首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 719 毫秒
1.
秦总根 《政法学刊》2007,24(5):115-119
网络在为人们提供方便和便捷的同时,也给网络犯罪提供了一个低成本、高效率的作案平台,利用网络实施的网络犯罪已涉及绝大部分社会犯罪现象,给互联网安全和社会稳定带来了很大冲击,成为了一个不容忽视的社会问题。应该弄清当前网络犯罪的特点、原因,公安机关提高侦查、打击网络犯罪的能力,以有效遏制网络犯罪,使互联网能更好的服务大众、服务社会发展。  相似文献   

2.
互联网的虚拟无国界性使得网络犯罪呈现跨国性特点。跨国性网络犯罪行为主要包括以互联网为对象实施的犯罪、以互联网为工具实施的犯罪和其他与互联网关联的犯罪。鉴于网络犯罪的跨国性 ,国际社会应通过国际刑事立法方式协调打击网络犯罪。  相似文献   

3.
近年来,随着"互联网+"、"普惠金融"、"金融创新"等概念的提出,互联网与金融的深度融合成为金融发展的新路径.自2007年国内第一家网络借贷平台"拍拍贷"产生以来,网络借贷这一新的业态获得了爆发式的增长.与此同时,网络借贷衍生的刑事案件也与日俱增,其中既包括网络借贷产品本身可能涉嫌的犯罪,也包括利用网络借贷平台实施的犯罪,涉及非法吸收公众存款、集资诈骗、合同诈骗、非法经营、洗钱等犯罪行为,侵害了投资者的合法权益,也影响了我国金融秩序的稳定.司法机关在办理网络借贷刑事案件过程中,也遇到了许多区别于传统金融犯罪的新情况和新问题,需要从理论和实践层面进一步加强研究和应对.  相似文献   

4.
随着信息技术的迅猛发展,人类进入了互联网时代,互联网在给我们带来了E-mail、MP3、电子商务的同时,也带来了病毒,甚至网络犯罪。网络犯罪是在虚拟的世界借助高新技术的手段实施的一种犯罪行为,是一种新型的犯罪,网络犯罪日益成为法律亟待研究解决的新课题。本文对网络犯罪中的一些问题进行探讨。  相似文献   

5.
殷啸虎 《检察风云》2012,(24):17-17
加强网络管理,打击网络犯罪是一项系统工程,需要社会各方面的通力合作。但就司法机关而言,要建立一套有效的制裁和防范网络犯罪的机制,关键是要认识网络犯罪的特点,采取针对性的措施。网络犯罪作为一种特殊环境下的新型犯罪行为,除网络盗窃、黑客攻击、网络淫秽色情等直接在网上实施的违法犯罪外,各类传统违法犯罪的嫌疑人也正在越来越多地利用互联网。  相似文献   

6.
随着互联网以及网络通讯技术的发展,网络犯罪也一直呈现高发态势.新型网络犯罪大量出现,而许多传统犯罪也逐渐利用互联网为犯罪工具,犯罪手段屡屡翻新,给公安工作带来了许多现实挑战.全面分析总结各类新型网络犯罪的特点,并以此为依据,革新侦查工作传统观念,组建并扩充专业侦查队伍,已成为侦查工作专业化的必然要求.  相似文献   

7.
政府行为和商业运作移植到计算机上来完成,这一行为使得犯罪行为从传统的只要集中于有形财产的犯罪也相应的转移到网络空间了。本文指出有形犯罪发展到无形犯罪对整个社会产生了严重的冲击,不论从社会的角度还是从经济的角度来说,解决网络犯罪问题迫在眉睫。  相似文献   

8.
金煜  冯亮 《法制与社会》2010,(29):60-61
网络犯罪的出现让传统的刑事管辖权遭受巨大的冲击。本文以传统的刑事管辖权为基础,提出了架构适用网络犯罪的刑事管辖权原则和规则。  相似文献   

9.
《中国检察官》2021,(14):F0002-F0002
互联网信息技术的发展不仅带来了新业态,同时深刻影响着社会的发展与进步。网络在带来便利的同时,也逐渐成为新型犯罪的温床,利用或针对网络实施的新型违法犯罪活动不断滋生蔓延。据统计,检察机关近些年办理的网络犯罪案件数量年平均增幅达34%以上。不同于传统犯罪,网络犯罪呈现出以下特点和发展趋势:一是犯罪手段高度技术化,犯罪样态不断更新迭代;二是组织协作集团化运行,黑灰产业链已经形成;三是网络犯罪主体日趋多元;四是社会危害日益加剧,风险隐患纵深蔓延;五是网络犯罪地域跨境化特征明显。司法机关查处的网络犯罪案件增多,反映出新时代人民群众在民主、法治、公平、正义、安全、环境等方面有新的更高需求,也反映出经济社会的发展对社会治理提出了更高要求。  相似文献   

