Cyber Crime Prevention Strategy in Indonesia
International Journal of Humanities and Social Science |
© 2016 by SSRG - IJHSS Journal |
Volume 3 Issue 6 |
Year of Publication : 2016 |
Authors : Yasmirah Mandasari Saragih and Andysah Putera Utama Siahaan |
How to Cite?
Yasmirah Mandasari Saragih and Andysah Putera Utama Siahaan, "Cyber Crime Prevention Strategy in Indonesia," SSRG International Journal of Humanities and Social Science, vol. 3, no. 6, pp. 21-25, 2016. Crossref, https://doi.org/10.14445/23942703/IJHSS-V3I6P106
Abstract:
The development of the Internet and the cyber world did not lead to positive progress. One of the negative things that often happens in the virtual world is cyber crime. The loss of the limits of space and time on the Internet canaffectanything. A cracker can get into a system without an official permit. Some people who infiltrate the system will notify the weaknesses of the system but some of them use the weakness to profit. Several strategies were created to repel the cyber crime. Cybercrime is not only done through the Internet, but this can be done through a network that can transmit signals such as telephone communications. The Indonesian government to apply the law as it applies to online crime. Some of these rules have been applied in the Penal Code, including the Law on Information and Electronic Transactions (UUITE). By implementing this system, the cyber crime cases will be reduced each year.
Keywords:
Cyber Crime, Hacker, Strategy, UUITE, Law.
References:
[1] W. Beneran, "Undang-Undang Cyber Crime," 23 1 2015. [Online]. Available: http://www.totaltren.com/2015/01/undangundang- tentang-cyber-crime.html. [Accessed 24 12 2016].
[2] Hariyanto and A. P. U. Siahaan, "Intrusion Detection System in Network Forensic Analysis and Investigation," IOSR Journal of Computer Engineering (IOSR-JCE), vol. 18, no. 6, pp. 115-121, 2016.
[3] A. Lubis and A. P. U. Siahaan, "Network Forensic Application in General Cases," IOSR Journal of Computer Engineering (IOSR-JCE), vol. 18, no. 6, pp. 41-44, 2016.
[4] B. Rahardjo, "Cybercrime," 2012. [Online]. Available: http://keamananinternet.tripod.com/pengertian-definisicybercrime. html. [Accessed 24 12 2016].
[5] M. Singh, J. A. Husain and N. K. Vishwas, "A Comprehensive Study of Cyber Law and Cyber Crimes," International Journal of IT, Engineering and Applied Sciences Research (IJIEASR), vol. 3, no. 2, pp. 20-24, 2014.
[6] P. D. M. Gercke, Understanding CyberCrime: Phenomena, Challenges and Legal Response, ITU Publication, 2012.
[7] A. Hamzah, Hukum Pidana Yang Berkaitan Dengan Komputer, vol. 35, Jakarta: Sinar Grafika, 1993, pp. 455-462.
[8] Sutarman, Cyber Crime Modus Operasinya dan Penanggulangannya, Yogyakarta: LaksBang Press Indo, 2007.