Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 10193 dokumen yang sesuai dengan query
cover
Yar, Majid, auhtor
Los Angeles: Sage, 2013
364.168 YAR c
Buku Teks  Universitas Indonesia Library
cover
Yar, Majid, auhtor
Los Angeles: Sage, 2013
364.168 YAR c
Buku Teks SO  Universitas Indonesia Library
cover
Daniel Hasianto Hendarto
"Penelitian ini bertujuan untuk mengeksplorasi strategi pemolisian dalam pencegahan kejahatan perjudian online. Fokus penulisan ini adalah untuk mengidentifikasi karakteristik dan perkembangan tindak pidana perjudian online, faktor-faktor yang berkontribusi terhadap implementasi strategi pencegahan kejahatan tersebut di Direktorat Tindak Pidana Siber Bareskrim Polri, serta strategi pemolisian yang ideal dalam melakukan pecegahan kejahatan tersebut. Prespektif teori yang digunakan dalam penelitian ini adalah teori Sittuational Crime Prevention dan Teori Kemitraan Dalam penelitian ini penulis menggunakan penelitian kualitatif, dimana Teknik pengumpulan data yang penulis lakukan adalah dengan cara: (1) Observasi; (2) wawancara tidak terstruktur dan, (3) studi literatur. Hasil penelitian ini menjelaskan bahwasannya dalam upaya pencegahan kejahatan perjudian online, diperlukan pengembangan terkait berbagai strategi dan pendekatan dalam mencegah kejahatan tersebut, hal itu dikarenakan perkembangan perjudian online yang telah terjadi saat ini belum dapat diimbangi dengan upaya pencegahan kejahatan yang dilakukan oleh Polri dan Lembaga Pemerintahan terkait.

This research aims to explore policing strategies in the prevention of online gambling crimes. The focus of this paper is to identify the characteristics and development of online gambling crimes, the factors that contribute to the implementation of the crime prevention strategy at the Directorate of Cyber Crime of the Criminal Investigation Unit of the National Police, and the ideal policing strategy in preventing such crimes. The theoretical perspectives used in this research are Sittuational Crime Prevention theory and Partnership Theory. In this study the authors used qualitative research, where the data collection techniques that the authors did were by: (1) Observation; (2) unstructured interviews and, (3) literature study. The results of this study explain that in efforts to prevent online gambling crimes, development is needed related to various strategies and approaches in preventing these crimes, this is because the development of online gambling that has occurred today has not been able to be matched by crime prevention efforts carried out by the Police and related Government Institutions."
Jakarta: Sekolah Kajian Stratejik dan Global Universitas Indonesia, 2024
T-pdf
UI - Tesis Membership  Universitas Indonesia Library
cover
Clough, Jonathan
"Digital technology has transformed the way in which we socialise and do business. Proving the maxim that crime follows opportunity, virtually every advance has been accompanied by a corresponding niche to be exploited for criminal purposes; so-called 'cybercrimes'. Whether it be fraud, child pornography, stalking, criminal copyright infringement or attacks on computers themselves, criminals will find ways to exploit new technology. The challenge for all countries is to ensure their criminal laws keep pace. The challenge is a global one, and much can be learned from the experience of other jurisdictions. Focusing on Australia, Canada, the UK and the USA, this book provides a comprehensive analysis of the legal principles that apply to the prosecution of cybercrimes. This new edition has been fully revised to take into account changes in online offending, as well as new case law and legislation in this rapidly developing area of the law."
United Kingdom: Cambridge University Press, 2015
e20528729
eBooks  Universitas Indonesia Library
cover
Clough, Jonathan
"We live in a digital age. The proliferation of digital technology, and the convergence of computing and communication devices, has transformed the way in which we socialise and do business. While overwhelmingly positive, there has also been a dark side to these developments. Proving the maxim that crime follows opportunity, virtually every advance has been accompanied by a corresponding niche to be exploited for criminal purposes; so-called 'cybercrimes'. Whether it be fraud, child pornography, stalking, criminal copyright infringement or attacks on computers themselves, criminals will find ways to exploit new technology. The challenge for all countries is to ensure their criminal laws keep pace. The challenge is a global one, and much can be learned from the experience of other jurisdictions. Focusing on Australia, Canada, the UK and the US, this book provides a comprehensive analysis of the legal principles that apply to the prosecution of cybercrimes."
United States: Cambridge University Press, 2010
e20528257
eBooks  Universitas Indonesia Library
cover
Higgins, George E.
