Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 18926 dokumen yang sesuai dengan query
cover
Barua, Yogesh
New Delhi: Dominant Publishers and distributors, 2001
364.1 BAR c I (1)
Buku Teks  Universitas Indonesia Library
cover
Barua, Yogesh
New Delhi: Dominant Publishers and distributors, 2001
364.1 BAR c
Buku Teks  Universitas Indonesia Library
cover
Barua, Yogesh
"Dayal, Denzyl P."
New Delhi: Dominant Publishers and distributors, 2001
364.1 BAR c
Buku Teks  Universitas Indonesia Library
cover
Barua, Yogesh
New Delhi: Dominant Publishers and distributors, [2001;2001;2001, 2001]
364.1 BAR c IV
Buku Teks  Universitas Indonesia Library
cover
Akhgar, Babak
"Cyber crime and cyber terrorism investigator’s handbook is a vital tool in the arsenal of today’s computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become some of the most concerning topics in today’s security landscape. News stories about Stuxnet and PRISM have brought these activities into the public eye, and serve to show just how effective, controversial, and worrying these tactics can become.
Cyber crime and cyber terrorism investigator’s handbook describes and analyzes many of the motivations, tools, and tactics behind cyber attacks and the defenses against them. With this book, you will learn about the technological and logistic framework of cyber crime, as well as the social and legal backgrounds of its prosecution and investigation. Whether you are a law enforcement professional, an IT specialist, a researcher, or a student, you will find valuable insight into the world of cyber crime and cyber warfare.
"
Waltham, MA: Elsevier, 2014
e20426911
eBooks  Universitas Indonesia Library
cover
Rinaldi Ikhsan Nasrulloh
"Skripsi ini berfokus pada masalah upaya pencegahan yang dilakukan oleh Badan Nasional Penanggulangan Terorisme (BNPT) terhadap cyber propaganda oleh Islamic State of Iraq and Syria (ISIS) di Indonesia. Pembahasan masalah ini dianalisis dengan menggunakan konsep high policing. Pendekatan yang digunakan ialah pendekatan kualitatif dengan tujuan deskriptif. Hasil penelitian menunjukkan bahwa upaya pencegahan yang dilakukan oleh BNPT dalam mencegah cyber propaganda ISIS di Indonesia, dapat menggunakan metode high policing. Meskipun penerapan karakteristik high policing tidak selalu dapat diterapkan untuk kebijakan di BNPT. Hal ini disebabkan hukum dan pedoman organisasi yang tidak sejalan dengan karakteristik dari high policing.

This thesis focuses on the problem of prevention efforts undertaken by the National Counter Terrorism Agency (BNPT) against the cyber propaganda of the Islamic State of Iraq and Syria (ISIS) in Indonesia. Discussion of this issue was analyzed using the concept of high policing. The approach used is a qualitative approach with descriptive purposes only. The results show that prevention efforts undertaken by BNPT in preventing cyber propaganda ISIS in Indonesia, can use the method of high policing. Although the application of the characteristics of high policing cannot always be applied to policies.
"
Depok: Fakultas Ilmu Sosial dan Ilmu Politik Universitas Indonesia, 2017
S67756
UI - Skripsi Membership  Universitas Indonesia Library
cover
Farahdina Fairuz Iftinan
"Perang siber adalah bentuk globalisasi kejahatan yang dilakukan oleh aktor yang berkuasa. Tesis ini menggunakan pendekatan kualitatif untuk menjelaskan bagaimana kebijakan cyber defense dan cyber security di Indonesia dan kesiapan Indonesia dalam menghadapi kejahatan perang siber global. Studi ini melibatkan 3 lembaga narasumber dari Kementerian Pertahanan, Kepolisian RI, dan Badan Siber dan Sandi Negara. Pengumpulan data dilakukan dengan tatap muka dan daring. Tesis ini menggunakan perspektif teori pilihan rasional dan kebijakan publik sebagai pijakan analisis. Teori pilihan rasional digunakan untuk menjelaskan bahwa aktor melakukan kejahatan melihat dari keuntungan dan kerugian yang didapatkan dari kejahatan yang dilakukan. Teori kebijakan publik memberikan penjelasan bagaimana tahapan pembuatan kebijakan agar menghasilkan kebijakan yang efektif dengan tujuan yang ingin dicapai. Hasil penelitian ini menunjukkan bahwa Indonesia masih memiliki banyak kekurangan pada cyber security<, cyber defense, dan kebijakannya. Berdasarkan analisis teori pilihan rasional, Indonesia berpotensi besar untuk diserang secara global dikarenakan lemah dan rentannya sistem keamanan dan pertahanan siber di Indonesia. Sehingga aktor penyerang akan mendapatkan keuntungan yang maksimal dan kerugian yang minimal. Dibutuhkan pembentuka kebijakan cyber security dan cyber defense sesuai dengan tahapan teori kebijakan publik, agar cyber security dan cyber defense dapat dijalankan dengan efektif. Temuan studi ini berkontribusi pada pembentukan kebijakan cyber security dan cyber defense yang komprehensif dan relevan sehingga dapat menghadapi kejahatan perang siber global.

