scholarly journals Strategies in Countering Hoax and Hate Speech in Indonesia

2021 ◽  
Vol 4 (2) ◽  
pp. 134-144
Author(s):  
Bambang Hartono ◽  
I Ketut Seregig ◽  
Budi Wibowo

Hoax and Hate Speech are cyber-crimes that are closely related to ideological, political and religious issues. In Indonesia, just before the 2019 Presidential Election, this crime is very common, mainly used to attack political opponents. In this study, we provide several samples of Hoax and Hate Speech crimes, namely those with ideological, political and religious nuances. We consider these three crime samples to be sufficient to illustrate that Hoax and Hate Speech greatly influence the stability of domestic security. Based on the results of research conducted at the Directorate of Cyber Crime Enforcement of the Indonesian Police Criminal Investigation Agency, we can conclude that the strategic steps that must be taken to tackle Hoax and Hate Speech are Preventive Efforts in the form of Cyber Patrol, Hoax labeling, analyzing media opinion trends, dissemination positive news through text media, clarification and public information, security carried out by cover names, cover jobs, and cover stories, and countermeasures. Then, to provide a deterrent effect to the community, repressive efforts through law enforcement activities must be carried out including investigations by means of the Cyber Patrol to find cyber-crime, providing technical assistance and tactical investigations, investigating units in the region in order to uncover networks of cyber perpetrators, providing assistance in examining digital evidence, and cooperating by exchanging information for the purpose of researching and investigating cyber-crime. With the coping methods described above, especially inter-regional police cooperation that is centrally controlled by maximizing technology, the Indonesian police are able to uncover and dismantle networks of cyber-crime perpetrators that occur in Indonesia such as hoaxes, hate speeches and terrorism.

Author(s):  
Muharman Lubis ◽  
Tien Fabrianti Kusumasari ◽  
Lukmanul Hakim

Information Public Disclosure is one of the regulation that has purpose to encourage good governance for public service and citizen participation in national development. The enactment of Act No.14/2008 (UU KIP) has been strengthen the mandate to enforce the necessity of information disclosure in actualizing transparency and accountability in resource management and budget uses. It also become the primary instrument to prevent corruption, monopolistic competition and information disputes. However, there are certain provinces has not yet established information committee nor when it will be as entrusted by the regulation. Meanwhile, the remedies in term of jail duration and fines, arguably, it could not create deterrent effect to the perpetrator. Furthermore, the concern from ministry and public institution also in question in regard their roles of responsibility, lack of cooperation and continuous support. Thus, human resource, technology infrastructure, public participation, supervision and socialization become crucial factor to increase the awareness and satisfaction towards this regulatory compliance. This study is a qualitative research to evaluate the implementation of this Act by observing its consideration, background, principles and relevant article verses as primary sources through content analysis based on number of legal experts.


Author(s):  
T. Venkat Narayana Rao, Sreeja Reddy

Advancement of technology have both positive and negative impacts. Some of the negative impacts are cyber crimes. Cyber crimes have become more dangerous. Phishing is one of the cyber crime which results in exploitation of data. There are many phishing attacks which are identified every day. There are different techniques in phishing attacks. We have to reduce those attacks by employing suitable anti-phishing techniques. Some of the anti-phishing techniques and algorithms are discussed in this paper. History of phishing and the lifecycle are also discussed in this paper. People should be aware of all such phishing and the anti-phishing techniques. They have to be careful while checking their mails and should not click on any links or downloadable malware files.


Author(s):  
Mohammed S. Gadelrab ◽  
Ali A. Ghorbani

New computing and networking technologies have not only changed the way traditional crimes are committed but also introduced completely brand new “cyber” crimes. Cyber crime investigation and forensics is relatively a new field that can benefit from methods and tools from its predecessor, the traditional counterpart. This chapter explains the problem of cyber criminal profiling and why it differs from ordinary criminal profiling. It tries to provide an overview of the problem and the current approaches combined with a suggested solution. It also discusses some serious challenges that should be addressed to be able to produce reliable results and it finally presents some ideas for the future work.


