Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 8 dokumen yang sesuai dengan query
cover
Orisa Shinta Haryani
Abstrak :
Perkembangan teknologi informasi yang begitu pesat memunculkan satu media komunikasi baru yang disebut dengan media sosial. Kepolisian Republik Indonesia membentuk Direktorat Tindak Pidana Siber Bareskrim Polri untuk menangani masalah kejahatan siber di media sosial dan melakukan pemberdayaan media sosial dalam konteks pemolisian masyarakat. Penelitian ini melihat bagaimana pemberdayaan media sosial yang dilakukan oleh Direktorat Tindak Pidana Siber Bareskrim Polri. Selain itu penelitian ini juga melihat dampak pemberdayaan media sosial tersebut terhadap masyarakat serta menemukan faktor penyebab tidak maksimalnya implementasi pemberdayaan media sosial dan juga menemukan solusi untuk meningkatkan pemberdayaan tersebut. Pendekatan penelitian ini adalah kualitatif dan pengumpulan data dilakukan dengan wawancara, observasi, juga melakukan studi literatur. Konsep yang digunakan di dalam penelitian ini adalah konsep community policing, effective policing, dan dampak pemberdayaan media sosial. Hasil penelitian ini menunjukkan bahwa pemberdayaan media sosial oleh Direktorat Tindak Pidana Siber Bareskrim Polri dilakukan untuk memberikan informasi pada masyarakat, melakukan deteksi dini pelaku kejahatan, membangun relasi dengan masyarakat, dan melakukan fungsi pengawasan dan kontrol terhadap perilaku masyarakat di media sosial. Dampak tidak maksimalnya pemberdayaan media sosial adalah ketidakpercayaan masyarakat terhadap kepolisian, media sosial tidak menjadi alat yang efektif dalam melakukan investigasi dan penyelidikan kasus, media sosial tidak mampu menjadi sarana penyampaian keberhasilan polisi sehingga tidak dapat meningkatkan performa kerja anggota, dan upaya pencegahan kejahatan tidak terlaksana dengan baik.
The development of information technology is so rapidly raises a new communication media called social media. Indonesia National Police established the Cyber Crime Investigation Center to deal with cybercrime in social media and empower social media in the community policing context. This study looks at how social media empowerment conducted by Cyber Crime Investigation Center. In addition, this study also looked at the impact of social media empowerment to the community and find the cause of unsuccessful implementation of social media empowerment and also find solutions to improve the empowerment. This research used qualitative approach and data collection techniques use interview, observation, also conducting literature study. The concept used in this research is community policing, effective policing, and the impact of social media empowerment. The results of this study indicate that social media empowerment by Cyber Crime Investigation Center aims to give information to society, early detection of criminal offenders, to build relation with society, and to do supervision and control in social media. The ineffectual impact of social media empowerment is public distrust of the police, social media is not an effective tool in investigating cases, social media can not be a medium to deliver the success story of the police works, and crime prevention in social media are not well implemented.
Depok: Universitas Indonesia, 2018
T49138
UI - Tesis Membership  Universitas Indonesia Library
cover
Shipley, Todd G.
Abstrak :
Written by experts on the frontlines, Investigating internet crimes provides seasoned and new investigators with the background and tools they need to investigate crime occurring in the online world. This invaluable guide provides step-by-step instructions for investigating Internet crimes, including locating, interpreting, understanding, collecting, and documenting online electronic evidence to benefit investigations. Cybercrime is the fastest growing area of crime as more criminals seek to exploit the speed, convenience and anonymity that the Internet provides to commit a diverse range of criminal activities. Today's online crime includes attacks against computer data and systems, identity theft, distribution of child pornography, penetration of online financial services, using social networks to commit crimes, and the deployment of viruses, botnets, and email scams such as phishing. Symantec's 2012 Norton Cybercrime Report stated that the world spent an estimated $110 billion to combat cybercrime, an average of nearly $200 per victim. Law enforcement agencies and corporate security officers around the world with the responsibility for enforcing, investigating and prosecuting cybercrime are overwhelmed, not only by the sheer number of crimes being committed but by a lack of adequate training material. This book provides that fundamental knowledge, including how to properly collect and document online evidence, trace IP addresses, and work undercover.
Waltham, MA: Steven Elliot, 2014
e20427145
eBooks  Universitas Indonesia Library
cover
Akhgar, Babak
Abstrak :
Cyber crime and cyber terrorism investigator’s handbook is a vital tool in the arsenal of today’s computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become some of the most concerning topics in today’s security landscape. News stories about Stuxnet and PRISM have brought these activities into the public eye, and serve to show just how effective, controversial, and worrying these tactics can become. Cyber crime and cyber terrorism investigator’s handbook describes and analyzes many of the motivations, tools, and tactics behind cyber attacks and the defenses against them. With this book, you will learn about the technological and logistic framework of cyber crime, as well as the social and legal backgrounds of its prosecution and investigation. Whether you are a law enforcement professional, an IT specialist, a researcher, or a student, you will find valuable insight into the world of cyber crime and cyber warfare.
Waltham, MA: Elsevier, 2014
e20426911
eBooks  Universitas Indonesia Library
cover
Sheetz, Michael
Hoboken: John Wiley & Sons, 2007
363.25 SHE c
Buku Teks  Universitas Indonesia Library
cover
Marcella, Albert J.
Abstrak :
Summary "An explanation of the basic principles of data. This book explains the basic principles of data as building blocks of electronic evidential matter, which are used in a cyber forensics investigations. The entire text is written with no reference to a particular operation system or environment, thus it is applicable to all work environments, cyber investigation scenarios, and technologies. The text is written in a step-by-step manner, beginning with the elementary building blocks of data progressing upwards to the representation and storage of information. It inlcudes practical examples and illustrations throughout to guide the reader"-- Provided by publisher.
Hoboken: Wiley, 2012
363.250 MAR c
Buku Teks  Universitas Indonesia Library
cover
Johnson III, Leighton R.
Abstrak :
Computer incident response and forensics team management provides security professionals with a complete handbook of computer incident response from the perspective of forensics team management. This unique approach teaches readers the concepts and principles they need to conduct a successful incident response investigation, ensuring that proven policies and procedures are established and followed by all team members. Leighton R. Johnson III describes the processes within an incident response event and shows the crucial importance of skillful forensics team management, including when and where the transition to forensics investigation should occur during an incident response event. The book also provides discussions of key incident response components.
Waltham, MA: Syngress, 2014
e20426926
eBooks  Universitas Indonesia Library
cover
Singapore: World Scientific, 2010
R 658.478 HAN
Buku Referensi  Universitas Indonesia Library
cover
McCarthy, N.K.
New York: McGraw-Hill, 2012
005.8 MCC c
Buku Teks  Universitas Indonesia Library