The Legal Policy of Criminal Justice Bureaucracy Cybercrime
Abstract
Cybercrime has resulted in astronomical losses for the business community. However, the reactive policy model must be more effective at preventing cybercrime, and the due process model is also inappropriate for combating cybercrime with a high level of speed and mobility. This study is normative legal research employing a conceptual strategy and case studies. The results indicate that the reactive model must be improved in order to prevent cybercrime. The model of due process is not appropriate for deterring cybercrime with a high degree of speed and mobility. The preventative law enforcement strategy is effective, but it requires a high level of law enforcement capability to detect and disable cybercrime, which is something that few Indonesian law enforcement officials possess. Prevention based on the user, which places responsibility on internet users, is fine for individuals but not for businesses. Based on collaboration between corporations, universities, civic society, and non-governmental groups, the collaborative model synthesizes the aforementioned paradigms. Because they are based on plans or roadmaps created by internet stakeholders, regulations, technical aspects, and law enforcement may be effectively implemented and developed.
Keywords
Full Text:
PDFReferences
Altikriti, Sultan, Joseph L. Nedelec, and J.C. Barnes, ‘The Influence of Individual Differences on the Formation of Perceptions of Risk, Social Cost, and Rewards of Crime: A Meta-Analysis’, Journal of Criminal Justice, 82.April (2022), 101962 https://doi.org/10.1016/j.jcrimjus.2022.101962
Antonescu, Mihail, and Ramona Birău, ‘Financial and Non-Financial Implications of Cybercrimes in Emerging Countries’, Procedia Economics and Finance, 32.15 (2015), 618–21 https://doi.org/10.1016/s2212-5671(15)01440-9
Apau, Richard, and Felix N. Koranteng, ‘An Overview of the Digital Forensic Investigation Infrastructure of Ghana’, Forensic Science International: Synergy, 2 (2020), 299–309 https://doi.org/10.1016/j.fsisyn.2020.10.002
Ariffin, Khairul Akram Zainol, and Faris Hanif Ahmad, ‘Indicators for Maturity and Readiness for Digital Forensic Investigation in Era of Industrial Revolution 4.0’, Computers and Security, 105 (2021), 102237 https://doi.org/10.1016/j.cose.2021.102237
Atagamen, Paul, Oluwaseye Oluwayomi, and Alade Adeniyi, ‘Legality of EndSARS Protest : A Quest for Democracy in Nigeria’, Journal of Human Rights, Culture and Legal System, 2.3 (2022), 209–24 https://doi.org/https://doi.org/10.53955/jhcls.v2i3.40
Atlam, Hany F., Ezz El-Din Hemdan, Ahmed Alenezi, Madini O. Alassafi, and Gary B. Wills, ‘Internet of Things Forensics: A Review’, Internet of Things (Netherlands), 11 (2020), 100220 https://doi.org/10.1016/j.iot.2020.100220
Ayyoub, Hani Y., Ahmad A. AlAhmad, Amani Al-Serhan, Mohammad F. Al-Abdallat, Esra’a Al-Muheisen, Hadeel Boshmaf, and others, ‘Awareness of Electronic Crimes Related to E-Learning among Students at the University of Jordan’, Heliyon, 8.10 (2022), e10897 https://doi.org/10.1016/j.heliyon.2022.e10897
Brands, Jelle, and Janne Van Doorn, ‘The Measurement, Intensity and Determinants of Fear of Cybercrime: A Systematic Review’, Computers in Human Behavior, 127 (2022), 107082 https://doi.org/10.1016/j.chb.2021.107082
Button, Mark, and Jack Whittaker, ‘Exploring the Voluntary Response to Cyber-Fraud: From Vigilantism to Responsibilisation’, International Journal of Law, Crime and Justice, 66.January (2021), 100482 https://doi.org/10.1016/j.ijlcj.2021.100482
Chong, Henry, ‘SeCBD: The Application Idea from Study Evaluation of Ransomware Attack Method in Big Data Architecture’, Procedia Computer Science, 116 (2017), 358–64 https://doi.org/10.1016/j.procs.2017.10.065
