SlideShare uma empresa Scribd logo
1 de 6
Baixar para ler offline
The International Journal Of Humanities & Social Studies (ISSN 2321 - 9203) www.theijhss.com
209 Vol 5 Issue 12 December, 2017
THE INTERNATIONAL JOURNAL OF
HUMANITIES & SOCIAL STUDIES
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
1. Introduction
Technological advances open up huge crime opportunities. This can be seen from the many cases that come to court
about digital crime. The cases handled are about the misuse of technologies such as the internet, hoaxes, fake photos and
others. One of the facts that cause cybercrime is the need for computer network technology is increasing. Commercial
community activities become important things done by using the computer network. It can be spread all over the country.
World activities will last for 24 hours and can be monitored for 24 hours as well. These activities include stock trading,
banking, and other financial activities. In cyberspace, any activity can be done. This positively impacts technological
advancements and adds convenience for people to exchange information. But this did not escape the negative impact. When
pornography rife on the internet, the law can not do much in the past. The development of internet technology triggered the
emergence of cybercrime. This action will harm others. Cybercrime activities include credit card theft, hacking multiple sites,
intercepting other people's data transmissions, and manipulating data by preparing several programs such as viruses to
commit such crimes. Cybercrime has become a threat to international stability, so the government is difficult to compensate
crime techniques done with computer technology, especially internet and intranet networks.
Cyberspace is a media without limits because it is connected to a network of computers connected to the world. It
does not recognize territorial or state boundaries. This crime will cause its problems, especially in criminal law and
jurisdiction. Jurisdiction is the power or competence of state law against people, objects or events. This is the principle of state
sovereignty, equality of state and principle of non-interference. Jurisdiction is also a vital and central form of sovereignty that
can transform, create or terminate a legal relationship or obligation.
This research tries to explain how the legal system will be applied to cybercrime perpetrators based on certain
violations. Each violation has a different legal act. By applying jurisdiction, cybercrime actors will be reduced for the sake of
state stability and sovereignty.
Masdin Saragih
Lecturer, Faculty of Law, Universitas Simalungun, Simalungun, Indonesia
Henry Aspan
Lecturer, Faculty of Economics and Business, Universitas Pembangunan Panca Budi, Medan, Indonesia
Andysah Putera Utama Siahaan
Lecturer, Faculty of Computer Science, Universitas Pembangunan Panca Budi, Medan, Indonesia
Ph.D. Student, Department of School of Computer and Communication Engineering,
Universiti Malaysia Perlis, Kangar, Malaysia
Abstract:
Cybercrime is a digital crime committed to reaping profits through the Internet as a medium. Any criminal activity that
occurs in the digital world or through the internet network is referred to as internet crime. Cybercrime also refers to
criminal activity on computers and computer networks. This activity can be done in a certain location or even done
between countries. These crimes include credit card forgery, confidence fraud, the dissemination of personal information,
pornography, and so on. In ancient times there was no strong law to combat cybercrime. Since there are electronic
information laws and transactions, legal jurisdiction of computer crime has been applied. Computer networks are not
only installed in one particular local area but can be applied to a worldwide network. It is what makes cybercrime can
occur between countries freely. This issue requires universal jurisdiction. A country has the authority to combat crimes
that threaten the international community. This jurisdiction is applied without determining where the crime was
committed and the citizen who committed the cybercrime. This jurisdiction is created in the absence of an international
judicial body specifically to try individual crimes. Cybercrime cannot be totally eradicated. Implementing international
jurisdiction at least reduces the number of cybercrimes in the world.
Keywords: Cybercrime, Jurisdiction, Law
The International Journal Of Humanities & Social Studies (ISSN 2321 - 9203) www.theijhss.com
210 Vol 5 Issue 12 December, 2017
2. Theories
2.1. Cybercrime
Cybercrime is an illegal activity conducted in cyberspace with computer intermediaries or other electronic
equipment. It includes technologies that support technological means such as mobile phones, smartphones and others that can
be done through a global electronic network. Cybercrime attempts to enter a computer network without permission.
Cybercrime is considered to conflict or against any applicable law. The difference with a common crime can be seen from the
versatile capabilities shown by the development of information and sophisticated communication technology. Figure 1
describes the types of cybercrime.
Figure 1: Types of Cybercrime
There are several types of crime on cybercrime that can be classified based on the activities such as:
The International Journal Of Humanities & Social Studies (ISSN 2321 - 9203) www.theijhss.com
211 Vol 5 Issue 12 December, 2017
- Unauthorized Access
It is a crime that occurs when a person enters or infiltrate into a computer network system unlawfully, without permission,
or without the knowledge of the owner of the computer network system it enters. Examples of these crimes are Probing
and port.
- Illegal Contents
It is a crime committed by entering data or information to the internet about a thing that is untrue, unethical, and can be
regarded as unlawful or disturbing public order, for example, the spread of pornography or untrue news.
- Virus Spread
The spread of the virus is generally done by using an email. Often people whose email system is exposed to a virus do not
realize this. The virus is then sent to another place via email.
- Cyber Espionage, Sabotage, and Extortion
Cyber Espionage is a crime by way of exploiting the internet network to conduct spying on other parties, by entering the
target computer network system. Sabotage and Extortion is a type of crime committed by making interference, destruction
or destruction of a data, computer program or computer network system connected to the internet.
- Carding
Carding is a crime committed to steal credit card numbers belonging to others and used in trade transactions on the
internet.
- Hacking and Cracking
The term hacker usually refers to someone who has a great interest to learn the computer system in detail and how to
improve its capabilities. Cracking activity on the internet has a very wide scope, ranging from hijacking someone else's
account, website hijacking, probing, spreading the virus, to the disabling of the target. The latter act is referred to a DoS
(Denial Of Service).DoS attack is an attack that aims to paralyze the target (hangs, crashes) so it can not provide services.
- Cybersquatting and Typosquatting
Cybersquatting is a crime committed by registering the domain name of another company's company and then trying to
sell it to the company with a more high price. The typosquatting is a crime by creating a fake domain that is a domain
similar to someone else's domain name.
- Cyber Terrorism
Cybercrime actions include cyber terrorism if it threatens government or citizens, including cracking into government or
military sites.
2.2. Constitution of Electronic Information
This law was originally to protect the interests of the state, the public, and the private sector from cybercrime. There
are three broad categories that include laws that are about defamation, blasphemy, and online threats.The law ensnares not
only the author but also those who distribute, transmit, or otherwise make the content accessible electronically. The mistake is
to distribute is to send and disseminate information and electronic documents to many people or various parties through the
internet network. Transmitting is sending information directed to one party through the virtual world. Making publicly
accessible content is all other cybercrime deeds. Those who share information or content that violates the law may be charged
and penalized. Social media users should be more careful and do not share things publicly without good and correct
verification. The information should be reexamined before it is fully shared publicly. Sharing, distributing and harming others
is a criminal act that can be criminalized. The following are some restrictions that must be considered in using information in
the scope of cyberspace.
- Create and grant access to ethically charged content
Any person who knowingly distributes, transmits, and or creates content that has an electronic infringement charge that is
accessible electronically can be charged under this Act.
- Threaten, blackmail and defame a person's name
Any person who distributes, transmits and makes accessible electronic information possessing defamation or defamation
contents outlined in the Criminal Code may be charged under this article.
- Tapping
Tapping can only be done for the purpose of investigating law enforcement officers. The intercepts referred to are those for
The International Journal Of Humanities & Social Studies (ISSN 2321 - 9203) www.theijhss.com
212 Vol 5 Issue 12 December, 2017
listening, recording, deflecting, altering, inhibiting, and recording non-public information, using either a wired
communications network or a wireless network, such as electromagnetic or radio frequency.
- Defamation
Any person intentionally and without the right to distribute, transmit and make such information publicly accessible shall
be subject to criminal penalties.
- Hoax
This type of prohibition to provide false news that is provocative and misleading which resulted in the loss of consumers
can be punished with imprisonment.
- Hate Speech
Threats of disseminating information aimed at generating a sense of hatred or hostility towards specific individuals or
groups of people based on ethnicity, religion, race, and intergroup including things that can be criminalized.
3. Result and Discussion
3.1. Crime Juridiction in Cybercrime Transaction
Cybercrime is an illegal activity conducted in cyberspace with comp
Jurisdiction is a state's authority to exercise its national law against persons, objects, or legal events. State jurisdiction
in international law means the right of a State to regulate and influence by legislative, executive, and judicial measures and
actions on the rights of individuals, property or property, behaviors or events which are problems within a country and
abroad.
Jurisdiction relates to legal matters, the powers or authorities of a judiciary or other legal entity which is based on
applicable law. There are limits to the scope of that ability to create, implement and apply the law to those who disobey it.
Although jurisdiction is closely related to territory, this linkage is not absolute. Other states may also have authority to try an
act done abroad.
The jurisdiction of the law has always been a serious problem faced by law enforcers especially if the offender is a
