scholarly journals Penegakan Hukum Cyber Crime Terhadap Tindak Pidana Pencurian Uang Nasabah Dengan Cara Pembajakan Akun Internet Banking Lewat Media Sosial

Wajah Hukum ◽  
2021 ◽  
Vol 5 (1) ◽  
pp. 118
Author(s):  
Ryan Aditama

Crime in the field of cyberspace or commonly known as cyber crime basically refers to computer devices and technological devices that use a system connected to the internet as an element of its use. Progress in the field of information technology, which is the origin of the emergence of cyber crime, will legally bring both positive and negative impacts to the law itself. On the other hand, criminals, especially hackers who deliberately commit acts illegally to take someone's personal data, especially like Internet Banking users who are connected to the whatsapp number belonging to their bank account, of course many criminals have used this opportunity to break into the account. Someone's Internet Banking lately often happens because the operator asks for an OTP (One-Time-Passwrord) code. Related to the research made by this writer with the use of the type of research that is normative juridical here is related to research aimed at the rules of norms contained in a rule of law, while the conceptual approach used is an approach of legislation and a conceptual approach through disclosing several principles Laws relating to Law Enforcement of Cyber Crime Against Crime of Theft of Customer Money By Hijacking Internet Banking Accounts Through Social Media, discussions are conducted in a deductive manner to obtain qualitative conclusions. Related to the crime of cyber crime against the crime of theft of customer money by hijacking internet banking accounts via social media is a very urgent issue to be followed up, because in today's modern era, all human activities cannot be separated and kept away from the Internet and its users. Internet Banking account, where everything is currently being demanded to be modern due to the rapid development of technology and information at this time and is also something that must be resolved immediately. The Indonesian government in this case is part of the Ministry of Information and Communication which works with all stakeholders and strives to realize this hope.

2016 ◽  
Vol 2 (2) ◽  
pp. 214-225
Author(s):  
Pas Mahyu Akhirianto ◽  
Anita B. Wandanaya ◽  
Opan Mustopah

In the development of technology that is so advanced today, especially in the field of communication and information, maintaining privacy is something that absolutely must be done for each individual. Rapoport (in Soesilo, 1998) defines privacy as an ability to control the interaction, the ability to acquire options and the ability to achieve the desired interaction. Nowadays, a lot of things that can be done by using the internet, such as selling, social interacting through social media (Social Media) such as Facebook, learn, or just read the news through the portal of electronic media, and so forth. Most of the activities that can be done on the internet, requires personal data of its users, where the issue of privacy is of onsiderableconcern. As the development of information and communication technology in this case the Internet, the technology used to protect all personal data users also grown and will continue to evolve into more sophisticated. For this reason the author took the initiative to create a Endesapp application program, which aims to facilitate a person or agency who frequently exchange data in the form of files through the Internet. With so security in maintaining personal data even be increased as well as the possibility of the spread of sensitive data has been poor. In this study, the method used is to design programs shaped application file encryption and decryption web-based cryptographic techniques to the type of algorithm that is supported is 3DES ( Triple DES ) , AES - 128 ( Advanced encyption Standard) , AES - 192 and AES - 256.


2020 ◽  
Author(s):  
Swati Sharma ◽  
Vikash Kumar Sharma

Cyber Crime is a crime which is difficult to detect and stop once occurred leave a long term effect on victims. Cyber Crime is increasing day by day due to over use of social media, online shopping, and internet banking which need sensitive financial and personal data.The development in emerging internet technology and its wide spread knowledge leads to security issues, cyber crime, internet hackers and intruders. The charm of internet enhances the network structure that construct vast online theft, fraud are called as cyber attacks or cyber crime. In order to keep ourselves free from cyber crime we need to know how to protect ourselves from cyber crime. In this paper we propose different mode of cybercrime and the types of its illegal activities over the internet. Either national or international cybercrime is creating huge negative impacts over society. By focusing on various techniques we examine the cybercrime web data due to social media. Social networking websites are used as a medium of interaction and communication among all the people across the world. Due to over use and lack of awareness leads to increase the cyber crimes by several aspects.


