CYBERCRIME DI ERA INDUSTRI 4.0 DAN MASYARAKAT 5.0 DALAM PERSPEKTIF VIKTIMOLOGI

Angkasa Angkasa, Rili Windiasih

Abstract


ABSTRAK

Era Industri 4.0 dan Masyarakat 5.0 mempunyai karakteristik yang berbeda dan berdampak pula bagi jenis viktimisiasi khususnya akibat cybercrime. Hal ini berkorelasi dengan karakter pada era tersebut antara lain digitalisasi, rekayasa intelegensia dan internet of thing,  Melalui penelitian kepustakaan dapat dijelasakan bahwa dalam perspektif viktimologi korban atas cybercrime. Korban cybercrime mengalami berupa kerugian materi, akibat psikologis akibat fisik dan  akibat sosial. Viktimisasi  cybercrime dapat dijelaskan dengan The Lifestyle-Routine Activities Theory  (L-RAT). Perlindungan hukum korban cybercrime mendasarkan Undang-Undang Nomor 19 Tahun 2016 Atas Perubahan Undang-Undang Nomor 11 Tahun 2008 Tentang Informasi dan Transaksi Elektronik dapat dikatakan  tidak terdapat perlindungan hukum secara signifikan dapat dirasakan oleh para korbannya Seharusnya terdapat sanksi berupa restitusi dan/atau pemberian kompensasi. Hal ini selaras dengan karakter masyarakat 5.0 yang lebih menghormati keberadaan manusia.

 

ABSTRACT

The Industrial Era 4.0 and Society 5.0 have different characteristics and this has an impact on the types of victimization, especially those caused by cybercrime. This correlates with the characteristics of that era, including digitalization, intelligent engineering and the internet of things. Through library research, it can be explained from a victimological perspective that victims of cybercrime suffer losses in the form of material losses, psychological suffering, physical suffering and social suffering. Cybercrime victimization can be explained by the lifestyle-routine activities theory (L-RAT). The legal protection of cybercrime victims is based on Law Number 19 of 2016 on Amendments to Law Number 11 of 2008 concerning Information and Electronic Transactions and it can be said that there is no significant legal protection that can be felt by the victims. There should be sanctions in the form of restitution and/or compensation. This corresponds to the nature of society 5.0 which is more respectful of human existence.


Keywords


Hukum; Kompensasi; Perlindungan; Siber; Teknologi; Compensation; Cyber; Law; Protection; Technology.

References


Antonescu, M., & Birău, R. (2015). Financial and Non-financial Implications of Cybercrimes in Emerging Countries. Procedia Economics and Finance, 32(15), 618–621. https://doi.org/10.1016/s2212-5671(15)01440-9

Bocij, P. (2004). Cyberstalking: Harassment in the Internet age and how to protect your family. Greenwood Publishing Group.

Borwell, J., Jansen, J., & Stol, W. (2021). The Psychological and Financial Impact of Cybercrime Victimization: A Novel Application of the Shattered Assumptions Theory. Social Science Computer Review, 1–22. https://doi.org/10.1177/0894439320983828

Brands, J., & van Wilsem, J. (2021). Connected and fearful? Exploring fear of online financial crime, Internet behaviour and their relationship. European Journal of Criminology, 18(2), 213–234. https://doi.org/10.1177/1477370819839619

Brenner, S. W. (2012). Cybercrime and The Law: Challenges, Issues, and Outcomes. Northeastern University Press.

Breque, M., De Nul, L., & Petridis, A. (2021). Industry 5.0: Towards a Sustainable, Human-Centric and Resilient European Industry. Directorate-General for Research and Innovation.

Carayannis, E. G., & Morawska-Jancelewicz, J. (2022). The Futures of Europe: Society 5.0 and Industry 5.0 as Driving Forces of Future Universities. Journal of the Knowledge Economy, 1–27. https://doi.org/10.1007/s13132-021-00854-2

Chang, L. Y. C., Zhong, L. Y., & Grabosky, P. N. (2016). Citizen co-production of cyber security: Self-help, vigilantes, and cybercrime. Regulation and Governance, 12(1), 101–114. https://doi.org/10.1111/rego.12125

Cohen, L. E., Kluegel, J. R., & Land, K. C. (1981). Social Inequality and Predatory Criminal Victimization: An Exposition and Test of a Formal Theory. American Sociological Review, 46(5), 505. https://doi.org/10.2307/2094935

Correia, S. G. (2019). Responding to Victimisation in a Digital Word: a Case Study of Fraud and Computer Misuse Reported in Wales. Crime Science, 8(4), 1–12. https://doi.org/10.1186/s40163-019-0099-7

Dignan, J. (2004). Understanding Victims and Restorative Justice. McGraw-Hill Education (UK).