foreign citizen. Cybercrime and jurisdiction make it clear that to address cybercrime problems within this legal jurisdiction
involving inter-state. Several components can be used by states to claim legal jurisdiction over cybercrime cases:
- Place of crime conducted
This is usually done by applying the principle of territoriality by factors such as:
o The locations where crime is committed
o The location where the evidence is located
o The locations where the offender is located
o The location where the result is located
o The locations where the matters related to the crime is located
- The Place where the perpetrator was arrested
This component is used by applying the principle of universality in which each State has the right to try any person who
commits an international crime.
- Citizenship
This component is divided into two, citizenship of victims and perpetrators. The victim's citizenship may be used to claim
the jurisdiction of a case and the perpetrator's citizenship may also be used but the offending State must guarantee to
prosecute justly the offender for feeling responsible for the acts perpetrated by the offender.
- The strength of the case
This component should be submitted by the public prosecutor in a document stating that they have a strong case to
prosecute the perpetrator in his country.
- Criminalization
The duration of the crime can be used as a component to determine jurisdiction in the case of cybercrime.
- Justice and Comfort
Justice aims to state the right to claim jurisdiction over cybercrime cases. The country has a fair, impartial and comfortable
judicial system for witnesses to attend the hearing.
The International Journal Of Humanities & Social Studies (ISSN 2321 - 9203) www.theijhss.com
213 Vol 5 Issue 12 December, 2017
3.2. Law Enforcement
Law enforcement on cybercrime especially in Indonesia is strongly influenced by five factors such as law, mentality,
social behavior, means, and culture. The law cannot be upright by itself always involves humans in it and also involves human
behavior in it. The law also can not erect by itself without any law enforcers. Law enforcers are not only prosecuted for
professionalism and smart in applying legal norms but also dealing with someone even a group of people suspected of
committing a crime.
Law enforcers are required to work hard because law enforcement is the main subject of war against cyber crime. For
example, UN Resolution No. 5 of 1963 on efforts to combat crimes of misuse of Information Technology on December 4, 2001,
indicates that there are a severe, grave and immediate international problem. The Criminal Code is still used as the legal basis
to encompass cybercrime, especially the cybercrime which fulfills the elements in the articles of the Criminal Code. Some of the
constitutional grounds in the Criminal Code used by law enforcement agencies include:
 Article 167 of the Criminal Code
 Article 406 paragraph1 of the Criminal Code
 Article 282 of the Criminal Code
 Article 378 of the Criminal Code
 Article 112 of the Criminal Code
 Article 362 of the Criminal Code
 Article 372 of the Criminal Code
There is another law related to this matter. It is Law No. 11 of 2008 on Information and Electronic Transactions (IET).
The rules of criminal acts committed therein are proven to threaten the internet users. Since the enactment of Law No. 11 Year
2008 on Information and Electronic Transactions on 21 April 2008, has caused many victims. Based on the monitoring that has
been the alliance do at least there have four people who called the police and became a suspect for allegedly committed a crime
stipulated in the Law on ITE. The suspects or victims of the ITE Act are active internet users who are accused of insulting or
related to the contempt content on the internet.Those accused under the IET Law are likely to be subject to Article 27
paragraph 3 in conjunction with Article 45 paragraph 1 of the IET Law which is six years in jail and 1 billion rupiahs fine. IET
law can be used to beat all cybercrime activities on the internet without exception.
3.3. Legal Sanctions
Several laws govern the penalties for cybercrime perpetrators. Here are some of the laws that serve as the reference of the
state of Indonesia in regulating the punishment of cybercrime perpetrators:
1. Law No. 19 of 2002 on Copyright. According to Article 1 of Law No. 19 of 2002 on Copyrights stated that a computer
program is a set of instructions embodied in the form of a language, code, scheme or another form. When combined with a
computer software, it is capable of making the computer work to perform functions, special functions or to achieve specific
results, including preparation for designing such instructions. The copyright for the computer program is valid for 50
years, as contained in Article 30. The price of a costly computer or software program for Indonesian citizens is a promising
opportunity for businesses to double and sell pirated software at very low prices.
2. Law No. 36 of 1999 on Telecommunications. According to Article 1 of Law No. 36 of 1999, Telecommunications is any
transmission, transmission, and acceptance and any information in the form of signs, signals, writings, drawings, sounds
and sounds through a wire, optical, radio, or other electromagnetic systems. From the definition, the Internet and all its
facilities is one form of communication tool because it can send and receive any information in the form of images, sounds,
and films with electromagnetic systems. Misuse of the Internet disturbing public or private order may be penalized by
using this Act:
 Illegal access, acts of unauthorized access to this computer system has not been regulated in the legislative system in
Indonesia. Article 22 number 36 year 1999 concerning Telecommunication may be applied. Article 22 of the
Telecommunications Law states that everyone is prohibited from doing unlawful, unlawful, or manipulating acts:
a. Access to telecommunication networks
b. Access to telecommunication services
c. Access to dedicated telecommunication networks.
Article 50 of the Telecommunications Law provides a criminal penalty against anyone who violates the provisions of
Article 22 of the Telecommunications Law with a maximum imprisonment of six years or a maximum fine of Rp.
600,000,000.00.
 Illegal interception of computer operations, systems, and computer networks. Article 40 of the Telecommunications
Law may apply to this type of interception. Article 56 of the Telecommunications Law provides a criminal penalty
against anyone who violates the provisions of Article 40 with a maximum imprisonment of 15 (fifteen) years.
3. Law No. 8 of 1997 concerning Company Documents. By the issuance of Law no. 8 of 1997 dated March 24, 1997,
concerning Company Documents in the provisions of one of its articles regulates the possibility of storing corporate
documents in the form of electronic (paperless) acknowledging that company documents stored in electronic media can be
The International Journal Of Humanities & Social Studies (ISSN 2321 - 9203) www.theijhss.com
214 Vol 5 Issue 12 December, 2017
used as valid evidence. For example, Compact Disk Read Only Memory (CD ROM), and Write Once Read Many (WORM),
outlined in Article 12 of the Act as valid evidence.
4. Law No. 25 of 2003 on Amendment to Law no. 15 year 2002 on the Crime of Money Laundering. This law is the most
powerful law for an investigator to obtain information about a suspect who commits fraud over the Internet since it does
not require long and time-consuming bureaucratic procedures since fraud is one of the types of crimes included in the
washing money as contained in article 2, paragraph 1. The Investigator may request to the bank receiving the transfer to
provide the identity and banking data owned by the suspect without having to follow the rules as stipulated in the Banking
Act. In the Banking Act the identity and banking data is part of bank secrecy so that if the investigator needs the
information and data, the procedure to be done is to send a letter from the Chief of Police to the Governor of Bank
Indonesia.
4. Conclusion
Cybercrime is a crime arising from the negative impact of technological development. Means used in the form of
computers, smartphones, and devices connected to the Internet. It also occurs because of the inability of the law including the
apparatus in reaching it. This crime is virtual because the offender does not appear physically.Cybercrime law enforcement is
an activity that harmonizes the values that are outlined in the law against cybercrime. Cybercrime is an unlawful activity
conducted using the internet based on the sophistication of computer technology and telecommunications.Jurisdiction in
cyberspace requires clear principles rooted in international law. Each country may develop regulations to adopt the same
solution to statements concerning internet jurisdiction. The principles of jurisdiction will make it easier for states to enter into
cooperation to harmonize criminal provisions to cope with cybercrime.Indonesia has implemented a strong jurisdiction
system in tackling cybercrime. These provisions have been regulated in the Criminal Code as appropriate. Under applicable
law, cybercriminals will be prosecuted by the provisions.
5. References
i. Brown, C. S. (2015). Investigating and Prosecuting Cyber Crime: Forensic Dependencies and Barriers to Justice.
International Journal of Cyber Criminology, 9(1), 55-119.
ii. Hait, A. A. (2014). Jurisdiction in Cybercrimes: A Comparative Study. Journal of Law, Policy and Globalization, 22, 75-
84.
iii. Hariyanto, & Siahaan, A. P. (2016). Intrusion Detection System in Network Forensic Analysis and Investigation. IOSR
Journal of Computer Engineering, 18(6), 115-121.
iv. Manurung, D. (2013, 11 27). Cyber Crime: Hukum dan Sanksi. (Blogspot) Retrieved 12 10, 2017, from
http://desrianimanroe.blogspot.co.id/2013/11/hukum-dan-sanksi.html
v. Muslimah, S., & Hidayati, N. (2017, 9 29). 7 Hal di UU ITE yang Wajib Kamu Tahu Agar Tak Bernasib Seperti Jonru.
(Kumparan) Retrieved 12 20, 2017, from https://kumparan.com/@kumparannews/7-hal-di-uu-ite-yang-wajib-
kamu-tahu-agar-tak-bernasib-seperti-jonru
vi. Ramadhani, S., Saragih, Y. M., Rahim, R., & Siahaan, A. P. (2017). Post-Genesis Digital Forensics Investigation.
International Journal of Scientific Research in Science and Technology, 3(6), 164-166.
vii. Rusmiatiningsih. (2013, 10 19). Yuridiksi Hukum Pidana dalam Transaksi Cybercrime. (Blogspot) Retrieved 12 20,
2017, from http://rusmiatiningsih.blogspot.co.id/2013/10/yuridiksi-hukum-pidana-dalam-transaksi.html
viii. Saragih, Y. M., & Siahaan, A. P. (2016). Cyber Crime Prevention Strategy in Indonesia. International Journal of
Humanities and Social Science, 3(6), 22-26.
ix. Sudyana, D. (2015, 10 1). Pengenalan Cyber Crime. Retrieved 12 20, 2017, from
http://blog.didiksudyana.com/2015/10/pengenalan-cyber-crime.html
x. Tasril, V., Ginting, M. B., Mardiana, & Siahaan, A. P. (2017). Threats of Computer System and its Prevention.
International Journal of Scientific Research in Science and Technology, 3(6), 448-451.
xi. Triwahyuni, Y. (2015, 12 5). Pengertian, Jenis-jenis, dan Contoh Kasus Cyber Crime. (Wordpress) Retrieved 12 20, 2017,
from https://yuliatwn.wordpress.com/2015/12/05/pengertian-jenis-jenis-dan-contoh-kasus-cyber-crime/

