Main Article Content

Abstract

Telepon mobile pintar sudah banyak dimanfaatkan dalam melakukan transaksi perbankan misalnya melihat saldo rekening dan riwayat transaksi, transfer dana antar rekening, atau membayar tagihan secara online. Dalam beberapa tahun belakangan, peretasan transaksi dari perbankan melalui kartu kredit meningkat sangat tinggi, misalnya pada tahun 2013, sekelompok hacker berhasil membobol Bank Muscat yang berada di negara Oman dan menyebabkan kerugian senilai 45 juta USD.Dalam paper ini dikembangkan sebuah prototipe notifikasi pencegahan kejahatan fraud berbasis mobile. Sampel data digenerate dari sampel random transaksi nasabah dan beberapa data nasabah. Prototype kemudian diuji pada berbagai kondisi normal, dan ekstrim. Berdasarkan hasil pengujian, didapat beberapa variasi notifikasi fraud, seperti pada jam sibuk dan tidak sibuk. Notifikasi yang dikirimkan pada jam sibuk relatif lebih cepat dibandingkan saat jam tidak sibuk.

Keywords

Mobile Transaksi Fraud

Article Details

Author Biographies

Azhari Azhari, UGM

Ketua Program Studi Ilmu Komputer, Departemen Ilmu Komputer dan Elektronika, Fakultas Mipa, Universitas Gadjah Mada

Chandra Saha Dewa Prasetya, UGM

Mahasiswa Program Studi Ilmu Komputer, Departemen Ilmu Komputer dan Elektronika, Fakultas Mipa, Universitas Gadjah Mada

Achmad Jeihan Pahlevi, UGM

Mahasiswa Program Studi Ilmu Komputer, Departemen Ilmu Komputer dan Elektronika, Fakultas MIPA, Universitas Gadjah Mada
How to Cite
Azhari, A., Prasetya, C. S. D., & Pahlevi, A. J. (2017). Aplikasi Notifikasi Mobile untuk Pencegahan Fraud. Jurnal Komputer Terapan, 3(1), 1–10. Retrieved from https://jurnal.pcr.ac.id/index.php/jkt/article/view/217

References

  1. Taghavifard, M.T. dan M. Torabi, Factors affecting the use of mobile banking services by customers and rank them Case study: Tejarat Bank branches in Tehran. Journal of Business Management Researches, 2010.
  2. Amadeh, H. dan M. Jafarpour, Study of the Barriers and strategies for the development of electronic banking in the country's private banks. Executive Management Review 2009.
  3. Jassal, R.K. dan Sehgal, R.K., 2013. Online Banking Security Flaws: A Study. International Journal of Advanced Research in Computer Science and Software Engineering, 3(8).
  4. Venkataram, P., Babu, B.S., Naveen, M.K. and Gungal, G.S., 2007, April. A Method of Fraud & Intrusion Detection for E-payment Systems in Mobile e-Commerce. In 2007 IEEE International Performance, Computing, and Communications Conference (pp. 395-401). IEEE.
  5. Rieke, R., Zhdanova, M., Repp, J., Giot, R. dan Gaber, C., 2013, September. Fraud Detection in Mobile Payments Utilizing Process Behavior Analysis. In Availability, Reliability and Security (ARES), 2013 Eighth International Conference on (pp. 662-669). IEEE.
  6. Zhdanova, M., Repp, J., Rieke, R., Gaber, C. dan Hemery, B., 2014, September. No smurfs: Revealing fraud chains in mobile money transfers. InAvailability, Reliability and Security (ARES), 2014 Ninth International Conference on (pp. 11-20). IEEE.
  7. Pasquet, M. dan Gerbaix, S., 2016, February. Fraud on host card emulation architecture: Is it possible to fraud a payment transaction realized by a mobile phone using an" Host Card Emulation" system of security? Invited paper. In 2016 Second International Conference on Mobile and Secure Services (MobiSecServ) (pp. 1-3). IEEE.
  8. Nosrati, L. dan Bidgoli, A.M., 2015, October. Security assessment of mobile-banking. In Computing and Communication (IEMCON), 2015 International Conference and Workshop on (pp. 1-5). IEEE.
  9. Neufeld, D.J., 2010, January. Understanding Cybercrime. In System Sciences (HICSS), 2010 43rd Hawaii International Conference on (pp. 1-10). IEEE.
  10. Islam, M.S., 2014. Systematic Literature Review: Security Challenges of Mobile Banking and Payments System. International Journal of u-and e-Service, Science and Technology, 7(6), pp.107-116.
  11. Elkhodr, M., Shahrestani, S. dan Kourouche, K., 2012, November. A proposal to improve the security of mobile banking applications. In ICT and Knowledge Engineering (ICT & Knowledge Engineering), 2012 10th International Conference on (pp. 260-265). IEEE.
  12. He, W., 2012. A review of social media security risks and mitigation techniques. Journal of Systems and Information Technology, 14(2), pp.171-180.
  13. He, W., 2013. A survey of security risks of mobile social media through blog mining and an extensive literature search. Information Management & Computer Security, 21(5), pp.381-400.
  14. Judge, P. dan Ammar, M., 2003. Security issues and solutions in multicast content distribution: A survey. IEEE network, 17(1), pp.30-36.
  15. Khan, H.U., 2014. E-banking: Online transactions and security measures.Research Journal of Applied Sciences, Engineering and Technology, 7(19), pp.4056-4063.
  16. Jassal, R.K. dan Sehgal, R.K., Study of Online Banking Security Mechanism in India: Take ICICI Bank as an Example.
  17. Baldi, P., 2012. Autoencoders, unsupervised learning, and deep architectures. ICML unsupervised and transfer learning, 27(37-50), p.1.
  18. Murphy, K.P., 2012. Machine learning: a probabilistic perspective. MIT press.