SlideShare a Scribd company logo
(WhatsApp Result, The Doctors at the General Hospital of Malang Snared of ITE Law)
created by :
Eko Waluyo : 12135828
Kornelis Zalukhu : 12132942
Dhika Fauzi : 12135473
Wiji Lestari : 12137694
Lilis Sumiati : 12136729
Zena Oktavia : 12135413
Class : 12.4C.06
Akademi Manajemen Informatika dan Komputer
BINA SARANA INFORMATIKA (BSI)
Jakarta - 2015
i
PREFACE
Praise God Almighty for all the abundance of His mercy and grace so that we
can complete the preparation of this paper in the form and content very simple. The
paper explains that we made on "Cyber Crime" by lifting a case between
Antarestawati and Khoiriatul Masruroh which originated from uploaded photos
through social networks that eventually threatened criminal penalties ITE Law. We
did not forget to say thank you to Mr. Oktavian as lecturers of EPTIK subjects that
have been guiding and directing us in the preparation of this paper also to the parties
that have been active or indirect role in the continuity of the preparation of this paper.
Our hope that this paper helps increase knowledge and experience for the readers.
The paper is still far from perfection because of the limitations of our
knowledge and ability. So that, we expect it to readers to provide inputs that are build
to perfection this paper.
Bekasi, May 2015
Author
ii
TABLE OF CONTENTS
PREFACE .............................................................................................................. i
TABLE OF CONTENTS......................................................................................... ii
CHAPTER I. INTRODUCTION ....................................................................... 1
1.1 Background............................................................................ 1
1.2 Scope ..................................................................................... 1
CHAPTER II. GENERAL KNOWLEDGE CYBERCRIME.............................. 2
2.1. Understanding Cybercrime............................................... 2
2.2. Understanding Cyberstalking ............................................... 2
2.3. Criteria Cyberstalking .................................................... 3
2.4. Action and Purpose Cyberstalker...................................... 3
2.5. Target Cyberstalking............................................................. 4
2.6. CyberStalking & Social Networking ................................ 5
CHAPTER III. CASE STUDY.............................................................................. 7
CHAPTER IV. CLOSING .................................................................................... 9
4.1. Conclusion ............................................................................ 9
4.2. Advice ................................................................................... 9
CHAPTER V. LIST OF REFERENCES............................................................. 11
1
CHAPTER I
INTRODUCTION
1.1 Background
Current computer technology has become an integral part of community
life, its users are also from children to adults. With the rapid advancement in
technology, threat or crime was more prevalent.
Cybercrime is a term that refers to criminal activity with a computer or computer
network into a tool, target or scene of the crime. Many examples of crime in the
virtual world where the computer as a tool, for that we as users should be more
careful in using this technology so as not to get stuck in the crime.
Globalization brings people in a world without borders to the flow of
information superfast (information superhighway) worldwide. Globalization of
the world sparked a revolution (rather than evolutionary) in the field of ICT
(Information and Communication Technology).
The challenges of globalization on the development of ICT for young people are
most concerned about is Social Networking Sites.
1.2 Scope
In writing this paper, we discuss a glimpse of cyber crime in general and
more detailed on cyberstalking to facilitate the discussion and that the material
that we describe more specific.
2
CHAPTER II
GENERAL KNOWLEDGE CYBERCRIME
2.1. Understanding Cybercrime
"Cybercrime" is a criminal act committed on Internet technology
(cyberspace), whether that attack public facilities in cyberspace or private
ownership. In techniques such offenses can be divided into off-line crime, semi
on-line crime, and cybercrime. Each one has its own characteristics, but the main
difference between them is the rapport with the public information network
(internet).
Cybercrime can be defined as the unlawful act committed by using the Internet
based on the sophistication of computer technology and telecommunications.
The Prevention of Crime and the Treatment of Offlenderes in Havana, Cuba in
1999 and in Vienna, Austria in 2000, says there are two terms that are known:
1. Cybercrime in the narrow sense is called computer crime, is illegal
behavior / violate that directly attack the computer systems security and /
or data that is processed by a computer.
2. Cybercrime in the broad sense is called computer related crime, is illegal