Mais conteúdo relacionado

Mais procurados

Cyber Crime; Plague of 21st century
Cyber Crime; Plague of 21st centuryCyber Crime; Plague of 21st century
Cyber Crime; Plague of 21st centuryMD Alauddin
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crimeishmecse13
 
Cyber Laws in Pakistan
Cyber Laws in PakistanCyber Laws in Pakistan
Cyber Laws in PakistanAyesha Majid
 
Cyber defamation
Cyber defamationCyber defamation
Cyber defamationTuhin Batra
 
Cyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information AgeCyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information AgeVishni Ganepola
 
Cyber law by pravin ghosekar
Cyber law by pravin ghosekarCyber law by pravin ghosekar
Cyber law by pravin ghosekarPravinGhosekar
 
Legal, Ethical and Societal Issues in Media and Information - Media and Infor...
Legal, Ethical and Societal Issues in Media and Information - Media and Infor...Legal, Ethical and Societal Issues in Media and Information - Media and Infor...
Legal, Ethical and Societal Issues in Media and Information - Media and Infor...Mark Jhon Oxillo
 
Existing Sri Lankan Legal Framework on Cyber Crimes
Existing Sri Lankan Legal Framework on Cyber CrimesExisting Sri Lankan Legal Framework on Cyber Crimes
Existing Sri Lankan Legal Framework on Cyber CrimesVishni Ganepola
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In PakistanTaha Mehmood
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report Shishupal Nagar
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippinesian_oguis
 
Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Faridah Husin
 
Digital Security Act (DSA) 2018 in Bangladesh
Digital Security Act (DSA) 2018 in BangladeshDigital Security Act (DSA) 2018 in Bangladesh
Digital Security Act (DSA) 2018 in BangladeshMd. Mehedi Al Hasan Rakib
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIJames Bollen
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimesrinushalu
 