2021 ◽  
Vol 2 (2) ◽  
pp. 238-242
Author(s):  
Aziz Muhaimin ◽  
Ni Made Jaya Senastri ◽  
Ni Made Sukaryati Karma

11 the progress of the modern era today where the development of internet technology,SMS and social media becomethe main thing in every need of society in socializing and conductingpromotionsat an affordablecost andfast in reaching consumers,so that indirectlythe exchange ofpersonaldata informationthat is not known by service users who are often misused by irresponsiblepeople. Which in practiceis to use SMSBroadcast which is one method of sending messagesto many numbers from one source with the same message with one number to another consumer number. From the statement, there are 2 problems, namely How to set the law of telecommunicationservice users in the field of advertising and How to protectthe lawfor consumers with the existence ofpersonaldata breaches through SMS Broadcast.The method to be used is a method of normative legal research. The conclusion outlines that Article I of the Consumer Protection Law Serves as the legal basis for the protection of telecommunication service users, while in Article 26 of the /TE Law is used as the legal basis for the use of personal data, which in this case is SMS Broadcast


2021 ◽  
Vol 2 (2) ◽  
pp. 117-123
Author(s):  
Priska Choirina ◽  
Muhammat Maariful Huda ◽  
Urnika Mudhifatul Jannah ◽  
Satria Utama ◽  
Erlillah Rizqi Kusuma Pradani

The positive value of the internet is that the information generated can facilitate everyday human work. One of the negative impacts caused by the internet is cyber crime. As the Indonesian Army who is conducting studies at the Politeknik Angkatan Darat, it is not only required to be professional and proficient in physical warfare strategies. But it also has to be sophisticated and not technologically illiterate in dealing with all threats in cyberspace, including cyber crime. One of the basic sciences for dealing with cyber crime is computer networks by implementing the concept of network topology. Network topology simulation training using packet tracer software in the context of community service activities has the aim of providing technological concepts about the use of packet tracers along with network topology simulations. This training begins with an introduction to network topology which discusses implementation in military life and its strengths and weaknesses. Furthermore, the implementation of this knowledge into a packet tracer and simulating the network topology. From the participants consisting of telkommil, it is hoped that all of them can take part in the training in order to understand how to design a good computer network using packet tracer software.


Author(s):  
Ana María Gil Antón

Este trabajo aborda, de manera sintética, uno de los problemas más relevantes con los que nos estamos encontrando en el Siglo XXI resultado del fenómeno de Internet, el de las redes sociales que constituyen vías consolidadas de relación e interacción cotidianas, no sólo de las nuevas generaciones de adolescentes y jóvenes, sino también de todo el conjunto de nuestra sociedad. Y pese a que la utilización de las nuevas Tecnologías de la Información y Comunicación ofrece grandes oportunidades y ventajas, no puede obviarse igualmente que éstas nos pueden situar en la sociedad del riesgo, por cuanto que pueden entrañar múltiples peligros, entre los que cobra una especial relevancia la posibilidad de conculcación de los derechos fundamentales a la intimidad, al honor, a la propia imagen y a la protección de datos personales, bien individualmente considerados o, bien de forma conjunta, acrecentándose los citados riesgos entre jóvenes y adolescentes, en cuanto usuarios indiscriminados. Pero, a éstos se añaden además otros riesgos por conductas delictivas, como el denominado Ciberacoso.This research recollects in a synthetic way, one of the most relevant problems the society is facing today, as a consequence of the Internet phenomenon. The routes of social Networks in the daily relations and interactions are consolidating in such a way that is not only affecting the young teenagers and the new generation, but also the whole of our society. In spite of the fact that, the utilization of new Technology of Information and Communication offer great opportunities and have many advantages, however, one should not ignore that this situation is putting the society at risk. This phenomenon contains many dangers, as well as the possibility of violating the fundamental laws to intimacy, to the honor, to one’s own image and to the personal data protection, being individually considered or as a whole form in conjunction of the mentioned risks between the youth and adults users. Moreover, there will be an increase of this risk, because of criminal behaviors as Ciber bullying.


2019 ◽  
Vol 6 (1) ◽  
pp. 54
Author(s):  
Azharuddin Azharuddin

The presence of the Internet Banking service has offered a number of convenience and flexibility in conducting transactions, both between the bank and its customers, the bank and merchant, bank with the bank and the customer with the customer. However, this simplicity does not mean no risk. In addition to the Internet Banking service provides convenience, also in fact have some risks. The risk of a new character and is a challenge for practitioners and experts in the field of Internet Banking service to handle it, so it becomes important to discuss the legal efforts to protect customers' personal data in the operation of Internet Banking service after changes in legislation and elektronic information transaction. Forms of protection against customer data in Internet Banking in Indonesia are from several types of regulations that have regulated internet banking, namely Bank Indonesia Regulation Number 9/15 / PBI / 2007 concerning Application of Risk Management in the Use of Information Technology by Commercial Banks and Act No. 19 of 2016 concerning Amendments to Act No. 8 of 2011 concerning Electronic Information and Transactions along with the Financial Services Authority Act in the section on consumer protection


