首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   13篇
  免费   0篇
法律   5篇
中国共产党   1篇
中国政治   2篇
综合类   5篇
  2017年   1篇
  2010年   1篇
  2009年   3篇
  2006年   4篇
  2003年   1篇
  2001年   2篇
  2000年   1篇
排序方式: 共有13条查询结果,搜索用时 15 毫秒
1.
21世纪是一个高度信息化的时代,绚丽多彩的网络世界就像“潘多拉的盒子”,给人类带来种种便利和享受的同时,也导致了日益增多的网络犯罪。而在庞大的网民群体中,青少年占很大比重,因此青少年网络犯罪成为一个亟待解决的问题。分析青少年网络犯罪的成因,制定积极有效的防控措施,对青少年的成长和社会安定具有十分重要的意义。  相似文献   
2.
计算机网络犯罪及其防范   总被引:3,自引:0,他引:3  
张新海 《政法学刊》2001,18(6):35-39
随着计算机与网络技术的发展,计算机网络犯罪愈来愈猖獗,目前全球平均每20秒就发生一次Intenlet计算机入侵事件。在Intermet上的网络防火墙,超过1/3被突破,一些银行、企业、机构都未能幸免。作为一种新型的犯罪,其社会危害性极大,并有愈演愈烈之势。我们必须了解计算机网络犯罪的特点、原因及采取相应的对策。  相似文献   
3.
随着电子计算机、信息技术的飞速发展和会计改革的不断深化,会计电算化的普及率越来越高,从而也面临众多新的挑战,特别是电算化的安全问题面临严重的威胁,本文将就会计电算化的安全问题进行比较系统的分析,并就解决会计电算化安全问题提出相应的对策。  相似文献   
4.
计算机网络犯罪是以计算机网络处理的信息为犯罪对象,或以计算机网络作为攻击目标和犯罪工具的高科技犯罪,具有广地域性、隐蔽性、智能性、连续性等特征,其危害后果之大和侦查难度之高超过常规犯罪。为确保信息安全与社会稳定,必须通过改进管理、完善法律、强化国际合作的方式对网络犯罪实行有效的控制。  相似文献   
5.
The Internet is a global infrastructure, connecting individuals, regardless of their proximity to one another. But, the ability to connect on such a large scale has also been leveraged to coordinate illicit activities. This has led to the emergence of online illicit networks that have enabled broader participation in cybercrime. Online stolen data markets have been of particular interest to researchers, though the networks involved in the development, deployment and distribution of malicious software are far less explored, despite being intricately tied to the growing issue of cyber security. The current study identifies community structures within a larger network of hackers, malware writers and market actors and examines the underlying characteristics of these networks. Results suggest that the network is composed of modular communities formed largely of weak, non-redundant ties that follow the ubiquitous structure of complex networks. Implications, limitations and directions for future research conclude this paper.  相似文献   
6.
黑客产生于文化陷入空前危机的 6 0年代的美国。初期的黑客、黑客文化、黑客精神在推动计算机产生、发展以及捍卫网络自由方面曾作出过自己的贡献。但随着政治、经济环境的改变 ,网络构成的复杂化以及黑客文化的畸形发展 ,黑客含义也发生了变化 ,黑客与犯罪越来越难脱干系。  相似文献   
7.
近年来,我国宽带用户迅猛增长,宽带账号被盗用等安全问题也日益突出。宽带运营商和服务商实施的网络安全策略和方法不当而导致宽带用户权益遭受侵害成为网络安全的重要隐患之一,必须运用法律手段明确运营服务商的义务与权利,维护消费者合法权益;完善网络隐私权保护的法律体制,保护网络隐私权;规范网络收费行为,取消信用额度,避免造成宽带用户的经济损失。  相似文献   
8.
The Internet community has been addressing the unethical behavior of juvenile delinquents for years. Nevertheless, the concepts of hacker shame and ethics have received little empirical study from a theoretical perspective in the field of cyber criminology. Braithwaite's re-integrative Shaming Theory posits that it can restrain individuals from committing future offenses, and that those who participate in this shaming process are less likely to consider breaking the law in the first place. Among the abundance of criminological theories, the re-integrative Shaming Theory may be the most suitable theory to restrain hacker activities. This study focuses on the working relationship between nine juvenile delinquents and the shaming mechanism applied to them. However, applying this approach to reduce recidivism among computer hackers requires a great deal of time and effort. It is proposed that the state of shame or remorse is associated with the compounded affective processes of hacker ethics. The proposed solution creates a code of ethics for hackers, distinguishes right from wrong, and ensures a greater success for Braithwaite's re-integrative shaming methods. This paper discusses the problems and solutions related to the Shaming Theory, as well as their usefulness in the context of community-based restorative justice. It is argued that re-integrative shaming, without appropriate consideration for the offender's personal code of ethics, is insufficient when handling hacking offenses committed by juveniles. Our main concern is to find out how to help or encourage the offender's reintegration and re-entering into the community, and how s/he can avoid failure. It is hoped that our proposed strategy can prevent future offending behaviors by these juveniles. Implications drawn from the findings are discussed, and suggestions are offered to ensure the success of this theory when applied to juvenile hackers.  相似文献   
9.
随着计算机网络应用的迅猛发展,网络已经深深地渗透进社会生活的各个方面并直接影响到人们的生产和生活方式。这一巨大的发展变化对网络的稳定性、安全性和持续提供服务能力提出了更为严格的要求。对于计算机网络所面临的安全威胁应该从产品技术、法律法规、道德教育等多方位多层面采取防范措施,这样才能达到较为理想的效果。  相似文献   
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号