Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 11673 dokumen yang sesuai dengan query
cover
Sheetz, Michael
Hoboken: John Wiley & Sons, 2007
363.25 SHE c
Buku Teks  Universitas Indonesia Library
cover
Andri Rivano
"[ABSTRAK
Pemanfaatan teknologi informasi (TI), selain membantu suatu instansi pemerintah dalam memotong rantai birokrasi dalam pelaksanaan tugas pokok dan fungsi instansi pemerintah, terkait reformasi birokrasi, juga dapat dimanfaatkan untuk pembenahan instansi pemerintah. Dalam studi kasus ini dimana sudah dicanangkan suatu kegiatan yang bertujuan membenahi organisasi di instansi pemerintah pusat XYZ, atas instruksi Komisi Pengawas XYZ Pada kegiatan pembenahan organisasi XYZ tersebut dilakukanlah penelaahan risiko dalam kegiatan fraud risk management dimana salah satu lingkup kerjanya adalah melakukan fraud risk assesment yang dilakukan dengan bantuan forensic technology. Tujuan menggunakan forensic technology adalah untuk menemukan bukti-bukti digital pada sistem komputer dengan mengandalkan kemampuan forensic technology dalam merekonstruksi data dan informasi dari file yang ada maupun yang sudah dihapus. Dengan demikian forensic technology merupakan alat yang tepat untuk membuktikan compliance (kepatuhan), baik kepatuhan terhadap hukum ataupun terhadap kode etik/norma perusahaan, khususnya korupsi. Pimpinan XYZ juga telah menyadari hal ini dan telah memerintahkan untuk menyusun prosedur penggunaan computer forensic sebagai alat audit internal. Pada karya akhir ini dilakukan uji coba untuk membuktikan (proof of concept) bahwa computer forensic yang telah dimiliki saat ini dapat membantu proses penemuan indikasi pelanggaran kode etik/norma, khususnya korupsi. Hasil dari penelitian ini adalah berupa model computer forensic dalam kegiatan fraud risk management pada proses bisnis XYZ beserta draft standard operating procedure (SOP) terkait pelaksanaan computer forensic.

ABSTRACT
Application of information technology (IT), instead of addition to helping a government agencies in steramlining the bureaucracy in the implementation of the basic tasks and roles of government agencies, relevant bureaucratic reform, also can be used for improvement of government agencies its self. In this case study where already launched an activity that aims to fixing up of government agency of Indonesia XYZ organization, on the instructions of XYZ?s regulatory commission.
In the fixing up the XYZ organization conducted review the risk in order to fraud risk management activity that one of scope of work is to do fraud risk assessment using forensic technology. The aim using forensic technolgy is to identify digital evidence on computer systems by relying on the ability of forensic technology in reconstructing the data and information from existing files or deleted. Thus forensic technology is a good tool for proving compliance (adherence), good adherence to the law or the code of ethics/norms of the company, particularly corruption. Chairs of XYZ has also been aware of this and has been ordered to draw up the use of computer forensic procedures as a tool of internal audit.
In this research conducted trials to prove (proof of concept) that computer forensic that has been held at this time can help the process of the invention indicated violations of the code of ethics/norms, particularly corruption. Results of this research is in the form of a model computer forensic in fraud risk management activity in the business process XYZ and draft of standard operating procedure (SOP) related to the implementation of computer forensic., Application of information technology (IT), instead of addition to helping a government agencies in steramlining the bureaucracy in the implementation of the basic tasks and roles of government agencies, relevant bureaucratic reform, also can be used for improvement of government agencies its self. In this case study where already launched an activity that aims to fixing up of government agency of Indonesia XYZ organization, on the instructions of XYZ’s regulatory commission.
In the fixing up the XYZ organization conducted review the risk in order to fraud risk management activity that one of scope of work is to do fraud risk assessment using forensic technology. The aim using forensic technolgy is to identify digital evidence on computer systems by relying on the ability of forensic technology in reconstructing the data and information from existing files or deleted. Thus forensic technology is a good tool for proving compliance (adherence), good adherence to the law or the code of ethics/norms of the company, particularly corruption. Chairs of XYZ has also been aware of this and has been ordered to draw up the use of computer forensic procedures as a tool of internal audit.
