CYBERCRIME COUNSELING BY MAXIMIZING 2-FACTOR AUTHENTICATION (2-FA) FEATURES IN SEBATANG, KULON PROGO
PDF

Keywords

Counseling
Cyberspace
Cybercrime
Social Media
Communication Media

Abstract

The need for computer network technology in Indonesia today is growing. Technology plays a role as a media provider of information, as it unleashes the activities of the commercial community into the largest and fastest part of its growth as well as across national borders. This network is capable of moving market activity around the world and is known for 24 hours. Through the world of the Internet called cyberspace, anything can be done. The advancement of Internet technology has led to the emergence of “Cybercrime” or crimes through the Internet, including theft of credit cards, hacking several sites, intercepting the transmission of other people’s data, such as emails, and manipulating data by preparing unwanted commands into computer programs. This phenomenon of cyber crime development needs to be anticipated by the younger generation so that they do not become perpetrators or victims. Therefore, make a judgment against the members of the Karang Taruna Arben in Sebatang, Kulon Progo. The methods used are observation, interactive exposure, simulation, as well as discussion. The expected outcome of this investigation is increased awareness of the cybercrime that is currently occurring.

PDF

References

About email verification codes and resetting two-factor authentication | WhatsApp Help Center. (n.d.). Retrieved September 2, 2023, from https://faq.whatsapp.com/1082491466048496/?helpref=search&query=factor%20atuhentication&search_session_id=bb0c8b5e843093c86463636c2b8b30b1&sr=0

Andi, P. (2012). Metode penelitian kualitatif dalam perspektif rancangan penelitian. Ar-Ruzz Media.

Gani, A. (2020). Cybercrime (Kejahatan Berbasis Komputer). JSI (Jurnal Sistem Informasi) Universitas Suryadarma, 5(1), 16–29.

Habibi, M. R., & Liviani, I. (2020). Kejahatan Teknologi Informasi (Cyber Crime) dan Penanggulangannya dalam Sistem Hukum Indonesia. Al-Qanun: Jurnal Pemikiran Dan Pembaharuan Hukum Islam, 23(2), 400–426.

Handayani, D., Rosianah, S. F., Sobari, D. I., Putra, D. A., Zulhija, H. M., Maulida, I., Agdana, M. A. P., Mubarakh, M. K., Wulansari, W., & Khanafi, W. F. (2023). Ragam Modus Cyber Crime Di Era Digital 4.0. Abdi Jurnal Publikasi, 1(4), 422–427.

Haryanto, H. (2016). Pemanfaatan Social Media Network Sebagai Media Komunikasi Komunitas Pustakawan Homogen Dalam Rangka Optimalisasi Resources Sharing Koleksi Antar Perguruan Tinggi. Pustakaloka, 8(1), 130–141.

How two-factor authentication works on Facebook. | Facebook Help Centre. (n.d.). Retrieved September 2, 2023, from https://www.facebook.com/help/148233965247823

Muthia, F. R., & Arifin, R. (2019). Kajian Hukum Pidana Pada Kasus Kejahatan Mayantara (Cybercrime) Dalam Perkara Pencemaran Nama Baik Di Indonesia. RESAM Jurnal Hukum, 5(1), 21–39.

Securing your Instagram account with two-factor authentication | Instagram Help Center. (n.d.). Retrieved September 2, 2023, from https://help.instagram.com/566810106808145

Simatupang, H. Y., & Ridwan, R. (2022). Penyuluhan Dampak Cyber Crime Terhadap Keamanan Nasional Di Kalangan Pelajar MAS YASPI Labuhan Deli Medan. PUBLIDIMAS (Publikasi Pengabdian Masyarakat), 2(1), 160–168.

Takanjanji, J. (2020). Merefleksi Penegakan Hukum Tindak Pidana Penipuan Online. Widya Pranata Hukum: Jurnal Kajian Dan Penelitian Hukum, 2(2), 75–90.

Wahyudi, D., Samosir, H. S., & Devi, R. S. (2022). Akibat Hukum Bagi Pelaku Tindak Pidana Penipuan Online Melalui Modus Arisan Online Di Media Sosial Elektronik. JURNAL RECTUM: Tinjauan Yuridis Penanganan Tindak Pidana, 4(2), 326–336.