Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 9434 dokumen yang sesuai dengan query
cover
Yar, Majid, auhtor
Los Angeles: Sage, 2013
364.168 YAR c
Buku Teks  Universitas Indonesia Library
cover
Clough, Jonathan
"Digital technology has transformed the way in which we socialise and do business. Proving the maxim that crime follows opportunity, virtually every advance has been accompanied by a corresponding niche to be exploited for criminal purposes; so-called 'cybercrimes'. Whether it be fraud, child pornography, stalking, criminal copyright infringement or attacks on computers themselves, criminals will find ways to exploit new technology. The challenge for all countries is to ensure their criminal laws keep pace. The challenge is a global one, and much can be learned from the experience of other jurisdictions. Focusing on Australia, Canada, the UK and the USA, this book provides a comprehensive analysis of the legal principles that apply to the prosecution of cybercrimes. This new edition has been fully revised to take into account changes in online offending, as well as new case law and legislation in this rapidly developing area of the law."
United Kingdom: Cambridge University Press, 2015
e20528729
eBooks  Universitas Indonesia Library
cover
Higgins, George E.
Boston: McGraw-Hill, 2010
364.168 HIG c
Buku Teks  Universitas Indonesia Library
cover
Muhammad Rizky Nurkamrullah
"Warnet sebagai salah satu bentuk bisnis yang memanfaatkan teknologi komputer dalam berbagai macam kegiatannya tenyata tidak luput dari ancaman kejahatan komputer dan khususnya dalam penelitian ini adalah manipulasi sistem billing. Penelitian ini bertujuan untuk memaparkan kondisi apa saja yang membuat warnet X menjadi target tindakan manipulasi sistem billing. Penelitian ini akan menggunakan teori aktifitas rutin untuk menjelaskan situasi dan kondisi di dalam warnet X. Untuk mendapatkan gambaran situasi dan kondisi warnet yang lebih jelas, peneliti akan melakukan wawancara terhadap pemilik warnet, pegawai warnet yang bertindak sebagai operator, dan pelanggan warnet ini atau user.
Hasil wawancara dengan informan-informan tersebut menggambarkan kondisi warnet yang berpotensi menjadi target kejahatan komputer. Berbagai macam kondisi diantaranya adalah adanya motivasi pelaku untuk melakukan manipulasi billing; baik sistem billing, operator warnet, dan pemilik warnet lemah dalam pengawasan serta penjagaan keamanan data billing warnet tersebut; dan sistem billing dan operator warnet X memiliki karakteristik sebagai target tindakan manipulasi billing.

Internet café, is the one kind of business that using computer technology in every their business activity in fact, is not free from computer crime threat and especially in this research is billing manipulation act. This research is going to describe what circumstances that makes this internet café is potentially being a target of billing system manipulation act. This research will using routine activity theories to explain the condition and situation of this internet café. To get the clear picture of this internet café, researchers will interviewing the owner of the internet café X, the employee or server operator, and the client or the user.
From the results of the interview with the informants, its clear that one of the condition that makes this internet café vulnerable is the offender who had a motivation to do the manipulation; the weakness of billing system, server operator, and the owner for guarding the billing data; and the suitable condition of the billing and server operator to be a target of billing manipulation.
"
Depok: Fakultas Ilmu Sosial dan Ilmu Politik Universitas Indonesia, 2013
S45873
UI - Skripsi Membership  Universitas Indonesia Library
cover
Melia Prabangasta Yustisia
"Kejahatan siber memiliki karakteristik tersendiri seperti borderless dan menimbulkan korban yang banyak. Karakteristik inilah yang menjadikan dimungkinkannya locus delicti kejahatan penyebaran illegal content terdapat di banyak tempat sekaligus. Tulisan ini meninjau tentang penentuan locus delicti yang digunakan penegak hukum di Indonesia dalam kasus illegal content, sekaligus meninjau urgensi untuk membuat teori baru mengenai locus delicti dalam kejahatan siber. Studi dilakukan dengan metode analisis yuridis normatif, dan ditunjang wawancara kepada pihak Kejaksaan dan Kepolisian.
Dari hasil penelitian dapat disimpulkan bahwa pada praktiknya penegak hukum masih dapat melakukan perluasan penafsiran dari ajaran locus delicti yang ada. Kejaksaan dan Kepolisian menggunakan ajaran tindakan badaniah, sementara Majelis Hakim menggunakan ajaran akibat.

