Defining Legal Contours of Digital Identity Theft
Abstract
The proliferation of digital technology has challenged the traditional understanding of identity and subsequently brings forth its own unique legal implications. Identity theft as a crime that has existed even before this development has also brought its own unique legal implications, particularly in the realm of criminal law. Using normative legal research method, this research aims to establish the boundaries around digital identity theft, to distinguish it from the traditional identity theft, to provide a more relevant and robust understanding of its criminality within the digital age. Results of this study highlight the gaps in Indonesia's current legal framework, emphasizing the need for a revised approach that distinctly addresses the complexities of digital identity theft. The research proposes a model of normative development aimed at refining legal definitions and enhancing enforcement mechanisms to better combat this modern crime. This model seeks to provide a more relevant and robust legal framework, ensuring that the legal system is responsive and adaptive to the challenges posed by digital advancements.
Keywords
Full Text:
PDFReferences
Journal Article:
Admiral, Admiral, and Mega Ardina Pauck. “Unveiling the Dark Side of Fintech: Challenges and Breaches in Protecting User Data in Indonesia’s Online Loan Service.” Lex Scientia Law Review 7, no. 2 (2023): 995–1048. https://doi.org/10.15294/lesrev.v7i2.77881.
Alagna, Vincent. “A Comparative Analysis of Identity Theft within America and Australia.” Criminal Justice Spring 5 (2020): 1–21, https://scholarsarchive.library.albany.edu/honorscollege_cj/24/.
Alhelaly, Yasser, Gurpreet Dhillon, and Tiago Oliveira. “When Expectation Fails and Motivation Prevails: The Mediating Role of Awareness in Bridging the Expectancy-Capability Gap in Mobile Identity Protection.” Computers & Security 134 (2023): 1–20. https://doi.org/https://doi.org/10.1016/j.cose.2023.103470.
Amoo, Olukunle Oladipupo, Akoh Atadoga, Temitayo Oluwaseun Abrahams, Oluwatoyin Ajoke Farayola, Femi Osasona, and Benjamin Samson Ayinla. “The Legal Landscape of Cybercrime: A Review of Contemporary Issues in the Criminal Justice System.” World Journal of Advanced Research and Reviews 21, no. 2 (2024): 205–17. https://doi.org/10.30574/wjarr.2024.21.2.0438.
Bahadur, Kunwar Surendra. “A Brief Study On Negative Effects of Social Media On Youth.” Bayan College International Journal of Multidisciplinary Research 1, no. 2 (2021): 1–17, https://bayancollegeijmr.com/index.php/ijmr/article/view/42.
Boos, Eric S, Chandler Givens, and Nick Larry. “Damages Theories in Data Breach Litigation.” Sedona Conference Journal 16 (2015): 125–50. https://doi.org/10.2139/ssrn.2516941.
Cassim, Fawzia. “Protecting Personal Information in the Era of Identity Theft: Just How Safe Is Our Personal Information from Identity Thieves?” Potchefstroom Electronic Law Journal 18, no. 2 (2015): 69–110. https://doi.org/10.4314/pelj.v18i2.02.
Christine, Bella, and Christine S.T. Kansil. “Hambatan Penerapan Perlindungan Data Pribadi Di Indonesia Setelah Disahkannya Undang-Undang Nomor 27 Tahun 2022 Tentang Perlindungan Data Pribadi.” Syntax Literate: Jurnal Ilmiah Indonesia 7, no. 9 (2023): 16331–39. https://doi.org/10.36418/syntax-literate.v7i9.13936.
Cross, Cassandra, and Rebecca Layt. “‘I Suspect That the Pictures Are Stolen’: Romance Fraud, Identity Crime, and Responding to Suspicions of Inauthentic Identities.” Social Science Computer Review 40, no. 4 (2022): 955–73. https://doi.org/10.1177/0894439321999311.
Disanto, Philip F. “Blurred Lines of Identity Crimes: Intersection of the First Amendment and Federal Identity Fraud.” Columbia Law Review 115, no. 4 (2015): 941–82, https://columbialawreview.org/content/blurred-lines-of-identity-crimes-intersection-of-the-first-amendment-and-federal-identity-fraud-2/.
Disemadi, Hari Sutra. “Lenses of Legal Research: A Descriptive Essay on Legal Research Methodologies.” Journal of Judicial Review 24, no. 2 (2022): 289–304. https://doi.org/10.37253/jjr.v24i2.7280.
Friedman, AR, and LD Wagoner. “The Need for Digital Identity in Cyberspace Operations.” Journal of Information Warfare (JIW) 13, no. 2 (2014): 42–52, https://www.jstor.org/stable/26487493.
Giannopoulou, Alexandra. “Digital Identity Infrastructures: A Critical Approach of Self-Sovereign Identity.” Digital Society 2, no. 2 (2023): 18–37. https://doi.org/10.1007/s44206-023-00049-z.
