Main Article Content
The development of the digital economy in Indonesia is progressing very fast and rapidly. The advancement of technology makes transaction activities practical, fast, and safe. However, in reality, Elektronik transactions are only partially secure. Many cases of electronic transaction crimes, such as electronic payment system breaches, harm customers, including leaking personal data. The method used in this research is normative juridical research with a statutory, conceptual, and case approach, which aims to produce new arguments, theories, or concepts in solving the problems to be studied. The results of the study concluded that the role and function of the State in supervising and mitigating risks in electronic transaction crimes is needed as a constructive solution in solving cybercrime problems, especially in this case, electronic transaction crimes. The security dimensions of electronic transactions to minimize the occurrence of crime are Authentication, Integrity, Non-Repudiation, Privacy, and Safety. Several methods can be used to meet the security dimensions of electronic transactions, namely: Public Key Infrastructure (PKI), Public Key Algorithm, Digital Signature, Digital Certificate, Secure Socket Layer (SSL), Transport Layer Security (TLS), and Secure Electronic Transaction (SET). Financial Institutions, including Banking, can apply some of these methods in the context of electronic transaction security.
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Alalwan, N., Alzahrani, A., & Sarrab, M. “Cybercrime Investigation Challenges for Gulf Cooperation Council Governments: A Survey”. ICoFCS, 2013.
Andre M. R. Wajong dan Carolina Rizki Putri, “Keamanan Dalam Electronic Commerce” ComTech Vol.1 No.2 Desember 2010.
Bendovschi, “A. Cyber Attacks Trends, Patterns And Security Countermeasures”. Procedia Economics And Finance, 28, (2015).
Dejo Olowu, “Cyber-Crimes and the Boundaries of Domestic Legal Responses: Case for an Inclusionary Framework for Africa”, Journal of Information, Law & Technology, 1, 2009.
Deky Pariadi, “Pengawasan E Commerce Dalam Undang-Undang Perdagangan Dan Undang-Undang Perlindungan Konsumen”, Jurnal Hukum & Pembangunan, Vol. 48 No. 3 (2018).
Dicky Efraim Simanungkalit, “Kebijakan Pemerintah Indonesia Dalam Menangani Hacker Di Indonesiatahun 2008-2014”, eJournal Ilmu Hubungan Internasional, 2018, 6 (3).
D. Casey, “Error, Uncertainty, And Loss In Digital Evidence,” International Journal of Digital Evidence, Vol. 1, No. 2, 2002.
Ni Nyoman Anita Candrawati, “Perlindungan Hukum Terhadap Pemegang Kartu E-Money Sebagai Alat Pembayaran Dalam Transaksi Komersial”, Jurnal Magister Hukum Udayana, Vol. 3 No. 1, 2014.
Nugraha, Y. (2021). Covid-19 in Italy: Impact of Lockdown in Italy on Socio-Economic Situation. Journal of Social Science, 2(2), 223-227.
Poonia, A. S. “Cyber Crime: Challenges and its classification”. International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), 2014.
Rahayu, W. K., Purwanti, A., Astuti, R. S., & Lituhayu, D. (2023). Enhancing Women's Resilience in Disaster Condition in Padang City West Sumatra Province. International Journal of Social Service and Research, 3(3), 775-779.
Steve Morgan, “Cyber Crime Costs Projected To Reach $2 Trillion by 2019”, Forbes, Retrieved September 22, 2016.