Obstacles to Investigators Using Electronic Information Technology in the Process of Investigations and Investigations to Disclose Criminal Acts of Persecution
ABSTRACT : This study aims to find out and examine the obstacles investigators use electronic information
technology in the process of inquiry and investigation to uncover criminal acts of persecution (a case study of
the persecution that led to the death of the victim Augustine ) normative research supported by empirical data.
The results showed that the obstacles faced by investigators at the DitreskrimumPoldaSultra in the use of
technology related to the process of investigating and investigating cases of abuse that caused the death of
people consisted of 3 (three) obstacles, namely: first , Obstacles in Legal Substance: a. The Criminal Code does
not recognize electronic evidence; b. The evidence in the Electronic Transaction Information Law is not
supported by adequate implementing regulations; and c. There is no progressive legal umbrella in terms of
Standard Operating Procedures for the use of technology in the process of investigating criminal acts of
persecution that cause people to die.
KEYWORDS: Investigators, Electronic Evidence, Persecution.
An application development for police stations in pakistanSalam Shah
Program slice is the part of program that may take the program off the path of the
desired output at some point of its execution. Such point is known as the slicing criterion.
This point is generally identified at a location in a given program coupled with the subset
of variables of program. This process in which program slices are computed is called
program slicing. Weiser was the person who gave the original definition of program slice
in 1979. Since its first definition, many ideas related to the program slice have been
formulated along with the numerous numbers of techniques to compute program slice.
Meanwhile, distinction between the static slice and dynamic slice was also made.
Program slicing is now among the most useful techniques that can fetch the particular
elements of a program which are related to a particular computation. Quite a large
numbers of variants for the program slicing have been analyzed along with the
algorithms to compute the slice. Model based slicing split the large architectures of
software into smaller sub models during early stages of SDLC. Software testing is
regarded as an activity to evaluate the functionality and features of a system. It verifies
whether the system is meeting the requirement or not. A common practice now is to
extract the sub models out of the giant models based upon the slicing criteria. Process of
model based slicing is utilized to extract the desired lump out of slice diagram. This
specific survey focuses on slicing techniques in the fields of numerous programing
paradigms like web applications, object oriented, and components based. Owing to the
efforts of various researchers, this technique has been extended to numerous other
platforms that include debugging of program, program integration and analysis, testing
and maintenance of software, reengineering, and reverse engineering. This survey
portrays on the role of model based slicing and various techniques that are being taken
on to compute the slices.
Running head: CRIME ANALYSIS 1
CRIME ANALYSIS TECHNOLOGY 2
Crime analysis is a function that usually involves the systemic analysis in identifying as well as analyzing the crime patterns and trends. Crime analysis is very important for law enforcement agencies as it helps law enforcers effectively deploy the available resources in a better and effective manner, which enables them to identify and apprehend suspects. Crime analysis is also very significant when it comes to arriving at solutions devised to come up with the right solution to solve the current crime problem and issues as well as coming up with the right prevention strategies. Since the year 2014, crime rates in the USA have increased steadily as per a study done by USAFacts, which is a non-partisan initiative (Osborne & Wernicke, 2013). With this increase in crime rates, which has majorly resulted in massive growth in technology, it is essential to come up with better means and ways of dealing with the increased crime rates. With the current advancement in technology, better law enforcement tools developed, which has enabled better crime deterrence in better and efficient ways. All this has been facilitated by the efforts of crime analysts who have come up with better tools and thus enabling the law enforcers to better deal with the crimes (Osborne & Wernicke, 2013). In this paper, I will consider the application of crime analysis technology and techniques in fighting crimes. Application of crime analysis technology and techniques used to make crime analysis more accurate and efficient.
Currently, the two technological tools that are used in predictive policing software have enabled security agencies to effectively use predictive policing ("Crime Analysis: Fighting Crime with Data," 2017). Application of this software has enabled better crime prevention as with data obtained in the previous crimes have been used to predict possible future severe crimes in a specific area.
Through the adoption and use of crime analysis, law enforcement agencies have been able to fight against crimes as when compared with the past effectively. The use of crime analysis comes at the right time, where there has been an increase in crime rates in the current digital error. In a survey done by Wynyard group in 2015, the study revealed that for every 10 law enforcement officials 9 of them believe that the use of current technology in crime analysis has had positive effects in helping the agencies in solving crimes as they can identify essential links and trends in crimes ("Crime Analysis: Fighting Crime with Data," 2017). In the same way, other sectors have benefited from data analysis with spreadsheets, databases, and mapping, law enforcers have been able to use data analysis to come up with a better decision. Crime analysis ha ...
Running head: CRIME ANALYSIS 1
CRIME ANALYSIS TECHNOLOGY 2
Crime analysis is a function that usually involves the systemic analysis in identifying as well as analyzing the crime patterns and trends. Crime analysis is very important for law enforcement agencies as it helps law enforcers effectively deploy the available resources in a better and effective manner, which enables them to identify and apprehend suspects. Crime analysis is also very significant when it comes to arriving at solutions devised to come up with the right solution to solve the current crime problem and issues as well as coming up with the right prevention strategies. Since the year 2014, crime rates in the USA have increased steadily as per a study done by USAFacts, which is a non-partisan initiative (Osborne & Wernicke, 2013). With this increase in crime rates, which has majorly resulted in massive growth in technology, it is essential to come up with better means and ways of dealing with the increased crime rates. With the current advancement in technology, better law enforcement tools developed, which has enabled better crime deterrence in better and efficient ways. All this has been facilitated by the efforts of crime analysts who have come up with better tools and thus enabling the law enforcers to better deal with the crimes (Osborne & Wernicke, 2013). In this paper, I will consider the application of crime analysis technology and techniques in fighting crimes. Application of crime analysis technology and techniques used to make crime analysis more accurate and efficient.
Currently, the two technological tools that are used in predictive policing software have enabled security agencies to effectively use predictive policing ("Crime Analysis: Fighting Crime with Data," 2017). Application of this software has enabled better crime prevention as with data obtained in the previous crimes have been used to predict possible future severe crimes in a specific area.
Through the adoption and use of crime analysis, law enforcement agencies have been able to fight against crimes as when compared with the past effectively. The use of crime analysis comes at the right time, where there has been an increase in crime rates in the current digital error. In a survey done by Wynyard group in 2015, the study revealed that for every 10 law enforcement officials 9 of them believe that the use of current technology in crime analysis has had positive effects in helping the agencies in solving crimes as they can identify essential links and trends in crimes ("Crime Analysis: Fighting Crime with Data," 2017). In the same way, other sectors have benefited from data analysis with spreadsheets, databases, and mapping, law enforcers have been able to use data analysis to come up with a better decision. Crime analysis ha.
Roles, Benefits and Challenges of Forensic Facial Image Comparison and the Ni...ijtsrd
Globalization has not only ushered in tremendous changes in the global economic and political arena, it has turned the world into a global village. This is to the extent that event in one part of the world replicates itself in other parts. Of note is the introduction and use of forensics in criminal justice system which has taken roots in some nations of the world while its advantages are yet to be fully utilized in some developing nations of Africa, particularly in Nigeria. This study therefore argued that forensic science, particularly forensic facial image comparison or identification, is now a common method of technology adopted in the administration of criminal justice as well as in the detection of crimes that would have been ordinarily difficult to unravel. The study, thus, situated the challenges or failures of unravelling some of the crimes, murders and assassinations committed in Nigeria in recent years to underutilization of forensics by the law enforcement agency, i.e., the police, in its investigations. The study sees this as one of the factors that rendered the country’s criminal justice system ineffective in prosecuting an alleged offender and exonerating the innocent. This study adopted the historical and explorative research designs in its methodological component. This means that the study relied on secondary sources of data via textbooks, journal articles, official documents and internet sources for relevant literatures. The study proffered some strategies that would improve forensic techniques, particularly forensic facial image comparison identification, which can be used to boost the criminal justice system in Nigeria. Oluka, Nduka Lucas | Igwe, Elijah Onyedikachi | Ativie, C. Ailende "Roles, Benefits and Challenges of Forensic Facial Image Comparison and the Nigerian Criminal Justice System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30523.pdf Paper Url :https://www.ijtsrd.com/management/randd-management/30523/roles-benefits-and-challenges-of-forensic-facial-image-comparison-and-the-nigerian-criminal-justice-system/oluka-nduka-lucas
The Urgency of Electronic Notarization in Indonesia by Seeing the Implementat...AJHSSR Journal
ABSTRACT: This study aims to compare the making of a notary deed during the Covid-19 period in
Indonesia and Estonia. Normative juridical law research is the method employed in this research. Analytical
descriptive was further also utilized, while the data collection technique used is literature study. The results of
the study indicated the importance of making supporting or additional regulations for Law Number 30 of 2004
concerning Notary Positions as amended by Law Number 2 of 2014 concerning Amendments to Law Number
30 of 2004 concerning Notary Positions ("Notary Position Law") in connection with by making an authentic
deed which is carried out without physical presence, which facilitates Notaries to carry out their positions in
times of emergency such as the current Covid-19. In response to this, Estonia, which is also a Civil Law
country, has fulfilled the element of legal expediency by amending the Notaries Act of the Republic of Estonian
("Estonian Notaries Act") which makes it possible to make a notarial deed without a physical presence or to do
it virtually.
KEYWORDS : Cyber notary, Electronic Notarization, Estonia, Indonesia, Notary Deed.
Developing a Crime Mapping GIS System For Law Enforcement: A Case Study of Ow...Editor IJCATR
This paper examines the use of GIS in the development of a crime analysis information system for the Nigeria police. In recent times, criminality has been on the increase with criminals using new and more sophisticated ways to commit crime; resulting to fear and restlessness among the citizens. They police have found it difficult to manage and control these crimes largely due to the obsolete methods and resources they employ in doing so. The purpose of this study is to see how the Nigerian Police Force can adopt the use of crime maps in its operations and reap the benefits. The system will help the police in the analysis of crimes which will lead to crime hotspots identification. Using ArcGIS Software 10.0, we created a digital land use map of crime hotspots in the area and a crime-geospatial database. The results of the spatial analysis and a 500m buffering done on the data shows that areas that are more vulnerable to crime, have no police stations situated around them. This study shows that a GIS based Information system will give the police better insights into crime mapping and analysis which will be a tool to help them effectively manage and combat crime. This study recommends full government involvement in the area of human personnel and infrastructure development for the police to effectively change from the traditional to GIS based ways of combating crime.
10 Criminology in the FutureCriminology in the FutureKristop.docxhyacinthshackley2629
10 Criminology in the Future
Criminology in the Future
Kristopher Freitag, Javielle Watson, Michael Westphal, Starcia Zeigler
CJA/314
April 7, 2014
Judy Mazzucca
Technology is advancing in every aspect of the criminal justice system, from the investigation to the prosecution of the crimes. Crime fighting methodologies have the potential to greatly assist law enforcement in the war on crime. Some experts even think that some software and tools will be able to help prevent crime. (Yeung, n.d.). Methodologies, such as mandating DNA collection programs, biometrics, and implementing cybercrime spyware programs are on the list of the next big things of the future, when it comes to fighting crime. DNA testing helps law enforcement investigate and prosecute crimes, as well as clear the names of those who have been wrongfully convicted. There are currently about twenty states with laws requiring DNA collection at the time of the person’s arrest. The federal government also has this requirement. As, with any controversial subject, DNA testing has its critics. Some are saying that DNA testing is in violation of the Fourth Amendment, especially for those who have not been convicted of a crime. Others are concerned that DNA testing may open the doors for abuse of the genetic information being stored in the databases. (Berson, n.d.). Biometrics are automated methods of recognizing a person based on physiological or behavioral characteristics. Some of the features measured using biometrics are handwriting, voice, iris, hand geometry, vein, retinal, and fingerprints. Biometric based solutions provide personal data privacy, and confidential financial transactions, and are starting to become the foundation of an extensive array of highly secure identification and personal verification solutions. The need for highly secure identification and personal verification technologies is great, due to the increased number of transaction fraud and security breaches. This need is especially great in the areas of local, state, and federal governments. Infrastructures such as electronic banking, health and social services, law enforcement, and retail sales are already taking advantage of, and seeing the benefits of biometric technology. ("The Biometrics Consortium", n.d.).
As we become more and more dependent on technology, the increase of cybercrimes are skyrocketing, which has forced law enforcement to figure out ways of combatting cybercrimes. We have become extremely vulnerable to many cybercrimes, including social media fraud, which consists of cyber criminals using social media to steal the identities of unsuspecting people; and luring people to download malicious materials, or reveal their passwords; corporate security breaches, which consists of cyber criminals exploiting company employees via scams; and phishing, which involves cyber criminals targeting company employees by sending emails that appear to be from someone within the company. ("Homeland .
An application development for police stations in pakistanSalam Shah
Program slice is the part of program that may take the program off the path of the
desired output at some point of its execution. Such point is known as the slicing criterion.
This point is generally identified at a location in a given program coupled with the subset
of variables of program. This process in which program slices are computed is called
program slicing. Weiser was the person who gave the original definition of program slice
in 1979. Since its first definition, many ideas related to the program slice have been
formulated along with the numerous numbers of techniques to compute program slice.
Meanwhile, distinction between the static slice and dynamic slice was also made.
