日韩偷拍一区二区,国产香蕉久久精品综合网,亚洲激情五月婷婷,欧美日韩国产不卡

在線客服
網(wǎng)絡(luò)犯罪學(xué)圖書
人氣:35

網(wǎng)絡(luò)犯罪學(xué)

正版圖書,品質(zhì)保障^_^如需清單下單時請備注,下單即有精美書簽贈送!

內(nèi)容簡介

本書探討了信息技術(shù)發(fā)展對于傳統(tǒng)社會控制機(jī)制樹立的挑戰(zhàn),提出一個廣義的定義方法,認(rèn)定了網(wǎng)絡(luò)犯罪的特點及其對于偵查概率和威懾效果的負(fù)面影響。鑒于現(xiàn)行有關(guān)網(wǎng)絡(luò)犯罪的法律框架在打擊網(wǎng)絡(luò)犯罪中其效甚微,本書主張,為使信息社會得到保護(hù),法律威懾取得實效,國家之間、傳統(tǒng)空間與網(wǎng)絡(luò)空間之間的法律與管轄的鴻溝必須去除,才能追究犯罪主體的刑事責(zé)任。

編輯推薦

本店所有圖書均為正版 請放心購買,有任何問題請聯(lián)系在線客戶或致電,謝謝

作者簡介

李興安,旅歐華人學(xué)者。芬蘭圖爾庫大學(xué)法學(xué)博士,坦佩雷大學(xué)計算機(jī)科學(xué)博士。現(xiàn)任芬蘭國際信息社會研究所(三櫻智庫)首席科學(xué)家,愛沙尼亞塔林大學(xué)副教授,北京航空航天大學(xué)工業(yè)與信息化法治研究院特邀高級研究員,重點實驗室學(xué)術(shù)委員會委員。著有《網(wǎng)絡(luò)犯罪導(dǎo)論》、《網(wǎng)絡(luò)犯罪與威懾:構(gòu)建網(wǎng)絡(luò)化信息社會的法律網(wǎng)絡(luò)》、《數(shù)據(jù)挖掘方法在犯罪研究中的應(yīng)用》、《二十一世紀(jì)的網(wǎng)絡(luò)犯罪與網(wǎng)絡(luò)安全》、《網(wǎng)絡(luò)安全詞典》等。在國際學(xué)術(shù)刊物四十余篇。

董淑君,刑法學(xué)博士,中國政法大學(xué)副教授,碩士研究生導(dǎo)師,曾兼任北京市密云區(qū)人民檢察院副檢察長,曾任北京市華聯(lián)律師事務(wù)所執(zhí)業(yè)律師。主要代表論著有:《刑法的要義》、《刑法概論》、《刑事錯判研究》等。

目錄

PREFACE

LIST OF FIGURES

LIST OF TABLES

TABLE OF CASES

ABBREVIATIONS

CHAPTER 1INTRODUCTION

11Social context of cybersecurity and cybercrime

12Structure of this book

CHAPTER 2DECIPHERING THE PHENOMENONOF CYBERCRIME

21Introduction

22Development of definition of computer crime

23Analysis of the previous shortcomings in defining

cybercrime

24How to define cybercrime?

25Reading of the "cyber" label of criminal phenomenon

26The necessity of a broad definition of cybercrime

27A definition based on roles of information systems

CHAPTER 3CLASSIFICATION OF CYBERCRIME

31What roles can information systems play in cybercrime?

32Comparison with other conceptions

33Conclusion

CHAPTER 4SUBJECTS AND SUBJECTIVEASPECTS OF CYBERCRIME

41Introduction

42Whats special with cybercriminals?

43The perceived context of the perpetrators

44Forms of organization

45Age and cybercrime

46Psychological features of cybercrime

47What motivates a cybercrime?

48Conclusion

CHAPTER 5RECOGNIZING CRITICAL FACTORSIN COMBATING CYBERCRIME

51Introduction

52Victimization in cybercrime

53Time in cybercrime

54Space in cybercrime

55The technological nature

56The complexity of cybercrime

57The costs of cybercrime

58The anonymity of the perpetrators

59Hidden victims

510The concealment of cybercrime traces

511The transterritoriality of cybercrime coverage

512The rampancy of cybercriminal phenomena

513Rentseeking from the exaggeration of insecurity

514Conclusions

CHAPTER 6THE HISTORICAL DEVELOPMENT OFCYBERCRIME AND DETERRENCE

61Basic observations on the development of criminalphenomena

62Computer hackers discovery of a lawless new frontier

63The rise of the law against the increasing number ofcybercrimes

64A legal system wrestling with networked adversaries

65The equilibrium between cybercrime and deterrence

66Conclusion

CHAPTER 7LIABILITY FOR CYBERCRIME

71Introduction

72Criminal liability, civil liability and administrative liability

73Individual liability and corporate liability

74Liability based on law and liability based on contract

75Intentional liability, negligent liability and reckless liability

76Direct liability and indirect liability

77Trespassers liability, third parties liability, and victimsliability

78Domestic liability, transnational liability, and internationalliability

79Offensive liability and defensive liability

710Punitive liability, exemplary liability and compensatoryliability

711Conclusion

CHAPTER 8CYBERJURISDICTION

81Introduction

82The legal basis for cybercriminal jurisdiction

83"Separate" or "international" jurisdiction?

84The specific space — the determination of the location ofconduct

85The specific player — the determination of the location of theperson

86Liabilitybased cybercriminal jurisdiction

87Critical factors in cybercriminal jurisdiction

88Conclusion

CHAPTER 9INTERNATIONAL ACTIONSAGAINST CRIMINALITY

91Introduction

92From domestic legislation to international harmonization

93Professional efforts of the International Criminal PoliceOrganization (Interpol

94Regional efforts

95Multinational efforts

96Global efforts by the United Nations (UN

97The focuses of international harmonization

98From conversation to the European Convention

99Limited progress in international harmonization

910Conclusion

CHAPTER 10CONCLUSIONS

101Dilemmas of cybercrime control

102The primary factors benefiting cybercrime

103The primary factors preventing cybercrime

REFERENCES

網(wǎng)友評論(不代表本站觀點)

免責(zé)聲明

更多出版社
主站蜘蛛池模板: 赣州市| 无极县| 寻甸| 三河市| 抚远县| 万载县| 祁连县| 红安县| 六枝特区| 盐边县| 石城县| 宁远县| 松潘县| 临安市| 含山县| 肥乡县| 东阳市| 武平县| 望奎县| 轮台县| 桐庐县| 临城县| 洛扎县| 贵南县| 嘉祥县| 南通市| 星子县| 潼关县| 当阳市| 晴隆县| 尚义县| 紫阳县| 高阳县| 微山县| 织金县| 盐池县| 姜堰市| 云南省| 昂仁县| 广安市| 德州市|