CFP last date
20 January 2025
Reseach Article

Analysis of Smartphone Users Awareness Activities Cybercrime

by Abdul Kohar, Imam Riadi, Ahmad Lutfi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 129 - Number 2
Year of Publication: 2015
Authors: Abdul Kohar, Imam Riadi, Ahmad Lutfi
10.5120/ijca2015906449

Abdul Kohar, Imam Riadi, Ahmad Lutfi . Analysis of Smartphone Users Awareness Activities Cybercrime. International Journal of Computer Applications. 129, 2 ( November 2015), 1-6. DOI=10.5120/ijca2015906449

@article{ 10.5120/ijca2015906449,
author = { Abdul Kohar, Imam Riadi, Ahmad Lutfi },
title = { Analysis of Smartphone Users Awareness Activities Cybercrime },
journal = { International Journal of Computer Applications },
issue_date = { November 2015 },
volume = { 129 },
number = { 2 },
month = { November },
year = { 2015 },
issn = { 0975-8887 },
pages = { 1-6 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume129/number2/23042-2015906449/ },
doi = { 10.5120/ijca2015906449 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:22:17.848333+05:30
%A Abdul Kohar
%A Imam Riadi
%A Ahmad Lutfi
%T Analysis of Smartphone Users Awareness Activities Cybercrime
%J International Journal of Computer Applications
%@ 0975-8887
%V 129
%N 2
%P 1-6
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cybercrime on smartphone users increasing every year. Unfortunately, the crime rate is not matched with user awareness about security in cybercrime activity so that similar crimes often occur back on the user's smartphone. Based on the literature study and review of related research beforehand. The main component of the research can not be separated from some things, such as user characteristics, awareness of smartphone users against cybercrime activity and the type of data that the target of the attack. This study is one of the solutions to measure the awareness of smartphone users against cybercrime activity and to produce research schemes that have better value. With the research is expected to overcome the problem of cybercrime is happening on smartphone users which caused a lack of awareness of smartphone users against cybercrime activity.

References
  1. Raharjo, P., Utami, E. T. (2012). Aplikasi Penerima Radio Streaming Online Pada Smartphone Berbasis Java. Politeknik Negri Semarang. Semarang.
  2. Widodo, T.,Prayudi, Y. (2013). Model Digital Forensic Readiness Index (Difri) Untuk Mengukur Tigkat Kesiapan Institusi. Magister Teknik Informatika Universitas Islam Indonesia ( UII ). Yogyakarta.
  3. Alkazamy, Ahmad Khalil. (2011). Statistik Internet Abuse Indonesia 2011:Laporan Smester-1 Tahun 2011, edisi 1.
  4. Nortton.(2012). 2012 Norton cybercrimeReport, 12 Januari Tahun 2012, edisi 4.
  5. Asrizal. (2012). Digital Forensik. Magister Teknik Informatika Universitas Sumatera Utara.
  6. ECCouncil. (2008). CHFI v4 Module 01 Computer Forensics in Todays World.
  7. Al-Azhar, M. N. (2012). Digital Forensik Panduan Praktis Investigasi Komputer (Edisi Pert.). Salemba Infotek. Jakarta
  8. Suseno, S. (2014). Cybercrime dan Keberlakuan Hukum Pidana Nasional. :Universitas Padjadjaran. Bandung.
  9. Aldyputra, Martinus Evan. (2012). Pengaturan Penyebaran Informasi yang Memiliki Muatan Penghinaandan/Pencemaran Nama baik dalam Undang-Undang No. 11 Tahun 2008 Tentang Informasi Dan Transaks iElektronik (Tinjauan Yuridis Terhadap Pasal 27 ayat (3) Undang-Undang No. 11 Tahun 2008 tentang Informasi dan Transaksi Elektronik, LN No. 58 Tahun 2008, TLN No. 4843), Universitas Indonesia. Depok.
  10. Hari, Gunansyah.d. (2010). Penerapan Model Value Clarification Technique. Unesa. Surabaya
  11. Nasia (2014). Pengembangan Instrumen dan Bahan Ajar untu k Meningkatkan Komunikasi, Penalarandan Koneksi Matematis dalam Konsep Integral. Unisba. Bandung.
  12. Sugiyono. (2011). Metode Penelitian Kuantitatif, kualitatif dan R & D. Alfabeta. Bandung.
Index Terms

Computer Science
Information Sciences

Keywords

Digital Forensics Smartphone Security Cybercrime