Program slicing is now among the most useful techniques that can fetch the particular
elements of a program which are related to a particular computation. Quite a large
numbers of variants for the program slicing have been analyzed along with the
algorithms to compute the slice. Model based slicing split the large architectures of
software into smaller sub models during early stages of SDLC. Software testing is
regarded as an activity to evaluate the functionality and features of a system. It verifies
whether the system is meeting the requirement or not. A common practice now is to
extract the sub models out of the giant models based upon the slicing criteria. Process of
model based slicing is utilized to extract the desired lump out of slice diagram. This
specific survey focuses on slicing techniques in the fields of numerous programing
paradigms like web applications, object oriented, and components based. Owing to the
efforts of various researchers, this technique has been extended to numerous other
platforms that include debugging of program, program integration and analysis, testing
and maintenance of software, reengineering, and reverse engineering. This survey
portrays on the role of model based slicing and various techniques that are being taken
on to compute the slices.
Running head: CRIME ANALYSIS 1
CRIME ANALYSIS TECHNOLOGY 2
Crime analysis is a function that usually involves the systemic analysis in identifying as well as analyzing the crime patterns and trends. Crime analysis is very important for law enforcement agencies as it helps law enforcers effectively deploy the available resources in a better and effective manner, which enables them to identify and apprehend suspects. Crime analysis is also very significant when it comes to arriving at solutions devised to come up with the right solution to solve the current crime problem and issues as well as coming up with the right prevention strategies. Since the year 2014, crime rates in the USA have increased steadily as per a study done by USAFacts, which is a non-partisan initiative (Osborne & Wernicke, 2013). With this increase in crime rates, which has majorly resulted in massive growth in technology, it is essential to come up with better means and ways of dealing with the increased crime rates. With the current advancement in technology, better law enforcement tools developed, which has enabled better crime deterrence in better and efficient ways. All this has been facilitated by the efforts of crime analysts who have come up with better tools and thus enabling the law enforcers to better deal with the crimes (Osborne & Wernicke, 2013). In this paper, I will consider the application of crime analysis technology and techniques in fighting crimes. Application of crime analysis technology and techniques used to make crime analysis more accurate and efficient.
Currently, the two technological tools that are used in predictive policing software have enabled security agencies to effectively use predictive policing ("Crime Analysis: Fighting Crime with Data," 2017). Application of this software has enabled better crime prevention as with data obtained in the previous crimes have been used to predict possible future severe crimes in a specific area.
Through the adoption and use of crime analysis, law enforcement agencies have been able to fight against crimes as when compared with the past effectively. The use of crime analysis comes at the right time, where there has been an increase in crime rates in the current digital error. In a survey done by Wynyard group in 2015, the study revealed that for every 10 law enforcement officials 9 of them believe that the use of current technology in crime analysis has had positive effects in helping the agencies in solving crimes as they can identify essential links and trends in crimes ("Crime Analysis: Fighting Crime with Data," 2017). In the same way, other sectors have benefited from data analysis with spreadsheets, databases, and mapping, law enforcers have been able to use data analysis to come up with a better decision. Crime analysis ha ...
Running head: CRIME ANALYSIS 1
CRIME ANALYSIS TECHNOLOGY 2
Crime analysis is a function that usually involves the systemic analysis in identifying as well as analyzing the crime patterns and trends. Crime analysis is very important for law enforcement agencies as it helps law enforcers effectively deploy the available resources in a better and effective manner, which enables them to identify and apprehend suspects. Crime analysis is also very significant when it comes to arriving at solutions devised to come up with the right solution to solve the current crime problem and issues as well as coming up with the right prevention strategies. Since the year 2014, crime rates in the USA have increased steadily as per a study done by USAFacts, which is a non-partisan initiative (Osborne & Wernicke, 2013). With this increase in crime rates, which has majorly resulted in massive growth in technology, it is essential to come up with better means and ways of dealing with the increased crime rates. With the current advancement in technology, better law enforcement tools developed, which has enabled better crime deterrence in better and efficient ways. All this has been facilitated by the efforts of crime analysts who have come up with better tools and thus enabling the law enforcers to better deal with the crimes (Osborne & Wernicke, 2013). In this paper, I will consider the application of crime analysis technology and techniques in fighting crimes. Application of crime analysis technology and techniques used to make crime analysis more accurate and efficient.
Currently, the two technological tools that are used in predictive policing software have enabled security agencies to effectively use predictive policing ("Crime Analysis: Fighting Crime with Data," 2017). Application of this software has enabled better crime prevention as with data obtained in the previous crimes have been used to predict possible future severe crimes in a specific area.
Through the adoption and use of crime analysis, law enforcement agencies have been able to fight against crimes as when compared with the past effectively. The use of crime analysis comes at the right time, where there has been an increase in crime rates in the current digital error. In a survey done by Wynyard group in 2015, the study revealed that for every 10 law enforcement officials 9 of them believe that the use of current technology in crime analysis has had positive effects in helping the agencies in solving crimes as they can identify essential links and trends in crimes ("Crime Analysis: Fighting Crime with Data," 2017). In the same way, other sectors have benefited from data analysis with spreadsheets, databases, and mapping, law enforcers have been able to use data analysis to come up with a better decision. Crime analysis ha.
Roles, Benefits and Challenges of Forensic Facial Image Comparison and the Ni...ijtsrd
Globalization has not only ushered in tremendous changes in the global economic and political arena, it has turned the world into a global village. This is to the extent that event in one part of the world replicates itself in other parts. Of note is the introduction and use of forensics in criminal justice system which has taken roots in some nations of the world while its advantages are yet to be fully utilized in some developing nations of Africa, particularly in Nigeria. This study therefore argued that forensic science, particularly forensic facial image comparison or identification, is now a common method of technology adopted in the administration of criminal justice as well as in the detection of crimes that would have been ordinarily difficult to unravel. The study, thus, situated the challenges or failures of unravelling some of the crimes, murders and assassinations committed in Nigeria in recent years to underutilization of forensics by the law enforcement agency, i.e., the police, in its investigations. The study sees this as one of the factors that rendered the country’s criminal justice system ineffective in prosecuting an alleged offender and exonerating the innocent. This study adopted the historical and explorative research designs in its methodological component. This means that the study relied on secondary sources of data via textbooks, journal articles, official documents and internet sources for relevant literatures. The study proffered some strategies that would improve forensic techniques, particularly forensic facial image comparison identification, which can be used to boost the criminal justice system in Nigeria. Oluka, Nduka Lucas | Igwe, Elijah Onyedikachi | Ativie, C. Ailende "Roles, Benefits and Challenges of Forensic Facial Image Comparison and the Nigerian Criminal Justice System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30523.pdf Paper Url :https://www.ijtsrd.com/management/randd-management/30523/roles-benefits-and-challenges-of-forensic-facial-image-comparison-and-the-nigerian-criminal-justice-system/oluka-nduka-lucas
The Urgency of Electronic Notarization in Indonesia by Seeing the Implementat...AJHSSR Journal
ABSTRACT: This study aims to compare the making of a notary deed during the Covid-19 period in
Indonesia and Estonia. Normative juridical law research is the method employed in this research. Analytical
descriptive was further also utilized, while the data collection technique used is literature study. The results of
the study indicated the importance of making supporting or additional regulations for Law Number 30 of 2004
concerning Notary Positions as amended by Law Number 2 of 2014 concerning Amendments to Law Number
30 of 2004 concerning Notary Positions ("Notary Position Law") in connection with by making an authentic
deed which is carried out without physical presence, which facilitates Notaries to carry out their positions in
times of emergency such as the current Covid-19. In response to this, Estonia, which is also a Civil Law
country, has fulfilled the element of legal expediency by amending the Notaries Act of the Republic of Estonian
("Estonian Notaries Act") which makes it possible to make a notarial deed without a physical presence or to do
it virtually.
KEYWORDS : Cyber notary, Electronic Notarization, Estonia, Indonesia, Notary Deed.
Developing a Crime Mapping GIS System For Law Enforcement: A Case Study of Ow...Editor IJCATR
This paper examines the use of GIS in the development of a crime analysis information system for the Nigeria police. In recent times, criminality has been on the increase with criminals using new and more sophisticated ways to commit crime; resulting to fear and restlessness among the citizens. They police have found it difficult to manage and control these crimes largely due to the obsolete methods and resources they employ in doing so. The purpose of this study is to see how the Nigerian Police Force can adopt the use of crime maps in its operations and reap the benefits. The system will help the police in the analysis of crimes which will lead to crime hotspots identification. Using ArcGIS Software 10.0, we created a digital land use map of crime hotspots in the area and a crime-geospatial database. The results of the spatial analysis and a 500m buffering done on the data shows that areas that are more vulnerable to crime, have no police stations situated around them. This study shows that a GIS based Information system will give the police better insights into crime mapping and analysis which will be a tool to help them effectively manage and combat crime. This study recommends full government involvement in the area of human personnel and infrastructure development for the police to effectively change from the traditional to GIS based ways of combating crime.
10 Criminology in the FutureCriminology in the FutureKristop.docxhyacinthshackley2629
10 Criminology in the Future
Criminology in the Future
Kristopher Freitag, Javielle Watson, Michael Westphal, Starcia Zeigler
CJA/314
April 7, 2014
Judy Mazzucca
Technology is advancing in every aspect of the criminal justice system, from the investigation to the prosecution of the crimes. Crime fighting methodologies have the potential to greatly assist law enforcement in the war on crime. Some experts even think that some software and tools will be able to help prevent crime. (Yeung, n.d.). Methodologies, such as mandating DNA collection programs, biometrics, and implementing cybercrime spyware programs are on the list of the next big things of the future, when it comes to fighting crime. DNA testing helps law enforcement investigate and prosecute crimes, as well as clear the names of those who have been wrongfully convicted. There are currently about twenty states with laws requiring DNA collection at the time of the person’s arrest. The federal government also has this requirement. As, with any controversial subject, DNA testing has its critics. Some are saying that DNA testing is in violation of the Fourth Amendment, especially for those who have not been convicted of a crime. Others are concerned that DNA testing may open the doors for abuse of the genetic information being stored in the databases. (Berson, n.d.). Biometrics are automated methods of recognizing a person based on physiological or behavioral characteristics. Some of the features measured using biometrics are handwriting, voice, iris, hand geometry, vein, retinal, and fingerprints. Biometric based solutions provide personal data privacy, and confidential financial transactions, and are starting to become the foundation of an extensive array of highly secure identification and personal verification solutions. The need for highly secure identification and personal verification technologies is great, due to the increased number of transaction fraud and security breaches. This need is especially great in the areas of local, state, and federal governments. Infrastructures such as electronic banking, health and social services, law enforcement, and retail sales are already taking advantage of, and seeing the benefits of biometric technology. ("The Biometrics Consortium", n.d.).
As we become more and more dependent on technology, the increase of cybercrimes are skyrocketing, which has forced law enforcement to figure out ways of combatting cybercrimes. We have become extremely vulnerable to many cybercrimes, including social media fraud, which consists of cyber criminals using social media to steal the identities of unsuspecting people; and luring people to download malicious materials, or reveal their passwords; corporate security breaches, which consists of cyber criminals exploiting company employees via scams; and phishing, which involves cyber criminals targeting company employees by sending emails that appear to be from someone within the company. ("Homeland .
