<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.3 20210610//EN"
  "https://jats.nlm.nih.gov/publishing/1.3/JATS-journalpublishing1-3.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" dtd-version="1.3" article-type="research-article">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">IJAR</journal-id>
      <journal-title-group>
        <journal-title>Indonesian Journal of Advanced Research</journal-title>
      </journal-title-group>
      <issn pub-type="epub">2986-0768</issn>
      <publisher>
        <publisher-name>Formosa Publisher</publisher-name>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="doi">10.55927/ijar.v4i8.15119</article-id>
      <title-group>
        <article-title>Artificial Intelligence Deepfake Against Cybercrime Threats</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author" corresp="yes">
          <name>
            <surname>Azhar</surname>
            <given-names>Faqih</given-names>
          </name>
          <aff>Faculty of Social and Political Sciences, University of Swadaya Gunung Jati</aff>
          <email>faqih.azhar41@gmail.com</email>
        </contrib>
        <contrib contrib-type="author">
          <name>
            <surname>Sulaimah</surname>
            <given-names></given-names>
          </name>
          <aff>Faculty of Social and Political Sciences, University of Swadaya Gunung Jati</aff>
        </contrib>
        <contrib contrib-type="author">
          <name>
            <surname>Imawan</surname>
            <given-names>Khaerudin</given-names>
          </name>
          <aff>Faculty of Social and Political Sciences, University of Swadaya Gunung Jati</aff>
        </contrib>
        <contrib contrib-type="author">
          <name>
            <surname>Hermawan</surname>
            <given-names>Abdul Jalil</given-names>
          </name>
          <aff>Faculty of Social and Political Sciences, University of Swadaya Gunung Jati</aff>
        </contrib>
      </contrib-group>
      <pub-date pub-type="epub">
        <day>20</day>
        <month>08</month>
        <year>2025</year>
      </pub-date>
      <history>
        <date date-type="received">
          <day>05</day>
          <month>07</month>
          <year>2025</year>
        </date>
        <date date-type="rev-recd">
          <day>19</day>
          <month>07</month>
          <year>2025</year>
        </date>
        <date date-type="accepted">
          <day>20</day>
          <month>08</month>
          <year>2025</year>
        </date>
      </history>
      <volume>4</volume>
      <issue>8</issue>
      <fpage>1815</fpage>
      <lpage>1828</lpage>
      <abstract>
        <p>This research aims to determine the practice of artificial intelligence in deepfake applications against cybercrime threats. Current technological developments have given rise to communication media using artificial intelligence technology in deepfake applications. The deepfake application can change a person’s visual and audio using a deep learning system and is widely used by the public and business actors. However, this technology often leads to cybercrime such as fraud and identity theft. This study uses a descriptive qualitative method with data collection through literature review and analysis descriptively. The findings answer problems related to fraud and identity theft, focusing on the East Java Governor case, and emphasize the need for preventive measures by the public and government to avoid misuse of deepfake applications.</p>
      </abstract>
      <kwd-group>
        <kwd>Artificial Intelligence</kwd>
        <kwd>Deepfake</kwd>
        <kwd>Cybercrime</kwd>
      </kwd-group>
      <permissions>
        <license>
          <ali:license_ref xmlns:ali="http://www.niso.org/schemas/ali/1.0/">http://creativecommons.org/licenses/by/4.0/</ali:license_ref>
          <license-p>This is an open-access article distributed under the terms of the Creative Commons Attribution 4.0 International License.</license-p>
        </license>
      </permissions>
    </article-meta>
  </front>

  <body>

<sec>
  <title>INTRODUCTION</title>
  <disp-quote>
    <p>Today's technological developments create benefits for users,
    especially for the community. Technology is usually used to interact
    or communicate with people, as well as for business transactions
    that require the help of technology.(Yoga, 2019) The emergence of
    technology makes it easier for people to live their daily lives.
    However, this convenience brings serious problems to society because
    technology is misused with the aim of harming others, one of which
    is the threat of fraud and identity theft. (Zamroni, 2017)</p>
    <p>The misuse of technology has a negative impact on society, where
    the crime is through a network or computer system called cybercrime.
    This crime has characteristics that are different from other crimes
    in terms of victims, perpetrators, crime scenes and causes of the
    case, so it requires regulation and handling outside of applicable
    regulations. Factors that cause cybercrime include negligence in the
    use of computers, security that is not properly maintained and the
    ease of unlimited internet access. (Lazarus et al., 2022)</p>
    <p>Cybercrime is related to the threat of fraud over the internet
    and the theft of identity or personal data. In addition to using the
    help of computer systems and internet networks, these crimes can
    also use new technology that is currently being developed, namely
    Artificial Intelligence technology (hereinafter referred to as AI).
    This technology is considered an artificial intelligence that was
    created to help make people's lives easier in various
    fields.(Ubaidillah et al., 2022) However, today, AI technology is
    misused by individuals who harm the public and are irresponsible by
    creating fake videos using deepfake applications.</p>
    <p>A deepfake application is an application that is used using
    artificial intelligence from deep learning and AI technology. This
    application originated from a combination of the word deep learning
    with the word fake which is interpreted as a technology to create
    fake multimedia content. Deepfake applications were created from
    2017, where the application became the center of attention all over
    the world.(Walczyna &amp; Piotrowski, 2023) Initially, deepfake
    applications were used to replace the faces of actors in movies and
    were considered temporary entertainment. However, as the times
    develop, deepfake applications are considered a serious threat to
    state security and become detrimental to society. (Muqsith &amp;
    Pratomo, 2021)</p>
    <p>The technology of deepfake applications is used to spoof images,
    conversational sounds and videos with very real results. An example
    of a deepfake application that is usually used is Animate Anyone
    from Alibaba Group. The app can make the images in the photo into a
    moving video or turn them into an animation. In addition, animate
    anyone can also change someone's face, manipulate sounds, and can
    take someone's face and paste it onto someone else's face. The use
    of deepfake applications is a place to establish communication in a
    virtual community which is a form of cyber culture. In this virtual
    community, a person will be free to express themselves to others in
    daily life. However, the sophistication resulting from this
    application can be a time bomb for society, where deepfake
    applications can be misused to spread false information to others
    and can steal the identity of others.(Kasita, 2022)</p>
    <p>This will raise a question about the use of AI technology in
    deepfake applications against fraud and identity theft in Indonesia.
    Based on this description, the researcher is interested in
    dismantling the practice of using artificial intelligence
    technology, especially deepfakes against the threat of cybercrime,
    especially in the case of the Fraud of the Governor of East Java,
    Khofifah. This paper aims to analyze and find out the correct use of
    AI technology to avoid cybercrime in the abuse of deepfakes. This
    writing is also expected to not only provide benefits for the
    author, but also to make a real contribution to the government and
    society, especially in dealing with cybercrime threats, as well as
    providing education and insight for readers about AI technology in
    deepfake applications to cybercrime threats.</p>
  </disp-quote>
</sec>





