首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
《Global Crime》2013,14(3):160-175
Social researchers are facing more and more challenges as criminal networks are expanding in size and moving to the Internet. Many efforts are currently under way to enhance the technical capabilities of researchers working in the field of cybercrimes. Rather than focusing on the technical tools that could enhance research performance, this article focuses on a specific field that has demonstrated its use in the study of criminal networks: social network analysis (SNA). This article evaluates the effectiveness of SNA to enhance the value of information on cybercriminals. This includes both the identification of possible targets for follow-up research as well as the removal of subjects who may be wasting the researchers' time. This article shows that SNA can be useful on two levels. First, SNA provides scientific and objective measures of the structure of networks as well as the position of their key players. Second, fragmentation metrics, which measure the impact of the removal of n nodes in a network, help to determine the amount of resources needed to deal with specific organisations. In this case study, a tactical strike against the network could have had the same destabilising impact as a broader approach. The resources saved by limiting the investigation targets could then be used to monitor the criminal network's reaction to the arrests and to limit its ability to adapt to the post-arrest environment.  相似文献   

2.
What has been happening as regards the organization of Russia's agrarian sector in recent years? Agronomists have expressed the most diverse, often diametrically opposed views on this topic. Some say that the reforms are "incomplete" (referring, in particular, to such aspects as the transformation of agricultural enterprises and the privatization of landownership). Others blame the reforms, coupled with various macroeconomic regulations, for the "collapse" of large-scale farming and the severity of the agricultural crisis. Still others say that the real reforms have not yet begun, and that what we see in agriculture is the "stabilization" and stagnation of economic forms.  相似文献   

3.
The 1996 Criminal Code of the Russian Federation [CC RF] is very incomplete, as is particularly evident in many of its statutes. For instance, Article 2, Part 1, in defining the purpose of the code, cites the social values safeguarded by criminal law in a sequence corresponding to their relative importance in the Constitution of the Russian Federation: human rights and freedoms, property, public order, public safety, the environment, and the constitutional order of the Russian Federation.  相似文献   

4.
俄罗斯民法典中继承法律规范的新变化   总被引:2,自引:0,他引:2  
俄罗斯自1 985年进行经济体制改革后,为反映改革后财产关系的重大变化并尽早结束改革时期各单行法相互抵触的局面,从1 992年开始起草第三部民法典,〔1〕历时近1 0年,于2 0 0 1年底颁布了第三部分。俄罗斯这部新民法典反映了俄罗斯市场经济体制变革的结果,其中许多规范都是对改革后形成的新的关系的调整。本文将研究的注意力集中在该法典第三部分第五编“继承权”〔2〕上,重点介绍和分析《俄罗斯新民法典》中继承法律规范的某些新的变化,以供中国的立法者和研究者借鉴参考。《俄罗斯新民法典》第五编“继承权”分为五章,共76条。这五章的标题…  相似文献   

5.
俄罗斯联邦新刑事诉讼法典中的证据法问题   总被引:7,自引:0,他引:7  
20 0 1年 1 1月 2 2日 ,俄罗斯国家杜马通过了《俄罗斯联邦刑事诉讼法典》草案 ,新的《俄罗斯联邦刑事诉讼法典》于 2 0 0 2年 7月 1日生效。经修订的俄罗斯联邦刑事诉讼法典中涉及证据和举证证明的概念问题受到特别的关注。一、关于证据的概念及内涵1 92 2年和 1 92 3年通过的最早的两部《苏俄刑事诉讼法典》中没有证据的规范性定义。1 958年的《苏联和各加盟共和国刑事诉讼纲要》(第 1 5条 )和 1 960年的《苏俄刑事诉讼法典》(第 69条 )提出了这样一个证据定义 :“刑事案件的证据是调查机关、侦查员和法院据以判明危害社会的行为是否存在…  相似文献   

6.
7.
The Concept for Ensuring Internal Security Within the Russian Ministry of Internal Affairs outlines goals, principles, and measures of ensuring internal security, defines threats to internal security and criteria for assessing the state of internal security, assigns responsibility for ensuring internal security, and sets out key areas of protection of internal security in the MVD.  相似文献   

