首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Data and information constitute a valuable resource both for the companies in general and individuals in specific. The traditional paper based transaction has been replaced by electronic transaction and now a day’s most of the valuable data and information’s are stored in electronic medium. Therefore data and information security have become a matter of great concern for every agencies acting on faith of e-transaction. In India there remains an added significance owing to the fact that a growing number of companies seek more centralized and less expensive methods of processing information, they’re turning to offshore outsourcing to fulfill many of their business and human resources processes. Data theft is not in itself a new concept, but has become an increasingly important issue in the digital age. The new mode of communication, its malleability, transmissibility, networking capacity, affect our lives in many and sometimes surprising ways, it requires that we find new legal solutions for new social questions.  相似文献   

2.
The low self-control/risky lifestyles perspective posits that people deficient in self-control engage in certain risky behaviors that increase their exposure to motivated offenders in the absence of capable guardianship, which in turn elevates their risk of victimization. Using survey data from telephone interviews conducted in Florida and Arizona with individuals aged 60 and over, the current study tests whether this theoretical framework partially explains risky remote purchasing and identity theft victimization among older Internet users. Results from the two-stage probit models conform to expectations: Individuals with lower levels of self-control have a significantly higher probability of making a purchase after receiving an unsolicited email from a vendor with whom they have not previously done business. What is more, making a risky remote purchase significantly increases the probability of identity theft victimization. The findings not only speak to the generality of the low self-control/risky lifestyles perspective, but also indicate that older Internet users can reduce their victimization risk by taking specific precautions.  相似文献   

3.
Identity fraud as a term and concept in its formative stages was often presumed to be identity theft and visa versa. However, identity theft is caused by the identities (or tokens) of individuals or organisations being stolen is an enabling precursor to identity fraud. The boundaries of identity fraud and identity theft are now better defined. The absence of specific identity crime legislation could be a cause of perpetrators not classified as breaching identity crimes but under other specific entrenched law such as benefit fraud, or credit card fraud. This metrics overlap can cause bias in crime management information systems. This study uses a multi-method approach where data was collected in both a quantitative and qualitative manner. These approaches are used as a lens for defining different classes of online identity crimes in a crime management (IS) security context. In doing so, we contribute to a deeper understanding of identity crime by specifically examining its hierarchical classes and definitions; to aid clearer structure in crime management IS. We seek to answer the questions: should current law around identity fraud continue to be reinforced and measures introduced to prevent identity crime; should laws be amended; or should new identity crime laws be constructed? We conclude and recommend a solution incorporating elements of all three.  相似文献   

4.
Estate planners’ current strategies for the disposition of digital assets are quickly becoming out-dated. This is largely the result of ambiguities concerning proprietary rights of digital assets after death. When advising clients on how to plan for the succession of digital assets, it is important for estate planners to understand the nature of digital assets today and to recognize how these assets may evolve. In failing to take into account the evolving nature of digital assets, estate planners are liable to craft short-sighted and thus ineffective succession plans. As the popularity of digital executor businesses increases, estate planners ought to caution clients on their shortcomings. Additionally, legislatures must create statutes which outline the rights of individuals vis-à-vis online service providers.  相似文献   

5.
Official and victimisation data show that despite falling rates for motor vehicle thefts, much of the EU ‘organized crime’ related thefts have remained almost stable. Nevertheless, the car-theft market in the EU has changed, and so has the role of traditional destinations for stolen vehicles, such as Eastern Europe. The paper examines the demand, supply, and regulation factors that shape the structures of the vehicle theft market in Bulgaria, and smuggling patterns and offender behaviour in source countries, in particular Spain. We argue that such nuanced historical approach that takes into account a wider range of factors in destination countries can help explain the recent transformations in Europe’s vehicle-theft markets.
Tihomir BezlovEmail:
  相似文献   

6.
Livestock theft is common in many parts of sub-Saharan Africa. Experience of theft can deplete household assets and food resources. This article reports the findings of an exploratory study to investigate whether livestock theft patterns in Malawi reflect variations in the extent to which different animals are “CRAVED” (Concealable, Removable, Available, Valuable, Enjoyable, and Disposable), