Komunikasi Termediasi Penipuan dengan Modus Business Email Compromise
Abstract
Business Email Compromise (BEC) has become a new mode of cyber crime in the form of phishing emails to targeted individuals or corporations for financial benefits. This article discusses the concept of BEC in the scope of mediated communication and persuasion from the perpetrator to the victim and is related to the theory of Computer-Mediated Communication and the Elaboration Likelihood Model. The research method uses a qualitative approach with a study of email documentation related to BEC and interviews with a number of primary sources involved in handling BEC cases. The results of the analysis show the development of communication in BEC which goes through the phases of impersonal, interpersonal, and hyperpersonal communication. The results of the analysis also show that there was an attempt at persuasion from the BEC perpetrators by directing the victim on a peripheral route with one or a few cues so that there would be a change in attitude in the form of being willing to transfer a certain amount of funds to the account provided by the perpetrator. If the peripheral route is not enough to convince the victim, the BEC perpetrator will use the central route by building persuasion from aspects of motivation, ability, and strong arguments.
References
Brenner, S. W. (2010). Cybercrime: Criminal Threats from Cyberspace. California: Praeger.
Business Email Compromise. (2017). Tersedia dari https://www.fbi.gov/scams-and-safety/common-scams-and-crimes/business-email-compromise
Business Email Compromise Fraud. (2019). Tersedia dari https://www.interpol.int/Crimes/Financial-crime/Business-Email-Compromise-Fraud
Carr, C. T. (2021). Computer-Mediated Communication: A Theoretical and Practical Introduction to Online Human Communication (1st Edition). Maryland: Rowman & Littlefield Publishers.
Creswell, J. W. (1998). Qualitative inquiry and research design: Choosing among five traditions. London: SAGE Publications.
Cross, C., & Gillett, R. (2020). Exploiting trust for financial gain: an overview of business email compromise ( BEC ) fraud. Journal of Financial Crime, 27(3), 871–884. https://doi.org/10.1108/JFC-02-2020-0026
Dainton, M., & Zelley, E. D. (2019). Applying Communication Theory for Professional Life: A Practical Introduction (4th Editio). California: Sage Publications.
Direktorat Tindak Pidana Siber Badan Reserse Kriminal Kepolisian RI. (2020). Membedah Tindak Pidana Siber sebagai Tindak Pidana Asal TPPU. Jakarta: Direktorat Tindak Pidana Siber Badan Reserse Kriminal Kepolisian RI
Ean, L. C. (2011). Computer-mediated communication and organisational communication: the use of new communication technology in the workplace. SEARCH Journal of the Southeast Asia Research Centre for Communications and Humanities, 3(1), 1–12.
FBI Tindak Lanjuti Kasus Website Palsu yang Bobol Data 30 Ribu Warga AS. (2021). Tersedia dari https://news.detik.com/berita-jawa-timur/d-5538022/fbi-tindak-lanjuti-kasus-website-palsu-yang-bobol-data-30-ribu-warga-as?single=1
Griffin, E., Ledbetter, A., & Sparks, G. G. (2018). A First Look At Communication Theory, 10th Edition. In McGraw-Hill. (Tenth Edit). New York: McGraw Hill Education.
Hancock, J., & Gonzalez, A. (2013). Deception in computer-mediated communication. In Pragmatics of Computer-Mediated Communication (pp. 363–386).
Hidayat, M. (2017). Model Komunikasi Kyai Dengan Santri di Pesantren. Jurnal ASPIKOM, 2(6), 385. https://doi.org/10.24329/aspikom.v2i6.89
Juditha, C. (2015). Pola Komunikasi Dalam Cybercrime (Kasus Love Scams). Jurnal Penelitian Dan Pengembangan Komunikasi Dan Informatika, 6(2), 122582.
Juditha, Christiany. (2018). Interaksi Simbolik Dalam Komunitas Virtual Anti Hoaks Untuk Mengurangi Penyebaran Hoaks. Jurnal PIKOM (Penelitian Komunikasi dan Pembangunan), 19(1), 17. https://doi.org/10.31346/jpikom.v19i1.1401
Kusmarni, Y. (2012). Studi Kasus. Jurnal Edu UGM Press.
