Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 2678 dokumen yang sesuai dengan query
cover
Karyono A.K.
Yogyakarta: Andi, 2013
364.163 KAR f
Buku Teks  Universitas Indonesia Library
cover
Hoboken, NJ: John Wiley & Sons, 2012
363.259 FOR
Buku Teks  Universitas Indonesia Library
cover
St. Louis: Mosby, 1980
614.1 INT
Buku Teks SO  Universitas Indonesia Library
cover
Houck, Max M.
New York: Academic Press, 2011
363.25 HOU f
Buku Teks  Universitas Indonesia Library
cover
Petherick, Wayne A.
"Forensic Criminology is the scientific study of crime and criminals for the purposes of addressing investigative and legal issues. This title provides a bridge between the broad constructs of theoretical criminology and the forensic examination of individual cases. It is suitable for students and professionals in the area of criminology. "
Amsterdam: Elsevier, 2010
363.25 FOR
Buku Teks  Universitas Indonesia Library
cover
cover
Anton Irawan
"Intelijen identik dengan sesuatu yang sangat rahasia, baik itu orang-orangnya maupun aktivitasnya. Intelijen yang kita kenal biasanya berkaitan dengan ketahanan dan keamanan nasional. Namun dengan berkembangnya teknologi serta keterbukaan informasi saat ini, informasi-informasi yang bisa dimanfaatkan untuk diolah menjadi sebuah intelijen semakin terbuka. Dalam proses pengumpulan informasi selain dilakukan pengumpulan informasi secara tertutup, intelijen juga mengumpulkan informasi dari sumber terbuka, yaitu informasi yang tersedia di publik dan bisa diakses oleh siapapun. Pengolahan informasi dari sumber terbuka tersebut bisa menjadi sebuah intelijen yang bernilai dalam pengambilan keputusan. Penelitian ini bertujuan untuk melihat peran intelijen sumber terbuka (OSINT) dalam investigasi fraud, khususnya investigasi pada skema fraud dalam proses pengadaan barang dan jasa. Teori intelijen kriminal dan konsep proses OSINT dilakukan dalam melakukan analisis penelitian. Metode penelitian pada penelitian ini menggunakan metode kualitatif dengan sumber data primer dari wawancara dan juga sumber data sekunder melalui studi literatur. Hasil dari penelitian ini menyimpulkan bahwa OSINT mempunyai peran pada investigasi fraud, yaitu pada tahapan pengumpulan data dan informasi, serta pengumpulan bukti-bukti terkait dengan kasus fraud tersebut.

Intelligence is identical with something that is highly confidential, both its people and its activities. Intelligence as we know it is usually related to security and national security. However, with the development of technology and the current disclosure of information, information that can be used to be processed into intelligence is increasingly open. In the process of collecting information apart from collecting information in private, intelligence also collects information from open sources, namely information that is publicly available and can be accessed by anyone. Processing of information from these open sources can be a valuable intelligence in decision making. This study aims to look at the use of open source intelligence (OSINT) in fraud investigations, especially fraud schemes in the process of procuring goods and services. Intelligence criminal theory and OSINT process concept were used as tools of analysis in this research. This research method uses qualitative methods with primary data sources from interviews and secondary data sources through study of literature. The results of this study conclude that OSINT can be useful in fraud investigations, namely at the stage of collecting data and information, as well as collecting evidence related to the fraud case."
Jakarta: Sekolah Kajian Stratejik Global Universitas Indonesia, 2023
T-pdf
UI - Tesis Membership  Universitas Indonesia Library
cover
Laksamana Andriansyah Nugroho
"Penelitian ini membahas tentang mekanisme Badan Reserse Kriminal KepolisianRepublik Indonesia Bareskrim Polri dalam penanganan korban tindak pidana,yang menggunakan studi kasus penanganan para korban tindak pidana penipuaninvestasi Dream for Freedom D4F . Penelitian mendeskripsikan bagaimanaBareskrim tidak hanya bertindak sebagai penegak hukum yaitu melakukanpenegakan terhadap pelaku tindak pidana tetapi juga mengurusi korban dari tindakpidana tersebut. Dengan mengacu pada penerapan perlindungan hak-hak korbankejahatan sebagai akibat dari terlanggarnya hak asasi yang bersangkutan, makadasar dari perlindungan korban kejahatan dapat dilihat dari beberapa teori yaituteori utilitas, teori tanggung jawab, dan teori ganti kerugian. Secara teoretis, bentukperlindungan terhadap korban kejahatan dapat diberikan dalam berbagai cara,bergantung pada penderitaan/kerugian yang diderita oleh korban. Sebagai contohuntuk kerugian yang sifatnya mental/psikis tentunya bentuk ganti rugi dalam bentukmateri/uang tidaklah memadai apabila tidak disertai dengan upaya pemulihanmental korban. Sebaliknya, apabila korban hanya menderia kerugian secaramateriil, pelayanan yang sifatnya psikis terkesan terlalu berlebihan. Bentukperlindungan diberikan melalui pemberian restitusi, konseling, pelayanan/bantuanmedis, bantuan hukum, dan pemberian informasi. Dalam upaya penanganan korbantindak pidana, kepolisian, yang dalam hal ini adalah Bareskrim Polri, membukaPosko Pengaduan. Sejauh ini, Bareskrim Polri hanya bisa sesuai dengankewenangan Polri. Padahal, yang diharapkan oleh korban lebih dari sekadarinformasi tentang perkaranya. Oleh karenanya penelitian ini menjadi awal untukpembenahan administrasi kepolisian tentang penanganan korban tindak pidana.

