Law Enforcement Against Cybercrime in Online Activities
DOI:
https://doi.org/10.57096/edunity.v1i05.33Keywords:
Law enforcement, cybercrime, crimeAbstract
The development of information and communication technology makes the relationship between individuals and groups with the world not limited to existing norms so that it can cause a change in all fields. The changes also have a major impact on the transformation of values in society. It occurs not only positive but also negative consequences. Information and communication technology used for crime is known as cybercrime. Cybercrime has been confirmed to be adverse to the worldwide community, at the same time as efforts to get rid of cybercrime are nevertheless hampered through numerous factors, therefore, a crook regulation coverage is wanted towards cybercrime crimes. This paper discusses two problems, namely, first, how to enforce the law against cybercrime in the legislation in Indonesia, and second, how the strategy for eradicating cybercrime is formulated in the Law on Information and Electronic Transactions. Law enforcement against cybercrime is performed through criminal and non-criminal policies. Meanwhile, to eradicate cybercrime, it is necessary to prepare appropriate laws and provide legal provisions for law enforcement officers.
References
Amalia, D. A. R., & Prasetyo, M. H. (2021). Kebijakan Hukum Pidana Dalam Upaya Penanggulangan Cyber Terorism. Jurnal Pembangunan Hukum Indonesia, 3(2), 228–239. Google Scholar
Arief, B. N. (2005). Pembaharuan hukum pidana dalam perspektif kajian perbandingan. Citra Aditya Bakti. Google Scholar
Bolson, A. P. (2016). Flawed but Fixable: Section 230 of the Communications Decency Act at 20. Rutgers Computer & Tech. LJ, 42, 1. Google Scholar
Dewi, N. S., & Suteki, S. (2017). Obstruksi Pelaksanaan Lisensi Wajib Paten Dalam Rangka Alih Teknologi Pada Perusahaan Farmasi Di Indonesia. Law Reform, 13(1), 1–17. Google Scholar
Hamzah, A., & Marsita, B. D. (1987). Aspek-aspek pidana dibidang komputer. Sinar Grafika. Google Scholar
Hatta, M. (2010). Kebijakan politik kriminal: Penegakan hukum dalam rangka penanggulangan kejahatan. Pustaka Pelajar. Google Scholar
Indonesia, P. A. (2007). Kitab Advokat Indonesia, Bandung: PT. Alumni. Google Scholar
Laksana, A. W. (2019). Pemidanaan Cybercrime Dalam Perspektif Hukum Pidana Positif. Jurnal Hukum, 35(1), 52–76. Google Scholar
Makarim, E. (2004). Kompilasi Hukum Telematika, PT. Raja Grafindo Persada. Google Scholar
Mansur, D. M. A. (2005). Cyber Law: Aspek Hukum Teknologi Informasi. Tiga Serangkai. Google Scholar
Nasional, B. P. H. (2009). Kajian EU Convention on Cybercrime dikaitkan dengan Upaya Regulasi Tindak Pidana Teknologi Informasi. Departemen Hukum Dan Hak Asasi Manusia Republik Indonesia, Jakarta. Google Scholar
Putri, P. (2020). Konvergensi Hukum Informasi Dan Transaksi Elektronik Dalam Kejahatan Korporasi (Coorporate Crime) Menurut Undang-Undang Nomor 11 Tahun 2008 Jo Undang-Undang Nomor 19 Tahun 2016. Lex Et Societatis, 7(11). Google Scholar
Soejadi, H. R. (2017). Refleksi mengenai hukum dan keadilan, aktualisasinya di Indonesia. Jurnal Ketahanan Nasional, 8(2), 1–18. Google Scholar
Soekanto, S., Liklikuwata, H., & Kusumah, M. W. (1981). Kriminologi: Suatu Pengantar. Ghalia Indonesia. Google Scholar
Taib, M. (2017). Dinamika perundang-undangan di Indonesia. Refika Aditama. Google Scholar
Wahid, A. (2005). Kejahatan Mayantara (cyber crime). Google Scholar
Published
Issue
Section
License
Copyright (c) 2023 Novi Hermawati1, Faisal Santiago2
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under aCreative Commons Attribution-ShareAlike 4.0 International (CC-BY-SA). that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.