RESIKO KEJAHATAN TEKNOLOGI INFORMASI DAN KOMUNIKASI CYBER CRIME DAN ANALISI INOVASI PENCEGAHAN RESIKO CYBER CRIME DI INDONESIA
Abstract
Today's internet users are mostly used by children to teenagers and are instead used as access to social media for communication and finding information. The development of information technology every second has a positive and negative impact. The positive side of this virtual world will definitely increase the trend of global technological development along with various forms of things that humans do in the digital era. This lack of accuracy leads people to pay less attention to the information they read or obtain, and to think that nothing bad will happen until they become victims themselves. Such indifference weakens the level of security awareness and vigilance. The purpose of this research is to find out what are the risks of many cybercrime cases and what innovations have been made to prevent cybercrime from spreading to society. The method used in this research is a qualitative method that allows us to collect information through various tools and techniques to find information about how to prevent the emergence of threats in cyberspace. Then combined into one so that the phenomena experienced by the subject are more easily understood by the reader. The author found a recent case of the Cyber Crime phenomenon that exists in cyberspace, namely criminals providing an application which, when opened, the application can retrieve victim data automatically. The results of this study are in the form of information that will be obtained by readers how high the crime rate is in cyberspace.
References
[2] B. Hartono and R. A. Hapsari, “Mutual Legal Assistance Pada pemberantasan Cyber Crime Lintas Yurisdiksi di Indonesia,” Sasi, vol. 25, no. 1, p. 59, 2019, doi: 10.47268/sasi.v25i1.136.
[3] H. Ardiyanti, “Cyber-Security Dan Tantangan Pengembangannya Di Indonesia,” pp. 95–110, 1986.
[4] F. Diapoldo and S. S. Kom, “KEAMANAN”.
[5] Setiyawan, “Uuite Dalam Melindungi Hak Cipta Sebagai Hak Atas Kekayaan Intelektual (Hki) Dari Cybercrime,” J. Chem. Inf. Model., vol. 53, no. 9, pp. 1689–1699, 2013.
[6] F. N. Latifahi, I. Mawardi, and B. Wardhana, “Ancaman Pencurian Data (Phishing) Di Tengah Trend Pengguna Fintech Pada Pandemic Covid-19,” Islam. Bank. Financ. J., vol. 6, no. 1, pp. 73–85, 2022, doi: 10.21070/perisai.v6i1.
[7] S. Suyitno, “Implementasi Manajemen Resiko dalam Peningkatan Efektivitas Pembelajaran di Sekolah Menengah Kejuruan,” Edukatif J. Ilmu Pendidik., vol. 4, no. 1, pp. 141–153, 2021, doi: 10.31004/edukatif.v4i1.1768.
[8] A. Irawati, H. B. Fadholi, A. N. Alamsyah, D. P. Dwipayana, and M. Muslih, “Proceeding of Conference on Law and Social Studies URGENSI CYBER LAW DALAM KEHIDUPAN MASYARAKAT INDONESIA DI ERA DIGITAL,” Pros. Conf. Law Soc. Stud., pp. 1–15, 2021, [Online]. Available: http://prosiding.unipma.ac.id/index.php/COLaS
[9] S. Sugiarto and R. Qurratulaini, “Potensi Kriminal Cyber Crime pada Meme: Sebuah Kajian Linguistik Forensik,” Deiksis J. Pendidik. Bhs. dan Sastra Indones., vol. 7, no. 1, p. 46, 2020, doi: 10.33603/deiksis.v7i1.2495.
[10] C. Handoko, “Kedudukan Alat Bukti Digital Dalam Pembuktian Cybercrime Di Pengadilan,” J. Jurisprud., vol. 6, no. 1, p. 1, 2017, doi: 10.23917/jurisprudence.v6i1.2992.
[11] Hamdan Mustameer, “Penegakan Hukum Nasional dan Hukum Internasional Terhadap Kejahatan Cyber Espionage Pada Era Society 5.0,” J. Yustika Media Huk. Dan Keadilan, vol. 25, no. 01, pp. 40–53, 2022, doi: 10.24123/yustika.v25i01.5090.