<sec>
  <title>LITERATURE REVIEW</title>
  <disp-quote>
    <p>Research materials related to artificial intelligence: deepfakes
    against cybercrime threats that will be a reference and comparison
    with this research are:</p>
  </disp-quote>
  <list list-type="alpha-lower">
    <list-item>
      <p>Research by Itsna Hidayatul Khuna on &quot;Deepfake, a new
      challenge for netizens&quot; from Promedia Journal: Public
      Relations and Communication Media Volume 5, Number 2 of 2019. The
      method used in the research is qualitative descriptive using
      literature sources from article writing. This study explains that
      deepfake applications are a challenge, which can cause widespread
      hatred, become a political and propaganda tool so that netizens
      are required to have good emotional intelligence when using the
      internet. (Hidayatul Khusna Sri Pangestuti, 2019)</p>
    </list-item>
    <list-item>
      <p>Research from Intan Leliana, et. al regarding &quot;Ethics in
      the Deepfake Era: How to Maintain Communication Integrity&quot;
      from the BSI Repository Journal Volume 1, Number 1 of 2024. The
      method used in the study is qualitative descriptive using
      literature methods from journals and books. This study explains
      that the use of artificial intelligence technology in deepfake
      applications if associated with cyber culture will affect
      integrity in communication ethics. The use of deepfake
      applications is very influential in a person's communication so
      that in its use, caution must be exercised so that there is no
      misuse of other people's faces or voices. (Leliana et al.,
      2024)</p>
    </list-item>
    <list-item>
      <p>Research from Najwa Ramadhina, et.al on &quot;Dynamics of
      Change in Human Communication in the Era of Artificial
      Intelligence Technology&quot; from the Journal of Communicator
      Sphere, Volume 3, Number 2 of 2023. The methods used in the study
      are literature review with the internet and document based
      research which is a reference for data. This research discusses
      the development of artificial intelligence technology that has a
      significant effect on human communication, where humans are faced
      with new challenges with the role of artificial intelligence
      technology as a link, so that in this case it requires effective
      collaboration between artificial intelligence and
      humans.(Ramadhina et al., 2023)</p>
    </list-item>
    <list-item>
      <p>Research from Pramana, et.al on &quot;Adapting to Technological
      Changes: Artificial Intelligence and the Evolution of
      Interpersonal Communication&quot; from the Scientific Journal of
      Social Dynamics Volume</p>
    </list-item>
  </list>
  <disp-quote>
    <p>7, Number 2, Year 2023. The method used in this study is
    qualitative descriptive by reviewing the literature with Elsevier
    and Google Scholar databases, printed books and other sources. This
    study discusses the evolution of interpersonal communication as part
    of adaptation to changes in communication technology using
    artificial intelligence or artificial intelligence. Unlike previous
    technology that has a role as a communication channel, this
    artificial intelligence can shift the role of communicators in human
    interpersonal communication. (Pramana et al., 2023)</p>
  </disp-quote>
  <list list-type="alpha-lower">
    <list-item>
      <label>e.</label>
      <p>Research from Moh. Rusnoto Susanto on &quot;Cybercultures and
      Social Change: A Pragmatic Review of the Phenomenon of
      Cybercultures&quot; from the Journal of Deconstruction Volume 9,
      Number 1 of 2023. The method used in the study is a
      phenomenological approach method that becomes a pragmatic study
      analysis knife to unravel the results of reflection on social
      changes that are critically reviewed on the phenomenon of
      cybercultures. This research produces a pragmatic study through
      contextual reflection through postcolonial studies and social
      change, as well as the relationship of social change through
      studies in the form of paradigmatic reflection of Baudrillard's
      simulacra theory and Gadamer's hermeneutic view of social change
      triggered by the phenomenon of cybercutres. (Moh. Rusnoto Susanto,
      2022)</p>
    </list-item>
  </list>
  <disp-quote>
    <p>The majority of earlier research on deepfake technology and
    cybercrime has focused on ethical issues, detection methods, or the
    political ramifications on a worldwide scale. However, there is
    still a dearth of study specifically addressing the misuse of
    deepfakes in Indonesia, especially when it comes to public
    authorities, and is examined utilising simulacra theory and cyber
    culture. By examining the Khofifah Indar Parawansa fraud case, this
    study fills the knowledge vacuum by offering a contextual
    understanding of how deepfake- driven hyperreality affects local
    communities' fraud, identity theft, and public trust.</p>
  </disp-quote>
</sec>







<sec>
  <title>METHODOLOGY</title>
  <disp-quote>
    <p>The research method used in this study is qualitative descriptive
    which is a method of depicting social problems that are happening in
    society, one of which is the use of AI technology in deepfake
    applications that are misused so that cybercrime threats occur, such
    as cases of fraud and identity theft in the community in Indonesia.
    This study tries to explain existing data and sources regarding the
    conditions and situations for the use of artificial intelligence
    technology in deepfake applications that create cases of fraud and
    identity theft in the people in Indonesia. Data collection in
    research uses literature studies which is a collection technique
    that uses tracing on the data and sources to be
    researched.(Sugiyono, 2019) This will produce data sources in the
    form of books, journals, articles, news and several other scientific
    research. After all the data has been collected, the researcher
    analyzes using a descriptive method by describing the facts that
    have been obtained from the data and sources to be further analyzed
    so as to produce a discussion formulation in the research. (Fadli,
    2021) The</p>
    <p>analytical knife used in this study, namely the Simulacra theory
    (simulacrum) explained by Jean Baudrillard, states that where
    reality exists is pseudo-reality and artificial reality
    (hyper-reality). This theory explains that engineering in the media
    of technology creates a single condition, where everything is
    considered more real than reality. Humans cannot distinguish between
    falsehood and truth, which is how AI technology works in creating
    artificial media that cannot distinguish truth and falsehood. The AI
    technology applied in deepfake applications has benefits for
    commercial and other interests, but it also poses a serious threat
    to the personal data of the people who are being misused.</p>
  </disp-quote>
</sec>