Community Policing and National Security A Study of Selected Local Government...ijtsrd
The rising crime rate, especially violent crime involving terrorism, armed robbery, Fulani herdsmen attack, banditry, ritual murders, political assassinations, ethnic and religious violence, kidnapping, pipe line vandalism, election violence are becoming very serious problem to the Nigerian society. Aristotle Isaac Jacobs "Community Policing and National Security: A Study of Selected Local Government Areas in Bayelsa State, Nigeria" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1 , December 2020, URL: https://www.ijtsrd.com/papers/ijtsrd38204.pdf Paper URL : https://www.ijtsrd.com/humanities-and-the-arts/social-science/38204/community-policing-and-national-security-a-study-of-selected-local-government-areas-in-bayelsa-state-nigeria/aristotle-isaac-jacobs
Law Enforcement against the Crime of Fraud through Funds Transfer Study at Po...ijtsrd
Fraud using SMS short message services is usually carried out by perpetrators by sending SMS to random recipients using a send to many system more than one recipient of the message or some kind of broadcast message. Then the perpetrator waits for several responses which are then followed up with lies and ruses so that the victim transfers some money. A crime that is still a complex problem is that criminals use SMS as a medium to find victims with the mode of asking the victim to transfer a certain amount of money with certain tricks until the potential victim actually follows the perpetrators wishes. Based on this description, the authors found problems in this research, namely legal arrangements regarding the criminal act of fraud through the transfer of funds in Indonesia, law enforcement against the crime of fraud through the transfer of funds at the Medan Polrestabes. The purpose of the study is to find out the legal arrangements regarding the criminal act of fraud through the transfer of funds in Indonesia, to find out law enforcement against the crime of fraud through the transfer of funds at the Medan Polrestabes. The research method used is normative juridical research positive law , data collection techniques are conducting library research by reading books, scientific works, legislation, lecture materials, as well as through internet media websites , field research by conducting interviews with The related party is the Medan City Resort Police. From the results of the research conducted, the authors conclude that the legal regulation regarding the criminal act of fraud through the transfer of funds in Indonesia is Article 378 of the Criminal Code, the threat of which is a maximum of 4 years in prison, Article 28 paragraph 1 of Law Number 19 of 2016 concerning Amendments to Laws Law Number 11 of 2008 concerning Information and Electronic Transactions, Article 82 of Law Number 11 of 2011 concerning Transfer of Funds, imprisonment for a maximum of 4 four years and or a fine of a maximum of Rp. 1,000,000,000.00 one billion rupiahs . Law enforcement against criminal acts of fraud through transfer of funds at the Medan Polrestabes conducted an investigation into SMS media fraud with the mode of transfer of funds, officers immediately asked for the perpetrators data to find out the identity of the perpetrator. Investigators study the traces left by the perpetrators, complete the facilities and infrastructure at the Medan Besar City Resort Police such as cyber tools and improve the ability of members related to technology understanding. The next legal process is the trial process. H. Lawali Hasibuan | Alvin Hamzah "Law Enforcement against the Crime of Fraud through Funds Transfer (Study at Polrestabes Medan)" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-7 , December 2022, URL: https://www.ijtsrd.com/papers/ijtsrd52473.pdf Paper URL: https://www.ijtsrd.com/other-s
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Use of Scientific and Modern Techniques in Forensic Science and Their Utility...ijtsrd
Forensic Science is one of the most important parcel of a criminal investigation since it is precise, accurate and increases the chances of success of an investigation or trial. Because of its analytical nature, it plays a vital role in the criminal justice system. It helps the court to arrive at a logical conclusion. In turn, it reduces the chances of any injustice. It is extensively used worldwide today. Forensic science is not an individual subject but it is an umbrella term that consists of other disciplines of science and touches almost every boundary of medical subjects. It is an exercise of common sense coupled with the experience and knowledge already acquired from other branches of medicine, obstetrics, and surgery. Forensic evidence is a discipline that functions within the parameters of the legal system. Its purpose is to provide guidance to those conducting criminal investigation and to supply to courts accurate information upon which they can rely in resolving criminal and civil disputes. The present paper aims at to explore the applicability of use of scientific and modern techniques in forensic science in criminal investigation and what role it plays in keeping law and order in a society. This paper also throws light on the legislative frame with regard to applicability of forensic science in criminal justice with the help of case laws. Sanjeev Kumar | Deeksha "Use of Scientific and Modern Techniques in Forensic Science and Their Utility in Criminal Justice System: An Indian Perspective" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-6 , October 2020, URL: https://www.ijtsrd.com/papers/ijtsrd35703.pdf Paper Url: https://www.ijtsrd.com/management/law-and-management/35703/use-of-scientific-and-modern-techniques-in-forensic-science-and-their-utility-in-criminal-justice-system-an-indian-perspective/sanjeev-kumar
Running Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS .docxtodd271
Running Head: CRIMINOLOGY USE OF COMPUTER APPLICATIONS 2
CRIMINOLOGY USE OF COMPUTER APPLICATIONS 2
In the wake of technological advances, the use of computers has played a major role especially in criminal justice (Moriarty, (2017). This paper has focused on the use of computer application technologies in criminology and the potential it has in legal systems. From enabling easy access for witnesses to search for accused peoples’ photographs on the screen and go through the whole court procedural activities. Moreover, criminals’ records can be monitored using databases and it is easy to make a follow-up on crimes they have committed in the past and the charges against them. Forensics can also be conducted and investigations can now be carried out easily and very fast. Also, when one is linked to cases, they can be easily identified using forensics and fingerprints. Portable laptops have also helped police officers in getting information and any important details related to a crime at any place without having to go back to their working stations. James (2017), argues that unlike in the past, investigations are done faster due to internet connections and ease of communication between community members and investigative officers through the use of phone gadgets.
Computers have broad variance in usage which has been enhanced by computer applications. For instance, massive record keeping systems have relied for reference on criminal accounts, case records and unresolved warranties. Incorporation of technology in criminology has just made the career easy and also improved livelihoods. Many police units now use computerized applications to keep up with the ever-rising crimes. There are different applications being used nowadays, from mobile technology, to use in-car computers, CCTV camera installations and also software such as the Computer Aided Dispatch. Investigators often use programmed record management systems to monitor information they obtain and guard it properly. With the current technology, it is possible to detect impending crimes, track stolen goods and the culprits, tell which time a crime occurred and also who committed it and where.
Computer applications:
1. In-Car Computer installations in police cars.
Blumstein (2018), contends that this application that allows traffic patrol police to effectively carry out their activities especially when vehicles violate traffic rules. In the current world, things are drifting toward being more computerized than handwritten (Maxfield & Babbie, 2014). Thus event arrest reports are being typed. It also means that after traffic references are written down, they are generated by the computers installed duplicating a copy to the person who breaks the rules. This is seen to reduce paperwork and improve the efficiency of police officers' work.
2. Computer Aided Dispatch
In the past, correspondents would use hand.
150 words agree or disagreeFuture Criminal Intelligence Enviro.docxdrennanmicah
150 words agree or disagree
Future Criminal Intelligence Environment:
It might seem that the criminal environment has not changed, as both personal and property crimes are the part of everyday routine of law enforcement. At the same time, technological development has provided new possibilities for criminals by allowing them to steal and commit fraud at bigger scale. Future criminal intelligence environment will revolve around technologies, virtual space, and ICT. According to the current trends, high-tech crimes are growing exponentially with the inability of law enforcement to prevent or address them at once (Zavrsnik, 2010). According to the analysis of cybercrime worldwide, investigation of cybercrime has multiple barriers, including the lack of correspondence among different international agencies concerning the legal prosecution, limited number of skilled talent in law enforcement, and absence of effective methods that would allow to find and prosecute offenders (Brown, 2015). As a result, the criminals continue committing identity thefts, spreading dangerous viruses (e.g. ransomware), phishing, and hacking. Since the technologies will continue to improve and update, it is more likely that the criminals will alter their tactics. The main goal of the modern law enforcement is to prepare for the future tendencies by investing in cybercrime department, training talent, and researching the newest trends in cybercrime. Since this type of crime threatens the individual citizens as well as the entire countries, the law enforcement agencies must ensure that the organized crime does not feel comfortable in the virtual space, which can be observed today.
Intelligence Analytics:
Tools and techniques in intelligence analysis might vary across the analysts, systems, and countries. Since today analysts deal with the intelligence presented in a variety of forms, including the digital one, the methods of analysis can be different. For example, basic analytical process usually includes the following steps: collect and sift all available data, construct a preliminary diagram, evaluate new information in light of old data, collect further information, develop preliminary inferences, develop conclusions, assemble a report (United Nations, 2011). This structure can vary according to the available intelligence, protocol of assembling the data, and the scheme used by a specific agency. Several basic techniques of data analysis include event charting, link, flow, and telephone analyses (Berlusconi et al., 2016). These methods are used according to the specific events, goals, and available data. Several software are used today to analyze intelligence and information, including Law Enforcement Specific GIS, RMC and CAD information exchange. Analysis is more effective if the officers have a wide variety of data. For example, today, the agencies can use social media analysis as one of the effective tools in data mining. For instance, a research exploring inte.
The Authority of Government in Clearing Hatefull and Hostilities Electronic I...IJECEIAES
The Act Number 19 of 2016 concerning the amendment of The Act Number 11 of 2008 concerning Information and Electronic Transaction governing the authority of government in clearing hateful and hostilities electronic information based on tribe, religion, race and intergroup. On the one hand, the government authority aims to protect the public interest and the integrity of the nation, but on the other hand, termination of access to information would restrict the right to freedom of opinion and the right to privacy of Internet users. This study was a normative legal research, which examined the basic authority for the government to shut down negative content in cyberspace. Legal materials were collected through library research. The analysis was conducted qualitatively. This study examined three issues, namely; spreading hatred and hostility in cyberspace, legality government to close the spreading hatred and hostility and electronic evidence in spreading hatred and hostility. Spreading hatred and hostility were criminal acts that used the Internet as facilities. Internet was used by extremists to disseminate his teachings, even being used to commit acts of terrorism (cyber terrorism). In maintaining the unity and integrity, then the government had the authority to shut down access to the unlawful electronic system. The closure should be accompanied by proof of electronic information that contains hatred and hostility based on tribe, religion, race and intergroup.
Abstract- This study aims to describe sybercrime cases that have the potential to become criminal acts on social media that are closely related to
the ITE Law. The aim is to find out what actions have the potential to violate the ITe Law carried out on social media which are included in
cybercrime behavior. In addition, the author examines the effectiveness of this law in resolving criminal cases that occur on the internet, which
is so complex and has various modes. The method used in this research is qualitative by conducting a literature study. As a result, the
researchers found that the types of cyber crimes varied, ranging from hecking, spreading hoaxes, defamation, hate speech, and cases of
spreading pornography/immoral acts. Furthermore, this study observes that the ITE Law which is used as a legal instrument is still inadequate
considering the complexity of the problems that occur in cybercrime and modes of crime that accompany it.
Critical Analysis of Admissibility of Forensic Evidence in the Indian Crimina...ijtsrd
is believed that forensics plays an important role in finding out the criminal and it has been legally operated. Forensic is a process by which it helps in the discovery of the crime and the criminal. The admissibility of evidence by the forensic experts and their analysis of a particular crime can be done in accordance with the evidence law. The forensic experts play an important role by following certain techniques by collecting the particular materials from the crime scene and preserving them further to investigate the crime. The collected materials will be categorized by the forensic experts which in turn helps to find the crime. In certain circumstances, the collection and preservation of the materials are not done by the experts properly as to a lack of knowledge or the influence of the external elements. Further, there are certain legal constraints in accordance with the criminal investigation being carried out by the experts and the officials. The legal constraints start from the discovery, search, and protection of forensic evidence till the investigation. This affects the proper legal action against the criminal and the evidence which are supposed to be produced in the court of law. The researcher would analyse the admissibility of evidence in a court of law as to its relevance, authenticity, and issue on it as evidence is subject to the legal constraints and its applicability of it. Nanda Kishore M "Critical Analysis of Admissibility of Forensic Evidence in the Indian Criminal Justice System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-3 , April 2022, URL: https://www.ijtsrd.com/papers/ijtsrd49788.pdf Paper URL: https://www.ijtsrd.com/other-scientific-research-area/other/49788/critical-analysis-of-admissibility-of-forensic-evidence-in-the-indian-criminal-justice-system/nanda-kishore-m
Dr.sc.Mensut Ademi The role of police reducing the fear of crimePresentation....AdeaAdemi1
Summary: 1. Introduction. – 2. The Social-Psychological Model of Fear of Criminality. – 3. Law Enforcement Agencies. – 4. Results and Discussions. – 5. Confronting The Fear of Crime. – 6. Role of Politics and Media and Fear of Crime. – 7. Conclusions.
Keywords: Fear of Crime, Police, Community Policing, Neighbourhood, Situation.
Abstract
The feeling of fear of crime is a condition created in the hearts of many citizens, both in urban and rural areas, in war or peace, and the goal of many international researchers in the field of criminology is to evaluate it. This article is broken into three parts. The first part introduces the factors that explain the fear of crime, a including socio-demographic and social-psychological model by A. van der Wurff, L. van Staalduinen, and P. Stringer. The second part provides an overview of paradoxes and inconsistencies in the literature regarding fear of crime and the police’s role in reducing the fear of crime. Discussing public, political, and media perceptions of the role of police, and these perceptions’ implications for possible ways the police can increase feelings of security. Finally, it covers measures that can reduce fear of crime.
The police presence in dangerous areas with criminal influence is an important factor to reduce the fear of crime. Citizens continue to make more demands of the police to fight crime, and this task is directed mainly at community policing.
Alleviation of the fear of crime comes with the preventive actions of the police. They believe their presence in a neighbourhood calms the situation. For citizens, on the other hand, police presence can be seen as an indicator of an unsafe, tense, or disorderly situation.
The effect of Institutional Ownership, Sales Growth and Profitability on Tax ...AJHSSR Journal
ABSTRACT: This research aims to test, analyze and obtain empirical evidence about the influence of
institutional ownership, sales growth and profitability on tax avoidance. The object of this research is
manufacturing companies in the consumer goods industry sector listed on the Indonesia Stock Exchange (BEI)
in 2018-2022. This research used quantitative research methods and causal research design. The sampling
technique in this research used non-probability sampling with purposive sampling as the basis for determining
the sample so that a sample of 55 samples was obtained. The data used is secondary data obtained from the
official website of the Indonesia Stock Exchange (BEI) during the 2018-2022 period. The data analysis method
used was multiple linear regression analysis with several tests such as descriptive statistical tests, classical
assumption tests, and hypothesis testing using SPSS version 26 statistical software. The results showed that the
institutional ownership variable has no effect on tax avoidance, while the sales growth and profitability has a
negative and significant effect on tax avoidance.
KEYWORDS: Institutional Ownership, Sales Growth, Profitability, Tax Avoidance
MGA ESTRATEHIYA SA PAGTUTURO KAUGNAY SA PASALITANG PARTISIPASYON NG MGA MAG-A...AJHSSR Journal
ABSTRAK: Ang mga estratehiya sa pagtuturo ay mahalagang kasangkapan sa paghahatid ng mabisang
pagtuturo sa loob ng silid. Tinukoy sa pag-aaral na ito ang antas ng kagustuhan ng mga mag-aaral sa pagsasadula,
pangkatang talakayan at paggawa ng mga koneksyon sa tunay na karanasan sa buhay bilang mga estratehiya sa
pagtuturo ng panitikan sa Filipino at pasalitang partisipasyon ng mga mag-aaral sa Baitang 7 ng Misamis
University Junior High School, Ozamiz City. Ang ginamit na disenyo sa pananaliksik na ito ay deskriptivcorrelational. Ang mga datos sa pag-aaral ay nagmula sa kabuuang populasyon na 120 na mag-aaral at tatlong
mga guro na tagamasid sa pasalitang partisipasyon ng mga mag-aaral. Ang Talatanungan sa Kagamitan sa
Pagtuturo ng Panitikan at Checklist batay sa Obserbasyon sa Pasalita na Partisipasyon ay ang instrumentong
ginamit sa pagkalap ng datos. Mean, standard deviation, Analysis of Variance at Pearson Product-Moment
Correlation Coefficient ang mga ginamit na estatistiko na sangkap. Inihayag sa naging resulta na ang tatlong piling
estratehiya sa pagtuturo ng panitikan sa Filipino ay may pinakamataas na antas ng kagustuhan ng mga mag-aaral.
