The form and meaning of language motifs in phishing crimes: A forensic linguistic study
DOI:
https://doi.org/10.33633/lite.v21i1.11463Keywords:
cybercrime, forensic linguistics, language motifsAbstract
The urgency of this research is that phishing crimes are rife, which are wrapped in persuasive and manipulative language. This research aims to describe the form and meaning of language used in phishing actions based on a forensic linguistics perspective. This type of research is qualitative research with descriptive methods. The descriptive data in this research is in the form of text transcriptions of messages and information indicated in phishing crimes. Research stages include: (1) data documentation; (2) data classification; (3) data analysis; (4) interpretation of form and meaning based on a forensic linguistic perspective; and (4) data conclusion. The data in this research are messages or information in phishing actions. The data sources in this research come from social media and digital forums and social media which are often a means of cyber crime such as WhatsApp, Facebook, Twitter. Data collection techniques use documentation techniques. The data validity test was carried out using theoretical triangulation. The data analysis technique uses discourse analysis, researchers identify language patterns used in phishing crime communications. The results of this research show that the forms of language motives in phishing crimes include (1) 10 deceptive phishing; 4 Phishing APKs; (6) smishing. and the meaning of language motifs in phishing crimes. The conclusion of this research is that there are various types of phishing crimes packaged in persuasive and manipulative language. In this research, forms of phishing action have been found including deceptive phishing; APK phishing; smishing, and the meaning of language motifs in phishing actions has been identified.References
AAG IT Support. (2024). The latest phishing statistics (updated June 2024). AAG IT Support. https://www.aagit.com
Akande, O. N., Gbenle, O., Abikoye, O. C., Jimoh, R. G., Akande, H. B., Balogun, A. O. & Fatokun, A. (2023). Smsprotect: An automatic smishing detection mobile application. ICT Express, 9(2), 168–176. https://doi.org/10.1016/j.icte.2022.05.009
Amro, B. (2018). Phishing techniques in mobile devices. Journal of Computer and Communications, 06(02), 27–35. https://doi.org/10.4236/jcc.2018.62003
Andriyanto, T. (2022). Komunikasi termediasi penipuan dengan modus business email compromise. Jurnal Riset Komunikasi, 5(2), 220–243. https://doi.org/10.38194/jurkom.v5i2.627
Anggana, N. D. (2024, 31. Mei). Phishing: Berkenalan dengan si ahli penipuan. https://widyasecurity.com/2024/05/31/phishing-berkenalan-dengan-si-ahli-penipuan/
Balamurugan, G. & Jayabharathy, J. (2022). Cyberbully classification based on tweet texts for detection of phishing links. Dalam R. Asokan, D. P. Ruiz, Z. A. Baig & S. Piramuthu (Ed.), Smart Data Intelligence (hlm. 367–374). Springer Nature. https://doi.org/10.1007/978-981-19-3311-0_31
Benavides-Astudillo, E., Fuertes, W., Sanchez-Gordon, S., Nuñez-Agurto, D. & Rodríguez-Galán, G. (2023). A phishing-attack-detection model using natural language processing and deep learning. Applied Sciences (Switzerland), 13(9), 5275. https://doi.org/10.3390/app13095275
Boux, I. P., Margiotoudi, K., Dreyer, F. R., Tomasello, R. & Pulvermüller, F. (2023). Cognitive features of indirect speech acts. Language, Cognition and Neuroscience, 38(1), 40–64.
Caniago, K. & Sutabri, T. (2023). Tindak kejahatan phising di sektor pelayan di Universitas Bina Insan Lubuklinggau. Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika), 8(1), 117–125. https://doi.org/10.30645/jurasik.v8i1.548
Christiansen, T. W. (2021). Linguistics and Deception Detection (DD): A work in progress. Studies in Logic, Grammar and Rhetoric, 66(2), undefined-undefined. https://doi.org/10.2478/slgr-2021-0011
Dharani, L. I. C., Idayanti, S. & Rahayu, K. (2024). Perlindungan hukum terhadap tindakan phishing di media sosial. Penerbit NEM.