<sec>
  <title>RESEARCH RESULTS AND DISCUSSION</title>
  <sec id="working-process-of-artificial-intelligence-technology">
    <title>Working Process of Artificial Intelligence Technology</title>
    <disp-quote>
      <p>AI technology that continues to develop has a significant
      impact on information exchange and communication methods that have
      created a new trend in obtaining more efficient and effective
      information. Gunkel said that AI technology in the field of
      communication was created as a way for humans to exchange
      information.(Nurkholis &amp; Ikasari, 2023) The function of AI
      technology as a communicator between interlocutors through robot
      technology is created to communicate verbally and non-verbally
      with ordinary humans. In addition to facilitating communication,
      AI technology also automates and optimizes communication through
      audio visuals that can change according to the voice that is
      communicating. (Malatji &amp; Tolah, 2024)</p>
      <p>Perkembangan teknologi secara cepat di berbagai macam bidang
      ilmu dapat memudahkan masyarakat berkomunikasi, dimana hal
      tersebut didukung dengan kelahiran teknologi baru, yaitu
      Artificial Intelligence (AI). Teknologi ini diciptakan oleh Alan
      Turing yang merupakan ilmuwan asal Inggris yang membuat tes
      gagasan dalam memastikan kecerdasan alat tersebut sehingga hasil
      penelitiannya dinamakan Turing test. Selanjutnya teknologi AI
      ditunjukan pada acara Dartmouth Conference tahun 1956 kepada
      Professor John McCarthy yang berasal dari Massachusetts Institute
      of Technology (Mobarakeh, 2023). The designation is intended so
      that artificial intelligence can resemble and identify the
      thinking of normal humans so that machines can be created that can
      imitate real humans.</p>
      <p>AI technology that continues to develop has a significant
      impact on information exchange and communication methods that have
      created a new trend in obtaining more efficient and effective
      information. Gunkel said that AI technology in the field of
      communication was created as a way for humans to exchange
      information.(Nurkholis &amp; Ikasari, 2023) The function of AI
      technology as a communicator between interlocutors through robot
      technology is created to communicate verbally and non-verbally
      with ordinary humans. In addition to facilitating communication,
      AI technology also automates and optimizes communication through
      audio visuals that can change according to the voice that is
      communicating. (Malatji &amp; Tolah, 2024)</p>
      <p>AI technology has penetrated into several applications used by
      humans every day, including:</p>
    </disp-quote>
    <list list-type="alpha-lower">
      <list-item>
        <p>Social media that uses the help of AI technology, such as
        Facebook, Instagram and X (Twitter). The help of AI technology
        can help humans to find the content or information needed
        through words or images searched on social media.</p>
      </list-item>
      <list-item>
        <p>Google's search engine features have used the help of AI
        technology to get the most appropriate and relevant search
        results to the information needed.</p>
      </list-item>
      <list-item>
        <p>The ChatGPT application, which appeared at the end of 2022,
        has helped humans to search for useful references and
        information.</p>
      </list-item>
      <list-item>
        <p>Deepfake applications that can turn a person's visuals and
        audio into someone else in the form of photos and videos. This
        application has many mock applications that are used for free,
        such as deepswap, basedlabs, Vidnoz, Pixble, swapface and other
        applications.</p>
      </list-item>
    </list>
  </sec>
  <sec id="changes-before-and-after-using-artificial-intelligence-ai-technology">
    <title>Changes Before and After Using Artificial Intelligence (AI)
    Technology</title>
    <disp-quote>
      <p>Before using AI technology, people communicated by phone
      without looking at the visual form and images, and when searching
      for information, there were limitations that could only be found
      in physical or printed sources. Unlike after using AI technology,
      people can find out the audio and visuals of their interlocutors
      when communicating online through streams, video calls and online
      meetings, and can search for various kinds of information with
      search engine features.</p>
      <p>The use of AI technology as a communication tool is currently
      widely used in global marketing strategies in a country, one of
      which is in the field of Korean Pop (Kpop) music. The emergence of
      AI technology is motivated by public interest in Kpop music and
      supported by the excellence of human resources in creating AI
      technology innovations for the music industry. One example of the
      use of AI technology in the Kpop music industry is online
      concerts, streaming and fansigning, through video calls between
      artists and their fans. This is done by SM Entertainment, which is
      the largest Kpop agency in South Korea that already uses the
      concept of AI technology in the marketing of its artists' music.
      In addition to being used for marketing Kpop artists, an
      information and technology company in South Korea, Pulse9
      Entertainment, has created the development of AI technology that
      created a virtual girl group called Eternity. (Fadilla et al.,
      2023)</p>
      <p>AI technology is also useful for helping humans in various
      other fields besides communication, where there are changes before
      and after using AI technology, including:</p>
    </disp-quote>
    <list list-type="alpha-lower">
      <list-item>
        <p>Health</p>
      </list-item>
    </list>
    <disp-quote>
      <p>Before the advent of AI technology, treatment and diagnosis
      were carried out on the basis of doctors' medical experience and
      knowledge. Unlike after the advent of AI technology, diagnoses can
      be strengthened by the analysis of big data from various
      sources.</p>
    </disp-quote>
    <list list-type="alpha-lower">
      <list-item>
        <p>Education</p>
      </list-item>
    </list>
    <disp-quote>
      <p>Before the advent of AI technology, teaching methods used
      traditional approaches, where teachers provided subject matter and
      students learned by</p>
      <p>listening to or reading textbooks. Unlike AI technology,
      teaching methods use online platforms, and other digital
      resources.</p>
    </disp-quote>
    <list list-type="alpha-lower">
      <list-item>
        <label>b.</label>
        <p>Scientific Research Fields</p>
      </list-item>
    </list>
    <disp-quote>
      <p>Before the advent of AI technology, data analysis was often
      done manually by researchers, so it often required a lot of time
      and effort. It is different after the existence of AI technology,
      where research becomes more efficient supported by research
      models, such as machine learning and deep learning.</p>
    </disp-quote>
    <list list-type="alpha-lower">
      <list-item>
        <label>c.</label>
        <p>Transportation Field</p>
      </list-item>
    </list>
    <disp-quote>
      <p>Before AI technology, vehicles did not have a navigation system
      to find the right route and did not have the ability to
      communicate with each other. Unlike after the existence of AI
      technology, vehicles already have a connected GPS system to allow
      for more efficient route planning, and have a connected system
      that can communicate with each other so that it adapts to the
      surrounding infrastructure and as a prevention of collisions.</p>
    </disp-quote>
  </sec>
  <sec id="potential-for-deepfake-applications-for-cyber-crime-in-the-east-java-governor-fraud-case">
    <title>Potential for Deepfake Applications for Cyber Crime in the
    East Java Governor Fraud Case</title>
    <disp-quote>
      <p>Deepfakes are a type of artificial intelligence that uses a
      deep learning method with the Generative Adversarial Network (GAN)
      algorithm. This technology is used to create photos, videos, and
      audio that are similar to reality. Deepfake technology has a
      mechanism by collecting data that is spread across the internet.
      The data is then generated by adjusting the conditions requested
      by the user, whether it is adjusting facial expressions, voice
      intonation, or facial expressions. (Jufri &amp; Putra, 2021)</p>
      <p>Technological advances in the current era of modernization and
      globalization require people to continue to adapt to the use of
      technology that makes it easier for people to communicate and
      access any information. The development of technology brings
      social changes to society, where technology creates innovative and
      logical advances for humans that make people's behavior more
      instant with all the convenience provided by technology. This
      technological advancement does not rule out the potential for
      cases of fraud and theft of people's personal data.(Yusuf &amp; Ar
      Rosyid, 2023) Over time, the number of technology users is
      increasing, so it requires protection of people's personal data.
      In such cases, legal regulations are needed that can protect
      people's personal data, especially in cases of fraud and identity
      theft in Indonesia. This aims to protect the privacy of the
      community and not interfere with people's private lives. (Anggen
      Suari &amp; Sarjana, 2023)</p>
      <p>Deepfake applications are a combination of AI technology
      products with deep learning technology products which are
      techniques for detecting and recognizing human faces through
      images and audio visuals. In addition, the capabilities of
      deepfake applications are also applied in the creation of video
      and audio visuals that are made to look real even though the
      original shape of their faces and voices is fake.</p>
      <p>The use of deepfake applications is not only used in the music
      industry, but can be used as a means of communication and business
      transactions.(Haeruddin et al., 2023) But over time, the use of
      deepfake</p>
      <p>applications can also be abused by a person. Based on the view
      of cyber culture regarding the use of artificial intelligence
      technology in deepfake applications, it is a very worrying problem
      of cyberspace in the current era of technological development
      because the results of deepfake applications are similar to the
      real ones and cannot distinguish between what is real and which is
      the result of deepfake applications.(Uchendu et al., 2021)</p>
      <p>The exploitation of the abuse of deepfake applications in AI
      practice was experienced by one of the officials in Indonesia.
      With the development of Artificial Intelligence, especially
      deepfakes that are increasingly rapid in society, of course, not a
      few cybercrime individuals have emerged. One of them is the
      deepfake fraud case of the Governor of East Java, Khofifah Indar
      Parawansa.</p>
    </disp-quote>
    <graphic mimetype="image" mime-subtype="jpeg" xlink:href="vertopal_2881cde453874422b94512f2b4549b89/media/image3.jpeg" />
    <disp-quote>
      <p>Figure 1. Source: kominfo.jatimprov.go.id/berita.</p>
      <p>According to a KOMINFO report, these fraudsters manipulated
      using Artificial Intelligence deepfake technology to imitate
      Governor Khofifah's face. East Java Police Chief, Inspector
      General of Police Nanang Avianto, said that the three perpetrators
      were arrested when they received a report of fraud using a video
      of East Java Governor Khofifah Indar Parawansa using Artificial
      Intelligence technology selling cheap motorcycles to the public on
      social media. The video contains a face and voice that is very
      similar to Governor Khofifah, selling cheap motorbikes for 500
      thousand rupiah to the public. As if it is a special subsidy
      program from the Governor of East Java for East Java residents,
      without an on-site payment process (COD) and complete official
      documents.</p>
      <p>The video of the Khofifah deepfake manipulation fraud was
      uploaded by the perpetrators to a number of TikTok social media
      @khofiggh759, @khofiljatim, @khofiaamlxh, and several other
      accounts. As long as the perpetrators carry out the action, they
      all have different roles. One perpetrator made a video using
      deepfake AI technology and also created a bank account, another
      perpetrator uploaded a video on social media, and the last
      perpetrator became the admin of the Whatsapp application. When the
      victims of the deepfake video are tempted by the offer of cheap
      motorcycles, they will contact the Whatsapp number listed by the
      perpetrators on TikTok accounts claiming to be Governor
      Khofifah.</p>
      <graphic mimetype="image" mime-subtype="jpeg" xlink:href="vertopal_2881cde453874422b94512f2b4549b89/media/image4.jpeg" />
      <p>Figure 2. Source: kominfo.jatimprov.go.id/berita.</p>
      <p>This deepfake scam lasted for three months. The perpetrators
      received profits of 86 million rupiah from the victims who came
      from four different provinces. Starting from East Java Province,
      West Java, Central Java, to North Maluku Province. The fraud case
      adds to the public's concern about the improper use of technology.
      (Mustofa et al., 2023)</p>
      <p>Cases of fraud and identity theft cause a lot of losses to
      society, so it is necessary to analyze from the perspective of
      cyber culture regarding AI technology in Deepfake Applications
      against the threat of fraud and identity theft. (Mustofa et al.,
      2023)</p>
      <p>Current technological developments have given rise to
      technology in the form of artificial intelligence applied by
      deepfake applications used as a medium of communication between
      parties in various countries by changing a person's visuals,
      audio, and video. The use of deepfake applications has also been
      applied in filters on social media applications, such as
      Instagram, Snapchat and Tiktok. (’Uyun &amp; Hakim, 2020) In its
      current use, it is entertaining and positive for everyone, but in
      the long term it will cause abuse in the use of artificial
      intelligence technology in the deepfake application which has the
      potential to harm individuals or groups of people.</p>
      <p>The threat of cybercrime in the form of fraud and identity
      theft using artificial intelligence technology in deepfake
      applications is an illustration of the hyperreality stated by Jean
      Baudrilard in the Simulacra Theory. The Simulacra theory explains
      that engineering in the medium of technology will create a single
      condition, where everything is considered more real than reality.
      The results of artificial intelligence technology in deepfake
      applications create falsehoods that are considered more true than
      the truth so that humans cannot distinguish between real and fake.
      In the case of East Java Governor Khofifah's deepfake, the fraud
      victims believed the AI-generated video with a face and voice that
      was very similar to Khofifah's. Then without cross-checking
      further information, they followed the instructions of the
      scammers to transfer some money because the pseudo-reality video
      was difficult to distinguish from the real reality.</p>
      <p>The use of artificial intelligence technology in deepfake
      applications is worth watching out for because the application is
      widely accessible to the public</p>
      <p>so that ordinary users can use it by collecting photos that
      will be used as objects and one video to attach the face object.
      The use of this technology can cause problems and losses for some
      parties. (Malik et al., 2022) If a deepfake application is used in
      the political field as in the case of Governor Khofifah's deepfake
      which was discussed earlier, this will be something dangerous
      because it will be easier to lead the opinion of political figures
      by adjusting the voice, face and lips of the figure without the
      permission of the figure concerned. Apart from politics, the use
      of deepfake applications using photos or videos of other objects
      without permission will cause other problems so that deepfake
      applications must be considered by everyone. Artificial
      intelligence technology in deepfake applications will give rise to
      other criminal acts, one of which is fraud and identity theft.
      (Rana et al., 2022)</p>
      <p>The act of fraud and identity theft using artificial
      intelligence technology in deepfake applications affects the
      security of cyber space in the community, where people feel unsafe
      in communicating or conveying information through social media
      applications that have deepfake applications.(Seow et al., 2022)
      The impact of these actions causes the cyber culture that develops
      in society to create a sense of worry and fear for the public, if
      information belonging to the public is misused by irresponsible
      deepfake application users and individuals who will launch
      fraudulent crimes using information data belonging to the public.
      (Patel et al., 2023)</p>
    </disp-quote>
  </sec>
  <sec id="the-correct-use-of-ai-technology-to-avoid-cybercrime-in-deepfake-abuse">
    <title>The Correct Use of AI Technology to Avoid Cybercrime in
    Deepfake Abuse</title>
    <disp-quote>
      <p>Media and cyberspace have led to the growth of cultural renewal
      that gives rise to cyber culture . Cyber culture is considered a
      value that originates from interaction between parties which in
      its application is related to the media. This value will be
      recognized directly and indirectly which will then be implemented
      in the interaction between the parties. The characteristics of
      cyber culture will have an effect on life related to cyber space
      or called cyberspace in the community environment.(Prasad
      Adhikary, 2020) In the study of cyber culture, the internet is a
      simple communication medium when compared to direct face-to-face
      communication media. This is due to the development of the
      generation that has used applications to convey messages in the
      form of emoticons or writings so that it is useful to convey
      understanding or information between the two parties. (Purwanto
      &amp; Nuha, 2020)</p>
      <p>The presence of deepfake applications requires a holistic
      approach to the use of artificial intelligence technology, where
      the approach is in the form of providing overall support, both in
      mental, physical, social, spiritual and emotional well-being. This
      aims to enable the public to recognize, overcome and understand
      problems that arise through deepfake applications, as well as
      maintain the integrity of communication to avoid manipulative and
      incorrect information (Leliana et al., 2024). In maintaining
      integrity in communication ethics, the government, the community
      and institutions must work together to improve communication
      standards, especially in the use of social media.</p>
      <p>Cases of fraud and theft of personal data due to the use of
      deepfake applications require improvements in the form of actions
      to improve the cyber culture of the community towards the correct
      use of artificial intelligence</p>
      <p>technology . These actions can be in the form of notifications
      about false information and checking reliable sources so that the
      results of communication through deepfake applications can be
      known for the truth and specific explanations. In addition,
      technology-related institutions and the government are obliged to
      adopt provisions that can limit the use of deepfake applications
      incorrectly, where these provisions are in accordance with public
      freedom of speech and the protection of people's personal
      data.</p>
      <p>The application of artificial intelligence (AI) technology
      according to simulacra theory is a representation of natural
      relationships in various elements of human life and is also the
      beginning of the era of the industrial revolution. Simulacra
      theory is a theory of space where the mechanism of simulating
      human life takes place. If the use of AI technology has a negative
      impact on human life, then there has been a shift in the mechanism
      of representation of simulacra theory that was born as a
      consequence of the development of information technology science.
      Since the existence of AI technology, human life has changed where
      it has become easier for humans to find information, communicate
      with others, find new insights and lifestyles. This creates a
      habit in human life every day. In this condition, humans have been
      trapped and trapped in a new reality space that is considered
      real, when in fact it is included in a pseudo-reality, all fake
      and full of engineering. The pseudo-reality in question is the
      antithesis space of a kind of deconstruction. (Moh. Rusnoto
      Susanto, 2022)</p>
      <p>The entire reality of human life in various fields has in fact
      been constructed through some pre-made models. The development of
      AI technology not only extends the human body or life system, but
      can reproduce nostalgia, reality and the human past. The reality
      created by AI technology has taken over the real reality and has
      become a new reference model for the community. These symptoms
      will be directly proportional to technological developments and
      the entry of the latest era of life of the world's people in the
      flow of cybercultures.</p>
    </disp-quote>
  </sec>
</sec>





