The Legal Policy of Criminal Justice Bureaucracy Cybercrime

Agus Raharjo, Rahadi Wasi Bintoro, Nurani Ajeng Tri Utami

Abstract


Cybercrime has resulted in astronomical losses for the business community. However, the reactive policy model must be more effective at preventing cybercrime, and the due process model is also inappropriate for combating cybercrime with a high level of speed and mobility. This study is normative legal research employing a conceptual strategy and case studies. The results indicate that the reactive model must be improved in order to prevent cybercrime. The model of due process is not appropriate for deterring cybercrime with a high degree of speed and mobility. The preventative law enforcement strategy is effective, but it requires a high level of law enforcement capability to detect and disable cybercrime, which is something that few Indonesian law enforcement officials possess. Prevention based on the user, which places responsibility on internet users, is fine for individuals but not for businesses. Based on collaboration between corporations, universities, civic society, and non-governmental groups, the collaborative model synthesizes the aforementioned paradigms. Because they are based on plans or roadmaps created by internet stakeholders, regulations, technical aspects, and law enforcement may be effectively implemented and developed.


Keywords


Bureaucracy; Cybercrime; Policy.

Full Text:

PDF
rticle

References


Altikriti, Sultan, Joseph L. Nedelec, and J.C. Barnes, ‘The Influence of Individual Differences on the Formation of Perceptions of Risk, Social Cost, and Rewards of Crime: A Meta-Analysis’, Journal of Criminal Justice, 82.April (2022), 101962 https://doi.org/10.1016/j.jcrimjus.2022.101962

Antonescu, Mihail, and Ramona Birău, ‘Financial and Non-Financial Implications of Cybercrimes in Emerging Countries’, Procedia Economics and Finance, 32.15 (2015), 618–21 https://doi.org/10.1016/s2212-5671(15)01440-9

Apau, Richard, and Felix N. Koranteng, ‘An Overview of the Digital Forensic Investigation Infrastructure of Ghana’, Forensic Science International: Synergy, 2 (2020), 299–309 https://doi.org/10.1016/j.fsisyn.2020.10.002

Ariffin, Khairul Akram Zainol, and Faris Hanif Ahmad, ‘Indicators for Maturity and Readiness for Digital Forensic Investigation in Era of Industrial Revolution 4.0’, Computers and Security, 105 (2021), 102237 https://doi.org/10.1016/j.cose.2021.102237

Atagamen, Paul, Oluwaseye Oluwayomi, and Alade Adeniyi, ‘Legality of EndSARS Protest : A Quest for Democracy in Nigeria’, Journal of Human Rights, Culture and Legal System, 2.3 (2022), 209–24 https://doi.org/https://doi.org/10.53955/jhcls.v2i3.40

Atlam, Hany F., Ezz El-Din Hemdan, Ahmed Alenezi, Madini O. Alassafi, and Gary B. Wills, ‘Internet of Things Forensics: A Review’, Internet of Things (Netherlands), 11 (2020), 100220 https://doi.org/10.1016/j.iot.2020.100220

Ayyoub, Hani Y., Ahmad A. AlAhmad, Amani Al-Serhan, Mohammad F. Al-Abdallat, Esra’a Al-Muheisen, Hadeel Boshmaf, and others, ‘Awareness of Electronic Crimes Related to E-Learning among Students at the University of Jordan’, Heliyon, 8.10 (2022), e10897 https://doi.org/10.1016/j.heliyon.2022.e10897

Brands, Jelle, and Janne Van Doorn, ‘The Measurement, Intensity and Determinants of Fear of Cybercrime: A Systematic Review’, Computers in Human Behavior, 127 (2022), 107082 https://doi.org/10.1016/j.chb.2021.107082

Button, Mark, and Jack Whittaker, ‘Exploring the Voluntary Response to Cyber-Fraud: From Vigilantism to Responsibilisation’, International Journal of Law, Crime and Justice, 66.January (2021), 100482 https://doi.org/10.1016/j.ijlcj.2021.100482

Chong, Henry, ‘SeCBD: The Application Idea from Study Evaluation of Ransomware Attack Method in Big Data Architecture’, Procedia Computer Science, 116 (2017), 358–64 https://doi.org/10.1016/j.procs.2017.10.065

Christianto, Hwian, ‘Measuring Cyber Pornography Based on Indonesian Living Law: A Study of Current Law Finding Method’, International Journal of Law, Crime and Justice, 60.November 2019 (2020), 100348 https://doi.org/10.1016/j.ijlcj.2019.100348