Christianto, Hwian, ‘Measuring Cyber Pornography Based on Indonesian Living Law: A Study of Current Law Finding Method’, International Journal of Law, Crime and Justice, 60.November 2019 (2020), 100348 https://doi.org/10.1016/j.ijlcj.2019.100348
Ćmiel, Sylwia, ‘Cyberbullying Legislation in Poland and Selected EU Countries’, Procedia - Social and Behavioral Sciences, 109 (2014), 29–34 https://doi.org/10.1016/j.sbspro.2013.12.416
Connolly, Eric J., Joseph A. Schwartz, and Kristina Block, ‘The Role of Poor Sleep on the Development of Self-Control and Antisocial Behavior from Adolescence to Adulthood’, Journal of Criminal Justice, 82.September (2022), 101995 https://doi.org/10.1016/j.jcrimjus.2022.101995
Corbet, Shaen, and Constantin Gurdgiev, ‘What the Hack: Systematic Risk Contagion from Cyber Events’, International Review of Financial Analysis, 65.January (2019), 101386 https://doi.org/10.1016/j.irfa.2019.101386
Drewer, Daniel, and Vesela Miladinova, ‘The BIG DATA Challenge: Impact and Opportunity of Large Quantities of Information under the Europol Regulation’, Computer Law and Security Review, 33.3 (2017), 298–308 https://doi.org/10.1016/j.clsr.2017.03.006
Dupont, Benoit, and Thomas J. Holt, ‘Advancing Research on the Human Factor in Cybercrime’, Computers in Human Behavior, 138.August 2022 (2022), 2022–24 https://doi.org/10.1016/j.chb.2022.107410
Ferdik, Frank, George Frogge, and Mikaela Cooney, ‘Exploring Further Determinants of Citizen Satisfaction with the Police: The Role of Strain’, Journal of Criminal Justice, 81.May (2022), 101931 https://doi.org/10.1016/j.jcrimjus.2022.101931
Frith, Michael J., Kate J. Bowers, and Shane D. Johnson, ‘Household Occupancy and Burglary: A Case Study Using COVID-19 Restrictions’, Journal of Criminal Justice, 82.April (2022), 101996 https://doi.org/10.1016/j.jcrimjus.2022.101996
Gruber, Jan, Lena L. Voigt, Zinaida Benenson, and Felix C. Freiling, ‘Foundations of Cybercriminalistics: From General Process Models to Case-Specific Concretizations in Cybercrime Investigations’, Forensic Science International: Digital Investigation, 43 (2022), 301438 https://doi.org/10.1016/j.fsidi.2022.301438
Holt, Thomas J., ‘Understanding the State of Criminological Scholarship on Cybercrimes’, Computers in Human Behavior, 139.August 2022 (2023), 107493 https://doi.org/10.1016/j.chb.2022.107493
Huff-Corzine, Lin, and Kayla Toohy, ‘The Life and Scholarship of Pauline Tarnowsky: Criminology’s Mother’, Journal of Criminal Justice, January, 2022, 101986 https://doi.org/10.1016/j.jcrimjus.2022.101986
Iqra, Moh, Syabani Korompot, and Al-fatih David, ‘The Principle of Equality Before the Law in Indonesian Corruption Case : Is It Relevant ?’, Journal of Human Rights, Culture and Legal System, 1.3 (2021), 135–46 https://doi.org/10.53955/jhcls.v1i3.13
Jaelani, Abdul Kadir, and Resti Dian Luthviati, ‘The Crime Of Damage After the Constitutional Court ’ s Decision Number 76 / PUU-XV / 2017’, Journal of Human Rights, Culture and Legal System, 1.1 (2021), 31–41 https://doi.org/https://doi.org/10.53955/jhcls.v1i1.5
Kamerer, Jessica L., and Donna McDermott, ‘Cybersecurity: Nurses on the Front Line of Prevention and Education’, Journal of Nursing Regulation, 10.4 (2020), 48–53 https://doi.org/10.1016/S2155-8256(20)30014-4
Karagiannopoulos, Dr Vasileios, Dr Annie Kirby, Shakiba Oftadeh-Moghadam, and Dr Lisa Sugiura, ‘Cybercrime Awareness and Victimisation in Individuals over 60 Years: A Portsmouth Case Study’, Computer Law and Security Review, 43 (2021), 105615 https://doi.org/10.1016/j.clsr.2021.105615
