Perlindungan Hukum Terhadap Korban Pembajakan Akun Media Sosial Ditinjau Dari Undang-Undang Nomor 19 Tahun 2016 Tentang Informasi dan Transaksi Elektronik Perubahan Atas Undang-Undang Nomor 11 Tahun 2008 Tentang Informasi dan Transaksi Elektronik

Julianto, Muhamad Rahmad and , Muchamad Ikhsan, S.H., M.H (2021) Perlindungan Hukum Terhadap Korban Pembajakan Akun Media Sosial Ditinjau Dari Undang-Undang Nomor 19 Tahun 2016 Tentang Informasi dan Transaksi Elektronik Perubahan Atas Undang-Undang Nomor 11 Tahun 2008 Tentang Informasi dan Transaksi Elektronik. Skripsi thesis, Universitas Muhammadiyah Surakarta.

[img] PDF (Naskah Publikasi)
NASKAH PUBLIKASI.pdf

Download (415kB)
[img] PDF (Halaman Depan)
HALAMAN DEPAN.pdf

Download (395kB)
[img] PDF (Bab I)
BAB I.pdf

Download (314kB)
[img] PDF (Bab II)
BAB II.pdf
Restricted to Repository staff only

Download (381kB) | Request a copy
[img] PDF (Bab III)
BAB III.pdf
Restricted to Repository staff only

Download (326kB) | Request a copy
[img] PDF (Bab IV)
BAB IV.pdf
Restricted to Repository staff only

Download (55kB) | Request a copy
[img] PDF (Daftar Pustaka)
DAFTAR PUSTAKA.pdf

Download (188kB)
[img] PDF (Surat Pernyataan Publikasi)
PERNYATAAN PUBLIKASI.pdf
Restricted to Repository staff only

Download (194kB) | Request a copy

Abstract

The definition of law as a norm can be formulated as a collection of life instructions that regulate the order in a society, and must be determined by the members of the community concerned. Along with the development of this technology, crime began to penetrate social networks such as hijacking personal accounts used to spread hoax news, spreading sara-related news, buying and selling drugs, prostitution, and so on which caused losses for several parties. According to article 31 paragraph (1) of Law Number 19 of 2016 the definition of account hijacking is anyone intentionally and without rights or against the law. Every criminal act of hijacking a privately owned account is rarely found by witnesses and other evidence. The purpose of this study is to find out how legal protection for victims of hijacking social media accounts is in terms of law number 19 of 2016 concerning electronic information and transactions, amendments to law number 11 of 2008 regarding electronic information and transactions. The research method is a normative approach by examining legal principles, legal norms regarding legal protection for victims of hijacking social media accounts in terms of law number 19 of 2016 concerning electronic information and transactions, changes to law number 11 of 2008 regarding information and transactions electronic research with analytical descriptive nature which will thoroughly and systematically explain legal protection against victims of hijacking social media accounts. Sources of data in this study is to use library research to find secondary data and field research to obtain primary data. The results of the study show that Law Enforcement of Law Number 19 of 2016 concerning Electronic Information and Transactions related to social media users in Surakarta City is ineffective in its implementation, even very bad. This is because there are still many people who use social media in the city of Surakarta who commit acts against the law on social media due to limited knowledge of the ITE Law. Legal factors, law enforcement factors, facilities or facilities from law enforcement, community factors and legal culture factors are factors that influence the enforcement of Law Number 19 of 2016 concerning Information and Electronic Transactions related to social media users in Surakarta City. which causes the ineffective implementation of Law Number 19 of 2016 concerning Electronic Information and Transactions.

Item Type: Karya ilmiah (Skripsi)
Uncontrolled Keywords: Legal protection, piracy victim, social media.
Subjects: K Law > K Law (General)
Divisions: Fakultas Hukum > Hukum
Depositing User: MUHAMAD RAHMAD JULIANTO
Date Deposited: 25 Oct 2021 04:53
Last Modified: 25 Oct 2021 04:53
URI: http://eprints.ums.ac.id/id/eprint/94964

Actions (login required)

View Item View Item