This study discusses the mechanism of Criminal Investigation Police PoliceCriminal Investigation Police in the handling of victims criminal offense, whichuses case studies of the handling of victims of theinvestment fraud crime Dreamfor Freedom D4F . The study describes how Bareskrim not only acts as a lawenforcement that enforces the perpetrators of criminal acts but also takes care of thevictims of the crime. With reference to the application of the protection of the rightsof victims of crime as a result of violation of the human rights concerned, the basisof the protection of victims of crime can be seen from several theories of utilitytheory, theory of responsibility, and compensation theory. Theoretically, the formof protection against crime victims can be given in various ways, depending on thesuffering loss suffered by the victim. For example, for mental psychologicallosses, surely the form of compensation in the form of material money is notsufficient if not accompanied by mental recovery efforts of the victim. Conversely,if the victim only experience material loss, the service of a psychic nature seem tooexcessive. Forms of protection are provided through the provision of restitution,counseling, medical services assistance, legal assistance, and informationprovision. In the effort to handle victims of criminal acts, the police, in this case thePolice Bareskrim, opened a Complaint Post. So far, Criminal Investigation Policecan only be in accordance with the authority of the Police.. Therefore, this researchbecomes the beginning for revamping the police administration about the handlingof victims of crime.
"
Jakarta: Sekolah Kajian Stratejik dan Global Universitas Indonesia, 2018
T52184
UI - Tesis Membership  Universitas Indonesia Library
cover
Andri Rivano
"[ABSTRAK
Pemanfaatan teknologi informasi (TI), selain membantu suatu instansi pemerintah dalam memotong rantai birokrasi dalam pelaksanaan tugas pokok dan fungsi instansi pemerintah, terkait reformasi birokrasi, juga dapat dimanfaatkan untuk pembenahan instansi pemerintah. Dalam studi kasus ini dimana sudah dicanangkan suatu kegiatan yang bertujuan membenahi organisasi di instansi pemerintah pusat XYZ, atas instruksi Komisi Pengawas XYZ Pada kegiatan pembenahan organisasi XYZ tersebut dilakukanlah penelaahan risiko dalam kegiatan fraud risk management dimana salah satu lingkup kerjanya adalah melakukan fraud risk assesment yang dilakukan dengan bantuan forensic technology. Tujuan menggunakan forensic technology adalah untuk menemukan bukti-bukti digital pada sistem komputer dengan mengandalkan kemampuan forensic technology dalam merekonstruksi data dan informasi dari file yang ada maupun yang sudah dihapus. Dengan demikian forensic technology merupakan alat yang tepat untuk membuktikan compliance (kepatuhan), baik kepatuhan terhadap hukum ataupun terhadap kode etik/norma perusahaan, khususnya korupsi. Pimpinan XYZ juga telah menyadari hal ini dan telah memerintahkan untuk menyusun prosedur penggunaan computer forensic sebagai alat audit internal. Pada karya akhir ini dilakukan uji coba untuk membuktikan (proof of concept) bahwa computer forensic yang telah dimiliki saat ini dapat membantu proses penemuan indikasi pelanggaran kode etik/norma, khususnya korupsi. Hasil dari penelitian ini adalah berupa model computer forensic dalam kegiatan fraud risk management pada proses bisnis XYZ beserta draft standard operating procedure (SOP) terkait pelaksanaan computer forensic.

ABSTRACT
Application of information technology (IT), instead of addition to helping a government agencies in steramlining the bureaucracy in the implementation of the basic tasks and roles of government agencies, relevant bureaucratic reform, also can be used for improvement of government agencies its self. In this case study where already launched an activity that aims to fixing up of government agency of Indonesia XYZ organization, on the instructions of XYZ?s regulatory commission.
In the fixing up the XYZ organization conducted review the risk in order to fraud risk management activity that one of scope of work is to do fraud risk assessment using forensic technology. The aim using forensic technolgy is to identify digital evidence on computer systems by relying on the ability of forensic technology in reconstructing the data and information from existing files or deleted. Thus forensic technology is a good tool for proving compliance (adherence), good adherence to the law or the code of ethics/norms of the company, particularly corruption. Chairs of XYZ has also been aware of this and has been ordered to draw up the use of computer forensic procedures as a tool of internal audit.
In this research conducted trials to prove (proof of concept) that computer forensic that has been held at this time can help the process of the invention indicated violations of the code of ethics/norms, particularly corruption. Results of this research is in the form of a model computer forensic in fraud risk management activity in the business process XYZ and draft of standard operating procedure (SOP) related to the implementation of computer forensic., Application of information technology (IT), instead of addition to helping a government agencies in steramlining the bureaucracy in the implementation of the basic tasks and roles of government agencies, relevant bureaucratic reform, also can be used for improvement of government agencies its self. In this case study where already launched an activity that aims to fixing up of government agency of Indonesia XYZ organization, on the instructions of XYZ’s regulatory commission.
In the fixing up the XYZ organization conducted review the risk in order to fraud risk management activity that one of scope of work is to do fraud risk assessment using forensic technology. The aim using forensic technolgy is to identify digital evidence on computer systems by relying on the ability of forensic technology in reconstructing the data and information from existing files or deleted. Thus forensic technology is a good tool for proving compliance (adherence), good adherence to the law or the code of ethics/norms of the company, particularly corruption. Chairs of XYZ has also been aware of this and has been ordered to draw up the use of computer forensic procedures as a tool of internal audit.
In this research conducted trials to prove (proof of concept) that computer forensic that has been held at this time can help the process of the invention indicated violations of the code of ethics/norms, particularly corruption. Results of this research is in the form of a model computer forensic in fraud risk management activity in the business process XYZ and draft of standard operating procedure (SOP) related to the implementation of computer forensic.]"
2015
TA-Pdf
UI - Tugas Akhir  Universitas Indonesia Library
cover
Hunter, John
New York : Routledge, 2005
930.1 HUN f
Buku Teks SO  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>