behavior / violate related to computer system or network.
From some of the above, cybercrime formulated as an unlawful act committed by
using computer networks as a tool / instrument or computer as an object, either
for benefit or not, to the detriment of the other party.
2.2. Understanding Cyberstalking
"Cyberstalking" is the use of the Internet or other electronic device to
harass a person, group, or organization.
Cyberstalking is the latest form of criminal behavior involving threats persistent
or unwanted attention using the internet and other means of communication
computer.
3
Cyberstalking can include harassing, threatening, excessive spamming,
harassment or live chat known as chat, inappropriate messages on a message
board or guest book online, electronic dangerous viruses are sent, unsolicited
emails and electronic identity theft. Including false accusations, monitoring,
making threats, our identity theft, damage to data or equipment, or collecting
information in order to harass. Cyberstalking action can be very dangerous and
frightening, especially for children and adolescents. This is because one's personal
identity information is not known on the Internet provides an opportunity for the
stalker (talker) to roam freely carry out the action. Cyberstalker (actors
cyberstalking) and often extreme action because they feel can not be arrested or
punished because it is difficult to detect.
2.3. Criteria Cyberstalking
How to identify cyberstalking?
When identifying cyberstalking "in the field", and especially when considering
whether to report it to any authority of law, the following features or
combinations of features can be considered to characterize the situation lurking
right: malice, premeditation, repetition, sorrow, obsession, revenge, no legitimate
purposes, personally directed, ignoring warnings to stop, harassment, and threats.
If only one time someone mocked in cyberspace, it is not called a bully or talker.
We have to see what its context, whether in activities kidding between friends,
discuss, it is also to be seen, if they were just mock each (joke), not called
cyberstalking.
2.4. Action and Purpose cyberstalker
2.4.1 Action Cyberstalker
 False accusations
Many cyberstalkers try to damage the reputation of the victim. They
post false information about them on the site and certain websites. They
may set up their own website, blog or page the user for the purpose of
4
this crime. They post about the alleged victim to a newsgroup, chat
room or other sites that allow community contribution.
 Attempts to collect information about the victims
Cyberstalkers may engage with their victim's friends, family and co-
workers to obtain personal information. They can monitor the
information on the Internet, or rent a private detective. They will
frequently monitor the online activities of the victim and attempted to
trace their IP address in an attempt to gather more information about
their victims.
 Encouraging others to harass victims
Many cyberstalkers trying to involve third parties in this harassment.
They may claim the victim has impaired the stalker or his family in
several ways, for example by posting the victim's name and phone
number to encourage others to join disturb the victim.
 The attack on the data and equipment
They may try to damage the victim's computer by sending virus.
 Ordering goods and services
They ordered goods or magazine subscription on behalf of the victim. It
often involves a subscription to perform acts of pornography or order a
sex toy is then sent to the victim.
 Set up meetings
The youths face a high risk, especially against cyberstalkers are trying to
arrange a meeting between them.
2.4.2. Purpose Cyberstalker
 Supervise the victim's online activities via spyware, which is a
program designed to spy on someone's computer or mobile phone
remotely.
 Keep track of the location of the victim using GPS technology
5
 Intercept with a cell phone call or text message someone
 Impersonate victims
 Supervise and watch the activity of the victim through a hidden
camera.
2.5. Target Cyberstalking
1) Man
2) Woman
3) Intimate Partner
4) Mass
5) Company
2.6. CyberStalking & Social Networking
Along with Facebook, another popular sites such as Path, WhatsApp,
Line has available cyberstalkers to see updates on their prey and in some cases,
allowing them to see where their victims. The latest application software utilizes
global positioning (GPS) technology, such as Foursquare, making the action more
easily find their victims. Check the dangers of GPS technology and its correlation
with cyberstalking.
Cyberstalking is an act of spying or stalking the privacy of internet users via
technology including computers, cell phones, cameras and other technologies.
Cyberstalking could eventually lead to acts of harassment, seduction, vulgar or
threatening messages, slanderous or unwanted messages. His motives are diverse,
ranging from revenge, anger, just for fun or want to control someone.
The fact that cyber stalking does not involve physical contact may create
