CYBER FRAUD PROFILING WITH ROUTINE ACTIVITY THEORY USING DATA MINING TECHNIQUES

Authors

  • Sunardi Department of Electrical Engineering, Universitas Ahmad Dahlan, Yogyakarta, Indonesia
  • Abdul Fadlil Department of Electrical Engineering, Universitas Ahmad Dahlan, Yogyakarta, Indonesia
  • Nur Makkie Perdana Kusuma Master Program of Informatics, Universitas Ahmad Dahlan, Yogyakarta, Indonesia

DOI:

https://doi.org/10.24191/mjoc.v8i2.23391

Keywords:

Cyber Fraud, Cyber Profiling, Data Mining, Routine Activity Theory

Abstract

Cyber profiling, as one of the supporting parts of digital forensics, is not only used to record and investigate cybercriminal behaviour. It can also be used to profile victim demographics based on victim characteristics. This study aims to create a cyber-fraud pattern based on a profile created from RAT. This research is expected to be input for internet users in Indonesia, especially IM users such as Instagram, Facebook, WhatsApp, and Telegram. The data collection method in this study uses data mining technology on structured and unstructured data. Structured data was obtained by conducting data mining on the number of cases registered in district courts in Indonesia from January 2021 to January 2022, and the unstructured data was obtained from socio-demographic victims of online crimes. The analysis using the Naive Bayes Algorithm produces a predictive model, which shows the results of online fraud victim profiles based on the weights for each attribute. Cyber-fraud profiling based on RAT with Naïve Bayes Algorithm yields the following findings: Potential Offender Elements: Male, using Facebook, WhatsApp, and Instagram, and crime scene region in Special Capital Region of Jakarta; Elements Suitable Target: Female, using Instagram, WhatsApp, and Facebook, living in the Special Region of Yogyakarta, spending time on the internet more than 8 hours a day, and have more than three IM applications; and Guardianship: Lack of knowledge about Cyber Fraud.

References

Agustina, J. R. (2015). Understanding cyber victimization: Digital architectures and the disinhibition effect. International Journal of Cyber Criminology, 9(1), 35–54. https://doi.org/10.5281/zenodo.22239

Ahmad, R., & Thurasamy, R. (2022). A Systematic Literature Review of Routine Activity Theory’s Applicability in Cybercrimes. Journal of Cyber Security and Mobility, 11(3), 405–432. https://doi.org/10.13052/jcsm2245-1439.1133

Aimran, N., Rambli, A., Afthanorhan, A., Mahmud, A., Sapri, A., & Aireen, A. (2022). Prediction of Malaysian Women Divorce Using. 7(2), 1067–1081. https://doi.org/10.24191/mjoc.v7i2.17077

Alzubaidi, A. (2021a). Cybercrime Awareness among Saudi Nationals: Dataset. Data in Brief, 36, 106965. https://doi.org/10.1016/j.dib.2021.106965

Alzubaidi, A. (2021b). Measuring the level of cyber security awareness for cybercrime in Saudi Arabia. Heliyon, 7(1), e06016. https://doi.org/10.1016/j.heliyon.2021.e06016

Bjelajac, Ž., Matijašević, J., & Dimitrijević1, D. (2012). Computer Fraud as a Part of Contemporary Security Challenges. The Review of International Affairs, LXIII(1147), 5–21.

Bock, K., Shannon, S., Movahedi, Y., & Cukier, M. (2017). Application of Routine Activity Theory to Cyber Intrusion Location and Time. Proceedings - 2017 13th European Dependable Computing Conference, EDCC 2017, 139-146. https://doi.org/10.1109/EDCC.2017.24

Choi, K. (2008). Computer Crime Victimization and Integrated Theory: An Empirical Assessment. International Journal of Cyber Criminology, 2(1), 308–333.

Erdoğdu, M., & Koçyiğit, M. (2021). The Correlation between Social Media Use and Cyber Victimization: A Research on Generation Z in Turkey. Connectist: Istanbul University Journal of Communication Sciences, 101–125. https://doi.org/10.26650/connectist2021-817567

Goni, O. (2022). Cyber Crime and Its Classification. Int. J.of Electronics Engineering and Applications, May. https://doi.org/10.30696/IJEEA.X.I.2021.01-17

Hassan, M. M., & Mirza, T. (2018). Customer Profiling and Segmentation in Retail BanksUsing Data Mining Techniques. International Journal of Advanced Research in Computer Science, 9(4), 24–29. https://doi.org/10.26483/ijarcs.v9i4.6172

Hawdon, J., Costello, M., Ratliff, T., Hall, L., & Middleton,J. (2017). Conflict Management Styles and Cybervictimization: Extending Routine Activity Theory. Sociological Spectrum, 37(4), 250–266. https://doi.org/10.1080/02732173.2017.1334608K.