Fitriarti, E. A. (2019). Urgensi literasi digital dalam menangkal hoax informasi kesehatan di era digital. Metacommunication; Journal of Communication Studies, 4(2), 234–246. https://doi.org/10.20527/mc.v4i2.6929
Gallo, L., Gentile, D., Ruggiero, S., Botta, A. & Ventre, G. (2024). The human factor in phishing: Collecting and analyzing user behavior when reading emails. Computers & Security, 139, 103671. https://doi.org/10.1016/j.cose.2023.103671
Gil, P. (2018). What Is “Whaling?” Lifewire. https://www.mendeley.com/catalogue/c1063411-5a1a-3135-b7d0-189bb59bc1b3/
Grecya, E., Sinurat, B., Yahya, I. E., Ginting, N. A., Tambunan, M. Y. K. T., Ahmid, I. A. & Ivanna, J. (2021). Kontribusi mahasiswa sebagai aktor pendidikan dalam menghadapi rendahnya literasi terhadap berita hoax: Aktor atau penonton. Jotika Journal in Education, 1(1), 10–17. https://doi.org/10.56445/jje.v1i1.14
Karamagi, R. & Ally, S. (2023). Security risk scale: A case of email phishing detection using text mining. Journal of ICT Systems, 1(2), 93–108. https://doi.org/10.56279/jicts.v1i2.43
Kemp, S., Buil-Gil, D., Moneva, A., Miró-Llinares, F. & Díaz-Castaño, N. (2021). Empty streets, busy internet: A time-series analysis of cybercrime and fraud trends during COVID-19. Journal of Contemporary Criminal Justice, 37(4), 480–501. https://doi.org/10.1177/ 10439862211027986
Kothamasu, G. A., Venkata, S. K. A., Pemmasani, Y. & Mathi, S. (2023). An Investigation on vulnerability analysis of phishing attacks and countermeasures. International Journal of Safety and Security Engineering, 13(2), 333–340. https://doi.org/10.18280/ijsse.130215
Lestari, T. & Hartati, E. (2020). A pragmatics analysis of speech act in Thor movie. ELTICS : Journal of English Language Teaching and English Linguistics, 4(2), undefined-undefined. https://doi.org/10.31316/eltics.v4i2.524
Lin, Y., Liu, R., Divakaran, D. M., Ng, J. Y., Chan, Q. Z., Lu, Y., Si, Y., Zhang, F. & Dong, J. S. (2021). Phishpedia: A hybrid deep learning based approach to visually identify phishing webpages. Proceedings of the 30th USENIX Security Symposium, 3793–3810.
Lokapala, Y. H., Nurfauzi, F. J. & Wdowaty, Y. (2024). Aspek yuridis kejahatan phishing dalam ketentuan hukum di Indonesia. Indonesian Journal of Criminal Law and Criminology (IJCLC), 5(1), 19–24. https://doi.org/10.18196/ijclc.v5i1.19853
Lwin Tun, Z. & Birks, D. (2023). Supporting crime script analyses of scams with natural language processing. Crime Science, 12(1), 1. https://doi.org/10.1186/s40163-022-00177-w
Miles, M. B. & Huberman, A. M. (1994). Qualitative data analysis: An expanded sourcebook - Matthew B. Miles, A. Michael Huberman - Google Buku. Sage Publications.
Muftiadi, A., Agustina, T. P. M. & Evi, M. (2022). Studi kasus keamanan jaringan komputer: Analisis Ancaman phising terhadap layanan online banking. Hexatech: Jurnal Ilmiah Teknik, 1(2), 60–65. https://doi.org/10.55904/hexatech.v1i2.346
Napitupulu, D. (2017). Kajian peran cyber law dalam memperkuat keamanan sistem informasi nasional. Deviance Jurnal Kriminologi, 1(1), 100–113. https://doi.org/10.36080/djk.595
Nugroho, H., Ihsan, M. N., Haryoko, A., Ma`arif, F. & Alifah, F. (2023). Edukasi keamanan digital untuk meningkatkan kewaspadaan masyarakat terhadap link phising. Alahyan Jurnal Pengabdian Masyarakat Multidisiplin, 1(2), 104–111. https://doi.org/10.61492/ecos-preneurs.v1i2.60
Orunsolu, A. A., Sodiya, A. S. & Akinwale, A. T. (2022). A predictive model for phishing detection. Journal of King Saud University - Computer and Information Sciences, 34(2), 232–247. https://doi.org/10.1016/j.jksuci.2019.12.005
Pritzker, S. E. (2020). Language, emotion, and the politics of vulnerability. Annual Review of Anthropology, 49, 241–256. https://doi.org/10.1146/annurev-anthro-010220-074429
Purba, I. G. & Can, S. (2016). Legal study on the crime of defamation through social media according to law number 19 of 2016 concerning information and electronic transactions. Budapest International Research and Critics Institute-Journal (BIRCI-Journal), 5(19), 10240–10251.