2014 ◽  
Vol 17 (2) ◽  
pp. 169 ◽  
Author(s):  
Isabel Ortega Diego ◽  
Antony Fake ◽  
Matthias Stahl ◽  
Lembit Rägo

Purpose. The aim of this work was to determine the number and type of active pharmaceutical ingredient (API) quality deficiencies in API Master Files (APIMFs) as submitted to the World Health Organization (WHO) Prequalification of Medicines Programme (PQP). Methods. We conducted a retrospective review of API quality deficiencies identified following the assessment of new APIMFs for non-sterile APIs during a 6-year period from 1 January 2007 to 31 December 2012. All deficiencies were collected, classified and quantified according to the Common Technical Document (CTD) sections and subsections and as groups of commonly raised questions. Results. There were 5446 deficiencies collected from 159 APIMF deficiency letters by CTD section, by selected CTD subsections and by selected CTD subsections and year. More than 50% of the total number of deficiencies related to the manufacturing sections of the CTD, followed by deficiencies concerning the impurities, the API specification and the stability sections of the CTD.  A pattern of API deficiencies across the different CTD subsections and over time was identified. Conclusions. The most frequent critical deficiencies were related to how the specific manufacturing process and the key materials used, in particular the API starting material, impact the API impurities content. The number and pattern of APIMF deficiencies did not change over time. The results are compared to the findings in similar studies as reported by the United States Food and Drug Administration (USFDA), the European Directorate for the Quality of Medicines (EDQM) and the European Medicines Agency (EMA) and similarities and differences are discussed. Our findings highlight the need for greater guidance and technical assistance for API manufacturers submitting APIMFs to the PQP. This article is open to POST-PUBLICATION REVIEW. Registered readers (see “For Readers”) may comment by clicking on ABSTRACT on the issue’s contents page.


2021 ◽  
pp. 1111
Author(s):  
Yuwono Prianto ◽  
Nabila Annisa Fuzain ◽  
Afif Farhan

Digital activity during the pandemic is increasing this is because people are asked to stay at home doing all activities online, this makes people vulnerable to becoming victims of cyber crime. Cybercrime itself is a cyber crime by using a computer or computer network as a tool, or as a target, as well as the location of the crime, the absence of space and time limits makes it easier for cyber criminals to carry out their actions in the cyber world. The author's purpose in conducting this analysis is to discuss what are the obstacles in handling cybercrime cases during the Covid-19 pandemic and how to enforce the law for cybercrime perpetrators. This article is the result of normative legal research that focuses on the use of secondary data. Cyber crimes need special attention from law enforcement, both national and international. The perpetrators of cybercrime have not been fully prosecuted due to the weakness of the cyber legislation system in Indonesia and the limited number of experts to handle this case. Cyber law has not been clearly spelled out in the regulations governing the technical implementation. The perpetrators of cyber crime come from various countries, limited human resources and infrastructure are the main obstacles. It requires a strong commitment from the leadership, law enforcement institutions to improve the quality and quantity of human resources as well as to prepare an adequate budget for the procurement of facilities and infrastructure as well as to establish cooperation with higher education to accelerate the handling of existing limitations. Aktivitas digital pada masa pandemi semakin meningkat hal ini disebabkan masyarakat diminta untuk tetap di rumah melakukan semua kegiatan dilakukan secara daring, hal ini membuat masyarakat rawan menjadi korban kejahatan cyber. Cybercrime sendiri adalah kejahatan dunia maya dengan menggunakan komputer atau jaringan komputer sebagai alat, atau sebagai sasaran, serta lokasi terjadinya kejahatan, tidak adanya batasan ruang dan waktu memudahkan penjahat cyber untuk melakukan aksinya di dunia cyber. Tujuan penulis melakukan analisis ini  adalah untuk membahas apa saja yang menjadi kendala dalam menangani kasus cybercrime di saat masa pandemi Covid-19 dan bagaimana penegakan hukum bagi para pelaku cybercrime. Artikel ini meruupakan hasil dari penilitian hukum normatif yang fokus pada penggunaan data sekunder. Kejahatan cyber  crime perlu mendapatkan perhatian khusus dari penegak hukum baik nasional maupun Internasional. Pelaku cybercrime belum seluruhnya dapat di proses hukum karena lemahnya sistem perundangan-undangan siber di Indonesia dan terbatasnya tenaga ahli yang dimilki untuk menangani kasus ini, Undang-Undang cyber belum dijabarkan dengan jelas didalam Peraturan yang mengatur mengenai teknis pelaksanaannya. Pelaku cyber crime berasal berbagai dari negara, terbatasnya SDM dan prsarana menjadi kendala utama. Diperlukan komitmen yang kuat dari pimpinan, Institusi penegak hukum untuk meningkatkan kualitas dan kuantitaf SDM serta penyiapan anggaran yang memadai untuk pengadaan sarana dan prasana serta menjalin kerjasama dengan pendidikan tinggi untuk mempercepat penanganan keterbatasan yang ada.