<sec>
  <title>CONCLUSIONS AND RECOMMENDATIONS</title>
  <disp-quote>
    <p>There are various restrictions on this study. First of all, it
    only uses secondary data and literature reviews, which could not be
    up to date with the latest advancements in deepfake technology or
    law enforcement procedures. Second, because the study only looks at
    one instance, its conclusions might not apply to all cybercrime
    cases in Indonesia that involve deepfakes. Third, the analysis
    focusses on simulacra theory and cyber culture rather than
    technological detection techniques or comprehensive legal
    frameworks, which can be studied in more detail in further
    research.</p>
    <p>Conclusions related to artificial intelligence deepfakes against
    the threat of cybercrime, as follows:</p>
  </disp-quote>
  <list list-type="order">
    <list-item>
      <p>AI technology that continues to develop has a significant
      impact on information exchange and communication methods that have
      created a new trend in obtaining more efficient and effective
      information.</p>
    </list-item>
    <list-item>
      <p>Before using AI technology, people communicated by phone
      without looking at the visual form and images, and when searching
      for information, there were limitations that could only be found
      in physical or</p>
    </list-item>
  </list>
  <disp-quote>
    <p>printed sources. Unlike after using AI technology, people can
    know the audio and visuals of their interlocutors when communicating
    online through streams, video calls and online meetings, and can
    search for various kinds of information with search engine
    features.</p>
  </disp-quote>
  <list list-type="order">
    <list-item>
      <label>3.</label>
      <p>Deepfake applications are a combination of AI technology
      products with deep learning technology products which are
      techniques for detecting and recognizing human faces through
      images and audio visuals. The use of deepfake applications is
      abused both in the music industry, politics and other fields,
      where the abuse is indicated by acts of fraud and identity theft
      of a person's personal data.</p>
    </list-item>
    <list-item>
      <label>4.</label>
      <p>If the use of AI technology has a negative impact on human
      life, then there has been a shift in the mechanism of
      representation of simulacra theory that was born as a consequence
      of the development of information technology science. Since the
      existence of AI technology, human life has changed where it has
      become easier for humans to find information, communicate with
      others, find new insights and lifestyles. This creates a habit in
      human life every day.</p>
    </list-item>
  </list>
  <disp-quote>
    <p>The presence of deepfake applications requires a holistic
    approach to the use of artificial intelligence technology, where the
    approach is in the form of providing overall support, both in
    mental, physical, social, spiritual and emotional well-being. This
    aims to enable the public to recognize, overcome and understand
    problems that arise through deepfake applications, as well as
    maintain the integrity of communication to avoid manipulative and
    incorrect information.</p>
  </disp-quote>
</sec>