2019 ◽  
Vol 16 (2) ◽  
Author(s):  
Dian Alan Setiawan

The development of technology and the internet does not always produce positive things. Negative things that are side effects include the crime of skimming (theft of customer data) which is one type of crime in cyberspace. Lately Indonesia is enlivened with breaking ATM news that occurred in various regions in Indonesia. The customers suddenly lose their account balance due to being burglarized by irresponsible people. ATM piercing technique is known as ATM Skimmer Scan technique. ATM machine piercing (Automated Teller Machine) using Skimmer, which is a customer data thieves. The modus operandi of bank breakers is installing skimmer in ATM mouth. After the customer data obtained, the perpetrator just insert into the ATM card. burglars will freely drain the customer's money. Problems that arise is the development of modus operandi crime skimming in the case of bank burglary bank as a form of cybercrime (cybercrime) And Efforts / Legal Steps in Tackling Crime Use of Information Systems and Electronic Transactions. This research is legal research using conceptual approach and statue approach which will review Law Number 11 Year 2008 regarding Information and Electronic Transaction. Based on the method used, it is known that the modus operandi of criminal skimming in ATM bankruptcy as a form of cyber crime and the application of article in Law Number 11 Year 2008 regarding Information and Electronic Transaction as an effort / step in tackling the crime of Information System Use and Electronic Transactions.


Author(s):  
В. В. Хасанова ◽  

The article is devoted to the study of the existing legal framework for the protection of minors in the Republic of Kazakhstan from negative impacts in the information sphere, as well as the priority areas of development of national legislation in this area. Today, in the context of globalization, information and communication networks, including the Internet, are an important, and sometimes the only source of information for children. The pandemic of the new coronavirus infection COVID-19 is a confirmation of this, when, against the background of the lack of real communication, children began to spend most of their time on the Internet. Education, leisure, and communication have all moved there. The role of information and communication networks in the life of modern man cannot be overestimated. At the same time, they can be a source of threats and risks to the health, development and mental well-being of children. It is established that the current legislation of the Republic of Kazakhstan contains a number of normative legal acts aimed at ensuring the information protection of minors. However, the system of legal and organizational protection of children in the information sphere is currently at the stage of formation and does not provide a comprehensive response to modern, exponentially growing information challenges and threats. In order to eliminate this gap, it is proposed to develop a unified national strategy for the protection of children in the information environment, with its provisions fixed in the basic document.


InterConf ◽  
2021 ◽  
pp. 31-36
Author(s):  
Aygun Abdulova ◽  
Fatima Khosroshahi ◽  
Nargiz Mehdiyeva ◽  
Fidan Asgarzade

Information and communication technology has changed rapidly over the past 20 years, with a key development being the emergence of social media. Social media alludes to all applications and websites or blogs that empower individuals around the globe to interconnect through the web, chat, and share substance, video call among numerous other functionalities it offers to its clients. For a individual to be a part of any social media, he or she has got to begin with signup and after that sign in to get to substance and be able to share and chat with other clients of that social media stage. Over the past two decades, social media have picked up so much development and popularity around the world to an degree that numerous analysts are presently inquisitive about learning more almost these social stages and their impacts on the community. Despite the reality that nearly everybody within the community is associated to at slightest one social media stage, the youth and young people are the driving and most aficionado of these social stages to the point that they indeed social organize whereas in course or indeed church. It is to this light that analysts have found that these social locales affect the lives of our youth in a society a extraordinary bargain in terms of ethics, behavior and indeed education-wise.


2018 ◽  
pp. 206-220
Author(s):  
Sonia Ferrari

This chapter is focused on the elements that, in post modern era, have greatly changed our society, both in terms of buying and consumption habits and, more generally, in terms of lifestyles. This is mainly due to the Internet, which provides low cost, faster and interactive information and communication. As described in detail in the chapter, companies have been forced to adopt new marketing strategies and, thanks to the spread of social media and viral marketing, tools such as word of mouth and storytelling have become even more effective than in the past. But today companies need to use them in a different way, actively involving the consumers, because they attribute a greater value to a product if they participate in the process of creation of its image and elements of differentiation. If managed in an innovative way, focusing on sensory and transmedia aspects, storytelling becomes a very powerful Customer Relationship Marketing and image building medium and, above all, a source of enduring competitive advantage.


Sign in / Sign up

Export Citation Format

Share Document