cover
Contact Name
suwardi
Contact Email
journal.uniba@gmail.com
Phone
+6281567862654
Journal Mail Official
journal.uniba@gmail.com
Editorial Address
Jl. Agus Salim No. 10 Surakarta
Location
Kota surakarta,
Jawa tengah
INDONESIA
Gema
ISSN : 02153092     EISSN : 24430013     DOI : -
Jurnal Ilmiah Gema diterbitkan dua kali setahun, pada bulan Februari dan Agustus, oleh Universitas Islam Batik Surakarta. Jurnal Gema bertujuan untuk mepublikasikan hasil penelitian Dosen maupun peneliti. Jurnal Ilmiah Gema menyambut baik makalah dengan tujuan dan ruang lingkup di atas. Redaksi memutuskan makalah yang akan diterbitkan di GEMA setelah direview oleh reviewer yang ditunjuk (double blind review). Penulis akan diberitahu tentang komentar dan saran pengulas. Jurnal Gema (E-ISSN 2443-0013, P-ISSN.0215-3092) adalah Jurnal Akses Terbuka, yang bebas diakses dan dibaca di Internet.
Arjuna Subject : Umum - Umum
Articles 5 Documents
Search results for , issue "Vol 34 No 02 (2022): GEMA" : 5 Documents clear
PERSPEKTIF HUKUM SIBER DI INDONESIA: PENANGANAN KASUS CYBER TERHADAP TANDA TANGAN ELEKTRONIK Aas Rohmat; Ismiyanto; Muhammad Muhtarom
GEMA Vol 34 No 02 (2022): GEMA
Publisher : LP3M

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In the era of globalization, society 5.0 technology, followed by the development of information technology in cyber space, is something that cannot be avoided. This is followed by the vulnerability of threats and attacks on data and information traffic that can threaten state sovereignty. The security factor is the main obstacle in line with the increasing level of crime in cyberspace in Indonesia. The purpose of this study is the Perspective of Cyber Law in Indonesia: Handling Cyber Cases Against Electronic Signatures. The research method used in this research is descriptive. The type of research that the author uses is normative legal research or known as doctrinal legal research which is commonly referred to as legal research or legal research instructions. This legal research examines library material obtained through literature review by collecting and studying primary and secondary legal materials in the form of laws and literature that are relevant to the research object. The approaches used in this legal research are statutory and contextual approaches. The analysis used is descriptive, namely to describe or explain the phenomenon under study. The analysis is carried out by linking causes and effects to the emergence of the phenomenon under study. The findings in this study are that the perspective of cyber law in Indonesia in handling cyber cases against data theft or threats related to electronic signatures is very important to be immediately normalized.
KEBIJAKAN PENANGGULANGAN KEJAHATAN TINDAK PIDANA TEKNOLOGI INFORMASI Andhika Abdillah; Muhammad Muhtarom; Ismiyanto
GEMA Vol 34 No 02 (2022): GEMA
Publisher : LP3M

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Advances in science and technology have had a very positive impact on human civilization. One of the phenomena of the modern century which is still growing rapidly is the internet. The rapid development of technology requires legal arrangements related to the use of this technology. Unfortunately, until now many countries do not have specific legislation in the field of information technology, both in criminal and civil aspects. The existence of Electronic Information and/or Electronic Documents is binding and recognized as valid evidence to provide legal certainty for the Operation of Electronic Systems and Electronic Transactions, especially in evidence and matters related to legal actions carried out through Electronic Systems. In order to protect the public interest from all kinds of disturbances as a result of misuse of Electronic Information and Electronic Transactions, it is necessary to affirm the Government's role in preventing the dissemination of illegal content by taking action to terminate access to Electronic Information and/or Electronic Documents that have content that violates the law so that they cannot be accessed. from the jurisdiction of Indonesia and authority is required for investigators to request information contained in Electronic System Operators for the purposes of enforcing criminal law in the field of Information Technology and Electronic Transactions
TINDAK PIDANA PENYEBARAN ELEKTRONIK YANG BERMUATAN MELANGGAR KESUSILAAN TERHADAP WANITA DIBAWAH UMUR Cahyorini Laksitowati; Amir Junaidi; Ida Aryati Dyah Purnowo Wulan
GEMA Vol 34 No 02 (2022): GEMA
Publisher : LP3M

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

One type of crime that is growing rapidly today is crime committed electronically, or what is known as cybercrime. This crime takes many forms. These crimes take many forms. The presence of Law Number 11 of 2008 concerning Information and Electronic Transactions has regulated prohibited acts related to electronic information and transactions. There are various forms of cyber crime: Computer fraud (computer fraud), Criminal acts of embezzlement, falsification of providing information via a computer that harms other parties and benefits oneself, Hacking, Criminal acts of communication, Criminal acts of destroying computer systems, either damaging data or deleting codes that cause damage and loss, criminal acts related to intellectual property rights, copyrights and patents. And from cyber crime, children and women are the most vulnerable group to cyber crime.
PENEGAKAN HUKUM CYBER CRIME DALAM UPAYA PENANGGULANGAN TINDAK PIDANA TEKNOLOGI INFORMASI Muhammad Satrio Purnomo Wikantomo; Ida Aryati Dyah Purnomo Wulan; Ismiyanto
GEMA Vol 34 No 02 (2022): GEMA
Publisher : LP3M

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This article aims to let us learn more about cyber crime. This is due to the weakness of cyberspace can become a global disaster that threatens the business sector, national and global security, behavior, child protection, and government systems. The results showed that the public is currently still misusing social media to spread crime in cyberspace. Most of the perpetrators of cybercrime on social media will be caught by Law No.11 of 2008 concerning Electronic Information and Transactions (UU ITE), whether intentional or unintentional. The law should provide protection for internet users with good intentions, and provide firm action for perpetrators of cyber crime. However, the legal system has not solved all computer crimes over the Internet. Likewise in the investigation, there were many obstacles related to legal instruments, the ability of investigators, evidence, and computer forensic facilities. This is why cyber crime law enforcement is still weak
TINDAK PIDANA CYBER BULLYING DALAM PERSPEKTIF HUKUM PIDANA DI INDONESIA Saprudin Hamdani; Ariy Khaerudin; Hanuring Ayu Ardhani Putri
GEMA Vol 34 No 02 (2022): GEMA
Publisher : LP3M

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Information technology is one of the most rapidly developing needs in this modern era. As a result of these developments, information technology gradually changes the behavior of people and human civilization globally. The development of this technology also has an impact in the world of crime, namely the existence of a type of humiliation that is insulted through cyberspace called Cyber Bullying. This study aims to determine the regulation of cyber bullying in terms of the Criminal Code and outside the Criminal Code. This study uses a normative juridical research method with a statutory approach and a conceptual approach. The results of the writing of this journal show that the regulation of cyber bullying in terms of the Criminal Code can be seen in Article 315 of the Criminal Law Code because the cyber bullying crime fulfills both the subjective and objective elements contained in the article. Furthermore, the regulation of cyber bullying outside the Criminal Code Act is contained in Article 27 Paragraph (3) of Law No. 19 of 2016 concerning Amendments to Law Number 11 of 2008 concerning Information and Electronic Transactions because it explains in the article regarding insults committed through computer or electronic media which are in accordance with cyber bullying which is an insult through cyberspace

Page 1 of 1 | Total Record : 5