Ćmiel, Sylwia, ‘Cyberbullying Legislation in Poland and Selected EU Countries’, Procedia - Social and Behavioral Sciences, 109 (2014), 29–34 https://doi.org/10.1016/j.sbspro.2013.12.416

Connolly, Eric J., Joseph A. Schwartz, and Kristina Block, ‘The Role of Poor Sleep on the Development of Self-Control and Antisocial Behavior from Adolescence to Adulthood’, Journal of Criminal Justice, 82.September (2022), 101995 https://doi.org/10.1016/j.jcrimjus.2022.101995

Corbet, Shaen, and Constantin Gurdgiev, ‘What the Hack: Systematic Risk Contagion from Cyber Events’, International Review of Financial Analysis, 65.January (2019), 101386 https://doi.org/10.1016/j.irfa.2019.101386

Drewer, Daniel, and Vesela Miladinova, ‘The BIG DATA Challenge: Impact and Opportunity of Large Quantities of Information under the Europol Regulation’, Computer Law and Security Review, 33.3 (2017), 298–308 https://doi.org/10.1016/j.clsr.2017.03.006

Dupont, Benoit, and Thomas J. Holt, ‘Advancing Research on the Human Factor in Cybercrime’, Computers in Human Behavior, 138.August 2022 (2022), 2022–24 https://doi.org/10.1016/j.chb.2022.107410

Ferdik, Frank, George Frogge, and Mikaela Cooney, ‘Exploring Further Determinants of Citizen Satisfaction with the Police: The Role of Strain’, Journal of Criminal Justice, 81.May (2022), 101931 https://doi.org/10.1016/j.jcrimjus.2022.101931

Frith, Michael J., Kate J. Bowers, and Shane D. Johnson, ‘Household Occupancy and Burglary: A Case Study Using COVID-19 Restrictions’, Journal of Criminal Justice, 82.April (2022), 101996 https://doi.org/10.1016/j.jcrimjus.2022.101996

Gruber, Jan, Lena L. Voigt, Zinaida Benenson, and Felix C. Freiling, ‘Foundations of Cybercriminalistics: From General Process Models to Case-Specific Concretizations in Cybercrime Investigations’, Forensic Science International: Digital Investigation, 43 (2022), 301438 https://doi.org/10.1016/j.fsidi.2022.301438

Holt, Thomas J., ‘Understanding the State of Criminological Scholarship on Cybercrimes’, Computers in Human Behavior, 139.August 2022 (2023), 107493 https://doi.org/10.1016/j.chb.2022.107493

Huff-Corzine, Lin, and Kayla Toohy, ‘The Life and Scholarship of Pauline Tarnowsky: Criminology’s Mother’, Journal of Criminal Justice, January, 2022, 101986 https://doi.org/10.1016/j.jcrimjus.2022.101986

Iqra, Moh, Syabani Korompot, and Al-fatih David, ‘The Principle of Equality Before the Law in Indonesian Corruption Case : Is It Relevant ?’, Journal of Human Rights, Culture and Legal System, 1.3 (2021), 135–46 https://doi.org/10.53955/jhcls.v1i3.13

Jaelani, Abdul Kadir, and Resti Dian Luthviati, ‘The Crime Of Damage After the Constitutional Court ’ s Decision Number 76 / PUU-XV / 2017’, Journal of Human Rights, Culture and Legal System, 1.1 (2021), 31–41 https://doi.org/https://doi.org/10.53955/jhcls.v1i1.5

Kamerer, Jessica L., and Donna McDermott, ‘Cybersecurity: Nurses on the Front Line of Prevention and Education’, Journal of Nursing Regulation, 10.4 (2020), 48–53 https://doi.org/10.1016/S2155-8256(20)30014-4

Karagiannopoulos, Dr Vasileios, Dr Annie Kirby, Shakiba Oftadeh-Moghadam, and Dr Lisa Sugiura, ‘Cybercrime Awareness and Victimisation in Individuals over 60 Years: A Portsmouth Case Study’, Computer Law and Security Review, 43 (2021), 105615 https://doi.org/10.1016/j.clsr.2021.105615

Karim, Sitara, Brian M. Lucey, Muhammad Abubakr Naeem, and Samuel A. Vigne, ‘The Dark Side of Bitcoin: Do Emerging Asian Islamic Markets Help Subdue the Ethical Risk?’, Emerging Markets Review, January, 2022, 100921 https://doi.org/10.1016/j.ememar.2022.100921

Kim, Karl, ‘Dispatches from the Field: The 2022 United Nations Global Platform for Disaster Risk Reduction in Bali, Indonesia’, Transportation Research Interdisciplinary Perspectives, 15.June (2022), 100644 https://doi.org/10.1016/j.trip.2022.100644

