ANCAMAN CYBERCRIME DI INDONESIA

Sebuah Tinjauan Pustaka Sistematis

  • Rian Dwi Hapsari Institut Pemerintahan Dalam Negeri
  • Kuncoro Galih Pambayun Institut Pemerintahan Dalam Negeri
##plugins.pubIds.doi.readerDisplayName##: https://doi.org/10.33701/jk.v5i1.3208

Abstract

 

Abstract

The advancement of digital technology has significantly increased the threat of cybercrime, leading to issues such as identity theft, job loss, and disruptions to critical infrastructure. Meanwhile, cybercriminals continue to develop new techniques and strategies in committing their criminal acts. The purpose to describe the extent of cybercrime threats in Indonesia. This study employs a literature review method, which involves examining and analyzing literature related to cybercrime in Indonesia. The findings indicate that there has been an evolution in publications concerning cybercrime in Indonesia, shifting from an initial focus on understanding and regulations to a greater emphasis on technology, emerging threats, and their impact on various aspects of life and business. Common cyber threats in Indonesia include malware attacks, denial of service (DoS), distributed denial of service (DDoS), and phishing. These threats are often exacerbated by a lack of awareness and education about cybersecurity and limited enforcement of cybercrime laws. In conclusion, cybercrime threats in Indonesia are currently considered serious and highly dangerous due to their potential to create national issues. Efforts to address this issue should include strengthening law enforcement against cybercrime and enhancing public education on protecting oneself from online threats.

Keywords: Cybercrime; Cybercrime Threats; Literature Review

Downloads

Download data is not yet available.

References

Aji, V. B. S. (2022). Tinjauan Mekanisme Pengenaan Pajak Pertambahan Nilai Atas Transaksi Digital Game Online. Jurnal Acitya Ardana, 2(1), 62–78. https://jurnal.pknstan.ac.id/index.php/JAA/article/view/1643

Akbar, M. A., & Alam, S. N. (2020). E-COMMERCE: Dasar Teori Dalam Bisnis Digital. Yayasan Kita Menulis.

Asosiasi Penyelenggara Jasa Internet Indonesia (APJII). (2022). No Title. Survei Profil Internet Indonesia 2022.

Bowker, A. (2012). The Cybercrime Handbook for Community Corrections: Managing Offender Risk in the 21st Century. Charles C Thomas Publisher.

Carr, N. (2014). The Shallows: Internet mendangkalkan cara berfikir kita. Mizan Pustaka.

Casey Rowland. (2021). How to Secure a Website from Hackers [13-Step Guide].

Center for Digital Society Fisipol UGM. (2021). The Existence of Indonesia Cyber Police: What does it mean for Us Netizens?

Chusumastuti, D. (2020). Pengaruh Pemanfaatan Media Online Terhadap Minat Berwirausaha pada Mahasiswa (Studi Kasus di Sekolah Tinggi Multi Media “MMTC” Yogyakarta). Jurnal Riset Inspirasi Manajemen Dan Kewirausahaan, 4(2), 77–85. https://ejurnal.stimi-bjm.ac.id/index.php/JRIMK/article/view/86/0

CNN Indonesia. (2017). Begini Cara Hacker Bobol Situs Tiket.com.

Direktorat Sistem Informasi dan Teknologi UNIDA. (2021). Merunut Kebocoran Data E-HAC Kemenkes, dari Kronologi hingga Hapus Aplikasi. https://www.cnnindonesia.com/teknologi/20170331145137-185-204065/begini-cara-hacker-bobol-situs-tiketcom

e-Media DPR RI. (2021). Data BPJS Kesehatan Bocor, Tanggung Jawab Siapa?

Effendi, D. R. N. (2022). Hukum Pers dan Etika Jurnalistik di Era Digital (Vol. 1). UPPM Universitas Malahayati.

Fink, A. (2019). Conducting research literature reviews: From the internet to paper. Sage publications.

Hartati, C. S., & Muhammad, A. (2023). Combating Cybercrime and Cyberterrorism in Indonesia. Jurnal Hubungan Internasional, 11(2), 45–56. https://doi.org/10.18196/jhi.v11i2.15647

Hermawansyah, A. (2022). Analisis Profil Dan Karakteristik Pengguna Media Sosial Di Indonesia.

Indrajit, R. E. (2000). Manajemen sistem informasi dan teknologi informasi. Jakarta: PT Elex Media Komputindo.

Irfan, M., Elvia, M., & Dania, S. (2023). Ancaman Cybercrime dan Peran Cybersecurity pada E-commerce: Systematic Literature Review. JURSIMA (Jurnal Sistem Informasi Dan Manajemen), 11(1), 110–121. https://ejournal.indobarunasional.ac.id/index.php/jursima/article/view/567

Kominfo. (2013). Kominfo serukan hacker Indonesia tahan serangan ke Australia.

Kominfo. (2015). Indonesia Peringkat ke-2 Dunia Kasus Kejahatan Siber.

Kominfo. (2021). Kominfo Tangani Dugaan Kebocoran Data Aplikasi E-Hac.

