Perlindungan Hukum terhadap Korban Phishing Cyber Crime dalam Perspektif Kriminologi. (Protection of The Victims of Phishing Cyber Crime in A Criminal Perspective).

Hariyono, Akbar Galih (2023) Perlindungan Hukum terhadap Korban Phishing Cyber Crime dalam Perspektif Kriminologi. (Protection of The Victims of Phishing Cyber Crime in A Criminal Perspective). Undergraduate thesis, Universitas 17 Agustus 1945 Surabaya.

[img] Text
ABSTRAK.pdf

Download (4MB)
[img] Text
BAB I.pdf
Restricted to Repository staff only

Download (751kB) | Request a copy
[img] Text
BAB II.pdf
Restricted to Repository staff only

Download (828kB) | Request a copy
[img] Text
BAB III.pdf
Restricted to Repository staff only

Download (1MB) | Request a copy
[img] Text
BAB IV.pdf
Restricted to Repository staff only

Download (1MB) | Request a copy
[img] Text
JURNAL.pdf

Download (229kB)
[img] Text
JURNAL TURNITIN.pdf

Download (2MB)
[img] Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt
Restricted to Repository staff only

Download (0B) | Request a copy
[img] Other (Thumbnails conversion from text to thumbnail_medium)
medium.jpg
Restricted to Repository staff only

Download (0B) | Request a copy
[img] Other (Thumbnails conversion from text to thumbnail_lightbox)
lightbox.jpg

Download (0B)
[img] Other (Thumbnails conversion from text to thumbnail_preview)
preview.jpg

Download (0B)
[img] Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt

Download (0B)
[img] Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt
Restricted to Repository staff only

Download (0B) | Request a copy
[img] Other (Thumbnails conversion from text to thumbnail_small)
small.jpg

Download (0B)
[img] Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt
Restricted to Repository staff only

Download (0B) | Request a copy
[img] Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt

Download (0B)
[img] Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt
Restricted to Repository staff only

Download (0B) | Request a copy
[img] Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt
Restricted to Repository staff only

Download (0B) | Request a copy
[img] Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt

Download (0B)
[img] Other (Thumbnails conversion from text to thumbnail_lightbox)
lightbox.jpg

Download (0B)
[img] Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt
Restricted to Repository staff only

Download (0B) | Request a copy
[img] Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt

Download (0B)
[img] Other (Thumbnails conversion from text to thumbnail_small)
small.jpg

Download (0B)
[img] Other (Thumbnails conversion from text to thumbnail_medium)
medium.jpg
Restricted to Repository staff only

Download (0B) | Request a copy
[img] Other (Thumbnails conversion from text to thumbnail_small)
small.jpg
Restricted to Repository staff only

Download (0B) | Request a copy
[img] Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt
Restricted to Repository staff only

Download (0B) | Request a copy
[img] Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt
Restricted to Repository staff only

Download (0B) | Request a copy
[img] Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt

Download (0B)
[img] Other (Thumbnails conversion from text to thumbnail_medium)
medium.jpg
Restricted to Repository staff only

Download (0B) | Request a copy
[img] Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt

Download (0B)
[img] Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt
Restricted to Repository staff only

Download (0B) | Request a copy
[img] Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt

Download (0B)
[img] Other (Thumbnails conversion from text to thumbnail_preview)
preview.jpg
Restricted to Repository staff only

Download (0B) | Request a copy
[img] Other (Thumbnails conversion from text to thumbnail_small)
small.jpg
Restricted to Repository staff only

Download (0B) | Request a copy
[img] Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt
Restricted to Repository staff only

Download (0B) | Request a copy
[img] Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt
Restricted to Repository staff only

Download (0B) | Request a copy
[img] Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt

Download (0B)
[img] Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt
Restricted to Repository staff only

Download (0B) | Request a copy
[img] Text
CamScanner 02-23-2023 13.16.pdf

Download (0B)
[img] Other (Thumbnails conversion from text to thumbnail_preview)
preview.jpg

Download (0B)
[img] Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt
Restricted to Repository staff only

Download (0B) | Request a copy
[img] Other (Generate index codes conversion from text to indexcodes)
indexcodes.txt
Restricted to Repository staff only

Download (0B) | Request a copy
[img] Text
ABSTRAK.pdf

Download (0B)
[img] Text
BAB I.pdf
Restricted to Repository staff only

Download (0B) | Request a copy
[img] Text
BAB IV.pdf
Restricted to Repository staff only

Download (0B) | Request a copy

Abstract

Phishing Cybercrime is a crime committed in internet technology, either attacking public / private facilities. Phishing cybercrime is an unlawful act carried out using the internet on the basis of advanced computer and telecommunications technology. activity Phishing cybercrime can be carried out anywhere / even can be carried out between countries.crimes Phishing cybercrimes such as hacking, sharing personal information and counterfeiting credit cards. Phishing actors themselves are called hackers. Hackers have the knowledge and competence to master and apply programming languages. This competency is obtained hackers with various methods including learning from experts/self-taught.perspective criminological activities phishing cybercrime occur because of 2 (two) main aspects, namely technical and economic, which can cause phishing cybercrime to occur. So it is necessary to update the law regarding computer crime. Legal protection regarding cybercrime phishing is regulated in the ITE Law and the Personal Data Protection Law. Phishing cybercrime still cannot be completely eliminated. The existence of this law can at least reduce the amount of cybercrime in Indonesia. Key Word: Cybercrime, Criminology, Internet, Phishing

Item Type: Thesis (Undergraduate)
Uncontrolled Keywords: Cybercrime, Internet, Kriminologi, Phishing.
Subjects: K Law > K Law (General)
K Law > KZ Law of Nations
Divisions: Fakultas Hukum > Program Studi Ilmu Hukum
Depositing User: 1311900358 Akbar Galih Hariyono
Date Deposited: 08 Mar 2023 01:11
Last Modified: 08 Mar 2023 01:11
URI: http://repository.untag-sby.ac.id/id/eprint/21452

Actions (login required)

View Item View Item