the misperception that it is more dangerous than physical stalking. This is not
necessarily true. With Internet functions that become an integral part of our lives
private, professional stalkers can take advantage of the ease of communication as
well as increased access to personal information. In other words, the stalker may
be unwilling or unable to confront a victim in person or on the phone, he may
6
have little hesitation sending harassing or threatening electronic communications
to a victim. Eventually, such as physical abuse stalking, threats online may be the
beginning to more serious behavior, including physical violence.
7
CHAPTER III
CASE STUDY
(Antarestawati vs Khoiriatul Masruroh)
Antarestawati Acip Tjokro is a doctor in charge of Regional General Hospital
(Hospital) Kanjuruhan, Malang, East Java, was reported to the police. The cause, the
31-year-old doctor was in the app WhatsApp upload photos without their permission,
Khoiriatul Masruroh.
This case began when Antarestawati upload photos selfie Khoiriatul WhatsApp
group, which consists of a number of hospital employees Kanjuruhan. Photos
Khoiriatul the black shirted football club Paris Saint German was given posts "Buka
Lapak... 150 ewu (ribu)/ jam." Mean “Open Stalls ... 150 thousand/hour”
Khoiriatul Masruroh said initially he did not know his picture in the group
Antarestawati WhatsApp installed. He knew of one of his friends.
"Meanwhile, my photo uploaded to the WA group given writings Open Stalls 150
thousand / hour, it is not a joke. And I consider it seriously in harassing me, when I'm
with Dr. Antarestawati there was never a problem before," he said.
"This seems to me a slut that can be bought with money one hundred and fifty
thousand rupiahs per hour," he said.
Feeling harassed, he took the case to the authorities. He hoped that the case could be
prosecuted.
"The uploaded photos were given posts which was considered insulting Khoiriatul
Masruroh, victims who feel abused later reported the matter on March 12 last," said
Criminal Police, Adj Adj Malang Police Commissioner Wahyu Hidayat as confirmed
in Malang, Sunday (15/03/2015)
8
In this case, the police use Law No. 11 of 2008 on Information and Electronic
Transactions (ITE) Article 27, including the violation of decency and defamation. If it
violates the doctor could be convicted of imprisonment not exceeding 6 months, or
fined up to Rp 1 billion.
Khoiriatul and Antarestawati had visited the Malang police station to undergo
examination. Both come together in a car driven by her husband Antarestawati.
However, both are now reconciled with stamped letters to Rp 6,000. There is also a
signature of the Head of Sub Division of Medical Records, Evapor Riyanto and Vice
Director of Administration and Finance, Mahila Surya Dewi.
"Khoiriatul have considered with himself and his family. Then unplug the report
states. There is no compulsion on the other party" Head of Unit PPA Iptu Sutiyo,
Tuesday (03/24/2015).
9
BAB IV
CLOSING
4.1. Conclusion
Cyberstalking is the use of the Internet or other electronic device to harass a
person, group, or organization.
Cyberstalking is the latest form of criminal behavior involving threats
persistent or unwanted attention using the internet and other means of
communication computer.
4.2. Advice
1. Use Internet services wisely and be careful in any share to the internet, let
alone personal nature. Despite what was sent was intended only for
certain people to believe, the opportunity to spread the content of private
public space is too big. Once a spread content out on the internet, it is
difficult to remove it again because it is scattered everywhere.
2. Let be a good internet users. Teach our youth in order to treat others well,
so that they are treated others the same way.
3. Do not reactive. If someone is less feasible on the internet, and our youth
know, recommend that they do not easily respond to such action. Mutual
applies not feasible will only prolong the problem, and ultimately led to a
chain of cyber stalking continued. Ask them to ignore something that is
considered to be less comfortable.
4. Report unworthy behavior. If you find the perpetrators cyberstalking on
the internet, ask our youth to report to an adult who understands the
problem. If in school, can be reported to the teacher, or to parents if
teachers can not give instructions to resolve it. If necessary, report it
10
online to the parties that might be helpful. Even when it's outrageous,
teach them to report unpleasant acts to the service providers.
11
CHAPTER V
LIST OF REFERENCES
http://news.liputan6.com/read/2191417/akibat-whatsapp-dokter-di-rsud-malang-
dijerat-uu-ite
http://www.tribunnews.com/regional/2015/03/25/kasus-dokter-dan-resepsionis-
cantik-di-malang-akhirnya-damai
http://daerah.sindonews.com/read/977125/23/unggah-foto-selfi-dokter-rsud-malang-
dilaporkan-ke-polisi-1426490167
http://regional.kompas.com/read/2015/03/16/15061471/Unggah.Foto.Cewek.di.Grup.
WhatsApp.Dokter.Ini.Terancam.UU.ITE
http://id.wikipedia.org/wiki/Cyberstalking
http://id.wikipedia.org/wiki/Kejahatan_dunia_maya