Ang antas ng pakilahok ng mga mag-aaral sa paggamit ng tatlong estratehiya sa pagtuturo ng panitikan ay
pinakamataas na nagpapahiwatig na aktibong nakilahok ang mga mag-aaral sa mga gawain. Inihayag din na
walang makabuluhang kaibahan sa antas ng kagustuhan ng mga mag-aaral sa mga estratehiya sa pagtuturo ng
panitikan sa Filipino. Ito ay nangahulugan na gustong-gusto ng mga mag-aaral ang pagkakaroon ng mga
estratehiya sa pagtuturo. Walang makabuluhang kaugnayan ang kagustuhan sa mga estratehiya at antas ng
pakikilahok ng mga mag-aaral. Hindi nakaapekto sa kanilang pakikilahok ang anumang estratehiyang ginamit ng
guro.
KEYWORDS : estratehiya, karanasan, pagsasadula, pagtuturo, pangkatang talakayan
More Related Content
Similar to Obstacles to Investigators Using Electronic Information Technology in the Process of Investigations and Investigations to Disclose Criminal Acts of Persecution
Community Policing and National Security A Study of Selected Local Government...ijtsrd
The rising crime rate, especially violent crime involving terrorism, armed robbery, Fulani herdsmen attack, banditry, ritual murders, political assassinations, ethnic and religious violence, kidnapping, pipe line vandalism, election violence are becoming very serious problem to the Nigerian society. Aristotle Isaac Jacobs "Community Policing and National Security: A Study of Selected Local Government Areas in Bayelsa State, Nigeria" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1 , December 2020, URL: https://www.ijtsrd.com/papers/ijtsrd38204.pdf Paper URL : https://www.ijtsrd.com/humanities-and-the-arts/social-science/38204/community-policing-and-national-security-a-study-of-selected-local-government-areas-in-bayelsa-state-nigeria/aristotle-isaac-jacobs
Law Enforcement against the Crime of Fraud through Funds Transfer Study at Po...ijtsrd
Fraud using SMS short message services is usually carried out by perpetrators by sending SMS to random recipients using a send to many system more than one recipient of the message or some kind of broadcast message. Then the perpetrator waits for several responses which are then followed up with lies and ruses so that the victim transfers some money. A crime that is still a complex problem is that criminals use SMS as a medium to find victims with the mode of asking the victim to transfer a certain amount of money with certain tricks until the potential victim actually follows the perpetrators wishes. Based on this description, the authors found problems in this research, namely legal arrangements regarding the criminal act of fraud through the transfer of funds in Indonesia, law enforcement against the crime of fraud through the transfer of funds at the Medan Polrestabes. The purpose of the study is to find out the legal arrangements regarding the criminal act of fraud through the transfer of funds in Indonesia, to find out law enforcement against the crime of fraud through the transfer of funds at the Medan Polrestabes. The research method used is normative juridical research positive law , data collection techniques are conducting library research by reading books, scientific works, legislation, lecture materials, as well as through internet media websites , field research by conducting interviews with The related party is the Medan City Resort Police. From the results of the research conducted, the authors conclude that the legal regulation regarding the criminal act of fraud through the transfer of funds in Indonesia is Article 378 of the Criminal Code, the threat of which is a maximum of 4 years in prison, Article 28 paragraph 1 of Law Number 19 of 2016 concerning Amendments to Laws Law Number 11 of 2008 concerning Information and Electronic Transactions, Article 82 of Law Number 11 of 2011 concerning Transfer of Funds, imprisonment for a maximum of 4 four years and or a fine of a maximum of Rp. 1,000,000,000.00 one billion rupiahs . Law enforcement against criminal acts of fraud through transfer of funds at the Medan Polrestabes conducted an investigation into SMS media fraud with the mode of transfer of funds, officers immediately asked for the perpetrators data to find out the identity of the perpetrator. Investigators study the traces left by the perpetrators, complete the facilities and infrastructure at the Medan Besar City Resort Police such as cyber tools and improve the ability of members related to technology understanding. The next legal process is the trial process. H. Lawali Hasibuan | Alvin Hamzah "Law Enforcement against the Crime of Fraud through Funds Transfer (Study at Polrestabes Medan)" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-7 , December 2022, URL: https://www.ijtsrd.com/papers/ijtsrd52473.pdf Paper URL: https://www.ijtsrd.com/other-s
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Use of Scientific and Modern Techniques in Forensic Science and Their Utility...ijtsrd
Forensic Science is one of the most important parcel of a criminal investigation since it is precise, accurate and increases the chances of success of an investigation or trial. Because of its analytical nature, it plays a vital role in the criminal justice system. It helps the court to arrive at a logical conclusion. In turn, it reduces the chances of any injustice. It is extensively used worldwide today. Forensic science is not an individual subject but it is an umbrella term that consists of other disciplines of science and touches almost every boundary of medical subjects. It is an exercise of common sense coupled with the experience and knowledge already acquired from other branches of medicine, obstetrics, and surgery. Forensic evidence is a discipline that functions within the parameters of the legal system. Its purpose is to provide guidance to those conducting criminal investigation and to supply to courts accurate information upon which they can rely in resolving criminal and civil disputes. The present paper aims at to explore the applicability of use of scientific and modern techniques in forensic science in criminal investigation and what role it plays in keeping law and order in a society. This paper also throws light on the legislative frame with regard to applicability of forensic science in criminal justice with the help of case laws. Sanjeev Kumar | Deeksha "Use of Scientific and Modern Techniques in Forensic Science and Their Utility in Criminal Justice System: An Indian Perspective" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-6 , October 2020, URL: https://www.ijtsrd.com/papers/ijtsrd35703.pdf Paper Url: https://www.ijtsrd.com/management/law-and-management/35703/use-of-scientific-and-modern-techniques-in-forensic-science-and-their-utility-in-criminal-justice-system-an-indian-perspective/sanjeev-kumar
Running Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS .docxtodd271
Running Head: CRIMINOLOGY USE OF COMPUTER APPLICATIONS 2
CRIMINOLOGY USE OF COMPUTER APPLICATIONS 2
In the wake of technological advances, the use of computers has played a major role especially in criminal justice (Moriarty, (2017). This paper has focused on the use of computer application technologies in criminology and the potential it has in legal systems. From enabling easy access for witnesses to search for accused peoples’ photographs on the screen and go through the whole court procedural activities. Moreover, criminals’ records can be monitored using databases and it is easy to make a follow-up on crimes they have committed in the past and the charges against them. Forensics can also be conducted and investigations can now be carried out easily and very fast. Also, when one is linked to cases, they can be easily identified using forensics and fingerprints. Portable laptops have also helped police officers in getting information and any important details related to a crime at any place without having to go back to their working stations. James (2017), argues that unlike in the past, investigations are done faster due to internet connections and ease of communication between community members and investigative officers through the use of phone gadgets.
Computers have broad variance in usage which has been enhanced by computer applications. For instance, massive record keeping systems have relied for reference on criminal accounts, case records and unresolved warranties. Incorporation of technology in criminology has just made the career easy and also improved livelihoods. Many police units now use computerized applications to keep up with the ever-rising crimes. There are different applications being used nowadays, from mobile technology, to use in-car computers, CCTV camera installations and also software such as the Computer Aided Dispatch. Investigators often use programmed record management systems to monitor information they obtain and guard it properly. With the current technology, it is possible to detect impending crimes, track stolen goods and the culprits, tell which time a crime occurred and also who committed it and where.
Computer applications:
1. In-Car Computer installations in police cars.
Blumstein (2018), contends that this application that allows traffic patrol police to effectively carry out their activities especially when vehicles violate traffic rules. In the current world, things are drifting toward being more computerized than handwritten (Maxfield & Babbie, 2014). Thus event arrest reports are being typed. It also means that after traffic references are written down, they are generated by the computers installed duplicating a copy to the person who breaks the rules. This is seen to reduce paperwork and improve the efficiency of police officers' work.
2. Computer Aided Dispatch
In the past, correspondents would use hand.
150 words agree or disagreeFuture Criminal Intelligence Enviro.docxdrennanmicah
150 words agree or disagree
Future Criminal Intelligence Environment:
It might seem that the criminal environment has not changed, as both personal and property crimes are the part of everyday routine of law enforcement. At the same time, technological development has provided new possibilities for criminals by allowing them to steal and commit fraud at bigger scale. Future criminal intelligence environment will revolve around technologies, virtual space, and ICT. According to the current trends, high-tech crimes are growing exponentially with the inability of law enforcement to prevent or address them at once (Zavrsnik, 2010). According to the analysis of cybercrime worldwide, investigation of cybercrime has multiple barriers, including the lack of correspondence among different international agencies concerning the legal prosecution, limited number of skilled talent in law enforcement, and absence of effective methods that would allow to find and prosecute offenders (Brown, 2015). As a result, the criminals continue committing identity thefts, spreading dangerous viruses (e.g. ransomware), phishing, and hacking. Since the technologies will continue to improve and update, it is more likely that the criminals will alter their tactics. The main goal of the modern law enforcement is to prepare for the future tendencies by investing in cybercrime department, training talent, and researching the newest trends in cybercrime. Since this type of crime threatens the individual citizens as well as the entire countries, the law enforcement agencies must ensure that the organized crime does not feel comfortable in the virtual space, which can be observed today.
Intelligence Analytics:
Tools and techniques in intelligence analysis might vary across the analysts, systems, and countries. Since today analysts deal with the intelligence presented in a variety of forms, including the digital one, the methods of analysis can be different. For example, basic analytical process usually includes the following steps: collect and sift all available data, construct a preliminary diagram, evaluate new information in light of old data, collect further information, develop preliminary inferences, develop conclusions, assemble a report (United Nations, 2011). This structure can vary according to the available intelligence, protocol of assembling the data, and the scheme used by a specific agency. Several basic techniques of data analysis include event charting, link, flow, and telephone analyses (Berlusconi et al., 2016). These methods are used according to the specific events, goals, and available data. Several software are used today to analyze intelligence and information, including Law Enforcement Specific GIS, RMC and CAD information exchange. Analysis is more effective if the officers have a wide variety of data. For example, today, the agencies can use social media analysis as one of the effective tools in data mining. For instance, a research exploring inte.
The Authority of Government in Clearing Hatefull and Hostilities Electronic I...IJECEIAES
The Act Number 19 of 2016 concerning the amendment of The Act Number 11 of 2008 concerning Information and Electronic Transaction governing the authority of government in clearing hateful and hostilities electronic information based on tribe, religion, race and intergroup. On the one hand, the government authority aims to protect the public interest and the integrity of the nation, but on the other hand, termination of access to information would restrict the right to freedom of opinion and the right to privacy of Internet users. This study was a normative legal research, which examined the basic authority for the government to shut down negative content in cyberspace. Legal materials were collected through library research. The analysis was conducted qualitatively. This study examined three issues, namely; spreading hatred and hostility in cyberspace, legality government to close the spreading hatred and hostility and electronic evidence in spreading hatred and hostility. Spreading hatred and hostility were criminal acts that used the Internet as facilities. Internet was used by extremists to disseminate his teachings, even being used to commit acts of terrorism (cyber terrorism). In maintaining the unity and integrity, then the government had the authority to shut down access to the unlawful electronic system. The closure should be accompanied by proof of electronic information that contains hatred and hostility based on tribe, religion, race and intergroup.
Abstract- This study aims to describe sybercrime cases that have the potential to become criminal acts on social media that are closely related to
the ITE Law. The aim is to find out what actions have the potential to violate the ITe Law carried out on social media which are included in
cybercrime behavior. In addition, the author examines the effectiveness of this law in resolving criminal cases that occur on the internet, which
is so complex and has various modes. The method used in this research is qualitative by conducting a literature study. As a result, the
researchers found that the types of cyber crimes varied, ranging from hecking, spreading hoaxes, defamation, hate speech, and cases of
spreading pornography/immoral acts. Furthermore, this study observes that the ITE Law which is used as a legal instrument is still inadequate
considering the complexity of the problems that occur in cybercrime and modes of crime that accompany it.
Critical Analysis of Admissibility of Forensic Evidence in the Indian Crimina...ijtsrd
is believed that forensics plays an important role in finding out the criminal and it has been legally operated. Forensic is a process by which it helps in the discovery of the crime and the criminal. The admissibility of evidence by the forensic experts and their analysis of a particular crime can be done in accordance with the evidence law. The forensic experts play an important role by following certain techniques by collecting the particular materials from the crime scene and preserving them further to investigate the crime. The collected materials will be categorized by the forensic experts which in turn helps to find the crime. In certain circumstances, the collection and preservation of the materials are not done by the experts properly as to a lack of knowledge or the influence of the external elements. Further, there are certain legal constraints in accordance with the criminal investigation being carried out by the experts and the officials. The legal constraints start from the discovery, search, and protection of forensic evidence till the investigation. This affects the proper legal action against the criminal and the evidence which are supposed to be produced in the court of law. The researcher would analyse the admissibility of evidence in a court of law as to its relevance, authenticity, and issue on it as evidence is subject to the legal constraints and its applicability of it. Nanda Kishore M "Critical Analysis of Admissibility of Forensic Evidence in the Indian Criminal Justice System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-3 , April 2022, URL: https://www.ijtsrd.com/papers/ijtsrd49788.pdf Paper URL: https://www.ijtsrd.com/other-scientific-research-area/other/49788/critical-analysis-of-admissibility-of-forensic-evidence-in-the-indian-criminal-justice-system/nanda-kishore-m
Dr.sc.Mensut Ademi The role of police reducing the fear of crimePresentation....AdeaAdemi1
Summary: 1. Introduction. – 2. The Social-Psychological Model of Fear of Criminality. – 3. Law Enforcement Agencies. – 4. Results and Discussions. – 5. Confronting The Fear of Crime. – 6. Role of Politics and Media and Fear of Crime. – 7. Conclusions.