In this research conducted trials to prove (proof of concept) that computer forensic that has been held at this time can help the process of the invention indicated violations of the code of ethics/norms, particularly corruption. Results of this research is in the form of a model computer forensic in fraud risk management activity in the business process XYZ and draft of standard operating procedure (SOP) related to the implementation of computer forensic.]"
2015
TA-Pdf
UI - Tugas Akhir  Universitas Indonesia Library
cover
Johnson III, Leighton R.
"Computer incident response and forensics team management provides security professionals with a complete handbook of computer incident response from the perspective of forensics team management. This unique approach teaches readers the concepts and principles they need to conduct a successful incident response investigation, ensuring that proven policies and procedures are established and followed by all team members.
Leighton R. Johnson III describes the processes within an incident response event and shows the crucial importance of skillful forensics team management, including when and where the transition to forensics investigation should occur during an incident response event. The book also provides discussions of key incident response components."
Waltham, MA: Syngress, 2014
e20426926
eBooks  Universitas Indonesia Library
cover
McCarthy, N.K.
New York: McGraw-Hill, 2012
005.8 MCC c
Buku Teks  Universitas Indonesia Library
cover
Shipley, Todd G.
"Written by experts on the frontlines, Investigating internet crimes provides seasoned and new investigators with the background and tools they need to investigate crime occurring in the online world. This invaluable guide provides step-by-step instructions for investigating Internet crimes, including locating, interpreting, understanding, collecting, and documenting online electronic evidence to benefit investigations.
Cybercrime is the fastest growing area of crime as more criminals seek to exploit the speed, convenience and anonymity that the Internet provides to commit a diverse range of criminal activities. Today's online crime includes attacks against computer data and systems, identity theft, distribution of child pornography, penetration of online financial services, using social networks to commit crimes, and the deployment of viruses, botnets, and email scams such as phishing. Symantec's 2012 Norton Cybercrime Report stated that the world spent an estimated $110 billion to combat cybercrime, an average of nearly $200 per victim.
Law enforcement agencies and corporate security officers around the world with the responsibility for enforcing, investigating and prosecuting cybercrime are overwhelmed, not only by the sheer number of crimes being committed but by a lack of adequate training material. This book provides that fundamental knowledge, including how to properly collect and document online evidence, trace IP addresses, and work undercover."
Waltham, MA: Steven Elliot, 2014
e20427145
eBooks  Universitas Indonesia Library
cover
Orisa Shinta Haryani
"Perkembangan teknologi informasi yang begitu pesat memunculkan satu media komunikasi baru yang disebut dengan media sosial. Kepolisian Republik Indonesia membentuk Direktorat Tindak Pidana Siber Bareskrim Polri untuk menangani masalah kejahatan siber di media sosial dan melakukan pemberdayaan media sosial dalam konteks pemolisian masyarakat. Penelitian ini melihat bagaimana pemberdayaan media sosial yang dilakukan oleh Direktorat Tindak Pidana Siber Bareskrim Polri. Selain itu penelitian ini juga melihat dampak pemberdayaan media sosial tersebut terhadap masyarakat serta menemukan faktor penyebab tidak maksimalnya implementasi pemberdayaan media sosial dan juga menemukan solusi untuk meningkatkan pemberdayaan tersebut. Pendekatan penelitian ini adalah kualitatif dan pengumpulan data dilakukan dengan wawancara, observasi, juga melakukan studi literatur. Konsep yang digunakan di dalam penelitian ini adalah konsep community policing, effective policing, dan dampak pemberdayaan media sosial. Hasil penelitian ini menunjukkan bahwa pemberdayaan media sosial oleh Direktorat Tindak Pidana Siber Bareskrim Polri dilakukan untuk memberikan informasi pada masyarakat, melakukan deteksi dini pelaku kejahatan, membangun relasi dengan masyarakat, dan melakukan fungsi pengawasan dan kontrol terhadap perilaku masyarakat di media sosial. Dampak tidak maksimalnya pemberdayaan media sosial adalah ketidakpercayaan masyarakat terhadap kepolisian, media sosial tidak menjadi alat yang efektif dalam melakukan investigasi dan penyelidikan kasus, media sosial tidak mampu menjadi sarana penyampaian keberhasilan polisi sehingga tidak dapat meningkatkan performa kerja anggota, dan upaya pencegahan kejahatan tidak terlaksana dengan baik.

