首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
Cybercrime investigation can be argued as still in its infancy. The technical investigation practices and procedures of global law enforcement are also still evolving in response to the growing threat of the cybercriminal. This has led to considerable debate surrounding the adequacy of current technical investigation models, examination tools and the subsequent capability of law enforcement to tackle cybercrime. To bridge the gap between low-level technology recovery and digital forensic examination, and to overcome the many technical challenges now faced by law enforcement; this paper presents an extended cybercrime investigation model capable of guiding the investigative practices of the broader law enforcement community. The Stages of Cybercrime Investigations discussed throughout this paper, demonstrate the logical steps and primary considerations vital to investigating cyber related crime and criminality. The model is intended to provide both technical and non-technical investigative resources, covering mainstream law enforcement, partner agencies and specialist technical services, with a formal and common structure when investigating the complex technical nature of cybercrime. Finally, the model is further aimed at providing cybercrime investigators with a means to consolidate understanding, share knowledge and communicate the resulting outcomes as an investigation moves through each relevant stage.  相似文献   

3.
On 5 November 2010 within the framework of the Fifth International Conference on Legal, Security and Privacy Issues in IT Law (LSPI) and associated conference series a Closing Workshop was held at the Universitat Internacional de Catalunya (UIC) to review and address the main challenges of Cybercrime. The event complemented the CLSR 150th Anniversary Seminar on Digital Identity held the previous evening at the Barcelona office of law firm Roca Juyent. The Workshop was supported by the Computer Forensics Laboratories CFLabs and by CLSR. Copies of the journal were distributed via a booth at the event to enable relevant papers published in the journal to be accessed during the workshop event. The Cybercrime Workshop provided an opportunity for academics, practitioners and consultants from different backgrounds and nationalities to come together and exchange ideas to discuss significant developments in Cybercrime and emerging issues on IT security.  相似文献   

4.
Cybercrime is considered an issue of both local and global concern. Therefore, this study focuses on the local experience in cybercrime control of different countries, including the Republic of Turkey. The article discusses issues in cybersecurity policy and analyzes the legislative framework of the Republic of Turkey on cybercrime issues. The findings underlie the continuing education policy for cybersecurity employees. The study concludes that Turkey handles the current cybercrime situation with efficiency.  相似文献   

5.
This article examines the relationship between mental disorder and criminality in Canada from the colonial period to the landmark 1992 Mental Disorder Amendments that followed the passing of Bill C-30. The history of this relationship has been shaped by longstanding formal and informal systems of social regulation, by the contests of federal–provincial jurisdiction, by changing trends in the legal and psychiatric professions, and by amendments to the federal Criminal Code. A study of these longer-term features demonstrates that there has been no linear path of progress in Canada's response to mentally unwell offenders. Those caught in the web of crime and mental disorder have been cast and recast over the past 150 years by the changing dynamics of criminal law, psychiatry, and politics. A long historical perspective suggests how earlier and more contemporary struggles over mental disorder and criminality are connected, how these struggles are bound by historical circumstance, and how a few relatively progressive historical moments emerging from these struggles might be recovered, and theorized to advantage.  相似文献   

6.
The non-consensual dissemination of sexually explicit images or videos for no legitimate purpose represents a serious sexual violation by means of breaching an individual's ability to control their own sexual identity. This article argues that the only adequate legal response to this behaviour is targeted criminal regulation, and that action on a regional level is within the European Union's competence by virtue of Article 83(1) TFEU. The approaches of EU Member States to the phenomenon through targeted criminal law are examined in order to extract positive and negative elements of the respective regulatory systems. Drawing on the experiences of these States, as well as on existing EU criminal directives, a draft directive is included to illustrate what form a European regional system of criminal regulation may take.  相似文献   

7.
转化犯是指行为人在实施某种犯罪之时或之后 ,由于特定事实因素的出现 ,使整个行为符合另一犯罪的构成 ,法律规定以后一犯罪定罪处罚的犯罪形态。考察我国现行刑法中转化犯的立法例 ,不难发现其中至少有两方面的问题 :一是部分立法例与其转化罪条文之间存在协调性不够的技术性欠缺 ,二是还有部分立法例作为转化犯的理论根据不足。转化犯立法有其积极的意义 ,但是法定刑配置不协调 ,必然导致罪与刑的不均衡和实质上的不公正 ;部分立法例设置根据的不足 ,也给转化犯理论本身带来一定程度的混乱。  相似文献   

