The Role of Indonesian Police Through “Cyber Patrol” in Preserving and Maintaining Cyber Room Security
DOI:
https://doi.org/10.46799/ijssr.v2i8.146Keywords:
Police, Cyber, PatrolAbstract
The development of an increasingly advanced era has an impact on the advancement of technology and information that is increasing rapidly. The era of the Industrial Revolution 4.0 has also become something that requires everyone to be more sensitive and accustomed to using technology. However, like two sides of the same coin, it seems that everything that has a positive impact also has a drawback or a negative impact, the existence of deviations either by system errors or from human resources, causing new problems in the cyber world. Carding crimes, misuse of data, phishing, and defacement of a website, as well as activities that cause unrest, such as defamation and hoaxes, are some disturbing activities in the cyber world. Regarding this problem, the State or Government, which has the responsibility to protect its citizens, has begun to take a stand by coordinating with relevant institutions to take action and prevent the increase of crime in the cyber world. The National Police, as one of the state's tools and the front line in dealing with security and law enforcement, has formed a patrol team called the "Cyber Police" by conducting "Cyber Patrol" activities. It is very interesting to discuss, considering that nowadays, people can use technology to do something that violates the law; therefore, the existence of the Cyber Police is expected to prevent the bad impact of a cyber incident to create a safe and comfortable environment both directly (real), or indirectly (virtual world).
References
Cascavilla, G., Tamburri, D. A., & Van Den Heuvel, W.-J. (2021). Cybercrime threat intelligence: A systematic multi-vocal literature review. Computers & Security, 105, 102258. Scopus
CNN, I. (2021). BSSN Akui Situs Diretas, Kena Serangan Deface. https://www.cnnindonesia.com/teknologi/20211025175708-185-712153/bssn-akui-situs-diretas-kena-serangan-deface
Corfield, G. (2018). Morrisons supermarket: We’re taking payroll leak liability fight to UK Supreme Court. https://www.theregister.com/2018/10/23/morrisons_loses_court_appeal_data_theft/
Cyber Police. (2022). Siber Polri Tangkap Pelaku Ransomware Pada Sebuah Perusahaan di Sebuah Perusahaan USA. https://patrolisiber.id/
Halim, D. (2021). Kompolnas Minta Penyidik Polri Laksanakan SE Kapolri soal UU ITE. Kompas.Com. https://nasional.kompas.com/read/2021/02/24/08335521/kompolnas-minta-penyidik-polri-laksanakan-se-kapolri-soal-uu-ite.
Hill, D. G. (2009). Data Protection Governance, Risk Management, and Compliance. CRC Press. Google Scholar
Ismail, C. (2011). Polisi Sipil dan Paradigma Baru Polri. Merlyn Press, Jakarta. Google Scholar
Latumahina, R. E. (2014). Aspek Hukum Perlindungan Data Pribadi di Dunia Maya. Google Scholar
Sautunnida, L. (2018). Urgensi Undang-Undang Perlindungan Data Pribadi di Indonesia: Studi Perbandingan Hukum Inggris dan Malaysia. Kanun Jurnal Ilmu Hukum, 20(2), 369–384. Google Scholar
Stevenson, A. (2010). Oxford dictionary of English. Oxford University Press, USA. Google Scholar
Utomo, T. C., & Putranti, I. R. (2016). Kerjasama Kepolisian Negara Republik Indonesia (Polri)-Australian Federal Police (Afp) Sektor Capacity Building Dalam Penanggulangan Tindak Pidana Cyber Crime Di Indonesia Periode 2012-2014. Journal of International Relations, 2(1), 38–46. Google Scholar
Velarosdela, R. N. (2020). Kronologi dan Peran 8 Pelaku Pembobolan Rekening Ilham Bintang. Kompas.Com. https://megapolitan.kompas.com/read/2020/02/05/13355011/kronologi-dan-peran-8-pelaku-pembobolan-rekening-ilham-bintang?page=all
Warren, S., & Brandeis, L. (2013). The right to privacy. Civilistica. Com, 2(3), 1–22. Google Scholar
William, G. (1984). Neuromancer, ACE Science Fiction Books. The Berkley Publishing Group, New York. Google Scholar
Published
Issue
Section
License
Copyright (c) 2022 Edi Saputra Hasibuan
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-ShareAlike 4.0 International. that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.