MODUS OPERANDI TINDAK PIDANA CRACKER MENURUT UNDANG-UNDANG INFORMASI DAN TRANSAKSI ELEKTRONIK
Journal: Perspektif (Vol.17, No. 2)Publication Date: 2012-05-27
Authors : Nur Khalimatus Sa'diyah;
Page : 78-89
Keywords : modus operandi; cracker; Undang-Undang Informasi dan Transaksi Elektronik; modus operandi; cracker; cracking; ITE Law;
Abstract
This legal research based on the fact that information technology plays an important role in human being nowadays and also in the future. The implication of the massive information technology development brings different behavior to some people. By the presence of the internet, it makes human being life become easier. Internet could definetely access data over countries, and could also be useful in knowledge exchange among scientists or scholars around the world. However, eventhough internet is ease of use, there are some risk which could harm the user, especially from the safety aspect. Thats why the safety of the internet based computer system security must be considered. Because the character of internet network is global public open access, it makes internet network become very vulnerable from any cyber crimes, especially cracking crime. Cracking is the activity while cracker is the person who done the cracking activity over the internet network. The effects of this crime are very harmful, such as broken network, broken website, and even worse, data loss. Because the cracker's modus operandi is definetely different from other conventional crime, and the most prominent difference is the locus delicti (place where the crime happened), because tracking the internet network is not easy. Therefore by knowing the cracker's modus operandi, it will be easier to resolve the cracking cases.
Other Latest Articles
- TINJAUAN PERTANGGUNGJAWABAN PIDANA WAJIB PAJAK BADAN DALAM TINDAK PIDANA DI BIDANG PERPAJAKAN
- JUAL-BELI TANAH HAK MILIK YANG BERTANDA BUKTI PETUK PAJAK BUMI (KUTIPAN LETTER C)
- SUPPLY CHAIN MANAGEMENT OF POMEGRANATE IN CHITRADURGA DISTRICT OF KARNATAKA
- A Literature Review on Structural Properties of Different Types of Robots
- Neural Cryptography for Secret Key Exchange
Last modified: 2017-03-25 21:56:25