DAFTAR PUSTAKA
Buku, Majalah, Paper
Naisbitt, John., 1982, Megatrends: Ten New Directions Transforming Our Lives, Grand Central Publishing, New York. Palfrey, John, Gasser, Urs, 2008, Born Digital, Basic Book, New York. Freidman, L.M., 1975, The Legal System: A Social Science Perspective, Russell Sage Foundation, New York. Widodo, 2009, Sistem Pemidanaan dalam Cyber Crime, Laksbang Mediatama, Yogyakarta. Afitrahim, 2012, Yurisdiksi dan Transfer of Proceeding Dalam Kasus Cybercrime, Tesis, Program Studi Magister Hukum, Universitas Indonesia, Jakarta. Kharisma, Triady, 2015, Implementasi Yurisdiksi Ekstrateritorial Dalam Penanggulangan Cybercrime Berdasarkan Hukum Internasional Dan Pengaturannya Di Indonesia, Tesis, Fakultas Hukum, Universitas Islam Bandung, Bandung Sugeng Istanto, Hukum Internasional: Edisi Revisi, Cahaya Atma Pustaka, Yogyakarta, hlm.66 Widodo, 2013, Memerangi Cybercrime, Aswaja Pressindo, Yogyakarta. Hacket, George T., Space Debris and the Corpus Iuris Spatialis, Forum for Air and Space Law vol. 2, 1 Januari 1994 Zemanek, Karl, “State Responsibility and Liability”, dalam W. Lang, H. Neuhold, K. Zemanek (eds.), Environmental Protection and International Law (1991), Paper, dipresentasikan pada Konferensi Vienna, Oktober 1990 Kelsen, Hans, 2014, Teori Umum Tentang Hukum dan Negara, terjemahan General Theory of Law and State (New York: Russel and Russel 1971), Nusa Media, Bandung. Suseno, Sigid, 2012, Yurisdiksi Tindak Pidana Siber, PT. Refika Aditama, Bandung.
Mertokusumo, Sudikno, 2009, Penemuan Hukum: Sebuah Pengantar, Liberty, Yogyakarta, hlm. 29-30. Hare, Forrest, 2009, Borders in Cyberspace: Can Sovereignty Adapt to the Challenges of Cyber Security?, School of Public Policy, George Mason University, Fairfax-Virginia von Heinegg, “Territorial Sovereignty and Neutrality in Cyberspace”, International Law Studies, U.S. Naval War College, volume 89, 2013 IGF, 2011. Background Note: What is Internet Governance Forum Costa, Dan, “The Real Dark Web”, PC Magazine, Februari 2015 Stryker, Sheldon, Burke, Peter J., The Past,Present,and Futureofan IdentityTheory, Social Psychology Quarterly, Vol. 63, No. 4, Special Millenium Issue on the State of Sociological Social Psychology (Dec., 2000), pp. 284-297 Sanusi, Arsyad, 2010, Efektivitas UU ITE dalam Pengaturan Perdagangan Elektronik (e-Commerce), Jurnal Hukum Bisnis, volume 29 no. 1 tahun 2010. du Rausas, et.al., 2011, Internet Matters: the Net’s Sweeping Impact on Growths, Jobs, and Prosperity, McKinsey Global Institute, New York. Kurbalija, Jovan, 2014, an Introduction to Internet Governance 6th Edition, Diplo Foundation, Swiss. ICT Watch, 2015, Pengantar Tata Kelola Internet ver. 2.0, ICT Watch, Jakarta. Harsono, Nonot, 2013, Telekomunikasi untuk Kemakmuran Bangsa, PT Pustaka Sinar Harapan, Jakarta. Hruska, Joel, “Darkode Seizure Proves the FBI Can Get Anyone”, PC Magazine, Agustus 2015. Dvorak, John C., “The Encryption Chronicle”, PC Magazine, Agustus 2015. Muhammad, Alwalid, 2014, Politik Hukum Pertanggungjawaban Pidana Terhadap Internet Service Provider dalam Cyber Crime, Tesis, Program Studi Magister Hukum Litigasi, Universitas Gadjah Mada, Yogyakarta. Arifin, Saru, 2014, Hukum Perbatasan Darat Antarnegara, Penerbit Sinar Grafika, Jakarta. Segan, Sascha, “Only Spotify for Movies Can Stop Popcorn-Like Piracy”, PC Magazine, Juni 2015.
