The art of deception: Mediated communication strategies in customs and excise fraud

Septian Dawang Kristanto, Andre Noevi Rahmanto, Ignatius Agung Satyawan

Abstract


Current technological developments also play a role in the birth of new crimes in the world, call it cybercrime. This study discusses cybercrime: fraud on behalf of Customs within the scope of persuasion communication and mediated communication from perpetrators to their victims and seen through the theory of Computer Mediated Communication (CMC) and Elaboration Likelihood Model, and also saw the campaign "beware of fraud on behalf of Customs" carried out by the Directorate General of Customs and Excise (DGCE). This research uses a qualitative approach by studying documentation related to fraud on behalf of Customs and interviewing several primary sources involved in handling the case. In addition to looking at the communication strategies implemented by the DGCE, this study will also show the development of communication patterns in the process of deception shown through the phases of impersonal, interpersonal, and hyperpersonal communication. The results of the analysis also showed that persuasion efforts emerged by fraudsters by directing their victims through peripheral routes, resulting in changes in attitude (deceived) and finally give some money to the perpetrator. Furthermore, if the peripheral route is not enough to deceive the victim, the fraudster switches to using the central route to persuade the victim through aspects of motivation, ability, and strong argumentation. This research aims to prevent people from falling victim to fraud. Addressing this issue will require cooperation from all parties, including the government, law enforcement, and the public.

Keywords


communication strategy; Computer Mediated Communication (CMC); cybercrime; fraud; persuasion

Full Text:

PDF

References


Al Ali, N. A. R., Chebotareva, A. A., & Chebotarev, V. E. (2021). Cyber security in marine transport: Opportunities and legal challenges. Pomorstvo, 35(2), 248–255. https://doi.org/10.31217/p.35.2.7

Althibyani, H. A., & Al-Zahrani, A. M. (2023). Investigating the Effect of Students’ Knowledge, Beliefs, and Digital Citizenship Skills on the Prevention of Cybercrime. Sustainability (Switzerland), 15(15). https://doi.org/10.3390/su151511512

Andriyanto, T. (2022). Fraud Mediated Communication with Business Email Compromise Mode. Journal of Communication Research, 5(2), 220–243.

Anggraeni, N., Siswoyo, M., & Nurfalah, F. (2014). PUBLIC RELATIONS STRATEGY IN SUPPORTING THE MARKETING OF NATIONAL POWER PLANTS (PLN). ASPIKOM Journal, 2(3), 206–220.

Beacukai.go.id. (2023, December 29). This is an effort by Customs to prevent fraud on behalf of the institution. https://www.beacukai.go.id/berita/ini-upaya-bea-cukai-cegah-penipuan-mengatasnamakan-institusi.html

@BEACUKAIRI. (2023). Social Media of the Directorate General of Customs and Excise. beacukai.go.id

Brenner, S. W. (2010). Cybercrime: Criminal Threats from Cyberspace. Praeger.

BSSN. (2023). ANNUAL REPORT.

Cangara, H. (2014). Communication Planning and Strategy. King Grafindo Persada.

Carrillo-Mondéjar, J., Martinez, J. L., & Suarez-Tangil, G. (2022). On how VoIP attacks foster the malicious call ecosystem. Computers and Security, 119. https://doi.org/10.1016/j.cose.2022.102758

Christou, G. (2018). The challenges of cybercrime governance in the European Union. European Politics and Society, 19(3), 355–375. https://doi.org/10.1080/23745118.2018.1430722

Creswell, J. (2012). Qualitative Inquiry and Research Design: Choosing Among Five Approaches (3rd ed.). Sage.

Dizon, M. A. C., & Upson, P. J. (2021). Laws of encryption: An emerging legal framework. Computer Law and Security Review, 43. https://doi.org/10.1016/j.clsr.2021.105635

Dzhanadilov, O. M., & Azhibayev, M. G. (2019). Problems of countering criminal offenses in information and communication networks. Journal of Advanced Research in Law and Economics, 10(1), 134–143. https://doi.org/10.14505/jarle.v10.1(39).14

Hidayat, M. (2017). Kyai Communication Model with Students in Islamic Boarding Schools. ASPIKOM Journal, 2(6), 385. https://doi.org/10.24329/aspikom.v2i6.89

Holovkin, B., Cherniavskyi, S., & Tavolzhanskyi, O. (2023). FACTORS OF CYBERCRIME IN UKRAINE. Relacoes Internacionais No Mundo Atual, 3(41), 464–488. https://doi.org/10.21902/Revrima.v3i41.6401

Juditha, C. (2015). Communication Patterns in Cybercrime (Love Scams Case) COMMUNICATION PATTERNS IN CYBERCRIME (LOVE SCAMS CASE) COMMUNICATION PATTERNS IN CYBERCRIME (LOVE SCAMS CASE). Journal of Communication and Informatics Research and Development , 6(2).

