This document summarizes a research paper about violations of cybercrime and jurisdiction in Indonesia. It discusses how technological advances have enabled new forms of digital crime. It describes several types of cybercrimes such as unauthorized access, spreading viruses, hacking, and cyberterrorism. It also discusses Indonesia's laws regarding electronic information and cybercrime. The document analyzes some challenges around jurisdiction for cybercrimes that cross borders. It examines how Indonesia applies legal jurisdiction and sanctions to cybercrime perpetrators based on the location of the crime and perpetrator. It aims to explain how Indonesia's legal system will handle cybercrime cases and reduce such violations.
Al Amin Rahman & Associates is among the very few leading law firms in Bangladesh, having its presence throughout out of the world. We believe in our lawyers, they are very professional in their work and always try to suggest the best opinion according to the situation. We understated the importance of our client and work very carefully towards the procedure of Legal service. For further details in regards to LEGAL SERVICE in Bangladesh follow the down below link.
For further details in regards to LEGAL SERVICE in Bangladesh follow the down below link
Website: http://www.alaminrahman.com/2016/12/27/cyber-law-bangladesh/
Email: info@alaminrahman.com
Important issues in Pakistan's Cyber Crime BillTeeth Maestro
This presentation was made by Zahid Jamil on 7th Sept 2007 which highlighted important issues regarding the new cyber Crime Bill which is soon to be made into a law. http://dbtb.org
Cyberspace Usages Challenges And Disputeresolution Jautkarshjani
In todays world every 2nd company must have suffered some form of Cyber Crime at some point of time. Should it be ignored or should it be dealt with Iron Hands. Is there anything a company can or must do to prevent this? Yes, where there are problems, there are solutions and our IT Act give you such solutions. What is required is awareness and this presentation is just an attempt to sensitize todays corporates to arise to this issue and deal with it effectively.
Al Amin Rahman & Associates is among the very few leading law firms in Bangladesh, having its presence throughout out of the world. We believe in our lawyers, they are very professional in their work and always try to suggest the best opinion according to the situation. We understated the importance of our client and work very carefully towards the procedure of Legal service. For further details in regards to LEGAL SERVICE in Bangladesh follow the down below link.
For further details in regards to LEGAL SERVICE in Bangladesh follow the down below link
Website: http://www.alaminrahman.com/2016/12/27/cyber-law-bangladesh/
Email: info@alaminrahman.com
Important issues in Pakistan's Cyber Crime BillTeeth Maestro
This presentation was made by Zahid Jamil on 7th Sept 2007 which highlighted important issues regarding the new cyber Crime Bill which is soon to be made into a law. http://dbtb.org
Cyberspace Usages Challenges And Disputeresolution Jautkarshjani
In todays world every 2nd company must have suffered some form of Cyber Crime at some point of time. Should it be ignored or should it be dealt with Iron Hands. Is there anything a company can or must do to prevent this? Yes, where there are problems, there are solutions and our IT Act give you such solutions. What is required is awareness and this presentation is just an attempt to sensitize todays corporates to arise to this issue and deal with it effectively.
Cyber Crimes: The Transformation of Crime in the Information AgeVishni Ganepola
The research paper attempts to provide a definition on cyber-crimes and has also identified few types of cyber-crimes that have been internationally recognized.
Existing Sri Lankan Legal Framework on Cyber CrimesVishni Ganepola
What are the offences that are considered to be cyber-offences under the Sri Lankan law?
What would be the consequences, if a person commits such cyber-crime in Sri Lanka? In order
to find the answers for the above questions, one need to analyse the provisions of the Sri
Lankan legislative enactments which provides for the identification and prevention of cyber
crimes and the provisions which provide the investigation procedure to be adapted in tracing
the criminals. The law governing the cyber-crimes is mainly found in the Computer Crimes Act
No.24 of 2007 (CCA) while few other legislative enactments such A provide for the
identification of various other offences. With regard to admissibility of computer evidence,
Evidence (Special Provision) Ordinance and Electronic Transaction Act No.19 of 2006 (ETA)
provide the requirements that need to be established before the courts in order for the
evidence to be accepted as relevant.
Cyber
Whether legal jurisdiction is able to check cyber-crime where there are no territorial borders and even where the criminal does not have any physical presence in the forum
Cyber Crimes: The Transformation of Crime in the Information AgeVishni Ganepola
The research paper attempts to provide a definition on cyber-crimes and has also identified few types of cyber-crimes that have been internationally recognized.
Existing Sri Lankan Legal Framework on Cyber CrimesVishni Ganepola
What are the offences that are considered to be cyber-offences under the Sri Lankan law?
What would be the consequences, if a person commits such cyber-crime in Sri Lanka? In order
to find the answers for the above questions, one need to analyse the provisions of the Sri
Lankan legislative enactments which provides for the identification and prevention of cyber
crimes and the provisions which provide the investigation procedure to be adapted in tracing
the criminals. The law governing the cyber-crimes is mainly found in the Computer Crimes Act
No.24 of 2007 (CCA) while few other legislative enactments such A provide for the
identification of various other offences. With regard to admissibility of computer evidence,
Evidence (Special Provision) Ordinance and Electronic Transaction Act No.19 of 2006 (ETA)
provide the requirements that need to be established before the courts in order for the
evidence to be accepted as relevant.
Cyber
Whether legal jurisdiction is able to check cyber-crime where there are no territorial borders and even where the criminal does not have any physical presence in the forum
Essay on Introduction to Computer Crime
Essay about CyberCrime and Terrorism
Cyber Crime : A Crime
Essay on CyberCrime
Cyber Crime Essay
Cyber Crimes And The Crime
Persuasive Essay On Cybercrime
Cyber Crime Essay
Cybercrime And Its Effect On Society
CyberCrime Essay
Essay on Cyber Crime and National Security
Cyber-Crime is a Serious Problem Essay examples
Literature Review On Cyber Crime
Cyber Crime
Cyber Crime
Why Cybercrime Is Important
Essay on Cyber Crime and Cyber Law
Cybercrime: Two Case Studies
Cyber Crime Essay
Cyber Crime Essay
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ransomware Attacks Perspective (pp. 79-82)
Sulaiman Al Amro, Computer Science Department, Computer College, Qassim University, Qassim, Saudi Arabia.
