The form and meaning of language motifs in phishing crimes: A forensic linguistic study

Authors

  • Zahy Riswahyudha Ariyanto Universitas Muhammadiyah Surakarta
  • Laili Etika Rahmawati Universitas Muhammadiyah Surakarta https://orcid.org/0000-0003-2453-7809

DOI:

https://doi.org/10.33633/lite.v21i1.11463

Keywords:

cybercrime, forensic linguistics, language motifs

Abstract

The urgency of this research is that phishing crimes are rife, which are wrapped in persuasive and manipulative language.  This research aims to describe the form and meaning of language used in phishing actions based on a forensic linguistics perspective. This type of research is qualitative research with descriptive methods. The descriptive data in this research is in the form of text transcriptions of messages and information indicated in phishing crimes. Research stages include: (1) data documentation; (2) data classification; (3) data analysis; (4) interpretation of form and meaning based on a forensic linguistic perspective; and (4) data conclusion. The data in this research are messages or information in phishing actions. The data sources in this research come from social media and digital forums and social media which are often a means of cyber crime such as WhatsApp, Facebook, Twitter. Data collection techniques use documentation techniques. The data validity test was carried out using theoretical triangulation. The data analysis technique uses discourse analysis, researchers identify language patterns used in phishing crime communications. The results of this research show that the forms of language motives in phishing crimes include (1) 10 deceptive phishing; 4 Phishing APKs; (6) smishing. and the meaning of language motifs in phishing crimes.  The conclusion of this research is that there are various types of phishing crimes packaged in persuasive and manipulative language. In this research, forms of phishing action have been found including deceptive phishing; APK phishing; smishing, and the meaning of language motifs in phishing actions has been identified.

Author Biography

Laili Etika Rahmawati, Universitas Muhammadiyah Surakarta

Scopus ID. 57202219184

References

AAG IT Support. (2024). The latest phishing statistics (updated June 2024). AAG IT Support. https://www.aagit.com

Akande, O. N., Gbenle, O., Abikoye, O. C., Jimoh, R. G., Akande, H. B., Balogun, A. O. & Fatokun, A. (2023). Smsprotect: An automatic smishing detection mobile application. ICT Express, 9(2), 168–176. https://doi.org/10.1016/j.icte.2022.05.009

Amro, B. (2018). Phishing techniques in mobile devices. Journal of Computer and Communications, 06(02), 27–35. https://doi.org/10.4236/jcc.2018.62003

Andriyanto, T. (2022). Komunikasi termediasi penipuan dengan modus business email compromise. Jurnal Riset Komunikasi, 5(2), 220–243. https://doi.org/10.38194/jurkom.v5i2.627

Anggana, N. D. (2024, 31. Mei). Phishing: Berkenalan dengan si ahli penipuan. https://widyasecurity.com/2024/05/31/phishing-berkenalan-dengan-si-ahli-penipuan/

Balamurugan, G. & Jayabharathy, J. (2022). Cyberbully classification based on tweet texts for detection of phishing links. Dalam R. Asokan, D. P. Ruiz, Z. A. Baig & S. Piramuthu (Ed.), Smart Data Intelligence (hlm. 367–374). Springer Nature. https://doi.org/10.1007/978-981-19-3311-0_31

Benavides-Astudillo, E., Fuertes, W., Sanchez-Gordon, S., Nuñez-Agurto, D. & Rodríguez-Galán, G. (2023). A phishing-attack-detection model using natural language processing and deep learning. Applied Sciences (Switzerland), 13(9), 5275. https://doi.org/10.3390/app13095275

Boux, I. P., Margiotoudi, K., Dreyer, F. R., Tomasello, R. & Pulvermüller, F. (2023). Cognitive features of indirect speech acts. Language, Cognition and Neuroscience, 38(1), 40–64.

Caniago, K. & Sutabri, T. (2023). Tindak kejahatan phising di sektor pelayan di Universitas Bina Insan Lubuklinggau. Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika), 8(1), 117–125. https://doi.org/10.30645/jurasik.v8i1.548

Christiansen, T. W. (2021). Linguistics and Deception Detection (DD): A work in progress. Studies in Logic, Grammar and Rhetoric, 66(2), undefined-undefined. https://doi.org/10.2478/slgr-2021-0011

Dharani, L. I. C., Idayanti, S. & Rahayu, K. (2024). Perlindungan hukum terhadap tindakan phishing di media sosial. Penerbit NEM.

