Law Protection of Mobile Phone Fraud Victims

Authors

  • Gomgom T.P Siregar Universitas Darma Agung, Medan, Indonesia. Author

DOI:

https://doi.org/10.61841/dqeg9p03

Keywords:

Protection, Fraud Victim, Electronic Media.

Abstract

The development of technology and communication has a positive impact on society, especially in promoting growth in the economic field. However, advances in information and communication technology also have negative excesses, namely the occurrence of abuse by a group of people to be used as a means of committing crime fraud. Fraud by using electronic media that often occurs today is fraud by using a mobile phone with the mode and under the reason of a family member arrested or child caught in a drug case on behalf of a police officer. The rose of fraud in this mode was significantly necessary to conduct further and deeper analysis under the control of depth study as efforts to protect the victims of fraud. This research method was an empirical juridical research, which is looking at efforts to protect victims of fraud through electronic media conducted by law enforcement officials. The results showed that the modus operandi of fraud through electronic media was quite diverse. From the research finding showed that fraud through electronic media using mobile phones which used the cases of family member arrested or child caught in a drug case on behalf of a police officer, then the perpetrators ask for ransom from the family or parents. Protection against victims of fraud by using mobile phones with the mode of arrest of a family member or child ensnared by drug cases in the name of a police officer, is still very weak, due to the lack of prevention efforts and weak law enforcement.

 

Downloads

Download data is not yet available.

References

[1] Abintoro Prakoso, Kriminologi dan Hukum Pidana, Jakarta; Laskbang Grafika, 2013.

[2] Barda Nawawi Arief, Masalah Penegakan Hukum dan Kebijakan Hukum Pidana dalam Penanggulangan Kejahatan, Jakarta: Prenada Kencana Media Group, 2007.

[3] Dikdik M. Arief dan Elisatris Gultom, Urgensi Perlindungan Korban Kejahatan, Antara Norma dan Realita, Jakarta: PT. Raja Grafindo Utama, 2011.

[4] Ediwarman, Metodologi Penelitian Hukum, Medan; Sofmedia, 2015.

[5] Josua Sitompul, Cyberspace, Cybercrimes, Cyberlaw: Tinjauan Aspek Hukum Pidana, Cetakan Pertama, Jakarta: Tatanusa, 2012.

[6] Kartini Kartono, Patologi Sosial, Jakarta : Raja Grafindo Persada, 2005.

[7] O.C. Kaligis, Penerapan Undang-undang Nomor 11 Tahun 2008 Tentang Informasi dan Transaksi Elektronik Dalam Prakteknya, Jakarta: Yarsif Watampone, 2012.

[8] Tanti Yuniar, Kamus Lengkap Bahasa Indonesia, Jakarta: Agung Mulia, 2009.

[9] Phillipus, M. Hadjon, Perlindungan Hukum Bagi Rakyat Indonesia, Surabaya; PT. Bina Ilmu, 1999.

[10] Peter Mahmud Marzuki, Penelitian Hukum, Jakarta; Prenada Kencana Media Group, 2010.

[11] Samuel Walker, Sense and Nonsense about Crime, A Policy Guide, Monterey-California: Brooks/Cole Publishing Company, 1985.

[12] Satjipto Rahardjo, llmu Hukum, Bandung; Citra Aditya Bakti, 2010.

[13] Soerjono Soekanto, Pengantar Penelitian Hukum, Jakarta; Rajawali Pers, 1996.

[14] , Faktor-Faktor Yang Mempengaruhi Penegakan Hukum, Rajawali Pers, Jakarta, 2010.

[15] Topo Santoso dan Eva Achjani Zulfa, Kriminologi, Jakarta; Rajawali Pers, 2010.

[16] Undang-Undang Nomor 1 Tahun 1946 tentang Kitab Undang-Undang Hukum Pidana (KUHP).

[17] Undang-Undang Negara Republik Indonesia Nomor 11 Tahun 2008 tentang Informasi dan Transaksi Elektronik jo Undang-Undang Negara Republik Indonesia Nomor 19 Tahun 2016 tentang Perubahan Atas Undang-Undang Negara Republik Indonesia Nomor 11 Tahun 2008 tentang Informasi dan Transaksi Elektronik.

[18] https://sumut.idntimes.com, Penipu Modus “Keluarga Ditangkap Polisi Karena Narkoba” Diringkus., diakses tanggal 27 Februari 2020.

[19] Ika Pomounda, Perlindungan Hukum Bagi Korban Penipuan Melalui Media Elektronik (suatu pendekatan viktimologi), (Jurnal Ilmu Hukum Legal Opinion, Edisi $, Volume 3, Tahun 2015, p : 1-9).

[20] Singh, A.Percutaneous coronary intervention vs coronary artery bypass grafting in the management of chronic stable angina: A critical appraisal(2010) Journal of Cardiovascular Disease Research, 1 (2), pp. 54- 58.

[21] Kathirvel poonkodi (2016) chemical composition of essential oil of ocimum basilicuml. (basil) and its biological activities–an overview. Journal of Critical Reviews, 3 (3), 56-62.

[22] Gupta, N., Gupta, V., Singh, A.P., Singh, R.P.Defluoridation of groundwater using low cost adsorbent like bagasse dust, aluminium treated bagasse fly ash, bone powder and shell powder(2014) Bonfring Int. J. Ind. Eng. Manag. Sci., 4, pp. 72-75.

[23] Gonçalves, C.P. Quantum neural machine learning: Backpropagation and dynamics (2017) NeuroQuantology, 15 (1), pp. 22-41.

[24] G. Suseendran, E. Chandrasekaran, D. Akila, D. Balaganesh, “Automatic Seed Classification By Multi- Layer Neural Network With Spatial-Feature Extraction”, Journal of critical reviews, Vol. 7,(2), 2020, pp.587-590, Doi:10.31838/jcr.07.02.108

[25] Soobia Saeed, NZ Jhanjhi, Mehmood Naqvi, and Mamoona Humayun, “Analysis of Software Development Methodologies”, in International Journal of Computing and Digital Systems, vol 08, issue 05, pp. 445-460

Downloads

Published

30.06.2020

How to Cite

Siregar, G. T. (2020). Law Protection of Mobile Phone Fraud Victims. International Journal of Psychosocial Rehabilitation, 24(4), 5512-5523. https://doi.org/10.61841/dqeg9p03