Vol. 18 No. 6 JUNE 2020 International Journal of Computer Science and Information Security
https://sites.google.com/site/ijcsis/vol-18-no-6-jun-2020
Essay on Cyber Crime and Cyber Law
Essay on CyberCrime
Cyber Crime Essay
Cyber Crime : A Crime
Cybercrime: Two Case Studies
Literature Review On Cyber Crime
Cyber Crime And Transnational Crime Essay
Essay on Cyber Crime and National Security
Cyber Crime Essay
CyberCrime Essay
Cyber Crime Essay
The Issue Of Cyber Crimes Essay
Essay on Introduction to Computer Crime
Essay about CyberCrime and Terrorism
Pros And Disadvantages Of Cyber Crime Essay
Internet Crime Essay
Cyber Crime
Cyber-Crime is a Serious Problem Essay examples
Advantages And Disadvantages Of Cyber Crime
Cyber Crime Essay
Pros And Cons Of Cybercrime
Pros And Disadvantages Of Cyber Crime Essay
Cyber Crime : A Crime
Cybercrime: Two Case Studies
Cyber Crime Speech
Why Cybercrime Is Important
The Issue Of Cyber Crimes Essay
Cyber Security Threats And Crimes
Cyber Crime Essay
Cybercrime Research Paper : Cybercrime
Cyber Crime In Australia
Cyber Crimes And The Crime
Research Paper On Cybercrime
Cyber Crime
Cyber Crime And Transnational Crime Essay
CyberCrime Essay
Advantages And Disadvantages Of Cyber Crime
Disadvantages Of Cyber Crime
Essay on Computer Crimes
Cyber Crime Essay
Globalization has made the use of computer to grow drastically over the years. More people from different parts of the world are coming closer to one another through computers. The World Wide Web has enabled this phenomenon to be possible, but also, it has led to the emergence of cyber crimes. Although law enforcement agencies have come up with security policies, the number of crimes related to computer theft and hacking is still alarming
Issues with respect to the proper ownership and jurisdiction of information contained on the internet have set the stage for an ongoing legal debate over Cyber-Law and its impact on Cyber-Crime.
Enhanced Global Cyber-Security and proposed governing regulations are not a luxury, but a necessity, for today’s business and government entities which operate in real time environments.
The Authority of Government in Clearing Hatefull and Hostilities Electronic I...IJECEIAES
The Act Number 19 of 2016 concerning the amendment of The Act Number 11 of 2008 concerning Information and Electronic Transaction governing the authority of government in clearing hateful and hostilities electronic information based on tribe, religion, race and intergroup. On the one hand, the government authority aims to protect the public interest and the integrity of the nation, but on the other hand, termination of access to information would restrict the right to freedom of opinion and the right to privacy of Internet users. This study was a normative legal research, which examined the basic authority for the government to shut down negative content in cyberspace. Legal materials were collected through library research. The analysis was conducted qualitatively. This study examined three issues, namely; spreading hatred and hostility in cyberspace, legality government to close the spreading hatred and hostility and electronic evidence in spreading hatred and hostility. Spreading hatred and hostility were criminal acts that used the Internet as facilities. Internet was used by extremists to disseminate his teachings, even being used to commit acts of terrorism (cyber terrorism). In maintaining the unity and integrity, then the government had the authority to shut down access to the unlawful electronic system. The closure should be accompanied by proof of electronic information that contains hatred and hostility based on tribe, religion, race and intergroup.
Because the technology is used largely in the last decades; cybercrimes have become a significant
international issue as a result of the huge damage that it causes to the business and even to the ordinary
users of technology. The main aims of this paper is to shed light on digital crimes and gives overview about
what a person who is related to computer science has to know about this new type of crimes. The paper has
three sections: Introduction to Digital Crime which gives fundamental information about digital crimes,
Digital Crime Investigation which presents different investigation models and the third section is about
Cybercrime Law.
Because the technology is used largely in the last decades; cybercrimes have become a significant
international issue as a result of the huge damage that it causes to the business and even to the ordinary
users of technology. The main aims of this paper is to shed light on digital crimes and gives overview about
what a person who is related to computer science has to know about this new type of crimes. The paper has
three sections: Introduction to Digital Crime which gives fundamental information about digital crimes,
Digital Crime Investigation which presents different investigation models and the third section is about
Cybercrime Law.
The security and speed of data transmission is very important in data communications, the steps that can be done is to use the appropriate cryptographic and compression algorithms in this case is the Data Encryption Standard and Lempel-Ziv-Welch algorithms combined to get the data safe and also the results good compression so that the transmission process can run properly, safely and quickly.
The problem of electric power quality is a matter of changing the form of voltage, current or frequency that can cause failure of equipment, either utility equipment or consumer property. Components of household equipment there are many nonlinear loads, one of which Mixer. Even a load nonlinear current waveform and voltage is not sinusoidal. Due to the use of household appliances such as mixers, it will cause harmonics problems that can damage the electrical system equipment. This study analyzes the percentage value of harmonics in Mixer and reduces harmonics according to standard. Measurements made before the use of LC passive filter yield total current harmonic distortion value (THDi) is 61.48%, while after passive filter use LC the THDi percentage becomes 23.75%. The order of harmonic current in the 3rd order mixer (IHDi) is 0.4185 A not according to standard, after the use of LC passive filter to 0.088 A and it is in accordance with the desired standard, and with the use of passive filter LC, the power factor value becomes better than 0.75 to 0.98.
This paper examines the long-term simultaneous response between dividend policy and corporate value. The main problem studied is that the dividend policy is responded very slowly to the final goal of corporate value. Analysis of Data was using Vector Autoregression (VAR). The result of the discussion concludes the effect of different simultaneous response every period between dividend policy with corporate value, short-term, medium-term, and long-term. The strongest response to dividend changes comes from free cash flow whereas the highest response to corporate value comes from market book value.
