2021). Exploring The Correlation between Cyber Security Awareness, Protection Measures and the State of Victimhood: The Case Study of Ambo University’s Academic Staffs. Journal of Cyber Security and Mobility, 10(4), 699–724. https://doi.org/10.13052/jcsm2245-1439.1044
Marshal, A. M. (2009). Digital Forensics Digital Evidence in Criminal Investigations (1st Ed). Wiley-Blackwell.
Michael, G. (2020). Knowledge Based System for Predicting Cyber Crime Patterns Using Data Mining. Journal Of Critical Reviews, 7(10), 2043-2053.
Ngo, F., & Paternoster, R. (2011). Cybercrime Victimization: An examination of Individual and Situational level factors. International Journal of Cyber Criminology, 5(1), 773–793.
Palaniappan, S., Mustapha, A., Foozy, C. F. M., & Atan, R. (2017). Customer profiling using classification approach for bank telemarketing. International Journal on Informatics Visualization, 1(4–2), 214–217. https://doi.org/10.30630/joiv.1.4-2.68
Reep-van den Bergh, C. M. M., & Junger, M. (2018). Victims of cybercrime in Europe: a review of victim surveys. Crime Science, 7(1). https://doi.org/10.1186/s40163-018-0079-3
Ritonga, A. S., & Muhandhis, I. (2021). Teknik Data Mining Untuk Mengklasifikasikan Data Ulasan Destinasi Wisata Menggunakan Reduksi Data Principal Component Analysis (Pca). Edutic - Scientific Journal of Informatics Education, 7(2). https://doi.org/10.21107/edutic.v7i2.9247
Saroha, R. (2014). Profiling a Cyber Criminal. International Journal of Information and Computing Technology, 4(3), 253–258.
Schreck, C. J. (2017). Routine Activity Theory. Preventing Crime and Violence, 67–72. https://doi.org/10.1007/978-3-319-44124-5_7
Sebastian, S. R., Babu, B. P., & Sebastian, S. R. (2023).Are we cyber aware ? A cross sectional study on the prevailing cyber practices among adults from Thiruvalla , Kerala. 10(1), 235–239. https://doi.org/10.18203/2394-6040.ijcmph20223550
Shahira Pisal, N., Abdul-Rahman, S., Hanafiah, M., & Kamarudin, S. I. (2022). Prediction of Life Expectancy for Asian Population Using Machine Learning Algorithms. Malaysian Journal of Computing, 7(2), 1150–1161. https://doi.org/10.24191/mjoc.v7i2.18218
Shrivastava, R., & Jain, R. (2021). Impact of Cyber Crime on Youth in Lockdown. Legal Research Development: An International Refereed e Journal, Vol. 6(Issue-I), 15–20. https://doi.org/https://doi.org/10.53724/lrd/v6n1.04
Sianturi, C. M., Pasaribu, V. A. R., Pasaribu, R. M., & Simanjuntak, J. (2022). the Impact of Social Media Marketing on Purchase Intention. SULTANIST: Jurnal Manajemen Dan Keuangan, 10(1), 60–68. https://doi.org/10.37403/sultanist.v10i1.425
Singh, N. P. (2007). Online Frauds in Banks with Phishing. Journal of Internet Banking and Commerce, 12(2), 1–28. http://eprints.utm.my/8136/
Stajano, F., & Wilson, P. (2011). Understanding scam victims. Communications of the ACM, 54(3), 70–75. https://doi.org/10.1145/1897852.1897872
Sumirat, J. R. (2021). Policing on Preventing Cyber Fraud in Indonesia. University of York Social Policy Social Work, September 2020, 1–69. https://doi.org/10.13140/RG.2.2.14771.55844
Sunardi, Fadlil, A., & Kusuma, N. M. P. (2022).Implementasi Data Mining dengan Algoritma Naïve Bayes untuk Profiling Korban Penipuan Online di Indonesia. Jurnal Media Informatika Budidarma, 6, 1562–1572. https://doi.org/10.30865/mib.v6i3.3999
Sunardi, Fadlil, A., & Kusuma, N. M. P. (2023). Comparing Data Mining Classification for Online Fraud Victim Profile in Indonesia. Intensif, 7(1), 1–17. https://doi.org/10.29407/intensif.v7i1.18283
Tompsett, E. I. B. C., Marshall, A. M., & Semmens, N. C. (2005). Cyberprofiling: Offender profiling and geographic profiling of crime on the internet. Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005, 2005, 22–25. https://doi.org/10.1109/SECCMW.2005.1588290
Yar, M. (2005). The Novelty of ‘Cybercrime’: An Assessment in Light of Routine Activity Theory. European Journal of Criminology, 2(4), 407–427. https://doi.org/10.1177/147737080556056
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Sunardi, Abdul Fadlil, Nur Makkie Perdana Kusuma

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.




