8,384 research outputs found

    Success of Implementation of Computer Crime Act (UU Ite No.11 2008) (a Case Study in the Higher Education Institution in Indonesia)

    Full text link
    Computer crime rate grow rapidly along with the development of the digital world that has touched almost all aspects of human life. Institutions of higher education cannot be separated from the problem of computer crime activities. The paper analyses the implementation of Indonesia Computer Crime Act (UU ITE NO.11 2008) in the Higher Education Institution in Indonesia. It aims to investigate the level of computer crimes that occurred in the higher education institution environment and the act (UU ITE 11, 2008) successfully applied to prevent the crime that would arise. In this research, the analysis using Descriptive Statistics, Binary logistic regression. This paper also describes the success implementation of the Information System Security Policy (ISSP) as a computer crime prevention policy in higher education institution in Indonesia. In factor of act, clarity of objectives and purpose of the UU ITE 11, 2008 was low, the communication and socialization activities are still low to the society especially to the higher education institution, moreover the control process has been running on UU ITE 11, 2008, but at a low level

    Computer Crime

    Get PDF
    Based on the European Council Convention on computer crime, the article analyses the international response to computer delinquency.O artigo analisa a resposta internacional à delinqüência informática, a partir da Convenção do Conselho da Europa sobre a cibercriminalidade

    Computer Crime Prevention in Higher Education Institution Through Computer Crime Act Implementation (UU ITE 11, 2008) (A Case Study in the Higher Education Institution in Indonesia)

    Get PDF
    The development of communication and computer technology is growing rapidly. Meanwhile computer crime is also developed along with the development of this digital world. The information technology usage in the higher education institution is not immune from computer crime. Higher education institutions collect data from the public for the benefit of educational activities that make the institution also has a strategic data that must be protected, therefore the computer crime law is needed. The Indonesian government has carried out a computer crime law in anticipation of computer crime in Indonesia as well as responds to public anxiety over security in the use of information technology. This paper describes the implementation of the Indonesia computer crime act UU ITE 11, 2008 as a computer crime prevention method in higher education institution in Indonesia

    A Management Perspective On The People, Procedures And Prevention Of Computer Crime

    Get PDF
    The area of computer crime is a new and complex one. Corporations are increasingly feeling the ramifications of computer crime. It is estimated that computer crime has an impact of over four billion dollars yearly. The types of computer crime include vandalism, theft of industrial secrets, and theft of financial assets. The range of computer crime includes profit organizations, service centers, and research facilities. A new danger for research and medical centers is the possibility of destroying vital research data. The type of people involved in computer crime are varied. Most of the people are not super intelligent; rather they are people who have had an opportunity to use the computer and understand ways of circumventing computer safeguards. The most common abuser is the company employee who uses his or her position and has the skill, knowledge, and access. Their are numerous methods of entering the system; including data diddling and the trojan horse technique. Because of the rise in computer crime, including data there has been a need to upgrade security systems. Until recently, the gap between computer technology and security technology has been increasing. New innovations have started to add more security to the system. New computer systems must have the capability to be upgraded as the techniques of computer crime improve. There has also been a push to get legislation passed aimed at slowing down computer crime. Because the area of computer crime is new, it is taking time to implement the laws. The courts are also having to approach the area slowly. There are few cases pertaining to computer crime, so many of the cases now in court are setting precedents. The purpose of this study is to enlighten managers and users of computers on the need for a secure system. There are a number of useful policies and procedures which can be implemented to keep computers and their assets safe increasing. New innovations have started to add more security to the system. New computer systems must have the capability to be upgraded as the techniques of computer crime improve. There has also been a push to get legislation passed aimed at slowing down computer crime. Because the area of computer crime is new, it is taking time to implement the laws. The courts are also having to approach the area slowly. There are few cases pertaining to computer crime, so many of the cases now in court are setting precedents. The purpose of this study is to enlighten managers and users of computers on the need for a secure system. There are a number of useful policies and procedures which can be implemented to keep computers and their assets safe

    Computer Crime and Control in Hong Kong

    Get PDF
    This Article is a first attempt to study cyberspace governance and computer crime control in Hong Kong. It begins with a discussion of how computer crime was discovered as a cognizable object of control. Next, it explores the nature, prevalence and distribution of computer crime in Hong Kong before embarking on a comprehensive review and critical analysis of the Hong Kong government\u27s cyberspace governance philosophy and computer crime control policy. The Article closes with a number of recommendations for improving Hong Kong cyberspace governance, which focus on developing a broad, overarching policy that both meets the public\u27s goals and addresses private sector concerns

    Seriousness perceptions of computer crime vs traditional crime

    Get PDF
    With the various advancements made in technology over the last few decades, computer crime has evolved and many are used to victimize more and more American internet users every year (NW3C, 2008). However, no researcher has examined neither how computer crime seriousness is perceived by internet users nor which (if any) social factors affect how the seriousness of computer crime is perceived. The current study attempted to determine internet users\u27 perceptions of computer crime seriousness versus traditional crime seriousness. In addition, the study tried to determine the effects of the following factors as they relate to computer crime seriousness: personal victimization, personal offending, friend offending, perception of crime prevalence in the U.S., and perceived likelihood of offender punishment. A survey was created and used to measure experience and perceptions of 313 college students from a Northern New England University. Results indicate computer crimes were rated significantly more serious in most cases, seriousness scores varied significantly by individual crime, crimes against children were rated significantly more serious than crimes against adults and perceived likelihood of offender punishment relates strongly with seriousness perception variation

    Європейська конвенція з кіберзлочинів

    Get PDF
    Розглянуто проблеми комп’ютерної злочинності у контексті інтеграції України до європейського співтовариства. Пропонуються організаційні заходи щодо створення Міжвідомчого центру боротьби з комп’ютерною злочинністю.The problem of computer crime in a context of integration of Ukraine in the European society is examined. The organizational measures of formation of Interagency center on combating computer crime are offered
    corecore