Professional Documents
Culture Documents
Soni 2019 Ijca 919631
Soni 2019 Ijca 919631
Students very often use technology and the internet. Based on Further research conducted by [7] regarding credit card
data from [1], it is stated that as many as 100% of student crime. Credit card data theft that has occurred so far has been
respondents stated that they use the internet every day so that carried out by persons who understand the transaction
the potential for students to become victims of cybercrime mechanism and network techniques in the intended bank as
continues to increase [3]. the object of burglary. This allows parties to contribute to the
theft of credit card data. The parties who stole credit card data
The high case of cybercrime in Indonesia has become a threat always using a variety of techniques, such as buying customer
to security stability with escalating high enough. The data, falsifying documents, and setting up fake online sites.
government and its legal instruments have not been able to
balance the techniques of crimes committed by computer Another study conducted [8] said that cybercrime cases were
technology, especially on the internet and computer networks mostly experienced by women related to love scams, the
[4]. communication patterns launched by cybercrimes who were
20
International Journal of Computer Applications (0975 – 8887)
Volume 177 – No. 18, November 2019
just known to victims, were more trusted, compared to direct 4. RESULT AND DISCUSSION
communication from people who were known to be close. The
author conducts research aimed at describing communication 4.1 Determining Respondents
patterns in cybercrime cases. Criminals usually take victim Respondents were selected from the Department of
data through social media owned by the victim. Informatics Engineering, Muhammadiyah University of Riau
(UMRI). At present, the total population of informatics
Then [9] also conducted a study entitled "Cybercrime over engineering students is 574 people. Determination of the
Internet Love Scams in Malaysia: A Discussion on the number of respondents using the Isaac and Michael Table
Theoretical Perspectives, Connecting Factors and Keys to the method with an error rate of 5%. So with a total population of
Problem". His research concluded that the action of love 574 people, based on Isaac and Michael's table, the closest
scammers not only violates the law but also violates morals. It number of 574 people is 600 people with a minimum sample
is vital to have a collaborative partnership framework that of 221 people. So in this study using 221 people as a
connects the embassy office with the police and the minimum number for the sample.
immigration department to combat the misuse of student
visas. Even more important is that individuals themselves are In determining sample selection, the Simple Random
equipped with the knowledge to never share their personal Sampling method is used. So the sample is chosen randomly
information with anyone by practicing several preventative without regard to academic levels, knowledge, and others.
measures before being deceived.
4.2 Compile List of Questions in the
Then, [10] also researched by analyzing that many people
have conversations with strangers, some even claim to be
Questionnaire
In compiling a list of questions related to student awareness
lovers. Love scan victims are also educated people. In his
analysis, the questionnaire was divided into five instruments,
research also said that education and employment could not
namely personal information, social media, online fraud, and
provide a guarantee that they will not be exposed to cases of
user awareness. The detailed list of questions that have been
love scam. Social media should be used for things that
compiled is contained in table 1.
educate, in cyberspace, the community must also have moral
and ethical values in using and utilizing social media to Table 1. Question Lists
facilitate their affairs. From this research also can make other
people who read to be more cautious in using social media. Personal Information
1 Choose your gender.
3. RESEARCH METHODOLOGY
This research will use five steps to gather information and a. Male
analyze the data. The research steps are carried out as follows:
b. Female
21
International Journal of Computer Applications (0975 – 8887)
Volume 177 – No. 18, November 2019
3 Choose the social media that you have and most 11 When your social media is hacked, does the hacker
often use it according to the selection below [answer use your social media to contact or defraud your
may be more than 1]? friends?
a. Facebook a. Yes
b. Google Plus b. No
c. Twitter If not, mention what the hacker did with your
account ...........
d. Instagram
Online Fraud
e. Line
f. Ask.fm 1 Do you know about cyber fraud?
g. Others: a. Yes
9 Do you provide personal information (such as your a. Use security advice recommended by the
parents' name, home address, cellphone number, or provider
personal details) to someone you know while b. Only use a combination of suggested passwords
chatting? (combined letters, numbers, symbols)
a. Yes c. Ignore the recommended safety
b. No recommendations because it is complicated
10 Have others hacked your social media? d. A simple password, because it is easier to
remember (passwords like birthdays, boyfriend's
a. Yes names, anniversary dates)
b. No e. Not concerned with the above, the important
thing is to have an account and can be used.
22
International Journal of Computer Applications (0975 – 8887)
Volume 177 – No. 18, November 2019
4.3 Questionnaire Distribution Furthermore, there were 18.4% of students who stated that
The questionnaire was distributed using the help of Google they had never notified the most recent location they visited,
forms to facilitate the data collection process. Then involving and 76.2% said they rarely shared their current location. Only
several lecturers in the Informatics Engineering Department to 5.4% stated that they often shared the current location.
share the Google form link to students and fill it in before the Overall, Muhammadiyah University of Riau students already
teaching and learning process begins. The process of had a good understanding related to awareness in using social
distributing questionnaires lasted for 3 (three) months from 10 media. However, based on questionnaire data, there were
July 2019 to 15 September 2019. 28.3% of students stating that irresponsible people had hacked
Based on the results of the questionnaire data that entered the their social media and 27.9% stated that their hacked accounts
Google Form system, it was known that 316 people filled out had been used for fraud by contacting the friendship list on
the questionnaire form. This number has exceeded the their social media. Also, there are two other categories carried
minimum sample size of 221 people based on the out by hackers on their social media accounts which can be
predetermined Isaac and Michael tables. seen in table 3.
23
International Journal of Computer Applications (0975 – 8887)
Volume 177 – No. 18, November 2019
7. REFERENCES
Figure 3 – Security Recommendations [1] Asosiasi Penyedia Jasa Internet Indonesia, “Penetrasi &
Profil Perilaku Pengguna Internet Indonesia 2018,”
However, there are still 3.7% of students still using Jakarta, 2018.
predictable passwords such as birth dates, boyfriend names,
and so on. Then there are also 2.5% of students who feel [2] P. Batubara, “Tahun 2017, Polisi Tangani 1.763 Kasus
unconcerned about the security of their accounts, and there are Kejahatan Siber,” okezone, Jakarta, Dec-2017.
1.2% of students who ignore all security recommendations.
[3] S. Wahyu, “Remaja Rentan Jadi Korban Kejahatan di
Although this number is only a minority, still they could
Dunia Maya,” Republika, Jakarta, 09-Apr-2013.
potentially become victims in the future.
[4] B. Suhariyanto, Tindak Pidana Teknologi Informasi
24
International Journal of Computer Applications (0975 – 8887)
Volume 177 – No. 18, November 2019
IJCATM : www.ijcaonline.org 25