The development of internet nowadays does not only give a positive impact but also gives a negative impact in the form of crime that targets everyone, including children. Cyber crime which impact children as a victim should be handled seriously, this considering the fact that children need to get optimal protection to ensure their growth as the hope of nation. This study aims to determine and analyze the impact on cyber crime that impact children as its victim. This research uses juridical-sociological research method which is analyzed descriptively. The results show that the development of cyber crime that afflicts children as victims every year increases with various forms of development and crime mode. However, the legal protection aimed to reduce such crime is still very weak due to weak legislation, law enforcement performance and cyber security in Indonesia. The research is intended to provide recommendation for the government, law enforcers and the public, so that cyber crime that impact children as victims could be reduced and ensure protection for children.
... Consequently, among all Internet users, children are the most vulnerable to cybercrime, including cyberbullying, scams, interactions with strangers, and exposure to inappropriate content such as pornography and hate speech [11]. These significant threats to cybersecurity and well-being faced by children in the online sphere can lead to severe consequences for their mental health, as emphasized by [12]. As Saudi Arabia's digital landscape continues to evolve, it becomes increasingly imperative to implement measures that protect children from the risks of the virtual world. ...
... The result of the study showed that in 2011 there were 188 cases of cyberbullying pornography in cyberspace, 175 cases in 2012, 247 cases in 2013, 322 cases in 2014, 463 cases in 2015, and 497 cases in 2016. The data from KPAI shows that there is an increase in cyberbullying that affects children [7]. ...
... Diversity in Indonesia makes it a conflict-prone country if its people are weak in filtering information. Besides fake news moral issues such as examples of violence committed by a student to his teacher becomes a sad phenomenon [7] History of learning is one of the essential tools in realizing civic intelligence. Learning history not only discusses events but can also be in the form of analysis of the heroic values of biographies of national figures. ...
Learning based on evidence and empirical data always make students more involved in the content area and help to conceptualise how to take decisions, based on tangible evidence offered by both scientific literature and experiments, or by data and information obtained through various procedures. This is the era where digital natives inhabit and immerse in Google world for every single need and deed which may results in intentional or unintentional engagements in several social media platforms that may lead to serious cyber threats and issues, even crimes. The present experimental study analysed the effectiveness of Evidence based learning strategy for enhancing cyber security awareness among higher secondary students. From a total sample of 100 higher secondary students, 50 each were randomly selected as control and experimental groups and are given learning experience through ongoing activity-based method and Evidence based learning strategy respectively. Pre-test and post-test on cyber security awareness were conducted and results obtained were statistically analysed through mean, standard deviation, and t-test. Result of the study revealed that the group instructed through evidence-based learning strategy showed significantly higher level of awareness than the group instructed through ongoing method.
Currently the world is undergoing major changes, namely the Industrial Revolution 4.0. The Industrial Revolution 4.0 is a change in the mechanism for the production of goods and services marked by a number of characteristics, namely the use of the internet of things, big data, automation, robotics, lay computing, to artificial intelligence. This change is not only felt by the private sector, but also by government organizations. What the community, especially students, can do to play a role in this industrial era and take steps and places as the driving force of this country is to develop a critical thinking pattern that is not easily eroded by negative influences. This means that with the amount of information that can be obtained, students must be able to see which information can be trusted and which is not and do not immediately believe in any information that is not necessarily true. In addition to the various opportunities offered in the Industrial Revolution 4.0 era, there are many new public issues that must be faced, such as online transportation polemics, the threat of e-commerce to conventional shops/retails and cybercrime. This time, we focus on cybercrime. Cybercrime is a crime that is carried out electronically. This crime takes various forms. The presence of Law Number 11 of 2008 concerning Electronic Information and Transactions has regulated the prohibited actions related to electronic information and transactions. The problem of violence that occurs through online media in fact poses a problem for the whole community. For this reason, everyone needs to get a good understanding of the impact of cybercrime, and the potential emergence of women as victims of these crimes, such as cyberstalking and cyberpornography. Through this education, it is hoped that the community will understand their rights to the maximum, especially those related to the right to obtain education and the freedom to express their opinions.
The Industrial Revolution 4.0 is a change in the mechanism for the production of goods and services marked by a number of characteristics, namely the use of the internet of things, big data, automation, robotics, lay computing, to artificial intelligence. This change is not only felt by the private sector, but also by government organizations. What the community, especially students, can do to play a role in this industrial era and take steps and places as the driving force of this country is to develop a pattern of critical thinking that is not easily eroded by negative influences. This means that with the amount of information that can be obtained, students must be able to see which information can be trusted and which is not and do not immediately believe in any information that is not necessarily true. In addition to the various opportunities offered in the Industrial Revolution 4.0 era, there are many new public issues that must be faced, such as online transportation polemics, the threat of e-commerce to conventional shops/retails and cybercrime. This time, we focus on cybercrime, and the problem of violence that occurs through online media in fact poses a problem for the whole community. For this reason, everyone needs to get a good understanding of the impact of cybercrime, and the potential emergence of women as victims of these crimes, such as cyberstalking and cyberpornography.
