|
Agency, N. (2020). Overview of Cybercrime in 108. Taipei: National Police Agency. Agency, N. P. (2016, 11 22). Hotline. Retrieved from National Police Agency: https://www.npa.gov.tw/NPAGip/wSite/ct?xItem=80859&ctNode=12543&mp=4 Agency, N. P. (2020, 4 23). Anti Fraud. Retrieved from 165 Anti Fraud: https://165.npa.gov.tw/#/article/news/193 Agmasari, S. (2019, 11 5). Hati-hati Saat Beli Tiket Taman Safari Bogor, Ada Penipuan Online Artikel ini telah tayang di Kompas.com dengan judul "Hati-hati Saat Beli Tiket Taman Safari Bogor, Ada Penipuan Online", https://travel.kompas.com/read/2019/11/05/140000427/hati-hati-saat-. Retrieved from Kompas: https://travel.kompas.com/read/2019/11/05/140000427/hati-hati-saat-beli-tiket-taman-safari-bogor-ada-penipuan-online?page=all Ariyanti, D. S. (2018, 11 21). Lebih dari 50% Kejahatan Siber Berasal dari Media Sosial. Retrieved from Teknologi: https://teknologi.bisnis.com/read/20180921/84/840939/lebih-dari-50-kejahatan-siber-berasal-dari-media-sosial Bank, U. N., & United Nation , T. A. (2017). Combatting Cybercrime Tools and Capacity Building. Washington DC: ITU. Bernik, I. (2014). Cybercrime and Cyberwarfare. London: Wiley. Bullock, K., Clarke, R. V., & Tilley, N. (2010). Situational Prevention of Organised Crimes. Canada: Willan. Bureau, C. I. (2019, 7 20). Organization. Retrieved from Criminal Investigation Bureau: https://www.cib.gov.tw/Module/Doc/Index/63 Bureau, C. I. (2020, 4 20). International Cooperation. Retrieved from CIB: https://www.cib.gov.tw/English/Module/Doc/Index/142 Button , M., Lewis, C., & Tapley, J. (2009). Fraud Typologies and Victims of Fraud. UK: University of Portsmouth. Button, M., Nicholls, M., Kerr, J., & Owen, R. (2014). Online Frauds: Learning from victims why they fall for these scams. Journal of Criminology, 391-408. Clough, J. (2010). Principles of Cybercrime. New York: Cambridge University Press. Comer, D. E. (2019). e Internet Book Everything You Need to Know about Computer Networking and How the Internet Works. New York: CRC Press. Creswell, J. W. (2009). Research Design. Qualitative,Quantitative, and Mixed Methods Approaches. London: SAGE. Creswell, J. W. (2013). Qualitative Inquiry & Research Design. London: SAGE. Creswell, J. W., & Creswell, J. D. (2014). Research Design. Qualitative,Quantitative, and Mixed Methods Approaches (Vol. Fifth Edition). London: SAGE. Cross, M. (2008). Scene of the Cybercrime. Syngress. Curtis, G. (2012). The Law of Cybercrimes and Their Investigations. New York: CRC Press. David, F. R. (2011). Strategic Management Concepts and Cases. New Jersey: Prentice Hall. Djanggih, H., & Qamar, N. (2018). Penerapan Teori-Teori Kriminologi dalam Penanggulangan Kejahatan Siber (Cyber Crime). Hukum, 10-23. Eck, J. E., & Spelman, W. (1987). Problem Solving. Problem Oriented Policing In Newport News. USA: U.S Departmen of Justice. Evans, D. (2011). The Internet of Things How the Next Evolution of the Internet Is Changing Everything. Netherland: Cisco IBSG. Gabosky, P., Smith, R. G., & Dempsey, G. (2001). Electronic Theft Unlawful Acquisition in Cybercrime. UK: Cambridge . Gee, S. (2015). Fraud and Fraud Detection. New Jersey: Wiley. Government, T. (2020, 4 20). Taiwan Government. Retrieved from Government Agencies: https://www.taiwan.gov.tw/3866.php?xq_xCat=2 Gragido , W., & Pirc, J. (2011). Cybercrime and Espionage. USA: Elsevier. Graham, J. (2009). Cyber Fraud.Tactics,Techniques, and Procedures. New York: CRC press. Hamzah, A. (1990). Aspek aspek pidana di Bidang Komputer. Jakarta. Hill, J. B., & Marion, N. E. (2016). Introduction to Cyber Crime. California: PSI textbox. Holt, T. J., & Bossler, A. M. (2016). Cybercrime in Progress. London: Routledge. Hubeis, M., & Najib, M. (2014). Manajemen Strategik. Jakarta: Gramedia. Hunger, J. D., & Wheelen, T. L. (2011). Essential of Strategic Management. New Jersey: Prentice Hall. Indonesia, C. P. (2020, 4 5). Patroli Siber. Retrieved from Statistic: https://patrolisiber.id/statistic ITU. (2012). Understanding Cybercrime: Phenomena,Challenges and Legal Response. France: ITU. Jaishankar, K. (2011). Cyber Crimonology.Exploring Internet Crimes and Criminal Behavior. New York: CRC press. Jewkes, Y., & Yar , M. (2010). Handbook of Internet Crime (Vol. First Editon). Canada: Willan. Justice, M. o. (2019, 6 19). Law. Retrieved from Law and Regulations Database of The Republic of China: https://law.moj.gov.tw/ENG/LawClass/LawAll.aspx?pcode=C0000001 Kovacich, G. L., & Jones, A. (2006). High Technology Crime Investigators Hanbook (Vol. Second Edition). USA: Elsevier. Kremling, J., & Parker, A. M. (2018). Cyberspace,Cybersecurity,and Cybercrime. California: SAGE. Lab, S. P. (2014). Crime Prevention.Approaches, Practices, and Evaluations. USA: