Abstract
Law Implementation of Cybercrime in Indonesia
Highlights
Information technology such as the internet is very important in human life today
This study explains that common cybercrime patterns consist of cracking, carding, twitter hijacking, cybersquatting, use of someone else's account, identity theft or data leakage, data forgery, online probing and port scanning, sabotage and extortion, against government and against property, and virus attacks
The application of the legal basis of cybercrime cases that has occurred in Indonesia is subject to articles 263, 362, 363, 378, 282 paragraph 1 of the Criminal Code, articles 29 and 56 UURI Number 44/2008, article 8 and 303 of Law Number 7/1974
Summary
Information technology such as the internet is very important in human life today. Many human activities are done in connection with the Internet. Information technology can bring positive and negative impacts on people's lives. The positive impact of internet information technology, among others, can be used as a communication media (chatting), can be used as a media to search information (Google and Youtube), can be used as data exchange media (email, newsgroup, world wide web), can be used to ease the activity of transacting and doing business in trading. While the negative impacts of information technology are all kinds of criminal activity on the Internet such as can be misused or contain the risks of its security, especially security when the transfer of data on the network. Cybercrime can be called a new phenomenon in the world of crime and criminals are always one step ahead compared to law enforcers’ actions. Information from Raymond (2016) social network users are generally unaware of the nature of friendship containing crime programs through the links they receive, for example, brought to a dangerous site
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Similar Papers
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.