Understanding The Phenomenon and Risks of Identity Theft and Fraud on Social Media


  • Ahmad Rafi Ilzan Faculty of Industrial Engineering, Telkom University, Bandung, Indonesia Author
  • Reihaini Fikria Bunga Oktaviani Faculty of Industrial Engineering, Telkom University, Bandung, Indonesia Author
  • Farhan Muzammil Yusuf Faculty of Industrial Engineering, Telkom University, Bandung, Indonesia Author
  • Dirk Jan Wegman School of Building, Business and Technology, Saxion University of Applied Sciences, Netherlands Author
  • Nazwa Yaqzhania Imtiyaz Faculty of Industrial Engineering, Telkom University, Bandung, Indonesia Author
  • DedenWitarsyah Faculty of Industrial Engineering, Telkom University, Bandung, Indonesia Author




Privacy, Identity theft, Fraud, Social media, Internet.


The use of social media platforms has created new opportunities for people to connect and share information with one another. However, this has also increased the risk of identity theft and fraud. The purpose of this paper is to provide an overview of the phenomenon of identity theft and fraud on social media by exploring the various methods used by perpetrators to gain access to personal information, the ways in which they utilize this information to commit fraud, and the impact that these crimes can have on the victim’s privacy. This paper will also examine the various strategies that individuals and organizations can use to protect their privacy on the internet from identity theft and fraud on social media. Ultimately, this paper aims to increase understanding of the risks of social media use and to provide practical recommendations for minimizing these risks.


ACFE Indonesia Chapter #111. (2016). Survai Fraud Indonesia. https://acfe-indonesia.or.id/wp-content/uploads/2017/07/SURVAI-FRAUD-INDONESIA-2016.pdf

Ahlqvist, T. (2008). Social media roadmaps : exploring the futures triggered by social media. 78.

Altman, I. (1975). The Environment and Social Behavior. Environment And Behavior, 20(4), 34–61. https://books.google.com/books/about/The_Environment_and_Social_Behavior.html?hl=id&id=GLBPAAAAMAAJ

Bélanger, F., & Crossler, R. E. (2011). Privacy in the digital age: A review of information privacy research in information systems. MIS Quarterly: Management Information Systems, 35(4), 1017–1041. https://doi.org/10.2307/41409971

Brindha, S., Swetha, K., Professor, A., & Kavitha, : R. (2018). Identity Theft (Emerging Trends in Security Issues in Information Security). International Journal of Engineering Research & Technology. https://doi.org/10.17577/IJERTCONV6IS14060

Copes, H., & Vieraitis, L. M. (2009). Understanding identity theft: Offenders’ accounts of their lives and crimes. Criminal Justice Review, 34(3), 329–349. https://doi.org/10.1177/0734016808330589

Crossler, R. E. (2010). Protection motivation theory: Understanding determinants to backing up personal data. Proceedings of the Annual Hawaii International Conference on System Sciences. https://doi.org/10.1109/HICSS.2010.311

DeLiema, M., Burnes, D., & Langton, L. (2021). The Financial and Psychological Impact of Identity Theft Among Older Adults. Innovation in Aging, 5(4), 1–11. https://doi.org/10.1093/GERONI/IGAB043

Harrell, E. (2019). Victims of Identity Theft, 2016. Bureau of Justice Statistics. https://bjs.ojp.gov/library/publications/victims-identity-theft-2016

Hong, W., & Thong, J. Y. L. (2013). Internet privacy concerns: An integrated conceptualization and four empirical studies. MIS Quarterly: Management Information Systems, 37(1), 275–298. https://doi.org/10.25300/MISQ/2013/37.1.12

Kaplan, A. M., & Haenlein, M. (2010). Users of the world, unite! The challenges and opportunities of Social Media. Business Horizons, 53(1), 59–68. https://doi.org/10.1016/J.BUSHOR.2009.09.003

Kemp, S. (2023, April 27). Digital 2023 April Global Statshot Report — DataReportal – Global Digital Insights. https://datareportal.com/reports/digital-2023-april-global-statshot

Literature review | The University of Edinburgh. (n.d.). Retrieved June 5, 2023, from https://www.ed.ac.uk/institute-academic-development/study-hub/learning-resources/literature-review#

Number of identity theft complaints, by age of victims U.S. 2022 | Statista. (n.d.). Retrieved June 9, 2023, from https://www.statista.com/statistics/587677/identity-theft-complaints-victims-age-in-the-us/

Nurdiani, I. P. (2020). Pencurian Identitas Digital Sebagai Bentuk Cyber Related Crime. Jurnal Kriminologi Indonesia, 16(2), 1–10. http://www.jurnalkesos.ui.ac.id/index.php/jki/article/viewFile/12571/67546786

Rahim Soomro, T., & Irshad, S. (2018). Identity Theft and Social Media. IJCSNS International Journal of Computer Science and Network Security, 18(1), 43. https://www.researchgate.net/publication/323185128

Raschke, R. L., Krishen, A. S., & Kachroo, P. (2014). Understanding the Components of Information Privacy Threats for Location-Based Services. JOURNAL OF INFORMATION SYSTEMS American Accounting Association, 28(1). https://doi.org/10.2308/isys-50696

Sharp, T., Shreve-Neiger, A., Fremouw, W., Kane, J., & Hutton, S. (2004). Exploring the Psychological and Somatic Impact of Identity Theft. Journal of Forensic Sciences, 49(1). https://doi.org/10.1520/JFS2003178

Van De Garde-Perik, E., Markopoulos, P., De Ruyter, B., Eggen, B., & Ijsselsteijn, W. (2008). Investigating privacy attitudes and behavior in relation to personalization. Social Science Computer Review, 26(1), 20–43. https://doi.org/10.1177/0894439307307682

Vitria, N. (2021). PENGARUH INTERNET BAGI SISWA-SISWI SMA NEGERI 3 PADANG. Science, Engineering, Education, and Development Studies (SEEDS): Conference Series, 4(2). https://doi.org/10.20961/SEEDS.V4I2.56700

Xu, H., Dinev, T., Jeff Smith, H., Hart, P., & Jeff, H. (2008). Association for Information Systems AIS Electronic Library (AISeL) Examining the Formation of Individual’ s Privacy Concerns: Toward an Integrative View Recommended Citation. http://aisel.aisnet.org/icis2008/6




How to Cite

Understanding The Phenomenon and Risks of Identity Theft and Fraud on Social Media. (2023). Asia Pacific Journal of Information System and Digital Transformation, 1(01), 23-32. https://doi.org/10.61973/apjisdt.v101.3