<sec>
  <title>ADVANCED RESEARCH</title>
  <disp-quote>
    <p>Based on the above conclusions, further study is needed to
    explore comprehensive strategies for mitigating the negative impacts
    of deepfake technology within the broader scope of cybercrime.
    Future research could examine the development of advanced detection
    systems, legal and ethical frameworks, and public awareness
    initiatives that emphasize digital literacy. In particular, studies
    should focus on how deepfake misuse affects individual privacy,
    trust in digital communication, and societal security, while also
    exploring multidisciplinary approaches combining technological,
    psychological, and legal perspectives to foster resilience against
    AI driven manipulation.</p>
  </disp-quote>
</sec>







<sec>
  <title>REFERENCES</title>
    <ref-list>

      <ref id="ref1">
        <element-citation publication-type="journal">
          <person-group person-group-type="author">
            <name><surname>’Uyun</surname><given-names>Z. Q.</given-names></name>
            <name><surname>Hakim</surname><given-names>L.</given-names></name>
          </person-group>
          <article-title>CYBER CULTURE OF SOCIAL MEDIA: IDENTITY AS TRASH OF INFORMATION</article-title>
          <source>ORASI: Jurnal Dakwah Dan Komunikasi</source>
          <year>2020</year>
          <volume>11</volume>
          <issue>1</issue>
          <pub-id pub-id-type="doi">10.24235/orasi.v11i1.6264</pub-id>
        </element-citation>
      </ref>