Sindhu, K., & B. Meshram, B. (2012). Digital Forensics and Cyber Crime Datamining. Journal of Information Security, 03(03), 196–201. https://doi.org/10.4236/jis.2012.33024

Kigerl, A. (2012). Routine Activity Theory and the Determinants of High Cybercrime Countries. Social Science Computer Review, 30(4), 470-486. https://doi.org/10.1177/0894439311422689

Leukfeldt, E. R. (2014). Phishing for suitable targets inthe Netherlands: Routine activity theory and phishing victimization. Cyberpsychology, Behavior, and Social Networking, 17(8), 551–555. https://doi.org/10.1089/cyber.2014.0008

Li, X. (2020). Analysis of Criminal Activities Exploiting Social Media: With Special Regardsto Criminal Cases of Wechat Fraud in Chinese Jurisdiction. Journal of Legal Studies, 26(40), 19–36. https://doi.org/10.2478/jles-2020-0009

Mahmud, S., Chakraborty, D., Tasnim, L., Tahira, N. J., & Ferdous, M. F. (2020). The Economic Impact of Social Media Fraud and it’s Remedies. International Journal of Machine Learning and Networked Collaborative Engineering, 4(1), 30–39. https://doi.org/10.30991/ijmlnce.2020v04i01.004

Mamade, B. K., & Dabala, D. M. (2021). Exploring The Correlation between Cyber Security Awareness, Protection Measures and the State of Victimhood: The Case Study of Ambo University’s Academic Staffs. Journal of Cyber Security and Mobility, 10(4), 699–724. https://doi.org/10.13052/jcsm2245-1439.1044

Marshal, A. M. (2009). Digital Forensics Digital Evidence in Criminal Investigations (1st Ed). Wiley-Blackwell.

Michael, G. (2020). Knowledge Based System for Predicting Cyber Crime Patterns Using Data Mining. Journal Of Critical Reviews, 7(10), 2043-2053.

Ngo, F., & Paternoster, R. (2011). Cybercrime Victimization: An examination of Individual and Situational level factors. International Journal of Cyber Criminology, 5(1), 773–793.

Palaniappan, S., Mustapha, A., Foozy, C. F. M., & Atan, R. (2017). Customer profiling using classification approach for bank telemarketing. International Journal on Informatics Visualization, 1(4–2), 214–217. https://doi.org/10.30630/joiv.1.4-2.68

Reep-van den Bergh, C. M. M., & Junger, M. (2018). Victims of cybercrime in Europe: a review of victim surveys. Crime Science, 7(1). https://doi.org/10.1186/s40163-018-0079-3

Ritonga, A. S., & Muhandhis, I. (2021). Teknik Data Mining Untuk Mengklasifikasikan Data Ulasan Destinasi Wisata Menggunakan Reduksi Data Principal Component Analysis (Pca). Edutic - Scientific Journal of Informatics Education, 7(2). https://doi.org/10.21107/edutic.v7i2.9247

Saroha, R. (2014). Profiling a Cyber Criminal. International Journal of Information and Computing Technology, 4(3), 253–258.

Schreck, C. J. (2017). Routine Activity Theory. Preventing Crime and Violence, 67–72. https://doi.org/10.1007/978-3-319-44124-5_7

Sebastian, S. R., Babu, B. P., & Sebastian, S. R. (2023).Are we cyber aware ? A cross sectional study on the prevailing cyber practices among adults from Thiruvalla , Kerala. 10(1), 235–239. https://doi.org/10.18203/2394-6040.ijcmph20223550

Shahira Pisal, N., Abdul-Rahman, S., Hanafiah, M., & Kamarudin, S. I. (2022). Prediction of Life Expectancy for Asian Population Using Machine Learning Algorithms. Malaysian Journal of Computing, 7(2), 1150–1161. https://doi.org/10.24191/mjoc.v7i2.18218

Shrivastava, R., & Jain, R. (2021). Impact of Cyber Crime on Youth in Lockdown. Legal Research Development: An International Refereed e Journal, Vol. 6(Issue-I), 15–20. https://doi.org/https://doi.org/10.53724/lrd/v6n1.04

Sianturi, C. M., Pasaribu, V. A. R., Pasaribu, R. M., & Simanjuntak, J. (2022). the Impact of Social Media Marketing on Purchase Intention. SULTANIST: Jurnal Manajemen Dan Keuangan, 10(1), 60–68. https://doi.org/10.37403/sultanist.v10i1.425

Singh, N. P. (2007). Online Frauds in Banks with Phishing. Journal of Internet Banking and Commerce, 12(2), 1–28. http://eprints.utm.my/8136/

Stajano, F., & Wilson, P. (2011). Understanding scam victims. Communications of the ACM, 54(3), 70–75. https://doi.org/10.1145/1897852.1897872

Sumirat, J. R. (2021). Policing on Preventing Cyber Fraud in Indonesia. University of York Social Policy Social Work, September 2020, 1–69. https://doi.org/10.13140/RG.2.2.14771.55844

Sunardi, Fadlil, A., & Kusuma, N. M. P. (2022).Implementasi Data Mining dengan Algoritma Naïve Bayes untuk Profiling Korban Penipuan Online di Indonesia. Jurnal Media Informatika Budidarma, 6, 1562–1572. https://doi.org/10.30865/mib.v6i3.3999

Sunardi, Fadlil, A., & Kusuma, N. M. P. (2023). Comparing Data Mining Classification for Online Fraud Victim Profile in Indonesia. Intensif, 7(1), 1–17. https://doi.org/10.29407/intensif.v7i1.18283

Tompsett, E. I. B. C., Marshall, A. M., & Semmens, N. C. (2005). Cyberprofiling: Offender profiling and geographic profiling of crime on the internet. Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005, 2005, 22–25. https://doi.org/10.1109/SECCMW.2005.1588290

Yar, M. (2005). The Novelty of ‘Cybercrime’: An Assessment in Light of Routine Activity Theory. European Journal of Criminology, 2(4), 407–427. https://doi.org/10.1177/147737080556056

Downloads

Published

2023-10-01

How to Cite

CYBER FRAUD PROFILING WITH ROUTINE ACTIVITY THEORY USING DATA MINING TECHNIQUES. (2023). Malaysian Journal of Computing, 8(2), 1517-1533. https://doi.org/10.24191/mjoc.v8i2.23391