Mais procurados (20)

Computer crime
 Computer crime Computer crime
Computer crime
 
Cyber Crime; Plague of 21st century
Cyber Crime; Plague of 21st centuryCyber Crime; Plague of 21st century
Cyber Crime; Plague of 21st century
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crime
 
Cyber Laws in Pakistan
Cyber Laws in PakistanCyber Laws in Pakistan
Cyber Laws in Pakistan
 
Cyber defamation
Cyber defamationCyber defamation
Cyber defamation
 
Cybertort Imp Slides For Pub. Internet
Cybertort Imp Slides For Pub. InternetCybertort Imp Slides For Pub. Internet
Cybertort Imp Slides For Pub. Internet
 
Cyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information AgeCyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information Age
 
Cyber law by pravin ghosekar
Cyber law by pravin ghosekarCyber law by pravin ghosekar
Cyber law by pravin ghosekar
 
Legal, Ethical and Societal Issues in Media and Information - Media and Infor...
Legal, Ethical and Societal Issues in Media and Information - Media and Infor...Legal, Ethical and Societal Issues in Media and Information - Media and Infor...
Legal, Ethical and Societal Issues in Media and Information - Media and Infor...
 
Existing Sri Lankan Legal Framework on Cyber Crimes
Existing Sri Lankan Legal Framework on Cyber CrimesExisting Sri Lankan Legal Framework on Cyber Crimes
Existing Sri Lankan Legal Framework on Cyber Crimes
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In Pakistan
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippines
 
Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203
 
Digital Security Act (DSA) 2018 in Bangladesh
Digital Security Act (DSA) 2018 in BangladeshDigital Security Act (DSA) 2018 in Bangladesh
Digital Security Act (DSA) 2018 in Bangladesh
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLI
 
Digital security act (DSA)
Digital security act (DSA)Digital security act (DSA)
Digital security act (DSA)
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Cyber space: its legal jurisdiction
Cyber space: its legal jurisdictionCyber space: its legal jurisdiction
Cyber space: its legal jurisdiction
 

Semelhante a Violations of Cybercrime and the Strength of Jurisdiction in Indonesia

Semelhante a Violations of Cybercrime and the Strength of Jurisdiction in Indonesia (20)

Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
Research Paper On Cybercrime
Research Paper On CybercrimeResearch Paper On Cybercrime
Research Paper On Cybercrime
 
Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Essay Cyber Crime
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime Essay
Cyber Crime EssayCyber Crime Essay
Cyber Crime Essay
 
Cyber Crime Essays
Cyber Crime EssaysCyber Crime Essays
Cyber Crime Essays
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Cyber-Law and Cyber-Crime
Cyber-Law and Cyber-CrimeCyber-Law and Cyber-Crime
Cyber-Law and Cyber-Crime
 
Cyber law and cyber-crime
Cyber law and cyber-crimeCyber law and cyber-crime
Cyber law and cyber-crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
The Authority of Government in Clearing Hatefull and Hostilities Electronic I...
The Authority of Government in Clearing Hatefull and Hostilities Electronic I...The Authority of Government in Clearing Hatefull and Hostilities Electronic I...
The Authority of Government in Clearing Hatefull and Hostilities Electronic I...
 
AN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESAN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMES
 
An introduction to digital crimes
An introduction to digital crimesAn introduction to digital crimes
An introduction to digital crimes
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Mais de Universitas Pembangunan Panca Budi

Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...Universitas Pembangunan Panca Budi
 
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa Universitas Pembangunan Panca Budi
 
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...Universitas Pembangunan Panca Budi
 
Insecure Whatsapp Chat History, Data Storage and Proposed Security
Insecure Whatsapp Chat History, Data Storage and Proposed SecurityInsecure Whatsapp Chat History, Data Storage and Proposed Security
Insecure Whatsapp Chat History, Data Storage and Proposed SecurityUniversitas Pembangunan Panca Budi
 
Prim and Genetic Algorithms Performance in Determining Optimum Route on Graph
Prim and Genetic Algorithms Performance in Determining Optimum Route on GraphPrim and Genetic Algorithms Performance in Determining Optimum Route on Graph
Prim and Genetic Algorithms Performance in Determining Optimum Route on GraphUniversitas Pembangunan Panca Budi
 
Multi-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Multi-Attribute Decision Making with VIKOR Method for Any Purpose DecisionMulti-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Multi-Attribute Decision Making with VIKOR Method for Any Purpose DecisionUniversitas Pembangunan Panca Budi
 
Mobile Application Detection of Road Damage using Canny Algorithm
Mobile Application Detection of Road Damage using Canny AlgorithmMobile Application Detection of Road Damage using Canny Algorithm
Mobile Application Detection of Road Damage using Canny AlgorithmUniversitas Pembangunan Panca Budi
 
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...Universitas Pembangunan Panca Budi
 
Prototype Application Multimedia Learning for Teaching Basic English
Prototype Application Multimedia Learning for Teaching Basic EnglishPrototype Application Multimedia Learning for Teaching Basic English
Prototype Application Multimedia Learning for Teaching Basic EnglishUniversitas Pembangunan Panca Budi
 
TOPSIS Method Application for Decision Support System in Internal Control for...
TOPSIS Method Application for Decision Support System in Internal Control for...TOPSIS Method Application for Decision Support System in Internal Control for...
TOPSIS Method Application for Decision Support System in Internal Control for...Universitas Pembangunan Panca Budi
 
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...Universitas Pembangunan Panca Budi
 
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...Universitas Pembangunan Panca Budi
 
Prim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Prim's Algorithm for Optimizing Fiber Optic Trajectory PlanningPrim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Prim's Algorithm for Optimizing Fiber Optic Trajectory PlanningUniversitas Pembangunan Panca Budi
 
A Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityA Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityUniversitas Pembangunan Panca Budi
 
Expert System of Catfish Disease Determinant Using Certainty Factor Method
Expert System of Catfish Disease Determinant Using Certainty Factor MethodExpert System of Catfish Disease Determinant Using Certainty Factor Method
Expert System of Catfish Disease Determinant Using Certainty Factor MethodUniversitas Pembangunan Panca Budi
 

Mais de Universitas Pembangunan Panca Budi (20)

Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
 
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
 
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
 
Insecure Whatsapp Chat History, Data Storage and Proposed Security
Insecure Whatsapp Chat History, Data Storage and Proposed SecurityInsecure Whatsapp Chat History, Data Storage and Proposed Security
Insecure Whatsapp Chat History, Data Storage and Proposed Security
 
Online Shoppers Acceptance: An Exploratory Study
Online Shoppers Acceptance: An Exploratory StudyOnline Shoppers Acceptance: An Exploratory Study
Online Shoppers Acceptance: An Exploratory Study
 
Prim and Genetic Algorithms Performance in Determining Optimum Route on Graph
Prim and Genetic Algorithms Performance in Determining Optimum Route on GraphPrim and Genetic Algorithms Performance in Determining Optimum Route on Graph
Prim and Genetic Algorithms Performance in Determining Optimum Route on Graph
 