More Related Content

What's hot

Magic of RATs(Remote Access Torgens)
Magic of RATs(Remote Access Torgens)Magic of RATs(Remote Access Torgens)
Magic of RATs(Remote Access Torgens)
Open Knowledge Nepal
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Komal003
 
Computer crime and internet crime privacy
Computer crime and internet crime privacyComputer crime and internet crime privacy
Computer crime and internet crime privacy
GouthamXander
 
SS7 Vulnerabilities
SS7 VulnerabilitiesSS7 Vulnerabilities
SS7 Vulnerabilities
PositiveTechnologies
 
Email Forensics
Email ForensicsEmail Forensics
Email Forensics
Gol D Roger
 
Hacking with experts 3 (facebook hacking) by anurag dwivedi.
Hacking with experts 3 (facebook hacking) by anurag dwivedi.Hacking with experts 3 (facebook hacking) by anurag dwivedi.
Hacking with experts 3 (facebook hacking) by anurag dwivedi.
Esteban Bedoya
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
Sanket Gogoi
 
Cyber Crime
Cyber CrimeCyber Crime
Cybercrime
CybercrimeCybercrime
Cybercrime
Reyad Hossain
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Ranjana Adhikari
 
Security threats in social networks
Security threats in social networksSecurity threats in social networks
Security threats in social networks
Tannistho Ghosh
 
Cyber crime - Kejahatan di Dunia Maya / Internet
Cyber crime - Kejahatan di Dunia Maya / InternetCyber crime - Kejahatan di Dunia Maya / Internet
Cyber crime - Kejahatan di Dunia Maya / Internet
Hendi Hendratman
 
Cybercrime ppt
Cybercrime pptCybercrime ppt
Cybercrime pptyulisthg
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
Xavier Mertens
 
Computer Security
Computer SecurityComputer Security
Computer Security
Vaibhavi Patel
 
Cyber Crimes - An Introduction
Cyber Crimes - An IntroductionCyber Crimes - An Introduction
Cyber Crimes - An Introduction
Mukesh Tekwani
 
AIJ - Materi Firewall.pptx
AIJ - Materi Firewall.pptxAIJ - Materi Firewall.pptx
AIJ - Materi Firewall.pptx
WahyuHildanSyah1
 
Introduction to Email Fraud
Introduction to Email FraudIntroduction to Email Fraud
Introduction to Email Fraud
Tri-State Better Business Bureau
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crime
Alisha Korpal
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_point
efandeye
 

What's hot (20)

Magic of RATs(Remote Access Torgens)
Magic of RATs(Remote Access Torgens)Magic of RATs(Remote Access Torgens)
Magic of RATs(Remote Access Torgens)
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Computer crime and internet crime privacy
Computer crime and internet crime privacyComputer crime and internet crime privacy
Computer crime and internet crime privacy
 
SS7 Vulnerabilities
SS7 VulnerabilitiesSS7 Vulnerabilities
SS7 Vulnerabilities
 
Email Forensics
Email ForensicsEmail Forensics
Email Forensics
 
Hacking with experts 3 (facebook hacking) by anurag dwivedi.
Hacking with experts 3 (facebook hacking) by anurag dwivedi.Hacking with experts 3 (facebook hacking) by anurag dwivedi.
Hacking with experts 3 (facebook hacking) by anurag dwivedi.
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Security threats in social networks
Security threats in social networksSecurity threats in social networks
Security threats in social networks
 
Cyber crime - Kejahatan di Dunia Maya / Internet
Cyber crime - Kejahatan di Dunia Maya / InternetCyber crime - Kejahatan di Dunia Maya / Internet
Cyber crime - Kejahatan di Dunia Maya / Internet
 
Cybercrime ppt
Cybercrime pptCybercrime ppt
Cybercrime ppt
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Cyber Crimes - An Introduction
Cyber Crimes - An IntroductionCyber Crimes - An Introduction
Cyber Crimes - An Introduction
 
AIJ - Materi Firewall.pptx
AIJ - Materi Firewall.pptxAIJ - Materi Firewall.pptx
AIJ - Materi Firewall.pptx
 
Introduction to Email Fraud
Introduction to Email FraudIntroduction to Email Fraud
Introduction to Email Fraud
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crime
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_point
 

Viewers also liked

Makalah bahasa inggris
Makalah bahasa inggrisMakalah bahasa inggris
Makalah bahasa inggris
Queen Anaqi
 
makalah-tentang-cyber-crime-dan-kejahatan-internet
makalah-tentang-cyber-crime-dan-kejahatan-internetmakalah-tentang-cyber-crime-dan-kejahatan-internet
makalah-tentang-cyber-crime-dan-kejahatan-internet
Kie Rahadian
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Ensign Handoko
 
Laporan penelitian penerapan_bantuan_timbal_balik_dalam_masalah_pidana_terhad...
Laporan penelitian penerapan_bantuan_timbal_balik_dalam_masalah_pidana_terhad...Laporan penelitian penerapan_bantuan_timbal_balik_dalam_masalah_pidana_terhad...
Laporan penelitian penerapan_bantuan_timbal_balik_dalam_masalah_pidana_terhad...Abd Rahman
 
Pendidikan Berkarakter
Pendidikan BerkarakterPendidikan Berkarakter
Pendidikan Berkarakter
Tifanny Ellies
 
Arrays c4 c5
Arrays c4 c5Arrays c4 c5
Arrays c4 c5
Omar Al-Sabek
 
Makalah cybercrime & cyber law
Makalah cybercrime & cyber lawMakalah cybercrime & cyber law
Makalah cybercrime & cyber law
Susyapriyani
 