Karim, Sitara, Brian M. Lucey, Muhammad Abubakr Naeem, and Samuel A. Vigne, ‘The Dark Side of Bitcoin: Do Emerging Asian Islamic Markets Help Subdue the Ethical Risk?’, Emerging Markets Review, January, 2022, 100921 https://doi.org/10.1016/j.ememar.2022.100921
Kim, Karl, ‘Dispatches from the Field: The 2022 United Nations Global Platform for Disaster Risk Reduction in Bali, Indonesia’, Transportation Research Interdisciplinary Perspectives, 15.June (2022), 100644 https://doi.org/10.1016/j.trip.2022.100644
Kusuma, Bambang Ali, ‘Establishment of Indonesian Maritime Power: Regulation of Transnational Organized Crime on Illegal, Unreported, and Unregulated (IIU) Fishing’, International Journal of Criminal Justice Sciences, 16.2 (2021), 251–66 https://doi.org/10.1016/j.avb.2012.10.005
Lee, In, ‘Cybersecurity: Risk Management Framework and Investment Cost Analysis’, Business Horizons, 64.5 (2021), 659–71 https://doi.org/10.1016/j.bushor.2021.02.022
Malecki, Edward J., ‘Real People, Virtual Places, and the Spaces in Between’, Socio-Economic Planning Sciences, 58 (2017), 3–12 https://doi.org/10.1016/j.seps.2016.10.008
Marwan, Awaludin, and Fiammetta Bonfigli, ‘Detection of Digital Law Issues and Implication for Good Governance Policy in Indonesia’, Bestuur, 10.1 (2022), 22–32 https://doi.org/https://doi.org/10.20961/bestuur.v10i1.59143
McCormack, Lynne, and Brendan Lowe, ‘Making Meaning of Irreconcilable Destruction of Innocence: National Humanitarian Professionals Exposed to Cybercrime Child Sexual Exploitation in the Philippines’, Child Abuse and Neglect, 131.September 2021 (2022), 105770 https://doi.org/10.1016/j.chiabu.2022.105770
Michaud, Patrick, Eric Beauregard, and Jean Proulx, ‘Criminal Nomadism: A Neglected Dimension of Spatial Mobility in Sex Offending’, Journal of Criminal Justice, 81.May (2022), 101928 https://doi.org/10.1016/j.jcrimjus.2022.101928
Mishra, Alok, Yehia Ibrahim Alzoubi, Memoona Javeria Anwar, and Asif Qumer Gill, ‘Attributes Impacting Cybersecurity Policy Development: An Evidence from Seven Nations’, Computers and Security, 120 (2022) https://doi.org/10.1016/j.cose.2022.102820
Mochtar, Zainal Arifin, and Kardiansyah Afkar, ‘President’s Power, Transition, and Good Governance’, Bestuur, 10.1 (2022), 68–83 https://doi.org/https://dx.doi.org/10.20961/bestuur.v10i1.59098
Nguyen, Dr Chat Le, and Dr Wilfred Golman, ‘Diffusion of the Budapest Convention on Cybercrime and the Development of Cybercrime Legislation in Pacific Island Countries: “Law on the Books” vs “Law in Action”’, Computer Law and Security Review, 40.June 2020 (2021), 105521 https://doi.org/10.1016/j.clsr.2020.105521
Olukoya, Oluwafemi, ‘Assessing Frameworks for Eliciting Privacy & Security Requirements from Laws and Regulations’, Computers and Security, 117 (2022), 102697 https://doi.org/10.1016/j.cose.2022.102697
Palmieri, Michael, Neil Shortland, and Presley McGarry, ‘Personality and Online Deviance: The Role of Reinforcement Sensitivity Theory in Cybercrime’, Computers in Human Behavior, 120.October 2020 (2021), 106745 https://doi.org/10.1016/j.chb.2021.106745
Prakasa, Satria, U.W., ‘Reduce Corruption in Public Procurement: The Effort Towards Good Governance’, Bestuur, 10.1 (2022), 33–42 https://doi.org/https://doi.org/10.20961/bestuur.v10i1.51339
Prasetiyo, Wibowo Heru, Noor Banu Mahadir Naidu, Beti Indah Sari, Rochman Hadi Mustofa, Naillysa Rahmawati, Gilang Pambudi Adi Wijaya, and others, ‘Survey Data of Internet Skills, Internet Attitudes, Computer Self-Efficacy, and Digital Citizenship among Students in Indonesia’, Data in Brief, 39 (2021) https://doi.org/10.1016/j.dib.2021.107569
Raharjo, Agus, ‘Law as Artificial Intelligence Products’, Advances in Social Science, Education and Humanities Research, Volume 358 3rd International Conference on Globalization of Law and Local Wisdom (ICGLOW 2019) Law, 358.Icglow (2019), 389–93 https://doi.org/10.2991/icglow-19.2019.93
