Determination of confiscation of evidence of data in cyber crime
Keywords:
confiscation, cybercrime, data, determination, evidenceAbstract
The social order in the digital era is increasingly diverse through interaction and communication using high-tech devices. However, this often causes violations and disturbances to public order and harms others (cyber crime). Based on the background above, there is problem formulation in this research, namely what is the legal basis for determining data confiscation in cyber crime and what the mechanism for data confiscation in cybercrime is. The type of research used is normative, namely seeing and analyzing from the point of view of legislation and applicable norms, especially those related to the problems in this research. The result of discussion is that the legal basis for data confiscation in cyber crime is referring to Law no. 11 of 2008 concerning Information and Electronic Transactions (ITE). This law contains regulations regarding the management of information and electronic transactions at the national level, with the aim that information technology development can be carried out optimally, evenly, and spread to all levels of society in order to educate the nation's life, while the mechanism for confiscation of data in cyber crime begins with electronic data in the form of writing, images and sound or all three are intangible and cannot be seen/heard.
Downloads
References
Ahmed, M., Mashkoor, F., & Nasar, A. (2020). Development, characterization, and utilization of magnetized orange peel waste as a novel adsorbent for the confiscation of crystal violet dye from aqueous solution. Groundwater for Sustainable Development, 10, 100322. https://doi.org/10.1016/j.gsd.2019.100322
Ben-Itzhak, Y. (2009). Organised cybercrime and payment cards. Card Technology Today, 21(2), 10-11. https://doi.org/10.1016/S0965-2590(09)70057-X
Chamberlain, G. (1984). Panel data. Handbook of econometrics, 2, 1247-1318. https://doi.org/10.1016/S1573-4412(84)02014-6
Chazawi, A. (2015). Tindak Pidana Informasi & Transaksi Elektronik.
Chelh, I., Gatellier, P., & Santé-Lhoutellier, V. (2006). A simplified procedure for myofibril hydrophobicity determination. Meat science, 74(4), 681-683. https://doi.org/10.1016/j.meatsci.2006.05.019
Dewi, P. P., & Dwiyanti, K. T. (2018). Professional commitment, self-efficacy and ethical decision auditor. International Research Journal of Management, IT and Social Sciences, 5(6), 93-104. https://doi.org/10.21744/irjmis.v5n6.379
Dwiyatmi, S. H. (2006). Pengantar Hukum Indonesia.
Feinstein, A. R., & Horwitz, R. I. (1997). Problems in the “evidence” of “evidence-based medicine”. The American journal of medicine, 103(6), 529-535. https://doi.org/10.1016/S0002-9343(97)00244-1
Hamzah, A. (2008). Asas-asas hukum pidana edisi revisi.
Indonesia, P. R., & Indonesia, P. R. (1981). Undang Undang No. 8 Tahun 1981 Tentang: Kitab Undang Undang Hukum Acara Pidana. Sinar Grafika. jakarta.
Kapoor, R., & Nemat-Nasser, S. (1998). Determination of temperature rise during high strain rate deformation. Mechanics of materials, 27(1), 1-12. https://doi.org/10.1016/S0167-6636(97)00036-7
Lee, J., Lapira, E., Bagheri, B., & Kao, H. A. (2013). Recent advances and trends in predictive manufacturing systems in big data environment. Manufacturing letters, 1(1), 38-41. https://doi.org/10.1016/j.mfglet.2013.09.005
Manky, D. (2013). Cybercrime as a service: a very modern business. Computer Fraud & Security, 2013(6), 9-13. https://doi.org/10.1016/S1361-3723(13)70053-8
Mask, E., Brown, S., Lucky, W., & Peter, L. (2019). The importance of energy efficient in wireless sensor networks. International Research Journal of Management, IT and Social Sciences, 6(6), 207-219. https://doi.org/10.21744/irjmis.v6n6.801
Sekretariat Negara, R. I. (2008). Undang-Undang No. 11 Tahun 2008 tentang Informasi dan Transaksi Elektronik.
Sunarso, S. (2009). Hukum informasi dan transaksi elektronik: studi kasus: prita Mulyasari.
Sutherland, W. J., Pullin, A. S., Dolman, P. M., & Knight, T. M. (2004). The need for evidence-based conservation. Trends in ecology & evolution, 19(6), 305-308. https://doi.org/10.1016/j.tree.2004.03.018
Werb, D., Wood, E., Small, W., Strathdee, S., Li, K., Montaner, J., & Kerr, T. (2008). Effects of police confiscation of illicit drugs and syringes among injection drug users in Vancouver. International Journal of Drug Policy, 19(4), 332-338. https://doi.org/10.1016/j.drugpo.2007.08.004
Widodo, H. P. D. B. T. (2013). Informasi Cybercrime Law, Telaah Teoritik dan Bedah Kasus. Yogyakarta: Aswaja Pressindo.
Published
How to Cite
Issue
Section
Copyright (c) 2022 International journal of social sciences and humanities
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Articles published in the International Journal of Social Sciences and Humanities (IJSSH) are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJSSH right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.
Articles published in IJSSH can be copied, communicated and shared in their published form for non-commercial purposes provided full attribution is given to the author and the journal. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
This copyright notice applies to articles published in IJSSH volumes 4 onwards. Please read about the copyright notices for previous volumes under Journal History.