Keywords: Fear of Crime, Police, Community Policing, Neighbourhood, Situation.
Abstract
The feeling of fear of crime is a condition created in the hearts of many citizens, both in urban and rural areas, in war or peace, and the goal of many international researchers in the field of criminology is to evaluate it. This article is broken into three parts. The first part introduces the factors that explain the fear of crime, a including socio-demographic and social-psychological model by A. van der Wurff, L. van Staalduinen, and P. Stringer. The second part provides an overview of paradoxes and inconsistencies in the literature regarding fear of crime and the police’s role in reducing the fear of crime. Discussing public, political, and media perceptions of the role of police, and these perceptions’ implications for possible ways the police can increase feelings of security. Finally, it covers measures that can reduce fear of crime.
The police presence in dangerous areas with criminal influence is an important factor to reduce the fear of crime. Citizens continue to make more demands of the police to fight crime, and this task is directed mainly at community policing.
Alleviation of the fear of crime comes with the preventive actions of the police. They believe their presence in a neighbourhood calms the situation. For citizens, on the other hand, police presence can be seen as an indicator of an unsafe, tense, or disorderly situation.
Similar to Obstacles to Investigators Using Electronic Information Technology in the Process of Investigations and Investigations to Disclose Criminal Acts of Persecution (20)
The effect of Institutional Ownership, Sales Growth and Profitability on Tax ...AJHSSR Journal
ABSTRACT: This research aims to test, analyze and obtain empirical evidence about the influence of
institutional ownership, sales growth and profitability on tax avoidance. The object of this research is
manufacturing companies in the consumer goods industry sector listed on the Indonesia Stock Exchange (BEI)
in 2018-2022. This research used quantitative research methods and causal research design. The sampling
technique in this research used non-probability sampling with purposive sampling as the basis for determining
the sample so that a sample of 55 samples was obtained. The data used is secondary data obtained from the
official website of the Indonesia Stock Exchange (BEI) during the 2018-2022 period. The data analysis method
used was multiple linear regression analysis with several tests such as descriptive statistical tests, classical
assumption tests, and hypothesis testing using SPSS version 26 statistical software. The results showed that the
institutional ownership variable has no effect on tax avoidance, while the sales growth and profitability has a
negative and significant effect on tax avoidance.
KEYWORDS: Institutional Ownership, Sales Growth, Profitability, Tax Avoidance
MGA ESTRATEHIYA SA PAGTUTURO KAUGNAY SA PASALITANG PARTISIPASYON NG MGA MAG-A...AJHSSR Journal
ABSTRAK: Ang mga estratehiya sa pagtuturo ay mahalagang kasangkapan sa paghahatid ng mabisang
pagtuturo sa loob ng silid. Tinukoy sa pag-aaral na ito ang antas ng kagustuhan ng mga mag-aaral sa pagsasadula,
pangkatang talakayan at paggawa ng mga koneksyon sa tunay na karanasan sa buhay bilang mga estratehiya sa
pagtuturo ng panitikan sa Filipino at pasalitang partisipasyon ng mga mag-aaral sa Baitang 7 ng Misamis
University Junior High School, Ozamiz City. Ang ginamit na disenyo sa pananaliksik na ito ay deskriptivcorrelational. Ang mga datos sa pag-aaral ay nagmula sa kabuuang populasyon na 120 na mag-aaral at tatlong
mga guro na tagamasid sa pasalitang partisipasyon ng mga mag-aaral. Ang Talatanungan sa Kagamitan sa
Pagtuturo ng Panitikan at Checklist batay sa Obserbasyon sa Pasalita na Partisipasyon ay ang instrumentong
ginamit sa pagkalap ng datos. Mean, standard deviation, Analysis of Variance at Pearson Product-Moment
Correlation Coefficient ang mga ginamit na estatistiko na sangkap. Inihayag sa naging resulta na ang tatlong piling
estratehiya sa pagtuturo ng panitikan sa Filipino ay may pinakamataas na antas ng kagustuhan ng mga mag-aaral.
Ang antas ng pakilahok ng mga mag-aaral sa paggamit ng tatlong estratehiya sa pagtuturo ng panitikan ay
pinakamataas na nagpapahiwatig na aktibong nakilahok ang mga mag-aaral sa mga gawain. Inihayag din na
walang makabuluhang kaibahan sa antas ng kagustuhan ng mga mag-aaral sa mga estratehiya sa pagtuturo ng
panitikan sa Filipino. Ito ay nangahulugan na gustong-gusto ng mga mag-aaral ang pagkakaroon ng mga
estratehiya sa pagtuturo. Walang makabuluhang kaugnayan ang kagustuhan sa mga estratehiya at antas ng
pakikilahok ng mga mag-aaral. Hindi nakaapekto sa kanilang pakikilahok ang anumang estratehiyang ginamit ng
guro.
KEYWORDS : estratehiya, karanasan, pagsasadula, pagtuturo, pangkatang talakayan
The Role of the Instruction of Reading Comprehension Strategies in Enhancing ...AJHSSR Journal
ABSTRACT :Throughout my studies and teaching English in different language centers and higher studies
institutions, I have come to conclude that students consider Reading comprehension as a nightmare that
frightens them and hinders their language acquisition in the Moroccan EFL Context. This may cause them to
develop an internal psychological obstacle that grows as their lack of the necessary instruments or tools to
overcome are not equipped with. They become lost and unaware about or unfamiliar with the necessary reading
comprehension strategies that could help them to face the problem of misunderstanding or non-understanding
of English texts. Respectively, this article which is only one part of my whole study aims at showing the effect
of teaching reading strategies in enhancing the S1 students‟ familiarity with reading strategies and raising their
frequency use. A sample of 283 University students in EFL context have been chosen randomly and have
attended the usual academic reading classes, yet only 76 are subject to this survey. 38 of them constitute the
experimental group who have attended the treatment regularly in one of the language centers and the other 38
participants are chosen randomly from the whole population to constitute the Control group. They all have
Psychosocial Factors and Deviant Behaviors of Children in Conflict with the L...AJHSSR Journal
ABSTRACT:This study aims to determine the relationship between psychosocialfactors and deviant
behaviors among children in conflict with the law (CICL) inDavao Region. The researchers want to discover the
prevalent factors thatdrive these children to their behaviors. Further, the study sought to determinethe
manifestation of psychosocial factors in terms of life satisfaction, emotionalsupport, self-esteem, and personality
traits. The study's data came from N-83children in conflict with the law (CICL) at the Regional Rehabilitation
Center forYouth (RRCY) in Bago Oshiro, Davao City; all respondents are male. This studyused a total
enumeration sampling technique due to the relatively smallpopulation size. The researchers adapted the
Psychosocial surveyquestionnaires by Zabriskie & Ward (2013) and by John and Srivastava (1999)as well as the
Deviant Behavior Variety Scale (DBVS) by Sanches et al. (2016).Through the use of a validated questionnaire,
the mean and standard deviationare determined. The researchers modified this questionnaire and translated itinto
the respondents' mother tongue (Cebuano) for them to comprehend itbetter. The study discovered no significant
relationship between psychosocialfactors and deviant behaviors of children in conflict with the law (CICL) in
theDavao Region
KEYWORDS :Children in Conflict with the Law (CICL), deviant behaviors, psychosocial factors
Entropy: A Join between Science and Mind-SocietyAJHSSR Journal
ABSTRACT: Entropy is join, intersection and interaction between natural science and human mind-society.
We proposed that if internal interactions exist in isolated systems, entropy decrease will be possible for this
system. Management in system is a typical internal interaction within the isolated system. The purpose of
management is to use regulating the internal interactions within the system, and to decrease the increasing
entropy spontaneously. We propose the principle of social civilization and the developing direction is: freedom
of thought, rule of action. Both combinations should be a peaceful revision and improvement of social rules and
laws. Different countries and nations, different religions and beliefs should coexist peacefully and compete
peacefully. The evolution of human society must be coevolution. Its foundation is the evolution of the human
heart and the human nature.
KEYWORDS: entropy, science, society, management, mind, evolution.
A Model of Disaster Resilience Among Colleges and Universities: A Mixed Metho...AJHSSR Journal
ABSTRACT :This research paper aimed to create a comprehensive framework for measuring disaster
resilience in colleges and universities. The study used a mixed method through Exploratory Factor Analysis
(EFA), which involved analyzing data from a survey questionnaire. The questionnaire was developed based on
in-depth interviews with 12 selected participants from the University of Mindanao, as well as relevant literature
and studies. It was reviewed and validated by 10 experts using a method called Content Validity Ratio (CVR).
This questionnaire was then administered to 400 students from 10 different colleges in University of Mindanao.
After conducting the Exploratory Factor Analysis and performing rotations and iterations, the researchers
identified five main constructs that characterize disaster resilience among colleges (1) disaster preparedness, (2)
disaster awareness, (3) community readiness, and (4) disaster management, (5) disaster resilience. The
researchers aimed to create an organization called “Council of College Disaster Volunteers (CCDV)” which
consist of student volunteers. These factors can be used to develop effective management strategies and
strengthen efforts in preventing and managing disasters and accidents.
KEYWORDS:content validity ratio, criminology, disaster resilience, disaster management, exploratory factor
analysis, and Philippines.
Environmental Struggles and Justice Among Lumad Farmers of Davao CityAJHSSR Journal
ABSTRACT : The study described the various environmental struggles experienced among the participants
and their status in accessing justice. The study followed a qualitative multiple-case study approach; the
participants are the Lumad farmers of Marilog, Davao City selected through a Critical sampling method and
aims to present the environmental violations experienced by the Lumad farmers in Davao City and how it
affected their families and sustenance further, their status in accessing justice is also explored. The study
concluded that the most common struggles the participant experience are Illegal logging and improper waste
disposal, which affect their farms, family, health, and income. Their preferred means to accessing justice is
through barangay settlement; the rigors of accessing courts, such as distance, expenses, fear of ruling, and the
hassle of being called to be present in court, are the most prevalent barriers that hinder the lead farmers from
accessing justice or seeking legal action. Nevertheless, the participants believed that the government would help
them in accessing justice.
KEYWORDS :access to justice, criminology,environmental justice, environmental struggles, lumadfarmers
CYBERBULLYING EXPERIENCES OF UNIVERSITY OF MINDANAO CRIMINOLOGY STUDENTSAJHSSR Journal
ABSTRACT:This paper explores the cyberbullying experiences among Criminology students at the
University of Mindanao. A simple random sampling method was used to distribute the study's online
questionnaire to the respondents and to survey the target population. This study has four hundred (400)
respondents, and the respondents are Criminology students at the University of Mindanao. The findings of this
study revealed that the level of cyberbullying experiences is sometimes manifested. On the other hand, the
cyberbullying experiences of the students indicate a moderate level, which indicates that the cyberbullying
experiences of the respondents are sometimes manifested. Also, the computations showed that among the
indicators presented, the highest mean is obtained in the psychological effect, which implies that there is a
significant effect of cyberbullying experiences of the respondents in terms of the Gender level of the
respondents. Therefore, respondents with a low level of cyberbullying experiences tend to have a moderate level
of cyberbullying experience. However, there is no significant effect in terms of age and year level of the
respondents according to the results regarding the psychological, emotional, and physical impact of
cyberbullying.
KEYWORDS :cyberbullying, emotional, experiences, psychological,physical effect, and simple random
sampling method.
A philosophical ontogenetic standpoint on superego role in human mind formationAJHSSR Journal
ABSTRACT: One of the most significant contributions of psychoanalysis to understand the human being is the
elaboration of a model about the mind from a topical and dynamic perspective. Freud explains the mind by the
constitution of the preconscious, conscious, and subconscious. Later, by three dynamic components: the id, the
ego and the superego. Such an organization of the psychic apparatus supposes not only individual elements, but
social influences along the process of hominization. In this paper, we recover the findings of the renowned
anthropologist Lewis Morgan, trying to link some of them to the psychoanalytic theory. Especially highlighting
the importance of superego in Haidt’s social intuitionism.
Keywords: evolutionism, intuitionism, psychoanalysis, Freud, Haidt, Morgan
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...AJHSSR Journal
ABSTRACT: In the Malaysian context, small and medium enterprises (SMEs) experience a significant
burden of workplace accidents. A consensus among scholars attributes a substantial portion of these incidents to
human factors, particularly unsafe behaviors. This study, conducted in Malaysia's northern region, specifically
targeted Safety and Health/Human Resource professionals within the manufacturing sector of SMEs. We
gathered a robust dataset comprising 107 responses through a meticulously designed self-administered
questionnaire. Employing advanced partial least squares-structural equation modeling (PLS-SEM) techniques
with SmartPLS 3.2.9, we rigorously analyzed the data to scrutinize the intricate relationship between safety
behavior and safety performance. The research findings unequivocally underscore the palpable and
consequential impact of safety behavior variables, namely safety compliance and safety participation, on
improving safety performance indicators such as accidents, injuries, and property damages. These results
strongly validate research hypotheses. Consequently, this study highlights the pivotal significance of cultivating
safety behavior among employees, particularly in resource-constrained SME settings, as an essential step toward
enhancing workplace safety performance.
