CYBER STALKING ACTIVITY OF MILENIAL GENERATION IN URBAN SOCIETY IN INDONESIA

Millennial generation itself is often defined not by date of birth but also based on their behavioral and psychographic tendencies. This unique generation is a generation born in the internet age. Cyber stalking activities to ex-girlfriends or wives are often done, this is the reason why this cyber stalking activity exists and continues to grow, along with the many activities in social media, and the amount of social media used. It is a fairly large number, it seems that also experienced by the millennial generation, the activities carried out on the internet usual to obtain information. Methods in this study using qualitative method with sequential exploratory strategy. While theory used in the research is the theory of communication, theory of global village, theory negotiation advance, the theory of national resilience and social media theory. Cyber stalking has increased along with the easy access to the internet and mobile phone users owned smartphones. Cyber stalking activity is also done to co-workers, friends, boyfriend and ex-boyfriend. This means that cyber stalking activity will be a reasonable activity, self activity (private) even now is not uncommon to be public consumption. So that cyber stalking activity becomes something commonly done by millennial generation .


INTRODUCTION
The activities of the younger generation in utilizing time, more on the use of social media in exchanging information. They spend their time in front of a computer screen for hours. This is what attracts researchers, namely researchers, patterns of life and speech will make habits and characterization in millennial generations. Researchers see the use of social media that leads to cyber stalking. One of the things that is seen is that the news patterns are relatively strong and sustainable with the act of sharing the information even though the information shared is not necessarily valid.
These factors are attachment, capital in a relationship, responsibility for breaking up, finding alternative relationships, and emotions after breaking up. The researchers then found that the level of commitment (a sense of danger in relationships) was immediately introduced with pain due to a broken heart. In addition, it was also found that the greater the sadness after a breakup, the higher someone who stalked the former through social media. This is especially true for couples who are decided. To find out these things, the researchers recruited 431 participants from Midwestern University, United States who discussed history in the previous year. Participants then fill out an online survey to find out various factors in their relationship. Researchers speculate that people who are most traumatized by a breakup are the most likely to be a former cyber stalking on Facebook.
In a study published in the Journal of Neurophysiology in 2010, the characteristics of "addiction" in the brain were also reflected in breakups. This was obtained by the researchers after observing 10 women and 5 men who had just broken up. Even further, the researchers then identified the nervous system associated with this natural loss state using functional. The participants were asked to take turns seeing photos of their ex-girlfriends and other people who were familiar, interspersed with a diversion task. The part of the brain that is active when they see the former photo is the forebrain. The front brain itself is known to be related to motivation relevance, profit / loss, drug addiction, and emotional regulation. Area activation involved in drug addiction can help explain obsessive behavior related to breakup (https://www.biem.co). So that the activity of cyber stalking activities to ex-girlfriends or wives is often carried out, this is one reason that makes this cyber stalking activity exist and will continue to grow, along with the many activities on social media, as well as the amount of social media used.
In Law Number 11 Year 2008 concerning Information and Electronic Transactions it is stated that the use of information technology is carried out safely to prevent its misuse by paying attention to the religious and socio-cultural values of the Indonesian people. Therefore, there are three approaches to maintaining security in cyber space, namely the approach of legal aspects, technological aspects, as well as social, cultural, and ethical aspects. A person learns his culture through communication and at the same time communication is a reflection of his culture. Sowell (Samovar, 2010) says culture exists to serve the vital and practical needs of humans, namely to shape society and maintain species; reduce valuable knowledge and experience to the next generation, and save costs and dangers from the learning process all from small mistakes during the trial process to fatal mistakes. Meanwhile, values are another feature of a culture. According to Peoples and Bailey (Samovar, 2010), values are "a critique of the preservation of culture as a whole because it represents the qualities that people believe are important for the continuation of their lives". The relationship between values and culture is so strong that it cannot be discussed separately. Social media is considered capable of manipulating social facts from something real to blurred. Conversely, it is also able to bring imaginary facts to something that seems realistic. Therefore, in communicating with new media, critical reasoning is needed to see movements that can endanger cultural survival (Shoelhi, 2015). The noble value of the culture of the Indonesian people has become a serious concern of the stakeholders in the midst of the flow of news and information flowing out of control. The government invites the public to maintain the noble values of the Indonesian nation's culture. The city government of Madiun in 2016, for example, held a counseling to re-grow the spirit of nationalism through the noble values of the nation's culture in an effort to strengthen the nation's resilience to the negative influence of globalization currents (Increased Public Awareness of the Value of the Noble Values of the Nation's Fiscal Year 2016).
Thus, problems that arise in the use of social media by the younger generation, including whether the user has not been able to sort information or news on social media and identify credible sources from various sources that appear on social media; whether internet users tend to receive raw information from social media and disseminate it; and whether internet users have not been able to utilize social media to spread the noble values of the Indonesian nation's culture. This problem needs to be answered by conducting debriefing and surveying activities for the younger generation or millennial generation.