Whatsapp is a social media application that is currently widely used from various circles due to ease of use and security is good enough, the security at the time of communicating at this time is very important as well with Whatsapp. Whatsapp from the network is very secure but on the local storage that contains the message was not safe enough because the message on local storage is not secured properly using a special algorithm even using the software Whatsapp Database Viewer whatsapp message can be known, to improve the security of messages on local storage whatsapp submitted security enhancements using the Modular Multiplication Block Cipher algorithm so that the message on whatsapp would be better in terms of security and not easy to read by unauthorized ones.
Consumers are increasingly easy to access to information resources. Consumers quickly interact with whatever they will spend. Ease of use of technology an impact on consumer an attitude are increasingly intelligent and has encouraged the rise of digital transactions. Technology makes it easy for them to transact on an e-commerce shopping channel. Future e-commerce trends will lead to User Generated Content related to user behavior in Indonesia that tends to compare between shopping channels. The purpose of this study was to examine the direct and indirect effects of Perceived Ease of Use on Behavioral Intention to transact in which Perceived Usefulness is used as an intervening variable. The present study used the descriptive exploratory method with causal-predictive analysis. Determination method of research sample used purposive sampling. The enumerator team assists in the distribution of questionnaires. The results of the study found that the direct effect of perceived ease of use on behavioral intention to transact is smaller than that indirectly mediated by perceived usefulness variables.
Performance is a process of assessment of the algorithm. Speed and security is the performance to be achieved in determining which algorithm is better to use. In determining the optimum route, there are two algorithms that can be used for comparison. The Genetic and Primary algorithms are two very popular algorithms for determining the optimum route on the graph. Prim can minimize circuit to avoid connected loop. Prim will determine the best route based on active vertex. This algorithm is especially useful when applied in a minimum spanning tree case. Genetics works with probability properties. Genetics cannot determine which route has the maximum value. However, genetics can determine the overall optimum route based on appropriate parameters. Each algorithm can be used for the case of the shortest path, minimum spanning tree or traveling salesman problem. The Prim algorithm is superior to the speed of Genetics. The strength of the Genetic algorithm lies in the number of generations and population generated as well as the selection, crossover and mutation processes as the resultant support. The disadvantage of the Genetic algorithm is spending to much time to get the desired result. Overall, the Prim algorithm has better performance than Genetic especially for a large number of vertices.
Implementation of Decision Support System for various purposes now can facilitate policy makers to get the best alternative from a variety of predefined criteria, one of the methods used in the implementation of Decision Support System is VIKOR (Vise Kriterijumska Optimizacija I Kompromisno Resenje), VIKOR method in this research got the best results with an efficient and easily understood process computationally, it is expected that the results of this study facilitate various parties to develop a model any solutions.
Edge detection is one of the most frequent processes in digital image processing for various purposes, one of which is detecting road damage based on crack paths that can be checked using a Canny algorithm. This paper proposed a mobile application to detect cracks in the road and with customized threshold function in the requests to produce useful and accurate edge detection. The experimental results show that the use of threshold function in a canny algorithm can detect better damage in the road
The security and confidentiality of information becomes an important factor in communication, the use of cryptography can be a powerful way of securing the information, IDEA (International Data Encryption Algorithm) and WAKE (Word Auto Key Encryption) are some modern symmetric cryptography algorithms with encryption and decryption function are much faster than the asymmetric cryptographic algorithm, with the combination experiment IDEA and WAKE it probable to produce highly secret ciphertext and it hopes to take a very long time for cryptanalyst to decrypt the information without knowing the key of the encryption process.
Employees are the backbone of corporate activities and the giving of bonuses, job titles and allowances to employees to motivate the work of employees is very necessary, salesman on the company very much and to find the best salesman cannot be done manually and for that required the implementation of a system in this decision support system by applying the TOPSIS method, it is expected with the implementation of TOPSIS method the expected results of top management can be fulfilled.
English is a language that must be known all-digital era at this time where almost all information is in English, ranging from kindergarten to college learn English. elementary school is now also there are learning and to help introduce English is prototype application recogni-tion of common words in English and can be updated dynamically so that updates occur information to new words and sentences in Eng-lish to be introduced to students.
The selection of the best employees is one of the process of evaluating how well the performance of the employees is adjusted to the standards set by the company and usually done by top management such as General Manager or Director. In general, the selection of the best employees is still perform manually with many criteria and alternatives, and this usually make it difficult top managerial making decisions as well as the selection of the best employees periodically into a long and complicated process. Therefore, it is necessary to build a decision support system that can help facilitate the decision maker in determining the best choice based on standard criteria, faster, and more objective. In this research, the computational method of decision-making system used is Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS). The criteria used in the selection of the best employees are: job responsibilities, work discipline, work quality, and behaviour. The final result of the global priority value of the best employee candidates is used as the best employee selection decision making tool by top management.
Rabin Karp algorithm is a search algorithm that searches for a substring pattern in a text using hashing. It is beneficial for matching words with many patterns. One of the practical applications of Rabin Karp's algorithm is in the detection of plagiarism. Michael O. Rabin and Richard M. Karp invented the algorithm. This algorithm performs string search by using a hash function. A hash function is the values that are compared between two documents to determine the level of similarity of the document. Rabin-Karp algorithm is not very good for single pattern text search. This algorithm is perfect for multiple pattern search. The Levenshtein algorithm can be used to replace the hash calculation on the Rabin-Karp algorithm. The hash calculation on Rabin-Karp only counts the number of hashes that have the same value in both documents. Using the Levenshtein algorithm, the calculation of the hash distance in both documents will result in better accuracy.
