In 1982 there has been a fraud enforcement. - Pasal 378 KUHP in the bank through the - Strengthen the - Enhanced machine computer, as reported by banking system banking system "Voice of Renewal" January 10, - Tighten banking 1991 edition of the two HR recruitment students who break into process so money from a private bank in accepted totally Jakarta as much as Rp. that have high 372,100,000.00 by means of a credibility. computer. The further development of computer technology is a form of computer network that later gave birth to a global information and communication space known as the internet. In such cases, this case is purely criminal modus operation, this type of crime usually use the internet only as a means of crime. Settlement, because these crimes including embezzlement at the bank by using a computer as a tool to commit a crime. 2. PRIVACY; “hacking” - Strengthen the - Pasal 406 KUHP about The world famous porn site security system hacking called Brazzeers has been - Update the - Activate Anti Stalking hacked by a group of hackers security patch or harm to your web in 2016. A group of hackers - Don't respond to - Web protector was successfully hacked the flaming (online - Web advisor site and were able to access all provocation) database users who are - Don't give out any already registered. personal information about ‘’Cyber Stalking’’ yourself or anyone Cyberstalking is a crime in else which the attacker harasses a victim using electronic communication, such as e-mail or instant messaging or messages posted to a Web site or a discussion group. A cyberstalker relies upon the anonymity afforded by the Internet to allow them to stalk their victim without being detected. Cyberstalking messages differ from ordinary spam in that a cyberstalker targets a specific victim with often threatening messages, while the spammer targets a multitude of recipients with simply annoying messages. 3. CRIME; “carding” - Make sure the - Pasal 378 KUHP about One type of cyber crime that credit card you have deception occurred in Bandung around is secured. - Pasal 363 about 2003. Carding is a crime that is - Do not carelessly file stealing scan store your made to steal credit card - Pasal 263 about credit cards at numbers belonging to others identify fraud. random and used in commercial - Make sure the web transactions on the Internet. manager uses SSL ( The perpetrators are mostly Secure Sockets teenagers and students Layer), which is responsibility, was raided by marked with HTTPS the police after some time on the web managed to make transactions transaction log online on the internet using someone else's credit card. The perpetrators, the average operating out of the cafe-cafe that is scattered in the city of Bandung. They used to transact using credit card numbers they get from some sites. 4. HEALTH; “internet - Decrease the - Society addiction” internet usage A new study from the - Use internet University of Hong Kong wisely showed on internet addiction currently experienced by hundreds of millions of the world's population. The study's results revealed that 6 percent of the world's population of Internet addiction. The world population is currently estimated at approximately 7 billion people, and 6 percent of that amount, or approximately 420 million are addicted to the internet. 5. EMPLOYMENT; - more attention to - A good decision “unprofessional staff” the relationship maker Unresponsible,Defensive,easily between fellow - A good Human offended, Bringing personal employees Resource affairs is the unprofessional - softskill upgrade - Listen and receive Development conduct of the employees .that disturb the employees feedback performance especially in information technology
6. Working Condition; “ - Give an up to date - up to date Software
-outdated software which software - Comfortable reduces employees to work - provide comfort environment more effectively and exciting - Feedback environmental -work space less attractive and - give the employee seem boring make the employee performance will be enough leave or not optimal vacation to refresh their mind - the lack of entertainment - give a positive make the performance of feedback to employees is reduced and motivate the maintenance and the ability to employee maintain a system of virus or hacker attacks is reduced 7. Individuality; “virus - Use a good anti- - Tools anti-virus computer” virus and update it - Web protector A computer that infected with regularly. - Activate adblock virus can stole the individual data. So the data that we have can removed automatic because of virus computer.
8. CRIME; “illegal contents” - Strengthen the - Pasal 363 KUHP about
Crimes committed by entering security stealing data or information into the - Have an unique Internet about something that password (for is untrue, unethical, and may personal account) be unlawful or detrimental to public order, for example: the dissemination of pornography, issues / defamation against individuals (usually public figure).
How IT Executives Create Organizational Benefits by Translating Environmental Strategies Into Green IS Initiatives Organizational Benefits of Green IS Strategies and Practices
How IT Executives Create Organizational Benefits by Translating Environmental Strategies Into Green IS Initiatives Organizational Benefits of Green IS Strategies and Practices