REPRESENTASI REKAYASA SOSIAL (SOCIAL ENGINEERING) DALAM FILM UNLOCKED (ANALISIS SEMIOTIKA ROLAND BARTHES)
The research titled "Representation of Social Engineering in the Film Unlocked (Roland Barthes Semiotic Analysis)" by Irvanti Auliana aims to discuss the representation of social engineering in the film Unlocked using Roland Barthes' semiotic method and Stuart Hall's theory of re...
Saved in:
Main Author: | |
---|---|
Format: | Book |
Published: |
2024-01-05.
|
Subjects: | |
Online Access: | Link Metadata |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | The research titled "Representation of Social Engineering in the Film Unlocked (Roland Barthes Semiotic Analysis)" by Irvanti Auliana aims to discuss the representation of social engineering in the film Unlocked using Roland Barthes' semiotic method and Stuart Hall's theory of representation. The researcher observes how social engineering is represented in the thriller and crime genre film Unlocked. The research employs a qualitative descriptive method, utilizing primary data sources from the audiovisual documents of the film Unlocked and secondary data from literature found in reference books, journals, and online media to complement the study. Data collection involves analyzing film scenes containing signs of social engineering, aligning the data with Roland Barthes' semiotic method elaborated with Stuart Hall's representation theory, and drawing conclusions through triangulation techniques. The final results of the research indicate that the film Unlocked represents social engineering as a criminal act that attacks someone's feelings or emotions, involving stages such as gathering target information, developing relationships with the target, launching an attack, exploiting target information, and requiring third-party involvement for resolution. Social engineering crimes do not require a specific motive. Perpetrators of social engineering crimes are portrayed as individuals skilled in technology, meticulous, detail-oriented, organized, and adept at concealing their identities. Meanwhile, the targets or victims are individuals with limited literacy in digital technology. Thus, it is represented that the low literacy in digital technology can lead to susceptibility to social engineering crimes. |
---|---|
Item Description: | http://repository.upnvj.ac.id/27801/1/ABSTRAK.pdf http://repository.upnvj.ac.id/27801/25/AWAL.pdf http://repository.upnvj.ac.id/27801/26/BAB%20I.pdf http://repository.upnvj.ac.id/27801/27/BAB%20II.pdf http://repository.upnvj.ac.id/27801/28/BAB%20III.pdf http://repository.upnvj.ac.id/27801/29/BAB%20IV.pdf http://repository.upnvj.ac.id/27801/30/BAB%20V.pdf http://repository.upnvj.ac.id/27801/31/DAFTAR%20PUSTAKA.pdf http://repository.upnvj.ac.id/27801/9/DAFTAR%20RIWAYAT%20HIDUP.pdf http://repository.upnvj.ac.id/27801/10/LAMPIRAN.pdf http://repository.upnvj.ac.id/27801/32/PLAGIARISME.pdf http://repository.upnvj.ac.id/27801/12/KI.pdf |