8.
Robust cyber-resilience depends on sound technical controls and testing of those controls in combination with rigorous cyber-security policies and practices. Increasingly, corporations and other organizations are seeking to test all of these, using methods more sophisticated than mere network penetration testing or other technical audit operations. More sophisticated organizations are also conducting so-called “Red Team” exercises, in which the organization tasks a small team of highly skilled and trained individuals to try to gain unauthorized access to physical and logical company assets and information. While such operations can have real value, they must be planned and conducted with great care in order to avoid violating the law or creating undue risk and reputational harm to the organization. This article explores these sometimes tricky issues, and offers practical risk-based guidance for organizations contemplating these types of exercises.  相似文献   

9.
Analysing large amounts of data goes to the heart of the challenges confronting intelligence and law enforcement professionals today. Increasingly, this involves Internet data that are ‘open source’ or ‘publicly available’. Projects such as the European FP7 VIRTUOSO are developing platforms for open-source intelligence by law enforcement and public security, which open up opportunities for large-scale, automated data gathering and analysis. However, the mere fact that data are publicly available does not imply an absence of restrictions to researching them. This paper investigates one area of legal constraints, namely criminal-procedure law in relation to open-source data gathering by the police. What is the legal basis for this activity? And under what conditions can domestic and foreign open sources be investigated?  相似文献   

10.
“The parties can only choose facultative legal norms,” “the parties of all foreign-related civil and commercial cases may agree to choose Chinese law as the applicable law governing their legal relationship,” and “the applicable law to the contract chosen by the parties shall not avoid the mandatory provisions of Chinese law” —such viewpoints that have substantial influence among the theorists and in the judicial practices of Chinese private international law are actually based on misunderstandings of Chinese private international law. It is a task of the private international law community of China to eliminate such misunderstandings, hence facilitating the healthy development of Chinese private international law.  相似文献   

11.
The current paper aimed to investigate the effectiveness of five law enforcement interventions in disrupting and dismantling criminal networks. We tested three law enforcement interventions that targeted social capital in criminal networks (betweenness, degree and cut-set) and two interventions that targeted human capital (actors who possess money and those who possess precursor chemicals). These five interventions are compared with each other and with random (opportunistic) removal of actors in two settings: (i) with network adaptation incorporated into the simulations and (ii) without network adaptation. Results illustrate that the removal of actors based on betweenness centrality was the most efficient strategy, leading to network disruption in the least number of steps and was relatively consistent across replications. Targeting actors who possessed money was the second most effective overall and was also relatively consistent in its disruptive effect.  相似文献   

12.
我国土地所有权制度对民法典中物权立法的影响   总被引:4,自引:0,他引:4  
关涛 《法学论坛》2006,21(2):68-75
土地公有制与私法理念的差异使我国的物权立法遇到前所未有的挑战,国家土地所有权集民事主体与行政主体于一身,便于政府对土地利用行为进行积极的干预以确保土地的可持续利用,但也可能因为过分的干预而影响土地的利用效率,干预的形式主要应该是对土地规划的严格执行。在社会主义市场经济条件下,与发达国家相比,我国的土地权利体系中缺乏土地下级所有权这样一个中间环节,影响了土地的利用效率。  相似文献   

13.
This article examines the topography and “cultural machinery” of forensic jurisdictions in Imperial Germany. It locates the sites at which boundary disputes between psychiatric and legal professionals arose and explores the strategies and practices that governed the division of expert labor between them. It argues that the over-determined paradigms of ‘medicalization’ and ‘biologization’ have lost much of their explanatory force and that historians need to refocus their attention on the institutional and administrative configuration of forensic practices in Germany. After first sketching the statutory context of those practices, the article explores how contentious jurisdictional negotiations pitted various administrative, financial, public security, and scientific interests against one another. The article also assesses the contested status of psychiatric expertise in the courtroom, as well as post-graduate forensic psychiatric training courses and joint professional organizations, which drew the two professional communities closer together and mediated their jurisdictional disputes.  相似文献   