      <ref id="ref2">
        <element-citation publication-type="journal">
          <person-group person-group-type="author">
            <name><surname>Anggen Suari</surname><given-names>K. R.</given-names></name>
            <name><surname>Sarjana</surname><given-names>I. M.</given-names></name>
          </person-group>
          <article-title>Menjaga Privasi di Era Digital: Perlindungan Data Pribadi di Indonesia</article-title>
          <source>Jurnal Analisis Hukum</source>
          <year>2023</year>
          <volume>6</volume>
          <issue>1</issue>
          <pub-id pub-id-type="doi">10.38043/jah.v6i1.4484</pub-id>
        </element-citation>
      </ref>

      <ref id="ref3">
        <element-citation publication-type="web">
          <person-group person-group-type="author">
            <name><surname>Dinas Komunikasi dan Informatika Provinsi Jawa Timur</surname></name>
          </person-group>
          <article-title>Polda Jatim ungkap kasus penipuan deepfake AI kepala daerah, pelaku kantongi keuntungan hingga Rp87 juta</article-title>
          <source>Kominfo Jatim</source>
          <year>2025</year>
          <month>04</month>
          <day>28</day>
          <pub-id pub-id-type="uri">https://kominfo.jatimprov.go.id/berita/polda-jatim-ungkap-kasus-penipuan-deepfake-ai-kepala-daerah-pelaku-kantongi-keuntungan-hingga-rp87-juta</pub-id>
        </element-citation>
      </ref>

      <ref id="ref4">
        <element-citation publication-type="journal">
          <person-group person-group-type="author">
            <name><surname>Fadilla</surname><given-names>A. N.</given-names></name>
            <name><surname>Ramadhani</surname><given-names>P. M.</given-names></name>
            <name><surname>Handriyotopo</surname><given-names>H.</given-names></name>
          </person-group>
          <article-title>Problematika Penggunaan AI (Artificial Intellegence) di Bidang Ilustrasi : AI VS Artist</article-title>
          <source>CITRAWIRA : Journal of Advertising and Visual Communication</source>
          <year>2023</year>
          <volume>4</volume>
          <issue>1</issue>
          <pub-id pub-id-type="doi">10.33153/citrawira.v4i1.4741</pub-id>
        </element-citation>
      </ref>

      <ref id="ref5">
        <element-citation publication-type="journal">
          <person-group person-group-type="author">
            <name><surname>Fadli</surname><given-names>M. R.</given-names></name>
          </person-group>
          <article-title>Memahami desain metode penelitian kualitatif</article-title>
          <source>HUMANIKA</source>
          <year>2021</year>
          <volume>21</volume>
          <issue>1</issue>
          <pub-id pub-id-type="doi">10.21831/hum.v21i1.38075</pub-id>
        </element-citation>
      </ref>

      <ref id="ref6">
        <element-citation publication-type="journal">
          <person-group person-group-type="author">
            <name><surname>Haeruddin</surname><given-names>H.</given-names></name>
            <name><surname>Herman</surname><given-names>H.</given-names></name>
            <name><surname>Hendri</surname><given-names>P. P.</given-names></name>
          </person-group>
          <article-title>Pengembangan Aplikasi Emoticon Recognition dan Facial Recognition menggunakan Algoritma Local Binary Pattern Histogram (LBPH) dan Convolutional Neural Network (CNN)</article-title>
          <source>Jurnal Teknologi Terpadu</source>
          <year>2023</year>
          <volume>9</volume>
          <issue>1</issue>
          <pub-id pub-id-type="doi">10.54914/jtt.v9i1.613</pub-id>
        </element-citation>
      </ref>

      <ref id="ref7">
        <element-citation publication-type="journal">
          <person-group person-group-type="author">
            <name><surname>Hidayatul Khusna Sri Pangestuti</surname><given-names>I.</given-names></name>
          </person-group>
          <article-title>Deepfake, Tantangan Baru Untuk Netizen Deepfake, a New Challenge for Netizen</article-title>
          <source>AGUSTUS 1945 JAKARTA 1 PROMEDIA</source>
          <year>2019</year>
          <volume>2</volume>
        </element-citation>
      </ref>

      <ref id="ref8">
        <element-citation publication-type="journal">
          <person-group person-group-type="author">
            <name><surname>Jufri</surname><given-names>M. A. A.</given-names></name>
            <name><surname>Putra</surname><given-names>A. K.</given-names></name>
          </person-group>
          <article-title>Aspek Hukum Internasional Dalam Pemanfaatan Deepfake Technology Terhadap Perlindungan Data Pribadi</article-title>
          <source>Uti Possidetis: Journal of International Law</source>
          <year>2021</year>
          <volume>2</volume>
          <issue>1</issue>
          <pub-id pub-id-type="doi">10.22437/up.v2i1.11093</pub-id>
        </element-citation>
      </ref>

      <ref id="ref9">
        <element-citation publication-type="journal">
          <person-group person-group-type="author">
            <name><surname>Kasita</surname><given-names>I. D.</given-names></name>
          </person-group>
          <article-title>Deepfake Pornografi: Tren Kekerasan Gender Berbasis Online (KGBO) Di Era Pandemi Covid-19</article-title>
          <source>Jurnal Wanita Dan Keluarga</source>
          <year>2022</year>
          <volume>3</volume>
          <issue>1</issue>
          <pub-id pub-id-type="doi">10.22146/jwk.5202</pub-id>
        </element-citation>
      </ref>

      <ref id="ref10">
        <element-citation publication-type="journal">
          <person-group person-group-type="author">
            <name><surname>Lazarus</surname><given-names>S.</given-names></name>
            <name><surname>Button</surname><given-names>M.</given-names></name>
            <name><surname>Kapend</surname><given-names>R.</given-names></name>
          </person-group>
          <article-title>Exploring the value of feminist theory in understanding digital crimes: Gender and cybercrime types</article-title>
          <source>Howard Journal of Crime and Justice</source>
          <year>2022</year>
          <volume>61</volume>
          <issue>3</issue>
          <pub-id pub-id-type="doi">10.1111/hojo.12485</pub-id>
        </element-citation>
      </ref>

