Legal Accountability and Policy Gaps in Social Engineering-Based Phishing Cybercrimes

Authors

  • Purwadi Universitas Islam Nusantara Bandung, Indonesia
  • Mukhamad Makhfud Universitas Islam Nusantara Bandung, Indonesia
  • Ahmad Jamaludin Universitas Islam Nusantara Bandung, Indonesia

DOI:

https://doi.org/10.54518/rh.5.3.2025.580

Keywords:

Civil Law, Cybercrime, Illegal Access, Phishing, Social Engineering-Based

Abstract

Social engineering-based phishing is increasingly rampant in Indonesia, exploiting victims' psychological weaknesses to access illegal and spread false information. The main legal problem is the imperfection of regulations, such as the ITE Law and the Criminal Code, which do not accommodate the psychological manipulation aspect of this crime. This study aims to identify regulatory gaps related to the legal responsibility of phishing perpetrators and the effectiveness of regulations in dealing with this crime. The method used is normative juridical, with analysis of laws and regulations, literature studies, and reviews of court decisions. The findings show that the ITE Law focuses more on technical-based crimes, while the psychological aspect of phishing has not been explicitly regulated. failed to prove the perpetrator's intent (dolus) is an obstacle to law enforcement. The implication of this study is the need to revise the ITE Law to expand the scope of "illegal access" and integration with the Personal Data Protection Law (PDP Law). This reform is expected to improve legal protection for victims and strengthen the effectiveness of law enforcement against cybercriminals.

Downloads

Download data is not yet available.

References

Ali, Z. (2021). Metode penelitian hukum. Jakarta: Sinar Grafika.

Almeyda, I. T., & Prasetyawati, E. (2024). Consumer protection for the hacking of personal data of tokopedia marketplace users. Journal Evidence of Law, 3(2), 206-219.

Ambore, S., Richardson, C., Dogan, H., Apeh, E., & Osselton, D. (2017). A resilient cybersecurity framework for Mobile Financial Services (MFS). Journal of Cyber Security Technology, 1(3-4), 202-224.

Anggraini, S., Ohowaitun, Y. T., & Azizah, A. (2024). Criminal responsibility in documents forgery of applying credit card. Rechtenstudent, 5(1), 68-81.

Aziz, F., Mayasari, N., Sabhan, S., Zulkifli, Z., & Yasin, M. F. (2022). The future of human rights in the digital age: indonesian perspectives and challenges. Journal of Digital Law and Policy, 2(1), 29-40.

Azzani, I. K., Purwantoro, S. A., & Almubarok, H. Z. (2024). Enhancing awareness of cyber-crime: A crucial element in confronting the challenges of hybrid warfare in Indonesia. Defense and Security Studies, 5(1), 1-9.

Buçaj, E., & Idrizaj, K. (2025). The need for cybercrime regulation on a global scale by the international law and cyber convention. Multidisciplinary Reviews, 8(1), 2025024-2025024.

Chuasanga, A., & Victoria, O. A. (2019). Legal principles under criminal law in Indonesia Dan Thailand. Jurnal Daulat Hukum, 2(1), 131-138.

Deora, R. S., & Chudasama, D. (2021). Brief study of cybercrime on an internet. Journal of communication engineering & Systems, 11(1), 1-6.

Dharani, L. I. C., Idayanti, S., & Rahayu, K. (2024). Perlindungan Hukum terhadap Tindakan Phishing di Media Sosial. Pekalongan: Penerbit NEM.

Ersa, L. F., Aningsih, G., Hidayat, T., & Sonni, A. F. (2024). Analisis jaringan komunikasi penipuan online melalui media sosial WhatsApp Messenger. Jurnal Netnografi Komunikasi, 2(2), 73-90.

Haripin, M. (2022). Intelijen dan keamanan nasional di Indonesia pasca-Orde Baru. Jakarta: Yayasan Pustaka Obor Indonesia.

