Protecting Digital Society: Policies for Criminalizing Illegal Smartphone Applications Through Cyber Law Frameworks

Authors

  • Kity Tokan Universitas Lambung Mangkurat
  • Muhammad Erham Amin Universitas Lambung Mangkurat
  • Ahmad Syaufi Universitas Lambung Mangkurat
  • Mispansyah Universitas Lambung Mangkurat

DOI:

https://doi.org/10.58812/wslhr.v2i03.1055

Keywords:

smartphone applications, cyber law, criminal law policies, digital society, unauthorized applications

Abstract

This research aims to contribute to the development of criminal law policies addressing the widespread distribution of smartphone applications, both APK and iOS, that are used as tools for unauthorized online loan activities, online fraud, threats, and intimidation. These applications often disguise themselves as legitimate online loan platforms, wedding invitation apps, and parcel delivery services. Upon download, they illicitly debit mobile banking accounts or present themselves as government auction platforms for criminal goods at discounted prices, posing significant threats to consumers, debtors, and the general public. Theoretical framework: The foundation of this research lies in cyber law theory, which endeavors to create legal strategies to address cybercrimes and safeguard the digital community. This study utilizes a multidisciplinary approach, integrating legal analysis, policy assessment, and collaboration with stakeholders. Methods: This study utilized the normative juridical method to examine digital policies by criminalizing illegal smartphone applications through cyber law policies. This approach involves a systematic legal analysis of current regulations, assessing their effectiveness, and suggesting formal legal measures to address new threats posed by unauthorized applications, with an emphasis on protecting digital society from harm. Results and Conclusions: This indicates a pressing need for comprehensive criminal law policies specifically designed to effectively combat these unauthorized applications. Such policies are crucial in preventing and mitigating the harms caused by these applications before they impact society. The author's contribution lies in proposing formal offenses against the creators and disseminators of these applications. malicious applications, thereby bridging the current gap in legal measures to counteract digital criminal activities. Originality/Value: This research underscores the urgency of formulating and implementing cyber law policies to safeguard the public from the detrimental effects of illicit smartphone applications. Its originality lies in proposing innovative legal strategies to proactively address emerging digital threats.

References

Suryowati, E. (2019). Ini Poin Penting Aturan"Peer-to-Peer Lending. Available: https://money.kompas.com/read/2017/01/03/120000326/ini.poin.penting.aturan.peer-topeer.lending.untuk.fintech

Pakpahan, E. F., Chandra, K., & Tanjaya, A. (2020). Urgensi Pengaturan Financial Technology di Indonesia. Jurnal Darma Agung, 28(3), 444-456.

Nasution, A. (2017). Sekilas hukum perlindungan konsumen. Jurnal Hukum & Pembangunan, 16(6), 568-581.

Novita, W. S., & Imanullah, M. N. (2020). Aspek Hukum Peer to Peer Lending (Identifikasi Permasalahan Hukum dan Mekanisme Penyelesaian). Jurnal Privat Law, 8(1), 151-157.

Setyanawati, D. P. W. Y. (2015). Tinjauan Viktimologi Dan Perlindungan Hukum Korban Kekerasan Dalam Pacaran. Serambi Hukum, 8(02), 23094.

Choo, K. K. R. (2011). The cyber threat landscape: Challenges and future research directions. Computers & security, 30(8), 719-731.

Kolomoets , E., Shoniya, G., Mekhmonov, S., Abdulnabi, S., Karim, N. A., & Mohammad , T. A. (2023). The Employee’s Right to Work Offline: A Comparative Analysis of Legal Frameworks in Different Countries. Revista De Gestão Social E Ambiental, 17(5), e03470.

Mariyam, S., & Setiyowati, S. (2021). Legality of Artificial Intelligence (AI) Technology in Public Service Transformation: Possibilities and Challenges. Lex Publica, 8(2), 75-88.

Yanto, O. (2020). Criminal Charges and Sanctions on Defamation Crime as Cyber Crime in the Information Technology Development. Lex Publica, 7(2), 24-43.

Suwadi, P., Manthovani, R., & Assyifa, A. K. (2023). Legal Comparison of Electronic Contract in Electronic Commerce Between Indonesia and the United States Based on the United Nations Commission on International Trade Law. Journal of Law and Sustainable Development, 11(3), e714.

Wardani, A., Ali, M., & Barkhuizen, J. (2022). Money Laundering through Cryptocurrency and Its Arrangements in Money Laundering Act. Lex Publica, 9(2), 49-66.

Astuti, S. A. (2016). Penerapan Uu ITE Dan Surat Edaran Kapolri Mengenai Ujaran Kebencian Hate Speech Terhadap Penyimpangan Penggunaan Kebebasan Berekspresi Dalam Kajian Pasal 28 UUD 1945 Tentang HAM Di Ruang Maya Cyber Space. Lex Publica, 2(2).

Marwan, M., & Prayogo, G. (2019). Justice and Legal Certainty in Regulating Cryptocurrency in Malaysia. Lex Publica, 6(2), 1-7.

Sukmareni, S. (2016). Hak Perlindungan Penduduk Sipil Atas Serangan Langsung dalam Konflik Bersenjata Menurut Hukum Humaniter Internasional (Cek Similarity). Lex Publica, 2(2), 341-350.