Competitive market competition so the company must be smart in managing finance. In promoting the selling point, marketing is the most important step to be considered. Promotional routine activity is one of the marketing techniques to increase consumer appeal to marketed products. One of the important agendas of promotion is the selection of the most appropriate promotional media. The problem that often occurs in the process of selecting a promotional media is the subjectivity of decision making. Marketing activities have a taxation fund that must be issued. Limited funds are one of the constraints of improving market strategy. So far, the selection of promotional media is performed by the company manually using standardized determination that already applies. It has many shortcomings, among others, regarding effectiveness and efficiency of time and limited funds. Markov Chain is very helpful to the company in analyzing the development of the company over a period. This method can predict the market share in the future so that company can optimize promotion cost at the certain time. Implementation of this algorithm produces a percentage of market share so that businesses can determine and choose which way is more appropriate to improve the company's market strategy. Assessment is done by looking at consumer criteria of a particular product. These criteria can determine consumer interest in a product so that it can be analyzed consumer behavior.
The transition of copper cable technology to fiber optic is very triggering the development of technology where data can be transmitted quickly and accurately. This cable change can be seen everywhere. This cable is an expensive cable. If it is not installed optimally, it will cost enormously. This excess cost can be used to other things to support performance rather than for excess cable that should be minimized. Determining how much cable use at the time of installation is difficult if done manually. Prim's algorithm can optimize by calculating the minimum spanning tree on branches used for fiber optic cable installation. This algorithm can be used to shorten the time to a destination by making all the points interconnected according to the points listed. Use of this method helps save the cost of fiber optic construction.
An image is a medium for conveying information. The information contained therein may be a particular event, experience or moment. Not infrequently many images that have similarities. However, this level of similarity is not easily detected by the human eye. Eigenface is one technique to calculate the resemblance of an object. This technique calculates based on the intensity of the colors that exist in the two images compared. The stages used are normalization, eigenface, training, and testing. Eigenface is used to calculate pixel proximity between images. This calculation yields the feature value used for comparison. The smallest value of the feature value is an image very close to the original image. Application of this method is very helpful for analysts to predict the likeness of digital images. Also, it can be used in the field of steganography, digital forensic, face recognition and so forth.
Compression is an activity performed to reduce its size into smaller than earlier. Compression is created since lack of adequate storage capacity. Data compression is also needed to speed up data transmission activity between computer networks. Compression has the different rule between speed and density. Compressed compression will take longer than compression that relies on speed. Elias Delta is one of the lossless compression techniques that can compress the characters. This compression is created based on the frequency of the character of a character on a document to be compressed. It works based on bit deductions on seven or eight bits. The most common characters will have the least number of bits, while the fewest characters will have the longest number of bits. The formation of character sets serves to eliminate double characters in the calculation of the number of each character as well as for the compression table storage. It has a good level of comparison between before and after compression. The speed of compression and decompression process possessed by this method is outstanding and fast.
Technological developments in computer networks increasingly demand security on systems built. Security also requires flexibility, efficiency, and effectiveness. The exchange of information through the internet connection is a common thing to do now. However, this way can be able to trigger data theft or cyber crime which resulted in losses for both parties. Data theft rate is getting higher by using a wireless network. The wireless system does not have any signal restrictions that can be intercepted Filtering is used to restrict incoming access through the internet. It aims to avoid intruders or people who want to steal data. This is fatal if not anticipated. IP and MAC filtering is a way to protect wireless networks from being used and misused by just anyone. This technique is very useful for securing data on the computer if it joins the public network. By registering IP and MAC on a router, this will keep the information unused and stolen. This system is only a few computers that can be connected to a wireless hotspot by IP and MAC Address listed.
Catfish is one type of freshwater fish. This fish has a good taste. In the cultivation of these fish, many obstacles need to be faced. Because living in dirty water, this type of fish is susceptible to disease. Many symptoms arise during the fish cultivation process; From skin disease to physical. Catfish farmers do not know how to diagnose diseases that exist in their livestock. This diagnosis serves to separate places between good and sick catfish. The goal is that the sale value of the fish is high. Catfish that have diseases will be sold cheaper to be used as other animal feed while healthy fish will be sold to the market or exported to other countries. Diagnosis can be done by expert system method. The algorithm of certainty factor is one of the good algorithms to determine the percentage of possible fish disease. This algorithm is very helpful for farmers to improve catfish farming.
Documents do not always have the same content. However, the similarity between documents often occurs in the world of writing scientific papers. Some similarities occur because of a coincidence, but something happens because of the element of intent. On documents that have little content, this can be checked by the eyes. However, on documents that have thousands of lines and pages, of course, it is impossible. To anticipate it, it takes a way that can analyze plagiarism techniques performed. Many methods can examine the resemblance of documents, one of them by using the Rabin-Karp algorithm. The algorithm is very well since it has a determination for syllable cuts (K-Grams). This algorithm looks at how many hash values are the same in both documents. The percentage of plagiarism can also be adjusted up to a few percent according to the need for examination of the document. Implementation of this algorithm is beneficial for an institution to do the filtering of incoming documents. It is usually done at the time of receipt of a scientific paper to be published.
Responsibilities of the office bearers while registering multi-state cooperat...Finlaw Consultancy Pvt Ltd
Introduction-
The process of register multi-state cooperative society in India is governed by the Multi-State Co-operative Societies Act, 2002. This process requires the office bearers to undertake several crucial responsibilities to ensure compliance with legal and regulatory frameworks. The key office bearers typically include the President, Secretary, and Treasurer, along with other elected members of the managing committee. Their responsibilities encompass administrative, legal, and financial duties essential for the successful registration and operation of the society.
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptxanvithaav
These slides helps the student of international law to understand what is the nature of international law? and how international law was originated and developed?.
The slides was well structured along with the highlighted points for better understanding .
ALL EYES ON RAFAH BUT WHY Explain more.pdf46adnanshahzad
All eyes on Rafah: But why?. The Rafah border crossing, a crucial point between Egypt and the Gaza Strip, often finds itself at the center of global attention. As we explore the significance of Rafah, we’ll uncover why all eyes are on Rafah and the complexities surrounding this pivotal region.
