Hasil Pencarian

Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 2899 dokumen yang sesuai dengan query
cover
Watt, David
Toronto: Carswell , 2013
R 345.06 WAT w
Buku Referensi  Universitas Indonesia Library
cover
Underhill, H.C. [Harry Clay], 1858-1918
"This book was made because of some changes in the legal field. An Oregon statute requires an accused to prove his defense of insanity beyond a reasonable doubt, a familiar concept in an unfamiliar setting. The Supreme Court enunciates the McNabb doctrine for the admission of confessions in the federal courts. The Federal Rules of Criminal Procedure are promulgated. The American Law
Institute recommends that adultery no longer be a criminal offense. The Court of Appeals for the District of Columbia discards the time-honored right-and-wrong and irresistible impulse tests for insanity. About two-thirds of the present work relates to the law of criminal evidence in general; about one-third relates to evidence in connection with specific crimes. New chapters have been added on scientific detection devices, self-incrimination, and tax fraud cases, and the text and footnotes of the other chapters have been brought up to date."
Lengkap +
Indianapolis: Bobbs-Merrill , [19--?]
K 345.730 6 UND t
Buku Klasik  Universitas Indonesia Library
cover
London: Churchill Livingstone, 2008
610.73 EVI
Buku Teks SO  Universitas Indonesia Library
cover
Philadelphia: Elsevier Science Limited, 2002
610.73 EVI
Buku Teks  Universitas Indonesia Library
cover
Churchill Livingstone: Elsevier, 2012
610.73 EVI
Buku Teks SO  Universitas Indonesia Library
cover
Nemeth, Charles P.
Boston: Jones and Bartlett, 2011
345.73 NEM l
Buku Teks  Universitas Indonesia Library
cover
Chandra Tirta Aditya Gunawan
"Tantangan penanganan bukti digital dalam sistem peradilan terpadu adalah rentan, mudah diubah, dan dimusnahkan, sehingga perlu dilindungi dari ancaman keamanan saat disimpan, diproses, dan dikirimkan oleh setiap penegak hukum yang saling berhubungan. Penelitian ini bertujuan merancang desain terintegrasi penanganan bukti digital pada sistem peradilan pidana terpadu berdasarkan Kitab Undang-Undang Hukum Acara Pidana menggunakan NIST SP800-53 Rev 5 sebagai upaya pengendalian keamanan informasi dan privasi. Desain terintegrasi ini memiliki 8 sasaran kontrol, 34 klausul kontrol dan 110 kegiatan pengamanan informasi dan privasi. Selanjutnya melakukan evaluasi perencanaan dengan mengukur maturitas organisasi berdasarkan desain tersebut menggunakan NIST Maturity. Pengukuran dilakukan secara kualitatif, melakukan wawancara dengan purposive sampling dan penentuan responden berdasarkan peran dan tanggung jawab personil menggunakan RACI Matriks. Hasil pengukuran maturitas organisasi XYZ senilai 2,35 (dalam skala 0-5) digunakan sebagai bahan evaluasi perencanaan dalam upaya meningkatkan kontrol keamanan organisasi XYZ sebagai lembaga penegakan hukum. Organisasi secara umum sudah menerapkan kontrol keamanan informasi dengan pola yang berulang namun belum terdokumentasi dengan baik, sehingga penerapannya masih belum konsisten. Hasil yang diharapkan organisasi berada pada tingkat 3, sehingga nilai kesenjangannya senilai 0,65. Organisasi perlu untuk mendokumentasikan kontrol keamanannya dalam bentuk standar operasional atau panduan sehingga memberikan tingkat keamanan informasi dan privasi yang lebih baik. Setelah itu, menguraikan rekomendasi berdasarkan tingkat organisasi pada masing-masing klausul kontrol dan memberikan uraian implementasinya. Terakhir, memberikan urutan prioritas berdasarkan risiko keamanan informasi (confidentiality, integrity, dan availability) pada masing-masing sasaran kontrol yang dipadukan dengan risiko yang tertuang dalam dokumen manajemen risiko organisasi (risiko hukum, risiko kepatuhan, risiko regulasi, dan risiko operasional). Hasilnya, sasaran kontrol yang menjadi prioritas implementasi yaitu Pengiriman Data (DTR), Penyimpanan Data (DST), Pencadangan Data (DBU), Dokumentasi (DOC), Identifikasi dan Klasifikasi Data (DIC), Koleksi dan Akuisisi (CLA), Pengembalian Data (DRT) dan Penghapusan Data (DSN).

The challenge of handling digital evidence in an integrated justice system is that it is vulnerable, easy to change, and destroyed, so it requires to be protected from security threats when it is stored, processed, and transmitted by every interconnected law enforcement agency. This study aims to design an integrated design for handling digital evidence in an integrated justice system based on the Criminal Procedure Code using NIST SP800-53 Rev 5 as an effort to control information security and privacy. This integrated design has 8 control targets, 34 control clauses, and 110 information security and privacy activities. Then evaluate the plan by measuring the maturity of the organization based on the design using NIST Maturity. Measurements were carried out qualitatively, using purposive sampling and determining respondents based on the roles and responsibilities of personnel using the RACI Matrix. The results of measuring the maturity of the XYZ organization of 2.35 (on a scale of 0-5) are used as planning evaluation materials to improve security control of the XYZ organization as a law enforcement agency. Organizations, in general, have implemented information security controls with repetitive patterns but have not been well documented, so the implementation is still inconsistent. The expected result of the organization is at level 3, so the value of the gap is 0.65. Organizations need to document their security controls in the state of operational standards or guidelines to provide a better level of information security and privacy. After that, it outlines the recommendations based on the organizational level in each control clause and describes its implementation. Finally, assigning a priority order based on information security risks (confidentiality, integrity, and availability) for each control target combined with the risks contained in the organization's risk management documents (legal risk, compliance risk, regulatory risk, and operational risk). As a result, the control targets that become implementation priorities are (DTR) data transfer, (DST) data storage, (DBU) data backup, (DOC) documentation, (DIC) data identification and classification, (CLA) collection and acquisition, (DRT) data return and (DSN) data sanitization."
Lengkap +
Depok: Fakultas Teknik Universitas Indonesia, 2022
T-pdf
UI - Tesis Membership  Universitas Indonesia Library
cover
Carr, Chris J.
London: Blacstone Press , 1989
347.06 CAR l
Buku Teks  Universitas Indonesia Library
cover
London: LexisNexis, 2011
651.5 ELE
Buku Teks  Universitas Indonesia Library
cover
Hollander, Charles
London: Sweet & Maxwell, 2012
346.710 6 HOL d
Buku Teks  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>