JURISDICTIONAL CYBERCRIME CRIMINALIZATION POLICY IN THE USE OF INFORMATION TECHNOLOGY
DOI:
https://doi.org/10.28946/scls.v2i2.3651Abstract
The victim and the offender are frequently in separate nations, a crime known as cybercrime transcends all borders and periods. Cybercrime can be committed using the computer itself as the method of committing the crime and the computer network system as the target. Laws governing information technology must take into account its rapid growth. Information and communication technology laws must anticipate and lessen these negative consequences. For information, media, and communication technology to progress as much as possible, legal products about cyberspace, or mayantara, must offer security and legal certainty. In response to the increasing number of cybercrimes, the government adopted a policy on April 21, 2008, with the adoption of Law No. 11 of 2008 regarding Information and Electronic Transactions (UU ITE). The ITE Law is Indonesia's first legislation focusing on online regulation. Based on the research findings, it can be concluded that Indonesian law enforcement has been unable to combat cybercrime to the best of its abilities. Indonesian law enforcement is facing difficulties due to the growth in cybercrime. The reasons for this are a lack of public legal awareness in efforts to combat information technology crimes, limited facilities and infrastructure, and the fact that there are still relatively few law enforcement officials who are familiar with the ins and outs of information technology (internet).References
Arief, Indah dan Nawawi Barda. Kebijakan Legislatif Dalam Penanggulangan Kejahatan Dengan Pidana Penjara. Semarang: Universitas Diponegoro, 2000.
Aswandi R, Muchin PRN, Sultan M. “Perlindungan Data Dan Informasi Pribadi Melalui Indonesian Data Protection System (Idps).†Legislatif 20, no. 1 (2020): 167–90.
Didik M. Arif, Mansur dan Elisataris Ghultom. Cyber Law: Aspek Hukum Teknologi Informasi. Bandung: Refika Aditama, 2010.
Golose, Petrus Reinhard. “Perkembangan Cybercrime Dan Upaya Penanggulangannya Di Indonesia Oleh Polri.†Buliten Hukum Perbankan Dan Kebanksentralan 2, no. 4 (2006): 38–39.
Kominfo. “Indonesia Peringkat Ke-2 Dunia Kasus Kejahatan Siber,†2015.
Mantili R, Dewi PET. “Prinsip Kehati-Hatian Dalam Penyelenggaraan Sistem Elektronik Dalam Upaya Perlindungan Data Pribadi Di Indonesia.†Jurnal Aktual Justice 2, no. 5 (2020): 132–45.
Maskun. Kejahatan Siber CyberCrime : Suatu Pengantar. Jakarta: Kencana, 2013.
Muladi. “Kebijakan Kriminal Terhadap Cybercrime.†Majalah Media Hukum 3, no. 1 (2003).
Polri, Pusiknas. “Kejahatan Siber Di Indonesia Naik Berkali-Kali Lipat.†Pusiknas Polri, 2022.
Raharjo, Agus. Cybercrime: Pemahaman Dan Upaya Pencegahan Kejahatan Berteknologi. Bandung: Citra, 2002.
Saragih, Y.M., & Siahaan, A.P.U. “Cyber Crime Prevention Strategy in Indonesia.†J.Humanit.Soc.Sci, SSRG Int. 6, no. 3 (2016): 22–26.
Soekanto, Soerjono dan Sri Marmudji. Penelitian Hukum Normatif. Jakarta: Raja Grafindo Persada, 2000.
Sudarto. Hukum Pidana Dan Perkembangan Masyarakat. Bandung: Sinar Baru, 1983.
Suhariyatno, Budi. Tindak Pidana Teknologi Informasi (Cybercrime) Urgensi Pengaturan Dan Celah Hukumnya. Depok: Raja Grafindo Persada, 2013.
Surhayanto, Budi. Tindak Pidana Teknologi Informasi (Cybercrime) Urgensi Pengaturan Dan Celah Hukumnya. Depok: Raja Grafindo Persada, 2013.
Widodo. Sistem Pemidanaan Dalam Cyber Crime. Yogyakarta: Laksbang Mediatama, 2009.
Downloads
Published
Issue
Section
License
As a journal author, you have rights for a large range of uses of your article, including use by your employing institute or company. These Author rights can be exercised without the need to obtain specific permission.
Authors publishing in SCLS journals have wide rights to use their works for teaching and scholarly purposes without needing to seek permission, including: use for classroom teaching by Author or Author's institution and presentation at a meeting or conference and distributing copies to attendees; use for internal training by author's company; distribution to colleagues for their research use; use in a subsequent compilation of the author's works; inclusion in a thesis or dissertation; reuse of portions or extracts from the article in other works (with full acknowledgement of final article); preparation of derivative works (other than commercial purposes) (with full acknowledgement of final article); voluntary posting on open web sites operated by author or author’s institution for scholarly purposes (follow CC by SA License).
Authors and readers can copy and redistribute the material in any medium or format, as well as remix, transform, and build upon the material for any purpose, even commercially, but they must give appropriate credit (cite to the article or content), provide a link to the license, and indicate if changes were made. If you remix, transform or build upon the material, you must distribute your contributions under the same license as the original.