THEORETICAL REVIEW
The theoretical basis used in this research paper is to use interpersonal communication theory in the research process to analyze the object of research. West and Turner (2013: 36) stated that interpersonal communication has several contexts, namely family, marriage, mass media, and organization. Interpersonal communication in social media, one of which occurs in the information environment on the internet or cyberspace. Arni Muhammad (2009:158) states that effective interpersonal communication is the foundation of an organization's success. In this case, it can also be attributed to the online world community or certain social media that are already bound in a relationship. Because interpersonal communication in a virtual world also involves having different personal and cultural backgrounds, so it must be able to be well established in order to achieve the common goals of the company. But everyone in making comments in cyberspace certainly has different social or interpersonal needs and can only be fulfilled through interpersonal communication. William C. Schutz (in Muhammad, 2009: pp. 161-165) describes that there are three types of interpersonal needs, which encourage people in an organization to conduct interpersonal communication.

RESEARCH METHODOLOGY
This research model uses steps by using a sequential exploratory strategy, departing from qualitative data, then searching for quantitative data by means of questionnaires to respondents. And from these data, researchers conducted in-depth interviews with the resource persons to obtain findings. The sequential exploratory strategy involves collecting and analyzing qualitative data in the first phase, which is then followed by the collection and analysis of quantitative data in the second stage based on the results of the first phase. Weight / priority is more likely in the first stage, and the process of mixing between these two methods occurs when the researcher connects between qualitative data analysis and quantitative data collection. Sequential exploratory strategies can, or cannot, be implemented based on a particular theoretical perspective (Creswell, 2010: p. 317). The purpose of this strategy is to use data to help interpret qualitative findings. In contrast to sequential explanatory strategies, which are more suitable for explaining and interpreting relationships, the main focus in sequential exploratory strategies is to explore a phenomenon.

RESULT RESEARCH
The types of activities carried out by respondents when accessing the internet are classified into four classifications of internet access activities, namely, (1) obtaining information; (2) cyberstalking; (3) promoting business; and (4) updating activities. Internet access activities to obtain information have a greater number of respondents compared to the number of other internet access activities, as many as 94 people (40%). Internet activities to promote business have a total of 49 respondents (21%). Internet activity to update activities has a total of 51 respondents (21%). While internet access activities for cyberstalking have fewer respondents, namely 44 people (18%). This cyberstalking activity arises because of the increase in millennial generation activities on the internet. Especially through accounts on social media.