The development of information technology is so rapidly raises a new communication media called social media. Indonesia National Police established the Cyber Crime Investigation Center to deal with cybercrime in social media and empower social media in the community policing context. This study looks at how social media empowerment conducted by Cyber Crime Investigation Center. In addition, this study also looked at the impact of social media empowerment to the community and find the cause of unsuccessful implementation of social media empowerment and also find solutions to improve the empowerment. This research used qualitative approach and data collection techniques use interview, observation, also conducting literature study. The concept used in this research is community policing, effective policing, and the impact of social media empowerment. The results of this study indicate that social media empowerment by Cyber Crime Investigation Center aims to give information to society, early detection of criminal offenders, to build relation with society, and to do supervision and control in social media. The ineffectual impact of social media empowerment is public distrust of the police, social media is not an effective tool in investigating cases, social media can not be a medium to deliver the success story of the police works, and crime prevention in social media are not well implemented."
Depok: Universitas Indonesia, 2018
T49138
UI - Tesis Membership  Universitas Indonesia Library
cover
Muhammad Rizky Nurkamrullah
"Warnet sebagai salah satu bentuk bisnis yang memanfaatkan teknologi komputer dalam berbagai macam kegiatannya tenyata tidak luput dari ancaman kejahatan komputer dan khususnya dalam penelitian ini adalah manipulasi sistem billing. Penelitian ini bertujuan untuk memaparkan kondisi apa saja yang membuat warnet X menjadi target tindakan manipulasi sistem billing. Penelitian ini akan menggunakan teori aktifitas rutin untuk menjelaskan situasi dan kondisi di dalam warnet X. Untuk mendapatkan gambaran situasi dan kondisi warnet yang lebih jelas, peneliti akan melakukan wawancara terhadap pemilik warnet, pegawai warnet yang bertindak sebagai operator, dan pelanggan warnet ini atau user.
Hasil wawancara dengan informan-informan tersebut menggambarkan kondisi warnet yang berpotensi menjadi target kejahatan komputer. Berbagai macam kondisi diantaranya adalah adanya motivasi pelaku untuk melakukan manipulasi billing; baik sistem billing, operator warnet, dan pemilik warnet lemah dalam pengawasan serta penjagaan keamanan data billing warnet tersebut; dan sistem billing dan operator warnet X memiliki karakteristik sebagai target tindakan manipulasi billing.

Internet café, is the one kind of business that using computer technology in every their business activity in fact, is not free from computer crime threat and especially in this research is billing manipulation act. This research is going to describe what circumstances that makes this internet café is potentially being a target of billing system manipulation act. This research will using routine activity theories to explain the condition and situation of this internet café. To get the clear picture of this internet café, researchers will interviewing the owner of the internet café X, the employee or server operator, and the client or the user.
From the results of the interview with the informants, its clear that one of the condition that makes this internet café vulnerable is the offender who had a motivation to do the manipulation; the weakness of billing system, server operator, and the owner for guarding the billing data; and the suitable condition of the billing and server operator to be a target of billing manipulation.
"
Depok: Fakultas Ilmu Sosial dan Ilmu Politik Universitas Indonesia, 2013
S45873
UI - Skripsi Membership  Universitas Indonesia Library
cover
Perry, William E.
New York: John Wiley & Sons, 1981
629.895 PER c
Buku Teks  Universitas Indonesia Library
cover
Akhgar, Babak
"Cyber crime and cyber terrorism investigator’s handbook is a vital tool in the arsenal of today’s computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become some of the most concerning topics in today’s security landscape. News stories about Stuxnet and PRISM have brought these activities into the public eye, and serve to show just how effective, controversial, and worrying these tactics can become.
Cyber crime and cyber terrorism investigator’s handbook describes and analyzes many of the motivations, tools, and tactics behind cyber attacks and the defenses against them. With this book, you will learn about the technological and logistic framework of cyber crime, as well as the social and legal backgrounds of its prosecution and investigation. Whether you are a law enforcement professional, an IT specialist, a researcher, or a student, you will find valuable insight into the world of cyber crime and cyber warfare.
"
Waltham, MA: Elsevier, 2014
e20426911
eBooks  Universitas Indonesia Library
cover
Remenyi, Dan
London: McGraw-Hill Book Co , 1980
001.642 REM l
Buku Teks SO  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>