ANALYSIS OF CYBER CRIME IDENTITY THEFT FIGURES TO GROW CYBER SECURITY AWARENESS AMONG CADETS OF THE NAVAL ACADEMY

Authors

  • MOHAMMAD HASWIN AL-RAFI Politeknik Angkatan Laut
  • UNGGUL FIRMANSYAH Politeknik Angkatan Laut
  • Pungki Kurniawan Politeknik Angkatan Laut

DOI:

https://doi.org/10.59447/betelgeuse.v2i2.172

Keywords:

Cyber Crime Identity Theft, Cyber Security, SWOT

Abstract

The advancement of technology and information, which coincides with digitalization
alongside the development of Artificial Intelligence (AI), has colored human social life
around the world. Currently, cadets of the Naval Academy often use gadgets/digital
tools to access information or other media. With this, there are emerging threats that
are very dangerous for individuals and the state. An currently prevalent case is Cyber
Crime Identity Theft. Cyber crime identity theft refers to the crime of stealing
someone's personal information online for the purpose of fraud or financial gain by
stealing personal data such as names, identity numbers, and financial information, to
carry out illegal transactions or obtain illegal benefits, which can lead to financial loss
and damage the victim's reputation. Indonesia still has a very high number of cases of
cyber crime identity theft, but it should be preventable by fostering. the cyber security
awareness of cadets at the Naval Academy of the Indonesian National Armed Forces.
The conclusion of this research is that by strengthening modern technological
infrastructure, both equipment and administrative services, developing modern
software and hardware with strong security systems, and tightening regulations
regarding access to users' personal data in cyber services, supported by strengthening
cyber security institutions, it can enhance the cyber security awareness of cadets at the
Naval Academy of the Indonesian National Armed Forces.

References

A Pearce II Jhon.Richard B. Robinson Jr.(2013).Manajemen Strategis : Formulasi, Implementasi, dan Pengendalian, Terj. Nia Pramita Sari. Jakarta : Salemba Empat

Anthoni. (2017). Kejahatan Dalam Dunia Maya (Cyber Crime) Dalam Simak Online. Jurnal Nurani. Volume 17 Nomor 2.

Arikunto. (2013). Prosedur Penelitian Suatu Pendekatan Praktik. Edisi Revisi. Jakarta: PT. Rineka Cipta.

Burns, Robert. B. (2000). Introduction To Research Methods. USA: Sage Publications.

Hadnagy, Christopher. (2010). Social Engineering: The Art Of Human Hacking. Indianapolis: Wiley Publications.

Hanafi. (2022). Dasar Cyber Security dan Forensic. Sleman : Deepublish.

Huda, Miftahul. (2020). Keamanan Informasi. Jakarta: Nulisbuku.

Indradi, Ade Ary Syam. (2006). Carding: Modus Operandi, Penyidikan dan bPenindakan. Jakarta: Pensil-324.

Maleong. (2011). Metodologi Penelitian Kualitatif. Edisi Revisi. Bandung: PT. Remaja Rosdakarya.

Mardalis. (1995). Metode Penelitian Suatu Pendekatan Proposal. Jakarta : Bumi

Aksara.

Margono. (2004). Metodologi Penelitian Pendidikan. Jakarta :Rineka Cipta

Merrier. (2021). Pencurian Identitas Online Sebagai Bentuk Kejahatan Mayantara (Cyber Crime). Bandung : Universitas Pendidikan Indonesia.

Miles, M.B, Huberman, A.M, & Saldana, J. (2014). Qualitative Data Analysis, A Methods Sourcebook, Edition 3. USA: Sage Publications. Terjemahan Tjetjep Rohindi Rohidi, UI-Press.

Nadhotul Sufi, F. Y., Putri, D. K., & Dwi Suhartini. (2023). Analisis Ancaman Cybercrime dan Peran Sistem Biometrik: Systematic Literature Review.

Nazir, Muhammad. 2003. Metode Penelitian. Jakarta: Ghalia Indonesia.

Rahmadi, Galih. (2020). Analisis kesadaran cyber security pada kalangan pelaku e

commerce di Indonesia.

Rangkuti (2001). Analisis SWOT Teknik Membedah Kasus Bisnis. Jakarta:

PT.Gramedia Pustaka Utama.

Rangkuti (2016). Analisis SWOT: Teknik Membedah Kasus Bisnis. Jakarta: PT.

Gramedia Pustaka Utama.

Silalahi. (2022). Keamanan Siber (Cyber Security). Semarang: Yayasan Prima Agus Teknik dengan Universitas STEKOM.

Soni, Afdhil Hafi, & Didik Sudyana. (2019). Analisis Kesadaran Mahasiswa UMRI Terkait Penggunaan Teknologi dan Media Sosial Terhadap Bahaya cyber crime, Jurnal Fasilkom Vol. 9. N0. 3.

Sugiyono. (2001). Metode Penelitian Kuantitatif Kualitatif dan R&D. Bandung:

Alfabeta.

Sugiyono. (2011). Metode Penelitian Kuantitatif, Kualitatif dan R&D. Bandung:

Afabeta.

Syahdeni, Sutan. S. (2009). Kejahatan & Tindak Pidana Komputer. Jakarta: Pustaka

Utama.

Ulber, Silalahi. (2015). Asas-asas Manajemen. Bandung: Refika Aditama.

Zalavadiya, N., & Priyanka, S. (2017). A Methodology of Malware Analysis, Tools and

Technique for Windows Platform - RAT Analisis.

Ariandi Putra, Berada di peringkat ke-24 dengan skor 94,88 pada Global Cybersecurity

Index (GCI) 2022, dalam: https://www.bssn.go.id/indeks-keamanan-siber

indonesia-peringkat-ke-24-dari-194-negara-di-dunia/, diakses tanggal 9

Juni 2024, Jam 16.15 WIB.

Edi Pramana, Ratusan Juta Kasus Pencurian Data Pribadi Terjadi Sepanjang 2022,

dalam: https://www.jawapos.com/teknologi/01433222/ratusan-juta

kasus-pencurian-data-pribadi-terjadi-sepanjang-2022, diakses tanggal 15

Oktober 2023, Jam 22.05 WIB.

https://student-activity.binus.ac.id/himti/2023/06/13/lemahnya-keamanan-siber-di

indonesia/, diakses tanggal 15 Oktober 2023, Jam 22.20 WIB.

Lenni Septiyani, 1,64 TB Data Kementerian Pertahanan Diduga Dicuri, Ini Penjelasan

Ahli, dalam : https://katadata.co.id/yuliawati/digital/6543b30422685/1

64-tb-data-kementerian-pertahanan-diduga-dicuri-ini-penjelasan-ahli,

diakses tanggal 04 November 2023, Jam 22.05 WIB.

Putra Aji Adhari, Seorang remaja asal Jakarta Selatan, terkenal sebagai bocah white

hat hacker yang pernah meretas situs NASA 2019, dalam: https://www.codepolitan.com/blog/bocah-white-hat-hacker-pernah-hack situs-nasa-ini-kisahnya/, di akses tanggal 9 Juni 2024, Jam 17.23 WIB.

Downloads

Published

2025-12-31

How to Cite

AL-RAFI, M. H., FIRMANSYAH, U., & Kurniawan, P. (2025). ANALYSIS OF CYBER CRIME IDENTITY THEFT FIGURES TO GROW CYBER SECURITY AWARENESS AMONG CADETS OF THE NAVAL ACADEMY. Betelgeuse Journal, 2(2), 66–79. https://doi.org/10.59447/betelgeuse.v2i2.172

Similar Articles

1 2 > >> 

You may also start an advanced similarity search for this article.