Dinisman, T., & Moroz, A. (2017). Understanding victims of crime. Victim Support. https://doi.org/10.13140/RG.2.2.17335.73124

Finn, J. (2004). A Survey of Online Harassment at a University Campus. Journal of Interpersonal Violence, 19(4), 468–483. https://doi.org/10.1177/0886260503262083

Furnell, S. M. (2001). Categorising Cybercrime and Cybercriminals. Journal of Information Warfare, 1(2), 35–44.

Garofalo, J. (1987). Reassessing the Lifestyle Model of Criminal Victimization. Positive Criminology, 23–42.

Hamzah, A. (1996). Hukum Pidana Yang Berkaitan Dengan Komputer. Sinar Grafika.

Hindelang, M. J., Gottfredson, M. R., & Garofalo, J. (1978). Victims of personal crime: An empirical foundation for a theory of personal victimization. Cambridge, MA.

Holt, T. J., & Bossler, A. M. (2008). Examining the Applicability of Lifestyle-Routine Activities Theory for Cybercrime Victimization. Deviant Behavior, 30(1), 1–25. https://doi.org/10.1080/01639620701876577

Jahankhani, H., Al-Nemrat, A., & Hosseinian-Far, A. (2014). Cybercrime classification and characteristics. In Cyber Crime and Cyber Terrorism Investigator’s Handbook. Elsevier Inc. https://doi.org/10.1016/B978-0-12-800743-3.00012-8

Janoffâ€Bulman, R., & Frieze, I. H. (1983). A Theoretical Perspective for Understanding Reactions to Victimization. Journal of Social Issues, 39(2), 1–17. https://doi.org/10.1111/j.1540-4560.1983.tb00138.x

Kitteringham, G., & Fennelly, L. J. (2020). Environmental crime control. In Handbook of Loss Prevention and Crime Prevention. INC. https://doi.org/10.1016/b978-0-12-817273-5.00019-3

Kurnia Putra, A. (2014). Harmonisasi Konvensi Cyber Crime Dalam Hukum Nasional. Jurnal Ilmu Hukum Jambi, 5(2), 95–109.

Lamet, W., & Wittebrood, K. (2009). Nooit meer dezelfde: Gevolgen van misdrijven voor slachtoffers [Never the same again: The consequences of crime for victims]. The Hague: The Netherlands Institute for Social Research (SCP).

Leukfeldt, E. R., Notté, R. J., & Malsch, M. (2019). Exploring the Needs of Victims of Cyber-dependent and Cyber-enabled Crimes. Victims and Offenders: An International Journal of Evidence-Based Research, Policy, and Practice, 15(1), 60–77. https://doi.org/10.1080/15564886.2019.1672229

Maxfield, M. G. (1987). Lifestyle and Routine Activity Theories of Crime: Empirical Studies of Victimization, Delinquency, and Offender Decision-Making. Journal of Quantitative Criminology, 3(4), 275–282. http://www.jstor.org/stable/23365565

Mazzucato, M. (2018). Mission-Oriented in the European Union A problem-solving approach to fuel innovation-led growth. Publications Office of the European Union. https://doi.org/10.2777/36546

Miethe, T. D., & Meier, R. F. (1994). Crime and Its Social Context: Toward an Integrated Theory of Offenders, Victims, and Situations. Suny Press.