Multi-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Multi-Attribute Decision Making with VIKOR Method for Any Purpose DecisionMulti-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Multi-Attribute Decision Making with VIKOR Method for Any Purpose Decision
 
Mobile Application Detection of Road Damage using Canny Algorithm
Mobile Application Detection of Road Damage using Canny AlgorithmMobile Application Detection of Road Damage using Canny Algorithm
Mobile Application Detection of Road Damage using Canny Algorithm
 
Super-Encryption Cryptography with IDEA and WAKE Algorithm
Super-Encryption Cryptography with IDEA and WAKE AlgorithmSuper-Encryption Cryptography with IDEA and WAKE Algorithm
Super-Encryption Cryptography with IDEA and WAKE Algorithm
 
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
 
Prototype Application Multimedia Learning for Teaching Basic English
Prototype Application Multimedia Learning for Teaching Basic EnglishPrototype Application Multimedia Learning for Teaching Basic English
Prototype Application Multimedia Learning for Teaching Basic English
 
TOPSIS Method Application for Decision Support System in Internal Control for...
TOPSIS Method Application for Decision Support System in Internal Control for...TOPSIS Method Application for Decision Support System in Internal Control for...
TOPSIS Method Application for Decision Support System in Internal Control for...
 
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
 
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
 
Prim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Prim's Algorithm for Optimizing Fiber Optic Trajectory PlanningPrim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Prim's Algorithm for Optimizing Fiber Optic Trajectory Planning
 
Image Similarity Test Using Eigenface Calculation
Image Similarity Test Using Eigenface CalculationImage Similarity Test Using Eigenface Calculation
Image Similarity Test Using Eigenface Calculation
 
Data Compression Using Elias Delta Code
Data Compression Using Elias Delta CodeData Compression Using Elias Delta Code
Data Compression Using Elias Delta Code
 
A Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityA Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network Security
 
Expert System of Catfish Disease Determinant Using Certainty Factor Method
Expert System of Catfish Disease Determinant Using Certainty Factor MethodExpert System of Catfish Disease Determinant Using Certainty Factor Method
Expert System of Catfish Disease Determinant Using Certainty Factor Method
 
Examination of Document Similarity Using Rabin-Karp Algorithm
Examination of Document Similarity Using Rabin-Karp AlgorithmExamination of Document Similarity Using Rabin-Karp Algorithm
Examination of Document Similarity Using Rabin-Karp Algorithm
 

Último

citizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicablecitizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicableSaraSantiago44
 
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptxSarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptxAnto Jebin
 
Right to life and personal liberty under article 21
Right to life and personal liberty under article 21Right to life and personal liberty under article 21
Right to life and personal liberty under article 21vasanthakumarsk17
 
The Punjab Land Reforms AcT 1972 HIRDEBIR.pptx
The Punjab Land Reforms AcT 1972 HIRDEBIR.pptxThe Punjab Land Reforms AcT 1972 HIRDEBIR.pptx
The Punjab Land Reforms AcT 1972 HIRDEBIR.pptxgurcharnsinghlecengl
 
Town of Haverhill's Statement of Facts for Summary Judgment on Counterclaims ...
Town of Haverhill's Statement of Facts for Summary Judgment on Counterclaims ...Town of Haverhill's Statement of Facts for Summary Judgment on Counterclaims ...
Town of Haverhill's Statement of Facts for Summary Judgment on Counterclaims ...Rich Bergeron
 
Are There Any Alternatives To Jail Time For Sex Crime Convictions in Los Angeles
Are There Any Alternatives To Jail Time For Sex Crime Convictions in Los AngelesAre There Any Alternatives To Jail Time For Sex Crime Convictions in Los Angeles
Are There Any Alternatives To Jail Time For Sex Crime Convictions in Los AngelesChesley Lawyer
 
RA. 7432 and RA 9994 Senior Citizen .pptx
RA. 7432 and RA 9994 Senior Citizen .pptxRA. 7432 and RA 9994 Senior Citizen .pptx
RA. 7432 and RA 9994 Senior Citizen .pptxJFSB1
 
Hungarian legislation made by Robert Miklos
Hungarian legislation made by Robert MiklosHungarian legislation made by Robert Miklos
Hungarian legislation made by Robert Miklosbeduinpower135
 
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdfWurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdfssuser3e15612
 
Illinois Department Of Corrections reentry guide
Illinois Department Of Corrections reentry guideIllinois Department Of Corrections reentry guide
Illinois Department Of Corrections reentry guideillinoisworknet11
 
Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.2020000445musaib
 
Guide for Drug Education and Vice Control.docx
Guide for Drug Education and Vice Control.docxGuide for Drug Education and Vice Control.docx
Guide for Drug Education and Vice Control.docxjennysansano2
 
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksUnderstanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksFinlaw Associates
 
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTSTHE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTSRoshniSingh312153
 
1990-2004 Bar Questions and Answers in Sales
1990-2004 Bar Questions and Answers in Sales1990-2004 Bar Questions and Answers in Sales
1990-2004 Bar Questions and Answers in SalesMelvinPernez2
 
Town of Haverhill's Motion for Summary Judgment on DTC Counterclaims
Town of Haverhill's Motion for Summary Judgment on DTC CounterclaimsTown of Haverhill's Motion for Summary Judgment on DTC Counterclaims
Town of Haverhill's Motion for Summary Judgment on DTC CounterclaimsRich Bergeron
 
Choosing the Right Business Structure for Your Small Business in Texas
Choosing the Right Business Structure for Your Small Business in TexasChoosing the Right Business Structure for Your Small Business in Texas
Choosing the Right Business Structure for Your Small Business in TexasBrandy Austin
 
Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...
Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...
Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...Rich Bergeron
 
Grey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxGrey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxBharatMunjal4
 
Labour legislations in India and its history
Labour legislations in India and its historyLabour legislations in India and its history
Labour legislations in India and its historyprasannamurthy6
 

Último (20)

citizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicablecitizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicable
 
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptxSarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
 
Right to life and personal liberty under article 21
Right to life and personal liberty under article 21Right to life and personal liberty under article 21
Right to life and personal liberty under article 21
 
The Punjab Land Reforms AcT 1972 HIRDEBIR.pptx
The Punjab Land Reforms AcT 1972 HIRDEBIR.pptxThe Punjab Land Reforms AcT 1972 HIRDEBIR.pptx
The Punjab Land Reforms AcT 1972 HIRDEBIR.pptx
 
Town of Haverhill's Statement of Facts for Summary Judgment on Counterclaims ...
Town of Haverhill's Statement of Facts for Summary Judgment on Counterclaims ...Town of Haverhill's Statement of Facts for Summary Judgment on Counterclaims ...
Town of Haverhill's Statement of Facts for Summary Judgment on Counterclaims ...
 
