TINDAK PIDANA DUNIA MAYA BERUPA VIRUS DAN TROJAN HORSE MENURUT UNDANG-UNDANG NOMOR 11 TAHUN 2008 TENTANG INFORMASI DAN TRANSAKSI ELEKTRONIK

Abstract views: 793 , PDF downloads: 1160
Keywords: Criminal Act, Cyberspace, Viruses, and The Trojan Horse

Abstract

Cybercrime or crime at cyberspace has many forms or shapes, but from that all existing’s forms, hacking is a forms that gets a lot of attention at the UN Congress X in Vienna st hacking is The first crime, also seen from The technical aspects, hacking have excess. First, The man who hacking must be can do other forms of cybercrime with ability to enter into computer system and then broke that system. Second, technically the quality of the hacking result from hacking that more seriously if compared with other forms of cybercrime, such as viruses and The Trojan Horse. Computer media and cyber world becomes most targets that attack by hackers because regarded as media that common owned by all levels of society. As that becomes problem in this research is how an arrangement crime of Virus and The Trojan Horse, and how the law enforcements tackling crime of Virus and The Trojan Horse. Research approach used normative juridical, the collected data both primary and secondary data examine by juridical review with not eliminate other nonjuridical element. This approach leads to laws and regulations as a major study of law and behavior of the perpetrator that wrongly use technology and information as concrete support to strengthening that juridical analysis. Result of research indicated that the role of law enforcement in handling crimes of Viruses and Trojan Horse that exercised so far was still very minimal.This cause many obstacles found by law enforcements, the existing statuary barriers, constraints of investigation, and the resistance of the people themselves.The most important thing is the system verification in order to cope with the crime of Viruses and Trojan Horse through repair or revision of existing statuary barriers, whether Law No.11 Year 2008 and The other regulation that related with The crimes of Viruses and The Trojan Horse.

Keyword : Criminal Act, Cyberspace, Viruses, and The Trojan Horse

References

Literatur :
Abdul Wahid, dan Mohammad Labib, Kejahatan Mayantara (Cyber Crime), Refika Aditama, Bandung, 2005.

Aloysius Wisnubroto, Kebijakan Hukum Pidana dalam Penanggulangan Penyalahgunaan Komputer, Yogyakarta : Universitas Widyatama, 1999.

Andi Hamzah, Hukum Acara Pidana Indonesia, Jakarta : CV Sapta Arta Jaya, 1996.

Asril Sitompul, Hukum Internet, Pengenalan Mengenai Masalah Hukum di Cyberspace, PT Citra Aditya Bakti, Bandung, 2001.

Barda Nawawi Arief, Masalah Penegakan Hukum dan Kebijakan Penanggulangan Kejahatan, PT.Raja Grafindo Persada, Jakarta, 2001.

Barda Nawawi Arief, Tindak Pidana Mayantara, Perkembangan Kajian Cyber di Indonesia, Rajawali Pers, 2005.

Hinca IP Panjaitan dkk. Membangun Cyberlaw Indonesia Yanng Demokratis, IMLPC, Jakarta. 2005.

Hermawan Sulistyo Sutanto, dan Tjuk Sugiarto (Ed), Cyber Crime Motif dan Penindakan, Pensil 324, Jakarta.

H. Sutarman, Cyber Crime, Modus Operandi dan Penanggulangannya, Laksbang Pressindo, Jogjakarta, 2007.

I Wayan Parthiana, Hukum Pidana Internasional, Yrama Widia, Bandung.

Jujun S. Suriasumantri, Ilmu Dalam Perspektif Moral, Sosial, dan Politik, PT. Gramedia, Jakarta, 1986.

Merry Magdalena, dan Maswigrantoro Roes Setiyadi, Cyberlaw, Tidak Perlu Takut, C.V Andi Offset, Yogyakarta, 2007.

