Understanding The Phenomenon and Risks of Identity Theft and Fraud on Social Media

Authors

  • Ahmad Rafi Ilzan Telkom University
  • Reihaini Fikria Bunga Oktaviani Telkom University
  • Farhan Muzammil Yusuf Telkom University
  • Dirk Jan Wegman Saxion University of Applied Sciences
  • Nazwa Yaqzhania Imtiyaz Telkom University
  • DedenWitarsyah Telkom University

DOI:

https://doi.org/10.61973/apjisdt.v101.3

Keywords:

Privacy, Identity theft, Fraud, Social media, Internet

Abstract

The use of social media platforms has created new opportunities for people to connect and share information with one another. However, this has also increased the risk of identity theft and fraud. The purpose of this paper is to provide an overview of the phenomenon of identity theft and fraud on social media by exploring the various methods used by perpetrators to gain access to personal information, the ways in which they utilize this information to commit fraud, and the impact that these crimes can have on the victim’s privacy. This paper will also examine the various strategies that individuals and organizations can use to protect their privacy on the internet from identity theft and fraud on social media. Ultimately, this paper aims to increase understanding of the risks of social media use and to provide practical recommendations for minimizing these risks.

References

1. ACFE Indonesia Chapter #111. (2016). Survai Fraud Indonesia. https://acfeindonesia.or.id/wp-content/uploads/2017/07/SURVAI-FRAUD-INDONESIA-2016.pdf

2. Ahlqvist, T. (2008). Social media roadmaps : exploring the futures triggered by social

media. 78.

3. Altman, I. (1975). The Environment and Social Behavior. Environment And Behavior,

20(4), 34–61.

https://books.google.com/books/about/The_Environment_and_Social_Behavior.html?hl=i

d&id=GLBPAAAAMAAJ

4. Bélanger, F., & Crossler, R. E. (2011). Privacy in the digital age: A review of information

privacy research in information systems. MIS Quarterly: Management Information Systems,

35(4), 1017–1041. https://doi.org/10.2307/41409971

5. Brindha, S., Swetha, K., Professor, A., & Kavitha, : R. (2018). Identity Theft (Emerging

Trends in Security Issues in Information Security). International Journal of Engineering

Research & Technology. https://doi.org/10.17577/IJERTCONV6IS14060

6. Copes, H., & Vieraitis, L. M. (2009). Understanding identity theft: Offenders’ accounts of

their lives and crimes. Criminal Justice Review, 34(3), 329–349.

https://doi.org/10.1177/0734016808330589

7. Crossler, R. E. (2010). Protection motivation theory: Understanding determinants to

backing up personal data. Proceedings of the Annual Hawaii International Conference on

System Sciences. https://doi.org/10.1109/HICSS.2010.311

8. DeLiema, M., Burnes, D., & Langton, L. (2021). The Financial and Psychological Impact

of Identity Theft Among Older Adults. Innovation in Aging, 5(4), 1–11.

https://doi.org/10.1093/GERONI/IGAB043

9. Harrell, E. (2019). Victims of Identity Theft, 2016. Bureau of Justice Statistics.

https://bjs.ojp.gov/library/publications/victims-identity-theft-2016

10. Hong, W., & Thong, J. Y. L. (2013). Internet privacy concerns: An integrated

conceptualization and four empirical studies. MIS Quarterly: Management Information

Systems, 37(1), 275–298. https://doi.org/10.25300/MISQ/2013/37.1.12

11. Kaplan, A. M., & Haenlein, M. (2010). Users of the world, unite! The challenges and

opportunities of Social Media. Business Horizons, 53(1), 59–68.

https://doi.org/10.1016/J.BUSHOR.2009.09.003

12. Kemp, S. (2023, April 27). Digital 2023 April Global Statshot Report — DataReportal –

Global Digital Insights. https://datareportal.com/reports/digital-2023-april-global-statshot

13. Literature review | The University of Edinburgh. (n.d.). Retrieved June 5, 2023, from

https://www.ed.ac.uk/institute-academic-development/study-hub/learningresources/literature-review#

14. Number of identity theft complaints, by age of victims U.S. 2022 | Statista. (n.d.). Retrieved

June 9, 2023, from https://www.statista.com/statistics/587677/identity-theft-complaintsvictims-age-in-the-us/

15. Nurdiani, I. P. (2020). Pencurian Identitas Digital Sebagai Bentuk Cyber Related Crime.

Jurnal Kriminologi Indonesia, 16(2), 1–10.

http://www.jurnalkesos.ui.ac.id/index.php/jki/article/viewFile/12571/67546786

16. Rahim Soomro, T., & Irshad, S. (2018). Identity Theft and Social Media. IJCSNS

International Journal of Computer Science and Network Security, 18(1), 43.

https://www.researchgate.net/publication/323185128

17. Raschke, R. L., Krishen, A. S., & Kachroo, P. (2014). Understanding the Components of

Information Privacy Threats for Location-Based Services. JOURNAL OF INFORMATION

SYSTEMS American Accounting Association, 28(1). https://doi.org/10.2308/isys-50696

18. Sharp, T., Shreve-Neiger, A., Fremouw, W., Kane, J., & Hutton, S. (2004). Exploring the

Psychological and Somatic Impact of Identity Theft. Journal of Forensic Sciences, 49(1).

https://doi.org/10.1520/JFS2003178

19. Van De Garde-Perik, E., Markopoulos, P., De Ruyter, B., Eggen, B., & Ijsselsteijn, W.

(2008). Investigating privacy attitudes and behavior in relation to personalization. Social

Science Computer Review, 26(1), 20–43. https://doi.org/10.1177/0894439307307682

20. Vitria, N. (2021). PENGARUH INTERNET BAGI SISWA-SISWI SMA NEGERI 3

PADANG. Science, Engineering, Education, and Development Studies (SEEDS):

Conference Series, 4(2). https://doi.org/10.20961/SEEDS.V4I2.56700

21. Xu, H., Dinev, T., Jeff Smith, H., Hart, P., & Jeff, H. (2008). Association for Information

Systems AIS Electronic Library (AISeL) Examining the Formation of Individual’ s Privacy

Concerns: Toward an Integrative View Recommended Citation.

http://aisel.aisnet.org/icis2008/6

Downloads

Published

2023-10-14