DUMPSTER DIVING THREAT IN PERSONAL DATA LEAKAGE CASE IN INDONESIA

Sayid Muhammad Rifki Noval, Soecipto Soecipto, Ahmad Jamaludin, Erna Listiawati

Abstract


It is a big job for law enforcement to be able to deal with fraud crimes and data leaks that are increasing at this time. Social engineering attacks are considered to be one of the modes used by perpetrators in carrying out their actions. If the current prevention efforts always link social engineering with phishing, an activity that is closely related to technological sophistication, it is necessary to know another form of social engineering that deserves attention, namely dumpster diving. A term that describes the activity of “scavenging” a target's trash in search of valuable information. Dumpster diving is often underestimated because some people think that if the waste that has been disposed of will not be used by others, it will even have a threatening impact. The habit of throwing away records and documents without being destroyed makes it a target for perpetrators to collect information which will then be used in attacking their targets. Several countries have considered regulating the designation of waste that has the potential to be misused, including regarding the security of personal data. Therefore, this article aims to provide an alternative policy for the Indonesian government, in order to consider the issuance of regulations that protect victims who are affected by losses due to the use of waste by perpetrators.

Keywords


Cyber Crime, Dumpster Diving, Social Engineering

Full Text:

PDF

References


Alghazo, J., Ouda, O. K., & Hassan, A. E. (2018). E-waste environmental and information security threat: GCC countries vulnerabilities. Euro-Mediterranean Journal for Environmental Integration, 3, 1-10.

Al-Kassimi, K. (2021). De-Historicizing (Mainstream) Ottoman Historiography on Tanzimat and Tahdith: Jus Gentium and Pax Britannica Violate Osmanli Sovereignty in Arabia. Histories, 1(4), 218-255.

Borkovich, D. J., & Skovira, R. J. (2019). Cybersecurity Inertia And Social Engineering: Who's Worse, Employees Or Hackers?. Issues in Information Systems, 20(3).

Clarke, L., Arnett, S., Bukhari, W., Khalilidehkordi, E., Jimenez Sanchez, S., O'Gorman, C., ... & Broadley, S. A. (2021). MRI patterns distinguish AQP4 antibody positive neuromyelitis optica spectrum disorder from multiple sclerosis. Frontiers in neurology, 12, 722237.

Cooper, A. S. (2008). Showdown at Doha: The secret oil deal that helped sink the Shah of Iran. The Middle East Journal, 62(4), 567-591.

El-Gayar, O., & Fritz, B. D. (2006). Environmental management information systems (EMIS) for sustainable development: a conceptual overview. Communications of the Association for Information Systems, 17(1), 34.

El-Gayar, O., & Fritz, B. D. (2006). Environmental management information systems (EMIS) for sustainable development: a conceptual overview. Communications of the Association for Information Systems, 17(1), 34.

Ferza, R., Hamudy, M. I. A., & Rifki, M. S. (2019). Public Private Partnership of Waste Management in West Java. BISNIS & BIROKRASI: Jurnal Ilmu Administrasi dan Organisasi, 26(2), 4.

Gehl, R. W., & Lawson, S. T. (2022). Social Engineering: How Crowdmasters, Phreaks, Hackers, and Trolls Created a New Form of Manipulativ e Communication. MIT Press.

Ghafir, I., Saleem, J., Hammoudeh, M., Faour, H., Prenosil, V., Jaf, S., ... & Baker, T. (2018). Security threats to critical infrastructure: the human factor. The Journal of Supercomputing, 74, 4986-5002.

Gregg, M., Watkins, S., Mays, G., Ries, C., Bandes, R. M., & Franklin, B. (2006). Hack the stack: Using snort and ethereal to master the 8 layers of an insecure network. Elsevier.

Hijji, M., & Alam, G. (2021). A multivocal literature review on growing social engineering based cyber-attacks/threats during the COVID-19 pandemic: challenges and prospective solutions. Ieee Access, 9, 7152-7169.

Janczewski, L. J., & Fu, L. (2010, October). Social engineering-based attacks: Model and new zealand perspective. In Proceedings of the international multiconference on computer science and information technology (pp. 847-853). IEEE.

Khan, D., & Samadder, S. R. (2014). Municipal solid waste management using Geographical Information System aided methods: A mini review. Waste management & research, 32(11), 1049-1062.

Lehtonen, T. K., & Pyyhtinen, O. (2021). Living on the margins: dumpster diving for food as a critical practice. Distinktion: Journal of Social Theory, 22(3), 441-463.

Listokin, Y., & Schizer, D. M. (2012). I like to pay taxes: Taxpayer support for government spending and the efficiency of the tax system. Tax L. Rev., 66, 179.

Lu, W., Chen, X., Peng, Y., & Shen, L. (2015). Benchmarking construction waste management performance using big data. Resources, Conservation and Recycling, 105, 49-58.

Medlin, B. D., Cazier, J. A., & Foulk, D. P. (2008). Analyzing the vulnerability of US hospitals to social engineering attacks: how many of your employees would share their password?. International Journal of Information Security and Privacy (IJISP), 2(3), 71-83.

Ramjist, J. K., Coburn, N., Urbach, D. R., Govindarajan, A., Armstrong, K. A., Scott, A. L., & Baxter, N. N. (2018). Disposal of paper records containing personal information in hospitals. JAMA, 319(11), 1162-1163.

Rombach, M., & Bitsch, V. (2015). Food movements in Germany: Slow food, food sharing, and dumpster diving. International Food and Agribusiness Management Review, 18(1030-2016-83042), 1-24.

Sagar, R. (Ed.). (2022). The Progressive Maharaja: Sir Madhava Rao's Hints on the Art and Science of Government. Oxford University Press.

Siddiqi, M. A., Pak, W., & Siddiqi, M. A. (2022). A study on the psychology of social engineering-based cyberattacks and existing countermeasures. Applied Sciences, 12(12), 6042.




DOI: https://doi.org/10.46336/ijeer.v3i2.419

Refbacks

  • There are currently no refbacks.


Copyright (c) 2023 Sayid Muhammad Rifki Noval, Soecipto Soecipto, Ahmad Jamaludin, Erna Listiawati

Published By: 

IJEER: Jalan Riung Ampuh No. 3, Riung Bandung, Kota Bandung 40295, Jawa Barat, Indonesia


IJEER Indexed By:

width=width= width= width= width= 

 

Creative Commons License This work is licensed under a Creative Commons Attribution 4.0 International License.

View My Stats