PENINGKATAN KEWASPADAAN TERHADAP KEJAHATAN SIBER PADA APLIKASI WHATSAPP DI KALURAHAN BANGUNJIWO
Abstract
Full Text:
PDFReferences
D. Susanti dan M. Suyudi, “WhatsApp Usage Training in Marketing Home-Based Products for Benzo Amanah
Cooperative Members Bandung Indonesia,” IJRCS, vol. 1, no. 3, hlm. 29–34, Okt 2020, doi: 10.46336/ijr-
cs.v1i3.106.
D. Andamisari, “Penggunaan Status Whatsapp Sebagai Digital Marketing Warga Kecamatan Medan Satria
Bekasi Di Era New Normal,” lugas, vol. 5, no. 1, hlm. 66–72, Jun 2021, doi: 10.31334/lugas.v5i1.1559.
D. T. Harsono, “Kewaspadaan Nasional Terhadap Ancaman siber dalam Rangka Penguatan Pertahanan Negara
di Ibu Kota Nusantara,” Lembaga Ketahanan Nasional Republik Indonesia, Jul 2023.
D. Hariyadi, A. Akbarul, Kharisma, dan A. Priadana, “Laron v2: Pengembangan Aplikasi Forensik Logikal
untuk Mengakuisisi Percakapan Whatsapp di Android,” Smartics, vol. 7, no. 1, hlm. 7–13, 2021.
A. M. Elmisery dan M. Sertovic, “Modular Platform for Detecting and Classifying Phishing Web-
sites Using Cyber Threat Intelligence,” Electron. Commun. EASST, vol. 80, hlm. 1–4, 2021, doi:
14279/tuj.eceasst.80.1178.
Z. Alkhalil, C. Hewage, L. Nawaf, dan I. Khan, “Phishing Attacks: A Recent Comprehensive Study and a New
Anatomy,” Front. Comput. Sci., vol. 3, hlm. 563060, Mar 2021, doi: 10.3389/fcomp.2021.563060.
S. Chaudhary, V. Gkioulos, dan S. Katsikas, “Developing metrics to assess the effectiveness of cybersecurity
awareness program,” Journal of Cybersecurity, vol. 8, no. 1, hlm. tyac006, Jan 2022, doi: 10.1093/cyb-
sec/tyac006.
Lockheed Martin Corporation, “Seven Ways to Apply the Cyber Kill Chain with a Threat Intelligence Platform,”
Lockheed Martin Corporation, 2015.
N. Anwar, Supriyanto Supriyanto, dan The Society of Digital Information and Wireless Communication,
“Forensic Authentication of WhatsApp Messenger Using the Information Retrieval Approach,” IJCSDF, vol. 8,
no. 3, hlm. 206–212, 2019, doi: 10.17781/P002609.
A. Bissada dan A. Olmsted, “Mobile Multi-Factor Authentication,” dalam 2017 12th International Conference
for Internet Technology and Secured Transactions, ICITST 2017, 2018, hlm. 210–211. doi: 10.23919/ICI-
TST.2017.8356383.
U. Rauf, M. Shehab, N. Qamar, dan S. Sameen, “Formal approach to thwart against insider attacks: A bio-
inspired auto-resilient policy regulation framework,” Future Gener Comput Syst, vol. 117, hlm. 412–425, 2021,
doi: 10.1016/j.future.2020.11.009.
DOI: http://dx.doi.org/10.26798/jpm.v4i2.1476
Article Metrics
Abstract view : 4 timesPDF - 0 times
Refbacks
- There are currently no refbacks.
Copyright (c) 2025 Dedy Hariyadi, Alfirna Rizqi Lahitani, Irmma Dwijayanti, Kartikadyota Kusumaningtyas, Grita Supriyanto Dewi

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
JPM is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
- https://jurnal.narotama.ac.id/
- https://www.spb.gba.gov.ar/campus/
- https://revistas.unsaac.edu.pe/
- https://proceeding.unmuhjember.ac.id/
- https://ejournal.uki.ac.id/
- https://random.polindra.ac.id/
- https://scholar.ummetro.ac.id/
- https://ejournal.uika-bogor.ac.id/
- https://www.iejee.com/
- https://e-journal.iainptk.ac.id/
- https://journal.stitpemalang.ac.id/
- https://revistas.unimagdalena.edu.co/
- https://catalogue.cc-trieves.fr/
- https://revistas.tec.ac.cr/
- https://jurnal.poltekapp.ac.id/
- https://ojs.ucp.edu.ar/
- https://ihcway.sakura.ne.jp/
- http://www.apps.buap.mx/
- http://media-ojs.vls.icm.edu.pl/
- https://saber.unioeste.br/
- https://cinnda.org/
- https://jurnal.untidar.ac.id/
- https://ojs.adzkia.ac.id/
- https://supp.journalrmc.com/
- https://journal.thamrin.ac.id/
- https://ejurnal.unima.ac.id/
- https://journal.umpalopo.ac.id/
- https://ejournal.upnvj.ac.id/
- https://journal.ittelkom-pwt.ac.id/
- https://ojs.unpatompo.ac.id/
- https://jurnal.staim-probolinggo.ac.id/
- https://jurnal.ppi.ac.id/
- https://revistas.urp.edu.pe/

1.png)



