Hacking as a Cyber Crime, Reviewed from the Perspective of Quran Surah An-Nur Verse 27

Warsino Warsino

Abstract


Sarcasm is a statement that conveys an opposing viewpoint via
positive or exaggeratedly positive phrases. Due to this intentional
ambiguity, sarcasm identification has become one of the important
factors in sentiment analysis that make many researchers in natural
language processing intensively study sarcasm detection. This
research is using multiple channels embedding the attention
bidirectional long-short memory (MCEA-BLSTM) model that
explored sarcasm detection in news headlines and has different
approach from previous research-developed models that lexical,
semantic, and pragmatic properties. This research found that multiple
channels embedding attention mechanism improve the performance of
BLSTM, making it superior to other models. The proposed method
achieves 96.64% accuracy with an f-measure of 97%


Keywords


Ethics, hacking, cybercrime

Full Text:

PDF

References


. Rahmawati, “Analisis Manajemen Risiko Ancaman Kejahatan Siber (Cyber Crime) Dalam Peningkatan Cyber Defense,” J. Pertahanan Bela Negara, vol. 7, no. 2, pp. 51–66, 2017, doi: 10.33172/jpbh.v7i2.179.

A. Kusumaningrum, H. Wijayanto, and B. D. Raharja, “Pengukuran Tingkat Kesadaran Keamanan Siber di Kalangan Mahasiswa saat Study From Home dengan Multiple Criteria Decision Analysis (MCDA),” J. Ilm. SINUS, vol. 20, no. 1, p. 69, 2022, doi: 10.30646/sinus.v20i1.586.

“Serangan Siber 2020: Data Pasien Covid-19 RI Hingga KPU.” https://www.cnnindonesia.com/teknologi/20201223144145-185-585740/serangan-siber-2020-data-pasien-covid-19-ri-hingga-kpu (accessed Apr. 17, 2022).

“Ini Rekap Serangan Siber Januari – April 2020 - ItWorks.” https://www.itworks.id/27467/ini-rekap-serangan-siber-januari-april-2020.html (accessed Apr. 17, 2022).

M. F. Noordin, “Application of privacy, security and ethics in islamic concerned ICT,” Middle East J. Sci. Res., vol. 14, no. 11, pp. 1548–1554, 2013, doi: 10.5829/idosi.mejsr.2013.14.11.2035.

A. S. Ahmad, Tafsir Ayat-ayat Ahkam, 1st ed. Depok: Keira Publishing, 2016.

F. Widiyaningsih, “Tindak Pidana Pengaksesan Sistem Elektronik dalam UU No. 11 Tahun 2008 Tentang Informasi dan Transaksi Elektronik (dalam Perspektif Fiqih Jinayah),” no. 11, 2012, [Online]. Available: http://eprints.walisongo.ac.id/1404/.

W. Z. Khan, M. Zahid, M. Y. Aalsalem, H. M. Zangoti, and Q. Arshad, “Ethical aspects of internet of things from islamic perspective,” 2017 9th IEEE-GCC Conf. Exhib. GCCCE 2017, 2018, doi: 10.1109/IEEEGCC.2017.8448105.

M. Danuri, “Cyber Religious,” in Cyber Religious, 2020.

K. Mur, A. Q. Dalam, and P. Hadis, “( Studi Analisis Kritik Sanad dan Matan ),” 2017.




DOI: https://doi.org/10.15408/jti.v15i2.25842 Abstract - 0 PDF - 0

Refbacks

  • There are currently no refbacks.


Copyright (c) 2022 Warsino Warsino

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

3rd Floor, Dept. of Informatics, Faculty of Science and Technology, UIN Syarif Hidayatullah Jakarta
Jl. Ir. H. Juanda No.95, Cempaka Putih, Ciputat Timur. 
Kota Tangerang Selatan, Banten 15412
Tlp/Fax: +62 21 74019 25/ +62 749 3315
Handphone: +62 8128947537
E-mail: jurnal-ti@uinjkt.ac.id


Creative Commons Licence
Jurnal Teknik Informatika by Prodi Teknik Informatika Universitas Islam Negeri Syarif Hidayatullah Jakarta is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Based on a work at http://journal.uinjkt.ac.id/index.php/ti.

 

JTI Visitor Counter: View JTI Stats

 Flag Counter