KEYWORDS :Safety compliance, safety participation, safety performance, SME
Psychological Empowerment and Empathy as Correlates of ForgivenessAJHSSR Journal
ABSTRACT: The study explores Psychological Empowerment and Empathy as Correlates of Forgiveness.
The two variables are regarded to have influence on the decision one makes to forgive another. The study aimed
at examining the relationships between psychological empowerment and forgiveness, empathy and forgiveness
and to identify which one of the two,Psychological Empowerment or Empathy, is the more powerful predictor of
forgiveness. The study took a survey design with a sample of 350 drawn from a population of university students
using a self-administered questionnaire with four sections: Personal information, Psychological empowerment
scale, Toronto Empathy questionnaire, and the Heartland Forgiveness Scale (HFS). Data analysis employed
Pearson’s product moment correlation and regression analysis to test hypotheses. The results show significant
relationships between psychological empowerment and forgiveness as well as empathy and forgiveness.
Empathy was found to be the more powerful predictor of forgiveness.
KEY WORDS: Psychological empowerment, empathy, forgiveness
Exploring The Dimensions and Dynamics of Felt Obligation: A Bibliometric Anal...AJHSSR Journal
ABSTARCT: This study presents, to our knowledge, the first bibliometric analysis focusing on the concept of
"felt obligation," examining 120 articles published between 1986 and 2024. The aim of the study is to deepen our
understanding of the existing knowledge in the field of "felt obligation" and to provide guidance for further
research. The analysis is centered around the authors, countries, institutions, and keywords of the articles. The
findings highlight prominent researchers in this field, leading universities, and influential journals. Particularly,
it is identified that China plays a leading role in "felt obligation" research. The analysis of keywords emphasizes
the thematic focuses of these studies and provides a roadmap for future research. Finally, various
recommendations are presented to deepen the knowledge in this area and promote applied research. This study
serves as a foundation to expand and advance the understanding of "felt obligation" in the field.
KEYWORDS: Felt Obligation, Bibliometric Analysis, Research Trends
Les autorités traditionnelles et l’administration coloniale au Tchad : 1900-1960AJHSSR Journal
ABSTRACT : In Africa, traditionalauthorities are the guardians of tradition. Recently, however, they have
been caughtbetween tradition and modernity in the exercise of political power in Chad. However, we are
witnessing the revival of chieftaincy and the hybridization of the politicalpowersexercisedwithinit. In this
cohabitation of powers, traditionalauthorityisescapingitsrole as guardian of tradition.
Traditionalauthorityisthereforepresented in itscurrent state, as a proxy for the modern state in traditional
administrative districts. The aim of thisstudyis to analyze the mutations and adaptability of
traditionalauthorityfrom the pre-colonialperiodthrough the colonial period to the post-colonial period. This
workanalyzes the mutations of authorities. The data collected and processedrevealthattraditionalauthorities have
survivedalmosteverywhere, the former chiefdomsdissolvedduringcolonization have been restored by
republicanheads of state, while more and more frequently civil servants, businessmen, academics and
othermembers of the literateelite, whopreviouslyhad no attraction for the position of traditionalchief, are
beingenthroned.
Key words:Authorities, Administration, colonization, Chad, Kanem.
A Conceptual Analysis of Correlates of Domestic Violence and Adolescent Risky...AJHSSR Journal
ABSTRACT: The study explores domestic violence and how it influences adolescent risky behavior.
Domestic violence is a devastating social problem resulting in significant and enduring effects on children,
threatening both their health and emotional well-being. The study aimed at examining the relationships between
domestic Violence and Psychological Empowerment, Domestic Violence and Self-esteem, psychological
Empowerment and Self-Regulation, Self Esteem and Psychological empowerment, Self-Esteem and Selfregulation, Self-Regulation and Adolescent Risky Behavior and identify the stronger predictor of self-regulation
between psychological empowerment and Self-esteem. Adolescent respondents who experienced domestic
violence were purposely selected and guided by teachers and administrators who had provided support to these
children.The questionnaire had six sections namely; personal information, the Child Exposure to Domestic
Violence Scale, the Psychological empowerment scale, the Rosenberg Self-esteem Inventory, and the Brief
Self-Control Scale. Data analysis employed Pearson's product-moment correlation (r) to test hypotheses 1,
2,3,4,5, and 6. Regression analysis was used for hypothesis 7.The results show a significant relationship
between domestic Violence and Psychological Empowerment, Domestic Violence and Self-esteem,
psychological Empowerment and Self-Regulation, Self Esteem and Psychological empowerment, Self-Esteem
and Self-regulation, Self-Regulation, and Adolescent Risky Behavior. The study documents that Psychological
empowerment is a stronger predictor of self-regulation than Self-esteem.
KEYWORDS:Domestic violence, psychological empowerment, self-regulation, and Adolescent risky behavior
Driving Sustainable Competitive Advantage Through an Innovative Aggregator Bu...AJHSSR Journal
ABSTRACT : The aim of the research is to analyze the influence of the aggregation business model on
Sustainable Competitive Advantage (SCA). Through a survey of 216 MSMEs in the creative economy sector
selected randomly using an ex post facto causal research approach, an overview of the aggregator business
model and its impact on financial resources and SCA was obtained. The aggregator business model plays a role
in facilitating increased access to financial resources to meet both available and required working capital for
realizing SCA in Malang's Lokanima area. The strength of ABM lies in understanding the resources needed for
SCA and the effectiveness of mobilizing services while considering the most cost-effective options, including
providing various alternatives in their provision. Financial resources are an important factor supporting the
achievement of SCA. Access to financial resources is key to facilitating business growth and sustainability.
Theoretical implications: The concept of the aggregator business model emphasizes the efficient and effective
collection, aggregation, and distribution of resources in connecting service providers with consumers in an
economical and efficient manner. Practical implications: ABM can enhance the performance of financial
resource provision by optimizing relationships with MSMEs and financial institutions, leading to business
growth and sustainability for MSMEs.
KEYWORDS -Aggregator Business, Creative Economy, Financial Resources, Sustainable Competitive
Advantage
Accuracy of ChatGPT for Basic Values of Trigonometric FunctionsAJHSSR Journal
ABSTRACT : This study analyzes the accuracy of ChatGPT, an artificial intelligence model based on GPT3.5, in determining the values of basic trigonometric functions. To this end, we examine ChatGPT's responses to
sine, cosine, tangent, and cotangent values for a wide range of angles. We compare the results provided by
ChatGPT with the accuracy values determined by basic trigonometry. We also explore differences in accuracy
depending on changes in question complexity and given context. The results show a high level of accuracy of
ChatGPT in determining the values of trigonometric functions, especially for common angles. However, it is
noted that accuracy may be affected in certain cases of extreme angles or complex questions. This analysis
provides an important representation of ChatGPT's capabilities in the field of mathematics, using a new method
for testing the accuracy of artificial intelligence models in determining trigonometric values.
Keywords -Accuracy, AI Model, ChatGPT, Trigonometric Functions, Trigonometry
Postmodern Marketing and Its Impact on Traditional Marketing Approaches: Is K...AJHSSR Journal
ABSTRACT : The essay discusses the concept of postmodern marketing and its impact on marketing theory
and practice. It explores the characteristics of postmodernism, including openness, tolerance, hyper-reality,
fragmentation, and the lack of clear boundaries, and how they challenge traditional marketing approaches. The
paper also looks at the contributions of postmodern marketing to consumer and marketing research and how it
has redefined the way we think about marketing as a science. Ultimately, it raises the question of whether and
how marketing should adapt itself to the new conditions brought about by postmodernism.
KEYWORDS :Postmodernism, Postmodern Marketing, Kotler, Marketing Theory, Postmodern Consumer
Reorientation of Health Service Governance Toward the Fulfillment of Social J...AJHSSR Journal
ABSTRACT: Health insurance is a human right. At the practical level, this health insurance program in
Indonesia is organized by BPJS Kesehatan (Social Security Administering Body for Health). The
implementation of BPJS Kesehatan is still not optimal and effective. Three problems are discussed in this
writing: the dynamics of health insurance governance in Indonesia, the implementation of the fulfillment of the
right to health by BPJS Kesehatan, and the reorientation of BPJS Kesehatan services toward social justice.
These problems are then answered by scientific research methods using a sociological juridical approach.
Complaintsoften occur regarding the regulations, the services provided by the health facility providers, and the
distance between the community and the health facilities. Such complaints affect the public interest in becoming
BPJS Kesehatan participants. The aforementioned conditions must be considered and evaluated for the
government's success in the aspired national health insurance plan.
KEYWORDS -BPJS Kesehatan, Health Insurance, Social Justice
“To be integrated is to feel secure, to feel connected.” The views and experi...AJHSSR Journal
ABSTRACT: Although a significant amount of literature exists on Morocco's migration policies and their
successes and failures since their implementation in 2014, there is limited research on the integration of subSaharan African children into schools. This paperis part of a Ph.D. research project that aims to fill this gap. It
reports the main findings of a study conducted with migrant children enrolled in two public schools in Rabat,
Morocco, exploring how integration is defined by the children themselves and identifying the obstacles that they
have encountered thus far. The following paper uses an inductive approach and primarily focuses on the
relationships of children with their teachers and peers as a key aspect of integration for students with a migration
background. The study has led to several crucial findings. It emphasizes the significance of speaking Colloquial
Moroccan Arabic (Darija) and being part of a community for effective integration. Moreover, it reveals that the
use of Modern Standard Arabic as the language of instruction in schools is a source of frustration for students,
indicating the need for language policy reform. The study underlines the importanceof considering the
children‟s agency when being integrated into mainstream public schools.
.
KEYWORDS: migration, education, integration, sub-Saharan African children, public school
Sport et vieillissement : une analyse de la pratique des activités physiques ...AJHSSR Journal
Abstract : The aim of thispaperis to report on the effects of physicalactivity and sport on the health of older
people. Based on a mixed-methodsapproach, several techniques, namelydocumentaryanalysis and semistructured interviews, wereused in thisresearch in order to obtain a range of data thatwasavailable, accessible
and relevant to the subjectunderstudy. This enabled us to arrive at the resultsaccording to which the
stakeholders' perceptions of theirhealth are based on the practice of physicalactivities and sport as a social
construct in a socio-cultural context. Older people see sport as a way of curingillnesses, but above all as a way
of givingtheir bodies vitality. Othersseeit as a way of reinvigoratingthemselvesafter retirement.
Key words: Ageing, Physical activities, Sports activities, Elderly people.
Buy Pinterest Followers, Reactions & Repins Go Viral on Pinterest with Socio...SocioCosmos
Get more Pinterest followers, reactions, and repins with Sociocosmos, the leading platform to buy all kinds of Pinterest presence. Boost your profile and reach a wider audience.
https://www.sociocosmos.com/product-category/pinterest/
Unlock TikTok Success with Sociocosmos..SocioCosmos
Discover how Sociocosmos can boost your TikTok presence with real followers and engagement. Achieve your social media goals today!
https://www.sociocosmos.com/product-category/tiktok/
Enhance your social media strategy with the best digital marketing agency in Kolkata. This PPT covers 7 essential tips for effective social media marketing, offering practical advice and actionable insights to help you boost engagement, reach your target audience, and grow your online presence.
Multilingual SEO Services | Multilingual Keyword Research | Filosemadisonsmith478075
Multilingual SEO services are essential for businesses aiming to expand their global presence. They involve optimizing a website for search engines in multiple languages, enhancing visibility, and reaching diverse audiences. Filose offers comprehensive multilingual SEO services designed to help businesses optimize their websites for search engines in various languages, enhancing their global reach and market presence. These services ensure that your content is not only translated but also culturally and contextually adapted to resonate with local audiences.
Visit us at -https://www.filose.com/
Grow Your Reddit Community Fast.........SocioCosmos
Sociocosmos helps you gain Reddit followers quickly and easily. Build your community and expand your influence.
https://www.sociocosmos.com/product-category/reddit/
Surat Digital Marketing School is created to offer a complete course that is specifically designed as per the current industry trends. Years of experience has helped us identify and understand the graduate-employee skills gap in the industry. At our school, we keep up with the pace of the industry and impart a holistic education that encompasses all the latest concepts of the Digital world so that our graduates can effortlessly integrate into the assigned roles.
This is the place where you become a Digital Marketing Expert.
Your Path to YouTube Stardom Starts HereSocioCosmos
Skyrocket your YouTube presence with Sociocosmos' proven methods. Gain real engagement and build a loyal audience. Join us now.
https://www.sociocosmos.com/product-category/youtube/
Obstacles to Investigators Using Electronic Information Technology in the Process of Investigations and Investigations to Disclose Criminal Acts of Persecution
1. American Journal of Humanities and Social Sciences Research (AJHSSR) 2022
A J H S S R J o u r n a l P a g e | 148
American Journal of Humanities and Social Sciences Research (AJHSSR)
e-ISSN :2378-703X
Volume-6, Issue-12, pp-148-154
www.ajhssr.com
Research Paper Open Access
Obstacles to Investigators Using Electronic Information
Technology in the Process of Investigations and Investigations to
Disclose Criminal Acts of Persecution
Dedi Purnomo1
, La Niasa2
, Amir Faisal3
, Muh Yusuf4
, SittiFatmawati5
1
(Master of Law student at the University of Southeast Sulawesi)
2 3 4 5
( Lecturer in Master of Law, University of Southeast Sulawesi Indonesia )
ABSTRACT : This study aims to find out and examine the obstacles investigators use electronic information
technology in the process of inquiry and investigation to uncover criminal acts of persecution (a case study of
the persecution that led to the death of the victim Augustine ) normative research supported by empirical data.
