EDUKASI MENINGKATAN KEWASPADAAN KEJAHATAN DUNIA MAYA PADA SISWA SMK IT NURUL AZKA CIANJUR

Authors

  • Somantri Universitas Nusa Putra
  • Chelika Patricia Handraputri Universitas Nusa Putra
  • Reza Pahlawan Universitas Nusa Putra
  • Dera Destri Herisma Universitas Nusa Putra
  • Gilang Permana Universitas Nusa Putra
  • M Haikal Irhamna Universitas Nusa Putra
  • Intan Rismawati Universitas Nusa Putra
  • Riza Rumayanti Dewi Universitas Nusa Putra
  • Syamsul Zaman Universitas Nusa Putra
  • Tofik Hidayat Universitas Nusa Putra
  • Zilfa Agustina Munawar Universitas Nusa Putra

Keywords:

Kejahatan Dunia Maya, Phising, Teknologi Informasi, Waspada Kejahatan Social Media

Abstract

With the advancement of information technology, it has become increasingly risky for society to remain safe and comfortable when using social media applications. Cybercriminals take advantage of the lack of knowledge about online safety by spreading applications or links that are a form of fraud to obtain victims' data. This behavior is called phishing. Phishing often occurs on a device connected to a network. Many people have fallen victim to this crime. The purpose of this seminar is to increase awareness about online crime and provide positive insights to avoid such behavior. Additionally, it aims to determine if the Cianjur area has been greatly affected by this crime after the earthquake disaster.

Downloads

Download data is not yet available.

References

. Kadek, O. K. P., I Made, A. D., I Putu, G. J., & Indriyani. (2022). Tindakan Kejahatan Pada Dunia Dalam Bentuk Phising. ITB STIKOM Bali. Vol. 5, NO. 2, November 2022, hlm. 77-82.

. Al-Khater, W.A., Al-MAADEED, S., Ahmed, A. A., Sadiq, A. S., & Khan, M. K. (2020). Comprehensive review of cybercrime detection techniques. IEEE Access, 8, 137293-137311.

. Fahlevi, M., Saparudin, M., Maemunah, S., Irma, D., & Ekhsan, M. (2019). Cybercrime Business Digital in Indonesia. E3S Web of Conferences, 125(201 9), 1-5.

. Koto, I. (2021). IJRS : International Journal Reglement & Society Cyber Crime According to the ITE Law. August, 103-110.

. Sadiq, A., Anwar, M., Butt, R. A., Masud, F., Shahzad, M. K., Naseem, S., & Younas, M. (2021). A review of phising attacks and countermeasures for internet of things-based smart business applications in industry 4.0. Human Behaviour and Emerging Technologies, 3(5), 854-854.

. Pengolahan dan Analisis Data Penelitian. (2023), Fakultas Ilmu Pendidikan. Universitas Pendidikan Indonesia 2010. Retrivied 2010, from file.upi.edu/Direktori/DUAL-MODES/PENELITIAN_PENDIDIKAN/BBM_8.pdf

. Lukas, S. M. (2019). Perbedaan Pendekatan Kuantitatif dengan Pendekatan Kualitatif dalam Metode Penelitian.

. S Zein. Et. Al. (2019) Pengolahan dan Analisis Data Kuantitatif menggunakan Aplikasi SPSS. Jurnal Teknologi Pembelajaran 4(1)., vol. 4, no. 1, pp. 839-845.

. Cara mengolah Data Angket menggunakan Excel. (2023). From Simpel, Cara Mengolah Data Angket Menggunakan Excel - Jasa Olah Data Statistika Nusagama (gamastatistika.com) Simpel, Cara Mengolah Data Angket Menggunakan Excel - Jasa Olah Data Statistika Nusagama (gamastatistika.com) Simpel, Cara Mengolah Data Angket Menggunakan Excel - Jasa Olah Data Statistika Nusagama (gamastatistika.com).

. CHARAN, A. N. S., CHEN, Y. H., & CHEN, J. L. (2022). Phishing Websites Detection using Machine Learning with URL Analysis. Proceedings - 2022 IEEE World Conference on Applied Intelligence and Computing, AIC 2022, 808–812.

Downloads

Published

2023-05-10