Cyber Security Awareness Simulation for Web Phishing in E-Commerce
DOI:
https://doi.org/10.21512/emacsjournal.v7i1.12100Keywords:
cybersecurity, e-commerce, security awarenessAbstract
The development of information and communication technology has changed people's behavior in conducting transactions for buying and selling goods and services. With e-commerce, people can conduct transactions for buying and selling goods or services digitally. Although e-commerce can provide several positive impacts for society, one of which is through the ease of buying and selling goods digitally, e-commerce also has negative impacts for society, one of which is the risk of cybercrime, such as hacking, theft, and fraud. Therefore, consumers as e-commerce actors need to be protected, guarded, and secured. Protection in cyberspace is not only about strengthening the existing security system, but e-commerce users also need to be given an understanding and knowledge about cybersecurity to prevent data theft and hacking through phishing or other social engineering attacks. This study aims to build an application or feature that can increase security awareness for e-commerce users. The method used is the Waterfall method, as well as SIT (System Integration Testing) and UAT (User Acceptance Testing). Algorithm design involves the Dart programming language and the Flutter framework. The results of the study show that the applications or features created can increase security awareness among users and prevent the risk of cybercrime threats, such as fraud or hacking.
Plum Analytics
References
Ayu, S. S., & Nasution, M. I. P. (2023). Analysis of Privacy Data Leaks in E-Commerce Tokopedia. JUEB: Journal of Economics and Business, 2(3), 21-24.
Astuti, N. K., & Atmojo, R. N. P. (2022). CONSUMER PROTECTION OF INFORMATION SECURITY RISKS IN E-COMMERCE TRANSACTIONS. Honeste Vivere, 32(2), 98-107.
Awalia, S. A., Arhansyah, R. J., Nugroho, F. R. A., & Thapsuandji, A. A. (2024). Legal Protection for Consumers in Shopee E-commerce Transactions. Potential Journal, 3(1), 56-67.
Al Aziz, M. I., NB, M. R. A., Alauddin, M. F., & Neyman, S. N. (2024). Simulation and Cyber Security Education Efforts Using Phishing Websites. TEKTONIK: Journal of Engineering Science, 1(4), 74-80.
Djayapranata, G. F. (2023). The Influence of E-Commerce Site Service Provider Ethics on Satisfaction and Loyalty. INOBIS: Indonesian Journal of Business and Management Innovation, 6(4), 458-467.
Daeng, Y., Levin, J., Karolina, K., Prayudha, M. R., Ramadhani, N. P., Noverto, N., ... & Virgio, V. (2023). Analysis of the Implementation of Cyber Security Systems Against Cybercrime in Indonesia. Innovative: Journal Of Social Science Research, 3(6), 1135-1145.
Hidayat, T., Likadja, J. A. C., & Derozari, P. E. (2023). Legal Protection of Consumer Personal Data in Electronic Commerce. Journal of Comprehensive Science (JCS), 2(5), 1087-1103.
Harahap, W. I., Daulay, A. R. R., Alfisyahri, P. N., & Silalahi, P. R. (2023). Analysis of PT Tokopedia's Market Place Image in Increasing Consumer Trust After User Data Leaks. CEMERLANG: Journal of Management and Business Economics, 3(1), 29-41.
Hamim, N., & Nasution, M. I. P. (2023). Analysis of Legal Protection for Privacy Data Security on the Shopee Market Place. IJM: Indonesian Journal of Multidisciplinary, 1(4), 1235-1242.
Hidayah, A. R. (2022). SANCTIONS AGAINST E-COMMERCE ORGANIZERS IF THEY FAIL TO PROTECT USER'S PERSONAL DATA. Bureaucracy Journal: Indonesian Journal of Law and Social-Political Governance, 2(2), 397-410.
Hasya, D. K., Safitri, D., Putra, D. R., Maulana, F. B. G., & Rakhmawati, N. A. (2024). Ethical Implications in Online Fraud Profiles and Strategies in E-Commerce Transactions in the Realm of Cybercrime. Journal of Innovation Research Management, 2(1), 236-247.
Kehista, A. P., Fauzi, A., Tamara, A., Putri, I., Fauziah, N. A., Klarissa, S., & Damayanti, V. B. (2023). Security Analysis of Personal Data on E-Commerce Users: Threats, Risks, Security Strategies (Literature Review). Journal of Applied Management Science, 4(5), 625-632.
Lisnawati, T., Hussaen, S., Nuridah, S., Pramanik, N. D., Warella, S. Y., & Bahtiar, M. Y. (2023). Risk Management in E-commerce Business: Identifying, Measuring, and Managing Associated Risks. Tambusai Education Journal, 7(2), 8252-8529.
Putri, N. C. R., Fauzi, A., Ali, M. K., Ramadhan, N. A., Salsabilla, P. J., Cahya, L. J., & Ernawati, F. A. (2024). Strategy for Improving Customer Data Security in Online Sales at Tokopedia. Multi-Discipline Cyber Journal, 2(1), 54-67.
Rohmah, R. N. (2022). Efforts to Build Cyber Security Awareness among E-commerce Consumers in Indonesia. Commerce Scholar, 6(1), 1-11.
Rahmadi, G. (2020). Analysis of Cyber Security Awareness among E-Commerce Players in Indonesia.
Shaliha, F. L., Fauzi, A., Diniyah, I., Khairiyansyah, N., Salfaniz, S., Nuriah, S., & Wijaya, W. J. (2024). E-commerce and Online Shopping Security in the Digital Era. IJM: Indonesian Journal of Multidisciplinary, 2(4), 234-246.
Syahputra, R. A., Maliza, N. O., Kasmawati, K., & Putri, C. W. A. (2024). Strategy for Increasing Public Data and Information Awareness in the Digital Era. Indonesian Journal of Community Service, 5(3), 3164-3171.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Engineering, MAthematics and Computer Science Journal (EMACS)

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish with this journal agree to the following terms:
a. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License - Share Alike that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
b. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
c. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
USER RIGHTS
All articles published Open Access will be immediately and permanently free for everyone to read and download. We are continuously working with our author communities to select the best choice of license options, currently being defined for this journal as follows: Creative Commons Attribution-Share Alike (CC BY-SA)