Determination of confiscation of evidence of data in cyber crime

https://doi.org/10.53730/ijssh.v6n1.2939

Authors

  • Ni Made Liana Dewi Dwijendra University, Denpasar, Indonesia
  • I Made Wahyu Chandra Satriana Dwijendra University, Denpasar, Indonesia

Keywords:

confiscation, cybercrime, data, determination, evidence

Abstract

The social order in the digital era is increasingly diverse through interaction and communication using high-tech devices. However, this often causes violations and disturbances to public order and harms others (cyber crime). Based on the background above, there is problem formulation in this research, namely what is the legal basis for determining data confiscation in cyber crime and what the mechanism for data confiscation in cybercrime is. The type of research used is normative, namely seeing and analyzing from the point of view of legislation and applicable norms, especially those related to the problems in this research. The result of discussion is that the legal basis for data confiscation in cyber crime is referring to Law no. 11 of 2008 concerning Information and Electronic Transactions (ITE). This law contains regulations regarding the management of information and electronic transactions at the national level, with the aim that information technology development can be carried out optimally, evenly, and spread to all levels of society in order to educate the nation's life, while the mechanism for confiscation of data in cyber crime begins with electronic data in the form of writing, images and sound or all three are intangible and cannot be seen/heard.

Downloads

Download data is not yet available.

References

Ahmed, M., Mashkoor, F., & Nasar, A. (2020). Development, characterization, and utilization of magnetized orange peel waste as a novel adsorbent for the confiscation of crystal violet dye from aqueous solution. Groundwater for Sustainable Development, 10, 100322. https://doi.org/10.1016/j.gsd.2019.100322

Ben-Itzhak, Y. (2009). Organised cybercrime and payment cards. Card Technology Today, 21(2), 10-11. https://doi.org/10.1016/S0965-2590(09)70057-X

Chamberlain, G. (1984). Panel data. Handbook of econometrics, 2, 1247-1318. https://doi.org/10.1016/S1573-4412(84)02014-6

Chazawi, A. (2015). Tindak Pidana Informasi & Transaksi Elektronik.

Chelh, I., Gatellier, P., & Santé-Lhoutellier, V. (2006). A simplified procedure for myofibril hydrophobicity determination. Meat science, 74(4), 681-683. https://doi.org/10.1016/j.meatsci.2006.05.019

Dewi, P. P., & Dwiyanti, K. T. (2018). Professional commitment, self-efficacy and ethical decision auditor. International Research Journal of Management, IT and Social Sciences, 5(6), 93-104. https://doi.org/10.21744/irjmis.v5n6.379

Dwiyatmi, S. H. (2006). Pengantar Hukum Indonesia.

Feinstein, A. R., & Horwitz, R. I. (1997). Problems in the “evidence” of “evidence-based medicine”. The American journal of medicine, 103(6), 529-535. https://doi.org/10.1016/S0002-9343(97)00244-1

Hamzah, A. (2008). Asas-asas hukum pidana edisi revisi.

Indonesia, P. R., & Indonesia, P. R. (1981). Undang Undang No. 8 Tahun 1981 Tentang: Kitab Undang Undang Hukum Acara Pidana. Sinar Grafika. jakarta.

Kapoor, R., & Nemat-Nasser, S. (1998). Determination of temperature rise during high strain rate deformation. Mechanics of materials, 27(1), 1-12. https://doi.org/10.1016/S0167-6636(97)00036-7

Lee, J., Lapira, E., Bagheri, B., & Kao, H. A. (2013). Recent advances and trends in predictive manufacturing systems in big data environment. Manufacturing letters, 1(1), 38-41. https://doi.org/10.1016/j.mfglet.2013.09.005

Manky, D. (2013). Cybercrime as a service: a very modern business. Computer Fraud & Security, 2013(6), 9-13. https://doi.org/10.1016/S1361-3723(13)70053-8

Mask, E., Brown, S., Lucky, W., & Peter, L. (2019). The importance of energy efficient in wireless sensor networks. International Research Journal of Management, IT and Social Sciences, 6(6), 207-219. https://doi.org/10.21744/irjmis.v6n6.801

Sekretariat Negara, R. I. (2008). Undang-Undang No. 11 Tahun 2008 tentang Informasi dan Transaksi Elektronik.

Sunarso, S. (2009). Hukum informasi dan transaksi elektronik: studi kasus: prita Mulyasari.

Sutherland, W. J., Pullin, A. S., Dolman, P. M., & Knight, T. M. (2004). The need for evidence-based conservation. Trends in ecology & evolution, 19(6), 305-308. https://doi.org/10.1016/j.tree.2004.03.018

Werb, D., Wood, E., Small, W., Strathdee, S., Li, K., Montaner, J., & Kerr, T. (2008). Effects of police confiscation of illicit drugs and syringes among injection drug users in Vancouver. International Journal of Drug Policy, 19(4), 332-338. https://doi.org/10.1016/j.drugpo.2007.08.004

Widodo, H. P. D. B. T. (2013). Informasi Cybercrime Law, Telaah Teoritik dan Bedah Kasus. Yogyakarta: Aswaja Pressindo.

Published

2022-01-02

How to Cite

Dewi, N. M. L., & Satriana, I. M. W. C. (2022). Determination of confiscation of evidence of data in cyber crime. International Journal of Social Sciences and Humanities, 6(1), 1–8. https://doi.org/10.53730/ijssh.v6n1.2939

Issue

Section

Research Articles