Makalah cyber law cyber crime
Makalah cyber law cyber crimeMakalah cyber law cyber crime
Makalah cyber law cyber crime
Rahmat As-Syaakir
 
Makalah bahasa inggris permasalahan pendidikan di indonesia
Makalah bahasa inggris permasalahan pendidikan di indonesiaMakalah bahasa inggris permasalahan pendidikan di indonesia
Makalah bahasa inggris permasalahan pendidikan di indonesia
Septian Muna Barakati
 
Makalah cyber crime
Makalah cyber crimeMakalah cyber crime
Makalah cyber crime
dennyrah0910
 
Makalah Bahasa inggris - Search Engine
Makalah Bahasa inggris - Search EngineMakalah Bahasa inggris - Search Engine
Makalah Bahasa inggris - Search Engine
Akmal
 

Viewers also liked (12)

Makalah bahasa inggris
Makalah bahasa inggrisMakalah bahasa inggris
Makalah bahasa inggris
 
makalah-tentang-cyber-crime-dan-kejahatan-internet
makalah-tentang-cyber-crime-dan-kejahatan-internetmakalah-tentang-cyber-crime-dan-kejahatan-internet
makalah-tentang-cyber-crime-dan-kejahatan-internet
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Laporan penelitian penerapan_bantuan_timbal_balik_dalam_masalah_pidana_terhad...
Laporan penelitian penerapan_bantuan_timbal_balik_dalam_masalah_pidana_terhad...Laporan penelitian penerapan_bantuan_timbal_balik_dalam_masalah_pidana_terhad...
Laporan penelitian penerapan_bantuan_timbal_balik_dalam_masalah_pidana_terhad...
 
Pendidikan Berkarakter
Pendidikan BerkarakterPendidikan Berkarakter
Pendidikan Berkarakter
 
Arrays c4 c5
Arrays c4 c5Arrays c4 c5
Arrays c4 c5
 
Makalah cybercrime & cyber law
Makalah cybercrime & cyber lawMakalah cybercrime & cyber law
Makalah cybercrime & cyber law
 
Makalah cyber law cyber crime
Makalah cyber law cyber crimeMakalah cyber law cyber crime
Makalah cyber law cyber crime
 
Makalah bahasa inggris permasalahan pendidikan di indonesia
Makalah bahasa inggris permasalahan pendidikan di indonesiaMakalah bahasa inggris permasalahan pendidikan di indonesia
Makalah bahasa inggris permasalahan pendidikan di indonesia
 
Makalah cyber crime
Makalah cyber crimeMakalah cyber crime
Makalah cyber crime
 
Makalah Bahasa inggris - Search Engine
Makalah Bahasa inggris - Search EngineMakalah Bahasa inggris - Search Engine
Makalah Bahasa inggris - Search Engine
 
Power Point Cyber crime
Power Point Cyber crimePower Point Cyber crime
Power Point Cyber crime
 

Similar to Makalah cyber crime dalam Bahasa Inggris dan Indonesia

Cyber crime
Cyber crimeCyber crime
Cyber crime
Debayon Saha
 
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
IJCSIS Research Publications
 
New microsoft office word document (3)
New microsoft office word document (3)New microsoft office word document (3)
New microsoft office word document (3)
Priyatham Kanigarla
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
FarjanaMitu3
 
127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime
homeworkping8
 
Cyber crime modified
Cyber crime modifiedCyber crime modified
Cyber crime modified
Debabrata Samanta
 
A report on cyber Crime
A report on cyber CrimeA report on cyber Crime
A report on cyber Crime
Nikhil Chaudhary
 
THE CYBER WORLD.pptx
THE CYBER WORLD.pptxTHE CYBER WORLD.pptx
THE CYBER WORLD.pptx
KrishnaGupta769783
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
Shumail Tariq
 
Research Paper On Cybercrime
Research Paper On CybercrimeResearch Paper On Cybercrime
Research Paper On Cybercrime
Write My Statistics Paper Vestal
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
CA.Kolluru Narayanarao
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
Kolluru N Rao
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
vichu19891
 
Cyber Essays
Cyber EssaysCyber Essays
Cyber Essays
Paper Writer Service
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
Preet Hanspal
 
Cyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineCyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social Decline
IRJET Journal
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
Shishupal Nagar
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
rinushalu
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
MrunalBakshi
 
Unit II.pptx
Unit II.pptxUnit II.pptx
Unit II.pptx
RamachandranPerumal5
 

Similar to Makalah cyber crime dalam Bahasa Inggris dan Indonesia (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
 
New microsoft office word document (3)
New microsoft office word document (3)New microsoft office word document (3)
New microsoft office word document (3)
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
 