      <ref id="ref11">
        <element-citation publication-type="journal">
          <person-group person-group-type="author">
            <name><surname>Leliana</surname><given-names>I.</given-names></name>
            <name><surname>Irhamdhika</surname><given-names>G.</given-names></name>
            <name><surname>Haikal</surname><given-names>A.</given-names></name>
            <name><surname>Septian</surname><given-names>R.</given-names></name>
            <name><surname>Kusnadi</surname><given-names>E.</given-names></name>
          </person-group>
          <article-title>ETIKA DALAM ERA DEEPFAKE: BAGAIMANA MENJAGA INTEGRITAS KOMUNIKASI</article-title>
          <source>Jurnal Visi Komunikasi</source>
          <year>2024</year>
          <volume>22</volume>
          <issue>02</issue>
          <pub-id pub-id-type="doi">10.22441/visikom.v22i02.24229</pub-id>
        </element-citation>
      </ref>

      <ref id="ref12">
        <element-citation publication-type="journal">
          <person-group person-group-type="author">
            <name><surname>Malatji</surname><given-names>M.</given-names></name>
            <name><surname>Tolah</surname><given-names>A.</given-names></name>
          </person-group>
          <article-title>Artificial intelligence (AI) cybersecurity dimensions: a comprehensive framework for understanding adversarial and offensive AI</article-title>
          <source>AI and Ethics</source>
          <year>2024</year>
          <pub-id pub-id-type="doi">10.1007/s43681-024-00427-4</pub-id>
        </element-citation>
      </ref>

      <ref id="ref13">
        <element-citation publication-type="journal">
          <person-group person-group-type="author">
            <name><surname>Malik</surname><given-names>A.</given-names></name>
            <name><surname>Kuribayashi</surname><given-names>M.</given-names></name>
            <name><surname>Abdullahi</surname><given-names>S. M.</given-names></name>
            <name><surname>Khan</surname><given-names>A. N.</given-names></name>
          </person-group>
          <article-title>DeepFake Detection for Human Face Images and Videos: A Survey</article-title>
          <source>IEEE Access</source>
          <year>2022</year>
          <volume>10</volume>
          <pub-id pub-id-type="doi">10.1109/ACCESS.2022.3151186</pub-id>
        </element-citation>
      </ref>

      <ref id="ref14">
        <element-citation publication-type="patent">
          <person-group person-group-type="author">
            <name><surname>Mobarakeh</surname><given-names>B. I.</given-names></name>
          </person-group>
          <article-title>Systems and method for medical platform employing artificial intelligence and wearable devices</article-title>
          <source>US Patent App. 17/821,101</source>
          <year>2023</year>
        </element-citation>
      </ref>

      <ref id="ref15">
        <element-citation publication-type="journal">
          <person-group person-group-type="author">
            <name><surname>Moh. Rusnoto Susanto</surname></name>
          </person-group>
          <article-title>Cybercultures dan Perubahan Sosial: Sebuah Tinjauan Pragmatis Terhadap Fenomena Cybercultures</article-title>
          <source>Dekonstruksi</source>
          <year>2022</year>
          <volume>9</volume>
          <issue>01</issue>
          <pub-id pub-id-type="doi">10.54154/dekonstruksi.v9i01.126</pub-id>
        </element-citation>
      </ref>

      <ref id="ref16">
        <element-citation publication-type="journal">
          <person-group person-group-type="author">
            <name><surname>Muqsith</surname><given-names>M. A.</given-names></name>
            <name><surname>Pratomo</surname><given-names>R. R.</given-names></name>
          </person-group>
          <article-title>The Development of Fake News in the Post-Truth Age</article-title>
          <source>SALAM: Jurnal Sosial Dan Budaya Syar-I</source>
          <year>2021</year>
          <volume>8</volume>
          <issue>5</issue>
          <pub-id pub-id-type="doi">10.15408/sjsbs.v8i5.22395</pub-id>
        </element-citation>
      </ref>

      <ref id="ref17">
        <element-citation publication-type="journal">
          <person-group person-group-type="author">
            <name><surname>Mustofa</surname><given-names>Z.</given-names></name>
            <name><surname>Arifatuzzahro</surname><given-names>A.</given-names></name>
            <name><surname>Nazira</surname><given-names>A.</given-names></name>
            <name><surname>Wahyuni</surname><given-names>R. D.</given-names></name>
            <name><surname>Mukminin</surname><given-names>A.</given-names></name>
          </person-group>
          <article-title>PENGARUH PENERAPAN ARTIFICIAL INTELLEGENCE PADA KEHIDUPAN MASYARAKAT DI INDONESIA</article-title>
          <source>Lisyabab : Jurnal Studi Islam Dan Sosial</source>
          <year>2023</year>
          <volume>4</volume>
          <issue>1</issue>
          <pub-id pub-id-type="doi">10.58326/jurnallisyabab.v4i1.184</pub-id>
        </element-citation>
      </ref>

      <ref id="ref18">
        <element-citation publication-type="journal">
          <person-group person-group-type="author">
            <name><surname>Nurkholis</surname><given-names>A.</given-names></name>
            <name><surname>Ikasari</surname><given-names>I. H.</given-names></name>
          </person-group>
          <article-title>Peran Artificial Intellegence dalam Sistem Informasi Manajemen</article-title>
          <source>Jurnal Artificial Inteligent Dan Sistem Penunjang Keputusan</source>
          <year>2023</year>
          <volume>1</volume>
          <issue>1</issue>
        </element-citation>
      </ref>

      <ref id="ref19">
        <element-citation publication-type="journal">
          <person-group person-group-type="author">
            <name><surname>Patel</surname><given-names>Y.</given-names></name>
            <name><surname>Tanwar</surname><given-names>S.</given-names></name>
            <name><surname>Gupta</surname><given-names>R.</given-names></name>
            <name><surname>Bhattacharya</surname><given-names>P.</given-names></name>
            <name><surname>Davidson</surname><given-names>I. E.</given-names></name>
            <name><surname>Nyameko</surname><given-names>R.</given-names></name>
            <name><surname>Aluvala</surname><given-names>S.</given-names></name>
            <name><surname>Vimal</surname><given-names>V.</given-names></name>
          </person-group>
          <article-title>Deepfake Generation and Detection: Case Study and Challenges</article-title>
          <source>IEEE Access</source>
          <year>2023</year>
          <volume>11</volume>
          <pub-id pub-id-type="doi">10.1109/ACCESS.2023.3342107</pub-id>
        </element-citation>
      </ref>

      <ref id="ref20">
        <element-citation publication-type="journal">
          <person-group person-group-type="author">
            <name><surname>Prasad Adhikary</surname><given-names>D. R.</given-names></name>
          </person-group>
          <article-title>DeLillos White Noise Postmodern Effects of Cyber Culture on Youths</article-title>
          <source>The International Journal of Social Sciences and Humanities Invention</source>
          <year>2020</year>
          <volume>7</volume>
          <issue>07</issue>
          <pub-id pub-id-type="doi">10.18535/ijsshi/v7i07.02</pub-id>
        </element-citation>
      </ref>