Elsevier. Lanier, M. M., Henry, S., & Anastasia, D. J. (2015). Essential Criminology. Alabama: Westview Press. Larsen, H. L., Blanco, J. M., Pastor, R., & Yager, R. (2017). Using Open Data to Detect Organized Crime Threats Factors Driving Future Crime. Switzerland: Springer. Leclerc, B., & Savona , E. U. (2017). Crime Prevention in the 21st Century Insightful Approaches for Crime Prevention Initiatives. Switzerland: Springer. Levi, M. (2008). Organized Fraud and Organizing Frauds: Unpacking Research on Networks and Organization. Criminology & Criminal Justice, 389-419. Lindsey, N. (2019, 3 12). Cyber Criminals Have Turned Social Media Cyber Crime Into a $3 Billion Business. Retrieved from Cybersecurity: https://www.cpomagazine.com/cyber-security/cyber-criminals-have-turned-social-media-cyber-crime-into-a-3-billion-business/ Martin , A. A., & Graham , F. (2015). The Criminal Act The Role and Influence of Routine Activity Theory. England: Palgrave Macmillan. Masyur, D., & Gultom, E. (2005). Cyber Law. Bandung: Aditama. Mennie, P. (2015). Social Media Risk and Governance Managing enterprise risk . London: Kogan Page. Newburn, T. (2007). Criminology. London: Routledge. Octaveri. (2017). A Research On Cybercrime Control Policy in Indonesia. Taipei: Central Police University. Piquero, A. R. (2016). The Handbook of Criminological Theory. USA: John Willy & Sons. Population, W. (2020, 4 20). Population. Retrieved from World Population: https://worldpopulationreview.com/countries/ Pratt, T. C., Holtfreter, K., & Reisig, M. (2010). Routine Online Activity and Internet Fraud Targeting: Extending the Generality of Routine Activity Theory. Research in Crime and Delinquency, 267-296. Priyono. (2007). Pengantar Manajemen. Surabaya: Zifatama. Raco, J. R. (2010). Metode Penelitian Kualitatif. Jakarta: Gramedia. Raharjo, A. (2002). Cybercrime. Bandung: Fist. Rahutomo, T. A. (2016). Policy Strategy For Prevention Fraud Crimes Through Electronic Media In Metro Princint, Center Jakarta. Jakarta: Police Science Collage of Indonesia National Police. Rangkuti, F. (2015). Personal SWOT Analysis. Jakarta: Gramedia. Reichel, P., & Albanese, J. (2014). Transnational Crime and Justice. USA: SAGE. Richard , J. (1999). Transnational Criminal Organizations,Cybercrime, and Money Laundering. New york: CRC Press. Ross, S., & Smith, R. G. (2011). Risk factors for advance fee fraud victimisation. Australia: Australian Institute of Criminology. Schneider, S. (2015). Crime Prevention Theory and Practice . New York: CRC Press. Setiawan, R. (2019, July 2 ). BSSN Sebut Ada 1,9 Juta Serangan Siber pada Mei 2019 Baca selengkapnya di artikel "BSSN Sebut Ada 1,9 Juta Serangan Siber pada Mei 2019", . Retrieved from Teknologi: https://tirto.id/bssn-sebut-ada-19-juta-serangan-siber-pada-mei-2019-edur Siegel, L. J. (2010). Criminology.Theories,Patterns, and Typologies. Canada: Wadsworth. Siyoto, S., & Sodik, A. (2015). Dasar Metodologi Penelitian. Yogyakarta: Literasi Media. Sjouwerman, S. (2016). Cyberheist. Florida: Knowbe. Speedtest. (2020, 4 20). Speedtest. Retrieved from Global-Index: https://www.speedtest.net/global-index Sumadi, H. (2015). Kendala Dalam Menanggulangi Tindak Pidana Penipuan Transaksi Eelektronik di Indonesia. Wawasan Hukum, 175-203. Sumenge, M. M. (2013). Penipuan Menggunakan Media Internet Berupa Jual Beli Online. Lex Crimen, 102-112. Trottier, D., & Fuchs, C. (2015). Social Media, Politics, and The State. New York: Routledge. Viano, E. C. (2017). Cybercrime, Organized Crime, and Societal Responses. Switzerland: Springer. Wahid, A., & Labib, M. (2005). Kejahatan Mayantara. Bandung: Aditama. Wells, J. T. (2010). Internet Fraud Casebook . New Jersey: John Wiley & Son. Wexler, C. (2000). Excellence in Problem Oriented Policing:The 1999 Herman Goldstein. USA: U.S Departement Of Justice. Willems, E. (2019). Cyberdanger Understanding and Guarding Against Cybercrime. Switzerland: Springer. Wortley, R., & Townsley, M. (2017). Environmental Criminology and Crime Analysis. New York: Routledge. Yar, M. (2006). Cybercrime and Society. California: SAGE.
Legislation Criminal Code Law (KUHP) of the Republic of Indonesia. Criminal Procedure Code (KUHAP) of the Republic of Indonesia. Law Number 19 the Year 2016 concerning Amendments to Law Number 11 the Year 2008 concerning Information and Electronic Transactions of the Republic of Indonesia. Law of the Republic of Indonesia Number 5 the Year 2009 Concerning Ratification Of the United Nations Convention Against Transnational Organized Crime. Criminal Code Law of the Republic of China. Personal Data Protection Law of the Republic of China. Cyber Security Management Law of the Republic of China. Organized Crime Prevention Law of the Republic of China
|