Cyber Terrorism- A Perspective of Policy Analysis

被引:0
作者
Golose, Petrus Reinhard [1 ]
机构
[1] Sekolah Tinggi Ilmu Kepolisian STIK PTIK, Dept Police Studies, Jakarta, Indonesia
来源
INTERNATIONAL JOURNAL OF CYBER CRIMINOLOGY | 2022年 / 16卷 / 02期
关键词
cyber terrorism; policy; densus; 88; electronic information and transactions; Bali Bombing;
D O I
10.5281/zenodo.4766572
中图分类号
DF [法律]; D9 [法律];
学科分类号
0301 ;
摘要
In the present era of globalization, the use of technology and the internet has rapidly increased in different areas of work and personal life. This has also opened up new doorways to transform conventional terrorism into cyber-terrorism by providing various opportunities for terrorist groups to carry out their activities without any hindrance. In Indonesia, the concept of cyberterrorism is rapidly increasing, creating issues for the public and the government. Thus, the present study focuses on the concept of cyberterrorism from the perspective of policy and other authorities which are responsible for controlling cyberterrorism. For this study, a "normative research method" was utilized and the data was collected from secondary sources such as books, cases, journals, doctrines, and others, and content analysis was conducted. The results collected from this study showed that Bali Bombing II in 2002 highlighted the insignificant role of cyber terrorism in Indonesia. Even though "Constitution number 36, the year 1999, about telecommunication" has been formulated but it was general and did not focus on cyber terrorism. Later on, "Law No. 19 of 2016 on Amendments to Law No. 11 of 2008 on Electronic Information and Transactions," highlighted cyber terrorism as an illegal approach to a computer system. Moreover, Densus 88 an anti-terrorist organization has also utilized cyber technology to identify the networks and planning of terrorists. Thus, it has been recommended that important policies and strategies should be formulated by the government to control cyberterrorism.
引用
收藏
页码:149 / 161
页数:13
相关论文
共 45 条
  • [1] Andini O.P., 2021, Unnes Law Journal: Jurnal Hukum Universitas Negeri Semarang, V7, P333, DOI DOI 10.15294/ULJ.V7I1.38804
  • [2] [Anonymous], 2022, CURR CONTENTS
  • [3] Aryuni M, 2020, PROCEEDINGS OF 2020 INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT AND TECHNOLOGY (ICIMTECH), P555, DOI 10.1109/ICIMTech50083.2020.9211261
  • [4] Aulianisa S. S., 2020, LEX SCIENTIA LAW REV, V4, P31, DOI [10.15294/lesrev.v4i1.38197, DOI 10.15294/LESREV.V4I1.38197]
  • [5] Bahaweres R. B., 2022, 2022 10 INT C CYB IT, DOI [10.1109/CITSM56380.2022.9935864, DOI 10.1109/CITSM56380.2022.9935864]
  • [6] Bakry M., 2021, INT J CRIMINOLOGY SO, V10, P1267
  • [7] Damayanti D., 2021, J INFORM ASSURANCE C, V2021, P1, DOI [10.5171/2021.695424, DOI 10.5171/2021.695424]
  • [8] Febriansyah L., 2018, J THEORETICAL APPL I, V96, P7563
  • [9] Fernando Y., 2020, ACMIT P, V7, P47, DOI [10.33555/acmit.v7i1.106, DOI 10.33555/ACMIT.V7I1.106]
  • [10] Francis A. W., 2018, THESIS U PEMBANGUNAN