The results showed that the obstacles faced by investigators at the DitreskrimumPoldaSultra in the use of
technology related to the process of investigating and investigating cases of abuse that caused the death of
people consisted of 3 (three) obstacles, namely: first , Obstacles in Legal Substance: a. The Criminal Code does
not recognize electronic evidence; b. The evidence in the Electronic Transaction Information Law is not
supported by adequate implementing regulations; and c. There is no progressive legal umbrella in terms of
Standard Operating Procedures for the use of technology in the process of investigating criminal acts of
persecution that cause people to die.
KEYWORDS: Investigators, Electronic Evidence, Persecution.
I. INTRODUCTION
Technological developments do not only have a positive impact on society but can also have a negative impact
on the wearer. Through the internet media several types of criminal acts can be committed, such as: defamation ,
pornography, account breaches, network destruction, attacks via viruses, premeditated murder, including online
gambling. Apart from being used for technological crimes.
Information can also be used to uncover the crime itself. Disclosure of crime is one of the main tasks of the
Indonesian National Police in the context of law enforcement, namely: investigation and investigation of
criminal acts. Basically investigation and investigation of criminal acts is to collect evidence in order to make
light of the events that occurred and find the perpetrators. The evidence collected will eventually lead to the
alleged perpetrators of the crime. If the crime was committed neatly and it is difficult to find evidence, then
information technology can be used to assist in investigations and investigations in uncovering criminal acts of
persecution that led to the death of people.
Law enforcement is the authority given to Investigators/Investigators as stipulated in the Criminal Procedure
Code, it can be stated that investigators/investigators are living laws that can move by developing an incident of
a criminal act to become clear so that it can determine certainty. existing laws (IqbalRamadhanSatriaPrawira:
2018).
In a criminal case settlement process, a material truth must be sought that fulfills the elements in the Criminal
Code. The search for material truth must, of course, go through a verification process, the most important
process in criminal procedural law. The Criminal Procedure Code (KUHAP) in the field of evidence recognizes
the existence of evidence and evidence, both of which are needed both in the process of investigation,
investigation, and in trials to prove the crime charged against the defendant.
The use of sophisticated technological tools in assisting the Southeast Sulawesi Regional Police Ditreskrimum
as well as the ranks of the Southeast Sulawesi Regional Police General Criminal Investigation Unit to uncover
criminal acts is the Direct Finder ,Cellebrite UFED 4PC, Mobile Automatic Multi Biometric Identification
System (MAMBIS) which is a digital forensic tool that can search for the identity of suspected perpetrators.
criminal act. Furthermore, Polri Investigators/Investigators as one of the law enforcement elements of criminal
acts require qualified investigative and investigative techniques to uncover criminal acts in a professional,
transparent , modern and reliable manner so that they can shed light on a crime and can serve as valid evidence
in court.
2. American Journal of Humanities and Social Sciences Research (AJHSSR) 2022
A J H S S R J o u r n a l P a g e | 149
The Director of General Criminal Investigation for the Southeast Sulawesi Regional Police, Senior
Commissioner BambangWijanarko, SIK stated that there was a criminal act of persecution that caused the death
of a person which occurred on December 16, 2021 on Jalan Sultan Hasanuddin, Punggaloha Village, Kendari
District, Kendari City (lane in front of Kendari beach), where the incident occurred This occurred when there
was a problem between the Tolaki indigenous peoples' organization and the GunungJati Village community,
where at that time the victim was named Agustinus who was a driver of the Kemaraya-Kota public
transportation whose route was through the incident route (the front line of Kendari beach) so that when the
victim Augustine passed the Accordingly, the victim did not know about the commotion between the two
groups, because the victim only thought of looking for Fortune. However, when the victim passed the scene of
the incident he was detained by a group of Tolaki Indigenous Community Organizations (ORMAS). A group of
ORMAS asked about ethnicity using the local Tolaki language, which turned out to be a community from
Ambon, who were thought to be from GunungJati, so there was persecution and/or beatings which resulted in
the victim Augustine dying. .( Report on the Results of the Task of Sub-Directorate III of the Southeast
Sulawesi Regional Police Directorate of Criminal Investigation. 2021)
This investigation and investigation was carried out by the DitreskrimumPolda Southeast Sulawesi who had
succeeded in arresting the perpetrators who carried out the execution of the victim Augustine so that he suffered
a slash wound on the left cheek and died, along with valid evidence. Digital forensic analysis is carried out using
sophisticated technological tools, namely Direction Finder (DF) which is a tool for finding perpetrators, Mobile
Automatic Multi Biometric Identification System (MAMBIS) to find out the identity of victims, witnesses and
suspected perpetrators, AK-23 Digitalization which is a tool who can find a person's identity based on
fingerprints. So that the Southeast Sulawesi Regional Police Ditreskrimum succeeded in uncovering who the
perpetrators were who carried out the execution and why they even committed the crime of persecution. (Report
on the results of Task Sub Directorate III of the Southeast Sulawesi Regional Police Ditreskrimum. 2021)
Evidence is something important in the verification process, but Article 184 paragraph (1) of the Criminal
Procedure Code is very limited, the problem that occurs is if the verification process requires electronic
evidence but it is not regulated in Article 184 paragraph (1) of the Criminal Procedure Code. Article 184 of Law
Number 8 of 1981 Concerning Criminal Procedure Law stipulates that valid evidence consists of: a). Witness
statement; b). Expert statement; c). Letter; d). Instruction; and e). Defendant's statement. Referring to this
article, if you look at the evidence that can be used in the verification process, it is very narrow and limited, so
that evidence appears outside the Criminal Procedure Code that cannot be used and has not yet received clear
legality. This dilemma finally became the beginning to provide legal certainty by issuing a special law to
contain legal evidence outside the Criminal Procedure Code.
As a state based on law as stated in the 1945 Constitution of the Republic of Indonesia, the management of the
state must be based on law, both through laws and regulations, judges' decisions, doctrine, and the development
of values in society. Changes to information technology and electronic laws are based on a juridical view,
namely: Law Number 11 of 2008 concerning Information and Electronic Transactions (State Gazette of the
Republic of Indonesia of 2008 Number 58, Supplement to the State Gazette of the Republic of Indonesia
Number 4843) as amended by Law Law Number 19 of 2016 concerning Amendments to Law Number 11 of
2008 concerning Information and Electronic Transactions (State Gazette of the Republic of Indonesia of 2016
Number 251, Supplement to the State Gazette of the Republic of Indonesia Number 5952).
This juridical approach has shown that changing laws is a solution for society. Changes to the ITE Law in the
framework of structuring the state and nation towards a better one. The development of Information Technology
through legal infrastructure and regulations is expected to provide benefits to society, not the other way around.
Based on the description of the background above, the use of information technology in the process of
investigation and investigation is very important to do. So this research focuses on Obstacles to the Use of
Electronic Information Technology in the Investigation and Investigation Process to Reveal Criminal Acts of
Persecution (Case Study of Persecution that Caused the Death of the Victim Agustinus.
To insert images in Word, position the cursor at the insertion point and either use Insert | Picture | From File or
copy the image to the Windows clipboard and then Edit | Paste Special | Picture (with “Float over text”
unchecked).
The journal reserves the right to do the final formatting of your paper.
3. American Journal of Humanities and Social Sciences Research (AJHSSR) 2022
A J H S S R J o u r n a l P a g e | 150
II. METHODS
This legal research method is a normative-qualitative research method that is supported by empirical data ,
namely the object of research is legal norms embodied in legal norms made and stipulated by the Government in
a number of laws and regulations and punishments that are directly related to the investigation and investigation
of criminal acts. to life by using high-tech tools. Time and Location of Research For data collection in this
study in accordance with the discussion that the author discussed, the research was carried out at the Southeast
Sulawesi Regional Police Directorate of Criminal Investigation Office starting in August 2022, with the reason
that this place was relevant in helping the author to conduct this research.
III. RESULTS AND DISCUSSION
Obstacles investigators use electronic information technology in the investigation and investigation process to
uncover criminal acts of persecution (case study of the persecution that led to the death of the victim Augustine
a. Regulations in the Electronic Data Retrieval Process used as Evidence
Based on the facts described above, a description or construction of the case is obtained which shows the
involvement of the suspect in this case as the person who committed it, which is supported by good evidence
from the TKP Examination, statements of witnesses and supported by evidence and or evidence. letters as
follows: a) Whereas the victim was brother Augustine and the one who carried out the persecution causing
brother Augustine to die was brother AH; b). Whereas it is true that on Thursday December 16, 2021, around
3:00 p.m. at Kendari Beach in front of the Meohai Park, the address is Jalan Sultan Hasanuddin Kel . c) That
AH,carried out the persecution using 1 (one) taawu machete; d). Whereas the cause of the crime of persecution
was due to revenge for one of the Ormas friends who are members of the Tamalaki Budaya Tolaki Southeast
Sulawesi (TBTS) mass organization named ARIF being beaten by the red ant mass organization/Muna tribe
people. e). That as a result of the persecution the victim AGUSTINUS died .
That the actions of the suspect AH, according to the case analysis above, have complied with the formulation of
Article 338 of the Criminal Code Subs Article 170 Paragraph (1) and Paragraph (2) 3rd of the Criminal Code
More than Subs of Article 351 paragraph (3) of the Criminal Code with a description of the elements of the
Article as follows : a) Article 3 38 of the Criminal Code: " Whoever Deliberately Takes Other People's Lives ".
b) Article 170 Paragraph (1) and Paragraph ( 2) 3 of the Criminal Code: Paragraph (1) “ Whoever intentionally
openly and with forcecollective use of force against persons or goods” . Paragraph ( 2 ) 3 “The guilty person is
threatened with imprisonment for a maximum of 12 years, if it is violentresult in death"
Article 351 Paragraph (3) of the Criminal Code: " If it results in death,subject to imprisonment for a maximum
of 7 years” . Proof is a very important part of procedural law, especially criminal procedural law .( Ediany OS
Hiariej. 2012). This is because evidence is closely related to whether or not the actions of a defendant who is
suspected of committing a crime are true or not. Proof in criminal procedural law (Ediany OS Hiariej. 2012) is
regarded as a process that has true value because the truth that is its goal is material truth. That is, the judge
must be active in examining the defendant so that the incident must be proven ( beyond reasonable doubt ).
(AndiSofyan, 2018) Legal evidence to be presented before the trial, as stipulated in Article 184 paragraph (1) of
the Criminal Procedure Code , is: a). Witness statement; b). Expert statement; c). Letter; d). Instruction;
e). Statement of the accused”
Article 183 of the Criminal Procedure Code, has stipulated that in order to determine the punishment for the
accused, his guilt must be proven by at least 2 (two) valid pieces of evidence; and on evidence with at least two
valid pieces of evidence, the judge obtains confidence that the crime actually occurred and that the defendant is
the one who is guilty of committing it. After the specified requirements are met, then the judge imposes a
sentence on the defendant. If one contemplates on the two articles above, it can be concluded that the
evidentiary system adopted in Indonesia is negative statutory evidence (negative wettelijkstelsel), namely a
balance between positive statutory evidence and evidence according to a judge's conviction or conviction in
time. . The formula reads: "whether or not a defendant is wrong is determined by the judge's conviction based
on the method and with valid evidence according to law".
Thus, this system combines objective and subjective elements in determining whether or not the defendant is
guilty, neither of which is the most dominant of the two elements. At first glance, there is a downside to the
negative evidentiary system, namely when placing the judge's belief as having the most role and dominance in
determining whether or not the accused is guilty, for example, there is a motivation that is not commendable for
personal gain with the reason "not sure" even though it has been sufficiently proven according to the methods
and valid evidence. The judge's conviction at the stage of proof plays an important role in the examination
process at trial because it is at this stage that the fate of the defendant is proven guilty or not determined.
Therefore, the judges must be careful, thorough and mature in assessing and considering the evidence.
that the increase in the crime rate in society has led to many crimes, one of the things that often happens and is
experienced by the community is violence or persecution. Acts of persecution are not only detrimental to oneself
but also to other people and the wider community. Violent crime or persecution is a problem that always appears
4. American Journal of Humanities and Social Sciences Research (AJHSSR) 2022
A J H S S R J o u r n a l P a g e | 151
in the midst of society. This problem arises and develops, bringing its own consequences, both for the
perpetrator, even worse for the victim, which may result in a prolonged form of physical therapy. (Mhd.
TeguhSyuhadaLubis: 2017)
B. Evidence of Cases of Persecution CausingDeath of People Based on Electronic Data as Evidence
Subsequent developments related to evidence in criminal procedural law are known as electronic evidence.
Electronic evidence is regulated in special rules, which are contained in Law no. 11 of 2008 concerning
Information and Electronic Transactions. The types of evidence known in the Electronic Information and
Transaction Law are electronic documents and electronic information.
Tirtaamidjaja, Prosecutor's Position and Examination Procedures for Criminal and Civil Cases, ( Jakarta:
Djbatan, 1996), p. 70. 77 Article 1 point 1 Law no. 19 of 2016 concerning Amendments to Law no. 11 of 2008
concerning Information and Electronic Transactions states: "Electronic information is one or a set of electronic
data, including but not limited to writing, voice, images, maps, designs, photos, Electronic Data Interchange
(EDI), electronic mail (electronic mail) , telegram, telex, telecopy or the like, letters, signs, numbers, Access
Codes, symbols or perforations that have been processed which have meaning or can be understood by people
who are able to understand them”. Article 1 point 4 of the Law on Information and Electronic Transactions
states: "Electronic Documents are any Electronic Information that is created, forwarded, sent, received, or
stored in analog, digital, electromagnetic, optical, or the like, which can be viewed, displayed, and/or heard
through a Computer or Electronic System, including but not limited to writing, sound, pictures, maps, plans,
photos or the like, letters, signs, numbers, Access Codes, symbols or perforations that have meaning or meaning
or can be understood by someone who can understand it."
