Development of conceptual framework for cyber fraud investigation
DOI:
https://doi.org/10.26594/register.v7i2.2263Keywords:
cybercrime, detection, framework, fraud, JabareenAbstract
The increase in the number of internet users in Indonesia as much as 175.4 million as recorded in the Datareportal.com report and 4.83 billion globally, impact the increase in the number of cyber fraud cases. Data states that 96% of fraud cases are not resolved due to fraud methods carried out online and make it difficult for legal officers to obtain evidence. Previous fraud investigation research mainly focused on fraud detection, so this research focuses on submitting a framework for investigating cyber fraud cases. The cyber fraud case requires a new framework for investigation because in this fraud case, there is digital evidence that is very prone to be damaged, lost, or modified, which makes this case unsolved. This research aims to develop a framework that is expected to help auditors to uncover cases of cyber fraud so that resolved cyber fraud cases can increase. The method used in making this framework uses Jabareen's conceptual framework development method, which consists of 6 stages, namely, Mapping the selected data source, extensive reading and categorizing of the chosen data, Identifying and naming objects, Deconstructing and categorizing the concept, Integrating concept, Synthesis, resynthesis. And make it all sense. The framework for cyber fraud investigation uses 22 digital forensic frameworks and eight frameworks for fraud audit investigations. The results of developing a framework using the Jabareen method resulted in 8 stages, integrating various concepts selected from digital forensics and fraud audits. Evaluation of framework development was carried out by giving limited questionnaires to practitioners and academics, which produced 89% for the feasibility value and needs of the framework and 67% there is no need for changes to the framework being developed.References
[1] N. Faulkner, I. Pollari, M. Dougall and B. Watson, "Global Banking Fraud Survey 2019," KPMG, 25 June 2019. [Online]. Available: https://home.kpmg/au/en/home/insights/2019/05/the-multi-faceted-threat-of-fraud-are-banks-up-to-the-challenge-fs.html. [Accessed 15 April 2021].
[2] Microsoft, "Online Fraud: Your Guide to Prevention, Detection, and Recovery," 2012.
[3] F. B. o. Investigation, "2019 Internet Crime Report," Internet Crime Complaint Center, 2019.
[4] accenture, "Unmask digital fraud. Today," accenture, 2018.
[5] J. Carter, "Consumer Sentinel Network," Policing: An International Journal, vol. 31, no. 4, 2008.
[6] M. Elkin, "Crime in England and Wales: year ending March 2019," Office for National Statistics, 2019.
[7] H. Murdock, "Association of Certified Fraud Examiners (ACFE)," in Auditor Essentials, Auerbach Publications, 2018.
[8] N. Fletcher, "Challenges for regulating financial fraud in cyberspace," Journal of Financial Crime, vol. 14, no. 2, pp. 190-207, 2007.
[9] N. I. Nawang, "Combating anonymous offenders in the cyberspace: An overview of the legal approach in Malaysia," in 2017 2nd International Conference on Anti-Cyber Crimes (ICACC), Abha, Saudi Arabia, 2017.
[10] B. Hayes, J. Jeandesboz, F. Ragazzi, S. Simon and V. Mitsilegas, "The law enforcement challenges of cybercrime: are we really playing catch-up?," Study for the LIBE Committee, 2015.
[11] N. F. S. T. Center, "A Simplified Guide To Digital Evidence," 2014.
[12] S. E. Goodison, R. C. Davis and B. A. Jackson, "Digital evidence and the US criminal justice system," RAND Corporation, Santa Monica, Calif, 2015.
[13] E. F. G. Ajayi, "Challenges to enforcement of cyber-crimes laws and policy," Journal of Internet and Information Systems, vol. 6, no. 1, pp. 1-12, 2016.
[14] N. F. Ryman-Tubb, P. Krause and W. Garn, "How Artificial Intelligence and machine learning research impacts payment card fraud detection: A survey and industry benchmark," Engineering Applications of Artificial Intelligence, vol. 76, pp. 130-157, 2018.
[15] B. Cusack and T. ‘Ahokovi, "Improving Forensic Software Tool Performance in Detecting Fraud for Financial Statements," in The Proceedings of 14th Australian Digital Forensics Conference, Perth, Australia, 2016.
[16] A. M. L. Kian, "Tindakan Pidana Credit/Debit Card Fraud dan Penerapan Sanksi Pidananya dalam Hukum Pidana Indonesia," Hasanuddin Law Review, vol. 1, no. 1, 2015.
[17] A. Goudbeek, K.-K. R. Choo and N.-A. Le-Khac, "A Forensic Investigation Framework for Smart Home Environment," in 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), New York, NY, USA, 2018.
[18] I. Kigwana, V. R. Kebande and H. S. Venter, "A proposed digital forensic investigation framework for an eGovernment structure for Uganda," in 2017 IST-Africa Week Conference (IST-Africa), Windhoek, Namibia, 2017.