127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime
 
Cyber crime modified
Cyber crime modifiedCyber crime modified
Cyber crime modified
 
A report on cyber Crime
A report on cyber CrimeA report on cyber Crime
A report on cyber Crime
 
THE CYBER WORLD.pptx
THE CYBER WORLD.pptxTHE CYBER WORLD.pptx
THE CYBER WORLD.pptx
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
Research Paper On Cybercrime
Research Paper On CybercrimeResearch Paper On Cybercrime
Research Paper On Cybercrime
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
 
Cyber Essays
Cyber EssaysCyber Essays
Cyber Essays
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Cyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineCyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social Decline
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Unit II.pptx
Unit II.pptxUnit II.pptx
Unit II.pptx
 

Recently uploaded

制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
cuobya
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
bseovas
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
cuobya
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
bseovas
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
uehowe
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
Trending Blogers
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
CIOWomenMagazine
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
zoowe
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
wolfsoftcompanyco
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
Toptal Tech
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
Laura Szabó
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
SEO Article Boost
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
hackersuli
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
ukwwuq
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
zyfovom
 

Recently uploaded (20)

制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
 

Makalah cyber crime dalam Bahasa Inggris dan Indonesia

  • 1. (WhatsApp Result, The Doctors at the General Hospital of Malang Snared of ITE Law) created by : Eko Waluyo : 12135828 Kornelis Zalukhu : 12132942 Dhika Fauzi : 12135473 Wiji Lestari : 12137694 Lilis Sumiati : 12136729 Zena Oktavia : 12135413 Class : 12.4C.06 Akademi Manajemen Informatika dan Komputer BINA SARANA INFORMATIKA (BSI) Jakarta - 2015
  • 2. i PREFACE Praise God Almighty for all the abundance of His mercy and grace so that we can complete the preparation of this paper in the form and content very simple. The paper explains that we made on "Cyber Crime" by lifting a case between Antarestawati and Khoiriatul Masruroh which originated from uploaded photos through social networks that eventually threatened criminal penalties ITE Law. We did not forget to say thank you to Mr. Oktavian as lecturers of EPTIK subjects that have been guiding and directing us in the preparation of this paper also to the parties that have been active or indirect role in the continuity of the preparation of this paper. Our hope that this paper helps increase knowledge and experience for the readers. The paper is still far from perfection because of the limitations of our knowledge and ability. So that, we expect it to readers to provide inputs that are build to perfection this paper. Bekasi, May 2015 Author
  • 3. ii TABLE OF CONTENTS PREFACE .............................................................................................................. i TABLE OF CONTENTS......................................................................................... ii CHAPTER I. INTRODUCTION ....................................................................... 1 1.1 Background............................................................................ 1 1.2 Scope ..................................................................................... 1 CHAPTER II. GENERAL KNOWLEDGE CYBERCRIME.............................. 2 2.1. Understanding Cybercrime............................................... 2 2.2. Understanding Cyberstalking ............................................... 2 2.3. Criteria Cyberstalking .................................................... 3 2.4. Action and Purpose Cyberstalker...................................... 3 2.5. Target Cyberstalking............................................................. 4 2.6. CyberStalking & Social Networking ................................ 5 CHAPTER III. CASE STUDY.............................................................................. 7 CHAPTER IV. CLOSING .................................................................................... 9 4.1. Conclusion ............................................................................ 9 4.2. Advice ................................................................................... 9 CHAPTER V. LIST OF REFERENCES............................................................. 11
  • 4. 1 CHAPTER I INTRODUCTION 1.1 Background Current computer technology has become an integral part of community life, its users are also from children to adults. With the rapid advancement in technology, threat or crime was more prevalent. Cybercrime is a term that refers to criminal activity with a computer or computer network into a tool, target or scene of the crime. Many examples of crime in the virtual world where the computer as a tool, for that we as users should be more careful in using this technology so as not to get stuck in the crime. Globalization brings people in a world without borders to the flow of information superfast (information superhighway) worldwide. Globalization of the world sparked a revolution (rather than evolutionary) in the field of ICT (Information and Communication Technology). The challenges of globalization on the development of ICT for young people are most concerned about is Social Networking Sites. 1.2 Scope In writing this paper, we discuss a glimpse of cyber crime in general and more detailed on cyberstalking to facilitate the discussion and that the material that we describe more specific.
