Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 11128 dokumen yang sesuai dengan query
cover
Sheetz, Michael
Hoboken: John Wiley & Sons, 2007
363.25 SHE c
Buku Teks  Universitas Indonesia Library
cover
Johnson III, Leighton R.
"Computer incident response and forensics team management provides security professionals with a complete handbook of computer incident response from the perspective of forensics team management. This unique approach teaches readers the concepts and principles they need to conduct a successful incident response investigation, ensuring that proven policies and procedures are established and followed by all team members.
Leighton R. Johnson III describes the processes within an incident response event and shows the crucial importance of skillful forensics team management, including when and where the transition to forensics investigation should occur during an incident response event. The book also provides discussions of key incident response components."
Waltham, MA: Syngress, 2014
e20426926
eBooks  Universitas Indonesia Library
cover
McCarthy, N.K.
New York: McGraw-Hill, 2012
005.8 MCC c
Buku Teks  Universitas Indonesia Library
cover
Orisa Shinta Haryani
"Perkembangan teknologi informasi yang begitu pesat memunculkan satu media komunikasi baru yang disebut dengan media sosial. Kepolisian Republik Indonesia membentuk Direktorat Tindak Pidana Siber Bareskrim Polri untuk menangani masalah kejahatan siber di media sosial dan melakukan pemberdayaan media sosial dalam konteks pemolisian masyarakat. Penelitian ini melihat bagaimana pemberdayaan media sosial yang dilakukan oleh Direktorat Tindak Pidana Siber Bareskrim Polri. Selain itu penelitian ini juga melihat dampak pemberdayaan media sosial tersebut terhadap masyarakat serta menemukan faktor penyebab tidak maksimalnya implementasi pemberdayaan media sosial dan juga menemukan solusi untuk meningkatkan pemberdayaan tersebut. Pendekatan penelitian ini adalah kualitatif dan pengumpulan data dilakukan dengan wawancara, observasi, juga melakukan studi literatur. Konsep yang digunakan di dalam penelitian ini adalah konsep community policing, effective policing, dan dampak pemberdayaan media sosial. Hasil penelitian ini menunjukkan bahwa pemberdayaan media sosial oleh Direktorat Tindak Pidana Siber Bareskrim Polri dilakukan untuk memberikan informasi pada masyarakat, melakukan deteksi dini pelaku kejahatan, membangun relasi dengan masyarakat, dan melakukan fungsi pengawasan dan kontrol terhadap perilaku masyarakat di media sosial. Dampak tidak maksimalnya pemberdayaan media sosial adalah ketidakpercayaan masyarakat terhadap kepolisian, media sosial tidak menjadi alat yang efektif dalam melakukan investigasi dan penyelidikan kasus, media sosial tidak mampu menjadi sarana penyampaian keberhasilan polisi sehingga tidak dapat meningkatkan performa kerja anggota, dan upaya pencegahan kejahatan tidak terlaksana dengan baik.

The development of information technology is so rapidly raises a new communication media called social media. Indonesia National Police established the Cyber Crime Investigation Center to deal with cybercrime in social media and empower social media in the community policing context. This study looks at how social media empowerment conducted by Cyber Crime Investigation Center. In addition, this study also looked at the impact of social media empowerment to the community and find the cause of unsuccessful implementation of social media empowerment and also find solutions to improve the empowerment. This research used qualitative approach and data collection techniques use interview, observation, also conducting literature study. The concept used in this research is community policing, effective policing, and the impact of social media empowerment. The results of this study indicate that social media empowerment by Cyber Crime Investigation Center aims to give information to society, early detection of criminal offenders, to build relation with society, and to do supervision and control in social media. The ineffectual impact of social media empowerment is public distrust of the police, social media is not an effective tool in investigating cases, social media can not be a medium to deliver the success story of the police works, and crime prevention in social media are not well implemented."
Depok: Universitas Indonesia, 2018
T49138
UI - Tesis Membership  Universitas Indonesia Library
cover
Shipley, Todd G.
"Written by experts on the frontlines, Investigating internet crimes provides seasoned and new investigators with the background and tools they need to investigate crime occurring in the online world. This invaluable guide provides step-by-step instructions for investigating Internet crimes, including locating, interpreting, understanding, collecting, and documenting online electronic evidence to benefit investigations.
Cybercrime is the fastest growing area of crime as more criminals seek to exploit the speed, convenience and anonymity that the Internet provides to commit a diverse range of criminal activities. Today's online crime includes attacks against computer data and systems, identity theft, distribution of child pornography, penetration of online financial services, using social networks to commit crimes, and the deployment of viruses, botnets, and email scams such as phishing. Symantec's 2012 Norton Cybercrime Report stated that the world spent an estimated $110 billion to combat cybercrime, an average of nearly $200 per victim.
Law enforcement agencies and corporate security officers around the world with the responsibility for enforcing, investigating and prosecuting cybercrime are overwhelmed, not only by the sheer number of crimes being committed but by a lack of adequate training material. This book provides that fundamental knowledge, including how to properly collect and document online evidence, trace IP addresses, and work undercover."
Waltham, MA: Steven Elliot, 2014
e20427145
eBooks  Universitas Indonesia Library
cover
Muhammad Rizky Nurkamrullah
"Warnet sebagai salah satu bentuk bisnis yang memanfaatkan teknologi komputer dalam berbagai macam kegiatannya tenyata tidak luput dari ancaman kejahatan komputer dan khususnya dalam penelitian ini adalah manipulasi sistem billing. Penelitian ini bertujuan untuk memaparkan kondisi apa saja yang membuat warnet X menjadi target tindakan manipulasi sistem billing. Penelitian ini akan menggunakan teori aktifitas rutin untuk menjelaskan situasi dan kondisi di dalam warnet X. Untuk mendapatkan gambaran situasi dan kondisi warnet yang lebih jelas, peneliti akan melakukan wawancara terhadap pemilik warnet, pegawai warnet yang bertindak sebagai operator, dan pelanggan warnet ini atau user.
Hasil wawancara dengan informan-informan tersebut menggambarkan kondisi warnet yang berpotensi menjadi target kejahatan komputer. Berbagai macam kondisi diantaranya adalah adanya motivasi pelaku untuk melakukan manipulasi billing; baik sistem billing, operator warnet, dan pemilik warnet lemah dalam pengawasan serta penjagaan keamanan data billing warnet tersebut; dan sistem billing dan operator warnet X memiliki karakteristik sebagai target tindakan manipulasi billing.