INTRODUCTION
What makes Rafah so significant that it captures global attention? The phrase ‘All eyes are on Rafah’ resonates not just with those in the region but with people worldwide who recognize its strategic, humanitarian, and political importance. In this guide, we will delve into the factors that make Rafah a focal point for international interest, examining its historical context, humanitarian challenges, and political dimensions.
Military Commissions details LtCol Thomas Jasper as Detailed Defense CounselThomas (Tom) Jasper
Military Commissions Trial Judiciary, Guantanamo Bay, Cuba. Notice of the Chief Defense Counsel's detailing of LtCol Thomas F. Jasper, Jr. USMC, as Detailed Defense Counsel for Abd Al Hadi Al-Iraqi on 6 August 2014 in the case of United States v. Hadi al Iraqi (10026)
WINDING UP of COMPANY, Modes of DissolutionKHURRAMWALI
Winding up, also known as liquidation, refers to the legal and financial process of dissolving a company. It involves ceasing operations, selling assets, settling debts, and ultimately removing the company from the official business registry.
Here's a breakdown of the key aspects of winding up:
Reasons for Winding Up:
Insolvency: This is the most common reason, where the company cannot pay its debts. Creditors may initiate a compulsory winding up to recover their dues.
Voluntary Closure: The owners may decide to close the company due to reasons like reaching business goals, facing losses, or merging with another company.
Deadlock: If shareholders or directors cannot agree on how to run the company, a court may order a winding up.
Types of Winding Up:
Voluntary Winding Up: This is initiated by the company's shareholders through a resolution passed by a majority vote. There are two main types:
Members' Voluntary Winding Up: The company is solvent (has enough assets to pay off its debts) and shareholders will receive any remaining assets after debts are settled.
Creditors' Voluntary Winding Up: The company is insolvent and creditors will be prioritized in receiving payment from the sale of assets.
Compulsory Winding Up: This is initiated by a court order, typically at the request of creditors, government agencies, or even by the company itself if it's insolvent.
Process of Winding Up:
Appointment of Liquidator: A qualified professional is appointed to oversee the winding-up process. They are responsible for selling assets, paying off debts, and distributing any remaining funds.
Cease Trading: The company stops its regular business operations.
Notification of Creditors: Creditors are informed about the winding up and invited to submit their claims.
Sale of Assets: The company's assets are sold to generate cash to pay off creditors.
Payment of Debts: Creditors are paid according to a set order of priority, with secured creditors receiving payment before unsecured creditors.
Distribution to Shareholders: If there are any remaining funds after all debts are settled, they are distributed to shareholders according to their ownership stake.
Dissolution: Once all claims are settled and distributions made, the company is officially dissolved and removed from the business register.
Impact of Winding Up:
Employees: Employees will likely lose their jobs during the winding-up process.
Creditors: Creditors may not recover their debts in full, especially if the company is insolvent.
Shareholders: Shareholders may not receive any payout if the company's debts exceed its assets.
Winding up is a complex legal and financial process that can have significant consequences for all parties involved. It's important to seek professional legal and financial advice when considering winding up a company.
How to Obtain Permanent Residency in the NetherlandsBridgeWest.eu
You can rely on our assistance if you are ready to apply for permanent residency. Find out more at: https://immigration-netherlands.com/obtain-a-permanent-residence-permit-in-the-netherlands/.
A "File Trademark" is a legal term referring to the registration of a unique symbol, logo, or name used to identify and distinguish products or services. This process provides legal protection, granting exclusive rights to the trademark owner, and helps prevent unauthorized use by competitors.
Visit Now: https://www.tumblr.com/trademark-quick/751620857551634432/ensure-legal-protection-file-your-trademark-with?source=share
In 2020, the Ministry of Home Affairs established a committee led by Prof. (Dr.) Ranbir Singh, former Vice Chancellor of National Law University (NLU), Delhi. This committee was tasked with reviewing the three codes of criminal law. The primary objective of the committee was to propose comprehensive reforms to the country’s criminal laws in a manner that is both principled and effective.
The committee’s focus was on ensuring the safety and security of individuals, communities, and the nation as a whole. Throughout its deliberations, the committee aimed to uphold constitutional values such as justice, dignity, and the intrinsic value of each individual. Their goal was to recommend amendments to the criminal laws that align with these values and priorities.
Subsequently, in February, the committee successfully submitted its recommendations regarding amendments to the criminal law. These recommendations are intended to serve as a foundation for enhancing the current legal framework, promoting safety and security, and upholding the constitutional principles of justice, dignity, and the inherent worth of every individual.
Debt Mapping Camp bebas riba to know how much our debt
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
1. The International Journal Of Humanities & Social Studies (ISSN 2321 - 9203) www.theijhss.com
209 Vol 5 Issue 12 December, 2017
THE INTERNATIONAL JOURNAL OF
HUMANITIES & SOCIAL STUDIES
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
1. Introduction
Technological advances open up huge crime opportunities. This can be seen from the many cases that come to court
about digital crime. The cases handled are about the misuse of technologies such as the internet, hoaxes, fake photos and
others. One of the facts that cause cybercrime is the need for computer network technology is increasing. Commercial
community activities become important things done by using the computer network. It can be spread all over the country.
World activities will last for 24 hours and can be monitored for 24 hours as well. These activities include stock trading,
banking, and other financial activities. In cyberspace, any activity can be done. This positively impacts technological
advancements and adds convenience for people to exchange information. But this did not escape the negative impact. When
pornography rife on the internet, the law can not do much in the past. The development of internet technology triggered the
emergence of cybercrime. This action will harm others. Cybercrime activities include credit card theft, hacking multiple sites,
intercepting other people's data transmissions, and manipulating data by preparing several programs such as viruses to
commit such crimes. Cybercrime has become a threat to international stability, so the government is difficult to compensate
crime techniques done with computer technology, especially internet and intranet networks.