Internet-Jurisdiction Project, 2012, Towards A Multi-Stakeholder Framework For Transnational Due Process, Internet-Jurisdiction White Paper. D.M.A., Mansur, Gultom, Elisatris, 2005, Cyber Law: Aspek Hukum Teknologi Informasi, PT Refika Aditama, Bandung Maharddhika, I.B.G.M.B., 2014, Penyimpanan Protokol Notaris Dalam Bentuk Digital Menuju Cyber Notary, Tesis, Program Studi Magister Kenotariatan, Universitas Gadjah Mada, Yogyakarta. Baskoro, Sentot, 2010, Perlindungan Hukum Atas Transaksi Jual Beli Elektronik Melalui Internet Dengan Menggunakan Metode Bayar Paypal, Tesis, Program Studi Magister Hukum Bisnis, Universitas Gadjah Mada, Yogyakarta. Nugroho, Riant, 2013, National Security Policy: Sebuah Pengantar, Pustaka Pelajar, Yogyakarta, hlm. 101 Panggabean, Christian, 2008, Penerapan The Revised Fatf 40+9 Recommendations Dalam Menanggulangi Tindak Pidana Pencucian Uang Lintas Negara Melalui Internet (Cyberlaundering) Di Perbankan Indonesa, Tesis, Program Studi Magister Hukum Bisnis, Universitas Gadjah Mada, Yogyakarta.
Dokumen Online
CES, International CES: Global Stage for Innovation, www.cesweb.org, diakses 15 April 2014 Rahmatullah, Aprizal, WNI yang Merasa Jadi Korban Scamming 177 WN Asing Diharap Melapor, http://news.detik.com/read/2011/06/10/ 120233/1657489/10/wni-yang-merasa-jadi-korban-scamming-177-wnasing-diharap-melapor?nd771104bcj, diakses 15 Desember 2014 wikipedia, Sejarah Internet, http://id.wikipedia.org/wiki/ Sejarah_Internet, diakses 30 Desember 2014 APNIC, History of the Regional Internet Registries, http://www.apnic.net/ aboutAPNIC/organization/history-of-apnic/history-of-the-regional-internetregistries, diakses 16 Desember 2014
Laneye, How network works - MAC-address and IP-address relationship, http://www.laneye.com/network/how-network-works/mac-address-andip-address-relationship.htm, diakses 28 Agustus 2015 IDNIC, Tentang IDNIC, www.idnic.net, diakses 30 Desember 2014 Mitchell, Bradley, What Is the IP Address of Google?, http://comp networking.about.com/od/traceipaddresses/f/google-ip-address.htm, diakses 16 Desember 2014 ICANN, Beginners Guide, www.icann.org , diakses 16 Desember 2014 Pandi.id, Tentang PANDI, www.pandi.or.id , diakses 16 Desember 2014 Rahman, A.F., Menkominfo Takkan Ikut Campur Kelola Alamat IP, http://inet.detik.com/read/2015/09/08/134724/3013167/328/menkominfotakkan-ikut-campur-kelola-alamat-ip, diakses 10 September 2015 CoE, Cybercrime Legislation – Country Profile Japan, http://www.coe.int/ t/dghl/cooperation/economiccrime/cybercrime/Documents/CountryProfile s/cyber_cp_Japan_2007_June.pdf, diakses 19 Agustus 2015 CoE, Cybercrime Legislation – Country Profile China http://www.coe.int/ t/dghl/cooperation/economiccrime/cybercrime/Documents/CountryProfile s/cyber_cp_China_2008_March.pdf, diakses 19 Agustus 2015 CoE, Cybercrime Legislation – Country Profile Vietnam, http://www.coe.int/ t/dghl/cooperation/economiccrime/cybercrime/Documents/CountryProfile s/cyber_cp_Vietnam_2009_September.pdf, diakses 19 Agustus 2015 CoE, Cybercrime Legislation – Country Profile United States of America, http://www.coe.int/t/dghl/cooperation/economiccrime/cybercrime/Docum ents/CountryProfiles/cyber_cp_USA_2008_March.pdf, diakses 19 Agustus 2015 Pramita, Dini, Bobol Rekening dari Dalam Bui, Beli Pin ATM Pakai Bitcoin, http://metro.tempo.co/read/news/2015/08/23/064694359/bobol-rekeningdari-dalam-bui-beli-pin-atm-pakai-bitcoin, diakses 24 Agustus 2015 Rachmatunnisa, AS Nilai Bitcoin Ancam Keamanan Nasional, http://inet.detik.com/read/2014/05/06/190236/2575209/398/as-nilaibitcoin-ancam-keamanan-nasional, diakses 24 Agustus 2015 whitehouse.gov, Net Neutrality: President Obama's Plan for a Free and Open Internet, https://www.whitehouse.gov/net-neutrality, diakses 27 Agustus 2015