Are There Any Alternatives To Jail Time For Sex Crime Convictions in Los Angeles
Are There Any Alternatives To Jail Time For Sex Crime Convictions in Los AngelesAre There Any Alternatives To Jail Time For Sex Crime Convictions in Los Angeles
Are There Any Alternatives To Jail Time For Sex Crime Convictions in Los Angeles
 
RA. 7432 and RA 9994 Senior Citizen .pptx
RA. 7432 and RA 9994 Senior Citizen .pptxRA. 7432 and RA 9994 Senior Citizen .pptx
RA. 7432 and RA 9994 Senior Citizen .pptx
 
Hungarian legislation made by Robert Miklos
Hungarian legislation made by Robert MiklosHungarian legislation made by Robert Miklos
Hungarian legislation made by Robert Miklos
 
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdfWurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
 
Illinois Department Of Corrections reentry guide
Illinois Department Of Corrections reentry guideIllinois Department Of Corrections reentry guide
Illinois Department Of Corrections reentry guide
 
Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.
 
Guide for Drug Education and Vice Control.docx
Guide for Drug Education and Vice Control.docxGuide for Drug Education and Vice Control.docx
Guide for Drug Education and Vice Control.docx
 
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksUnderstanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
 
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTSTHE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
 
1990-2004 Bar Questions and Answers in Sales
1990-2004 Bar Questions and Answers in Sales1990-2004 Bar Questions and Answers in Sales
1990-2004 Bar Questions and Answers in Sales
 
Town of Haverhill's Motion for Summary Judgment on DTC Counterclaims
Town of Haverhill's Motion for Summary Judgment on DTC CounterclaimsTown of Haverhill's Motion for Summary Judgment on DTC Counterclaims
Town of Haverhill's Motion for Summary Judgment on DTC Counterclaims
 
Choosing the Right Business Structure for Your Small Business in Texas
Choosing the Right Business Structure for Your Small Business in TexasChoosing the Right Business Structure for Your Small Business in Texas
Choosing the Right Business Structure for Your Small Business in Texas
 
Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...
Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...
Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...
 
Grey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxGrey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptx
 
Labour legislations in India and its history
Labour legislations in India and its historyLabour legislations in India and its history
Labour legislations in India and its history
 