  • 5. 2 CHAPTER II GENERAL KNOWLEDGE CYBERCRIME 2.1. Understanding Cybercrime "Cybercrime" is a criminal act committed on Internet technology (cyberspace), whether that attack public facilities in cyberspace or private ownership. In techniques such offenses can be divided into off-line crime, semi on-line crime, and cybercrime. Each one has its own characteristics, but the main difference between them is the rapport with the public information network (internet). Cybercrime can be defined as the unlawful act committed by using the Internet based on the sophistication of computer technology and telecommunications. The Prevention of Crime and the Treatment of Offlenderes in Havana, Cuba in 1999 and in Vienna, Austria in 2000, says there are two terms that are known: 1. Cybercrime in the narrow sense is called computer crime, is illegal behavior / violate that directly attack the computer systems security and / or data that is processed by a computer. 2. Cybercrime in the broad sense is called computer related crime, is illegal behavior / violate related to computer system or network. From some of the above, cybercrime formulated as an unlawful act committed by using computer networks as a tool / instrument or computer as an object, either for benefit or not, to the detriment of the other party. 2.2. Understanding Cyberstalking "Cyberstalking" is the use of the Internet or other electronic device to harass a person, group, or organization. Cyberstalking is the latest form of criminal behavior involving threats persistent or unwanted attention using the internet and other means of communication computer.
  • 6. 3 Cyberstalking can include harassing, threatening, excessive spamming, harassment or live chat known as chat, inappropriate messages on a message board or guest book online, electronic dangerous viruses are sent, unsolicited emails and electronic identity theft. Including false accusations, monitoring, making threats, our identity theft, damage to data or equipment, or collecting information in order to harass. Cyberstalking action can be very dangerous and frightening, especially for children and adolescents. This is because one's personal identity information is not known on the Internet provides an opportunity for the stalker (talker) to roam freely carry out the action. Cyberstalker (actors cyberstalking) and often extreme action because they feel can not be arrested or punished because it is difficult to detect. 2.3. Criteria Cyberstalking How to identify cyberstalking? When identifying cyberstalking "in the field", and especially when considering whether to report it to any authority of law, the following features or combinations of features can be considered to characterize the situation lurking right: malice, premeditation, repetition, sorrow, obsession, revenge, no legitimate purposes, personally directed, ignoring warnings to stop, harassment, and threats. If only one time someone mocked in cyberspace, it is not called a bully or talker. We have to see what its context, whether in activities kidding between friends, discuss, it is also to be seen, if they were just mock each (joke), not called cyberstalking. 2.4. Action and Purpose cyberstalker 2.4.1 Action Cyberstalker  False accusations Many cyberstalkers try to damage the reputation of the victim. They post false information about them on the site and certain websites. They may set up their own website, blog or page the user for the purpose of
  • 7. 4 this crime. They post about the alleged victim to a newsgroup, chat room or other sites that allow community contribution.  Attempts to collect information about the victims Cyberstalkers may engage with their victim's friends, family and co- workers to obtain personal information. They can monitor the information on the Internet, or rent a private detective. They will frequently monitor the online activities of the victim and attempted to trace their IP address in an attempt to gather more information about their victims.  Encouraging others to harass victims Many cyberstalkers trying to involve third parties in this harassment. They may claim the victim has impaired the stalker or his family in several ways, for example by posting the victim's name and phone number to encourage others to join disturb the victim.  The attack on the data and equipment They may try to damage the victim's computer by sending virus.  Ordering goods and services They ordered goods or magazine subscription on behalf of the victim. It often involves a subscription to perform acts of pornography or order a sex toy is then sent to the victim.  Set up meetings The youths face a high risk, especially against cyberstalkers are trying to arrange a meeting between them. 2.4.2. Purpose Cyberstalker  Supervise the victim's online activities via spyware, which is a program designed to spy on someone's computer or mobile phone remotely.  Keep track of the location of the victim using GPS technology
