Potential Cybercrime and Prevention in the Overseas Official Travel Approval Letter
DOI:
https://doi.org/10.37680/almanhaj.v6i1.4674Keywords:
Potency; Cyber Crime; Prevention; Approval letter; Overseas Service TravelAbstract
The aim of this research is to the potential for cybercrime and its prevention in foreign official travel approval letters. The research method used is normative juridical. The data collection technique is library research. The data analysis technique is descriptive qualitative which is used in the form of an interactive analysis model. The research results show that the potential for cybercrime in foreign official travel approval letters includes hacking, identity theft, data breaches, phishing, spamming, cyber vandalism, virus writers, XML injection, security configuration errors. To prevent cybercrime, the simple web application or https://simpel.setneg.go.id has data security, namely security testing by the state cyber and password agency, a captcha feature on the simple web, one time password feature on simple phones, application of certified digital signatures. The conclusion of this research is that the potential for cybercrime in overseas official travel approval letters is increasing. Prevention solutions can include educating users, using a hacker perspective, patch systems, policies, Intrusion Detection Systems bundled with Intrusion Prevention Systems, antivirus firewalls. Legal regulatory steps to support the implementation of cybercrime prevention solutions, namely Law No. 11 of 2008 concerning ITE and PP No. 82 of 2012 concerning the implementation of Electronic Systems and Transactions.
Downloads
References
Artikov, A. K. (2021). Cybercrime As a Threat To Public Safety. Texas Journal of Multidisciplinary Studies , 1 , 171–178. https://doi.org/10.31085/2310-8681-2021-1-204-171-178
Destyarini, N., Prastyanti, RA, & Elisanti, E. (2023). Legal Study of Kradenan Village Regulations, Kaliwungu District, Semarang Regency No. 11 of 2022 concerning Village Market Levies. Al-Manhaj: Journal of Islamic Law and Social Institutions , 5 (2), 2093–2114. https://doi.org/10.37680/almanhaj.v5i2.3088
Dewi, MC (2022). Cyber Espionage in National and Global Perspective: How does Indonesia Deal with this issue? International Law Discourse in Southeast Asia , 1 (1), 1–22. https://doi.org/10.15294/ildisea.v1i1.56874
Hall, T., & Ziemer, U. (2023). Exploring the relationship between IT development, poverty and cybercrime : an Armenian case study. Journal of Cyber Policy ISSN: , 7 (3), 353–374. https://doi.org/10.1080/23738871.2023.2192234
Hardinato, H., & Tata, S. (2023). Analysis of Cyber Crime handling in Web Applications with WAF ModSecurity. PETIR: Journal of the Study and Application of Informatics Engineering , 16 (1), 91–99.
Hermawan, R. (2013). Readiness of Government Apparatus in Facing Cyber Crime in Indonesia. Journal of Information Engineering , 6 (1), 43–50.
Megandi, M., Susanty, M., & Setiawan, E. (2023). Classification of Business Travel Expenditure Items Using Recurrent Neural Network and Long Short-Term Memory. PETIR: Journal of the Study and Application of Informatics Engineering , 16 (1), 11–18.
Mohd. Yusuf DM, Vivi Yola, Destin Maiharani, & Egi Dwi. (2022). Analysis of Modes in Cyber Crime Law. Journal of Law, Politics And Social Sciences , 1 (2), 64–70. https://doi.org/10.55606/jhpis.v1i2.725
Nguyen, N.T. (2023). A Review Of Cyber Crime. Journal Of Social Review and Development , 2 (1), 1–3. https://dzarc.com/social/article/view/244/230
Nugraha, R. (2021). Indonesian Legal Perspective (Cyberlaw) Handling Cyber Cases in Indonesia. Scientific Journal of Aerospace Law , 11 (2), 44–56.
Pervaiz, H.S., Bhatti, S.H., Words, K., Security, C., Assets, C., Technologies, N., Network, S., & Pervaiz, H.S. (2023). Analysis of Cybercrime Regulations Falling behind New Technologies. Journal of Social Sciences Review (JSSR) , 3 (1), 460–469.
Pratama, RH (2018). Analysis of the Information System for Payment of Official Travel Expenses at the Soekarno Hatta Type C Customs and Excise Main Service Office. Substance: Article Source Accounting Auditing and Vocational Finance , 2 (1), 77. https://doi.org/10.35837/subs.v2i1.274
Qohary, Y., & Inarto, A. (2021). Overseas Official Travel Management at the Maritime and Fisheries Research and Human Resources Agency. Journal of Business Administration Economics & Entrepreneurship , 3 (1), 9–21.
Rohmat, A., & Elisanti, E. (2021). Analysis of Public Services to Bureaucracy Changes in the Covid-19 Pandemic Era. Public Spirit: Journal of Public Administration , 16 (2), 161. https://doi.org/10.20961/sp.v16i2.52390
Rosy, A. F. (2020). Indonesian International Cooperation: Strengthening National Security in the Field of Cyber Security. Journal of Government Science (GovSci) : Journal of Government Studies , 1 (2), 118–129. https://doi.org/10.54144/govsci.v1i2.12
Sabillon, R., Cano, J., Cavaller, V., & Serra, J. (2016). Cybercrime and Cybercriminals: A Comprehensive Study. International Journal of Computer Networks and Communications Security , 4 (6), 165–176. www.ijcncs.org
Styaningsih, RU, Destyarini, N., Aryono, A., & Elisanti, E. (2023). Implementation of Village-Owned Wealth Management as Mandated in Article 77 Paragraph (1) of Law Number 6 of 2014. AL-MANHAJ: Journal of Islamic Law and Social Institutions , 5 (2), 2205–2224. https://doi.org/10.37680/almanhaj.v5i2.3478
Suci Meinarni, NP, & Sari, HB (2020). Analysis of Potential Crime in Cyberspace Related to Data. Kertha Wicaksana , 14 (April 2019), 9–15.
Sugiarto, S., & Qurratulaini, R. (2020). Criminal Potential of Cyber Crime in Memes: A Forensic Linguistic Study. Deiksis: Journal of Indonesian Language and Literature Education , 7 (1), 46. https://doi.org/10.33603/deiksis.v7i1.2495
Sumadinata, WS (2023). Cybercrime And Global Security Threats : A Challenge In International Law. Russian Law Journal , XI (3), 438–444.
Widijowati, RD (2022). Analysis of the Development of Cyber Crime in Indonesia. International Journal of Artificial Intelligence Research , 6 (1), 1–8.
Wijoseno, BA, & Widhiyaastuti, IGAAD (2023). Criminal Traps Against Perpetrators of Illegal Hacking of Computer Systems (Hackers) from the Perspective of Indonesian Criminal Law. Kertha Desa Journal , 11 (3), 2031–2041.
Wu, L., Peng, Q., & Lemke, M. (2023). Research Trends in Cybercrime and Cybersecurity : A Review Based on Web of Science Core Collection Database Research Trends in Cybercrime and Cybersecurity : A Review Based on Web of Science Core Collection Database. International Journal of Cybersecurity Intelligence and Cybercrime , 6 (1), 5–28.
Downloads
Published
How to Cite
Issue
Section
License
Copyright:
- Author retains the copyright and grants the journal the right of first publication of the work simultaneously licensed under a Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Author is able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book) with the acknowledgment of its initial publication in this journal.
- Author is permitted and encouraged to post his/her work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of the published work (See The Effect of Open Access).
License:
-
Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
-
No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
You are free to:
- Share — copy and redistribute the material in any medium or format
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
This work is licensed under a Creative Commons Attribution 4.0 International License.