Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 2 dokumen yang sesuai dengan query
cover
Sharpe, Alex
Abstrak :
This book is a legal and political intervention into a contemporary debate concerning the appropriateness of sexual offence prosecutions brought against young gender non-conforming people for so-called 'gender identity fraud'. It comes down squarely against prosecution. To that end, it offers a series of principled objections based both on liberal principles, and arguments derived from queer and feminist theories. Thus prosecution will be challenged as criminal law overreach and as a spectacular example of legal inconsistency, but also as indicative of a failure to grasp the complexity of sexual desire and its disavowal. In particular, the book will think through the concepts of consent, harm and deception and their legal application to these specific forms of intimacy. In doing so, it will reveal how cisnormativity frames the legal interpretation of each and how this serves to preclude more marginal perspectives. Beyond law, the book takes up the ethical challenge of the non-disclosure of gender history. Rather than dwelling on this omission, it argues that we ought to focus on a cisgender demand to know as the proper object of ethical inquiry. Finally, and as an act of legal and ethical re-imagination, the book offers a queer counter-judgment to R v McNally, the only case involving a gender non-conforming defendant, so far, to have come before the Court of Appeal
London: Routledge, Taylor & Francis Group, 2018
345 SHA s
Buku Teks  Universitas Indonesia Library
cover
Nasya Adinda
Abstrak :
Tugas karya akhir ini membahas mengenai suatu bentuk kejahatan yang berkaitan dengan identitas dalam ruang siber. Secara spesifik, penulis mendalami identity fraud terhadap seorang pengguna layanan jasa telekomunikasi dan perbankan di Surabaya, Indonesia, berinisial EPP. Kejahatan yang terjadi kepada EPP merupakan bentuk kejahatan identity fraud, jika dilihat dari pelakunya yang menggunakan identitas pribadi EPP secara tidak sah untuk keuntungan finansial mereka dengan cara pembobolan rekening. Dari tindakan tersebut, para pelaku turut memanfaatkan keterhubungan dalam ruang siber dengan tujuan untuk memperoleh keuntungan. Studi kasus digunakan oleh penulis sebagai bentuk metode penulisan kualitatifnya untuk mendalami permasalahan yang dialami oleh korban, yaitu EPP. Walaupun studi kasus berfokus kepada satu korban, namun hal ini menjadi isu publik ketika mempertimbangkan kaitannya dengan para penyedia jasa layanan publik yang layanannya tersebar di seluruh Indonesia. Penulis menggunakan Cyberlifestyle-Routine Activities Theory (dengan membatasi analisisnya pada unsur suitable target dan incapable guardians) serta konsep identity fraud untuk memahami fenomena ini. Penggunaan teori ini merupakan pengembangan para akademis dari bentuk tradisional Routine Activity Theory (RAT) dan leburan Lifestyle-Exposure Theory (LET), yang telah diadopsi ke dalam ruang siber untuk mendalami fenomena kejahatan dan viktimisasi di dalamnya. Dalam penulisan ini, uang dalam rekening EPP. diposisikan sebagai suitable target dan kedua terduga korporasi penyedia layanan jasa dianalisis dengan unsur incapable guardians. ......This final paper discusses a form of crime related to identity within the cyberspace. Specifically, the author explores identity fraud against a user of telecommunication and banking services in Surabaya, Indonesia, identified as EPP. The crime against EPP takes the form of identity fraud, where the perpetrators illegitimately use EPP’s personal identity to gain financial benefits through unauthorized access to his bank account. In carrying out this act, the perpetrators exploit the interconnectivity within the cyberspace with the aim of financial gain. Case study is used as a form of qualitative writing method to explore the problems experienced by the victim. Even though the case study focuses on one victim, this becomes a public issue when considering its relationship to public service providers whose services are distributed throughout Indonesia. The author uses the Cyberlifestyle-Routine Activities Theory (with a focus on the elements of suitable target and incapable guardian) and the concept of identity fraud to comprehend this phenomenon. The use of this theory is an academic development of the traditional Routine Activity Theory (RAT) and the fusion of Lifestyle-Exposure Theory (LET), which has been adopted into cyberspace to explore the phenomenon of crime and victimization in it. In this writing, the funds in EPP’s bank account are positioned as a suitable target, and both suspected corporate service providers are analyzed as incapable guardians.
Depok: Fakultas Ilmu Sosial dan Ilmu Politik Universitas Indonesia, 2024
TA-pdf
UI - Tugas Akhir  Universitas Indonesia Library