The advancement of technology and communication has been impressively rapid. That are where emerging cybercrime technologies were born. Cyberspace activities involve the use of Internet users. One of them is a frequent social media user, which allows for communication interactions to take place without the need for face-to-face meetings. The Internet and social media, in addition to having a positive impact on users, also have a negative impact. One of them is a type of crime that is currently prevalent, namely digital cybercrime, which is a crime committed by varied individuals in order to deceive the target using data/information from the victim's social media account. Furthermore, in the current era of the Covid-19 pandemic, many victims have received fraud, such as spam calls and SMS, from people who use various methods to persuade, usually using the victim's family as tactic and overdue in loan payments as trap, and the number of these victims is growing. This study used a comparative study to examine the effectiveness of the Truecaller application in assisting smartphone users who are disturbed by continuous terror by using calls and Spam SMS, as well as overcoming victims' concerns.
The growth of technology has increased the buying and selling of commodities virtually. However, the lack of physical stores makes it impossible for potential buyers to evaluate the quality of their commodities or facilities. This in turn encourages the emergence of virtual shopping scams by perpetrators. This paper mainly tries to evaluate the extent of online shopping fraud in Online Store Fraud Crimes in Indonesia by using a normative juridical approach, which uses secondary data. Fraud in cybercrime requires the victim to develop a statement of the actuality of the crime to police officers. The report must be accompanied by primary evidence in electrical information or methods of publication of electronic information and data. From there, to verify the actuality of a particular type of fraud, an investigation is carried out. The procedural law related to the ITE Law in Indonesia is regulated in article 42 which states that investigations into cybercrimes are carried out against the criminal procedure provisions in the ITE Law. Finally the essay finds that the Criminal Code of virtual fraud is regulated on Electronic Data and Transactions in Law number 19 of 2016.
Pengadilan Negeri Sungguminasa melalui putusan nomor 324/Pid.2014/PN.SGM telah menghukum Terdakwa (FR) karena telah terbukti melakukan delik pencemaran nama baik melalui media sosial dengan pidana penjara selama 8 (Delapan) bulan. Permasalahan yang timbul adalah bagaimanakah pertimbangan hakim menjatuhkan putusan terhadap pertanggungjawaban pidana terhadap terdakwa yang telah terbukti melakukan kasus pencemaran nama baik melalui media sosial. Penelitian ini menggunakan jenis penelitian yuridis normatif. Pendekatan masalah yang digunakan dalam penelitian ini meliputi pendekatan undang-undang (statute approach), pendekatan konseptual (conceptual approach) dan pendekatan kasus (case approach). Hasil penelitian menunjukkan bahwa pertimbangan hakim nomor 324/Pid.2014/PN.SGM Pengadilan Negeri Sungguminasa telah mencerminkan putusan yang telah mencerminkan rasa keadilan. Dimana putusan hakim mampu menggali pertimbangan-perimbangan secara yuridis dan non yuridis, sehingga hakim dalam putusannya menemukan unsur kesalahan terdakwa terhadap pasal 27 ayat (1) UU ITE yang disangkakan penuntut umum. Putusan hakim atas kasus ini bahwa hakim mampu menggali nilai-nilai yang hidup dalam masyarakat dalam hal ini Adat Bugis-Makassar sebagai Adat yang menjadi falsafah hidup di tempat terjadinya peristiwa pidana.
Limitations of law in cyberporn law enforcement demands the need for non-penal approach as pre-ventive effort to eliminate causes of Cyberporn crimes. This approach includes crime prevention which aims to prevent a crime from being recurred. This approach can be implemented through situ-ational control by active involvement of cultural roles in community. However, it cannot be separat-ed from observing human life variations including childhood, youth, family, school, gender, peer group which play significant role during productive period. Those variations cane be taken as a theo-retical base for cyberporn crime prevention.Keywords: pornography, internet, crime prevention
Mobile phones are increasingly developing into a technology-based device that everyone is dependent
on. While previous research has been extensive in examining different theoretical explanations for
interpreting juvenile delinquency, research on mobile induced online sexual harassment among
juvenile populations have been rather scarce and limited. As a result of this dearth, the present study
employs a theoretical approach in rationalizing why juveniles commit online sexual harassment using
their mobile phones. Elements from both social learning and self-control theories are used to assess the
causes for online sexual harassment using mobile phones. By conducting binomial logistic regression
analyses, this study finds that both social learning and low self-control components are salient factors
in determining the causes of juvenile sexual harassment in cyberspace. From these findings, policies
will be introduced to address the major causes of juvenile online sexual harassment using mobile
phones.
