Main Article Content

Indriyani
Dewi Aprinia

Abstract

Increased technological advancement must be accompanied by an increase in the potential for technology abuse. It is easier for criminals to commit crimes in today's modern and sophisticated civilization using increasingly advanced technology. Scam by telephone, text message, or other forms of communication is an example of a prevalent technologically-based criminal. This study aims to investigate the role of the blocking application for calls and text messages, especially the Truecaller application, given the prevalence of telephone and text messaging fraud and crime. This research focuses mainly on the efficiency of Truecaller's features and the application's popularity among the wider public.

Downloads

Download data is not yet available.

Article Details

How to Cite
Indriyani and Aprinia, D. (2022) “Role Of Truecaller Application In Preventing Phone Call And Text Message Scams”, Jurnal Mantik, 6(2), pp. 1475-1483. doi: 10.35335/mantik.v6i2.2533.
References
Al-Charchafchi, A., Manickam, S., & Alqattan, Z. N. M. (2020). Threats Against Information Privacy and Security in Social Networks: A Review (pp. 358–372). https://doi.org/10.1007/978-981-15-2693-0_26
Ammar, M., Russello, G., & Crispo, B. (2018). Internet of Things: A survey on the security of IoT frameworks. Journal of Information Security and Applications, 38, 8–27. https://doi.org/10.1016/j.jisa.2017.11.002
Ardi, Z., & Putri, S. A. (2020). The analysis of the social media impact on the millennial generation behavior and social interactions. Southeast Asian Journal of Technology and Science, 70–77.
Berawi, M. A. (2019). The Role of Industry 4.0 in Achieving Sustainable Development Goals. International Journal of Technology, 10(4), 644. https://doi.org/10.14716/ijtech.v10i4.3341
Djanggih, H. (2018). THE PHENOMENON OF CYBER CRIMES WHICH IMPACT CHILDREN AS VICTIMS IN INDONESIA. Yuridika, 33(2), 212. https://doi.org/10.20473/ydk.v33i2.7536
Graham, R. S., & Smith, S. K. (2019). Cybercrime and digital deviance. Routledge.
Helbostad, J., Vereijken, B., Becker, C., Todd, C., Taraldsen, K., Pijnappels, M., Aminian, K., & Mellone, S. (2017). Mobile Health Applications to Promote Active and Healthy Ageing. Sensors, 17(3), 622. https://doi.org/10.3390/s17030622
Holivia, A., & Suratman, T. (2021). Child Cyber Grooming Sebagai Bentuk Modus Baru Cyber Space Crimes. Bhirawa Law Journal, 2(1), 98–110.
Ismail, S. J. I., Kusnandar, T., Sanovia, Y., Mayasari, R., Negara, R. M., & Mahayana, D. (2021). Study of Internet and Social Media Addiction in Indonesia during Covid-19. IJAIT (International Journal of Applied Information Technology), 69. https://doi.org/10.25124/ijait.v4i02.3423
Nurse, J. R. (2018). Cybercrime and you: How criminals attack and the human factors that they seek to exploit. ArXiv Preprint ArXiv:1811.06624.
Pratt, T. C. (2018). The myth of the tech-savvy teen and the clueless senior citizen: Revisiting technology-based victimization over the life course. Criminal Justice Review, 43(3), 360–369.
Priansa, D. J., & Suryawardani, B. (2020). Effects of E-Marketing and Social Media Marketing on E-commerce Shopping Decisions. Jurnal Manajemen Indonesia, 20(1). https://doi.org/10.25124/jmi.v20i1.2800
Qosasi, A., Maulina, E., Purnomo, M., Muftiadi, A., Permana, E., & Febrian, F. (2019). The Impact of Information and Communication Technology Capability on the Competitive Advantage of Small Businesses. International Journal of Technology, 10(1), 167. https://doi.org/10.14716/ijtech.v10i1.2332
Sebayang, R. (2021). Mengenal Truecaller, Aplikasi untuk Blokir Telepon Spam. Https://Www.Idntimes.Com/Business/Finance/Rehia-Indrayanti-Br-Sebayang/Mengenal-Truecaller-Aplikasi-Untuk-Blokir-Telepon-Spam/7 .
Stubbs-Richardson, M., Hubbert, J., Nelson, S., Reid, A., Johnson, T., Young, G., & Hopkins, A. (2020). Not Your Typical Social Media Influencer: Exploring the Who, What, and Where of Islamic State Online Propaganda. International Journal of Cyber Criminology, 14(2), 479–496.
Thomas, J. E. (2018). Individual Cyber Security: Empowering Employees to Resist Spear Phishing to Prevent Identity Theft and Ransomware Attacks. International Journal of Business and Management, 13(6), 1. https://doi.org/10.5539/ijbm.v13n6p1
Truecaller. (2021). About Truecaller. Https://Www.Trucaller.Com/.
Unuth, N. (2021). Truecaller App Review. Https://Www.Lifewire.Com/Truecaller-App-4047272 .
Warner, K. S. R., & Wäger, M. (2019). Building dynamic capabilities for digital transformation: An ongoing process of strategic renewal. Long Range Planning, 52(3), 326–349. https://doi.org/10.1016/j.lrp.2018.12.001
Yohanna, A. (2020). The influence of social media on social interactions among students. Indonesian Journal of Social Sciences, 12(2), 34. https://doi.org/10.20473/ijss.v12i2.22907

Author Biographies

Indriyani, Institute of Technology and Business STIKOM Bali

Department of Information System

Dewi Aprinia, Institute of Technology and Business STIKOM Bali

Department of Information System