Legal Protection Of Cybercrime Crimes From Ransomware Attacks And Evaluation Of The Cyber Security And Resilience Bill 2025 In Indonesia'S Defense
Abstract
Keywords
Full Text:
PDFReferences
A Yassa, H., N Zakaria, R., & Z Abdellah, N. (2023). COVID-19 Pandemic Fuels Rise in Cybercrime. Journal of Information Security and Cybercrimes Research, 6(1), 01–10. https://doi.org/10.26735/kuxw6317
Achuthan, K., Khobragade, S., & Kowalski, R. (2025). Cybercrime through the public lens: a longitudinal analysis. Humanities and Social Sciences Communications, 1–16. https://doi.org/10.1057/s41599-025-04459-x
Afraji, D. M. A. A., Lloret, J., & Peñalver, L. (2025). Deep learning-driven defense strategies for mitigating DDoS attacks in cloud computing environments. Cyber Security and Applications, 3(September 2024), 100085. https://doi.org/10.1016/j.csa.2025.100085
Alzakari, S. A., Aljebreen, M., Ahmad, N., Alhashmi, A. A., Alahmari, S., Alrusaini, O., Al-Sharafi, A. M., & Almukadi, W. S. (2025). An intelligent ransomware based cyberthreat detection model using multi head attention-based recurrent neural networks with optimization algorithm in IoT environment. Scientific Reports, 15(1), 1–21. https://doi.org/10.1038/s41598-025-92711-4
Arroyabe, M. F., Arranz, C. F. A., De Arroyabe, I. F., & de Arroyabe, J. C. F. (2024). Revealing the realities of cybercrime in small and medium enterprises: Understanding fear and taxonomic perspectives. Computers and Security, 141(February), 103826. https://doi.org/10.1016/j.cose.2024.103826
Bhunia, S., Blackert, M., Deal, H., DePero, A., & Patra, A. (2025). Analyzing the 2021 Kaseya Ransomware Attack: Combined Spearphishing Through SonicWall SSLVPN Vulnerability. IET Information Security, 2025(1). https://doi.org/10.1049/ise2/1655307
Botchkovar, E., Cui, K., Antonaccio, O., Perkins, R., & Maimon, D. (2025). Technology in Society The organized activities of ransomware groups : A social network approach. Technology in Society, 82(February), 102873. https://doi.org/10.1016/j.techsoc.2025.102873
Chimmanee, K., & Jantavongso, S. (2024). Digital forensic of Maze ransomware: A case of electricity distributor enterprise in ASEAN. Expert Systems with Applications, 249(PB), 123652. https://doi.org/10.1016/j.eswa.2024.123652
Dib, O., Nan, Z., & Liu, J. (2024). Machine learning-based ransomware classification of Bitcoin transactions. Journal of King Saud University - Computer and Information Sciences, 36(1), 101925. https://doi.org/10.1016/j.jksuci.2024.101925
Djenna, A., Belaoued, M., Lifa, N., & Moualdi, D. E. (2024). PARCA: Proactive Anti-Ransomware Cybersecurity Approach. Procedia Computer Science, 238, 821–826. https://doi.org/10.1016/j.procs.2024.06.098
Ferretti, G. (2025). A World Shaped by Computer Technologies: For a Hermeneutic Analysis of Computer Protocols. Digital Studies/ Le Champ Numerique, 15(1), 1–22. https://doi.org/10.16995/dscn.11066
Gaber, M., Ahmed, M., & Janicke, H. (2024). Zero Day Ransomware Detection with Pulse: Function Classification with Transformer Models and Assembly Language. Computers & Security, 148(August 2024), 104167. https://doi.org/10.1016/j.cose.2024.104167
Grimberg, F., Asprion, P. M., Schneider, B., Miho, E., Babrak, L., & Habbabeh, A. (2021). The Real-World Data Challenges Radar: A Review on the Challenges and Risks regarding the Use of Real-World Data. Digital Biomarkers, 5(2), 148–157. https://doi.org/10.1159/000516178