Violations of Cybercrime and the Strength of Jurisdiction in Indonesia

  • 1. The International Journal Of Humanities & Social Studies (ISSN 2321 - 9203) www.theijhss.com 209 Vol 5 Issue 12 December, 2017 THE INTERNATIONAL JOURNAL OF HUMANITIES & SOCIAL STUDIES Violations of Cybercrime and the Strength of Jurisdiction in Indonesia 1. Introduction Technological advances open up huge crime opportunities. This can be seen from the many cases that come to court about digital crime. The cases handled are about the misuse of technologies such as the internet, hoaxes, fake photos and others. One of the facts that cause cybercrime is the need for computer network technology is increasing. Commercial community activities become important things done by using the computer network. It can be spread all over the country. World activities will last for 24 hours and can be monitored for 24 hours as well. These activities include stock trading, banking, and other financial activities. In cyberspace, any activity can be done. This positively impacts technological advancements and adds convenience for people to exchange information. But this did not escape the negative impact. When pornography rife on the internet, the law can not do much in the past. The development of internet technology triggered the emergence of cybercrime. This action will harm others. Cybercrime activities include credit card theft, hacking multiple sites, intercepting other people's data transmissions, and manipulating data by preparing several programs such as viruses to commit such crimes. Cybercrime has become a threat to international stability, so the government is difficult to compensate crime techniques done with computer technology, especially internet and intranet networks. Cyberspace is a media without limits because it is connected to a network of computers connected to the world. It does not recognize territorial or state boundaries. This crime will cause its problems, especially in criminal law and jurisdiction. Jurisdiction is the power or competence of state law against people, objects or events. This is the principle of state sovereignty, equality of state and principle of non-interference. Jurisdiction is also a vital and central form of sovereignty that can transform, create or terminate a legal relationship or obligation. This research tries to explain how the legal system will be applied to cybercrime perpetrators based on certain violations. Each violation has a different legal act. By applying jurisdiction, cybercrime actors will be reduced for the sake of state stability and sovereignty. Masdin Saragih Lecturer, Faculty of Law, Universitas Simalungun, Simalungun, Indonesia Henry Aspan Lecturer, Faculty of Economics and Business, Universitas Pembangunan Panca Budi, Medan, Indonesia Andysah Putera Utama Siahaan Lecturer, Faculty of Computer Science, Universitas Pembangunan Panca Budi, Medan, Indonesia Ph.D. Student, Department of School of Computer and Communication Engineering, Universiti Malaysia Perlis, Kangar, Malaysia Abstract: Cybercrime is a digital crime committed to reaping profits through the Internet as a medium. Any criminal activity that occurs in the digital world or through the internet network is referred to as internet crime. Cybercrime also refers to criminal activity on computers and computer networks. This activity can be done in a certain location or even done between countries. These crimes include credit card forgery, confidence fraud, the dissemination of personal information, pornography, and so on. In ancient times there was no strong law to combat cybercrime. Since there are electronic information laws and transactions, legal jurisdiction of computer crime has been applied. Computer networks are not only installed in one particular local area but can be applied to a worldwide network. It is what makes cybercrime can occur between countries freely. This issue requires universal jurisdiction. A country has the authority to combat crimes that threaten the international community. This jurisdiction is applied without determining where the crime was committed and the citizen who committed the cybercrime. This jurisdiction is created in the absence of an international judicial body specifically to try individual crimes. Cybercrime cannot be totally eradicated. Implementing international jurisdiction at least reduces the number of cybercrimes in the world. Keywords: Cybercrime, Jurisdiction, Law
  • 2. The International Journal Of Humanities & Social Studies (ISSN 2321 - 9203) www.theijhss.com 210 Vol 5 Issue 12 December, 2017 2. Theories 2.1. Cybercrime Cybercrime is an illegal activity conducted in cyberspace with computer intermediaries or other electronic equipment. It includes technologies that support technological means such as mobile phones, smartphones and others that can be done through a global electronic network. Cybercrime attempts to enter a computer network without permission. Cybercrime is considered to conflict or against any applicable law. The difference with a common crime can be seen from the versatile capabilities shown by the development of information and sophisticated communication technology. Figure 1 describes the types of cybercrime. Figure 1: Types of Cybercrime There are several types of crime on cybercrime that can be classified based on the activities such as:
  • 3. The International Journal Of Humanities & Social Studies (ISSN 2321 - 9203) www.theijhss.com 211 Vol 5 Issue 12 December, 2017 - Unauthorized Access It is a crime that occurs when a person enters or infiltrate into a computer network system unlawfully, without permission, or without the knowledge of the owner of the computer network system it enters. Examples of these crimes are Probing and port. - Illegal Contents It is a crime committed by entering data or information to the internet about a thing that is untrue, unethical, and can be regarded as unlawful or disturbing public order, for example, the spread of pornography or untrue news. - Virus Spread The spread of the virus is generally done by using an email. Often people whose email system is exposed to a virus do not realize this. The virus is then sent to another place via email. - Cyber Espionage, Sabotage, and Extortion Cyber Espionage is a crime by way of exploiting the internet network to conduct spying on other parties, by entering the target computer network system. Sabotage and Extortion is a type of crime committed by making interference, destruction or destruction of a data, computer program or computer network system connected to the internet. - Carding Carding is a crime committed to steal credit card numbers belonging to others and used in trade transactions on the internet. - Hacking and Cracking The term hacker usually refers to someone who has a great interest to learn the computer system in detail and how to improve its capabilities. Cracking activity on the internet has a very wide scope, ranging from hijacking someone else's account, website hijacking, probing, spreading the virus, to the disabling of the target. The latter act is referred to a DoS (Denial Of Service).DoS attack is an attack that aims to paralyze the target (hangs, crashes) so it can not provide services. - Cybersquatting and Typosquatting Cybersquatting is a crime committed by registering the domain name of another company's company and then trying to sell it to the company with a more high price. The typosquatting is a crime by creating a fake domain that is a domain similar to someone else's domain name. - Cyber Terrorism Cybercrime actions include cyber terrorism if it threatens government or citizens, including cracking into government or military sites. 2.2. Constitution of Electronic Information This law was originally to protect the interests of the state, the public, and the private sector from cybercrime. There are three broad categories that include laws that are about defamation, blasphemy, and online threats.The law ensnares not only the author but also those who distribute, transmit, or otherwise make the content accessible electronically. The mistake is to distribute is to send and disseminate information and electronic documents to many people or various parties through the internet network. Transmitting is sending information directed to one party through the virtual world. Making publicly accessible content is all other cybercrime deeds. Those who share information or content that violates the law may be charged and penalized. Social media users should be more careful and do not share things publicly without good and correct verification. The information should be reexamined before it is fully shared publicly. Sharing, distributing and harming others is a criminal act that can be criminalized. The following are some restrictions that must be considered in using information in the scope of cyberspace. - Create and grant access to ethically charged content Any person who knowingly distributes, transmits, and or creates content that has an electronic infringement charge that is accessible electronically can be charged under this Act. - Threaten, blackmail and defame a person's name Any person who distributes, transmits and makes accessible electronic information possessing defamation or defamation contents outlined in the Criminal Code may be charged under this article. - Tapping Tapping can only be done for the purpose of investigating law enforcement officers. The intercepts referred to are those for
  • 4. The International Journal Of Humanities & Social Studies (ISSN 2321 - 9203) www.theijhss.com 212 Vol 5 Issue 12 December, 2017 listening, recording, deflecting, altering, inhibiting, and recording non-public information, using either a wired communications network or a wireless network, such as electromagnetic or radio frequency. - Defamation Any person intentionally and without the right to distribute, transmit and make such information publicly accessible shall be subject to criminal penalties. - Hoax This type of prohibition to provide false news that is provocative and misleading which resulted in the loss of consumers can be punished with imprisonment. - Hate Speech Threats of disseminating information aimed at generating a sense of hatred or hostility towards specific individuals or groups of people based on ethnicity, religion, race, and intergroup including things that can be criminalized. 3. Result and Discussion 3.1. Crime Juridiction in Cybercrime Transaction Cybercrime is an illegal activity conducted in cyberspace with comp Jurisdiction is a state's authority to exercise its national law against persons, objects, or legal events. State jurisdiction in international law means the right of a State to regulate and influence by legislative, executive, and judicial measures and actions on the rights of individuals, property or property, behaviors or events which are problems within a country and abroad. Jurisdiction relates to legal matters, the powers or authorities of a judiciary or other legal entity which is based on applicable law. There are limits to the scope of that ability to create, implement and apply the law to those who disobey it. Although jurisdiction is closely related to territory, this linkage is not absolute. Other states may also have authority to try an act done abroad. The jurisdiction of the law has always been a serious problem faced by law enforcers especially if the offender is a foreign citizen. Cybercrime and jurisdiction make it clear that to address cybercrime problems within this legal jurisdiction involving inter-state. Several components can be used by states to claim legal jurisdiction over cybercrime cases: - Place of crime conducted This is usually done by applying the principle of territoriality by factors such as: o The locations where crime is committed o The location where the evidence is located o The locations where the offender is located o The location where the result is located o The locations where the matters related to the crime is located - The Place where the perpetrator was arrested This component is used by applying the principle of universality in which each State has the right to try any person who commits an international crime. - Citizenship This component is divided into two, citizenship of victims and perpetrators. The victim's citizenship may be used to claim the jurisdiction of a case and the perpetrator's citizenship may also be used but the offending State must guarantee to prosecute justly the offender for feeling responsible for the acts perpetrated by the offender. - The strength of the case This component should be submitted by the public prosecutor in a document stating that they have a strong case to prosecute the perpetrator in his country. - Criminalization The duration of the crime can be used as a component to determine jurisdiction in the case of cybercrime. - Justice and Comfort Justice aims to state the right to claim jurisdiction over cybercrime cases. The country has a fair, impartial and comfortable judicial system for witnesses to attend the hearing.