Cyberspace is a media without limits because it is connected to a network of computers connected to the world. It
does not recognize territorial or state boundaries. This crime will cause its problems, especially in criminal law and
jurisdiction. Jurisdiction is the power or competence of state law against people, objects or events. This is the principle of state
sovereignty, equality of state and principle of non-interference. Jurisdiction is also a vital and central form of sovereignty that
can transform, create or terminate a legal relationship or obligation.
This research tries to explain how the legal system will be applied to cybercrime perpetrators based on certain
violations. Each violation has a different legal act. By applying jurisdiction, cybercrime actors will be reduced for the sake of
state stability and sovereignty.
Masdin Saragih
Lecturer, Faculty of Law, Universitas Simalungun, Simalungun, Indonesia
Henry Aspan
Lecturer, Faculty of Economics and Business, Universitas Pembangunan Panca Budi, Medan, Indonesia
Andysah Putera Utama Siahaan
Lecturer, Faculty of Computer Science, Universitas Pembangunan Panca Budi, Medan, Indonesia
Ph.D. Student, Department of School of Computer and Communication Engineering,
Universiti Malaysia Perlis, Kangar, Malaysia
Abstract:
Cybercrime is a digital crime committed to reaping profits through the Internet as a medium. Any criminal activity that
occurs in the digital world or through the internet network is referred to as internet crime. Cybercrime also refers to
criminal activity on computers and computer networks. This activity can be done in a certain location or even done
between countries. These crimes include credit card forgery, confidence fraud, the dissemination of personal information,
pornography, and so on. In ancient times there was no strong law to combat cybercrime. Since there are electronic
information laws and transactions, legal jurisdiction of computer crime has been applied. Computer networks are not
only installed in one particular local area but can be applied to a worldwide network. It is what makes cybercrime can
occur between countries freely. This issue requires universal jurisdiction. A country has the authority to combat crimes
that threaten the international community. This jurisdiction is applied without determining where the crime was
committed and the citizen who committed the cybercrime. This jurisdiction is created in the absence of an international
judicial body specifically to try individual crimes. Cybercrime cannot be totally eradicated. Implementing international
jurisdiction at least reduces the number of cybercrimes in the world.
Keywords: Cybercrime, Jurisdiction, Law
2. The International Journal Of Humanities & Social Studies (ISSN 2321 - 9203) www.theijhss.com
210 Vol 5 Issue 12 December, 2017
2. Theories
2.1. Cybercrime
Cybercrime is an illegal activity conducted in cyberspace with computer intermediaries or other electronic
equipment. It includes technologies that support technological means such as mobile phones, smartphones and others that can
be done through a global electronic network. Cybercrime attempts to enter a computer network without permission.
Cybercrime is considered to conflict or against any applicable law. The difference with a common crime can be seen from the
versatile capabilities shown by the development of information and sophisticated communication technology. Figure 1
describes the types of cybercrime.
Figure 1: Types of Cybercrime
There are several types of crime on cybercrime that can be classified based on the activities such as:
3. The International Journal Of Humanities & Social Studies (ISSN 2321 - 9203) www.theijhss.com
211 Vol 5 Issue 12 December, 2017
- Unauthorized Access
It is a crime that occurs when a person enters or infiltrate into a computer network system unlawfully, without permission,
or without the knowledge of the owner of the computer network system it enters. Examples of these crimes are Probing
and port.
- Illegal Contents
It is a crime committed by entering data or information to the internet about a thing that is untrue, unethical, and can be
regarded as unlawful or disturbing public order, for example, the spread of pornography or untrue news.
- Virus Spread
The spread of the virus is generally done by using an email. Often people whose email system is exposed to a virus do not
realize this. The virus is then sent to another place via email.
- Cyber Espionage, Sabotage, and Extortion
Cyber Espionage is a crime by way of exploiting the internet network to conduct spying on other parties, by entering the
target computer network system. Sabotage and Extortion is a type of crime committed by making interference, destruction
or destruction of a data, computer program or computer network system connected to the internet.
- Carding
Carding is a crime committed to steal credit card numbers belonging to others and used in trade transactions on the
internet.
- Hacking and Cracking
The term hacker usually refers to someone who has a great interest to learn the computer system in detail and how to
improve its capabilities. Cracking activity on the internet has a very wide scope, ranging from hijacking someone else's
account, website hijacking, probing, spreading the virus, to the disabling of the target. The latter act is referred to a DoS
(Denial Of Service).DoS attack is an attack that aims to paralyze the target (hangs, crashes) so it can not provide services.
- Cybersquatting and Typosquatting
Cybersquatting is a crime committed by registering the domain name of another company's company and then trying to
sell it to the company with a more high price. The typosquatting is a crime by creating a fake domain that is a domain
similar to someone else's domain name.
- Cyber Terrorism
Cybercrime actions include cyber terrorism if it threatens government or citizens, including cracking into government or
military sites.
2.2. Constitution of Electronic Information
This law was originally to protect the interests of the state, the public, and the private sector from cybercrime. There
are three broad categories that include laws that are about defamation, blasphemy, and online threats.The law ensnares not
only the author but also those who distribute, transmit, or otherwise make the content accessible electronically. The mistake is
to distribute is to send and disseminate information and electronic documents to many people or various parties through the
internet network. Transmitting is sending information directed to one party through the virtual world. Making publicly
accessible content is all other cybercrime deeds. Those who share information or content that violates the law may be charged
and penalized. Social media users should be more careful and do not share things publicly without good and correct
verification. The information should be reexamined before it is fully shared publicly. Sharing, distributing and harming others
is a criminal act that can be criminalized. The following are some restrictions that must be considered in using information in
the scope of cyberspace.
- Create and grant access to ethically charged content
Any person who knowingly distributes, transmits, and or creates content that has an electronic infringement charge that is
accessible electronically can be charged under this Act.
- Threaten, blackmail and defame a person's name
Any person who distributes, transmits and makes accessible electronic information possessing defamation or defamation
contents outlined in the Criminal Code may be charged under this article.