Munir Fuady. Teori Hukum Pembuktian (Pidana dan Perdata). Citra aditya Bhakti. Jakarta. 2006.
M. Yahya Harahap. Pembahasan Permasalahan dan Penerapan KUHAP Penyidikan dan Penuntutan. Sinar Grafika. Jakarta. 2003.
P.A.F. Lamintang, Dasar-Dasar Hukum Pidana Indonesia, PT.Citra Aditya Bakti, Bandung, 1996.
Sultan Remy Syahdeini, Kejahatan dan Tindak Pidana Komputer, PT. Pustaka Utama Grafiti, Jakarta, 2009.
Tubagus Ronny Rahman, Ketika Kejahatan Berdaulat: Sebuah Pendekatan Kriminologi, Hukum dan Sosiologi, Peradaban, Jakarta, 2001.
Naskah Akademik RUU TI, UNPAD-DITJEN POLTEL DEPHUB, 2000.
Badan Pembinaan Hukum Nasional, Perkembangan Pembangunan Hukum Nasional tentang Hukum Teknologi dan Informasi, BPHN Departemen Kehakiman RI 1995/1996.
Peraturan Perundang-undangan :
Kitab Undang-Undang Hukum Pidana
Undang-Undang Nomor 8 Tahun 1981 Tentang Hukum Acara Pidana.
Undang-Undang Nomor 11 Tahun 2008 Tentang Informasi dan Transaksi Elektronik.
Undang-Undang Nomor 48 Tahun 2009 Tentang Pokok-Pokok Kekuasaan Kehakiman.
Makalah, Jurnal :
AR Budi, Aspek Perlindungan Hukum Nasabah dalam Sistem Pembayaran Internet. Artikel dalam Jurnal Hukum. No 16.
Didi Widayadi, Kebijakan dan Strategi Operasional Polri dalam kaitan hakikat ancaman Cybercrime, makalah pada seminar Cyber Law, diselenggarakan oleh Yayasan Cipta Bangsa, Bandung, 29 Juli 2000.
Arief Muliawan, Penegakan Hukum Tindak Pidana Informasi dan Transaksi Elektronika (cybercrime), disampaikan dalam seminar sehari dalam ranngka sosialisasi Undang-Undang Nomor 11 Tahun 2008 di Medan.
Koran :
Suara Merdeka, dengan judul Reserse Polda Jateng Ungkap Kejahatan Internasional Internet, 17 Nopember 2000.
Kompas, Berita Kompas Cyber Media (19/3/2002) 12 April 2002.
Website :
http://id.wikipedia.org/wiki/Sejarah_Internet
http://id.wikipedia.org/wiki
http://idfl.org/showthread.php?t=81197/Sejarah Internet di Indonesia
http://www.kejahatan dunia maya asal ketik.com.mht/dunia maya
http://www. Man 3 Malang.com/jenis-jenis kejahatan internet.mht
http://www.Ebisnionline.com/kejahatan internet;spamming.mht
http://www. Crouniclesofinhed.com/kejahatan computer.mht
http://www.symantec.com/norton/security_response/malware.jsp
http://www.isekolah.org/r_it_detail.php?itemid=h_1090285469
http://www.crime-research.org/library/Cyber-terrorism.htm
http://www.sinar harapan.com.mht/Indonesia peringkat ke-2 dunia kejahatan TI
http://www.missingkids.com/missingkids/servlet/PageServelt?PageId=1504
http://www.kejahatan dunia maya asal ketik.com.mht/dunia maya
http://[email protected]/GIPI-ASI@ ITC-APJII PEG-Cybercrime seminar/urgensi cybercrime law sebagai pelindung bagi pengguna teknologi informasi
http://www.nesl.edu/lawrev/vol37/1/marler.pdf, Marler, Sara L. The Convention on Cyber-Crime: Should the United States Ratify?
http://deluthus.blogspot.com/2011/02/8-contoh-kasus-cyber-crime-yang-pernah.html
http://freezcha.wordpress.com/2011/02/27/contoh-kasus-cybercrime-bagian2/
http://freezcha.wordpress.com/2011/02/27/contoh-kasus-cybercrime-bagian1/
http://freezcha.wordpress.com/2011/02/28/contoh-kasus-cybercrime-bagian3/
Published
2019-08-13