Gema
Jurnal Ilmiah Gema diterbitkan dua kali setahun, pada bulan Februari dan Agustus, oleh Universitas Islam Batik Surakarta. Jurnal Gema bertujuan untuk mepublikasikan hasil penelitian Dosen maupun peneliti. Jurnal Ilmiah Gema menyambut baik makalah dengan tujuan dan ruang lingkup di atas. Redaksi memutuskan makalah yang akan diterbitkan di GEMA setelah direview oleh reviewer yang ditunjuk (double blind review). Penulis akan diberitahu tentang komentar dan saran pengulas. Jurnal Gema (E-ISSN 2443-0013, P-ISSN.0215-3092) adalah Jurnal Akses Terbuka, yang bebas diakses dan dibaca di Internet.
Articles
89 Documents
Search results for
, from
"1992"
:
89 Documents
clear
PENGEMBANGAN E-MODUL BERBASIS CREATIVE PROBLEM SOLVING (CPS) UNTUK MENINGKATKAN KETERAMPILAN BERPIKIR KREATIF SISWA PADA PEMBELAJARAN MIPA
Aldeva Ilhami;
Niki Dian Permana P;
Anggitri febriani
GEMA Vol 35 No 01 (2023): GEMA
Publisher : LP3M
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Penelitian ini dilakukan dalam rangka menganalisis literature terkait dengan pengembangan E-Modul berbasis creative problem solving (cps) untuk meningkatkan keterampilan berpikir kreatif siswa. Tujuan dari penelitian ini yaitu untuk menyeleksi artikel yang layak untuk dianalisis terkait pengembangan E-Modul berbasis creative problem solving (cps) untuk meningkatkan keterampilan berpikir kreatif siswa. Manfaat dari penelitian ini yaitu untuk memudahkan peneliti dalam memperoleh literature yang layak untuk dianalisis terkait dengan judul penelitian yang akan dilakukan oleh peneliti. Metode dari penelitian ini yaitu menggunakan metode Systematic literatur review (SLR) yaitu metode yang memiliki langkah-langkah yaitu yang terdiri dari identification, screening, eligibility dan included. Kesimpulan dari penelitian ini yaitu metode systematic literature review (SLR) yang bertujuan untuk memudahkan peneliti dalam melakukan penelitiannya yang hasil penelitiannya didasarkan pada hasil analisis literature yang telah di seleksi secara bertahap melalui beberapa prosedur yang sistematis. Berdasarkan hasil dari metode systematic literature review (SLR) yang telah dilakukan oleh peneliti diperoleh sebanyak 12 literature yang layak untuk dianalisis. Hasil dari metode systematic literature review (SLR) yang telah dilakukan untuk menyeleksi beberapa literature maka jumlah total dari literature yang dikeluarkan atau tidak layak untuk dianalisis yaitu sebanyak 1068 literature.
PERSPEKTIF HUKUM SIBER DI INDONESIA: PENANGANAN KASUS CYBER TERHADAP TANDA TANGAN ELEKTRONIK
Aas Rohmat;
Ismiyanto;
Muhammad Muhtarom
GEMA Vol 34 No 02 (2022): GEMA
Publisher : LP3M
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
In the era of globalization, society 5.0 technology, followed by the development of information technology in cyber space, is something that cannot be avoided. This is followed by the vulnerability of threats and attacks on data and information traffic that can threaten state sovereignty. The security factor is the main obstacle in line with the increasing level of crime in cyberspace in Indonesia. The purpose of this study is the Perspective of Cyber Law in Indonesia: Handling Cyber Cases Against Electronic Signatures. The research method used in this research is descriptive. The type of research that the author uses is normative legal research or known as doctrinal legal research which is commonly referred to as legal research or legal research instructions. This legal research examines library material obtained through literature review by collecting and studying primary and secondary legal materials in the form of laws and literature that are relevant to the research object. The approaches used in this legal research are statutory and contextual approaches. The analysis used is descriptive, namely to describe or explain the phenomenon under study. The analysis is carried out by linking causes and effects to the emergence of the phenomenon under study. The findings in this study are that the perspective of cyber law in Indonesia in handling cyber cases against data theft or threats related to electronic signatures is very important to be immediately normalized.
