Main Article Content

Arif Munandar

Abstract

Crime of fraud and embezzlement with perpetrators using fake identities in the police station Salatiga from 2016-2018 there were 413 cases. Based on this, the author makes a thesis entitled Criminological Analysis of Fraud and Darkness Crime with Actors Using False Identities through Social Media. The problem sinthi sstudyare: (1) What are the factors that cause fraud and embezzlement with perpetrators using fake identities through social media? (2) How are efforts to overcome fraud and embezzlement crimes against perpetrators using false identities through social media? This study uses a normative juridical approach and an empirical juridical approach. The results of the study and discussion show: the causes of fraud and embezzlement with the perpetrators of using false identities through social media include internal factors namely educational and trial factors and external factors namely economic factors, environmental factors, global development factors and law enforcement factors. Mitigation can be done with a pre-emptive effort, namely by providing employment. Preventive countermeasures or actions taken to prevent fraud and embezzlement by holding legal counseling, prevention, approaches, friends programs, social media and door to door systems. Repressive efforts are by imposing a punitive sentence against the perpetrators of fraud and embezzlement in accordance with Article 378 and Article 372 of the Criminal Code, namely a maximum of 4 years in prison. Suggestions in this study are: (1) The community is advised to increase alertness to anyone by not easily believing in all kinds of persuasion or forms of cooperation invitation or whatever. (2) The police are advised to be more active in educating the public.


 

Downloads

Download data is not yet available.

Article Details

How to Cite
Munandar, A. (2019). Criminological Analysis of the Crimes of Fraud and Embezzlement with Perpetrators Using False Identities Through Social Media. LEGAL BRIEF, 9(1), 31–39. Retrieved from http://legal.isha.or.id/index.php/legal/article/view/10
References
Andrisman, Tri. 2011. Certain offenses in the Criminal Code. Unila. Bandar Lampung.
Black, W. K. (2005). “Control frauds” as financial super-predators: How “pathogens” make financial markets inefficient. The Journal of Socio-Economics, 34(6), 734–755. doi:10.1016/j.socec.2005.07.026
Dellaportas, S. (2013). Conversations with inmate accountants: Motivation, opportunity and the fraud triangle. Accounting Forum, 37(1), 29–39. doi:10.1016/j.accfor.2012.09.003
Hasibuan, Ridwan. Ediwarman, 1995. Principles of Criminology, Publisher USU Press, Medan.
Holtfreter, K. (2005). Is occupational fraud “typical” white-collar crime? A comparison of individual and organizational characteristics. Journal of Criminal Justice, 33(4), 353–365. doi:10.1016/j.jcrimjus.2005.04.005
Ibrahim, S. (2016). Social and contextual taxonomy of cybercrime: Socioeconomic theory of Nigerian cybercriminals. International Journal of Law, Crime and Justice, 47, 44–57. doi:10.1016/j.ijlcj.2016.07.002
Morales, J., Gendron, Y., & Guénin-Paracini, H. (2014). The construction of the risky individual and vigilant organization: A genealogy of the fraud triangle. Accounting, Organizations and Society, 39(3), 170–194. doi:10.1016/j.aos.2014.01.006
Nature, US 2010. Introduction to Criminology. PustakaRefleksi, Makassar.
Sally S. Simpson and David Weisburd, 2009, The Criminology of White-Collar Crime, springer, Jerman
Syani, Abdul. 1987. Sociology of Crime. Remaja Jaya, Bandung
Steffensmeier, D., Harris, C. T., & Painter-Davis, N. (2015). Gender and Arrests for Larceny, Fraud, Forgery, and Embezzlement: Conventional or Occupational Property Crime Offenders? Journal of Criminal Justice, 43(3), 205–217. doi:10.1016/j.jcrimjus.2015.03.004
Willison, R. (2006). Understanding the perpetration of employee computer crime in the organisational context. Information and Organization, 16(4), 304–324. doi:10.1016/j.infoandorg.2006.08.001