Efforts to Overcome Cyber Crime Actions in Indonesia
DOI:
https://doi.org/10.61841/0pqqbt61Keywords:
Actions, Cyber Crime, PenetrateAbstract
The presence of the internet can penetrate the boundaries between countries and accelerate the spread and exchange of information throughout the world. Although there are many positive impacts of internet use, there are also negative impacts that disturb the community. One can easily become a criminal (cyber crime) only by creating blogs, accounts, applications, programs, sites in various mass media and social media to commit fraud, data theft, illegal use of credit cards, the spread of pornographic content, online gambling, online prostitution, hate speech, radicalism, terrorism and so on. To overcome crime in the virtual space, the government has issued Law No. 19 of 2016 concerning Amendments to Law No. 11 of 2008 concerning Information and Electronic Transactions. But not all internet users know and understand the substance of the law. Therefore, the government, employers, and institutions that are engaged in information and communication technology have the responsibility to socialize the law to the public to prevent crime in the virtual space.
Downloads
References
1. M. A. Sanusi, Hukum dan Teknologi Informasi, 3rd ed. Jakarta: Gramedia Pustaka Utama, 2005.
2. R. Tongia, E. Subrahmanian, and V. S. Arunachalam, Information and Communications Technology (ICT). 2005.
3. D. Karina and O. Mendoza, “The Vulnerability of Cyberspace - The Cyber Crime,” J. Forensic Sci. Crim. Investig.,
vol. 2, no. 1, pp. 1–8, 2017.
4. K. S. Nwizege, F. Chukwunonso, C. Kpabeb, and S. Mmeah, “The impact of ICT on computer applications,” Proc. -
UKSim 5th Eur. Model. Symp. Comput. Model. Simulation, EMS 2011, vol. 2, no. May 2014, pp. 435–439, 2011.
5. Y. Jewkes, Handbook of Internet Crime. United Kingdom: Willan Publishing, 2010.
6. D. Solak and M. Topaloglu, “The Perception Analysis of Cyber Crimes in View of Computer Science Students,”
Procedia - Soc. Behav. Sci., vol. 182, pp. 590–595.
7. C. O. K. Renaud, S. Flowerday, M. Warkentin, P. Cockshott, “Is the responsibilization of the cyber security risk
reasonable and judicious?,” Comput. Secur., vol. 78, pp. 198– 211, 2018.
8. L. M. M. Robinson, K. Jones, H. Janicke, “An introduction to cyber peacekeeping,” J. Netw. Comput. Appl., vol. 114,
pp. 70–87.
9. J. D. S. A. A. Cain, M. E. Edwards, “An exploratory study of cyber hygiene behaviors and knowledge,” J. Inf. Secur.
Appl., vol. 42, pp. 36–45.
10. G. . McCracken, The Long Interview. London: Sage, 1998.
11. C. G. Cevilla, Pengantar Metode Penelitian. Jakarta: Universitas Indonesia Press, 1993.
12. K. M. Finklea, “the Interplay of Borders, Turf, Cyberspace, and Jurisdiction: Issues Confronting U.S. Law
Enforcement.” J. Curr. Issues Crime, Law Law Enforc., vol. 5, no. 1/2, pp. 13–20, 2012.
13. United Nations Office on Drugs and Crime, “Comprehensive Study on Cybercrime,” in Conference Support Section
Organized Crime Branch Division for Treaty Affairs, 2013, no. February, pp. 1–30.
14. M. Heidegger, The Question Concerning Technology, and Other Essays. London: Garland Publishing, 1977.
15. R. Bernardino, “Cyber Crime,” Kupang, 2017.
16. T. APJII, “Saatnya jadi Pokok Perhatian Pemerintah dan Industri,” Buletin APJII, pp. 1–7, 2016.
17. D. Andrianyanto, “Kawanan Haikal Peretas Ribuan Situs, Siapa Gantengers Crew Ini?,” Tempo, 2017. [Online].
Available: https://m.tempo.co/read/863565/kawanan-haikal-peretas-ribuan-situs. [Accessed: 07-Apr-2017].
18. F. Miftach, “Enterprise Hacking: Who Needs Exploit Codes?,” in Hack In The Box Security Conference, 2007, pp. 1–65.
19. P. Batubara, “Tahun 2017, Polisi Tangani 1.763 Kasus Kejahatan Siber,” Okezone News, 2017. .
20. F. Yahya, “Hingga Juli 2018, Sudah Ada 668 Kasus Kejahatan Siber,” Okezone News, 2018. .
21. S. Figure, “No Title No Title_2015,” no. c, pp. 1–4.
22. ISTR, “Internet Security Threat Report—ISTR,” Symantec J., vol. 22, no. April, p. 77, 2017.
23. B. N. Arief, Tindak Pidana Mayantara Perkembangan Kajian Cyber Crime di Indonesia. Jakarta: PT. Raja Grafindo Persada, 2006.
24. W. Alamsyah, “JURIDICAL ANALYSIS OF THE VERDICT THAT DECIDED ON THE ARTICLE WAS NOT SENTENCED IN THE INDICTMENT BE REVIEWED OF DEFENDANT'S RIGHTS (Case Study Of Bandung District Court Verdict Number: 1401/Pid.B/2010/PN.Bdg),” J. Has. Penlit. Mhs., vol. 1, no. 1, pp. 1–9, 2010.
25. R. Alvionitasari, “Haikal Tersangka Hacker Ribuan Situs, Polisi: Dia Pemuda Tertutup,” Tempo, 2017.
26. L. Shaw, “Hate Speech in Cyberspace: Bitterness without Boundaries,” Notre Dame J. Law, Ethics Public Policy, vol. 25, no. 1, pp. 279–304, 2011.
27. Z. Syahayani, “Saracen: Potret Bisnis Hoax di Indonesia,” Updat. Indones., vol. XI, no. 7, pp. 2–4, 2017.
28. D. Doly, “Pengaturan penyebaran ujaran kebencian dan isu sara ditinjau dari hukum konstitusi,” Info Singk. Huk., vol.IX, no. 17, pp. 1–4, 2017.
29. E. Kyt et al., “Cybersecurity and Cyberwarfare: Ideas for Peace and Security,” Cent. Strateg. Int. Stud., no. July 2010, pp. 1–34, 2011.
30. Tim Viva, “Menkominfo Ancam Facebook dan Twitter,” Viva News, 2017. .
31. J. H. and S. Bapna, “How Can We Deter Cyber Terrorism,” Inf. Secur. J., vol. 21, no. 2, pp. 102–114, 2012.
32. G. Waimann, The Influential: People Who Influence People. Albany: State University of New York Press, 1994.
33. A. B. Pranata, “Socialization of ITE Law Related to Freedom of Expression in Social Media Using Public Service Advertisement,” Faculty of Computer Science, DINUS University, 2016.
34. N. K. Sa'diyah, “Modus Operandi Tindak Pidana Cracker Menurut Undang-Undang Informasi Dan Transaksi Elektronik,” Perspektif, vol. 17, no. 2, pp. 78–89, 2012.
35. Yunita, “Ini Cara Mengatasi Berita „Hoax‟ di Dunia Maya,” Kementerian Komunikasi dan Informatika Republik Indonesia, 2017.
Downloads
Published
Issue
Section
License
Copyright (c) 2020 AUTHOR

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.