Fitriarti, E. A. (2019). Urgensi literasi digital dalam menangkal hoax informasi kesehatan di era digital. Metacommunication; Journal of Communication Studies, 4(2), 234–246. https://doi.org/10.20527/mc.v4i2.6929

Gallo, L., Gentile, D., Ruggiero, S., Botta, A. & Ventre, G. (2024). The human factor in phishing: Collecting and analyzing user behavior when reading emails. Computers & Security, 139, 103671. https://doi.org/10.1016/j.cose.2023.103671

Gil, P. (2018). What Is “Whaling?” Lifewire. https://www.mendeley.com/catalogue/c1063411-5a1a-3135-b7d0-189bb59bc1b3/

Grecya, E., Sinurat, B., Yahya, I. E., Ginting, N. A., Tambunan, M. Y. K. T., Ahmid, I. A. & Ivanna, J. (2021). Kontribusi mahasiswa sebagai aktor pendidikan dalam menghadapi rendahnya literasi terhadap berita hoax: Aktor atau penonton. Jotika Journal in Education, 1(1), 10–17. https://doi.org/10.56445/jje.v1i1.14

Karamagi, R. & Ally, S. (2023). Security risk scale: A case of email phishing detection using text mining. Journal of ICT Systems, 1(2), 93–108. https://doi.org/10.56279/jicts.v1i2.43

Kemp, S., Buil-Gil, D., Moneva, A., Miró-Llinares, F. & Díaz-Castaño, N. (2021). Empty streets, busy internet: A time-series analysis of cybercrime and fraud trends during COVID-19. Journal of Contemporary Criminal Justice, 37(4), 480–501. https://doi.org/10.1177/ 10439862211027986

Kothamasu, G. A., Venkata, S. K. A., Pemmasani, Y. & Mathi, S. (2023). An Investigation on vulnerability analysis of phishing attacks and countermeasures. International Journal of Safety and Security Engineering, 13(2), 333–340. https://doi.org/10.18280/ijsse.130215

Lestari, T. & Hartati, E. (2020). A pragmatics analysis of speech act in Thor movie. ELTICS : Journal of English Language Teaching and English Linguistics, 4(2), undefined-undefined. https://doi.org/10.31316/eltics.v4i2.524

Lin, Y., Liu, R., Divakaran, D. M., Ng, J. Y., Chan, Q. Z., Lu, Y., Si, Y., Zhang, F. & Dong, J. S. (2021). Phishpedia: A hybrid deep learning based approach to visually identify phishing webpages. Proceedings of the 30th USENIX Security Symposium, 3793–3810.

Lokapala, Y. H., Nurfauzi, F. J. & Wdowaty, Y. (2024). Aspek yuridis kejahatan phishing dalam ketentuan hukum di Indonesia. Indonesian Journal of Criminal Law and Criminology (IJCLC), 5(1), 19–24. https://doi.org/10.18196/ijclc.v5i1.19853

Lwin Tun, Z. & Birks, D. (2023). Supporting crime script analyses of scams with natural language processing. Crime Science, 12(1), 1. https://doi.org/10.1186/s40163-022-00177-w

Miles, M. B. & Huberman, A. M. (1994). Qualitative data analysis: An expanded sourcebook - Matthew B. Miles, A. Michael Huberman - Google Buku. Sage Publications.

Muftiadi, A., Agustina, T. P. M. & Evi, M. (2022). Studi kasus keamanan jaringan komputer: Analisis Ancaman phising terhadap layanan online banking. Hexatech: Jurnal Ilmiah Teknik, 1(2), 60–65. https://doi.org/10.55904/hexatech.v1i2.346

Napitupulu, D. (2017). Kajian peran cyber law dalam memperkuat keamanan sistem informasi nasional. Deviance Jurnal Kriminologi, 1(1), 100–113. https://doi.org/10.36080/djk.595

Nugroho, H., Ihsan, M. N., Haryoko, A., Ma`arif, F. & Alifah, F. (2023). Edukasi keamanan digital untuk meningkatkan kewaspadaan masyarakat terhadap link phising. Alahyan Jurnal Pengabdian Masyarakat Multidisiplin, 1(2), 104–111. https://doi.org/10.61492/ecos-preneurs.v1i2.60

