scholarly journals Curve Fitting Analysis of Internet Traffic Sharing Management in Computer Network under Cyber Crime

2012 ◽  
Vol 47 (24) ◽  
pp. 36-43 ◽  
Author(s):  
Diwakar Shukla ◽  
Kapil Verma ◽  
Shree Bhagwat ◽  
Sharad Gangele
Temida ◽  
2009 ◽  
Vol 12 (3) ◽  
pp. 63-74
Author(s):  
Dejan Vuletic

The accelerated growth of the information-communication technology use brought about cyber crime as a new form of crime connected with the misuse of computer network. Human trafficking and human organ trafficking are changing in line with the state-of-art technological achievements i.e. becoming more and more characteristic of cyber space. Passing appropriate regulations at both national and international levels presents an important step in solving the problem of human organ trafficking through Internet.


2021 ◽  
Vol 2 (2) ◽  
pp. 117-123
Author(s):  
Priska Choirina ◽  
Muhammat Maariful Huda ◽  
Urnika Mudhifatul Jannah ◽  
Satria Utama ◽  
Erlillah Rizqi Kusuma Pradani

The positive value of the internet is that the information generated can facilitate everyday human work. One of the negative impacts caused by the internet is cyber crime. As the Indonesian Army who is conducting studies at the Politeknik Angkatan Darat, it is not only required to be professional and proficient in physical warfare strategies. But it also has to be sophisticated and not technologically illiterate in dealing with all threats in cyberspace, including cyber crime. One of the basic sciences for dealing with cyber crime is computer networks by implementing the concept of network topology. Network topology simulation training using packet tracer software in the context of community service activities has the aim of providing technological concepts about the use of packet tracers along with network topology simulations. This training begins with an introduction to network topology which discusses implementation in military life and its strengths and weaknesses. Furthermore, the implementation of this knowledge into a packet tracer and simulating the network topology. From the participants consisting of telkommil, it is hoped that all of them can take part in the training in order to understand how to design a good computer network using packet tracer software.


2002 ◽  
Vol 57 (5) ◽  
pp. 277-280 ◽  
Author(s):  
Yoshihiro Okamoto ◽  
Haruhiko Motohashi

The local structure of motlen ZrCl4 in LiCl-KCl eutectic was investigated by using an X-ray absorption fine structure (XAFS) of the Zr K-absorption edge. The nearest Zr4+-Cl- distance and coordination number from the curve fitting analysis were (2.51±0.02) Å and 5.9±0.6, respectively. These suggest that a 6-fold coordination (ZrCl6)2- is predominant in the molten mixture.


2021 ◽  
pp. 1111
Author(s):  
Yuwono Prianto ◽  
Nabila Annisa Fuzain ◽  
Afif Farhan

Digital activity during the pandemic is increasing this is because people are asked to stay at home doing all activities online, this makes people vulnerable to becoming victims of cyber crime. Cybercrime itself is a cyber crime by using a computer or computer network as a tool, or as a target, as well as the location of the crime, the absence of space and time limits makes it easier for cyber criminals to carry out their actions in the cyber world. The author's purpose in conducting this analysis is to discuss what are the obstacles in handling cybercrime cases during the Covid-19 pandemic and how to enforce the law for cybercrime perpetrators. This article is the result of normative legal research that focuses on the use of secondary data. Cyber crimes need special attention from law enforcement, both national and international. The perpetrators of cybercrime have not been fully prosecuted due to the weakness of the cyber legislation system in Indonesia and the limited number of experts to handle this case. Cyber law has not been clearly spelled out in the regulations governing the technical implementation. The perpetrators of cyber crime come from various countries, limited human resources and infrastructure are the main obstacles. It requires a strong commitment from the leadership, law enforcement institutions to improve the quality and quantity of human resources as well as to prepare an adequate budget for the procurement of facilities and infrastructure as well as to establish cooperation with higher education to accelerate the handling of existing limitations. Aktivitas digital pada masa pandemi semakin meningkat hal ini disebabkan masyarakat diminta untuk tetap di rumah melakukan semua kegiatan dilakukan secara daring, hal ini membuat masyarakat rawan menjadi korban kejahatan cyber. Cybercrime sendiri adalah kejahatan dunia maya dengan menggunakan komputer atau jaringan komputer sebagai alat, atau sebagai sasaran, serta lokasi terjadinya kejahatan, tidak adanya batasan ruang dan waktu memudahkan penjahat cyber untuk melakukan aksinya di dunia cyber. Tujuan penulis melakukan analisis ini  adalah untuk membahas apa saja yang menjadi kendala dalam menangani kasus cybercrime di saat masa pandemi Covid-19 dan bagaimana penegakan hukum bagi para pelaku cybercrime. Artikel ini meruupakan hasil dari penilitian hukum normatif yang fokus pada penggunaan data sekunder. Kejahatan cyber  crime perlu mendapatkan perhatian khusus dari penegak hukum baik nasional maupun Internasional. Pelaku cybercrime belum seluruhnya dapat di proses hukum karena lemahnya sistem perundangan-undangan siber di Indonesia dan terbatasnya tenaga ahli yang dimilki untuk menangani kasus ini, Undang-Undang cyber belum dijabarkan dengan jelas didalam Peraturan yang mengatur mengenai teknis pelaksanaannya. Pelaku cyber crime berasal berbagai dari negara, terbatasnya SDM dan prsarana menjadi kendala utama. Diperlukan komitmen yang kuat dari pimpinan, Institusi penegak hukum untuk meningkatkan kualitas dan kuantitaf SDM serta penyiapan anggaran yang memadai untuk pengadaan sarana dan prasana serta menjalin kerjasama dengan pendidikan tinggi untuk mempercepat penanganan keterbatasan yang ada.


Sign in / Sign up

Export Citation Format

Share Document