  • 8. 5  Intercept with a cell phone call or text message someone  Impersonate victims  Supervise and watch the activity of the victim through a hidden camera. 2.5. Target Cyberstalking 1) Man 2) Woman 3) Intimate Partner 4) Mass 5) Company 2.6. CyberStalking & Social Networking Along with Facebook, another popular sites such as Path, WhatsApp, Line has available cyberstalkers to see updates on their prey and in some cases, allowing them to see where their victims. The latest application software utilizes global positioning (GPS) technology, such as Foursquare, making the action more easily find their victims. Check the dangers of GPS technology and its correlation with cyberstalking. Cyberstalking is an act of spying or stalking the privacy of internet users via technology including computers, cell phones, cameras and other technologies. Cyberstalking could eventually lead to acts of harassment, seduction, vulgar or threatening messages, slanderous or unwanted messages. His motives are diverse, ranging from revenge, anger, just for fun or want to control someone. The fact that cyber stalking does not involve physical contact may create the misperception that it is more dangerous than physical stalking. This is not necessarily true. With Internet functions that become an integral part of our lives private, professional stalkers can take advantage of the ease of communication as well as increased access to personal information. In other words, the stalker may be unwilling or unable to confront a victim in person or on the phone, he may
  • 9. 6 have little hesitation sending harassing or threatening electronic communications to a victim. Eventually, such as physical abuse stalking, threats online may be the beginning to more serious behavior, including physical violence.
  • 10. 7 CHAPTER III CASE STUDY (Antarestawati vs Khoiriatul Masruroh) Antarestawati Acip Tjokro is a doctor in charge of Regional General Hospital (Hospital) Kanjuruhan, Malang, East Java, was reported to the police. The cause, the 31-year-old doctor was in the app WhatsApp upload photos without their permission, Khoiriatul Masruroh. This case began when Antarestawati upload photos selfie Khoiriatul WhatsApp group, which consists of a number of hospital employees Kanjuruhan. Photos Khoiriatul the black shirted football club Paris Saint German was given posts "Buka Lapak... 150 ewu (ribu)/ jam." Mean “Open Stalls ... 150 thousand/hour” Khoiriatul Masruroh said initially he did not know his picture in the group Antarestawati WhatsApp installed. He knew of one of his friends. "Meanwhile, my photo uploaded to the WA group given writings Open Stalls 150 thousand / hour, it is not a joke. And I consider it seriously in harassing me, when I'm with Dr. Antarestawati there was never a problem before," he said. "This seems to me a slut that can be bought with money one hundred and fifty thousand rupiahs per hour," he said. Feeling harassed, he took the case to the authorities. He hoped that the case could be prosecuted. "The uploaded photos were given posts which was considered insulting Khoiriatul Masruroh, victims who feel abused later reported the matter on March 12 last," said Criminal Police, Adj Adj Malang Police Commissioner Wahyu Hidayat as confirmed in Malang, Sunday (15/03/2015)
  • 11. 8 In this case, the police use Law No. 11 of 2008 on Information and Electronic Transactions (ITE) Article 27, including the violation of decency and defamation. If it violates the doctor could be convicted of imprisonment not exceeding 6 months, or fined up to Rp 1 billion. Khoiriatul and Antarestawati had visited the Malang police station to undergo examination. Both come together in a car driven by her husband Antarestawati. However, both are now reconciled with stamped letters to Rp 6,000. There is also a signature of the Head of Sub Division of Medical Records, Evapor Riyanto and Vice Director of Administration and Finance, Mahila Surya Dewi. "Khoiriatul have considered with himself and his family. Then unplug the report states. There is no compulsion on the other party" Head of Unit PPA Iptu Sutiyo, Tuesday (03/24/2015).
  • 12. 9 BAB IV CLOSING 4.1. Conclusion Cyberstalking is the use of the Internet or other electronic device to harass a person, group, or organization. Cyberstalking is the latest form of criminal behavior involving threats persistent or unwanted attention using the internet and other means of communication computer. 4.2. Advice 1. Use Internet services wisely and be careful in any share to the internet, let alone personal nature. Despite what was sent was intended only for certain people to believe, the opportunity to spread the content of private public space is too big. Once a spread content out on the internet, it is difficult to remove it again because it is scattered everywhere. 2. Let be a good internet users. Teach our youth in order to treat others well, so that they are treated others the same way. 3. Do not reactive. If someone is less feasible on the internet, and our youth know, recommend that they do not easily respond to such action. Mutual applies not feasible will only prolong the problem, and ultimately led to a chain of cyber stalking continued. Ask them to ignore something that is considered to be less comfortable. 4. Report unworthy behavior. If you find the perpetrators cyberstalking on the internet, ask our youth to report to an adult who understands the problem. If in school, can be reported to the teacher, or to parents if teachers can not give instructions to resolve it. If necessary, report it
  • 13. 10 online to the parties that might be helpful. Even when it's outrageous, teach them to report unpleasant acts to the service providers.
  • 14. 11 CHAPTER V LIST OF REFERENCES http://news.liputan6.com/read/2191417/akibat-whatsapp-dokter-di-rsud-malang- dijerat-uu-ite http://www.tribunnews.com/regional/2015/03/25/kasus-dokter-dan-resepsionis- cantik-di-malang-akhirnya-damai http://daerah.sindonews.com/read/977125/23/unggah-foto-selfi-dokter-rsud-malang- dilaporkan-ke-polisi-1426490167 http://regional.kompas.com/read/2015/03/16/15061471/Unggah.Foto.Cewek.di.Grup. WhatsApp.Dokter.Ini.Terancam.UU.ITE http://id.wikipedia.org/wiki/Cyberstalking http://id.wikipedia.org/wiki/Kejahatan_dunia_maya