Law Protection of Mobile Phone Fraud Victims
DOI:
https://doi.org/10.61841/dqeg9p03Keywords:
Protection, Fraud Victim, Electronic Media.Abstract
The development of technology and communication has a positive impact on society, especially in promoting growth in the economic field. However, advances in information and communication technology also have negative excesses, namely the occurrence of abuse by a group of people to be used as a means of committing crime fraud. Fraud by using electronic media that often occurs today is fraud by using a mobile phone with the mode and under the reason of a family member arrested or child caught in a drug case on behalf of a police officer. The rose of fraud in this mode was significantly necessary to conduct further and deeper analysis under the control of depth study as efforts to protect the victims of fraud. This research method was an empirical juridical research, which is looking at efforts to protect victims of fraud through electronic media conducted by law enforcement officials. The results showed that the modus operandi of fraud through electronic media was quite diverse. From the research finding showed that fraud through electronic media using mobile phones which used the cases of family member arrested or child caught in a drug case on behalf of a police officer, then the perpetrators ask for ransom from the family or parents. Protection against victims of fraud by using mobile phones with the mode of arrest of a family member or child ensnared by drug cases in the name of a police officer, is still very weak, due to the lack of prevention efforts and weak law enforcement.
Downloads
References
[1] Abintoro Prakoso, Kriminologi dan Hukum Pidana, Jakarta; Laskbang Grafika, 2013.
[2] Barda Nawawi Arief, Masalah Penegakan Hukum dan Kebijakan Hukum Pidana dalam Penanggulangan Kejahatan, Jakarta: Prenada Kencana Media Group, 2007.
[3] Dikdik M. Arief dan Elisatris Gultom, Urgensi Perlindungan Korban Kejahatan, Antara Norma dan Realita, Jakarta: PT. Raja Grafindo Utama, 2011.
[4] Ediwarman, Metodologi Penelitian Hukum, Medan; Sofmedia, 2015.
[5] Josua Sitompul, Cyberspace, Cybercrimes, Cyberlaw: Tinjauan Aspek Hukum Pidana, Cetakan Pertama, Jakarta: Tatanusa, 2012.
[6] Kartini Kartono, Patologi Sosial, Jakarta : Raja Grafindo Persada, 2005.
[7] O.C. Kaligis, Penerapan Undang-undang Nomor 11 Tahun 2008 Tentang Informasi dan Transaksi Elektronik Dalam Prakteknya, Jakarta: Yarsif Watampone, 2012.
[8] Tanti Yuniar, Kamus Lengkap Bahasa Indonesia, Jakarta: Agung Mulia, 2009.
[9] Phillipus, M. Hadjon, Perlindungan Hukum Bagi Rakyat Indonesia, Surabaya; PT. Bina Ilmu, 1999.
[10] Peter Mahmud Marzuki, Penelitian Hukum, Jakarta; Prenada Kencana Media Group, 2010.
[11] Samuel Walker, Sense and Nonsense about Crime, A Policy Guide, Monterey-California: Brooks/Cole Publishing Company, 1985.
[12] Satjipto Rahardjo, llmu Hukum, Bandung; Citra Aditya Bakti, 2010.
[13] Soerjono Soekanto, Pengantar Penelitian Hukum, Jakarta; Rajawali Pers, 1996.
[14] , Faktor-Faktor Yang Mempengaruhi Penegakan Hukum, Rajawali Pers, Jakarta, 2010.
[15] Topo Santoso dan Eva Achjani Zulfa, Kriminologi, Jakarta; Rajawali Pers, 2010.
[16] Undang-Undang Nomor 1 Tahun 1946 tentang Kitab Undang-Undang Hukum Pidana (KUHP).
[17] Undang-Undang Negara Republik Indonesia Nomor 11 Tahun 2008 tentang Informasi dan Transaksi Elektronik jo Undang-Undang Negara Republik Indonesia Nomor 19 Tahun 2016 tentang Perubahan Atas Undang-Undang Negara Republik Indonesia Nomor 11 Tahun 2008 tentang Informasi dan Transaksi Elektronik.
[18] https://sumut.idntimes.com, Penipu Modus “Keluarga Ditangkap Polisi Karena Narkoba” Diringkus., diakses tanggal 27 Februari 2020.
[19] Ika Pomounda, Perlindungan Hukum Bagi Korban Penipuan Melalui Media Elektronik (suatu pendekatan viktimologi), (Jurnal Ilmu Hukum Legal Opinion, Edisi $, Volume 3, Tahun 2015, p : 1-9).
[20] Singh, A.Percutaneous coronary intervention vs coronary artery bypass grafting in the management of chronic stable angina: A critical appraisal(2010) Journal of Cardiovascular Disease Research, 1 (2), pp. 54- 58.
[21] Kathirvel poonkodi (2016) chemical composition of essential oil of ocimum basilicuml. (basil) and its biological activities–an overview. Journal of Critical Reviews, 3 (3), 56-62.
[22] Gupta, N., Gupta, V., Singh, A.P., Singh, R.P.Defluoridation of groundwater using low cost adsorbent like bagasse dust, aluminium treated bagasse fly ash, bone powder and shell powder(2014) Bonfring Int. J. Ind. Eng. Manag. Sci., 4, pp. 72-75.
[23] Gonçalves, C.P. Quantum neural machine learning: Backpropagation and dynamics (2017) NeuroQuantology, 15 (1), pp. 22-41.
[24] G. Suseendran, E. Chandrasekaran, D. Akila, D. Balaganesh, “Automatic Seed Classification By Multi- Layer Neural Network With Spatial-Feature Extraction”, Journal of critical reviews, Vol. 7,(2), 2020, pp.587-590, Doi:10.31838/jcr.07.02.108
[25] Soobia Saeed, NZ Jhanjhi, Mehmood Naqvi, and Mamoona Humayun, “Analysis of Software Development Methodologies”, in International Journal of Computing and Digital Systems, vol 08, issue 05, pp. 445-460
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.