      <ref id="ref21">
        <element-citation publication-type="journal">
          <person-group person-group-type="author">
            <name><surname>Purwanto</surname><given-names>H.</given-names></name>
            <name><surname>Nuha</surname><given-names>A. A.</given-names></name>
          </person-group>
          <article-title>Post Dakwah di Era Cyber Culture</article-title>
          <source>DAKWATUNA: Jurnal Dakwah Dan Komunikasi Islam</source>
          <year>2020</year>
          <volume>6</volume>
          <issue>2</issue>
        </element-citation>
      </ref>

      <ref id="ref22">
        <element-citation publication-type="journal">
          <person-group person-group-type="author">
            <name><surname>Ramadhina</surname><given-names>N.</given-names></name>
            <name><surname>Jason</surname><given-names>F.</given-names></name>
            <name><surname>Pratama</surname><given-names>M. F.</given-names></name>
            <name><surname>Raihan</surname><given-names>L. A.</given-names></name>
            <name><surname>Al Mufti</surname><given-names>S.</given-names></name>
            <name><surname>Meranti</surname><given-names>M.</given-names></name>
          </person-group>
          <article-title>Dinamika Perubahan dalam Komunikasi Manusia di Era Teknologi Artificial Intelligence</article-title>
          <source>Communicator Sphere</source>
          <year>2023</year>
          <volume>3</volume>
          <issue>2</issue>
          <pub-id pub-id-type="doi">10.55397/cps.v3i2.57</pub-id>
        </element-citation>
      </ref>

      <ref id="ref23">
        <element-citation publication-type="journal">
          <person-group person-group-type="author">
            <name><surname>Rana</surname><given-names>M. S.</given-names></name>
            <name><surname>Nobi</surname><given-names>M. N.</given-names></name>
            <name><surname>Murali</surname><given-names>B.</given-names></name>
            <name><surname>Sung</surname><given-names>A. H.</given-names></name>
          </person-group>
          <article-title>Deepfake Detection: A Systematic Literature Review</article-title>
          <source>IEEE Access</source>
          <year>2022</year>
          <volume>10</volume>
          <pub-id pub-id-type="doi">10.1109/ACCESS.2022.3154404</pub-id>
        </element-citation>
      </ref>

      <ref id="ref24">
        <element-citation publication-type="journal">
          <person-group person-group-type="author">
            <name><surname>Seow</surname><given-names>J. W.</given-names></name>
            <name><surname>Lim</surname><given-names>M. K.</given-names></name>
            <name><surname>Phan</surname><given-names>R. C. W.</given-names></name>
            <name><surname>Liu</surname><given-names>J. K.</given-names></name>
          </person-group>
          <article-title>A comprehensive overview of Deepfake: Generation, detection, datasets, and opportunities</article-title>
          <source>Neurocomputing</source>
          <year>2022</year>
          <volume>513</volume>
          <pub-id pub-id-type="doi">10.1016/j.neucom.2022.09.135</pub-id>
        </element-citation>
      </ref>

      <ref id="ref25">
        <element-citation publication-type="book">
          <person-group person-group-type="author">
            <name><surname>Sugiyono</surname></name>
          </person-group>
          <article-title>Metode Penelitian Kuantitatif</article-title>
          <source>Alfabeta, cv.</source>
          <year>2019</year>
          <comment>Setiyawami (ed.); Edisi Ke-2</comment>
        </element-citation>
      </ref>

      <ref id="ref26">
        <element-citation publication-type="confproc">
          <person-group person-group-type="author">
            <name><surname>Ubaidillah</surname></name>
            <name><surname>Kurnia</surname><given-names>A. D. N.</given-names></name>
            <name><surname>Octaviany</surname><given-names>R. V.</given-names></name>
          </person-group>
          <article-title>Kejahatan Cybercrime di Era 4.0</article-title>
          <source>Prosiding Seminar Nasional Ilmu Ilmu Sosial (SNIIS)</source>
          <year>2022</year>
          <volume>1</volume>
        </element-citation>
      </ref>

      <ref id="ref27">
        <element-citation publication-type="journal">
          <person-group person-group-type="author">
            <name><surname>Uchendu</surname><given-names>B.</given-names></name>
            <name><surname>Nurse</surname><given-names>J. R. C.</given-names></name>
            <name><surname>Bada</surname><given-names>M.</given-names></name>
            <name><surname>Furnell</surname><given-names>S.</given-names></name>
          </person-group>
          <article-title>Developing a cyber security culture: Current practices and future needs</article-title>
          <source>Computers and Security</source>
          <year>2021</year>
          <volume>109</volume>
          <pub-id pub-id-type="doi">10.1016/j.cose.2021.102387</pub-id>
        </element-citation>
      </ref>

      <ref id="ref28">
        <element-citation publication-type="journal">
          <person-group person-group-type="author">
            <name><surname>Walczyna</surname><given-names>T.</given-names></name>
            <name><surname>Piotrowski</surname><given-names>Z.</given-names></name>
          </person-group>
          <article-title>Quick Overview of Face Swap Deep Fakes</article-title>
          <source>Applied Sciences (Switzerland)</source>
          <year>2023</year>
          <volume>13</volume>
          <issue>11</issue>
          <pub-id pub-id-type="doi">10.3390/app13116711</pub-id>
        </element-citation>
      </ref>

      <ref id="ref29">
        <element-citation publication-type="journal">
          <person-group person-group-type="author">
            <name><surname>Yoga</surname><given-names>S.</given-names></name>
          </person-group>
          <article-title>Perubahan Sosial Budaya Masyarakat Indonesia Dan Perkembangan Teknologi Komunikasi</article-title>
          <source>Jurnal Al-Bayan</source>
          <year>2019</year>
          <volume>24</volume>
          <issue>1</issue>
          <pub-id pub-id-type="doi">10.22373/albayan.v24i1.3175</pub-id>
        </element-citation>
      </ref>

      <ref id="ref30">
        <element-citation publication-type="journal">
          <person-group person-group-type="author">
            <name><surname>Yusuf</surname><given-names>M. B.</given-names></name>
            <name><surname>Ar Rosyid</surname><given-names>H.</given-names></name>
          </person-group>
          <article-title>Pengaruh Society 5.0 dalam Kehidupan Masyarakat</article-title>
          <source>Jurnal Inovasi Teknologi Dan Edukasi Teknik</source>
          <year>2023</year>
          <volume>3</volume>
          <issue>2</issue>
          <pub-id pub-id-type="doi">10.17977/um068v3i22023p116-121</pub-id>
        </element-citation>
      </ref>

      <ref id="ref31">
        <element-citation publication-type="journal">
          <person-group person-group-type="author">
            <name><surname>Zamroni</surname><given-names>M.</given-names></name>
          </person-group>
          <article-title>Perkembangan Teknologi Komunikasi Dan Dampaknya Terhadap Kehidupan</article-title>
          <source>Jurnal Pendidikan</source>
          <year>2017</year>
          <volume>X</volume>
          <issue>2</issue>
        </element-citation>
      </ref>

    </ref-list>
</sec>
</body>
</article>