Wills, Amanda, New Snowden leak: NSA program taps all you do online, http://edition.cnn.com/2013/07/31/tech/web/snowden-leak-xkeyscore/ index.html?iid=article_sidebar, diakses pada tanggal 27 Agustus 2015 O’Heir, Steve, EU Court Rules Google Must Give Individuals “Right To Be Forgotten” (Or Not To Be Found), http://techcrunch.com/2014/05/13/forget-me-not/, diakses pada tanggal 27 Agustus 2015 Fingas, John, Germany wants Google to stop sharing customer data between services, http://www.engadget.com/2014/05/12/germany-wants-googledata-policy-change/, diakses pada tanggal 27 Agustus 2015 Rumi, S.B., The OSI Model’s Seven Layers Defined and Functions Explained, http://rumyittips.com/the-osi-models-seven-layers-defined-and-functionsexplained/, diakses 6 September 2015 wikipedia, IP Address Spoofing, https://en.wikipedia.org/wiki/ IP_address_spoofing, diakses 18 Agustus 2015 wikipedia, Peladen Pewali, https://id.wikipedia.org/wiki/Peladen_pewali, diakses pada 18 Agustus 2015 wikipedia, Virtual Private Network, https://en.wikipedia.org/wiki/ Virtual_private_network, diakses 18 Agustus 2015 KreatifWebDesign.com, Registrasi Domain Murah, http://www.jakartaweb hosting.com/domainname/, diakses 18 Agustus 2015 PT Core Mediatech, Syarat & Biaya, http://iddomain.dnet.net.id/persyaratan-danbiaya/, diakses 18 Agustus 2015 ISOC,
Internet Exchange Point, http://www.internetsociety.org/what-wedo/issues/internet-exchange-points-ixps, diakses 18 Agustus 2015
Primetrica, Inc., Telegeography Internet Exchange Map, http://www.internetexchangemap.com/#/, diakses 18 Agustus 2015 IDNIC, Keanggotaan / Tarif, http://www.idnic.net/indexa814.html? option=com_content&view=article&id=50&Itemid=37&lang=en, diakses 18 Agustus 2015 IDNIC, Standar Layanan Internet Resource, http://www.idnic.net/info/APJII0007.pdf, Poin 7.1.3, diakses 18 Agustus 2015 Ishfan, 4 Perang Cyber antara Hacker Indonesia dengan Negara Lain, https://www.facebook.com/ishfanistic/posts/724465407583315, diakses 18 Agustus 2015
APNIC, APNIC Guidelines For Ipv6 Allocation And Assignment Requests, https://www.apnic.net/publications/media-library/documents/resourceguidelines/ipv6-guidelines#sparse, diakses 19 Agustus 2015 ID-SIRTII/CC, Visi dan Misi, http://www.idsirtii.or.id/halaman/tentang/visi-danmisi.html, diakses 23 September 2015 Ben Dickson, Is The U.S. And China’s Cyberwar Reaching A Detente Or A Flashpoint? http://techcrunch.com/2015/09/21/is-the-u-s-and-chinascyberwar-reaching-a-detente-or-a-flashpoint/, diakses 22 September 2015 Wahyudi, Reza, Oktober, Indonesia Punya "Blueprint" Pertahanan Cyber, http://tekno.kompas.com/read/2015/08/24/13375717/Oktober.Indonesia.P unya.Blueprint.Pertahanan.Cyber, diakses 9 September 2015
Pidato/Presentasi
Supangkat, S.H., “Next Indonesia with Broadband Economy & C Generation”, Pidato, Pengukuhan Guru Besar Sekolah Tinggi Elektronika dan Informatika ITB, Bandung, 27 Februari 2009 Chendramata, Aidil, “Yurisdiksi dalam Ruang Siber”, Presentasi, Indonesia Internet Governance Forum Dialogue, Jakarta, 20 Agustus 2014. Kurbaliza, Jovan, “How Shall Jurisdiction Immunity And Inviolability Apply In The Internet Era?”, Presentasi, Internet Jurisdiction Conference, Jenewa, 18 Juni 2015 Someya, Masayoshi, “Are Enterprises in a Losing Battle Against Targeted Attacks?”, Presentasi, RSA Conference, Singapura, 23 Juli 2015 Summers, Grady, “Nation State & Hacktivist Attacks: Targeted Hits on Asian Organizations”, Presentasi, RSA Conference, Singapura, 23 Juli 2015 Chen, Jack, “Illuminating the Deep Dark Web with drugs, exploits, and zerodays”, Presentasi, RSA Conference, Singapura, 23 Juli 2015 Genes, Raimund, “Targeted Attacks, APT’s & Cyberwar - A MKT Buzz or a Real Business Threat?”, Presentasi, RSA Conference, Singapura, 22 Juli 2015 Wayne Huang, “New Ways of Emerging Actors: India, South Africa, Nigeria, and Indonesia”, Presentasi, RSA Conference, Singapura, 23 Juli 2015
Peraturan Perundangan
Undang-Undang Dasar 1945 Perubahan ke-4 Kitab Undang-undang Hukum Pidana Undang-Undang no. 36 tahun 1999 tentang Telekomunikasi Undang-Undang no. 11 tahun 2008 tentang Informasi dan Transaksi Elektronik Undang-Undang no. 14 tahun 2008 tentang Keterbukaan Informasi Publik Peraturan Menteri Komunikasi dan Informatika no. 23 tahun 2013 tentang Pengelolaan Nama Domain Peraturan Menteri Komunikasi dan Informatika no. 13 tahun 2014 tentang Kebijakan Roadmap Penerapan IPv6 di Indonesia Peraturan Menteri Komunikasi dan Informatika no. 16/2010 tentang Pengamanan Pemanfaatan Jaringan Telekomunikasi Berbasis Protokol Internet Konvensi Montevideo 1933 Convention on Cyber Crime, Hungaria, 2001 Resolusi 56/83 Majelis Umum PBB