Boston: McGraw-Hill, 2010
364.168 HIG c
Buku Teks SO  Universitas Indonesia Library
cover
Kisnu Widagso
"Kejahatan siber telah menjadi salah satu ciri dari masyarakat modern yang muncul seiring dengan perkembangan dan penggunaan teknologi oleh masyarakat. Seiring dengan perkembangan ini, polisi ternyata mengalami kesulitan dalam melakukan penegakan hukum maupun pencegahan terjadinya kejahatan di dunia siber. Polisi terlihat lemah dalam penanganan kasus kejahatan siber, sehingga berdampak pada lemahnya pengendalian sosial formal terhadap kejahatan siber. Situasi ini tercermin, salah satunya, dari meningkatnya angka kasus kejahatan siber dan banyaknya kasus kejahatan siber yang belum dapat ditangani. Di sisi lain, secara teoretis, perubahan terhadap model pemolisian umumnya hanya berlandaskan pada satu atau dua faktor, misalnya dari sisi kelemahan polisi, dari sisi sifat kejahatan siber, atau dari sisi masyarakat pengguna teknologi. Sebagai konsekuensinya, kondisi ini membutuhkan perubahan model pemolisian.
Pendekatan kualitatif digunakan dengan mempertimbangkan bahwa penelitian tentang model pemolisian pada dasarnya merupakan suatu upaya untuk memberikan pemahaman dan penjelasan dalam mengonstruksi sebuah konsep yang memiliki sebagian ciri atau karakteristik dari dunia nyata. Pengumpulan data dilakukan dengan melakukan kajian literatur, wawancara, dan pengamatan. Analisis data dilakukan dengan pengorganisasian dan mengurutan data ke dalam kategori dan satuan uraian dasar, sehingga dapat ditemukan pola, tema yang dapat menjadi petunjuk jalan dalam melakukan analisis (interpretasi).
Data menunjukkan bahwa terdapat faktor input dalam model pemolisian, seperti jenis kejahatan siber, penyebab munculnya kejahatan siber, dan karakteristik masyarakat siber. Dari penelitian menunjukkan bahwa jenis kejahatan siber di Indonesia didominasi oleh tindak pidana penipuan dan content-related crimes. Kemudian, rendahnya literasi digital dan terjadinya kesenjangan digital pada masyarakat, kapabilitas polisi yang terbatas, absennya knowledge management system (KMS), serta masih lemahnya praktik-praktik community policing menjadi faktor-faktor yang mendorong maraknya kejahatan siber di Indonesia. Dengan bantuan kerangka berpikir yang diberikan oleh Ponsaers (2001), pemahaman akan faktor-faktor tersebut sebagai aspek dalam proses dinamis pembentukan model pemolisian diidentifikasi pada model pemolisian terhadap kejahatan siber. Hasilnya, hybrid policing sebagai model pemolisian dipandang sebagai jawaban atas makin beragamnya bentuk kejahatan siber, keterbatasan kapabilitas Polri, serta praktik pemolisian yang lebih efektif. Model ini juga membuka peluang bagi masyarakat untuk turut berperan serta dalam pelaksanaan kewenangan polisi dalam melakukan pemolisian. Dalam penelitian ini, teridentifikasi pula beberapa tipologi hybrid policing sebagai sebuah model, yaitu non-hybrid policing, semi hybrid policing, serta pseudo hybrid policing.

Cybercrime has been a feature of modern society, which emerges along with technological advancement and usage. Empirically, it has been challenging for the police to enforce and prevent the occurrence of cybercrime in the cyberspace. The police appear to be weak in handling cybercrime cases, hence weakening the formal social control of cybercrime. Currently, it reflects on the increasing number of cybercrime cases, while most of those cases left unhandled. Theoretically, current state indicates change in policing model grounded in one or two factors, for instance, police weakness, or the nature of cybercrime, or how the society uses technology. Prevailing conditions commonly leads to change in policing model.
The qualitative approach employed in current research, considering the nature of a policing model research in which can be defined as an attempt to understand and explain in order to construct a concept that partly resemble characteristics of the real world. The data collection process in current research utilizes literature study, interview and observation. Data analysis was done by organizing and sorting data into categories and basic description unit in order to find patterns and themes in which can be analyzed (interpretation).
Data exposes certain factors in policing model, input factor. Factors such as the high number of fraud and content-related crimes, user’s lack of understanding of how technology can be exploited for personal gain, police’s weakness and limitations, the absence of knowledge management system (KMS), and also inadequate community policing practice. Understanding of these factors, combined with a framework of aspects within the dynamic process of constructing policing model from Ponsaers (2001), identifying cybercrime policing model. Result presents Hybrid Policing, as a policing model to resolve varying forms of crime, weaknesses of the police and encouraging more effective policing. Aforementioned model can also initiate opportunities for the people to have authority, previously in the hands of the police, in terms of policing. Current research also identifies several typologies of Hybrid Policing as a model, namely non-hybrid policing, semi hybrid policing and pseudo hybrid policing.
"
Depok: Fakultas Ilmu Sosial dan Ilmu Politik Universitas Indonesia, 2021
D-pdf
UI - Disertasi Membership  Universitas Indonesia Library
cover
Budi Suhariyanto, 1983-
Jakarta: RajaGrafindo Persada, 2012
345 BUD t
Buku Teks  Universitas Indonesia Library
cover
"The last twenty years have seen an explosion in the development of information technology, to the point that people spend a major portion of waking life in online spaces. While there are enormous benefits associated with this technology, there are also risks that can affect the most vulnerable in our society but also the most confident. Cybercrime and its victims explores the social construction of violence and victimisation in online spaces and brings together scholars from many areas of inquiry, including criminology, sociology, and cultural, media, and gender studies."