Cyber warfare is a form of crime globalization perpetrated by powerful actors. This thesis uses a qualitative approach to explain how cyber defense and cyber security policies in Indonesia and Indonesia's readiness to face global cyber war crimes. This study involves three resource institutions that are the Ministry of Defense, the Indonesian National Police, and the National Cyber and Crypto Agency. Data collection was conducted both offline and online. This thesis uses the perspectives of rational choice theory and public policy as the basis of analysis. Rational choice theory explains that actors commit crimes by weighing the benefits and disadvantages of their crimes. Public policy theory describes the stages of policy-making to produce effective policies with the expected objectives. The results of this study indicate that Indonesia still has many shortcomings in cyber security, cyber defense, and its policies. Based on the analysis of rational choice theory, Indonesia has a high potential to be attacked globally due to the weak and vulnerable cyber security and defense systems in Indonesia. Thus, attacking actors will gain maximum benefits with minimal losses. It is necessary to formulate cyber security and cyber defense policies according to the stages of public policy theory so that cyber security and cyber defense can be implemented effectively. The findings of this study contribute to the formation of comprehensive and relevant cyber security and cyber defense policies to face global cyber war crimes."
Depok: Fakultas Ilmu Sosial dan Ilmu Politik Universitas Indonesia, 2024
T-pdf
UI - Tesis Membership  Universitas Indonesia Library
cover
"Introduction to Cyber-warfare : a multidisciplinary approach, written by experts on the front lines, gives you an insider's look into the world of cyber-warfare through the use of recent case studies. The book examines the issues related to cyber warfare not only from a computer science perspective but from military, sociological, and scientific perspectives as well. You'll learn how cyber-warfare has been performed in the past as well as why various actors rely on this new means of warfare and what steps can be taken to prevent it."
Waltham, MA: Syngress, 2013
e20427002
eBooks  Universitas Indonesia Library
cover
Syarief Sulaeman Nahdi
"Respon hukum pidana diperlukan apabila terjadi pertemuan (konvergensi) antara kepentingan umum dengan penggunaan komputer dimana kepentingan umum tersebut terganggu dengan pengoperasian tertentu dari komputer. Saat ini belum terdapat aturan yang memadai untuk menjerat pelaku kejahatan komputer maka Indonesia melakukan pembaharuan hukum pidana yang nampak di dalam Rancangan Undang-undang Hukum Pidana. R KUHP tahun 2005 telah memuat kriminalisasi mengenai tindak pidana informatika. Ketentuan ini diatur dalam bagian tersendiri. Terhadap perbuatan tersebut terdapat beberapa pasal yang dapat digunakan untuk menjerat pelaku dengan ancaman hukuman yang berbeda sehingga dapat menimbulkan akibat negatif yaitu tidak adanya kepastian hukum. Motif pelaku pads kasus-kasus kejahatan komputer tidak banyak berubah namun modus operandi pelaku akan berkembang seiring dengan perkembangan teknologi dan penyesuaian pelaku terhadap kondisi yang ada.

Criminal law response is needed because its convergent occurs between public interest with computer users whereas the said public interest is bothered by the special operation of the computer. At this present there are not any appropriate regulations to catch up the criminal doers of computers, hence Indonesia conducts reformation of criminal law that can be seen in the Device of Criminal Law (R KUHP). R KUHP year of 2005 has made criminalization of the infonnation criminal action. This stipulation is arranged in part five subject the information and telemetric criminal actions. But for the aforesaid actions there are some articles that can be used to catch up the doer with the difference action treatment. By the existence of the differences in the aforesaid articles treatment can cause negative effect that is there is no certainty of law to the action done by the offender. Beside that the offender motivation in the computer criminal cases do not change much but the offender's way to do will develop in accordance to technology development and the adjustment of the doer to the existing condition."
Depok: Fakultas Hukum Universitas Indonesia, 2008
T24293
UI - Tesis Open  Universitas Indonesia Library
cover
Dedy Anung Kurniawan
"Dalam Tesis ini membahas mengenai hambatan yang terjadi dalam penyidikan tindak pidana cybercrime pada Ditreskrimus Polda Metro Jaya. Bahasan utama dalam Tesis ini adalah mengenai tidak dapat diterapkannya pasal-pasal pidana dari Undang-undang Informasi dan Transaksi Elektronik (ITE) pada perkara-perkara cybercrime. Sehingga perkara-perkara tersebut dituntut dan diadili dengan pasal pidana umum (KUHP) saja.