[19] S. Sathwara, N. Dutta and E. Pricop, "IoT Forensic A digital investigation framework for IoT systems," in 2018 10th International Conference on Electronics, Computers and Artificial Intelligence (ECAI), Iasi, Romania, 2018.
[20] M. Harbawi and A. Varol, "An improved digital evidence acquisition model for the Internet of Things forensic I: A theoretical framework," in 2017 5th International Symposium on Digital Forensic and Security (ISDFS), Tirgu Mures, Romania, 2017.
[21] N. L. Htun and M. M. S. Thwin, "Proposed Workable Process Flow with Analysis Framework for Android Forensics in Cyber-Crime Investigation," The International Journal Of Engineering And Science (IJES), vol. 6, no. 1, pp. 82-92, 2017.
[22] S. Ahmad, N. L. Saad, Z. Zulkifli and S. H. Nasaruddin, "Proposed network forensic framework for analyzing IaaS cloud computing environment," in 2015 International Symposium on Mathematical Sciences and Computing Research (iSMSC), Ipoh, Malaysia, 2015.
[23] D. Adom, E. K. Hussein and J. A. Agyem, "Theoreticaland Conceptual Framework: Mandatory Ingredients of a Quality Research," International Journal of Scientific Research, vol. 7, no. 1, 2018.
[24] Y. Jabareen, "Building a Conceptual Framework: Philosophy, Definitions, and Procedure," International Journal of Qualitative Methods, vol. 8, no. 4, pp. 49-62, 2009.
[25] E. Eizenberg and Y. Jabareen, "Social Sustainability: A New Conceptual Framework," Sustainability, vol. 9, no. 68, 2017.
[26] A. Haddadi, A. Johansen and B. Andersen, "A Conceptual Framework to Enhance Value Creation in Construction Projects," Procedia Computer Science, vol. 100, pp. 565-573, 2016.
[27] M. Abduh, R. D. Wirahadikusumah and Y. Messah, "Framework Development Methodology for Sustainable Procurement of Construction Works in Indonesia," in MATEC Web of Conferences, 2018.
[28] C. Okoli and S. D. Pawlowski, "The Delphi method as a research tool: an example, design considerations and applications," Information & Management, vol. 42, no. 1, pp. 15-29, 2004.
[29] C. J. Bacon and B. Fitzgerald, "A Systemic Framework for the Field of Information Systems," The DATA BASE for Advances in Information Systems, vol. 32, no. 2, 2001.
Downloads
Published
How to Cite
Issue
Section
License
Please find the rights and licenses in Register: Jurnal Ilmiah Teknologi Sistem Informasi. By submitting the article/manuscript of the article, the author(s) agree with this policy. No specific document sign-off is required.
1. License
The non-commercial use of the article will be governed by the Creative Commons Attribution license as currently displayed on Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
2. Author(s)' Warranties
The author warrants that the article is original, written by stated author(s), has not been published before, contains no unlawful statements, does not infringe the rights of others, is subject to copyright that is vested exclusively in the author and free of any third party rights, and that any necessary written permissions to quote from other sources have been obtained by the author(s).
3. User/Public Rights
Register's spirit is to disseminate articles published are as free as possible. Under the Creative Commons license, Register permits users to copy, distribute, display, and perform the work for non-commercial purposes only. Users will also need to attribute authors and Register on distributing works in the journal and other media of publications. Unless otherwise stated, the authors are public entities as soon as their articles got published.
4. Rights of Authors
Authors retain all their rights to the published works, such as (but not limited to) the following rights;
Copyright and other proprietary rights relating to the article, such as patent rights,
The right to use the substance of the article in own future works, including lectures and books,
The right to reproduce the article for own purposes,
The right to self-archive the article (please read out deposit policy),
The right to enter into separate, additional contractual arrangements for the non-exclusive distribution of the article's published version (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal (Register: Jurnal Ilmiah Teknologi Sistem Informasi).
5. Co-Authorship
If the article was jointly prepared by more than one author, any authors submitting the manuscript warrants that he/she has been authorized by all co-authors to be agreed on this copyright and license notice (agreement) on their behalf, and agrees to inform his/her co-authors of the terms of this policy. Register will not be held liable for anything that may arise due to the author(s) internal dispute. Register will only communicate with the corresponding author.
6. Royalties
Being an open accessed journal and disseminating articles for free under the Creative Commons license term mentioned, author(s) aware that Register entitles the author(s) to no royalties or other fees.
7. Miscellaneous
Register will publish the article (or have it published) in the journal if the article’s editorial process is successfully completed. Register's editors may modify the article to a style of punctuation, spelling, capitalization, referencing and usage that deems appropriate. The author acknowledges that the article may be published so that it will be publicly accessible and such access will be free of charge for the readers as mentioned in point 3.