- Tapping
Tapping can only be done for the purpose of investigating law enforcement officers. The intercepts referred to are those for
4. The International Journal Of Humanities & Social Studies (ISSN 2321 - 9203) www.theijhss.com
212 Vol 5 Issue 12 December, 2017
listening, recording, deflecting, altering, inhibiting, and recording non-public information, using either a wired
communications network or a wireless network, such as electromagnetic or radio frequency.
- Defamation
Any person intentionally and without the right to distribute, transmit and make such information publicly accessible shall
be subject to criminal penalties.
- Hoax
This type of prohibition to provide false news that is provocative and misleading which resulted in the loss of consumers
can be punished with imprisonment.
- Hate Speech
Threats of disseminating information aimed at generating a sense of hatred or hostility towards specific individuals or
groups of people based on ethnicity, religion, race, and intergroup including things that can be criminalized.
3. Result and Discussion
3.1. Crime Juridiction in Cybercrime Transaction
Cybercrime is an illegal activity conducted in cyberspace with comp
Jurisdiction is a state's authority to exercise its national law against persons, objects, or legal events. State jurisdiction
in international law means the right of a State to regulate and influence by legislative, executive, and judicial measures and
actions on the rights of individuals, property or property, behaviors or events which are problems within a country and
abroad.
Jurisdiction relates to legal matters, the powers or authorities of a judiciary or other legal entity which is based on
applicable law. There are limits to the scope of that ability to create, implement and apply the law to those who disobey it.
Although jurisdiction is closely related to territory, this linkage is not absolute. Other states may also have authority to try an
act done abroad.
The jurisdiction of the law has always been a serious problem faced by law enforcers especially if the offender is a
foreign citizen. Cybercrime and jurisdiction make it clear that to address cybercrime problems within this legal jurisdiction
involving inter-state. Several components can be used by states to claim legal jurisdiction over cybercrime cases:
- Place of crime conducted
This is usually done by applying the principle of territoriality by factors such as:
o The locations where crime is committed
o The location where the evidence is located
o The locations where the offender is located
o The location where the result is located
o The locations where the matters related to the crime is located
- The Place where the perpetrator was arrested
This component is used by applying the principle of universality in which each State has the right to try any person who
commits an international crime.
- Citizenship
This component is divided into two, citizenship of victims and perpetrators. The victim's citizenship may be used to claim
the jurisdiction of a case and the perpetrator's citizenship may also be used but the offending State must guarantee to
prosecute justly the offender for feeling responsible for the acts perpetrated by the offender.
- The strength of the case
This component should be submitted by the public prosecutor in a document stating that they have a strong case to
prosecute the perpetrator in his country.
- Criminalization
The duration of the crime can be used as a component to determine jurisdiction in the case of cybercrime.
- Justice and Comfort
Justice aims to state the right to claim jurisdiction over cybercrime cases. The country has a fair, impartial and comfortable
judicial system for witnesses to attend the hearing.
5. The International Journal Of Humanities & Social Studies (ISSN 2321 - 9203) www.theijhss.com
213 Vol 5 Issue 12 December, 2017
3.2. Law Enforcement
Law enforcement on cybercrime especially in Indonesia is strongly influenced by five factors such as law, mentality,
social behavior, means, and culture. The law cannot be upright by itself always involves humans in it and also involves human
behavior in it. The law also can not erect by itself without any law enforcers. Law enforcers are not only prosecuted for
professionalism and smart in applying legal norms but also dealing with someone even a group of people suspected of
committing a crime.
Law enforcers are required to work hard because law enforcement is the main subject of war against cyber crime. For
example, UN Resolution No. 5 of 1963 on efforts to combat crimes of misuse of Information Technology on December 4, 2001,
indicates that there are a severe, grave and immediate international problem. The Criminal Code is still used as the legal basis
to encompass cybercrime, especially the cybercrime which fulfills the elements in the articles of the Criminal Code. Some of the
constitutional grounds in the Criminal Code used by law enforcement agencies include:
Article 167 of the Criminal Code
Article 406 paragraph1 of the Criminal Code
Article 282 of the Criminal Code
Article 378 of the Criminal Code
Article 112 of the Criminal Code
Article 362 of the Criminal Code
Article 372 of the Criminal Code
There is another law related to this matter. It is Law No. 11 of 2008 on Information and Electronic Transactions (IET).
The rules of criminal acts committed therein are proven to threaten the internet users. Since the enactment of Law No. 11 Year
2008 on Information and Electronic Transactions on 21 April 2008, has caused many victims. Based on the monitoring that has
been the alliance do at least there have four people who called the police and became a suspect for allegedly committed a crime
stipulated in the Law on ITE. The suspects or victims of the ITE Act are active internet users who are accused of insulting or
related to the contempt content on the internet.Those accused under the IET Law are likely to be subject to Article 27
paragraph 3 in conjunction with Article 45 paragraph 1 of the IET Law which is six years in jail and 1 billion rupiahs fine. IET
law can be used to beat all cybercrime activities on the internet without exception.
3.3. Legal Sanctions
Several laws govern the penalties for cybercrime perpetrators. Here are some of the laws that serve as the reference of the
state of Indonesia in regulating the punishment of cybercrime perpetrators:
1. Law No. 19 of 2002 on Copyright. According to Article 1 of Law No. 19 of 2002 on Copyrights stated that a computer
program is a set of instructions embodied in the form of a language, code, scheme or another form. When combined with a
computer software, it is capable of making the computer work to perform functions, special functions or to achieve specific
results, including preparation for designing such instructions. The copyright for the computer program is valid for 50
years, as contained in Article 30. The price of a costly computer or software program for Indonesian citizens is a promising
opportunity for businesses to double and sell pirated software at very low prices.