Kipane, A. (2019). Meaning of profiling of cybercriminals in the security context. In SHS Web of Conferences (Vol. 68, p. 01009). EDP Sciences.

Perkins, R. C., & Howell, C. J. (2021). Honeypots for cybercrime research. Researching Cybercrimes: Methodologies, Ethics, and Critical Approaches, 233-261.

Syaufi, A., Zahra, A. F., & Gholi, F. M. I. (2023). Employing Forensic Techniques in Proving and Prosecuting Cross-border Cyber-financial Crimes. International Journal of Cyber Criminology, 17(1), 85-101.

Howell, C. J., & Burruss, G. W. (2020). Datasets for analysis of cybercrime. The Palgrave handbook of international cybercrime and cyberdeviance, 207-219.

Alubaidi, A. (2023). Challenges to Implementing the International Digital Law to Protect Digital Rights. Journal of Law and Sustainable Development, 11(5), e554.

Prayogo, G., & Chornous, Y. (2020). Conceptualization of Future Cryptocurrency Laws in Indonesia and Ukraine. Lex Publica, 7(2), 56-68.

Oksanen, A., & Keipi, T. (2013). Young people as victims of crime on the internet: A population-based study in Finland. Vulnerable children and youth studies, 8(4), 298-309.

Abubakari, Y., & Blaszczyk, M. (2023). Politicization of Economic Cybercrime: Perceptions Among Ghanaian Facebook Users. Deviant Behavior, 1-20.

Notté, R., Leukfeldt, E. R., & Malsch, M. (2021). Double, triple or quadruple hits? Exploring the impact of cybercrime on victims in the Netherlands. International Review of Victimology, 27(3), 272-294.

Cross, C. (2015). No laughing matter: Blaming the victim of online fraud. International Review of Victimology, 21(2), 187-204.

Hernandez-Castro, J., & Boiten, E. (2014). Cybercrime prevalence and impact in the UK. Computer Fraud & Security, 2014(2), 5-8.

Zahynei-Zabolotenko, Z., Tkachenko, I., Suprun, V., Kvasha, O., Prysiazhniuk, I., & Moisieienko, L. (2023). Legal Aspects of Pedagogical Education in a Digital Society Under the Implementation of the Social Function of the State. Journal of Law and Sustainable Development, 11(6), e1253.

Maglaras, L., Ferrag, M., Derhab, A., Mukherjee, M., Janicke, H., & Rallis, S. (2018). Threats, countermeasures and attribution of cyber attacks on critical infrastructures. EAI Endorsed Transactions on Security and Safety, 5(16).

Basheer, R., & Alkhatib, B. (2021). Threats from the dark: A review over dark web investigation research for cyber threat intelligence. Journal of Computer Networks and Communications, 2021, 1-21.

Kavallieros, D., Chalanouli, C., Kokkinis, G., Panathanasiou, A., Lissaris, E., Leventakis, G., ... & Germanos, G. (2018, June). Searching for crime on the web: Legal and ethical perspectives. In 2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security) (pp. 1-8). IEEE.

Sugangga, R., & Sentoso, E. H. (2020). Perlindungan Hukum Terhadap Pengguna Pinjaman Online (Pinjol) Ilegal. Pakuan Justice Journal of Law (PAJOUL), 1(1), 47-61.

Wahyuni, R. A. E., & Turisno, B. E. (2019). Praktik Finansial Teknologi Ilegal Dalam Bentuk Pinjaman Online Ditinjau Dari Etika Bisnis. Jurnal Pembangunan Hukum Indonesia, 1(3), 379-391.

Hanifawati, S. D. (2021). Urgensi Penegakan Hukum Pidana pada Penerima Pinjaman Kegiatan Peer To Peer Lending Fintech Ilegal dan Perlindungan Data Pribadi. Jurnal Penegakan Hukum Dan Keadilan, 2(2), 162-172.

Musyafah, A. A. (2019). Peran Otoritas Jasa Keuangan (OJK) Dalam Hal Perlindungan Nasabah Pada Lembaga Keuangan Mikro Syariah. Law, Development and Justice Review, 2(2), 194-211.

Nurwahridya, M. M. (2020). Peranan Polri dalam Penanggulangan Tindak Pidana Siber oleh Desk Collector Pinjaman Online. RECIDIVE, 9(1), 43-49.

Hartini, S., Sudrajat, T., & Bintoro, R. (2012). Model Perlindungan Hukum terhadap Kebijakan Pelayanan Kesehatan Masyarakat Miskin di Kabupaten Banyumas. Jurnal Dinamika Hukum, 12(3), 523-534.

Lumbanraja, A. D. (2020). Perkembangan Regulasi dan Pelaksanaan Persidangan Online di Indonesia dan Amerika Serikat Selama Pandemi Covid-19. Crepido, 2(1), 46-58.

Downloads

Published

2024-07-15

How to Cite

Tokan, K., Amin, M. E., Syaufi, A., & Mispansyah , M. (2024). Protecting Digital Society: Policies for Criminalizing Illegal Smartphone Applications Through Cyber Law Frameworks. West Science Law and Human Rights, 2(03), 175–183. https://doi.org/10.58812/wslhr.v2i03.1055