Gruber, J., Voigt, L. L., Benenson, Z., & Freiling, F. C. (2022). Foundations of cybercriminalistics: From general process models to case-specific concretizations in cybercrime investigations. Forensic Science International: Digital Investigation, 43, 301438. https://doi.org/10.1016/j.fsidi.2022.301438
Hossain, M. A., Hasan, T., Ahmed, F., Cheragee, S. H., Kanchan, M. H., & Haque, M. A. (2025). Towards superior android ransomware detection: An ensemble machine learning perspective. Cyber Security and Applications, 3(July 2024), 100076. https://doi.org/10.1016/j.csa.2024.100076
Hussain, A., Saadia, A., Alhussein, M., Gul, A., & Aurangzeb, K. (2024). Enhancing ransomware defense: deep learning-based detection and family-wise classification of evolving threats. PeerJ Computer Science, 10, 1–44. https://doi.org/10.7717/peerj-cs.2546
Kim, K., Lee, S., Ramachandran, S., & Alzahrani, I. (2025). Cryptocurrency-driven ransomware syndicates operating on the darknet : A focused examination of the Arab world. Egyptian Informatics Journal, 30(January), 100665. https://doi.org/10.1016/j.eij.2025.100665
Kwon, D., Borrion, H., & Wortley, R. (2024). Measuring Cybercrime in Calls for Police Service. Asian Journal of Criminology, 19(3), 329–351. https://doi.org/10.1007/s11417-024-09432-2.
Law No. 3 of 2002 on State Defense.
Law Number 27 of 2022 on the Protection of Personal Data (UU PDP), and Law No. 3 of 2002 on State Defense.
Law Number: 1 Year 2024 on the Second Amendment to Law Number: 11 Year 2008 on Electronic Information and Transactions.
Luuk, B., (Maria) Susanne, V. H. de G., Ellen, M. ter H., Ynze, V. H., Remco, S., & Eric Rutger, L. (2023). Protecting your business against ransomware attacks? Explaining the motivations of entrepreneurs to take future protective measures against cybercrimes using an extended protection motivation theory model. Computers and Security, 127, 103099. https://doi.org/10.1016/j.cose.2023.103099
Makhortykh, M., Sydorova, M., Baghumyan, A., Vziatysheva, V., & Kuznetsova, E. (2024). Stochastic lies: How LLM-powered chatbots deal with Russian disinformation about the war in Ukraine. Harvard Kennedy School Misinformation Review, 5(4), 1–21. https://doi.org/10.37016/mr-2020-154
Mughni, S., & Prayetno, B. E. (2023). Cakrawala : Jurnal Pengabdian Masyarakat Global Mengetahui Aturan Hukum dengan Menghafal Naskah Pembukaan UUD 1945 dan Pasal- Pasal UUD 1945 Secara Tekstual dan Mengetahui Makna yang Tekandung di Dalamnya Bagi Siswa-Siswi IPA-IPS SMA Negeri 7 Takengon Kno. Cakrawala: Jurnal Pengabdian Masyarakat Global, 2(4). https://doi.org/https://doi.org/10.30640/cakrawala.v2i4.1758
Oh, D. Bin, Kim, D., & Kim, H. K. (2024). volGPT: Evaluation on triaging ransomware process in memory forensics with Large Language Model. Forensic Science International: Digital Investigation, 49(S), 301756. https://doi.org/10.1016/j.fsidi.2024.301756
Onwuadiamu, G. (2025a). Cybercrime in criminology; A systematic review of criminological theories, methods, and concepts. Journal of Economic Criminology, 8(February), 100136. https://doi.org/10.1016/j.jeconc.2025.100136
Onwuadiamu, G. (2025b). Cybercrime in criminology; A systematic review of criminological theories, methods, and concepts. Journal of Economic Criminology, 8(December 2024), 100136. https://doi.org/10.1016/j.jeconc.2025.100136
Rahmath Nisha, S., & Muthurajkumar, S. (2023). Semantic Graph Based Convolutional Neural Network for Spam e-mail Classification in Cybercrime Applications. International Journal of Computers, Communications and Control, 18(1), 1–12. https://doi.org/10.15837/ijccc.2023.1.4478
Soekanto, S. (2019). Penelitian Hukum Normatif. Hukum, 1(1), 4.