Kshetri, N. (2013). Cybercrime and cybersecurity in the global south. Springer.

Lestari, E. A. P. (2021). Complex Interdependence Between Indonesia-Australia Through Cybersecurity Cooperation Post Indonesia Australia Cyber War in 2013. Jurnal Hubungan Internasional UMY, 9(2).

Lynch, M. P. (2016). The internet of us: Knowing more and understanding less in the age of big data. WW Norton & Company.

Maharani, T. (2021). Kronologi dan Motif Peretasan Situs Setkab oleh Dua Remaja.

Nirvana. (2021). How to Protect & Secure Website From Hackers? (Website Protection Guide).

Nugroho, A., & Chandrawulan, A. A. (2022). Research synthesis of cybercrime laws and COVID-19 in Indonesia: lessons for developed and developing countries. Security Journal, 1–20. https://link.springer.com/article/10.1057/s41284-022-00357-y

Prabowo, W., Wibawa, S., & Azmi, F. (2020). Perlindungan Data Personal Siber di Indonesia. Padjadjaran Journal of International Relations, 1(3), 218–239. http://jurnal.unpad.ac.id/padjir/article/view/22138

Purwadi, P., & Calam, A. (2020). Sistem Pendukung Keputusan Untuk Menentukan Pemasangan Lokasi Strategis WiFi. Id Pada Telkom (Studi Kasus Pada Pemsangan WiFi. Id Di Beberapa Lokasi Medan Menggunakan Metode Oreste. Jurnal SAINTIKOM (Jurnal Sains Manajemen Informatika Dan Komputer), 19(1), 110–121. https://ojs.trigunadharma.ac.id/index.php/jis/article/view/231

Pusiknas Polri. (2022). Kejahatan Siber di Indonesia Naik Berkali-kali Lipat.

Rachmadie, D. T. (2020). Regulasi Penyimpangan Artificial Intelligence Pada Tindak Pidana Malware Berdasarkan Undang-Udang Republik Indonesia Nomor 19 Tahun 2016. RECIDIVE, 9(2), 128–156. https://jurnal.uns.ac.id/recidive/article/view/47400

Rowe, N. C. (2019). Honeypot deception tactics. Autonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation of HoneyThings, 35–45. https://www.researchgate.net/publication/330084850_Honeypot_Deception_Tactics_Reasoning_Adaptive_Planning_and_Evaluation_of_HoneyThings

Saragih, Y. M., & Siahaan, A. P. U. (2016). Cyber crime prevention strategy in Indonesia. SSRG Int. J. Humanit. Soc. Sci, 3(6), 22–26. https://www.internationaljournalssrg.org/IJHSS/2016/Volume3-Issue6/IJHSS-V3I6P106.pdf

Setiaji, H. A. (2016). Tinjauan Hukum Internasional Terhadap Kasus Hacking Sony Pictures Entertainment. Tidak Dipublikasikan). Universitas Hasanuddin.

Smith, K. T., Jones, A., Johnson, L., & Smith, L. M. (2019). Examination of cybercrime and its effects on corporate stock value. Journal of Information, Communication and Ethics in Society, 17(1), 42–60. https://www.emerald.com/insight/content/doi/10.1108/JICES-02-2018-0010/full/html

Soesanto, E., Utami, A. S., Chantica, J. A., Nabila, R. A., & Ricki, T. S. (2023). Keamanan Data Pribadi Dalam Sistem Pembayaran Via OVO Terhadap Ancaman dan Pengelabuan (Cybercrime). IJM: Indonesian Journal of Multidisciplinary, 1(2), 424–435. https://journal.csspublishing.com/index.php/ijm/article/download/154/97

Subandi, K., Sugara, V. I., & Aryani, A. S. (2023). Peningkatan Keamanan pada Simple Network Time Protocol (SNTP) untuk Mendeteksi Cybercrime di dalam Aktivitas Jaringan. Jurnal Asiimetrik: Jurnal Ilmiah Rekayasa Dan Inovasi, 93–100. https://doi.org/10.35814/asiimetrik.v5i1.4113

Susanti, S. O., & Juwono, V. (2019). Collaborative Governance: Proyek Penyelenggaraan Jaringan Tulang Punggung Serat Optik Palapa Ring di Indonesia Tahun 2016-2019. Publik (Jurnal Ilmu Administrasi), 8(1), 12–23. https://scholar.ui.ac.id/en/publications/collaborative-governance-proyek-penyelenggaraan-jaringan-tulang-p

SYAFIRA, A. (2020). Upaya Sekuritisasi Pemerintah Inggris Dalam Kebijakan Kejahatan Cyber Wannacry Tahun 2017.

Telkom. (2022). The Most Common Causes of Cyber Crime in Indonesia.

Wall, D. (2007). Cybercrime: The transformation of crime in the information age (Vol. 4). Polity.

We Are Social. (2021). No Title. Digital 2022: Another Year Of Bumper Growth.

Zittrain, J. (2008). The future of the internet--and how to stop it. Yale University Press.

Published
2023-10-26