Goh, Samuel H., Paul M. Di Gangi, Julio C. Rivera, and James L. Worrell. “Graduate Student Perceptions of Personal Social Media Risk: A Comparison Study.” Issues In Information Systems 17, no. IV (2016): 109–19. https://doi.org/10.48009/4_iis_2016_109-119.
Grindstaff, R. Andrew. “Article III Standing, the Sword and the Shield: Resolving a Circuit Split in Favor of Data Breach Plaintiffs.” William & Mary Bill of Rights Journal 29, no. 3 (2021): 851–82, https://scholarship.law.wm.edu/wmborj/vol29/iss3/9/.
Hayati, Nyoman Nidia Sari, Sri Warjiyati, and Muwahid. “Analisis Yuridis Konsep Omnibus Law Dalam Harmonisasi Peraturan Perundang-Undangan Di Indonesia.” Jurnal Hukum Samudra Keadilan 16, no. 1 (June 2021): 1–18. https://doi.org/10.33059/jhsk.v16i1.2631.
Judijanto, Loso, Bhaswarendra Guntur Hendratri, Sabil Mokodenseho, Tania Prinita Aulia Mamonto, and Annisa Mokoginta. “Analysis of the Influence of Social Media Use, Educational Technology, and Digital Identity on Educational Culture Change in West Java.” West Science Social and Humanities Studies 2, no. 3 (March 2024): 373–82. https://doi.org/10.58812/wsshs.v2i03.703.
Li, Yuan, Adel Yazdanmehr, Jingguo Wang, and H Raghav Rao. “Responding to Identity Theft: A Victimization Perspective.” Decision Support Systems 121 (2019): 13–24. https://doi.org/https://doi.org/10.1016/j.dss.2019.04.002.
Lupton, Deborah. “The Internet of Things: Social Dimensions.” Sociology Compass 14, no. 4 (2020): 1–13. https://doi.org/10.1111/soc4.12770.
Mudzalifah, Milla, and Pujiyono Pujiyono. “The Politics of Criminal Law in Cybercrime: An Efforts to Combat Information Technology Crimes in Indonesia.” Jurnal Pembaharuan Hukum 10, no. 1 (2023): 77-89. http://dx.doi.org/10.26532/jph.v10i1.26707.
New, Kuwihoi, and ZianXiang Kong. “Exploring Teenage Awareness of Social Media Fraud in Malaysia.” International Journal of Academic Research in Business and Social Sciences 13, no. 12 (2023): 463–500. https://doi.org/10.6007/ijarbss/v13-i12/19859.
Parate, Sachin, Hari Prasad Josyula, and Latha Thamma Reddi. “Digital Identity Verification: Transforming KYC Processes in Banking Through Advanced Technology and Enhanced Security Measures.” International Research Journal of Modernization in Engineering Technology and Science 5, no. 9 (2023): 128–37. https://doi.org/10.56726/irjmets44476.
Pose, Zelina. “Identity Verification: Ensuring Trust and Security in a Digital World.” Journal of Biometrics & Biostatistics 14, no. 3 (2023): 1–2, https://www.hilarispublisher.com/open-access/identity-verification-ensuring-trust-and-security-in-a-digital-world-100129.html.
Rasyid, Muh. Fadli Faisal, Muh. Akhdharisa SJ, Karlin Z. Mamu, Saptaning Ruju Paminto, Wahab Aznul Hidaya, and Abdennour Hamadi. “Cybercrime Threats and Responsibilities: The Utilization of Artificial Intelligence in Online Crime.” Jurnal Ilmiah Mizani: Wacana Hukum, Ekonomi Dan Keagamaan 11, no. 1 (April 2024): 49–63, http://dx.doi.org/10.29300/mzn.v11i1.3318.
Ruziev Rustam, Ruziev, Abduvaliev Bokhadir, and Rakhmatov Uktam. “An Overcoming the Privacy Paradox: Legal Aspects of Data Protection in the Digital Age.” International Journal of Cyber Law 1, no. 4 (June 2023): 1–22. https://doi.org/10.59022/ijcl.47.
Sarfi, Majid, Morteza Darvishii, and Mostafa Zohouri. “Why People May View Online Crimes as Less Criminal: Exploring the Perception of Cybercrime.” International E-Journal of Criminal Sciences, no. 18 (2023): 1–17. https://doi.org/10.1387/inecs.25097.
Sarkar, Gargi, and Sandeep K Shukla. “Behavioral Analysis of Cybercrime: Paving the Way for Effective Policing Strategies.” Journal of Economic Criminology 2 (2023): 1–26. https://doi.org/https://doi.org/10.1016/j.jeconc.2023.100034.
Savelyev, Alexander. “The Inadequacy of Current Remedies for Violation of Data Subjects’ Rights and How to Fix It.” Legal Issues in the Digital Age 2, no. 2 (2020): 24–62. https://doi.org/10.17323/2713-2749.2020.2.24.62.