The recognition of the two types of electronic evidence above is based on Article 5 paragraph (1) and (2) of the
Electronic Information and Transaction Law which reads: 1). "Electronic information and/or electronic
documents and/or printouts are valid legal evidence. 2). Electronic Information and/or Electronic Documents
and/or printouts as referred to in paragraph (1) are an extension of valid evidence in accordance with the
applicable Law of Procedure in Indonesia.
The affirmation of the validity of electronic documents and electronic information as evidence is further
emphasized by changes to Law no. 11 of 2008 concerning Information and Electronic Transactions. These
changes are contained in Article 5, the content remains unchanged, but the explanation changes which further
emphasizes its existence, namely: Elucidation of Article 5 paragraphs (1) and (2) of the Electronic Information
and Transaction Law reads:
(1) Whereas the existence of Electronic Information and/or Electronic Documents is binding and recognized as
valid evidence to provide legal certainty for the Operation of Electronic Systems and Electronic
Transactions, especially in evidence and matters relating to legal actions carried out through Electronic
Systems.
(2) Specifically for Electronic Information and/or Electronic Documents in the form of interception or
wiretapping or recording which is part of wiretapping, it must be carried out in the context of law
enforcement at the request of the police, prosecutors, and/or other institutions whose powers are determined
by law.” It should be understood that electronic documents are the main form of electronic evidence both
contained in the ITE Law.
Electronic documents as the main form of electronic evidence can be divided into several types, namely: a.
Electronic Information, consisting of: Electronic data are all facts that are represented as input either in the form
of strings of words ( text ), numbers ( numeric ), imaging images ( images ), sounds ( voices ), or motion (
sensors ). The use of information technology is prohibited from being misused for other interests that harm
society such as distributing, transmitting or making accessible Electronic Information or Electronic Documents
that have content that violates decency, gambling, insults defamation, extortion and threats including spreading
false and misleading news and spreading information which is intended to create feelings of hatred or hostility
towards certain individuals or groups of people based on ethnicity, religion, race and intergroup (SARA) and
intentionally and without rights or against the law accessing computers and/or electronic systems belonging to
other people or an institution without permission and in any way that violates the applicable legal provisions can
certainly result in losses for other parties. The criminal justice process for violations of legal provisions in the
field of information technology and electronic transactions is carried out through the stages of investigation,
investigation, prosecution and examination in court for settlement of cases. Specifically for investigations into
criminal acts in the field of information technology and electronic transactions, it is necessary to carry out in
addition to investigators from the Police of the Republic of Indonesia, certain Civil Service Officials within the
Government whose scope of duties and responsibilities are in the field of Information Technology and
Electronic Transactions are given special authority. (Nadilla Beautiful Karmin 2019)
5. American Journal of Humanities and Social Sciences Research (AJHSSR) 2022
A J H S S R J o u r n a l P a g e | 152
C. Implementation of Investigation and Investigation of Criminal Cases by the Police against Persecution
that Caused the Death of People (Case Study of the Augustine Victim)
The crime of persecution is a form of crime that is highly considered by law, because this violation is very prone
to occur among the community. In fact, almost every day the mass media and electronics are filled with these
events. If we take a further look at the systemization in the Criminal Code regarding abuse resulting in serious
injury, it consists of ( MiSusanto. 2009).
According to MartimanProdjohamidjojo, "evidence or corpus delicti is evidence of a crime". In Article 181 of
the Criminal Code , "The panel of judges is obliged to show the defendant all the evidence and ask him whether
he recognizes the evidence." If deemed necessary, the judge at trial shows the evidence. AnsoriHasibuan
believes that evidence is goods used by the defendant to commit an offense or as a result of an offense,
confiscated by investigators to be used as evidence in court. ( AnsoriHasibuan and Ruben Ahmad , 1990 ).
Based on the opinions of several legal scholars above, it can be concluded that what is called evidence is:
a. Goods used to commit criminal acts;
b. Goods used to help commit a crime;
c. Objects that are the purpose of committing a criminal act; d. Objects resulting from a criminal act;
e. The object may provide information for the investigation of said crime, either in the form of an image or in
the form of a sound recording;
f. Evidence which is supporting evidence has a very important position in a criminal case.
But the presence of an item of evidence is not absolute in a criminal case, because there are several crimes
which in the process of proving do not require evidence, such as the crime of insulting orally (vide: Article 310
paragraph [1] Book of the Criminal Law Act " . When compared to the Common Law system, such as in the
United States, the evidence is very different. In the Criminal Procedure Law of the United States, the so-called
forms of evidence or evidence are: real evidence, documentary evidence, testimonial evidence and judicial
notice. In this Common Law system, real evidence is the most valuable evidence. Even though real evidence or
evidence is not included as evidence according to criminal procedural law in Indonesia.
d . Utilization of High-Tech Tools to Reveal Criminal Acts of Persecution That Caused the Death of
People
Based on an interview with IptuRahman, as an investigator at the DitreskrimumPolda Southeast Sulawesi,
Saturday, August 20, 2022, around 14.00 Central Indonesian Time that "This tool is capable of acting like a
mobile phone signal booster or router pole, or what is often referred to as a BTS pole. So that with such a role,
this tool can be used by the operator to be able to find out electronic transactions, both in the form of voice
communication and other forms of communication such as SMS and MMS.
Not only that, this tool is also able to show exactly where the telecommunications equipment that transmits the
telecommunications signal originates. In other words , a tool called Alsus DF (Direction Finder) is capable of
pinpointing the precision of a telecommunications device (which transmits a signal supporting the
telecommunication process) that is allegedly used by a person suspected of being the perpetrator of a crime.
Follow-up by knowing the location of the telecommunications equipment used by the person suspected of
committing the crime, it will be easy to identify the position of the person or suspected perpetrator of the crime.
Apart from having many advantages, this high-tech tool is inseparable from the many disadvantages it has. This
is in accordance with the saying that "that is not important about the machine, but more important are the people
who stand or operate behind that machine" or which in Indonesian means more or less, it is not important what
tools or machines are used, but more What matters is the person standing or operating the machine or tool (man
behind the gun).
Explanation of the assistant investigator First Brigadier Muhammad Tsabit Mar, Shi, on Saturday, August 20,
2022, around 15.00 Central Indonesian Time, that "This tool is indeed sophisticated, even for Indonesia's
standards, this tool is classified as very, very sophisticated. It is so sophisticated that if this tool is damaged,
almost all communication equipment technicians throughout Indonesia will not or have not been able to make
this high-tech device correct. In addition, operating this high-tech tool is very difficult, complicated and requires
considerable expertise and analysis. Even investigators from the Southeast Sulawesi Regional Police's Criminal
Investigation Unit have to go to school in Australia so they can operate this tool. What if we experience a
mutation, it will definitely be difficult to find people who can operate this tool.
Like other tools in the form of a machine, this machine called Alsus DF (Direction Finder) also has limitations.
These limitations in this case are limitations in the nature of monitoring coverage of communication transactions
or monitoring of the signal of the telecommunication equipment that is the target or target. A real example is the
use of this tool in handling or trying to uncover criminal acts of abuse against victims of Augustine's death. The
position of the suspect obtained is in Laonti District, Konawe Selatan district, where there is an area that has a
bad signal and sometimes there is a place where there is no signal. for communication. A tool called the Mobile
6. American Journal of Humanities and Social Sciences Research (AJHSSR) 2022
A J H S S R J o u r n a l P a g e | 153
Automatic Multi Biometric Identification System (MAMBIS) is an identification tool that can be carried
anywhere at a crime scene . The tool is used to find the identity of the perpetrators of crimes through the iris and
fingerprints.
The identification officer only needs to highlight the retina or press the thumb to the mambis sensor board.
Retinal scanning can only be done if the eye tissue has not been damaged (to scan a corpse's retina it must be no
later than four hours after death) determined by the results of the fingerprint and retina recording of the e-ID
card program, if at the time of recording the fingerprint and retina of the e-ID card were not perfect will provide
several possible identities. It can only process the scanning of a person who has been documented in the
Ministry of Trade's e-KTP database. Only by scanning the retinas of the eyes and fingerprints, the identity of the
victim of a murder crime or perpetrator of a crime without an identity can be known quickly.
IV. CONCLUSION
The obstacles faced by investigators at the DitreskrimumPoldaSultra in the use of technology related to the
process of investigating and investigating cases of abuse that caused the death of people consist of 3 (three)
obstacles, namely: a. Barriers to Legal Substance, as follows: 1) The Criminal Code does not recognize
electronic evidence; 2). The evidence in the Electronic Information and Transaction Law is not supported by
adequate implementing regulations; and 3) There is no progressive legal umbrella in terms of Standard
Operating Procedures for the use of technology in the process of investigating criminal acts of persecution that
cause death of people.
b . Barriers to Legal Structure, as follows: 1) Personnel support in terms of quantity and quality. In terms of
quantity, the personnel of the DitreskrimumPoldaSultra are still lacking because in carrying out investigations
into criminal acts of persecution that result in the death of people using sophisticated technological tools
requires personnel who have expertise and qualified skills in using sophisticated technological tools. In this case
the quality of the personnel of the Southeast Sulawesi Regional Police Ditreskrimum still do not understand and
master the use of high-tech tools, moreover the data analysis is carried out only by people with special skills
who are able to analyze electronic data obtained and even then only 1 (one) person. 2) Budget support for
criminal investigations at the DitreskrimumPoldaSultra is still lacking because the budget obtained is only for
handling a few cases. Meanwhile, incoming LP cases must be served as a whole. Not to mention, the budget to
pay experts who can read electronic data obtained from (Cell Dump) and use the Alsus Direct Finder and MD-
NEX (Cellebrite UFED 4PC) tools where investigators must have certification for using these tools. Currently,
in the ranks of the Southeast Sulawesi Regional Police Ditreskrimum, there is only 1 (one) investigator who has
certification for these high-tech equipment.3. Barriers to Legal Culture, as follows: 1)The use of electronic
evidence requires expert testimony; 2) Lack of understanding and mastery of investigators in the field of
technology and information
REFERENCES
Books:
[1] AndiSofyan in Parlindungan T. Saragih, 2018 “ Juridical Analysis of Proof of Online Gambling Crime
According to Law No. 11 of 2008 concerning Information and Electronic Transactions ”, USU Law
Journal, Vol. 6, No. 2, April 2 p. 22
[2] Eddy OS Hiariej , 2012 Theory & Law of Proof , (Jakarta: Erlangga, p. 16.
[3] IqbalRamadhanSatriaPrawira, " Online Gambling Law Enforcement Conducted by the Medan Police
Criminal Investigation Unit Based on the Implementation of the Criminal Code and Law No. 19 of
2016 concerning Amendments to Law no. 11 of 2008 concerning Electronic Information and
Transactions , Thesis, Master of Law Study Program, Faculty of Law, University of North Sumatra,
Medan, 2018, p. 1. 2 Article 14 paragraph (1) letter g. Law No. 2 of 2002 concerning the Indonesian
National Police
[4] Nadilla Indah Karmin. 2019. Information Technology Crime in Law Number 11 of 2008 Concerning
Information and Electronic Transactions ,LexCrimen 8(4): page 41.
[5] MiSusanto. 2009. Persecution Resulting in Serious Injury in the Criminal Code. Thesis. SunanAmpel
State Islamic University, Surabaya. page 44
[6] AnsoriHasibuan and Ruben Ahmad, 1990 Criminal Procedure Code, (Bandung: Space,), p. 184.
Legislation
[7] Number IE15 Standard Operational Procedures for Police Headquarters No. Document SOP-DIT-
TIPIDKOR-005, dated 05 March 2014 concerning Special Equipment (hereinafter referred to as SOP
MabesPolri Special Equipment).
[8] Number IE19 Standard Operational Procedures for Police Headquarters No. Document SOP-DIT-
TIPIDKOR-005, dated 05 March 2014 concerning Special Equipment (hereinafter referred to as SOP
MabesPolri Special Equipment).
7. American Journal of Humanities and Social Sciences Research (AJHSSR) 2022
A J H S S R J o u r n a l P a g e | 154
[9] IE Number 20 Standard Operational Procedures for Police Headquarters No. Document SOP-DIT-
TIPIDKOR-005, dated 05 March 2014 concerning Special Equipment (hereinafter referred to as SOP
MabesPolri Special Equipment).
[10] Republic of Indonesia Law Number 2 of 2002, concerning the Indonesian National Police.
[11] Law No. 1 of 1946 concerning Criminal Law or commonly called the Criminal Code (KUHP).
[12] Law No. 8 of 1981 concerning Criminal Procedure Code or commonly called the Criminal Procedure
Code (KUHAP)
[13] Law Number 19 of 2016 concerning amendments to Law no. 11 of 2008 concerning Information and
Electronic Transactions as amended by Law no. 19 of 2016 concerning Amendments to Law No. 11 of
2008 concerning Information and Electronic Transactions (UU ITE).
[14] Telecommunications Operators are individuals, cooperatives, Regional Owned Enterprises, State
Owned Enterprises, Private Enterprises, Government Agencies, and State Defense and Security
Agencies. See: Article 1 letter d of Law no. 36 of 1999 concerning Telecommunications.
[15] Regulation of the Chief of Police of the Republic of Indonesia No. 14 of 2012 concerning Criminal
Investigation Management. Police Kabareskrim Regulation No. 3 of 2014 concerning Standard
Operational Procedures for Investigating Criminal Acts.