Kominfo. (2018, July 18). National Police: Indonesia is the Second Highest Cybercrime in the World. https://www.kominfo.go.id/content/detail/13487/polri-indonesia-tertinggi-kedua-kejahatan-siber-di-dunia/0/sorotan_media

Kosseff, J. (2016). The hazards of cyber-vigilantism. Computer Law and Security Review, 32(4), 642–649. https://doi.org/10.1016/j.clsr.2016.05.008

Li, J. X. (2017). Cyber Crime and Legal Countermeasures: A Historical Analysis. International Journal of Criminal Justice Sciences, 12(2). https://doi.org/10.5281/zenodo.1034658

Li, X. (2016). Regulation of Cyber Space: An Analysis of Chinese Law on Cyber Crime. International Journal of Cyber Criminology, 9(2). https://doi.org/10.5281/zenodo.56225

Littlejohn, S. W., Foss, K. A., & Oetzel, J. G. (2021). Theories of Human Communication (Twelfth Edition). Waveland Press, Inc.

Mthembu, M. A. (2012). High road in regulating online child pornography in South Africa. Computer Law and Security Review, 28(4), 438–444. https://doi.org/10.1016/j.clsr.2012.05.010

Nunes, D. R. (2018). The means of obtaining evidence provided by the Portuguese cybercrime law (Law no. 109/2009 of 15 September 2009). Comparative Law Review, 24, 249–286. https://doi.org/10.12775/CLR.2018.010

Okezone. (2023, December 30). Cybercrime Threatens the Financial Industry, BSSN: There were 151.4 million incidents during 2023.

Okhrimenko, I., Stepenko, V., Chernova, O., & Zatsarinnaya, E. (2023). The impact of information sphere in the economic security of the country: case of Russian realities. Journal of Innovation and Entrepreneurship, 12(1). https://doi.org/10.1186/s13731-023-00326-8

Police. (2022). Cybercrime in Indonesia Has Increased Many Times.

Punda, O., Vavrynchuk, M., Kohut, O., Kravchuk, S., & Prysiazhniuk, M. (2023). The Legal Status and Capabilities of Cyber Police in Ukraine: The Reasons for the Existence of Frauds with the Use of IT Technologies. Pakistan Journal of Criminology, 15(2), 165–180. https://www.scopus.com/inward/record.uri?eid=2-s2.0-85167433844&partnerID=40&md5=667cb4ce9172abcbf31894ab08738682

Raets, S., & Janssens, J. (2021). Trafficking and Technology: Exploring the Role of Digital Communication Technologies in the Belgian Human Trafficking Business. European Journal on Criminal Policy and Research, 27(2), 215–238. https://doi.org/10.1007/s10610-019-09429-z

Ruvin, O., Isaieva, N., Sukhomlyn, L., Kalachenkova, K., & Bilianska, N. (2020). CYBERSECURITY AS AN ELEMENT OF FINANCIAL SECURITY IN THE CONDITIONS OF GLOBALIZATION. Journal of Security and Sustainability Issues, 10(1), 175–188. https://doi.org/10.9770/jssi.2020.10.1(13)

Shahbazi, A. (2019). TECHNOLOGICAL DEVELOPMENTS IN CYBERSPACE AND COMMISSION OF THE CRIMES IN INTERNATIONAL LAW AND IRAN. In Journal of Legal, Ethical and Regulatory Issues (Vol. 22, Issue 4).

Sin, J.-M., & Son, H.-R. (2019). Dealing with the problem of collection and analysis of electronic evidence. International Journal of Electronic Security and Digital Forensics, 11(3), 363–377. https://doi.org/10.1504/IJESDF.2019.100497

Walther. (1996). Computer Mediated Communication: Impersonal, Interpersonal, and Hypersonal Interaction. Communication Research, 3(43).

Walther, M., Jakobi, T., Watson, S. J., & Stevens, G. (2023). A systematic literature review about the consumers’ side of fake review detection – Which cues do consumers use to determine the veracity of online user reviews? Computers in Human Behavior Reports, 10, 100278. https://doi.org/https://doi.org/10.1016/j.chbr.2023.100278

Widiastuti, T. (2017). ANALYSIS OF THE ELABORATION LIKELIHOOD MODEL IN THE FORMATION OF RIDWAN KAMIL'S PERSONAL BRANDING ON TWITTER. ASPIKOM Journal, 3(3), 588–603. http://databoks.katadata.




DOI: http://dx.doi.org/10.30813/bricolage.v11i1.7881

Refbacks

  • There are currently no refbacks.


Accredited by:

          

 

Indexed by:

  

        

UNIVERSITAS BUNDA MULIA PRESS

PROGRAM STUDI MAGISTER ILMU KOMUNIKASI
Lantai 3 Ruang Pascasarjana - Universitas Bunda Mulia
Jl. Lodan Raya No. 2, Ancol – Jakarta Utara 14430, Indonesia
Telp: +62 21 692 9090 ext.1317
Email: bricolage@ubm.ac.id; bricolage.mikom@gmail.com

 

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

View My Stats