TINJAUAN KRIMINOLOGI MEMASUKI ATAU MENYUSUP KEDALAM SUATU JARINGAN KOMPUTER SECARA TIDAK SAH MENURUT UU NO.11 TAHUN 2008 TENTANG INFORMASI DAN TRANSAKSI ELEKTRONIK
Main Article Content
Abstract
This research has an information technology background that plays an important role in human life both in the present and in the future. The internet can penetrate the boundaries between countries and accelerate the spread and exchange of knowledge both among scientists or scholars throughout the world. Behind the ease of use of the internet, there is a dark side that worries the users, namely in terms of security. Public and global internet networks are very vulnerable to various forms of crime. The actions taken by the government to overcome in terms of reducing crime activities enter or infiltrate into a computer network illegally is the issuance of Law NO.11 of 2008 concerning Information and Information Transactions can be interpreted as a crime committed by a person or group of people with the intention of taking the advantage of others through a computer network. This study uses legal normative juridical research. The purpose of this study was to find out how the modus operandi and how prevention efforts enter or infiltrate into a computer network illegally. The mode is carried out with the intention of sabotage or theft of important and confidential information. Criminology review aims to investigate the widest possible crime symptoms. crime as needed prevention efforts are preventive (prevention) before the crime occurs and (eradication) after the crime has occurred is (refresive).
Article Details
Authors who publish their manuscripts through the Journal of Information Systems and Computer Science agree to the following:
- Copyright to the manuscripts of scientific papers in this Journal is held by the author.
- The author surrenders the rights when first publishing the manuscript of his scientific work and simultaneously the author grants permission / license by referring to the Creative Commons Attribution-ShareAlike 4.0 International License to other parties to distribute his scientific work while still giving credit to the author and the Journal of Information Systems and Computer Science as the first publication medium for the work.
- Matters relating to the non-exclusivity of the distribution of the Journal that publishes the author's scientific work can be agreed separately (for example: requests to place the work in the library of an institution or publish it as a book) with the author as one of the parties to the agreement and with credit to sJournal of Information Systems and Computer Science as the first publication medium for the work in question.
- Authors can and are expected to publish their work online (e.g. in a Repository or on their Organization's/Institution's website) before and during the manuscript submission process, as such efforts can increase citation exchange earlier and with a wider scope.