———, ‘Prevention of Cybercrime through the Development of Criminal Responsibility Principles for Internet Users’, Jurnal Dinamika Hukum, 21.3 (2015), 499–511 https://doi.org/10.20884/1.jdh.2021.21.3.3256.This
Saputra, Rian, M Zaid, and Silaas Oghenemaro, ‘The Court Online Content Moderation : A Constitutional Framework’, Journal of Human Rights, Culture and Legal System, 2.3 (2022), 139–48 https://doi.org/https://doi.org/10.53955/jhcls.v2i3.54
Setyowati, Milla Sepliana, Niken Desila Utami, Arfah Habib Saragih, and Adang Hendrawan, ‘Strategic Factors in Implementing Blockchain Technology in Indonesia’s Value-Added Tax System’, Technology in Society, 72.November 2022 (2022), 102169 https://doi.org/10.1016/j.techsoc.2022.102169
Singh, Manmeet Mahinderjit, and Anizah Abu Bakar, ‘A Systemic Cybercrime Stakeholders Architectural Model’, Procedia Computer Science, 161 (2019), 1147–55 https://doi.org/10.1016/j.procs.2019.11.227
Tao, Hai, Md Zakirul Alam Bhuiyan, Md Arafatur Rahman, Guojun Wang, Tian Wang, Md Manjur Ahmed, and others, ‘Economic Perspective Analysis of Protecting Big Data Security and Privacy’, Future Generation Computer Systems, 98 (2019), 660–71 https://doi.org/10.1016/j.future.2019.03.042
Tepperman, Alex, and Jay Rickabaugh, ‘Historical Criminology, a Moving Target: Understanding and Challenging Trends in British and American Periodization’, Journal of Criminal Justice, March, 2022, 101978 https://doi.org/10.1016/j.jcrimjus.2022.101978
Ubowska, Agnieszka, and Tomasz Królikowski, ‘Building a Cybersecurity Culture of Public Administration System in Poland’, Procedia Computer Science, 207 (2022), 1242–50 https://doi.org/10.1016/j.procs.2022.09.180
Wang, Shaun S., ‘Integrated Framework for Information Security Investment and Cyber Insurance’, Pacific Basin Finance Journal, 57.July (2019), 101173 https://doi.org/10.1016/j.pacfin.2019.101173
Wang, Victoria, Harrison Nnaji, and Jeyong Jung, ‘Internet Banking in Nigeria: Cyber Security Breaches, Practices and Capability’, International Journal of Law, Crime and Justice, 62.May (2020), 100415 https://doi.org/10.1016/j.ijlcj.2020.100415
Weismann, Miriam F., ‘Regulating Unlawful Behavior in the Global Business Environment: The Functional Integration of Sovereignty and Multilateralism’, Journal of World Business, 45.3 (2010), 312–21 https://doi.org/10.1016/j.jwb.2009.12.002
Weulen, Marleen, Jean-louis Van Gelder, Ard J Barends, and Reinout E De Vries, ‘Computers in Human Behavior Is There a Cybercriminal Personality ? Comparing Cyber Offenders and Offline Offenders on HEXACO Personality Domains and Their Underlying Facets’, Computers in Human Behavior, 140.November 2022 (2023), 107576 https://doi.org/10.1016/j.chb.2022.107576
Yang, Fan, and Jiao Feng, ‘Rules of Electronic Data in Criminal Cases in China’, International Journal of Law, Crime and Justice, 64.December 2020 (2021), 100453 https://doi.org/10.1016/j.ijlcj.2020.100453
Yuryna Connolly, Alena, and Hervé Borrion, ‘Reducing Ransomware Crime: Analysis of Victims’ Payment Decisions’, Computers and Security, 119 (2022), 102760 https://doi.org/10.1016/j.cose.2022.102760
Zhao, Jihong Solomon, and Yan Zhang, ‘Proactive Policing Embedded in Two Models: A Geospatial Analysis of Proactive Activities by Patrol Officers and COP Officers’, Journal of Criminal Justice, 82.May (2022), 101972 https://doi.org/10.1016/j.jcrimjus.2022.101972
DOI: https://doi.org/10.20961/bestuur.v10i2.64498
Refbacks
- There are currently no refbacks.
Copyright (c) 2022 Agus Raharjo, Rahadi Wasi Bintoro, Nurani Ajeng Tri Utami
This work is licensed under a Creative Commons Attribution 4.0 International License.
|