Culture of Urban Communities in Media Social in Indonesia
Social media accounts motivated by businesses are flooding in cyberspace. Start an account that only sells general products, to those that promote other goods and services. But apparently not all accounts consider the sociological aspects. In the end, those who are not wise to make whatever is trending in the market as a selling point to bring money. Unfortunately, the trends in social media surfers are in the range of love, jokes that are not clear, and even sensual. Neither Line nor Instagram, the information presented is not much positive. Conversely, not a little information presented is actually less useful, even negative. For example information that is only struggling in a variety of feelings (turmoil, insinuating, and others). Some are even negative (the language is dirty, there is insulting behavior but is wrapped with happiness, as well as sensual content). In fact, the condition of such information presentation can shape the culture of social media users, especially the youth who are also active in it.
In line with Horton and Hunt (1987: 58), culture is anything that is learned and experienced together socially by members of a society. Culture includes all knowledge, beliefs, arts, morals, law, customs, all abilities and habits (Tylor in Damsar, 2015: 5). That said, members of the community not only learn and live the existing culture, but also create a new culture through the learning process.
Learning is an attempt to understand reality and / or be able to do something. So, as long as humans understand reality or behavior, at that moment he can live it, get used to the mind, do it, and even make it as one of the principles of life. And finally, what is learned will become part of his life, whether it's the style of speech, diction, and even paradigm. In one period, humans will learn and apply the culture that gave rise to their environment, while changing the culture based on newly acquired knowledge. The result can be positive culture (critical thinking, courtesy, caring for others, and other positive things), and it can also be a negative culture (simple, emotional, and even individualistic thinking), because it depends on what is learned and received.
When we look back at social media, users can learn and form a non-positive life culture. Moreover, the information is presented repeatedly, although sometimes with a different form of message. Thus, when a community member is active in searching social media, even though he is well-cultured (for example religious), his culture will have the potential to experience change: either mixing with the wrong, even no longer religious.
To prevent the emergence of an increasingly negative culture, it is better for us to suppress useless and negative information. The method can be of various kinds. We can spread information more useful, do not support -like "like and share" -accounts that spread information are less useful and tend to damage. Even if necessary, report anything negative to the authorities. Useful information is actually not only produced by "Taste Made". The meaning of that benefit is very deep if traced analytically. However, in short, we can interpret it as an effort to contribute to the country's development. For example, providing scientific information to solve national problems, scientific works (technology, ideas, etc.), motivating positive things, reminding each other in goodness, updating about governance, teaching living in harmony in Indonesia's multicultural context, and other social activities oriented towards helping the government eradicate problems that have not been addressed.
Actually there are many problems that have arisen in the community. Subjects that resolve community problems, according to sociological assumptions, are not only carried out by social institutions (such as educational, religious, organizational, cultural and other institutions) but also by members of the community. By balancing all fields in this country, rapid progress is in sight. Likewise with the cultural field. The progress of a nation lies not only in the amount of technology and money held by members of its community, but the progress of all fields of the country. But if we don't take the time to understand the reality, live the existing problems, contemplate the solution of the problem, the writer thinks that the progress of the nation is only in the form of a proud dream.

Cyberstalking an Opposite Type Account
Based on questionnaire data the amount of internet consumption:> 2 hours in percentage reached 74%. It is a fairly large amount, it seems that it is also experienced by millennials, activities carried out on the internet are used to obtain information. According to Hasibuan, activities that are cyberstalking on the internet are carried out to find out about the condition of friends and as entertainment, as in the following statement: What has been done from H is a reflection of the process of tracking before meeting or getting to know first. According to a quote from (Azhar, 2012:94) men and women are responsive to the attractiveness of prospective partners, whether as a boyfriend or just an attraction between men and women. Many studies, whether from America or from other countries, have conducted research and their findings show that beauty or beauty is important in social life (Baron and Byrne, 2005). But interpersonally, an attractive appearance is perceived by people to believe, that men and women are more interested in things that are more calm (cool). Men and women will feel cool when they look more calm. Another thing that makes interest is success and adaptability. Handsome men are believed to be more masculine, and beautiful women are more feminine (Baron