With the rapid advancements in technology, our lives have become completely digitalised. We sit in the comfort of our home, and carry out our day-to-day activities like grocery shopping, education, banking, through the Internet. However, this has given rise to several threats to our security, called the cyber-crime which has become a global concern. Cybercrimes affect the lives of millions of people all around the world, including businesses, organisations and governments of different nations. This paper aims to determine the association between cybercrime awareness and the age, and to identify the difference between main cause of cybercrime and the gender. Descriptive research has been carried out which helps us to understand the characteristics of an individual or a group. The sampling method used here is convenient sampling where the samples have been chosen based on ease of access of availability. The sample size is 1540. Age, Gender and Occupation are the independent variables. Cyber-crime awareness, the main cause of cybercrime and the most popular cyber-crime are the dependent variables used here. The tools used here are Chi-Square, Independent Sample t test and ANOVA. It was found that there is a significant association between the cyber-crime awareness and the age of the respondent and that there is no significant difference between the main cause of cyber-crime and gender. With the rapid rise in the rate of cyber-crimes, it is imperative that the government provide the people with more effective ways of cyber security in order to protect the society.


Author(s):  
G. S. Panova

Analysis of the present condition and prospects of development of the monetary sector of the Russian economy. Quantitative parameters of aggregate turnover, including the value of cash and non-cash it. Researched issues restricting cash advance industry in Russia and other countries; the problems encountered by foreign States in imposing administrative limits on cash payments; provides specific recommendations and identified risks imposing such restrictions in Russia. The article deals with topical issues of optimization of structure of aggregate turnover. Analyzing the development of money turnover, the role and the place of cash in the economy, the author explored the basic approaches to the determination and regulation of money turnover, proposed a new approach to ensure transparency in money flows. Particularly promising cash flow optimization are: a) measures aimed at improving the cash turnover (including maintaining the stability of the national currency, improving the procedures for issuing and withdrawing money from circulation, determine the optimal structure of monetary aggregates, etc.) and b) development of cashless money turnover. The author's position is presented on the future of the scientific basis and practical realization of the optimal ratio of cash and cashless money turnover in Russia and other countries. In particular, felt the need to increase information transparency, openness international information exchange in order to improve monetary policy by countries at the national and international level. To develop common approaches (models) of the analysis and forecasting of financial markets, as well as the establishment of an international coordination centre responsible for the collection, verification and access to public information databases for the cross-country studies of banking and financial and monetary sphere.


Author(s):  
Saurabh Dubey

Women from all the parts of society are facing cybercrime against them. Being a victim of cyber crime, women experiences several psychological impact which deeply effects their life. Sometimes they even commit suicide. The National Crime Records Bureau (NCRB) has reported increased rate of cyber crime against women in the last few years. Cyber crime against women takes place in the form of cyber defamation, sexual harassment and abuse, email-misrepresentation and so forth . Cyber crime itself is traumatic for women to deal with and on the other side the challenges that are encountered by a women to proceed for a legal action against the culprit is also matter of concern for them. This research paper is an attempt to discuss upon the various types of cybercrimes that are inflicted upon women in India. It is also brief analysis of the legal rights of women to protect against cyber crime, its application and challenges that are experienced by women to get those rights.


2015 ◽  
Vol 3 (3) ◽  
pp. 266-270
Author(s):  
Muhamad Asyraf Ahmad Termimi ◽  
Muhammad Ikhlas Rosele ◽  
Khairul Azhar Meerangani ◽  
Syamsul Azizul Marinsah ◽  
Mohd Anuar Ramli

Cyber crimes is a new millennium threat to society nowadays which brings by developments of technology and information. Various forms of cyber crimes exist either theft and fraud involving money and property or safety threat involving contamination of dignity. Therefore, this study will identify cyber crimes related to women in Malaysia for cases of theft and fraud of money and property through cyberspace. Cyber crimes will be identified and classified according to cases that often occurred in Malaysia and legal protection provided to the victim. The results showed lack of awareness about cyber security transactions and the provision of existing law that exists for cyber crime cause women to be victims of cyber crime.


Sign in / Sign up

Export Citation Format

Share Document