Cyber Crime Triangle Approach to Encounter Cybercrime
Abstract
This study anlyze and discuss problem in encounter of cyber crime using crime triangle approach. crime triangle approach is necessary in order to understanding cyber crime from characteristics of crime and offender. This study use qualitative methode that based on non numeric data e.g article and picture. The data filtern and interpreted by understanding the literature. Result of this study explain that there are there element that can be used in order to cyber crime analysis, there are system, provider, and law enforcer. This three element is key factor that can interfere, prevent cracker to commit crime and protect potential victim, and create safe and protected cyber environment. Recomendation of this study law enforcer must be strengthened by creating regualtion that can protect the user of cyber space. This is essential to minimize the number of data theft in the future.
Keywords
Full Text:
PDFReferences
Anonymous. (2002). The Difference Between Hackers and Crackers. In Anonymous, Maximum Security. Que.
Bo'do, S., et al. (2019). Social Media, Public Sphere and Movement Discussion of Urban Farming in Indonesia. Budapest International Research and Critics Institute-Journal (BIRCI-Journal). P. 250-261.
Creswell, J. W. (2003). Research Design Qualitative, Quantitative, and Mix Methods Approaches (2nd ed). California: Sage Publishing.
Fourkas, V. (2004). What is Cyberspace. Media Development.
Gordon, S., & Ford, R. (2006). on the definition and classification of cybercrime. Journal of Computer Virology, 13-20.
Krone, T. (2005). High Tech crime brief. Canberra: Austria Institute of Criminology.
Madensen, T. (2010). Eck, John E: Places and The Crime Triangle. Thousand Oaks: Encyclopedia of Criminological Theory.
Maulani. (2018, February 20). Internet penetration in Indonesia reaches 143M people: APJII ReportE. Retrieved from E27: https://e27.co/internet-user-penetration-indonesia-reaches-143m-people-report-20180220/
McMurdie, C. (2017, August 21). Cybercrime: Cheap to commit and Expensive to Defend. Retrieved from Knect365: https://knect365.com/superreturn/article/44f8a805-4757-4659-a3bb-461cdde190bd/cyber-crime-cheap-to-commit-and-expensive-to-defend
Methmali, S. (2016). Perception of Internet usage and its impact on cyber-crime in Sri Lanka. International Conference on Signal Processing, Communication, Power, and Embedded System (pp. 674-690). paralakhemundi: Centurion University.
Satriawan, I. (2019, March 18). Ternyata Ini Alasan Sulitnya Bawa Kasus Pencurian Data ke Pengadilan di Indonesia. Retrieved from Bangkapos.com: http://bangka.tribunnews.com/2019/03/18/ternyata-ini-alasan-sulitnya-bawa-kasus-pencurian-data-ke-pengadilan-di-indonesia
Sukmana, Y. (2019, May 13). Data Pribadi Dijual Bebas, dari Gaji hingga Info Kemampuan Finansial. Retrieved from Kompas.Com: https://money.kompas.com/read/2019/05/13/081753626/data-pribadi-dijual-bebas-dari-gaji-hingga-info-kemampuan-finansial?page=all
United Nation. (1995). United Nation: The United Nation manual on the prevention and control of computer related crime. International Review of Criminal Policy.
Wardani, A. S. (2018, Oktober 12). 4,5 Miliar Data Dicuri Selama 6 Bulan Pertama 2018. Retrieved from Liputan 6: https://www.liputan6.com/tekno/read/3665291/45-miliar-data-dicuri-selama-6-bulan-pertama-2018
Zeviar, G. (1998). The State of The Law on Cyberjurisdiction and Cybercrime on the Internet. Gonzaga Journal of Internasional Law.
DOI: https://doi.org/10.33258/birci.v4i2.1859
Article Metrics
Abstract view : 226 timesPDF - 230 times
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.