Use of Online Media
Using the internet and social media, which makes stalkers easy to access, and obtain information through cyberspace media and as mentioned earlier, their anonymity in finding victims and avoiding detection (Reno 1999). Stalking behavior in cyberspace is often misunderstood and confused with the behavior of other online predators, including the behavior of sexual offenders who seek pure children for sexual satisfaction. As mentioned, not all incidents of virtual stalking are motivated by sexual obsession. However, one cannot ignore the fact that the Internet has become a virtual playground for sex offenders because it gives predators easy access to tens of thousands of children and presents a completely new and unique way to care for children from a far. This is particularly frightening considering that nearly 30 million children have regular access to the Internet in the United States alone with little or no parental supervision. Teenagers, in particular, tend to be the most vulnerable groups given the group's collective sexual curiosity and continuous exploration with pornographic websites. There are a number of websites such as www.myspace.com that allow teens to post and exchange personal information and are often sensitive about each other. What these teenagers fail to recognize or accept is that this information can be accessed publicly by anyone who visits this site, including those who prey on children (Dombrowski et.al 2004). Myspace and other social networking websites have implemented security measures, but there is no very easy way to truly secure access to potential victims given by computer offenders today.
Usually the stalker also downloads photos and also takes pictures from social media that are not necessarily licensed by authorized users, photos later in other group forums. In 2019, the number of WhatsApp users in Indonesia is increasing, and actively using social media is almost every minute updating activities on social media. There are concerns when where when not using social media, especially WhatsApp becomes nervous because all work information, news, and various activities are updated through the application.
As of February 2002, 54% of all Americans accessed the Internet on a regular, consistent basis and more than half of all households in the United States had contracted with an Internet service provider at home (Schneider 2003). In the United States alone, more than 80 million adults and 10 million children have access to the Internet whether it be at home, work, school, or one of the many emerging wireless provider locations (Reno 1999). As with any crime, there is no practical, truly scientific way of predicting with 100% accuracy the prevalence of cyber stalking in the United States (Reno 1999). To this writer's surprise, criminologists and other researchers have only recently begun to gather information on cyber stalking behaviors, trends, and patterns (Reno 1999). Nevertheless, the most recent findings have unveiled some fascinating information, but these findings should be approached with a degree of caution since the information has only been compiled and evaluated on a relatively small scale (Reno 1999). The anecdotal evidence presented thus far suggests that cyber stalking is a serious societal problem that warrants further review and attention, particularly because cyber stalking, by all measurable accounts, is on the rise (Reno 1999).
International Review of Humanities Studies www.irhs.ui.ac.id, e-ISSN: 2477-6866, p-ISSN: 2527-9416 Vol. 5, No.2, July 2020, pp. 607-620 In order to gain a true understanding and practical insight into the extent of cyber stalking, it would be best to study the behaviors associated with traditional stalking offenders since many of those same behaviors overlap with those of cyber stalkers (Reno 1999). Since California leads the nation in the number of cyber stalking cases, it would be best for researchers to make California the focal point for future research (Reno 1999). This approach would be similar to that taken by sociologists in the 1920's who were interested in studying the relationship between immigration demographics and Chicago's rising crime rates, a movement which eventually led to the birth of the Chicago School of Criminology (Barkan 2006). What makes California so unique? There must be a logical reason to explain why the majority of cyber stalkers emanate from California and it needs to be explored.
The research findings strongly suggest that cyber stalkers use email as the primary means to harass and threaten victims, far more than any other electronic communication device (Petrocelli 2005). Emailing allows an offender to repeatedly transmit harassing, threatening, hateful, or obscene messages, including pictures, videos, or audio (Petrocelli 2005). In rare instances, cyber stalkers were known to purposely transmit electronic files that contain a hidden computer virus, which is intended to damage the victim's electronic files and spread the virus to others in the victim's "address" book (Hutton & Haantz 2003). In some cases, cyber stalkers use the victim's email address and other personal information to subscribe to or purchase books, magazines, or other Internet services without the victim's knowledge or consent (Hutton & Haantz 2003).

ITE Law in Indonesia
This ITE Law was revised on October 27, 2016. The revision was enacted thirty days later, on November 28, 2016. This law regulates and protects information and electronic transactions in cyberspace. In Article 27 it is explained that the Law ITE not only ensnares the creators but also those who distribute, transmit and / or make the content electronically accessible. What is meant by distributing is sending and / or distributing Electronic Information and / or Electronic Documents to many people or various parties through the Electronic System. Transmitting is sending Electronic Information and / or Electronic Documents addressed to one other party through the Electronic System. Whereas 'making content accessible' is all other acts besides distributing and transmitting through the Electronic System which causes Electronic Information and / or Electronic Documents to be known to other parties or the public. Crime behavior in cyberspace also often occurs in Indonesia. Cyber stalking falls into this category too, the most basic thing is stalking without permission, and can cause unrest and noise in the community. Now we compare in developed countries about the law related to cyber stalking behavior in various countries. To date, the 50 states and the District of Columbia have adopted criminal stalking statutes (Reno 1999). As of 2005, 44 countries have enacted cyber reconnaissance laws in existing stalking or harassment laws (National Conference on State Legislative 2006). www.irhs.ui.ac.id, e-ISSN: 2477-6866, p-ISSN: 2527-9416 Vol. 5, No.2, July 2020, pp. 607-620