Lagazio, M., Sherif, N., & Cushman, M. (2014). A multi-level approach to understanding the impact of cyber crime on the financial sector. Computers & Security, 45(0), 58–74. https://doi.org/10.1016/j.cose.2014.05.006
Lallie, H. S., Shepherd, L. A., Nurse, J. R. C., Erola, A., Epiphaniou, G., Maple, C., & Bellekens, X. (2021). Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Computers and Security, 105, 102248. https://doi.org/10.1016/j.cose.2021.102248
Leukfeldt, E. R., Lavorgna, A., & Kleemans, E. R. (2017). Organised Cybercrime or Cybercrime that is Organised? An Assessment of the Conceptualisation of Financial Cybercrime as Organised Crime. European Journal on Criminal Policy and Research, 23(3), 287–300. https://doi.org/10.1007/s10610-016-9332-z
Li, J. X. (2017). Cyber crime and legal countermeasures: A historical analysis. International Journal of Criminal Justice Sciences, 12(2), 196–207. https://doi.org/10.5281/zenodo.1034658
Li, X. (2015). Regulation of cyber space: An analysis of Chinese law on cyber crime. International Journal of Cyber Criminology, 9(2), 185–204. https://doi.org/10.5281/zenodo.56225
Littlejohn, S. W., Foss, K. A., & Oetzel, J. G. (2017). Theories of Human Communication (Eleventh E). Waveland Press.
Loukas, G., & Wilbanks, L. R. (2020). Digital Deception : Cyber Fraud and Online Misinformation. IT Professional, 22(April), 19–20. https://doi.org/10.1109/MITP.2020.2980090
Muzaini. (2014). Perkembangan Teknologi dan Perilaku Menyimpang dalam Masyarakat Modern. Jurnal Pembangunan Pendidikan: Fondasi Dan Aplikasi, 2(1), 48–58.
Nurahma, G. A., & Hendriani, W. (2021). Tinjauan sistematis studi kasus dalam penelitian kualitatif. Mediapsi, 7(2), 119–129.
Pitts, V. (2017). Cyber Crimes: History of World’s Worst Cyber Attacks. Alpha Editions.
Polri: Indonesia Tertinggi Kedua Kejahatan Siber di Dunia. (2018). Tersedia dari https://kominfo.go.id/content/detail/13487/polri-indonesia-tertinggi-kedua-kejahatan-siber-di-dunia/0/sorotan_media
PPATK ingatkan meningkatnya kejahatan siber dengan skema BEC. (2021). Tersedia dari https://www.antaranews.com/berita/2335102/ppatk-ingatkan-meningkatnya-kejahatan-siber-dengan-skema-bec
Sabillon, R., Cavaller, V., Cano, J., & Serra-Ruiz, J. (2016). Cybercriminals, cyberattacks and cybercrime. 2016 IEEE International Conference on Cybercrime and Computer Forensic, ICCCF 2016. https://doi.org/10.1109/ICCCF.2016.7740434
Saud Al-Musib, N., Mohammad Al-Serhani, F., Humayun, M., & Jhanjhi, N. Z. (2021). Business email compromise (BEC) attacks. Materials Today: Proceedings, xxxx. https://doi.org/10.1016/j.matpr.2021.03.647
Setiawan, Y., Zulkarnain, & Nurjanah. (2020). Pengaruh komunikasi berbasis komputer terhadap kualitas pelayanan perpustakaan di perpustakaan universitas riau. Jurnal Riset Komunikasi, 3(1), 1–15.
Shahbazi, A. (2019). Technological developments in cyberspace and commission of the crimes in international law and Iran. Journal of Legal, Ethical and Regulatory Issues, 22(4), 1–12.
Sugiyono. (2009). Metode Penelitian Kuantitatif, Kualitatif dan R&D. Bandung: Alfabeta.
Teerakanok, S., Yasuki, H., & Uehara, T. (2020). A Practical Solution against Business Email Compromise (BEC) Attack using Invoice Checksum. Proceedings - Companion of the 2020 IEEE 20th International Conference on Software Quality, Reliability, and Security, QRS-C 2020, 160–167. https://doi.org/10.1109/QRS-C51114.2020.00036
Walther, Joseph, B. (1996). Computer-Mediated Communication: Impersonal, Interpersonal and Hyperpersonal Interaction. Communication Research (Vol. 23, Issue 3, pp. 3–43).
Walther, J. B. (2011). Theories of CMC and interpersonal relations. The Handbook of Interpersonal Communication, 4, 443–479.
Yin, R. K. (2009). Case Study Research: Design and Methods. Sage Publications.
Zweighaft, D. (2017). Business email compromise and executive impersonation: are financial institutions exposed? Journal of Investment Compliance, 18(1), 1–7. https://doi.org/10.1108/joic-02-2017-0001

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.