Orunsolu, A. A., Sodiya, A. S. & Akinwale, A. T. (2022). A predictive model for phishing detection. Journal of King Saud University - Computer and Information Sciences, 34(2), 232–247. https://doi.org/10.1016/j.jksuci.2019.12.005

Pritzker, S. E. (2020). Language, emotion, and the politics of vulnerability. Annual Review of Anthropology, 49, 241–256. https://doi.org/10.1146/annurev-anthro-010220-074429

Purba, I. G. & Can, S. (2016). Legal study on the crime of defamation through social media according to law number 19 of 2016 concerning information and electronic transactions. Budapest International Research and Critics Institute-Journal (BIRCI-Journal), 5(19), 10240–10251.

Puspitasari, I. (2018). Pertanggungjawaban pidana pelaku tindak pidana penipuan online dalam hukum positif di Indonesia. Humani (Hukum dan Masyarakat Madani), 8(1), 1–14. https://doi.org/10.26623/humani.v8i1.1383

Putri, R. N. S. (2022). Analisa pola – pola sosialisasi pencegahan modus social engineering oleh bank melalui media website dan media sosial Twitter. https://dspace.uii.ac.id/ handle/123456789/41513

Sabina, D., Dewi, D. A. & Hayat, R. S. (2023). Implementasi literasi budaya dan kewarganegaraan sebagai solusi disinformasi pada masyarakat Indonesia. Jurnal Pendidikan Indonesia (JOUPI), 1(3), 295–230. https://doi.org/10.62007/joupi.v1i3.219

Saifudin, A. (2024). Language communication in the digital era in the perspective of cognitive linguistics. Proceedings of International Seminar on Translation, Applied Linguistics, Literature, and Cultural Studies, 2(1), 253–258. https://doi.org/10.33633/ STRUKTURALJOURNAL.V2I1.12307

Salloum, S., Gaber, T., Vadera, S. & Shaalan, K. (2023). A new English/Arabic parallel corpus for phishing emails. ACM Transactions on Asian and Low-Resource Language Information Processing, 22(7), 1–17. https://doi.org/10.1145/3606031

Santoso, J. T. (2023). Teknologi keamanan siber (Cyber Security). 9(1), 1–173.

Strada, Y. A., Donoriyanto, D. S. & Rahmawati, N. (2022). Cash information system design based on website (Case study on Café XYZ). Tibuana, 5(2), 99-106. https://doi.org/ 10.36456/tibuana.5.2.5594.99-106

Taufiq, M., Maliki, D. O., Maldini, A. S., Ekamartha, K. N., Saputra, K. N. C., Ahmad, S. H., Pillardien, E. & Sholihatin, E. (2023). Pentingnya Etika berbahasa sebagai upaya pencegahan kasus kejahatan berbahasa di media digital. Bureaucracy Journal : Indonesia Journal of Law and Social-Political Governance, 3(2), 2116–2125. https://doi.org/10.53363/bureau.v3i2.311

Tomicic, I. (2023). Social engineering aspects of email phishing: An overview and taxonomy. 2023 46th ICT and Electronics Convention, MIPRO 2023 - Proceedings, 1201–1207. https://doi.org/10.23919/MIPRO57284.2023.10159691

Wallis, P. (2022). An enactivist account of mind reading in natural language understanding. Multimodal Technologies and Interaction, 6(5), 32. https://doi.org/10.3390/mti6050032

Warami, H. (2022). Kejahatan bahasa di wilayah hukum Papua Barat: Kajian linguistik forensik. Ranah: Jurnal Kajian Bahasa, 11(1), 76–93. https://doi.org/10.26499/rnh.v11i1.2699

Weaver, B. W., Braly, A. M. & Lane, D. M. (2021). Training users to identify phishing emails. Journal of Educational Computing Research, 59(6), 1169–1183. https://doi.org/10.1177/ 0735633121992516

Downloads

Additional Files

Published

2025-04-14

How to Cite

Ariyanto, Z. R. ., & Rahmawati, L. E. (2025). The form and meaning of language motifs in phishing crimes: A forensic linguistic study. LITE: Jurnal Bahasa, Sastra, Dan Budaya, 21(1), 270–289. https://doi.org/10.33633/lite.v21i1.11463

Issue

Section

Articles