  • 5. The International Journal Of Humanities & Social Studies (ISSN 2321 - 9203) www.theijhss.com 213 Vol 5 Issue 12 December, 2017 3.2. Law Enforcement Law enforcement on cybercrime especially in Indonesia is strongly influenced by five factors such as law, mentality, social behavior, means, and culture. The law cannot be upright by itself always involves humans in it and also involves human behavior in it. The law also can not erect by itself without any law enforcers. Law enforcers are not only prosecuted for professionalism and smart in applying legal norms but also dealing with someone even a group of people suspected of committing a crime. Law enforcers are required to work hard because law enforcement is the main subject of war against cyber crime. For example, UN Resolution No. 5 of 1963 on efforts to combat crimes of misuse of Information Technology on December 4, 2001, indicates that there are a severe, grave and immediate international problem. The Criminal Code is still used as the legal basis to encompass cybercrime, especially the cybercrime which fulfills the elements in the articles of the Criminal Code. Some of the constitutional grounds in the Criminal Code used by law enforcement agencies include:  Article 167 of the Criminal Code  Article 406 paragraph1 of the Criminal Code  Article 282 of the Criminal Code  Article 378 of the Criminal Code  Article 112 of the Criminal Code  Article 362 of the Criminal Code  Article 372 of the Criminal Code There is another law related to this matter. It is Law No. 11 of 2008 on Information and Electronic Transactions (IET). The rules of criminal acts committed therein are proven to threaten the internet users. Since the enactment of Law No. 11 Year 2008 on Information and Electronic Transactions on 21 April 2008, has caused many victims. Based on the monitoring that has been the alliance do at least there have four people who called the police and became a suspect for allegedly committed a crime stipulated in the Law on ITE. The suspects or victims of the ITE Act are active internet users who are accused of insulting or related to the contempt content on the internet.Those accused under the IET Law are likely to be subject to Article 27 paragraph 3 in conjunction with Article 45 paragraph 1 of the IET Law which is six years in jail and 1 billion rupiahs fine. IET law can be used to beat all cybercrime activities on the internet without exception. 3.3. Legal Sanctions Several laws govern the penalties for cybercrime perpetrators. Here are some of the laws that serve as the reference of the state of Indonesia in regulating the punishment of cybercrime perpetrators: 1. Law No. 19 of 2002 on Copyright. According to Article 1 of Law No. 19 of 2002 on Copyrights stated that a computer program is a set of instructions embodied in the form of a language, code, scheme or another form. When combined with a computer software, it is capable of making the computer work to perform functions, special functions or to achieve specific results, including preparation for designing such instructions. The copyright for the computer program is valid for 50 years, as contained in Article 30. The price of a costly computer or software program for Indonesian citizens is a promising opportunity for businesses to double and sell pirated software at very low prices. 2. Law No. 36 of 1999 on Telecommunications. According to Article 1 of Law No. 36 of 1999, Telecommunications is any transmission, transmission, and acceptance and any information in the form of signs, signals, writings, drawings, sounds and sounds through a wire, optical, radio, or other electromagnetic systems. From the definition, the Internet and all its facilities is one form of communication tool because it can send and receive any information in the form of images, sounds, and films with electromagnetic systems. Misuse of the Internet disturbing public or private order may be penalized by using this Act:  Illegal access, acts of unauthorized access to this computer system has not been regulated in the legislative system in Indonesia. Article 22 number 36 year 1999 concerning Telecommunication may be applied. Article 22 of the Telecommunications Law states that everyone is prohibited from doing unlawful, unlawful, or manipulating acts: a. Access to telecommunication networks b. Access to telecommunication services c. Access to dedicated telecommunication networks. Article 50 of the Telecommunications Law provides a criminal penalty against anyone who violates the provisions of Article 22 of the Telecommunications Law with a maximum imprisonment of six years or a maximum fine of Rp. 600,000,000.00.  Illegal interception of computer operations, systems, and computer networks. Article 40 of the Telecommunications Law may apply to this type of interception. Article 56 of the Telecommunications Law provides a criminal penalty against anyone who violates the provisions of Article 40 with a maximum imprisonment of 15 (fifteen) years. 3. Law No. 8 of 1997 concerning Company Documents. By the issuance of Law no. 8 of 1997 dated March 24, 1997, concerning Company Documents in the provisions of one of its articles regulates the possibility of storing corporate documents in the form of electronic (paperless) acknowledging that company documents stored in electronic media can be
  • 6. The International Journal Of Humanities & Social Studies (ISSN 2321 - 9203) www.theijhss.com 214 Vol 5 Issue 12 December, 2017 used as valid evidence. For example, Compact Disk Read Only Memory (CD ROM), and Write Once Read Many (WORM), outlined in Article 12 of the Act as valid evidence. 4. Law No. 25 of 2003 on Amendment to Law no. 15 year 2002 on the Crime of Money Laundering. This law is the most powerful law for an investigator to obtain information about a suspect who commits fraud over the Internet since it does not require long and time-consuming bureaucratic procedures since fraud is one of the types of crimes included in the washing money as contained in article 2, paragraph 1. The Investigator may request to the bank receiving the transfer to provide the identity and banking data owned by the suspect without having to follow the rules as stipulated in the Banking Act. In the Banking Act the identity and banking data is part of bank secrecy so that if the investigator needs the information and data, the procedure to be done is to send a letter from the Chief of Police to the Governor of Bank Indonesia. 4. Conclusion Cybercrime is a crime arising from the negative impact of technological development. Means used in the form of computers, smartphones, and devices connected to the Internet. It also occurs because of the inability of the law including the apparatus in reaching it. This crime is virtual because the offender does not appear physically.Cybercrime law enforcement is an activity that harmonizes the values that are outlined in the law against cybercrime. Cybercrime is an unlawful activity conducted using the internet based on the sophistication of computer technology and telecommunications.Jurisdiction in cyberspace requires clear principles rooted in international law. Each country may develop regulations to adopt the same solution to statements concerning internet jurisdiction. The principles of jurisdiction will make it easier for states to enter into cooperation to harmonize criminal provisions to cope with cybercrime.Indonesia has implemented a strong jurisdiction system in tackling cybercrime. These provisions have been regulated in the Criminal Code as appropriate. Under applicable law, cybercriminals will be prosecuted by the provisions. 5. References i. Brown, C. S. (2015). Investigating and Prosecuting Cyber Crime: Forensic Dependencies and Barriers to Justice. International Journal of Cyber Criminology, 9(1), 55-119. ii. Hait, A. A. (2014). Jurisdiction in Cybercrimes: A Comparative Study. Journal of Law, Policy and Globalization, 22, 75- 84. iii. Hariyanto, & Siahaan, A. P. (2016). Intrusion Detection System in Network Forensic Analysis and Investigation. IOSR Journal of Computer Engineering, 18(6), 115-121. iv. Manurung, D. (2013, 11 27). Cyber Crime: Hukum dan Sanksi. (Blogspot) Retrieved 12 10, 2017, from http://desrianimanroe.blogspot.co.id/2013/11/hukum-dan-sanksi.html v. Muslimah, S., & Hidayati, N. (2017, 9 29). 7 Hal di UU ITE yang Wajib Kamu Tahu Agar Tak Bernasib Seperti Jonru. (Kumparan) Retrieved 12 20, 2017, from https://kumparan.com/@kumparannews/7-hal-di-uu-ite-yang-wajib- kamu-tahu-agar-tak-bernasib-seperti-jonru vi. Ramadhani, S., Saragih, Y. M., Rahim, R., & Siahaan, A. P. (2017). Post-Genesis Digital Forensics Investigation. International Journal of Scientific Research in Science and Technology, 3(6), 164-166. vii. Rusmiatiningsih. (2013, 10 19). Yuridiksi Hukum Pidana dalam Transaksi Cybercrime. (Blogspot) Retrieved 12 20, 2017, from http://rusmiatiningsih.blogspot.co.id/2013/10/yuridiksi-hukum-pidana-dalam-transaksi.html viii. Saragih, Y. M., & Siahaan, A. P. (2016). Cyber Crime Prevention Strategy in Indonesia. International Journal of Humanities and Social Science, 3(6), 22-26. ix. Sudyana, D. (2015, 10 1). Pengenalan Cyber Crime. Retrieved 12 20, 2017, from http://blog.didiksudyana.com/2015/10/pengenalan-cyber-crime.html x. Tasril, V., Ginting, M. B., Mardiana, & Siahaan, A. P. (2017). Threats of Computer System and its Prevention. International Journal of Scientific Research in Science and Technology, 3(6), 448-451. xi. Triwahyuni, Y. (2015, 12 5). Pengertian, Jenis-jenis, dan Contoh Kasus Cyber Crime. (Wordpress) Retrieved 12 20, 2017, from https://yuliatwn.wordpress.com/2015/12/05/pengertian-jenis-jenis-dan-contoh-kasus-cyber-crime/