10.
网络的发展给现代社会带来极大的便利,也带来了前所未有的冲击.网络空间造就了网络犯罪不同于传统犯罪的特点,以至于面对网络犯罪,传统的管辖原则显得有些束手无策.为解决这一难题,各国立法和司法界提出了相关的对策和措施,但由于都存在着不同程度的缺陷,皆未能解决其中的实质性问题.采取以普遍管辖原则为主,兼采属地原则、属人原则、先理为优为补充的原则是解决网络犯罪刑事管辖权的必然选择.  相似文献   

11.
出于对互联网的管控需求,我国通过技术手段屏蔽了部分境外网站。但是,网民对境外网站的访问需求是客观存在,人们会尝试通过技术手段突破封锁,这些行为俗称为"翻墙"。"翻墙"的实现需要技术及资金支持,所以互联网长期存在提供"翻墙"软件工具以谋取利润行为。司法实践一直将其提供"翻墙"工具的行为定性为提供侵入、非法控制计算机信息系统程序、工具罪,但是,"翻墙"工具的技术原理是通过设立虚拟专用网的方式绕过我国网络监管部门的技术封锁,并未对计算机信息安全造成破坏,不宜定为计算机犯罪。但是,该行为实际是违反国家规定,未经许可擅自经营电信业务的行为,是对市场准入秩序的破坏,与非法经营罪所保护的法益与其构成要件更加接近。  相似文献   

12.
网络诈骗是一种新型的犯罪方式,是一种有别与普通诈骗的高科技犯罪,其隐蔽性强、渗透性强、危害范围广的特点也决定了应对其进行深入的研究。我国经济的快速发展带动了网络的快速发展,网络诈骗对我国经济的影响范围也日益加大,而我国对此的立法和执法还存在很多问题。因此,有必要从立法完善、执法改善、技术加强、社会各方协调等方面来构建网络诈骗的预防体系,以便更好地预防网络诈骗,减少经济损失。  相似文献   

13.
近年来,随着互联网技术的不断发展,人们依赖互联网的程度不断加深,互联网安全也越来越受到人们的重视。现阶段,网络犯罪案件调查和网络监察工作由公安机关公共信息和网络监察部门来负责,但由于我国网络监察工作起步较晚,立法不健全等原因,造成了许多网络违法犯罪案件无法立案或立案后打击力度不够等问题出现。笔者通过我国互联网发展现状及网络违法犯罪出现的形式入手,阐述了网络监察工作任务,揭示出现阶段网络监察工作存在的问题,提出了网监工作今后发展趋势。  相似文献   

14.
The dramatic increase in crime relating to the Internet and computers has caused a growing need for digital forensics. Digital forensic tools have been developed to assist investigators in conducting a proper investigation into digital crimes. In general, the bulk of the digital forensic tools available on the market permit investigators to analyse data that has been gathered from a computer system. However, current state-of-the-art digital forensic tools simply cannot handle large volumes of data in an efficient manner. With the advent of the Internet, many employees have been given access to new and more interesting possibilities via their desktop. Consequently, excessive Internet usage for non-job purposes and even blatant misuse of the Internet have become a problem in many organisations. Since storage media are steadily growing in size, the process of analysing multiple computer systems during a digital investigation can easily consume an enormous amount of time. Identifying a single suspicious computer from a set of candidates can therefore reduce human processing time and monetary costs involved in gathering evidence. The focus of this paper is to demonstrate how, in a digital investigation, digital forensic tools and the self-organising map (SOM)--an unsupervised neural network model--can aid investigators to determine anomalous behaviours (or activities) among employees (or computer systems) in a far more efficient manner. By analysing the different SOMs (one for each computer system), anomalous behaviours are identified and investigators are assisted to conduct the analysis more efficiently. The paper will demonstrate how the easy visualisation of the SOM enhances the ability of the investigators to interpret and explore the data generated by digital forensic tools so as to determine anomalous behaviours.  相似文献   

15.
谈互联网上毒品犯罪及对策   总被引:1,自引:0,他引:1  
互联网因其现代化、科学化、高效率、高覆盖及无国界等优点,迅速走进人们的生活,同时也给不法之徒进行犯罪活动提供了契机。目前通过互联网订购、销售毒品、进行在线毒品交易、提供制毒配方等互联网上涉毒案件已出现,网上毒品犯罪已成为全球毒品犯罪的最新发展动向,引起各国政府及执法部门的高度关注。  相似文献   

