Cyber Crime Triangle Approach to Encounter Cybercrime

Sri Sundari, Muhammad Haikal Kautsar

Abstract


This study anlyze and discuss problem in encounter of cyber crime using crime triangle approach. crime triangle approach is necessary in order to understanding cyber crime from characteristics of crime and offender. This study use qualitative methode that based on non numeric data e.g article and picture. The data filtern and interpreted by understanding the literature. Result of this study explain that there are there element that can be used in order to cyber crime analysis, there are system, provider, and law enforcer. This three element is key factor that can interfere, prevent cracker to commit crime and protect potential victim, and create safe and protected cyber environment. Recomendation of this study law enforcer must be strengthened by creating regualtion that can protect the user of cyber space. This is essential to minimize the number of data theft in the future.


Keywords


cyber crime; encounter cybercrime

Full Text:

PDF

References


Anonymous. (2002). The Difference Between Hackers and Crackers. In Anonymous, Maximum Security. Que.

Bo'do, S., et al. (2019). Social Media, Public Sphere and Movement Discussion of Urban Farming in Indonesia. Budapest International Research and Critics Institute-Journal (BIRCI-Journal). P. 250-261.

Creswell, J. W. (2003). Research Design Qualitative, Quantitative, and Mix Methods Approaches (2nd ed). California: Sage Publishing.

Fourkas, V. (2004). What is Cyberspace. Media Development.

Gordon, S., & Ford, R. (2006). on the definition and classification of cybercrime. Journal of Computer Virology, 13-20.

Krone, T. (2005). High Tech crime brief. Canberra: Austria Institute of Criminology.

Madensen, T. (2010). Eck, John E: Places and The Crime Triangle. Thousand Oaks: Encyclopedia of Criminological Theory.

Maulani. (2018, February 20). Internet penetration in Indonesia reaches 143M people: APJII ReportE. Retrieved from E27: https://e27.co/internet-user-penetration-indonesia-reaches-143m-people-report-20180220/

McMurdie, C. (2017, August 21). Cybercrime: Cheap to commit and Expensive to Defend. Retrieved from Knect365: https://knect365.com/superreturn/article/44f8a805-4757-4659-a3bb-461cdde190bd/cyber-crime-cheap-to-commit-and-expensive-to-defend

Methmali, S. (2016). Perception of Internet usage and its impact on cyber-crime in Sri Lanka. International Conference on Signal Processing, Communication, Power, and Embedded System (pp. 674-690). paralakhemundi: Centurion University.

Satriawan, I. (2019, March 18). Ternyata Ini Alasan Sulitnya Bawa Kasus Pencurian Data ke Pengadilan di Indonesia. Retrieved from Bangkapos.com: http://bangka.tribunnews.com/2019/03/18/ternyata-ini-alasan-sulitnya-bawa-kasus-pencurian-data-ke-pengadilan-di-indonesia

Sukmana, Y. (2019, May 13). Data Pribadi Dijual Bebas, dari Gaji hingga Info Kemampuan Finansial. Retrieved from Kompas.Com: https://money.kompas.com/read/2019/05/13/081753626/data-pribadi-dijual-bebas-dari-gaji-hingga-info-kemampuan-finansial?page=all

United Nation. (1995). United Nation: The United Nation manual on the prevention and control of computer related crime. International Review of Criminal Policy.

Wardani, A. S. (2018, Oktober 12). 4,5 Miliar Data Dicuri Selama 6 Bulan Pertama 2018. Retrieved from Liputan 6: https://www.liputan6.com/tekno/read/3665291/45-miliar-data-dicuri-selama-6-bulan-pertama-2018

Zeviar, G. (1998). The State of The Law on Cyberjurisdiction and Cybercrime on the Internet. Gonzaga Journal of Internasional Law.




DOI: https://doi.org/10.33258/birci.v4i2.1859

Article Metrics

Abstract view : 226 times
PDF - 230 times

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

 

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.