Webcam child prostitution is an emerging form of online child sexual abuse which the victim simply sells his/her lives sexual images through Voice-over-IP (VoIP) applications. Although it doesn't directly create some negative effects of traditional child prostitution like sexually transmitted diseases, it may provide future offenders and victims to the traditional crimes such as child prostitution and child sex tourism. Therefore, appropriate and effective prevention strategies for this heinous act should be introduced accordingly. In this respect, this article discuss the efficiency of current methods of detection and propose some futuristic methods such as metadata and content data analysis of VoIP communications by the private sector and the use of fully automated chatbots for undercover operations. The applicability of such new methods in real life heavily relies on legal amendments and requires further research on technical aspects in particular.
The US approach to cybersecurity implicitly rests on an effects-based logic. That is, it presumes that the key question determining how the US and others will respond to attacks is what effects they have. Whether the effects come about as a result of cyber means or kinetic means is largely irrelevant. In this article, we explore this logic further, focusing on the question of when the US should deploy cyber responses and when kinetic. We find that under a simple effects-based logic, kinetic responses will often be more effective than cyber responses, although we explain that cyber attacks that 'leave something to chance’ may be an effective deterrent under some circumstances. We next develop a richer understandings of actors' expectations by employing the concepts of focal points and saliencies. In this framework, kinetic responses may be considered too escalatory, and therefore less attractive under many circumstances. If there are 'focal points' emerging, under which cyber attacks are seen as qualitatively distinct from kinetic attacks, then crossing a saliency may appear escalatory, even if the actual effects of the kinetic and cyber attackes are identifical. Finally, we examine nascent norms around cyber, suggesting that the US may wish to consider promoting a norm against large scale attacks on civilian infrastructure, and evaluating the prospects for a norm against cyber attacks on nuclear command and control systems.
Online child sexual abuse is an increasingly visible problem in society today. The introduction, growth and utilization of information and telecommunication technologies (ICTs) have been accompanied by an increase in illegal activities. With respect to cyberspace the Internet is an attractive environment to sex offenders. In addition to giving them greater access to minors, extending their reach from a limited geographical area to victims all around the world, it allows criminals to alter or conceal their identities. Sexual predators, stalkers, child pornographers and child traffickers can use various concealment techniques to make it more difficult for investigators to identify them and find evidence. Others physically hide removable media and incriminating evidence in rented storage space, impeding an investigator’s job to find the truth. France has given the protection of children from sexual exploitation and abuse a high priority. Traditional laws have been amended to address the challenges of information technology, violence and to bring at the same time the country into line with international conventions on the rights of children. Accordingly this current article will analyze some of the techniques used by offenders to abuse children online, including recent legal and administrative developments in France concerning online children protection.
With advancements in modernization came the infiltration of information and communication technologies across the world, Nigeria inclusive. Several benefits are obtainable from these but also prevalent are some associated risks. Communication exists massively in cyberspace and as such poses a myriad of threats to a nation. This can be addressed on a national spectrum by the implementation of cyber security policies and strategies. This research involves making a qualitative analysis of the current Nigerian National Cyber Security Policy and Strategy. The documents were analyzed in the light of selected harmonized strategy developmental frameworks and subsequently comparatively evaluated with similar documents of selected countries. After the analysis, the national documents were found to have met majority of the requirements in terms of content, but failed to address certain elements of concern to cyber security in the Nigerian environment.
Online child sexual abuse is an increasingly visible problem in society today. The introduction, growth and utilization of information and telecommunication technologies (ICTs) have been accompanied by an increase in illegal activities. With respect to cyberspace the Internet is an attractive environment to sex offenders. In addition to giving them greater access to minors, extending their reach from a limited geographical area to victims all around the world, it allows criminals to alter or conceal their identities. Sexual predators, stalkers, child pornographers and child traffickers can use various concealment techniques to make it more difficult for investigators to identify them and find evidence. Others physically hide removable media and incriminating evidence in rented storage space, impeding an investigator’s job to find the truth. France has given the protection of children from sexual exploitation and abuse a high priority. Traditional laws have been amended to address the challenges of information technology, violence and to bring at the same time the country into line with international conventions on the rights of children. Accordingly this current article will analyze some of the techniques used by offenders to abuse children online, including recent legal and administrative developments in France concerning online children protection.
Since the advent of the network era, different countries adopted different stance on maintaining social order in cyber space; soft, strong, or medium. In China, as in some other countries in the same group, a tough approach has been taken from the beginning. The purpose of this article is, by studying a series of legal actions against cyber crime, to explore in to the Chinese model of regulation of cyber space. In order to exercise control over the Internet, China has implemented statutory laws and administrative regulations revolving activity criminalizing, content filtering and user monitoring so as to maintain security and stability at both community and state levels. A tight legal and regulatory network has gradually weaved through recruitment of cyber police, investment on security technology, regulations on communications enterprises, and surveillance over users. Regardless of critics, this model was proved to have the merits of effectiveness in the specific socio-legal context in a short term.