The Legality of Devious Cyber Practices: Readiness of Indonesia's Cyber Laws
The ever-expanding Indonesian cyberspace has ushered in significant economic growth to the country’s online business and e-commerce. This is due to the country’s rising internet penetration rate of 73% of its total population, with about 204 million people connected to the internet. This high connec...
| Published in: | Society |
|---|---|
| Main Author: | Sardjana Orba Manullang |
| Format: | Article |
| Language: | English |
| Published: |
Laboratorium Rekayasa Sosial, Jurusan Sosiologi, FISIP Universitas Bangka Belitung
2022-12-01
|
| Subjects: | |
| Online Access: | https://societyfisipubb.id/index.php/society/article/view/482 |
Similar Items
Cyber Sovereignty Gotong Royong, Indonesia’a Way of Dealing with the Challenges of Global Cyber Sovereignty
by: Nur Ro'is
Published: (2022-06-01)
by: Nur Ro'is
Published: (2022-06-01)
FROM CYBER WARFARE TO CYBER PEACE
by: Gheorghe BOARU
Published: (2025-09-01)
by: Gheorghe BOARU
Published: (2025-09-01)
Defining the Rules of Engagement: Legal and Ethical Standards in Cyber Conflict
by: Zaza Tsotniashvili
Published: (2024-07-01)
by: Zaza Tsotniashvili
Published: (2024-07-01)
THE STRATEGY FOR ENSURING THE CYBER SECURITY OF THE ARMED FORCES OF UKRAINE
by: Oleksandr O. Chernonoh, et al.
Published: (2015-12-01)
by: Oleksandr O. Chernonoh, et al.
Published: (2015-12-01)
Cyber Security and Impact on Computer Crimes
by: Andrei Pântea
Published: (2022-10-01)
by: Andrei Pântea
Published: (2022-10-01)
Developing cyber defense strategies against future enemy threats on the horizon of 1405
by: Mohammad Sepehri
Published: (2022-02-01)
by: Mohammad Sepehri
Published: (2022-02-01)
International Law Issues of Cyber Defense
by: A. Yeremyan, et al.
Published: (2022-07-01)
by: A. Yeremyan, et al.
Published: (2022-07-01)
Cyber Security Threats to Iran and its Countermeasures: Defensive and Offensive Cyber Strategies
by: Syed Qandil Abbas, et al.
Published: (2024-07-01)
by: Syed Qandil Abbas, et al.
Published: (2024-07-01)
CYBER-OPERATIONS UNDER INTERNATIONAL LAW
by: Agata Małecka
Published: (2022-10-01)
by: Agata Małecka
Published: (2022-10-01)
Keamanan Nasional dalam Menghadapi Perubahan Cyber Warfare
by: Elfirda Putri, et al.
Published: (2023-12-01)
by: Elfirda Putri, et al.
Published: (2023-12-01)
Cyber Espionage in National and Global Perspective: How Indonesia Deal with this issue?
by: Maharani Chandra Dewi
Published: (2022-01-01)
by: Maharani Chandra Dewi
Published: (2022-01-01)
Civilian Direct Participation in Cyber Hostilities
by: François Delerue
Published: (2014-11-01)
by: François Delerue
Published: (2014-11-01)
Establishment of UN Cyber Peacekeeping Force: Prospects and Challenges
by: Fahad Nabeel
Published: (2019-07-01)
by: Fahad Nabeel
Published: (2019-07-01)
Cyber resilience revisited: Law and international relations
by: Ika Riswanti Putranti, et al.
Published: (2022-05-01)
by: Ika Riswanti Putranti, et al.
Published: (2022-05-01)
The Paradox of Cyber Warfare and Clausewitz’s Conception of War
by: Nageen Ashraf
Published: (2025-01-01)
by: Nageen Ashraf
Published: (2025-01-01)
Cyber crime in Pakistan; detection and punishment mechanism
by: Ubair Anjum
Published: (2020-11-01)
by: Ubair Anjum
Published: (2020-11-01)
APPLYING INTERNATIONAL HUMANITARIAN LAW TO CYBER-ATTACKS
by: Dan-Iulian VOITAŞEC
Published: (2015-07-01)
by: Dan-Iulian VOITAŞEC
Published: (2015-07-01)
Regulating a “Cyber Militia” – Some Lessons from Ukraine, and Thoughts about the Future
by: Dan Jerker B. Svantesson
Published: (2023-07-01)
by: Dan Jerker B. Svantesson
Published: (2023-07-01)
CYBER ATTACKS, MAJOR THREATS AND VULNERABILITIES AGAINST STATES, ORGANIZATIONS AND CITIZENS
by: Constantin MINCU
Published: (2016-06-01)
by: Constantin MINCU
Published: (2016-06-01)
Metaverse Regulation Formulation In Indonesian Cyber Law
by: Ridwan Ridwan, et al.
Published: (2023-02-01)
by: Ridwan Ridwan, et al.
Published: (2023-02-01)
Decision support model for effects estimation and proportionality assessment for targeting in cyber operations
by: C. Maathuis, et al.
Published: (2021-04-01)
by: C. Maathuis, et al.