Sedlmeir, Johannes, Reilly Smethurst, Alexander Rieger, and Gilbert Fridgen. “Digital Identities and Verifiable Credentials.” Business & Information Systems Engineering 63, no. 5 (2021): 603–13. https://doi.org/10.1007/s12599-021-00722-y.
Sembiring, Patricia Edina, Ahmad M. Ramli, and Laina Rafianti. “Implementasi Desain Privasi Sebagai Pelindungan Privasi Atas Data Biometrik.” Veritas et Justitia 10, no. 1 (June 29, 2024): 127–52. https://doi.org/10.25123/vej.v10i1.7622.
Siregar, Gomgom, and Sarman Sinaga. “The law globalization in cybercrime prevention.” International Journal of Law Reconstruction 5, no. 2 (2021): 211-227. http://dx.doi.org/10.26532/ijlr.v5i2.17514.
Solove, Daniel J. “The Myth of the Privacy Paradox.” George Washington Law Review 89, no. 1 (2021): 1–51. https://doi.org/10.2139/ssrn.3536265.
Tan, David. “Metode Penelitian Hukum: Mengupas Dan Mengulas Metodologi Dalam Menyelenggarakan Penelitian Hukum.” NUSANTARA: Jurnal Ilmu Pengetahuan Sosial 8, no. 5 (2021): 1332–36. http://jurnal.um-tapsel.ac.id/index.php/nusantara/article/view/5601.
Vilic, Vida. “Users’ Considerations About Possibilities of Self-Protection on Social Networks.” Open Journal for Legal Studies 1, no. 1 (2018): 9–24. https://doi.org/10.32591/coas.ojls.0101.02009v.
Wang, Fennie, and Primavera De Filippi. “Self-Sovereign Identity in a Globalized World: Credentials-Based Identity Systems as a Driver for Economic Inclusion.” Frontiers in Blockchain 2 (2019): 1–22. https://doi.org/10.3389/fbloc.2019.00028.
Wang, Yanshu. “Realistic Dilemma and Path Optimization of Online Personal Information Protection.” Lecture Notes in Education Psychology and Public Media 39, no. 1 (2024): 187–92. https://doi.org/10.54254/2753-7048/39/20240728.
Wu, Hong, and Wenxiang Zhang. “Digital Identity, Privacy Security, and Their Legal Safeguards in the Metaverse.” Security and Safety 2 (2023): 1–14. https://doi.org/10.1051/sands/2023011.
Wyre, Megan, David Lacey, and Kathy Allan. “The Identity Theft Response System.” Trends and Issues in Crime and Criminal Justice, no. 592 (2020): 1–18. https://doi.org/10.52922/ti04299.
Book:
Franks, Christie, and Russell Smith. Identity Crime and Misuse in Australia 2019. Australian Institute of Criminology. Canberra: Australian Institute of Criminology, 2020. https://doi.org/10.52922/sr04749.
Smith, Russell, and Penny Jorna. Identity Crime and Misuse in Australia: Results of the 2016 Online Survey. Australian Institute of Criminology. Canberra: Australian Institute of Criminology, 2018. https://doi.org/10.52922/sr228798.
Conference Proceeding:
Helser, Susan. “FIT: Identity Theft Education: Study of Text-Based versus Game-Based Learning.” In International Symposium on Technology and Society, Proceedings, 2016-March:1–4, 2016. https://doi.org/10.1109/ISTAS.2015.7439437.
Jibril, Abdul Bashiru, Michael Adu Kwarteng, Fortune Nwaiwu, Christina Appiah-Nimo, Michal Pilik, and Miloslava Chovancova. “Online Identity Theft on Consumer Purchase Intention: A Mediating Role of Online Security and Privacy Concern.” In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 12067 LNCS, 2020. https://doi.org/10.1007/978-3-030-45002-1_13.
Soemarwi, Vera W. S., and W. Susanto. “Digital Technology Information in Indonesia: Data Privacy Protection Is a Fundamental Right.” In Proceedings of the International Conference on Economics, Business, Social, and Humanities (ICEBSH 2021), 570:561–66, 2021. https://doi.org/10.2991/assehr.k.210805.088.
Web Page:
Sando, Suzanne. “2024 Identity Fraud Study: Resolving the Shattered Identity Crisis.” Javelin, April 10, 2024. https://www.javelinstrategy.com/research/2024-identity-fraud-study-resolving-shattered-identity-crisis.
DOI: http://dx.doi.org/10.30659/akta.v11i3.38263
Refbacks
- There are currently no refbacks.
Copyright (c) 2024 JURNAL AKTA
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Jurnal Akta has been indexed by:
Editorial Office: Jurnal Akta Room 2nd Floor Imam As Syafei Building Faculty of Law Universitas Islam Sultan Agung. Jln. Kaligawe KM. 4, Semarang City, Central Java, Indonesia. Phone +62 24 6583584 Fax +62 24 6582455
Email: jurnalakta@unissula.ac.id