Cybercrime in virtual spaces: An overview of the law in Indonesia
Keywords:
Internet; Cyber Crime; ITE Law; IndonesiaAbstract
The Internet has the potential to overcome national barriers and facilitate global dissemination of information. Although its benefits are numerous, it also has detrimental consequences that could disrupt society. Engaging in cybercrime is typically required only to create a substantial number of blogs, accounts, applications, programs, and websites on various social and mass media platforms for illicit purposes. Examples of unlawful activities include, but are not limited to, fraud, data theft, unauthorized use of credit cards, distribution of inappropriate content, online gambling, and prostitution, as well as hate speech and extremist or terrorist activities. To address the issue of virtual space crime, the government enacted Law No. 19 of 2016, which amended Law No. 11 of 2008, with respect to information and electronic transactions. However, it is important to recognize that not all people who use the internet have a comprehensive understanding of the legal framework. Consequently, government, employers, and institutions involved in information and communication technology are responsible for educating the public about the law to reduce the incidence of criminal activity in virtual spaces.
References
Cain, A. A., Edwards, M. E., & Still, J. D. (2018). An exploratory study of cyber hygiene behaviors and knowledge. Journal of Information Security and Applications, 42, 36–45.
Alvionitasari, R. (2017). Haikal Tersangka Hacker Ribuan Situs, Polisi: Dia Pemuda Tertutup. Tempo.
Andrianyanto, D. (2017). Kawanan Haikal Peretas Ribuan Situs, Siapa Gantengers Crew Ini? Tempo. https://m.tempo.co/read/863565/kawanan-haikal-peretas-ribuan-situs-siapa-gantengers-crew-ini/full&Paging=Otomatis
APJII, T. (2016). Saatnya jadi pokok perhatian pemerintah dan industri. Buletin APJII, 1–7.
Arief, B. N. (2006). Tindak pidana mayantara perkembangan kajian cyber crime di Indoensia. PT. Raja Grafindo Persada.
Bapna, J. H. and S. (2012). How can we deter cyber terrorism. Information Security Journal, 21(2), 102–114.
Batubara, P. (2017). Tahun 2017, Polisi Tangani 1.763 Kasus Kejahatan Siber. Okezone News.
Bernardino, R. (2017). Cyber Crime (Issue November).
Cevilla, C. G. (1993). Pengantar Metode Penelitian. Universitas Indonesia Press.
Solak, D., & Topaloglu, M. (2015). The perception analysis of cyber crimes in view of computer science students. Procedia - Social and Behavioral Sciences, 182, 590–595.
Doly, D. (2017). Pengaturan penyebaran ujaran kebencian dan isu sara ditinjau dari hukum konstitusi. Info Singkat Hukum, IX(17), 1–4.
Finklea, K. M. (2012). The interplay of borders, turf, cyberspace, and jurisdiction: issues confronting U.S. Law enforcement. Journal of Current Issues in Crime, Law & Law Enforcement, 5(1/2), 13–20.
Heidegger, M. (1977). The Question Concerning Technology, and Other Essays (W. Lovitt (ed.)). Garland Publishing.
ISTR. (2017). Internet Security Threat Report - ISTR. Symantec Journal, 22(April), 77. https://doi.org/10.1016/S1353-4858(05)00194-7
Jewkes, Y. (2010). Handbook of Internet Crime. Willan Publishing.
Renaud, K., Flowerday, S., Warkentin, M., Cockshott, P., & Orgeron, C. (2018). Is the responsibilization of the cyber security risk reasonable and judicious? Computers & Security, 78, 198– 211.
Karina, D., & Mendoza, O. (2017). The vulnerability of cyberspace - The cyber crime. Journal of Forensic Sciences & Criminal Investigation, 2(1), 1–8.
Kyt, E. (2011). Cybersecurity and cyberwarfare: ideas for peace and security. Center for Strategic and International Studies, July 2010, 1–34.
Robinson, M., Jones, K., Janicke, H., and Maglaras, L. (2018). An introduction to cyber peacekeeping. Journal of Network and Computer Applications, 114, 70–87.
McCracken, G. . (1998). The Long Interview. Sage.
Miftach, F. (2007). Enterprise Hacking: Who Needs Exploit Codes? Hack In The Box Security Conference, 1–65.
Nwizege, K. S., Chukwunonso, F., Kpabeb, C., & Mmeah, S. (2011). The impact of ICT on computer applications. Proceedings - UKSim 5th European Modelling Symposium on Computer Modelling and Simulation, EMS 2011, 2(May 2014), 435–439. https://doi.org/10.1109/EMS.2011.45
Pranata, A. B. (2016). Socialization of ITE Law related to freedom of expression in social media using public service advertisement. Faculty of Computer Science, DINUS University.
Sa’diyah, N. K. (2012). Modus operandi tindak pidana cracker menurut undang-undang informasi dan transaksi elektronik. Perspektif, 17(2), 78–89.
Sanusi, M. A. (2005). Hukum dan teknologi informasi (3rd ed.). Gramedia Pustaka Utama.
Shaw, L. (2011). Hate speech in cyberspace: bitterness without boundaries. Notre Dame Journal of Law, Ethics and Public Policy, 25(1), 279–304. https://doi.org/10.3868/s050-004-015-0003-8
Syahayani, Z. (2017). Saracen: Potret Bisnis Hoax di Indonesia. Update Indonesia, XI(7), 2–4.
Tongia, R., Subrahmanian, E., & Arunachalam, V. S. (2005). Information and Communications Technology ( ICT ). In Information and Communications Technology for Sustainable Development Defining a Global Research Agenda.
United National Office on Drugs and Crime. (2013). Comprehensive study on cybercrime. Conference Support Section Organized Crime Branch Division for Treaty Affairs, February, 1–30.
Viva, T. (2017). Menkominfo Ancam Facebook dan Twitter. Viva.
Waimann, G. (1994). The Influential: People who Influnce People. State University of New York Press.
Yahya, F. (2018). Hingga Juli 2018, Sudah Ada 668 Kasus Kejahatan Siber. Okezone News.
Yunita. (2017). Ini Cara Mengatasi Berita “Hoax” di Dunia Maya. Kementerian Komunikasi Dan Informatika Republik Indonesia.