Mobile Application Category Cybercrime To Filter The Content Using Ontology

Kintani M A, Rizal U

Abstract


The current Internet is growing rapidly. This has created new opportunities in various fields which we can think of, be it entertainment, business, sports or education. The Internet is a useful way for people to do business effectively, very fast. It saves a lot of time, money and resources. Unfortunately, it is also an open invitation to fraudsters and online scams becoming more rampant. Like two sides of a coin, the Internet also has its own drawbacks. One of the major disadvantages is Cybercrime - illegal activities on the Internet. Computers today are being misused for illegal activities such as e-mail fraud, credit card fraud, spam, piracy of software and so forth, which violates privacy.  Cybercrime is a crime where a criminal act can only be done with the use of cyber technology and occur in the cyberworld. (M.Yoga.P,2013).The ontology is defined as a formal and clear picture of conceptualization together. (Gruber 1993). Frantz and Franco (2005) argued that ontology provide shared and common understanding of the domain to be notified between people and computers to facilitate knowledge sharing and reuse. In addition, Frantz and Franco explained that ontology provides a clear formal conceptualization (ie the meta-information) that describes the semantic information of the arrest of a static domain knowledge-based systems.Ontology is proposed to collect, examine, analyze, prepare for, obtain and store evidence of computer crime in cyberspace. To answer the above conditions and problems, then here I do resume journal entitled  "Analysis and Classification of Cybercrime with OntologyMethod"

Full Text:

PDF

References


Amir Mohamed Talib, FO 2013."Towardsa Comprehensive Ontology-Based Digital Forensics

Investigation for Cybercrime". International Journal on Communications Antenna and

Propagation (I.Re.CAP), Vol. 5, N.

Jasmin Cosic, ZC, 2011."Anontological Approach to Study and Manage Digital Chain of Custody

of DigitalEvidence".UDC 004 822: 004 056 Communications Preliminary Article, Submitted

/11; Accepted 06/11, JIOS, VOL. 35, NO. 1 (2011).

Megha Mudholkar, UB 2013."AStudy on Significance of Event Web Ontology Approach in Crime

Mining". International Journal of Latest Trends in Engineering and Technology (IJLTET) Vol.

Issue 2, ISSN: 2278-621X.

Namosha Veerasamy, MG 2012."Buildingan Ontology forCyberterrorism".Taken from

https://www.researchgate.net/publication/266055691_Building_an_Ontology_for_Cyberterror

ism

(2013), G. 2013. Understanding Cybercrime According to the experts. Taken from

http://ogapermana.blogspot.co.id/2013/04/pengertian-cyber-crime-menurut-para-ahli_11.html

Amardi, R .. 2013. Definitions Hackers and Crackers According to Experts. Taken from

https://roniamardi.wordpress.com/definisi-hacker-cracker/

Bumulo, DR 2017. Carding Type Case Study Analysis By Experts. Taken from

http://akhirnyadennieskuliah.blogspot.co.id/2014/11/analisa-study-kasus-jenis-carding.html

KBBI. 2017. The meaning of the word Internet - Indonesian Dictionary (KBBI) Online. Taken

from http://kbbi.web.id/internet

KBBI. 2017. The meaning of Classification - Big Indonesian Dictionary (KBBI) Online. Taken

from http://kbbi.web.id/klasifikasi

Kurniawan, A. 2013. Analysis 13 Definition World 'According to the experts. Taken from

http://www.gurupendidikan.com/13-pengertian-analisis-menurut-para-ahli-didunia/

Oktaviandy, N. 2012. Research Methods Experiment. Taken from

https://navelmangelep.wordpress.com/2012/02/27/metode-penelitan-eksperimen/

SURABAYA, IT 2007. Understanding and Application of Experimental Methods in Research.

Taken from https://idtesis.com/metode-eksperimental/

Syrozone, A. d. 2012. Hackers and Crackers: Hacker. Taken from

http://kelompok1hackercracker.blogspot.co.id/2012/11/pengertian-hacker_2.html

Trianto, M. 2013. Methods According Sugiyono. Taken from http://rayendar.blogspot.co.id/2015/06/metode-penelitian-menurut-sugiyono-2013.html


Refbacks

  • There are currently no refbacks.


International Conference on Engineering and Technology Development (ICETD)
Bandar Lampung University
ISSN: 2301-5690