Kusuma, Bambang Ali, ‘Establishment of Indonesian Maritime Power: Regulation of Transnational Organized Crime on Illegal, Unreported, and Unregulated (IIU) Fishing’, International Journal of Criminal Justice Sciences, 16.2 (2021), 251–66 https://doi.org/10.1016/j.avb.2012.10.005

Lee, In, ‘Cybersecurity: Risk Management Framework and Investment Cost Analysis’, Business Horizons, 64.5 (2021), 659–71 https://doi.org/10.1016/j.bushor.2021.02.022

Malecki, Edward J., ‘Real People, Virtual Places, and the Spaces in Between’, Socio-Economic Planning Sciences, 58 (2017), 3–12 https://doi.org/10.1016/j.seps.2016.10.008

Marwan, Awaludin, and Fiammetta Bonfigli, ‘Detection of Digital Law Issues and Implication for Good Governance Policy in Indonesia’, Bestuur, 10.1 (2022), 22–32 https://doi.org/https://doi.org/10.20961/bestuur.v10i1.59143

McCormack, Lynne, and Brendan Lowe, ‘Making Meaning of Irreconcilable Destruction of Innocence: National Humanitarian Professionals Exposed to Cybercrime Child Sexual Exploitation in the Philippines’, Child Abuse and Neglect, 131.September 2021 (2022), 105770 https://doi.org/10.1016/j.chiabu.2022.105770

Michaud, Patrick, Eric Beauregard, and Jean Proulx, ‘Criminal Nomadism: A Neglected Dimension of Spatial Mobility in Sex Offending’, Journal of Criminal Justice, 81.May (2022), 101928 https://doi.org/10.1016/j.jcrimjus.2022.101928

Mishra, Alok, Yehia Ibrahim Alzoubi, Memoona Javeria Anwar, and Asif Qumer Gill, ‘Attributes Impacting Cybersecurity Policy Development: An Evidence from Seven Nations’, Computers and Security, 120 (2022) https://doi.org/10.1016/j.cose.2022.102820

Mochtar, Zainal Arifin, and Kardiansyah Afkar, ‘President’s Power, Transition, and Good Governance’, Bestuur, 10.1 (2022), 68–83 https://doi.org/https://dx.doi.org/10.20961/bestuur.v10i1.59098

Nguyen, Dr Chat Le, and Dr Wilfred Golman, ‘Diffusion of the Budapest Convention on Cybercrime and the Development of Cybercrime Legislation in Pacific Island Countries: “Law on the Books” vs “Law in Action”’, Computer Law and Security Review, 40.June 2020 (2021), 105521 https://doi.org/10.1016/j.clsr.2020.105521

Olukoya, Oluwafemi, ‘Assessing Frameworks for Eliciting Privacy & Security Requirements from Laws and Regulations’, Computers and Security, 117 (2022), 102697 https://doi.org/10.1016/j.cose.2022.102697

Palmieri, Michael, Neil Shortland, and Presley McGarry, ‘Personality and Online Deviance: The Role of Reinforcement Sensitivity Theory in Cybercrime’, Computers in Human Behavior, 120.October 2020 (2021), 106745 https://doi.org/10.1016/j.chb.2021.106745

Prakasa, Satria, U.W., ‘Reduce Corruption in Public Procurement: The Effort Towards Good Governance’, Bestuur, 10.1 (2022), 33–42 https://doi.org/https://doi.org/10.20961/bestuur.v10i1.51339

Prasetiyo, Wibowo Heru, Noor Banu Mahadir Naidu, Beti Indah Sari, Rochman Hadi Mustofa, Naillysa Rahmawati, Gilang Pambudi Adi Wijaya, and others, ‘Survey Data of Internet Skills, Internet Attitudes, Computer Self-Efficacy, and Digital Citizenship among Students in Indonesia’, Data in Brief, 39 (2021) https://doi.org/10.1016/j.dib.2021.107569

Raharjo, Agus, ‘Law as Artificial Intelligence Products’, Advances in Social Science, Education and Humanities Research, Volume 358 3rd International Conference on Globalization of Law and Local Wisdom (ICGLOW 2019) Law, 358.Icglow (2019), 389–93 https://doi.org/10.2991/icglow-19.2019.93

———, ‘Prevention of Cybercrime through the Development of Criminal Responsibility Principles for Internet Users’, Jurnal Dinamika Hukum, 21.3 (2015), 499–511 https://doi.org/10.20884/1.jdh.2021.21.3.3256.This