Puspitasari, I. (2018). Pertanggungjawaban pidana pelaku tindak pidana penipuan online dalam hukum positif di Indonesia. Humani (Hukum dan Masyarakat Madani), 8(1), 1–14. https://doi.org/10.26623/humani.v8i1.1383
Putri, R. N. S. (2022). Analisa pola – pola sosialisasi pencegahan modus social engineering oleh bank melalui media website dan media sosial Twitter. https://dspace.uii.ac.id/ handle/123456789/41513
Sabina, D., Dewi, D. A. & Hayat, R. S. (2023). Implementasi literasi budaya dan kewarganegaraan sebagai solusi disinformasi pada masyarakat Indonesia. Jurnal Pendidikan Indonesia (JOUPI), 1(3), 295–230. https://doi.org/10.62007/joupi.v1i3.219
Saifudin, A. (2024). Language communication in the digital era in the perspective of cognitive linguistics. Proceedings of International Seminar on Translation, Applied Linguistics, Literature, and Cultural Studies, 2(1), 253–258. https://doi.org/10.33633/ STRUKTURALJOURNAL.V2I1.12307
Salloum, S., Gaber, T., Vadera, S. & Shaalan, K. (2023). A new English/Arabic parallel corpus for phishing emails. ACM Transactions on Asian and Low-Resource Language Information Processing, 22(7), 1–17. https://doi.org/10.1145/3606031
Santoso, J. T. (2023). Teknologi keamanan siber (Cyber Security). 9(1), 1–173.
Strada, Y. A., Donoriyanto, D. S. & Rahmawati, N. (2022). Cash information system design based on website (Case study on Café XYZ). Tibuana, 5(2), 99-106. https://doi.org/ 10.36456/tibuana.5.2.5594.99-106
Taufiq, M., Maliki, D. O., Maldini, A. S., Ekamartha, K. N., Saputra, K. N. C., Ahmad, S. H., Pillardien, E. & Sholihatin, E. (2023). Pentingnya Etika berbahasa sebagai upaya pencegahan kasus kejahatan berbahasa di media digital. Bureaucracy Journal : Indonesia Journal of Law and Social-Political Governance, 3(2), 2116–2125. https://doi.org/10.53363/bureau.v3i2.311
Tomicic, I. (2023). Social engineering aspects of email phishing: An overview and taxonomy. 2023 46th ICT and Electronics Convention, MIPRO 2023 - Proceedings, 1201–1207. https://doi.org/10.23919/MIPRO57284.2023.10159691
Wallis, P. (2022). An enactivist account of mind reading in natural language understanding. Multimodal Technologies and Interaction, 6(5), 32. https://doi.org/10.3390/mti6050032
Warami, H. (2022). Kejahatan bahasa di wilayah hukum Papua Barat: Kajian linguistik forensik. Ranah: Jurnal Kajian Bahasa, 11(1), 76–93. https://doi.org/10.26499/rnh.v11i1.2699
Weaver, B. W., Braly, A. M. & Lane, D. M. (2021). Training users to identify phishing emails. Journal of Educational Computing Research, 59(6), 1169–1183. https://doi.org/10.1177/ 0735633121992516
Downloads
Additional Files
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Zahy Riswahyudha Ariyanto, Laili Etika Rahmawati

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors of LITE: Jurnal Bahasa, Sastra, dan Budaya must agree to the following terms:
- Authors retain copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution-ShareAlike 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) before and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).