You are on page 1of 4

E-Journal of Informatics

Engineering Volume.8, No.1, August (2016) ISSN :

“Animation is the process of recording and playing back a


sequence of stills to achieve the illusion of continuous
motion” (Ibiz Fernandez McGraw-Hill/Osborn, California,
2002).
Which means: "Animation is a process of recording and
playing back a series of static images to achieve an
illusion of movement." Based on the literal meaning,
Animation is animating. That is the effort to move
something that can not move itself.
Broadly speaking, computer animation is divided into two
categories, namely:
a. Computer Assisted Animation, animation in this
category usually refers to a 2-dimensional animation
system, which computerizes the traditional animation
process that uses hand drawings. Computers are used for
coloring, applying virtual cameras and structuring data
used in an animation.
b. Computer Generated Animation, in this category
is usually used for 3D animation with 3D programs
[3]
such as 3D Studio Max, Maya, Autocad, Blender etc.
C. Cyber crime
Cyber crimeis a cyber crime
cybercrime) is a term that refers to criminal activity with a
computer or computer network being a tool, target or
place of crime. Included in cybercrimes include online
auction fraud, check fraud, credit
card/carding fraud, confidence fraud, identity fraud, child
pornography, etc.
The acceleration of technology is increasingly supra
which is the material cause of continuous change in all
interactions and activities of the information society. The
Internet is a material symbol for the embryo of a global
society. The internet makes the world globe, as if it is only
as wide as a moringa leaf. The information age is
characterized by very high information accessibility. In
this era, information is the main commodity that is traded
so that various networks and information companies will
appear that will trade various network facilities and
various information databases about various things that
can be accessed by users and customers. In fact, in the
case of cybercrime, there is no legal vacuum. This
happens when an interpretation method that is known in
the science of law is used and this is what law
enforcement officials should hold in dealing with new
dimensions of actions that have not been specifically
regulated in law. In some literature, cybercrime is often
identified as a computer crime.
Definition of Cybercrime According to Some Experts:
Andi Hamzah in his book "Aspects
Criminal in Field Computer"
(1989) interpret cybercrimeas
Crime in the field of computers in general can be
interpreted as illegal use of computers.
Forester and Morrison define
computer crime as: a criminal act in which the computer
is used as the primary weapon.
Girasa (2002) defines cybercrime as a crime that uses
computer technology as the main component.
Tavani (2000) provides a more interesting definition of
cybercrime, namely: crimes where criminal acts can only
be carried out using cyber technology and occur in the
cyber world.

D. Constitution of electronic information and transaction

Information Law and Electronic Transactions are


provisions that apply to everyone who carries out legal
actions as stipulated in this Law, both within the jurisdiction
of Indonesia and outside the jurisdiction of Indonesia, which
have legal consequences in the jurisdiction of Indonesia and/
or outside the jurisdiction of Indonesia and detrimental to the
interests of Indonesia

In general, the contents of the Electronic Information and


Transaction Law (UUITE) are divided into two major parts,
namely regulations regarding information and electronic
transactions and regulations concerning prohibited acts.
Arrangements regarding information and electronic
transactions refer to several international instruments, such as
the UNCITRAL Model Law on eCommerce and the
UNCITRAL Model Law on eSignature. This section is
intended to accommodate the needs of business people on the
internet and the general public in order to obtain legal
certainty in conducting electronic
transactions. Some of the materials regulated include: 1.
recognition of electronic information/documents as valid
legal evidence (Article 5 & Article 6 of the ITE Law); 2.
electronic signature (Article 11 & Article 12 of the ITE
Law); 3. implementation of electronic certification
(certification authority, Article 13 & Article 14 of the ITE
Law); and 4. operation of electronic systems (Article 15 &
Article 16 of the ITE Law);

Some material for prohibited acts (cybercrimes) regulated


in the ITE Law, include: 1. Illegal content, which consists of,
among other things: decency,
gambling, insults/defamation, threats and extortion (Article
27, Article 28 and Article 29 of the ITE Law); 2. illegal
access (Article 30); 3. illegal interception (Article 31); 4. data
interference (data interference, Article 32 UU ITE); 5.
interference with the system (system interference, Article 33
UU ITE);
6. misuse of tools and equipment (misuse of device,
[6]
Article 34 UU ITE)
E. Duty Care
Where a person or an institution must be careful
careful in using a medium to fulfill professional
responsibilities with competence and diligence. This means
that

You might also like