Saputra, Rian, M Zaid, and Silaas Oghenemaro, ‘The Court Online Content Moderation : A Constitutional Framework’, Journal of Human Rights, Culture and Legal System, 2.3 (2022), 139–48 https://doi.org/https://doi.org/10.53955/jhcls.v2i3.54

Setyowati, Milla Sepliana, Niken Desila Utami, Arfah Habib Saragih, and Adang Hendrawan, ‘Strategic Factors in Implementing Blockchain Technology in Indonesia’s Value-Added Tax System’, Technology in Society, 72.November 2022 (2022), 102169 https://doi.org/10.1016/j.techsoc.2022.102169

Singh, Manmeet Mahinderjit, and Anizah Abu Bakar, ‘A Systemic Cybercrime Stakeholders Architectural Model’, Procedia Computer Science, 161 (2019), 1147–55 https://doi.org/10.1016/j.procs.2019.11.227

Tao, Hai, Md Zakirul Alam Bhuiyan, Md Arafatur Rahman, Guojun Wang, Tian Wang, Md Manjur Ahmed, and others, ‘Economic Perspective Analysis of Protecting Big Data Security and Privacy’, Future Generation Computer Systems, 98 (2019), 660–71 https://doi.org/10.1016/j.future.2019.03.042

Tepperman, Alex, and Jay Rickabaugh, ‘Historical Criminology, a Moving Target: Understanding and Challenging Trends in British and American Periodization’, Journal of Criminal Justice, March, 2022, 101978 https://doi.org/10.1016/j.jcrimjus.2022.101978

Ubowska, Agnieszka, and Tomasz Królikowski, ‘Building a Cybersecurity Culture of Public Administration System in Poland’, Procedia Computer Science, 207 (2022), 1242–50 https://doi.org/10.1016/j.procs.2022.09.180

Wang, Shaun S., ‘Integrated Framework for Information Security Investment and Cyber Insurance’, Pacific Basin Finance Journal, 57.July (2019), 101173 https://doi.org/10.1016/j.pacfin.2019.101173

Wang, Victoria, Harrison Nnaji, and Jeyong Jung, ‘Internet Banking in Nigeria: Cyber Security Breaches, Practices and Capability’, International Journal of Law, Crime and Justice, 62.May (2020), 100415 https://doi.org/10.1016/j.ijlcj.2020.100415

Weismann, Miriam F., ‘Regulating Unlawful Behavior in the Global Business Environment: The Functional Integration of Sovereignty and Multilateralism’, Journal of World Business, 45.3 (2010), 312–21 https://doi.org/10.1016/j.jwb.2009.12.002

Weulen, Marleen, Jean-louis Van Gelder, Ard J Barends, and Reinout E De Vries, ‘Computers in Human Behavior Is There a Cybercriminal Personality ? Comparing Cyber Offenders and Offline Offenders on HEXACO Personality Domains and Their Underlying Facets’, Computers in Human Behavior, 140.November 2022 (2023), 107576 https://doi.org/10.1016/j.chb.2022.107576

Yang, Fan, and Jiao Feng, ‘Rules of Electronic Data in Criminal Cases in China’, International Journal of Law, Crime and Justice, 64.December 2020 (2021), 100453 https://doi.org/10.1016/j.ijlcj.2020.100453

Yuryna Connolly, Alena, and Hervé Borrion, ‘Reducing Ransomware Crime: Analysis of Victims’ Payment Decisions’, Computers and Security, 119 (2022), 102760 https://doi.org/10.1016/j.cose.2022.102760

Zhao, Jihong Solomon, and Yan Zhang, ‘Proactive Policing Embedded in Two Models: A Geospatial Analysis of Proactive Activities by Patrol Officers and COP Officers’, Journal of Criminal Justice, 82.May (2022), 101972 https://doi.org/10.1016/j.jcrimjus.2022.101972




DOI: https://doi.org/10.20961/bestuur.v10i2.64498

Refbacks

  • There are currently no refbacks.


Copyright (c) 2022 Agus Raharjo, Rahadi Wasi Bintoro, Nurani Ajeng Tri Utami

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.


  

Bestuur
Print ISSN:  2302-3783
Online ISSN: 2722-4708
Website: https://jurnal.uns.ac.id/bestuur/index
Email: bestuur_journaleditorial@mail.uns.ac.id cc to bestuurlaw@gmail.com
Published by: Universitas Sebelas Maret
Office: Department of Administrative, Faculty of Law, Universitas Sebelas Maret
Ir. Sutami Street, No. 36A, Surakarta, Jawa Tengah 57126- Phone 0271-642595