International Review of Humanities Studies
According to Reno, Title 18 A.S.C. 875 (c) makes it a federal crime to transmit interstate or foreign trade containing threats intended to harm others. Punishment for breaking the law is a prison sentence that can be sentenced to up to five years and can include fines of up to $ 250,000 (Reno 1999). One of the striking problems with federal law is that the communication must specifically include direct threats rather than implicit threats to hurt others. Communication stalking cyberspace does not always include special messages where the offender threatens to hurt the victim.
The basic foundation of criminal law requires the following two elements to be present for crimes that have been committed: actus reus and mens rea (Dennison & Thomson 2002). Actus reus or "action" requires that certain behaviors occur and mens rea, the guilty mind, requires that the offender is intended to cause harm (Dennison & Thomson 2002). The third element requires that there are victims (Dennison & Thomson 2002). Building an actus reus is not as difficult as establishing a mens rea where the state (prosecution) must prove that the offender intends to cause harm (Dennison & Thomson 2002). Dennison & Thomson found that it was easier to prove intention in ex-intimate relationships than in the case of strangers or acquaintances (2002).
In certain situations, virtual stalkers can be sued under 47 US. 223, federal law which makes it a crime to use telephone or other communication devices to harass or threaten anyone (Reno 1999). This law is somewhat easier to apply to cases of cyber stalkers because it includes harassment and threats that are not in the US Title 18. 875 (c) (Reno 1999). Fortunately, harassment is an obscure term that includes almost all behaviour that can be interpreted as a disorder. Although it does not specifically mention cyber stalking by its name, the Interstate Stalking Act of 1996 makes it a crime for anyone to travel from one country to another with a view to injuring or harassing that person (Reno 1999). The problem with enforcing this law lies in the language used in the law where the offender physically has to travel across national lines, which clearly rules out most cases of internet harassment (Reno 1999). In addition to what has been quoted, the Violence Against Women Act of 2000 makes cyber stalking a part of federal interstate surveillance laws, a federal crime (National Center for Victims of Crimes, Stalking Cyber Crimes, Cyber Stalking 2004).

DISCUSSION
Cyber stalking is still in its infancy; however, the incidence of cyber stalking is expected to increase because the Internet is becoming more popular than it is today, especially among young people (Hutton & Haantz 2003). Simply stated, much of modern life cannot be carried out effectively without continuous access to the World Wide Web (Hutton & Haantz 2003). Although law enforcement is faced with a series of obstacles, there is hope. Law enforcement at the federal, state and local levels must unify, share and disseminate intelligence. With proper training and guidance, law enforcement investigators can often track, with accuracy, electronic traces that have been left behind by cyber stalkers (Reno 1999). Metaphorically, the electronic footprint is the same as a thief who leaves fingerprints at the crime scene (Reno 1999). With a little work, electronic traces can often be traced back to their original point of origin.
Meanwhile, law enforcement can use investigative strategies and tactics that have proven to be effective in the situation of traditional stalkers (Reno 1999). Former Attorney General Janet Reno (1999) suggested that law enforcement refer to the annual report produced by the Attorney General's Office for Congress entitled, "Stalking and Domestic Violence" for additional insight into stalking behavior. In addition, it is strongly recommended that law enforcement establish cooperative partnerships with ISPs because both of them ultimately work towards the same goal, combating online harassment.
Online harassment is unfortunately only one of many components that are detrimental to the Internet. Former Attorney General Janet Reno (1999) recommends that the state review the stalker's existing statute to include a section on cyber surveillance. Pennsylvania is one of a handful of states that do not have separate laws or subsections to deal with cyber surveillance, thus making it very difficult to prosecute these violations. Contrary to criticism of the virtual stalker literature, virtual stalking is a growing problem that transcends international boundaries (Bocij & McFarlane 2002). Indeed, inaccuracies stem from false media portrayals of virtual stalkers as a matter of epidemic proportions (Bocij & McFarlanem2002). However, the number of cases is increasing and is expected to continue to increase over the next decade (Bocij & McFarlane 2002). In other words, the attention recently received by cyber stalking is justified and genuine and is worthy of further criminological research (Bocij & McFarlane 2002).
In Indonesia, the law governing cases in electronic media is the ITE Law, while the urban community in this case is the millennial generation who does not yet fully understand the criminal law regulations in the cyber world. Therefore it is necessary to socialize through various parties in order to support and contribute. Cyberstalking is carried out by millennial generations, with everyday activities becoming a material for public consumption when it is uploaded. Cyberstalking activity is an activity of observing someone's account without the permission of the user, it can be said to be illegal. The era of openness and also the flow of information is very fast making the millennial generation based on curiosity and the process of searching for identity, very curious about the information that came in repeatedly. So that they have not had time to select which information is valid and whether or not they are carried away by the swift current, some cases of cyberstalking can also be subject to criminal acts of the ITE Law.