Published: (2021-04-01)
Attribution Across Cyber Attack Types: Network Intrusions and Information Operations
by: Sanjay Goel, et al.
Published: (2021-01-01)
by: Sanjay Goel, et al.
Published: (2021-01-01)
On the issue of criminal law protection of cyber security of Ukraine in modern conditions
by: Chuvakov O.
Published: (2024-06-01)
by: Chuvakov O.
Published: (2024-06-01)
Penggunaan Cyber Warfare dalam Konflik Bersenjata Internasional Antara Rusia-Ukraina Menurut Hukum Humaniter Internasional
by: Andyta Sekar Pratiwi, et al.
Published: (2023-06-01)
by: Andyta Sekar Pratiwi, et al.
Published: (2023-06-01)
Sociological Impact of Cyber Laws on Media: Virtue Community and Controversies
by: Sayid Muhammad Rifki Noval
Published: (2024-03-01)
by: Sayid Muhammad Rifki Noval
Published: (2024-03-01)
EUROPEAN UNION POLICIES ON CYBER SECURITY
by: Gheorghe BOARU
Published: (2018-12-01)
by: Gheorghe BOARU
Published: (2018-12-01)
REVIEW OF THE INTERNET BLOCKING CASE IN PAPUA IN CYBER LAW PERSPECTIVE
by: Melvin Elvino Putra
Published: (2022-07-01)
by: Melvin Elvino Putra
Published: (2022-07-01)
MEANS AND METHODS OF CYBER WARFARE
by: Dan-Iulian VOITAȘEC
Published: (2016-06-01)
by: Dan-Iulian VOITAȘEC
Published: (2016-06-01)
CYBER TERRORISM AND THE EFFECTS OF THE RUSSIAN ATTACKS ON DEMOCRATIC STATES IN EAST EUROPE
by: Ovidiu MOȘOIU, et al.
Published: (2020-03-01)
by: Ovidiu MOȘOIU, et al.
Published: (2020-03-01)
The Indonesian Electronic Information and Transactions Within Indonesia’s Broader Legal Regime: Urgency for Amendment?
by: Tasya Safiranita, et al.
Published: (2021-12-01)
by: Tasya Safiranita, et al.
Published: (2021-12-01)
Strategic planning of cyber defense: Towards more adequate legal framework and new concept of risk, challenge and threat assessment
by: Putnik Nenad, et al.
Published: (2017-01-01)
by: Putnik Nenad, et al.
Published: (2017-01-01)
STUDY OF THE INFLUENCE OF LEGAL SECURITY AND CYBER INTELLIGENCE CAPACITY ON STRENGTHENING GOVERNANCE OF CYBER DEFENSE IN INDONESIA
by: Purnomo W.P., et al.
Published: (2023-12-01)
by: Purnomo W.P., et al.
Published: (2023-12-01)
The Third World War? In The Cyberspace. Cyber Warfare in the Middle East.
by: Martina, et al.
Published: (2014-06-01)
by: Martina, et al.
Published: (2014-06-01)
Cyber Forensic Investigation Infrastructure of Pakistan: An Analysis of the Cyber Threat Landscape and Readiness
by: Ehtisham Ul Haque, et al.
Published: (2023-01-01)
by: Ehtisham Ul Haque, et al.
Published: (2023-01-01)
Various types of cyber threats
by: Luknar Ivana, et al.
Published: (2024-01-01)
by: Luknar Ivana, et al.
Published: (2024-01-01)
Cyber Harassment of Public Figures: Causes and Importance of Legal Education
by: Ismail Dian Ekawaty, et al.
Published: (2024-01-01)
by: Ismail Dian Ekawaty, et al.
Published: (2024-01-01)
Cyber Safety Education in Developing Countries
by: Rossouw Von Solms, et al.
Published: (2015-04-01)
by: Rossouw Von Solms, et al.
Published: (2015-04-01)
The Problem of Cyber Espionage in the International Humanitarian Law
by: S. Yu. Garkusha-Bozhko
Published: (2021-03-01)
by: S. Yu. Garkusha-Bozhko
Published: (2021-03-01)
The rise of cyber power in Brazil
by: Joe Devanny, et al.
Published: (2022-09-01)
by: Joe Devanny, et al.
Published: (2022-09-01)
Managing Cyber Security Risks of the Cyber-Enabled Ship
by: Georgios Kavallieratos, et al.
Published: (2020-09-01)
by: Georgios Kavallieratos, et al.
Published: (2020-09-01)
Similar Items
-
Cyber Sovereignty Gotong Royong, Indonesia’a Way of Dealing with the Challenges of Global Cyber Sovereignty
by: Nur Ro'is
Published: (2022-06-01) -
FROM CYBER WARFARE TO CYBER PEACE
by: Gheorghe BOARU
Published: (2025-09-01) -
Defining the Rules of Engagement: Legal and Ethical Standards in Cyber Conflict
by: Zaza Tsotniashvili
Published: (2024-07-01) -
THE STRATEGY FOR ENSURING THE CYBER SECURITY OF THE ARMED FORCES OF UKRAINE
by: Oleksandr O. Chernonoh, et al.
Published: (2015-12-01) -
Cyber Security and Impact on Computer Crimes
by: Andrei Pântea
Published: (2022-10-01)
