Cooperation Between The Cimahi Police Criminal Investigation Unit and the Banking Sector in Disclosing Social Engineering Cases
DOI:
https://doi.org/10.46799/ijssr.v3i11.611Keywords:
Cooperation, Criminal Investigation Unit, Information Technology, Banking Sector, Social EngineeringAbstract
Information technology is increasingly advanced, coupled with the existence of the internet, which is now a global communication system that allows everyone around the world to meet and talk about almost anything. The internet has become a medium of communication, which is done through various media available on it. The internet provides various social media platforms, both for positive and negative reasons, and has become the order of the day because nowadays, the world is so tied to the internet. Unfortunately, not everyone uses the internet for a good cause. There are many people who use social networks to commit crimes, such as cyber-crime in the form of social engineering. Social engineering allows malicious hackers to gain unauthorized access to an organization's networks, user accounts and emails, databases, smart devices, and electronics, such as laptops, personal webcams, and sensors, including network connectivity that allows all of these objects to exchange data. These hackers use a variety of methods to carry out social engineering attacks. The technical complexity of the information systems used in locating, examining, and analyzing relevant transaction data requires sufficient time and technical expertise to gather robust evidence to support the case for social engineering, which involves in-depth analysis of bank transaction data related to the attack. This process can be time-consuming, especially if many transactions need to be traced and analyzed.
References
Al-fajri, B. H., Fauzi, R., & Mulyana, R. (2020). Perancangan Manajemen Risiko Operasional Spbe/e-gov Pada Kategori Risiko Infrastruktur, Aplikasi, Layanan, Data Dan Informasi Berdasarkan Permen Panrb Nomor 5 Tahun 2020 (studi Kasus: Pemerintah Kota Bandung). EProceedings of Engineering, 7(2).
Bartolozzi, D., Gara, M., Marchetti, D. J., & Masciandaro, D. (2022). Designing the anti-money laundering supervisor: The governance of the financial intelligence units. International Review of Economics and Finance, 80, 1093–1109. https://doi.org/10.1016/J.IREF.2022.03.009
Besong, S. E., Okanda, T. L., & Ndip, S. A. (2022). An empirical analysis of the impact of banking regulations on sustainable financial inclusion in the CEMAC region. Economic Systems, 46(1). https://doi.org/10.1016/J.ECOSYS.2021.100935
Broache, M. P., Cronin-Furman, K., Mendeloff, D., & McAllister, J. R. (2023). The International Criminal Court at 25. Journal of Human Rights, 22(1), 1–3. https://doi.org/10.1080/14754835.2022.2150518
David, D., Robet, R., & Raymond, R. (2022). Aplikasi Pengenalan Ikan Berformalin Melalui Deteksi Mata Menggunakan Metode Template Matching Dan Metode Klasifikasi KNN. Jurnal Ilmiah Core IT: Community Research Information Technology, 10(4).
Dessein, W., Garicano, L., & Gertner, R. (2010). Organizing for synergies. American Economic Journal: Microeconomics, 2(4), 77–114.
Fred, L. (2011). Organizational Behavior An Evidence-Based Approach Twelfth Edition. mc ggaw hill.
Greve, H. R., & Argote, L. (2015). Behavioral theories of organization. International Encyclopedia of the Social & Behavioral Sciences, 481–486.
Hadnagy, C. (2010). Social engineering: The art of human hacking. John Wiley & Sons.
Hess, K. M., Orthmann, C. H., & Cho, H. L. (2016). Criminal investigation. Cengage learning.
Holtström, J., & Anderson, H. (2021). Exploring and extending the synergy concept–a study of three acquisitions. Journal of Business & Industrial Marketing, 36(13), 28–41.
Johnson, D. (2023). Can competition law aid the United Kingdom in its fight against financial crime? Journal of Economic Criminology, 2, 100025. https://doi.org/10.1016/J.JECONC.2023.100025
Khan, R., McLaughlin, K., Laverty, J. H. D., David, H., & Sezer, S. (2018). Demonstrating cyber-physical attacks and defense for synchrophasor technology in smart grid. 2018 16th Annual Conference on Privacy, Security and Trust (PST), 1–10.
Kikerpill, K. (2023). The crime-as-communication approach: Challenging the idea of online routine activities by taking communication seriously. Journal of Economic Criminology, 2, 100035. https://doi.org/10.1016/J.JECONC.2023.100035
Mbaidin, H. O., Alsmairat, M. A. K., & Al-Adaileh, R. (2023). Blockchain adoption for sustainable development in developing countries: Challenges and opportunities in the banking sector. International Journal of Information Management Data Insights, 3(2). https://doi.org/10.1016/J.JJIMEI.2023.100199
Moore, R. (2014). Cybercrime: Investigating high-technology computer crime. Routledge.
Moses, J. W., & Knutsen, T. L. (2019). Ways of knowing: Competing methodologies in social and political research. Bloomsbury Publishing.
Ogbeide, H., Thomson, M. E., Gonul, M. S., Pollock, A. C., Bhowmick, S., & Bello, A. U. (2023). The anti-money laundering risk assessment: A probabilistic approach. Journal of Business Research, 162. https://doi.org/10.1016/J.JBUSRES.2023.113820
Patel, R., Migliavacca, M., & Oriani, M. E. (2022). Blockchain in banking and finance: A bibliometric review. Research in International Business and Finance, 62. https://doi.org/10.1016/J.RIBAF.2022.101718
Pavlidis, G. (2023). The dark side of anti-money laundering: Mitigating the unintended consequences of FATF standards. Journal of Economic Criminology, 2, 100040. https://doi.org/10.1016/J.JECONC.2023.100040
Raditya, B. C. (2023). Juridical Review Regarding Transfer of The Right to Occupate Service House of Police. Asian Journal of Engineering, Social and Health, 2(2), 91–106. https://doi.org/10.46799/ajesh.v2i2.38
Ryan, M. J. (2022). Criminal Justice Secrets. Am. Crim. L. Rev., 59, 1541.
Rzepka, A. (2017). Inter-organizational relations as a one of sources of competitive advantage of contemporary enterprises in the era of globalization. Procedia Engineering, 174, 161–170. https://doi.org/10.1016/j.proeng.2017.01.195
Thommandru, A., & Chakka, D. B. (2023). Recalibrating the Banking Sector with Blockchain Technology for Effective Anti-Money Laundering Compliances by Banks. Sustainable Futures, 5, 100107. https://doi.org/10.1016/J.SFTR.2023.100107
Wang, Z. (2023). Money laundering and the privacy design of central bank digital currency. Review of Economic Dynamics. https://doi.org/10.1016/J.RED.2023.06.004
Wenni, S., Lijun, H. O. U., Jiawei, T., Chunyuan, M. U., Haoyu, Z., & Tao, X. U. (2022). Experimental Investigation of Underwater Blast Injuries to Beagles. Acta Armamentarii, 43(9), 2172.
Zambrano, P., Torres, J., Tello-Oquendo, L., Yánez, Á., & Velásquez, L. (2023). On the modeling of cyber-attacks associated with social engineering: A parental control prototype. Journal of Information Security and Applications, 75. https://doi.org/10.1016/J.JISA.2023.103501
Published
Issue
Section
License
Copyright (c) 2023 Tono Listianto, Chairul Muriman Setyabudi, Sutrisno
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-ShareAlike 4.0 International. that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.