Morawska-Jancelewicz, J. (2021). The Role of Universities in Social Innovation Within Quadruple/Quintuple Helix Model: Practical Implications from Polish Experience. In Journal of the Knowledge Economy. Springer US. https://doi.org/10.1007/s13132-021-00804-y

Pratt, T. C., & Turanovic, J. J. (2015). Lifestyle and Routine Activity Theories Revisited: The Importance of “Risk†to the Study of Victimization. Victims and Offenders: An International Journal of Evidence-Based Research, Policy, and Practice, 11(3), 1–20. https://doi.org/10.1080/15564886.2015.1057351

Puspita, Y., Fitriani, Y., Astuti, S., & Novianti, S. (2020). Selamat Tinggal Revolusi Industri 4.0, Selamat Datang Revolusi Industri 5.0. Prosiding Seminar Nasional Pendidikan, 122–130. https://jurnal.univpgri-palembang.ac.id/index.php/Prosidingpps/article/view/3794/3565

Riadi, I., Umar, R., & Firdonsyah, A. (2017). Identification Of Digital Evidence On Android’s Blackberry Messenger Using NIST Mobile Forensic Method. International Journal of Computer Science and Information Security, 15(5), 155–160. https://www.researchgate.net/publication/317620078

Saragih, Y. M., & Azis, D. A. (2020). Perlindungan Data Elektronik Dalam Formulasi Kebijakan Kriminal Di Era Globalisasi. Soumatera Law Review, 3(2), 265–279. https://pesquisa.bvsalud.org/portal/resource/en/mdl-20203177951%0Ahttp://dx.doi.org/10.1038/s41562-020-0887-9%0Ahttp://dx.doi.org/10.1038/s41562-020-0884-z%0Ahttps://doi.org/10.1080/13669877.2020.1758193%0Ahttp://sersc.org/journals/index.php/IJAST/article

Separovic, Z. P. (1985). Victimology: Studies of Victims. Pravni fakultet.

Shapland, J. (1986). Victim assistance and the criminal justice system: The victim’s perspective. In E. A. Fattah (Ed.), From Crime Policy to Victim Policy: Reorienting the Justice System. Palgrave Macmillan, a division of Macmillan Publishers. https://doi.org/10.1007/978-1-349-08305-3

Shapland, J., & Hall, M. (2007). What Do We Know About The Effects Of Crime On Victims? International Review OfVictimology, 14, 175–217. https://doi.org/10.1111/ecca.12229

Shapland, J., Willmore, J., & Duff, P. (1985). Victim in The Criminal Justice System (A. E. Bottonms (ed.)). Gower Publishing Company Limited.

Sinha, R., & Vedpuria, N. K. (2018). Social Impact of Cyber Crime : A Sociological Analysis. International Journal of Management, IT & Engineering, 8(10 (1)), 254–259. https://doi.org/10.13140/RG.2.2.20922.93126

Stanciu, V. V. (1976). Victim Producing Civilizations and Situations. In Victim and Society, Visage Press, Inc, Washington Dc. Victim and Society, Visage Press, Inc.

Stephenson, P. (2000). Computer-Related Crime A handbook for corporate. By CRC Prss LLC.

Stevens, M. (2003). Victimology Theory. Internet Archive Wayback Machine. https://web.archive.org/web/20100628233200/http://faculty.ncwc.edu:80/mstevens/300/300lecturenote01.htm

Wang, S., Wan, J., Zhang, D., Li, D., & Zhang, C. (2016). Towards Smart Factory for Industry 4.0: A Self-Organized Multi-Agent System with Big Data Based Feedback and Coordination. Computer Networks, 101, 158–168. https://doi.org/10.1016/j.comnet.2015.12.017

Xu, X., Lu, Y., Vogel-Heuser, B., & Wang, L. (2021). Industry 4.0 and Industry 5.0—Inception, Conception and Perception. Journal of Manufacturing Systems, 61(October), 530–535. https://doi.org/10.1016/j.jmsy.2021.10.006




DOI: https://doi.org/10.35194/jj.v2i2.2113

Refbacks

  • There are currently no refbacks.


Copyright (c) 2022 JOURNAL JUSTICIABELEN (JJ)

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

JOURNAL JUSTICIABELEN (JJ) INDEXED BY:

/

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Postgraduate Study Program Master of Law, Suryakancana University, Jl. Pasir Gede Raya-Cianjur, 43216, Tel. 0263-270106, Fax. 0263-261383, Email: journal.justiciabelen@unsur.ac.id