Cybercrime has its own characteristics such as borderless nature and inflicting widespread victims. These characteristics are what might makes the locus delicti of crime of illegal content distribution found in many places at once. This thesis reviews the determination of locus delicti used by Indonesian law enforcement in cases of illegal content, as well as reviewing the urgency to create a new theory about the locus delicti in cybercrime. The study will be conducted using normative analysis method, and supported by in-depth interview to the law enforcement.
The result of this study concluded that in practice, law enforcement still be able to expand the interpretation of the existing teachings of locus delicti. Prosecutors and police using the doctrine of bodily conduct, while the judges using the doctrine of the result.
"
Depok: Fakultas Hukum Universitas Indonesia, 2016
S62310
UI - Skripsi Membership  Universitas Indonesia Library
cover
New York: Routledge, 2001
364.168 CRI (1)
Buku Teks  Universitas Indonesia Library
cover
Intan Meidini
"ABSTRAK
Tujuan dari penulisan ini adalah untuk menjelaskan bahwa calon tenaga kerja berpotensial sebagai korban penipuan lowongan pekerjaan melalui sistem online. Penulis memberikan gambaran mengenai upaya ndash; upaya pencegahan kejahatan melalui pendekatan sosial yang dapat dilakukan oleh website pencarian kerja di dalam sistem online dan Kementerian Ketenagakerjaan serta Kementerian Komunikasi dan Informatika yang terlibat sebagai pelindung. Dalam pembahasannya, penulis menganalisis fenomena tindak penipuan lowongan kerja sistem online dengan menggunakan routine activity theory dan fraud triangle theory. Oleh karena itu, pemerintah dalam perannya diharap memberikan upaya-upaya pencegahan kejahatan melalui pendekatan sosial dapat dilakukan dengan sangat maksimal agar dapat mengurangi adanya resiko dari salah satu bentuk cybercrime ini.

ABSTRACT
The purpose of this paper is to explain that job seekers could potentially be a victim of job online system recruitment. This discussion gives an overview about how the webite job seek rsquo s creators and the Government can do to have a social crime pevention efforts for protecting the victims. In this paper will involve the routine activity and fraud triangle theory to explain how the job online system recruitment happened. This discussion lead to how Government rsquo s important role should give social crime prevention strategy to the website job seek`s owner for protecting into maximum security efforts. Therefore, hopefully the Government could give the reality of maximum social crime prevention strategy for protecting the potentially victim, so its could decrease the risks of this kind of cybercrime. Keywords social crime prevention, job online system recruitment, fraud, routine activity theory, fraud triangle theory, cybercrime, job seeker."
Depok: Fakultas Ilmu Sosial dan Ilmu Politik Universitas Indonesia, 2017
TA-Pdf
UI - Tugas Akhir  Universitas Indonesia Library
cover
Clough, Jonathan
"We live in a digital age. The proliferation of digital technology, and the convergence of computing and communication devices, has transformed the way in which we socialise and do business. While overwhelmingly positive, there has also been a dark side to these developments. Proving the maxim that crime follows opportunity, virtually every advance has been accompanied by a corresponding niche to be exploited for criminal purposes; so-called 'cybercrimes'. Whether it be fraud, child pornography, stalking, criminal copyright infringement or attacks on computers themselves, criminals will find ways to exploit new technology. The challenge for all countries is to ensure their criminal laws keep pace. The challenge is a global one, and much can be learned from the experience of other jurisdictions. Focusing on Australia, Canada, the UK and the US, this book provides a comprehensive analysis of the legal principles that apply to the prosecution of cybercrimes."
United States: Cambridge University Press, 2010
e20528257
eBooks  Universitas Indonesia Library
cover
Budi Suhariyanto, 1983-
Jakarta: RajaGrafindo Persada, 2012
345 BUD t
Buku Teks  Universitas Indonesia Library
cover
"This book provides a thorough overview of cutting-edge research on electronics applications relevant to industry, the environment, and society at large. It covers a broad spectrum of application domains, from automotive to space and from health to security, while devoting special attention to the use of embedded devices and sensors for imaging, communication and control. The book is based on the 2018 ApplePies Conference, held in Pisa, Italy in September 2018, which brought together researchers and stakeholders to consider the most significant current trends in the field of applied electronics and to debate visions for the future. Areas addressed by the conference included information communication technology; biotechnology and biomedical imaging; space; secure, clean and efficient energy; the environment; and smart, green and integrated transport. As electronics technology continues to develop apace, constantly meeting previously unthinkable targets, further attention needs to be directed toward the electronics applications and the development of systems that facilitate human activities. "
Switzerland: Springer Nature, 2019
e20506474
eBooks  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>