London: Routledge, Taylor & Francis Group, 2017
364.168 CYB
Buku Teks SO  Universitas Indonesia Library
cover
Puji Nugroho
"ABSTRAK
Dibalik banyaknya kajian displin ilmu Hubungan Internasional yang meneliti tentang respon negara dalam menanggapi kejahatan transnasional, masih cukup sedikit kajian yang berfokus pada respon negara dalam menghadapi cybercrime. Hal ini dikarenakan, kasus-kasus cybercrime hanya dianggap sebagai sebuah kasus dalam ranah teknologi saja. Situasi ini menarik perhatian penulis untuk membuat penelitian dengan menganalisis bagaimana upaya kerjasama ASEAN dalam menanggulangi kejahatan yang terjadi di ruang cyber cybercrime . Dalam penelitian ini digambarkan bahwa kasus cybercrime dapat memberikan implikasi terhadap hubungan antar negara, karena sifat kejahatan tersebut yang borderless lintas batas negara dan karakter ancaman yang dikategorikan sebagai keamanan non tradisional. Dengan menggunakan konsep kerjasama internasional yang dikemukakan oleh Robert Keohane dan Joseph Nye serta metode pengolahan data secara kualitatif terhadap gejala-gejala latar belakang sosial yang muncul pada kasus cybercrime, tulisan ini hendak menggambarkan tujuan dari dilakukannya suatu kerjasama internasional oleh negara-negara anggota ASEAN dalam penanggulangan cybercrime. Hasil penelitian ini menemukan fakta bahwa upaya ASEAN untuk menanggulangi cybercrime telah dituangkan dalam deklarasi ASEAN yaitu The 3rd Joint Communiqu AMMTC pada 11 Oktober 2004 di Singapura. Selain itu, para pemimpin ASEAN memandang bahwa cybercrime merupakan ancaman besar bagi stabilitas keamanan kawasan, serta ekonomi dan politik. Komponen kerjasama keamanan ASEAN telah dikokohkan dalam ASEAN Regional Forum ARF . Namun kerjasama ARF tersebut dinilai belum efektif karena adanya kelemahan-kelemahan dalam proses pengambilan keputusan sehingga belum mampu mengatasi perbedaan pendapat yang cukup mendasar dalam merumuskan strategi yang diperlukan khususnya untuk memerangi cybercrime. Walaupun masih terdapat kelemahan dalam penanggulangan cybercrime di ASEAN, namun kondisi tersebut dapat diminimalir dengan adanya kerjasama seperti pertukaran informasi intelijen terhadap pelaku potensial cyber melalui sistem electronic-ASEANAPOL Database System e-ADS , harmonisasi hukum yang mengatur keamanan di ruang cyber,serta pelatihan bersama para penyidik dan penegak hukum dalam hal investigasi dan penyidikan digital forensik.

ABSTRACT
Despite the vast research of International Relations disciplines that examines the state s response toward transnational crime, it is still quite a bit of study which focuses on the state s response face to cybercrime. This is because, many researches study cybercrime cases from the point of view of technology. This condition attracted the attention of writers to make a research by analyzing how the efforts made by ASEAN cooperation to combat crimes in the cyber space cybercrime . This research describes that cybercrime cases may have implications to influence a relation between nation states, due to the fact that cybercrime has borderless nature and the character of the threat which is categorized as a non traditional security. Therefore, by using the concept of international cooperation by Robert Keohane and Joseph Nye and conducting a qualitative data processing methods for symptoms of social background that appears in cybercrime cases, this research aims to describe the purpose of the international cooperation performed by ASEAN member countries in combating cybercrime. The result of this study found that ASEAN s efforts to combat cybercrime has been validated by a declaration in the 3rd ASEAN joint communiqu AMMTC on October 11th, 2004 in Singapore. In addition, ASEAN leaders consider cybercrime as major threat to the regional security and stability, as well as economic and political. ASEAN security cooperation has been affirmed in the ASEAN Regional Forum ARF . However, the ARF cooperation is considered ineffective because it still shows a weakness in the decision making process that has not been able to overcome disagreements which are fairly fundamental in formulating the strategies needed to combat cybercrime. Although, there are still weaknesses in the ASEAN cooperation to combat cybercrime, but, such condition can be mitigated by a cooperation such as the exchange of intelligence information on potential cyber offenders through an integrated system named electronic ASEANAPOL Database System e ADS , the harmonization of law governing security in cyber space, as well as the integrated activity of people capacity building for investigators and law enforcement in terms of investigations and digital forensic investigation."
2016
T46974
UI - Tesis Membership  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>