2. Law No. 36 of 1999 on Telecommunications. According to Article 1 of Law No. 36 of 1999, Telecommunications is any
transmission, transmission, and acceptance and any information in the form of signs, signals, writings, drawings, sounds
and sounds through a wire, optical, radio, or other electromagnetic systems. From the definition, the Internet and all its
facilities is one form of communication tool because it can send and receive any information in the form of images, sounds,
and films with electromagnetic systems. Misuse of the Internet disturbing public or private order may be penalized by
using this Act:
Illegal access, acts of unauthorized access to this computer system has not been regulated in the legislative system in
Indonesia. Article 22 number 36 year 1999 concerning Telecommunication may be applied. Article 22 of the
Telecommunications Law states that everyone is prohibited from doing unlawful, unlawful, or manipulating acts:
a. Access to telecommunication networks
b. Access to telecommunication services
c. Access to dedicated telecommunication networks.
Article 50 of the Telecommunications Law provides a criminal penalty against anyone who violates the provisions of
Article 22 of the Telecommunications Law with a maximum imprisonment of six years or a maximum fine of Rp.
600,000,000.00.
Illegal interception of computer operations, systems, and computer networks. Article 40 of the Telecommunications
Law may apply to this type of interception. Article 56 of the Telecommunications Law provides a criminal penalty
against anyone who violates the provisions of Article 40 with a maximum imprisonment of 15 (fifteen) years.
3. Law No. 8 of 1997 concerning Company Documents. By the issuance of Law no. 8 of 1997 dated March 24, 1997,
concerning Company Documents in the provisions of one of its articles regulates the possibility of storing corporate
documents in the form of electronic (paperless) acknowledging that company documents stored in electronic media can be
6. The International Journal Of Humanities & Social Studies (ISSN 2321 - 9203) www.theijhss.com
214 Vol 5 Issue 12 December, 2017
used as valid evidence. For example, Compact Disk Read Only Memory (CD ROM), and Write Once Read Many (WORM),
outlined in Article 12 of the Act as valid evidence.
4. Law No. 25 of 2003 on Amendment to Law no. 15 year 2002 on the Crime of Money Laundering. This law is the most
powerful law for an investigator to obtain information about a suspect who commits fraud over the Internet since it does
not require long and time-consuming bureaucratic procedures since fraud is one of the types of crimes included in the
washing money as contained in article 2, paragraph 1. The Investigator may request to the bank receiving the transfer to
provide the identity and banking data owned by the suspect without having to follow the rules as stipulated in the Banking
Act. In the Banking Act the identity and banking data is part of bank secrecy so that if the investigator needs the
information and data, the procedure to be done is to send a letter from the Chief of Police to the Governor of Bank
Indonesia.
4. Conclusion
Cybercrime is a crime arising from the negative impact of technological development. Means used in the form of
computers, smartphones, and devices connected to the Internet. It also occurs because of the inability of the law including the
apparatus in reaching it. This crime is virtual because the offender does not appear physically.Cybercrime law enforcement is
an activity that harmonizes the values that are outlined in the law against cybercrime. Cybercrime is an unlawful activity
conducted using the internet based on the sophistication of computer technology and telecommunications.Jurisdiction in
cyberspace requires clear principles rooted in international law. Each country may develop regulations to adopt the same
solution to statements concerning internet jurisdiction. The principles of jurisdiction will make it easier for states to enter into
cooperation to harmonize criminal provisions to cope with cybercrime.Indonesia has implemented a strong jurisdiction
system in tackling cybercrime. These provisions have been regulated in the Criminal Code as appropriate. Under applicable
law, cybercriminals will be prosecuted by the provisions.
5. References
i. Brown, C. S. (2015). Investigating and Prosecuting Cyber Crime: Forensic Dependencies and Barriers to Justice.
International Journal of Cyber Criminology, 9(1), 55-119.
ii. Hait, A. A. (2014). Jurisdiction in Cybercrimes: A Comparative Study. Journal of Law, Policy and Globalization, 22, 75-
84.
iii. Hariyanto, & Siahaan, A. P. (2016). Intrusion Detection System in Network Forensic Analysis and Investigation. IOSR
Journal of Computer Engineering, 18(6), 115-121.
iv. Manurung, D. (2013, 11 27). Cyber Crime: Hukum dan Sanksi. (Blogspot) Retrieved 12 10, 2017, from
http://desrianimanroe.blogspot.co.id/2013/11/hukum-dan-sanksi.html
v. Muslimah, S., & Hidayati, N. (2017, 9 29). 7 Hal di UU ITE yang Wajib Kamu Tahu Agar Tak Bernasib Seperti Jonru.
(Kumparan) Retrieved 12 20, 2017, from https://kumparan.com/@kumparannews/7-hal-di-uu-ite-yang-wajib-
kamu-tahu-agar-tak-bernasib-seperti-jonru
vi. Ramadhani, S., Saragih, Y. M., Rahim, R., & Siahaan, A. P. (2017). Post-Genesis Digital Forensics Investigation.
International Journal of Scientific Research in Science and Technology, 3(6), 164-166.
vii. Rusmiatiningsih. (2013, 10 19). Yuridiksi Hukum Pidana dalam Transaksi Cybercrime. (Blogspot) Retrieved 12 20,
2017, from http://rusmiatiningsih.blogspot.co.id/2013/10/yuridiksi-hukum-pidana-dalam-transaksi.html
viii. Saragih, Y. M., & Siahaan, A. P. (2016). Cyber Crime Prevention Strategy in Indonesia. International Journal of
Humanities and Social Science, 3(6), 22-26.
ix. Sudyana, D. (2015, 10 1). Pengenalan Cyber Crime. Retrieved 12 20, 2017, from
http://blog.didiksudyana.com/2015/10/pengenalan-cyber-crime.html
x. Tasril, V., Ginting, M. B., Mardiana, & Siahaan, A. P. (2017). Threats of Computer System and its Prevention.
International Journal of Scientific Research in Science and Technology, 3(6), 448-451.
xi. Triwahyuni, Y. (2015, 12 5). Pengertian, Jenis-jenis, dan Contoh Kasus Cyber Crime. (Wordpress) Retrieved 12 20, 2017,
from https://yuliatwn.wordpress.com/2015/12/05/pengertian-jenis-jenis-dan-contoh-kasus-cyber-crime/