Penulis menggunakan metode penelitian secara kualitatif dengan menggambarkan atau mendiskripsikan hasil penelitian, serta dengan melakukan pendekatan secara Yuridis Empiris. Untuk melihat praktik hukum cybercrime yang terjadi secara faktual dengan mengumpulkan data, wawancara serta observasi lapangan di Ditreskrimsus Polda Metro Jaya.
Hasil penelitian menunjukkan jumlah Laporan Polisi tindak pidana cyber yang dinyatakan lengkap oleh Kejaksaan Tinggi dengan diterapkan pasal pidana UU ITE hanya sekitar 17 persen per tahun. UU ITE sebagai salah satu perangkat yang dianggap mewakili cyber law di Indonesia ternyata belum mampu memberikan jaminan terhadap penegakan hukum cybercrime itu sendiri pada lingkup Polda Metro Jaya. Unsur sumber daya manusia, sarana prasarana, anggaran serta metode yang digunakan Ditreskrimsus Polda Metro Jaya menjadi salah satu penentu keberhasilan penyidikan di bidang cybercrime. Metode itu sendiri dapat dilihat dari bagaimana manajemen organisasi dapat berjalan terutama dalam perencanaan, pengorganisasian, penggerakan/pelaksanaan, dan pengawasan/pengendalian.
Kekuatan internal dan peluang eksternal yang dimiliki oleh Ditreskrimsus merupakan salah satu modal dasar dalam menekan kelemahan internal serta menangkal ancaman eksternal, sehingga permasalahan penyidikan cybercrime dapat diatasi. Kesepahaman antar criminal justice system diharapkan dapat mendukung pemberkasan perkara cybercrime yang dilaporkan di Polda Metro Jaya, sehingga pasal-pasal pidana UU ITE dapat diterapkan. Kesepahaman tersebut yaitu terkait mengenai ijin pengadilan dalam penggeledahan dan penyitaan, serta pemberitahuan terkait penangkapan dan penahanan tersangka cybercrime. Kajian yang dilakukan pada Tesis ini, memberikan rekomendasi agar jaksa dan hakim khusus cybercrime dibentuk supaya secara khusus berkoordinasi dengan penyidik khusus cybercrime. Sehingga penegakan hukum terhadap kejahatan cyber secara bersinambungan dapat diwujudkan untuk menjawab tantangan globalisasi informasi dunia.

This thesis discuss about some obstacles occurred in the criminal offense investigation at the Directorate of Special Criminal Investigation of the Jakarta Metropolitan Regional Police Headquarter (Polda Metro Jaya). The main discussion in this thesis is that about the criminal articles from the Law of Electronic Information And Transactions (ITE) that can?t be applied on the cyber crime cases. Therefore, those cases are charged and on trial with the article of general crime (KUHP) only.
The writer used a qualitative research method by illustrating and describing the result of research and by using Empirical and Juridical approach. To see a law practice of cyber crimes occurred factually that was by collecting data, interview, and field observation at the Directorate of Special Criminal Investigation of the Jakarta Metropolitan Regional Police Headquarter (Polda Metro Jaya).
The research result showed that the police report numbers of cyber criminal offense, which was declared complete by office of high prosecutor general with the implementation of criminal article in the Law of Electronic Information and Transactions, is only 17 percents per year. The Law of Electronic Information and Transactions as an instrument that is considered to represent cyber law in Indonesia evidently has not been able to provide guarantees against cyber crime law enforcement itself on the scope of the Jakarta Metropolitan Regional Police Headquarter (Polda Metro Jaya). Elements of human resource, facility and infrastructure, budget and method used by the Directorate of Special Criminal Investigation of Jakarta Metropolitan Regional Police Headquarter (Polda Metro Jaya) to be one determinant of success in the field of cyber crime investigation. The method itself could be seen from how the organization's management can run, especially in planning, organizing, mobilization / implementation, and monitoring / control.
Internal strength and external opportunities owned by the Directorate of Special Criminal Investigation is one of the authorized capital in suppressing internal weakness and warding off external threats so that the problems of cyber crime investigation could be solved. Understanding inter-criminal justice system is expected to support the filing of cyber crime cases reported in the Jakarta Metropolitan Regional Police Headquarter (Polda Metro Jaya) so that the criminal articles of the Law of Electronic Information and Transactions (UU ITE) can be applied. That understanding is related to the court's permission for search and seizure, as well as notification related to the arrest and detention of cyber crime suspects. Study carried out in this thesis provides a recommendation that the special prosecutors and judges of cyber crime was formed specifically to coordinate with special investigators of cyber crime. Therefore the law enforcement against cyber crime can be realized continuously to answer the challenges of the globalization of world's information.
"
Jakarta: Program Pascasarjana Universitas Indonesia, 2014
T-Pdf
UI - Tesis Membership  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>