8.
The Internet community has been addressing the unethical behavior of juvenile delinquents for years. Nevertheless, the concepts of hacker shame and ethics have received little empirical study from a theoretical perspective in the field of cyber criminology. Braithwaite's re-integrative Shaming Theory posits that it can restrain individuals from committing future offenses, and that those who participate in this shaming process are less likely to consider breaking the law in the first place. Among the abundance of criminological theories, the re-integrative Shaming Theory may be the most suitable theory to restrain hacker activities. This study focuses on the working relationship between nine juvenile delinquents and the shaming mechanism applied to them. However, applying this approach to reduce recidivism among computer hackers requires a great deal of time and effort. It is proposed that the state of shame or remorse is associated with the compounded affective processes of hacker ethics. The proposed solution creates a code of ethics for hackers, distinguishes right from wrong, and ensures a greater success for Braithwaite's re-integrative shaming methods. This paper discusses the problems and solutions related to the Shaming Theory, as well as their usefulness in the context of community-based restorative justice. It is argued that re-integrative shaming, without appropriate consideration for the offender's personal code of ethics, is insufficient when handling hacking offenses committed by juveniles. Our main concern is to find out how to help or encourage the offender's reintegration and re-entering into the community, and how s/he can avoid failure. It is hoped that our proposed strategy can prevent future offending behaviors by these juveniles. Implications drawn from the findings are discussed, and suggestions are offered to ensure the success of this theory when applied to juvenile hackers.  相似文献   

9.
10.
11.
12.
Open interviews and unplanned conversations with criminals are an important part of ethnographic research in criminology. This paper presents an analysis of conversations with members of Russian criminal groups. An attempt is made to explore the value of these informal interviews, the danger of informal contacts with criminals, and the reliability of the information received.
Dina SiegelEmail:
  相似文献   

13.
The author argues that Russian foreign policy should focus not on enhancing Russia's status as a great power but on tapping external resources to facilitate the country's modernization. This means relying on instruments of "soft power" and seeking to integrate with the European Union (EU). It also means promoting a new vision of European security in place of the remnants of the cold war.  相似文献   

14.
The director of the well-known Gastronom [gourmet food store] No. 1 (the Eliseevskii), Iurii Konstantinovich Sokolov, was sentenced to be shot for having received and given bribes. I do not remember exactly how much: he received 300,000 rubles and gave out 200,000, or maybe vice versa.  相似文献   

15.
汪介之 《金陵法律评论》2004,(4):114-119,138
俄国现代主义小说随着俄国现代主义文学思潮兴起于白银时代,成果显著,甚至像高尔基这样的现实主义作家的某些作品也具有现代主义因素.20世纪30至50年代初,现代主义小说的发展受到阻遏,但仍有一些作家写出了现代主义杰作.从60年代末期起,现代主义小说再度出现,同时后现代主义小说也接踵而来,成为现代主义小说在上世纪晚期俄罗斯文学中的变体.  相似文献   

16.
当代俄罗斯的国家财产制度   总被引:1,自引:0,他引:1  
张建文 《河北法学》2006,24(9):129-133
当代俄罗斯的国家财产制度经历了一个从社会主义全民所有财产到国有财产的重大变迁,社会主义全民所有财产断裂为国有财产(俄罗斯联邦国有财产、俄罗斯联邦主体国有财产)和市有财产.拟通过对全民所有财产到国有财产的变迁、当代俄罗斯国家财产的法权构造以及当代俄罗斯国家财产理论的基本特点的分析,以期深刻全面地揭示当代俄罗斯的国家财产制度.  相似文献   

17.
王树义 《现代法学》2004,26(6):186-191
对他国法律的考察,重在解析其中所蕴含的理论问题,以找到理论与实践、“本土化”与借鉴之间的结合点。本文结合俄罗斯联邦森林立法和其他立法的具体实践,重点研究了俄罗斯联邦森林法的调整对象、森林关系的主体、客体及俄罗斯联邦的森林权属等几个基本理论问题,旨在为我国森林法律制度的建立、健全或完善提供有益的参考。  相似文献   

18.
The following case report describes an accidental stabbing that occurred on Halloween. The unwitting victim, while preparing for a holiday charade, stabbed himself with an ornamental dagger. By placing himself in a potentially hazardous situation, the victim's behavior entailed risk taking. The psychological implications of such risk taking are complex, and may be compared to such behaviors as russian roulette, gambling, and parasuicide.  相似文献   

19.
20.
俄罗斯联邦军事检察制度   总被引:1,自引:0,他引:1  
俄罗斯联邦现行军事检察制度是对传统俄罗斯军事检察制度的延续与发展。作为俄罗斯联邦国家检察制度体系的分支,一方面,俄罗斯联邦军事检察制度在根本宗旨、基本任务与一般检察职权等方面与俄罗斯联邦国家检察制度保持高度统一。另一方面,俄罗斯联邦军事检察制度在组织机构、管辖范围、干部配备与职权划分等方面又具有自己独到之处。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号