CONCLUSION
Indonesia is a country with a large population and is active in using social media. This certainly has its own risks, when using social media accounts is too high, there are positive and negative effects. And this negative factor tends towards criminal cases that can harm social media users. Of course there are rules and ways that are good and appropriate in social media activities. The factors that are violated are what make the problem in the cyber world. There are several factors that make a person carry out activities on social media. These factors are attachment, capital in a relationship, responsibility for breaking up, finding alternative relationships, and emotions after breaking up. The researchers then found that the level of commitment (sense of danger in the relationship) was immediately introduced to the pain of a broken heart. This is often used as an entry point for sharing information and building communication on social media. This can be a crime factor in the cyber world. Besides that, Indonesian people also like to do activities on social media. In its activities not only for work purposes, but also for the sake of building relationships, building communication, and also just to exist on social media. Often the topic and also photos of other user profiles are misused for crime. Such as cyber bullying, cyber crime, fraud, fake accounts and also for cyber stalking activities. The private areas in social media as if there is no more, all things can be a factor to dig up information and become public affairs. With the majority of people who are active and also often do activities on social media. In Indonesia itself, especially in urban communities, making this very vulnerable to crime cases, the need for legal products that protect these things from crime or irresponsible people, is different from that in other countries in handling cyber stalking cases.
This research has used the results of data with qualitative methods and triangulation, with theories relating to crime cases in the cyber world. As well as views from the scientific side for comparison of cases and the legal system. Especially regarding penalties and legal products that will be used for perpetrators. One of them is conducting training and outreach to the community. However, not all training and law enforcement support in the world can replace good old-fashioned education by informing citizens about the dangers associated with the Internet. Online harassment is only one of many components that are detrimental to the Internet. The dangers that lurk can happen to anyone on social media users, if not careful. One example of this comparison is the United States of America where Former Attorney General Janet Reno (1999) recommends that states review existing stalking statutes to include a section on cyber stalking. Pennsylvania is one of a handful of states that do not have separate laws or subsections to deal with cyber surveillance, therefore making it very difficult to prosecute these violations. Whereas in Indonesia there is itself an ITE Law as a legal product that can ensnare perpetrators of crime in cyberspace.
Whereas criticism of the virtual stalker literature, virtual stalker is a growing problem that transcends international boundaries (Bocij & McFarlane 2002). Indeed, this inaccuracy stems from the media's false portrayal of virtual stalkers as a matter of epidemic proportions (Bocij & McFarlanem 2002). However, the number of cases is increasing and is expected to continue to increase over the next decade (Bocij & McFarlane 2002). In other words, the attention recently received by cyber stalking is justified and genuine and is worthy of further criminological research (Bocij & McFarlane 2002). In Indonesia, one way to prevent crime in the cyber world is to recheck accounts and also be careful in activities on social media, bearing in mind this is prone to crime in cyberspace. Likewise with this research, it can be a further study to be investigated in a criminological perspective.