Sudjito, B., Majid, A., Sulistio, F., & Ruslijanto, P. A. (2016). Tindak Pidana Pornografi dalam Era Siber di Indonesia. Wacana, Jurnal Sosial Dan Humaniora, 19(02), 66–72. https://doi.org/10.21776/ub.wacana.2016.019.02.1
Sulubara, S. M. (2021). Pemahaman Constitusional System of Indonesia (UUD) 1945 Understanding. Sejahtera: Jurnal Inspirasi Mengabdi Untuk Negeri, 48(2), 39–62. https://doi.org/https://doi.org/10.58192/sejahtera.v3i3.2356
Sulubara, S. M. (2023). Gen Z Wajib Tau! Edukasi dan Penguatan Pasal-Pasal UUD 1945 bagi Generasi Z (Pasca Milenal) bagi Siswa-Siswi SMA Negeri 4 Takengon. Karunia: Jurnal Hasil Pengabdian Masyarakat Indonesia, 01(4), 1–23. https://doi.org/https://doi.org/10.58192/karunia.v2i4.1552
Sulubara, S. M. (2024a). Menyajikan Berbagai Insiden Cybercrime yang Terjadi di Indonesia , Termasuk Pencurian Data dan Peretasan Situs Web Pemerintah. Konsensus: Jurnal Ilmu Politik Dan Komunikasi, 1(6), 199–206. https://doi.org/https://doi.org/10.62383/konsensus.v1i6.692
Sulubara, S. M. (2024b). Perlindungan Data Pribadi dalam Kasus Ransomware : Apa Kata Hukum ? Eksekusi: Jurnal Ilmu Hukum Dan Administrasi Negara, 2(4), 426–434. https://doi.org/DOI: https://doi.org/10.55606/eksekusi.v2i4.1823
Sumarna, D., & Kadriah, A. (2023). Penelitian Kualitatif Terhadap Hukum Empiris. Jurnal Penelitian Serambi Hukum, 16(02), 101–113. https://doi.org/10.59582/sh.v16i02.730
Tariq, U. (2024). Combatting ransomware in ZephyrOS-activated industrial IoT environments. Heliyon, 10(9), e29917. https://doi.org/10.1016/j.heliyon.2024.e29917
Tubaishat, A., & Alaleeli, H. (2024). A Framework to Prevent Cybercrime in the UAE. Procedia Computer Science, 238, 558–565. https://doi.org/10.1016/j.procs.2024.06.060
Unson, I., & Zhuang, J. (2025). Resource allocation in multi-layer, continuous defense, security games versus strategic attackers. Risk Sciences, 1(December 2024), 100010. https://doi.org/10.1016/j.risk.2024.100010
Wissink, I. B., Standaert, J. C. A., Stams, G. J. J. M., Asscher, J. J., & Assink, M. (2023). Risk factors for juvenile cybercrime: A meta-analytic review. Aggression and Violent Behavior, 70(March), 101836. https://doi.org/10.1016/j.avb.2023.101836
Wright, D., & Kumar, R. (2023). Assessing the socio-economic impacts of cybercrime. Societal Impacts, 1(1–2), 100013. https://doi.org/10.1016/j.socimp.2023.100013
Zainuddin, M., & Karina, A. D. (2023). Penggunaan Metode Yuridis Normatif dalam Membuktikan Kebenaran pada Penelitian Hukum. Smart Law Journal, 2(2), 114–123. https://journal.unkaha.com/index.php/slj/article/view/26
DOI: https://doi.org/10.30596/dll.v10i2.25786
Refbacks
- There are currently no refbacks.
Address:
Faculty of Law, University of Muhammadiyah Sumatera Utara Jl. Kapten Mukhtar Basri No. 3 Medan, Kode Pos 20238
E-mail: delegalata@umsu.ac.id
Telp/HP/WA : 081262102097
DE LEGA LATA: Jurnal Ilmu Hukum is abstracting & indexing in the following databases:
De Lega Lata: Jurnal Ilmu Hukum is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Statcounter