16.
The Internet provides an ideal opportunity for defrauding those who are less technologically advanced or who are enthralled by the technology. Yet the frauds and other financial crime which are perpetrated on the Internet are, in principle, no different from those which have been committed over time. The advantages to the criminal of the Internet as against most other media are that there is an opportunity to make vast numbers of cold calls at a cost which borders on the free, the opportunity to create credibility by the use of legitimate imagery from reputable sources and to secure the proceeds of the crime not only anonymously but also in jurisdictions where the pursuit of the offender is difficult. There is also the fact that the prospective victims have been conditioned to believe that which appears on a computer screen: the suspension of incredulity and caution is deeply engendered. For that most pure of financial crimes, money laundering, there is the advantage of ease of communication, the simplicity of setting up schemes, with ready access to otherwise remote geographical and legislative locations. Yet there is another issue which does raise serious concerns, but which is not generally regarded as an offence: the provision of information and advice where there is an element of transfer pricing, with the consequent avoidance of taxes. The challenge is to bring about a system of regulation which enables free exchange of information whilst limiting the opportunity to trick people who are already conditioned to believe what they see on a computer monitor. The Internet does not create new frauds nor new money laundering schemes. It is merely a facilitator that has a high level of credibility. And it creates opportunity for the export at low prices of high value added services to the detriment of local economies, for the first time making onshore facilities fully available via offshore centres, with the consequence that it will become increasingly difficult tell the good from the bad.  相似文献   

17.
As a new challenge to law enforcement, computer crime has recently received increasing attention from law enforcement and government officials. However, most writings about this issue are not empirical. This study fills this void by examining the attitudes of computer crime officers in Texas in two areas: general problems in dealing with computer crime, and the impact of demographic and institutional support factors on officers' attitudes. The results are: (1) more budgetary support and training are needed; (2) lack of computer skill/knowledge is the most problematic for computer investigations/forensics; (3) the idea of cooperating and sharing resources has already been utilized; and (4) officers understand the complexity of computer crime but are uncertain about its seriousness. The size of the city and whether the departments have a computer crime unit are the most significant factors that impact officers' attitudes toward the need for institutional support. This study suggests four elements (officers' attitude, institutional support, personnel, and network) that are important to successfully combat against computer crime; these elements need to be included in the development and implementation of both short-term and medium-term plans. Authors' Note: Dr. Sutham Cheurprakobkit is Associate Professor of Criminal Justice in the Department of Sociology, Geography, and Anthropology, Kennesaw State University, 1000 Chastain Road, Kennesaw, GA 30144. Gloria Pena is a criminology major at The University of Texas of the Permian Basin, Odessa, TX 79762.  相似文献   

18.
计算机网络证据的取证研究   总被引:1,自引:0,他引:1  
计算机网络的快速发展巨大地改变着人们的生活,但同时网络犯罪也呈现骤增的趋势,为了有效地打击犯罪,必须研究与网络犯罪相关的侦查技术,而计算机取证是其中最重要的环节之一。计算机取证的主要工具,主要技术和采用方法都有别与传统犯罪的取证,并随着科学技术和犯罪的发展而产生着相应的变化。  相似文献   

19.
网络化传统型犯罪的侦查   总被引:1,自引:0,他引:1  
揭萍  熊美保 《政法学刊》2006,23(2):32-36
我国目前网络化传统型犯罪的现状不容乐观,网络化传统型犯罪不属于刑法中的计算机犯罪,也不能等同于网络犯罪。对网络化传统犯罪的侦查存在管辖、定性、取证、程序等多方面的问题。完善立法,加强侦查方法和程序的研究,强化侦查协作,重视对网络化传统型犯罪的预防是网络化传统犯罪侦查的基本策略与措施。  相似文献   

20.
Purpose: in the literature, the term ‘Internet crime’ has been coined to indicate the scenario in which a victim of homicide or other crimes is met through a chat room, and lured to death at the hands of the murderer. Various criticisms have been made of this new concept, on the grounds that the outcome is no different from that of other crimes committed without the use of Web resources, and so the method used has no particular influence. Indeed, it has been claimed that informatic crime just reflects a technological change in the nature of crime rather than a new form of criminal behavior attributable to the use of the Internet for criminal purposes. Method: our reflections were prompted by our experience as expert forensic psychiatry witnesses in three cases in which the aggressors had confessed to having had an exclusively virtual relationship with the victims, in which they spent a lot of time daily in a chat room. Conclusion: this scenario offers points for reflection on the nature of Web-mediated victim–aggressor interactions, to assess the effects on the planning and commission of the crime. Discussion. it’s our opinion that there really is such a thing as Internet-correlated crime, because in this case the quality and quantity of the Internet interactions progressively altered the men’s perception of the real relationship between themself and their victims.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号