KEBIJAKAN PENANGGULANGAN KEJAHATAN TINDAK PIDANA TEKNOLOGI INFORMASI
Andhika Abdillah;
Muhammad Muhtarom;
Ismiyanto
GEMA Vol 34 No 02 (2022): GEMA
Publisher : LP3M
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Advances in science and technology have had a very positive impact on human civilization. One of the phenomena of the modern century which is still growing rapidly is the internet. The rapid development of technology requires legal arrangements related to the use of this technology. Unfortunately, until now many countries do not have specific legislation in the field of information technology, both in criminal and civil aspects. The existence of Electronic Information and/or Electronic Documents is binding and recognized as valid evidence to provide legal certainty for the Operation of Electronic Systems and Electronic Transactions, especially in evidence and matters related to legal actions carried out through Electronic Systems. In order to protect the public interest from all kinds of disturbances as a result of misuse of Electronic Information and Electronic Transactions, it is necessary to affirm the Government's role in preventing the dissemination of illegal content by taking action to terminate access to Electronic Information and/or Electronic Documents that have content that violates the law so that they cannot be accessed. from the jurisdiction of Indonesia and authority is required for investigators to request information contained in Electronic System Operators for the purposes of enforcing criminal law in the field of Information Technology and Electronic Transactions
TINDAK PIDANA PENYEBARAN ELEKTRONIK YANG BERMUATAN MELANGGAR KESUSILAAN TERHADAP WANITA DIBAWAH UMUR
Cahyorini Laksitowati;
Amir Junaidi;
Ida Aryati Dyah Purnowo Wulan
GEMA Vol 34 No 02 (2022): GEMA
Publisher : LP3M
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
One type of crime that is growing rapidly today is crime committed electronically, or what is known as cybercrime. This crime takes many forms. These crimes take many forms. The presence of Law Number 11 of 2008 concerning Information and Electronic Transactions has regulated prohibited acts related to electronic information and transactions. There are various forms of cyber crime: Computer fraud (computer fraud), Criminal acts of embezzlement, falsification of providing information via a computer that harms other parties and benefits oneself, Hacking, Criminal acts of communication, Criminal acts of destroying computer systems, either damaging data or deleting codes that cause damage and loss, criminal acts related to intellectual property rights, copyrights and patents. And from cyber crime, children and women are the most vulnerable group to cyber crime.
PENEGAKAN HUKUM CYBER CRIME DALAM UPAYA PENANGGULANGAN TINDAK PIDANA TEKNOLOGI INFORMASI
Muhammad Satrio Purnomo Wikantomo;
Ida Aryati Dyah Purnomo Wulan;
Ismiyanto
GEMA Vol 34 No 02 (2022): GEMA
Publisher : LP3M
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
This article aims to let us learn more about cyber crime. This is due to the weakness of cyberspace can become a global disaster that threatens the business sector, national and global security, behavior, child protection, and government systems. The results showed that the public is currently still misusing social media to spread crime in cyberspace. Most of the perpetrators of cybercrime on social media will be caught by Law No.11 of 2008 concerning Electronic Information and Transactions (UU ITE), whether intentional or unintentional. The law should provide protection for internet users with good intentions, and provide firm action for perpetrators of cyber crime. However, the legal system has not solved all computer crimes over the Internet. Likewise in the investigation, there were many obstacles related to legal instruments, the ability of investigators, evidence, and computer forensic facilities. This is why cyber crime law enforcement is still weak
TINDAK PIDANA CYBER BULLYING DALAM PERSPEKTIF HUKUM PIDANA DI INDONESIA
Saprudin Hamdani;
Ariy Khaerudin;
Hanuring Ayu Ardhani Putri
GEMA Vol 34 No 02 (2022): GEMA
Publisher : LP3M
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Information technology is one of the most rapidly developing needs in this modern era. As a result of these developments, information technology gradually changes the behavior of people and human civilization globally. The development of this technology also has an impact in the world of crime, namely the existence of a type of humiliation that is insulted through cyberspace called Cyber Bullying. This study aims to determine the regulation of cyber bullying in terms of the Criminal Code and outside the Criminal Code. This study uses a normative juridical research method with a statutory approach and a conceptual approach. The results of the writing of this journal show that the regulation of cyber bullying in terms of the Criminal Code can be seen in Article 315 of the Criminal Law Code because the cyber bullying crime fulfills both the subjective and objective elements contained in the article. Furthermore, the regulation of cyber bullying outside the Criminal Code Act is contained in Article 27 Paragraph (3) of Law No. 19 of 2016 concerning Amendments to Law Number 11 of 2008 concerning Information and Electronic Transactions because it explains in the article regarding insults committed through computer or electronic media which are in accordance with cyber bullying which is an insult through cyberspace
