排序方式: 共有27条查询结果,搜索用时 281 毫秒
21.
22.
The research presented within this paper was conducted as part of a 2-year project (Project MARC) to develop and render operational
a mechanism to assess the risk of theft of electronic products. Clarke and Newman (Secured goods by design - a plan for security
coding of electronic products. London: Department of Trade and Industry, 2002) proposed the use of two checklists—one to measure
vulnerability, the other to measure security—as a means of categorising products according to their vulnerability to theft.
Consultation with key stakeholders yielded the common view that such a mechanism was worth pursuing, but that it must reflect
the language of those who would use it. An extensive consultation with stakeholders from ten European member states ensued.
Participants were asked to rate a range of electronic products in terms of vulnerability and security, and to explain their
ratings. Their responses were used to develop two checklists that incorporate a variety of factors, weighted according to
the frequency with which they were expressed. The crime vulnerability checklist developed within this paper is judged fit-for-purpose
as a provisional measurement but we urge caution in relation to the security checklist.
Dr. Rachel Armitage is a Senior Research Fellow at the Applied Criminology Centre, University of Huddersfield. Professor Ken Pease is Visiting Professor at the University of Loughborough. 相似文献
Ken PeaseEmail: |
Dr. Rachel Armitage is a Senior Research Fellow at the Applied Criminology Centre, University of Huddersfield. Professor Ken Pease is Visiting Professor at the University of Loughborough. 相似文献
23.
吴超令 《河南公安高等专科学校学报》2009,(1):70-72
对于在ATM机上非法使用诸如拾得、盗窃所得的他人信用卡取款等行为应当如何定性,理论界与实务界一直存有争论。传统刑法理论基于“机器不能被骗”的理论,认为此类行为不构成信用卡诈骗罪。但这种理论存在不可克服的缺陷。机器和人一样,都能够被骗。对于在ATM机上非法使用他人信用卡取款、转账等若干行为,应视情况不同具体予以定性。 相似文献
24.
团伙盗抢机动车犯罪的特点包括:作案时间呈全天侯状态;作案目标呈现从低档车向高档车发展的势头;作案地点呈现全方位的特点;作案手段向专业化、智能化发展;组织结构严密、分工明确;流窜跨区作案增多,对此应采取的对策主要包括:建立一支反团伙盗抢车辆的专门队伍;强化侦查措施和手段的运用;建立完善的防控体系;发挥现代科技检索系统作用;建立协作制度, 相似文献
25.
身份盗用的发展及其治理和研究趋势 总被引:7,自引:0,他引:7
身份盗用是指为了取得金钱、物品、服务等利益或者逃避义务和责任,盗窃他人身份证明信息以非法冒用他人身份的行为.根据西方发达国家的统计,身份盗用是近几年来发展最迅猛的犯罪活动,给个人、企业和社会都带来了巨大危害.中国作为一个经济迅猛发展、网民最多并渴望发展电子商务的国家,也日益面临着身份盗用的严重威胁.但我们对这一问题的认识还远远不够全面和深入.目的是要系统、全面的介绍身份盗用问题的内涵、发展,各国对身份盗用的治理实践以及学术界对这一问题的研究现状,以期为研究、预防和解决中国的身份盗用问题提供一定基础.为此,回顾了有关身份识别的理论;讨论了身份盗用的危害和影响范围、身份盗用的类型和过程;分析了身份盗用蔓延的原因以及身份盗用和身份欺诈的关系;并从政府治理、企业管理和消费者个人防护三个层面介绍了各国应对身份盗用的实践活动.最后讨论了对身份盗用问题的理论研究趋势和前景.作者希望引起学术同行们对身份盗用问题的重视,为深入研究中国的身份盗用问题起到抛砖引玉的作用. 相似文献
26.
近年来,农村挖洞盗窃案件发案率一直较高,作案手段粗暴,加之农村地形复杂,犯罪分子的反侦查能力较强,这类案件的破案率很低。分析与研究勘查这类盗窃案现场的规律,寻找解决方案十分必要。 相似文献
27.
This paper introduces the work of Project Marc (an EU-funded project to develop mechanisms for assessing the risk of crime)
and discusses both difficulties encountered throughout the project and progress made since the project ended. The authors
introduce the papers contained within this special edition and summarise their relevance to crime-proofing. The paper discusses
progress made within this field in the decade prior to Project Marc and makes recommendations to ensure that the ideas move
forward.
相似文献
Ken PeaseEmail: |