[12] M. Desa, P. Serai, and L. Perspektif, “NUSANTARA : Jurnal Ilmu Pengetahuan Sosial ْ ى ل ْ َّ تلا و َ ع َ لا و َ او ُ ن وا ِ ب ِ لا َ َ ت و َ ى و َ ق َ ر َ ع الل َّ َ او ُ ن وا ِ ث ل ا ى َ ل ع َ َّ ن َ َ ت َ د ُ ع لا و َ م َ ع ْ ُ دي ِ د ش ب ِ ا َ ق ع,” vol. 9, no. 4, pp. 1483–1490, 2022.
[13] D. Wahyudi, “Perlindungan Hukum Terhadap Korban Kejahatan Cyber Crime Di Indonesia,” J. Ilmu Huk. Jambi, vol. 4, no. 1, p. 43295, 2013.
[14] I. P. N. Andaru, “Cyber Child Grooming sebagai Bentuk Kekerasan Berbasis Gender Online di Era Pandemi,” J. Wan. dan Kel., vol. 2, no. 1, pp. 41–51, 2021, doi: 10.22146/jwk.2242.
[15] L. Luo and Z. Wang, “Literature Review of Innovation and Entrepreneurship Management,” Proc. 2022 7th Int. Conf. Financ. Innov. Econ. Dev. (ICFIED 2022), vol. 648, no. Icfied, pp. 2623–2629, 2022, doi: 10.2991/aebmr.k.220307.427.
[16] M. Risal, “Aspek menjaga dan melindungi dunia maya”.
[17] A. Syaputra, “Penilaian IT Governance dalam Manajemen Risiko IT Menggunakan Metode Quantitative dan Qualitative Risk Analysis Assessment of IT Governance in IT Risk Management Using Quantitative Methods and Qualitative Risk Analysis,” vol. 12, no. April, pp. 63–73, 2022.
[18] Suparyanto dan Rosad (2015, “済無No Title No Title No Title,” Suparyanto dan Rosad (2015, vol. 5, no. 3, pp. 248–253, 2020.
[19] S. Saifulloh, S. Anardani, and Q. R. Pratama, “Edukasi penggunaan internet sehat untuk mengenali berita Hoax bagi pemuda Dusun Pepe Desa Pajaran Kab. Madiun,” SOROT J. Pengabdi. Kpd. Masy., vol. 1, no. 2, pp. 29–32, 2022, doi: 10.32699/sorot.v1i2.3010.
[20] D. Daryono and B. Sugiantoro, “Pengembangan Framework Pelaporan Cyber Crime,” JISKA (Jurnal Inform. Sunan Kalijaga), vol. 1, no. 3, pp. 133–147, 2017, doi: 10.14421/jiska.2017.13-05.
[21] I. B. Mewengkang, R. N. Warong, and M. Kuntag, “Kajian Yuridis Cyber Crime Penanggulangan Dan Penegakan Hukumnya,” Lex Crim., vol. 10, no. 5, pp. 26–35, 2021.
[22] Y. M. Putra, U. M. Buana, E. Kurniawan, and U. M. Buana, “Informasi Pada Pt . Jasaneka Bina Management Disusun Oleh :,” no. May, 2021.
[23] K. D. Kurniawan and D. R. I. Hapsari, “Kejahatan Dunia Maya Pada Sektor Perbankan Di Indonesia: Analisa Perlindungan Hukum Terhadap Nasabah,” Pleno Jure, vol. 10, no. 2, pp. 122–133, 2021, doi: 10.37541/plenojure.v10i2.590.
[24] S. Jannah and M. Naufal, “Penegakan Hukum Cyber Ditinjau dari Hukum Positif,” vol. XII, no. 1, pp. 69–84.
[25] A. Marsehan, M. I. Herdiansyah, A. H. Mirza, and D. Antoni, “Penilaian Resiko Kejahatan Illegal Content Menggunakan Framework Nist 800-30,” Paradig. - J. Komput. dan Inform., vol. 22, no. 2, pp. 215–224, 2020, doi: 10.31294/p.v22i2.8913.
Copyright (c) 2024 Nita Maharani Harahap
This work is licensed under a Creative Commons Attribution 4.0 International License.