MEMERANGI KEJAHATAN SIBER DI INDONESIA: ANALISIS REGULASI HUKUM PIDANA YANG BERLAKU DAN TANTANGANNYA
Andi Mohammad Agus Mustam
GEMA Vol 35 No 01 (2023): GEMA
Publisher : LP3M
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
The rapid development of information technology and digitalization in various aspects of life has not only brought positive impacts but has also given rise to a new phenomenon called cybercrime. Cybercrime is a type of criminal activity that involves the use of digital technology and the internet. Cybercrime covers a wide range of offenses, from illegal access to computer systems, theft of data and information, the spread of malware, online fraud, defamation, to violations of personal data privacy. The surge in cybercrime cases in Indonesia calls for an urgent evaluation of the current criminal law regulations. This literature review aims to examine and analyze the laws and regulations in Indonesia related to criminal offenses in cyberspace and the extent of their effective implementation. The primary regulations that are the focus of the analysis include the Electronic Information and Transactions Law along with its amendments, as well as the latest 2019 Draft Criminal Code that contains new provisions on cybercrime.
TINJAUAN YURIDIS TERHADAP PERLINDUNGAN ANAK DALAM RUANG SIBER DI INDONESIA
Mekar Satria Utama
GEMA Vol 35 No 01 (2023): GEMA
Publisher : LP3M
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
This article aims to provide a juridical review of child protection in the cyberspace in Indonesia. The research employs a juridical-empirical method by analyzing the legal framework governing child protection in the cyberspace in Indonesia, involving empirical elements to assess the effectiveness and implementation of child protection policies. The results of this study indicate that the concept of shared responsibility among stakeholders, as applied in Law Number 23 of 2003 concerning Child Protection, serves as a relevant foundation. However, to achieve optimal child protection in cyberspace, the implementation of a holistic multi-aspect approach is required, and collaboration between the government, society, parents, and the private sector is crucial to effectively address and mitigate threats in the cyber world.
PENANGGULANGAN TINDAK PIDANA SIBER BERDASARKAN UNDANG-UNDANG INFORMASI DAN TRANSAKSI ELEKTRONIK
Rudy Gunawan Bastari
GEMA Vol 35 No 01 (2023): GEMA
Publisher : LP3M
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
This research aims to explore and understand the law enforcement processes in addressing cybercrime in Indonesia. The research methodology combines juridical and empirical approaches by analyzing the content of the Electronic Information and Transactions Law (UU ITE) and involving the analysis of current data related to cybercrime, public responses, and the effectiveness of law enforcement. The research results provide an overview of the challenges faced in the efforts to enforce the law against cybercrime, including the lack of legal and moral awareness in society. Additionally, this research also aims to design and propose efforts to combat cybercrime in Indonesia in the future. This identification opens the door for regulatory updates and comprehensive legal awareness improvements to strengthen the efforts against cybercrime in the future.
PERLINDUNGAN HUKUM TERHADAP KORBAN TINDAK PIDANA CYBER CRIME DI INDONESIA
Yunus Darmono
GEMA Vol 35 No 01 (2023): GEMA
Publisher : LP3M
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
The field of technology is currently experiencing very rapid development and progress. It can be seen that one form of progress in the field of technology is the internet. The increasing development of the internet has had many positive impacts on its users, such as the internet making it easier to carry out long distance communications, ease of doing business, ease of obtaining information, and much more. However, apart from that, the development of the internet also has a negative impact which can lead to crime. This crime is known as cyber crime. Therefore, there is a need for legal protection for victims of cyber crime. The type of research used is library research with emphasis on sources of information from books, journals, papers and various literature. The data source used is a secondary data source.