14.
论赌博罪的完善——法经济学的视角   总被引:1,自引:0,他引:1  
张林鸿 《河北法学》2007,25(8):76-79
我国刑法已明确地将赌博作为一种犯罪进行处罚.但由于我国法律没有很好地考虑刑罚的效率性和经济性,在赌博犯罪立法上还存在着一定的缺陷和漏洞.通过法经济学方法,对赌博犯罪立法的正当性和效率性进行分析,提出完善我国赌博犯罪立法的建议.  相似文献   

15.
Howard Zinn has been classified in a number of ways for his many social contributions. However, despite the breadth of his work, he has never been considered a criminologist. It is likely that this is the result of the inaccurate perceptions many Americans have about crime being a predominantly street‐level social problem. Zinn maintains that the social harms caused by those in positions of political and economic power are in fact crimes against humanity that are far more destructive and violent than the actions our legal system has historically deemed criminal. He also points to the ways our criminal justice system is unjust and ineffective, and has demonstrated how social inequality ensures that the disadvantaged will be further subordinated by the criminal justice system. Zinn’s critical contributions about the most significant sources of social harm, the unjust nature of the American justice system, and the influence of social inequality offer an unorthodox criminological perspective that deserves special consideration. His unconventional criminology calls for increasing social justice by means of political dissent, social resistance, and civil disobedience.  相似文献   

16.
《大清新刑律》是清末法律改革的产物 ,从体系到内容都移植了西方刑法。它遭到礼教派的种种责难 ,这表明清末移植西方刑法的艰难。虽然《大清新刑律》在清末没有得到实施 ,但它的颁布使中国刑法走上了近代化的道路 ,并成为民国时期刑法的重要历史渊源。  相似文献   

17.
ABSTRACT

The experience of Roman law in legal education in England and Wales may serve as a cautionary tale for EU law post-Brexit. Similarly, past debates as to the position of Roman law in the curriculum may also be instructive in the EU law context. After tracing the history of the teaching of Roman law in England and Wales, this article posits first that the factors that appear to have caused the decline of Roman law could apply equally in the context of EU law. Secondly, based on both pragmatic and liberal education arguments that have historically been proffered for the study of Roman law, it advances arguments for the retention of a compulsory stand-alone EU law module in England and Wales after Brexit. To this end, the paper contends that the arguments for the retention of EU law in legal education are more robust than those asserted traditionally in favour of Roman law.  相似文献   

18.
Between May 1997 and August 2006 over 3,000 new crimes and offences entered the statute book expanding the criminal law exponentially and insinuating criminal liability into areas of everyday life previously untouched. This unremitting intensification of the criminal law where often quite random and unrelated provisions are embedded in huge, generic and virtually annual Criminal Justice Acts has made the law inaccessible and unknowable to the public, and uncertain to those charged with interpreting and applying it. This article examines the phenomenon of accretion in the criminal law within the last decade drawing on historico-legal contexts, jurisprudential theory (particularly the Rule of Law), and contemporary illustrations. It argues that uncontrolled legislative accretion and a bloated statute book may introduce dangerous levels of uncertainty into the law not only undermining its integrity but eroding the essential mutual respect between government and the governed which legitimises the authority of the criminal law. The political hothouse of spin-cycle government has sought to rely on the creation of new law as the panacea to all ills blurring the democratic boundary between citizen and government.
Candida HarrisEmail:
  相似文献   

19.
嫖宿幼女罪从设立以来,一直存在争议。从比较法的视角来看,嫖宿幼女罪乃是世界刑事立法的另类:其原因不仅在于这一罪名本身存在着法律上悖论,逻辑上的混乱.更为重要的是,这一罪名的设立违背社会基本的道德良知.  相似文献   

20.
杜威  邹先霞 《政法学刊》2004,21(1):106-107
随着社会信息化的进一步加快,计算机网络犯罪的形势更加严峻,公安工作也面临着新的挑战。加强公安大学生的计算 机网络教育势在必行,因此,在教学中应加强计算机网络知识的教育,同时采用多样化的课外教育形式,以使得公安大学生成为既熟 悉公安业务,又精通计算机的复合人才。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号