Internet café, is the one kind of business that using computer technology in every their business activity in fact, is not free from computer crime threat and especially in this research is billing manipulation act. This research is going to describe what circumstances that makes this internet café is potentially being a target of billing system manipulation act. This research will using routine activity theories to explain the condition and situation of this internet café. To get the clear picture of this internet café, researchers will interviewing the owner of the internet café X, the employee or server operator, and the client or the user.
From the results of the interview with the informants, its clear that one of the condition that makes this internet café vulnerable is the offender who had a motivation to do the manipulation; the weakness of billing system, server operator, and the owner for guarding the billing data; and the suitable condition of the billing and server operator to be a target of billing manipulation.
"
Depok: Fakultas Ilmu Sosial dan Ilmu Politik Universitas Indonesia, 2013
S45873
UI - Skripsi Membership  Universitas Indonesia Library
cover
Akhgar, Babak
"Cyber crime and cyber terrorism investigator’s handbook is a vital tool in the arsenal of today’s computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become some of the most concerning topics in today’s security landscape. News stories about Stuxnet and PRISM have brought these activities into the public eye, and serve to show just how effective, controversial, and worrying these tactics can become.
Cyber crime and cyber terrorism investigator’s handbook describes and analyzes many of the motivations, tools, and tactics behind cyber attacks and the defenses against them. With this book, you will learn about the technological and logistic framework of cyber crime, as well as the social and legal backgrounds of its prosecution and investigation. Whether you are a law enforcement professional, an IT specialist, a researcher, or a student, you will find valuable insight into the world of cyber crime and cyber warfare.
"
Waltham, MA: Elsevier, 2014
e20426911
eBooks  Universitas Indonesia Library
cover
Perry, William E.
New York: John Wiley & Sons, 1981
629.895 PER c
Buku Teks  Universitas Indonesia Library
cover
Remenyi, Dan
London: McGraw-Hill Book Co , 1980
001.642 REM l
Buku Teks SO  Universitas Indonesia Library
cover
Rizky Fazri Dlis
"ABSTRAK
Penulisan ini akan menganalisis hubungan antara white collar crime dan cyber crime yang dilakukan oleh Sandy Tumiwa dalam bentuk high yield investment program. High yield investment program sendiri adalah sebuah skema ponzi yang menggunakan internet sebagai tempat untuk menawarkan skemanya. Kasus melibatkan beberapa unsur dari white collar crime, salah satunya adalah pelaku dari kejahatan ini, Sandy Tumiwa, yang juga seorang CEO dari PT. CSM Bintang Indonesia menggunakan statusnya sebagai public figure untuk dapat menarik korban. Penulisan ini menggunakan metode unobstrusive sebagai bagian dari pengambilan data. Data-data yang di dapatkan kemudian akan dianalisis menggunakan teori white collar crime dengan menggunakan matrix criminal behavorial system sebagai dasarnya. Penulisan ini akan mendeskripsikan bagaimana hubungan antara white collar crime yang dilakukan oleh Sandy Tumiwa dengan melakukan penipuan investasi dengan memanfaatkan internet sebagai medianya untuk melakukan kejahatan sehingga terjadi kejahatan berbentuk cyber crime.

ABSTRACT
This paper will analyze the connection between white collar crime and cyber crime that has been done by Sandy Tumiwa through high yield investment program. High yielad investment is a ponzi scheme that held on internet to promote their scheme. This case consist of some white collar crime element, one of it is Sandy Tumiwa, The Ceo of PT. CSM Bintang Indonesia was a famous actor, he use his fame to enticing the victim. This writing using unobstrusive methode as a data gathering methode. Data that found later will be analyzed using white collar crime theory that using criminal behavorial system as it base. This writtng will describing what is the connection between white collar crime that beed done by Sandy Tumiwa and the nvestment that been held in internet as their place to operate so it become a cyber crime."
2017
TA-pdf
UI - Tugas Akhir  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>