Huda, M. (2020). Keamanan Informasi. Jakarta: Nulisbuku.

Husni, L., Cahyowati, R. R., & Umam, K. (2023). Job loss social security (JKP) under Government Regulation No. 37 of 2021 as a form of protection for laid-off workers: A normative analysis. Research Horizon, 3(6), 628-637.

Kamisma, I. K. K., Sarson, M. T. Z., & Harun, A. A. (2022). The increased business of edged weapon without authorizations via social media in Gorontalo Province. Estudiante Law Journal, 4(2), 106-119.

Kusuma, C. S. D., & Muslikhah, R. I. (2022). Strengthening of digital literacy to support student community service to prevent hoax and cybercrime. Atlantis Press.

Laksana, A. W. (2018). Cybercrime comparison under criminal law in some countries. Jurnal Pembaharuan Hukum, 5(2), 217-226.

Maskanah, U., Guspita, A. R., & Putri, C. D. S. (2024). Analisis efektivitas regulasi lelang elektronik di indonesia dalam menjamin transparansi dan keamanan transaksi digital. Innovative: Journal of Social Science Research, 4(6), 8111-8125.

Poe, T., & Chattopadhyay, A. (2024). Effecting mobile security awareness and interest in cybersecurity using the CovertEyeOp mobile app driven user hack-based learning approach. Education and Information Technologies, 29(10), 12527-12568.

Pramana, J. D., Ardinata, M., Dasan, A., & Jayanuarto, R. (2024). Law enforcement of criminal acts of dissemination of population document data by dinas dukcapil Kab. Mukomuko (Study of Mukomuko District Police Legal Area. Jurnal Hukum Sehasen, 10(1), 329-338.

Putra, T. W., Abdurrachman, H., & Hamzani, A. I. (2023). Pertanggungjawaban Pidana terhadap Kejahatan Hacking. Pekalongan: Penerbit NEM.

Razack, A. K. A., & Saad, M. F. M. (2024). Enhancing cybersecurity awareness through gamification: design an interactive cybersecurity learning platform for multimedia university students. Journal of Informatics and Web Engineering, 3(3), 21-40.

Rosidaha, Z. N., & Karjokob, L. (2025). Enhancing consumer protection in electronic transactions in Indonesia. Sriwijaya Law Review, 8(2), 194-207.

Rusydi, M. T. (2025). Perbandingan hukum siber Indonesia dengan negara ASEAN: Suatu Kajian Normatif. Jurnal Kolaboratif Sains, 8(1), 40-48.

Simarmata, J., Iqbal, M., Hasibuan, M. S., Limbong, T., Albra, W., & Rikki, A. (2019). Hoaks dan Media Sosial: Saring Sebelum Sharing. Medan: Yayasan Kita Menulis.

Swarianata, V., Puluhulawa, J., Apripari, A., Kaku, R., & Puluhulawa, I. (2023). The legality of brushing practices in the viewpoint of consumer protection law and telematics law. Jambura Law Review, 5(2), 356-385.

Syahilla, V., & Widowaty, Y. (2023). Criminal Conflict Analysis: Factors causing criminal acts in TIPIKOR and TPPUU Cases (Decision Number 06/Pid. Sus-TPK/2022/PN. Bjm). Justisi, 9(3), 427-437.

Taherdoost, H. (2024). Insights into cybercrime detection and response: A review of time factor. Information, 15(5), 273.

Widijowati, D. (2022). Legal Complexity in Dealing with Cyber Crime in Indonesia. Research Horizon, 2(6), 597-606.

Downloads

Published

2025-06-30

How to Cite

Purwadi, Makhfud, M. ., & Jamaludin, A. . (2025). Legal Accountability and Policy Gaps in Social Engineering-Based Phishing Cybercrimes. Research Horizon, 5(3), 797–806. https://doi.org/10.54518/rh.5.3.2025.580

Similar Articles

<< < 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 > >> 

You may also start an advanced similarity search for this article.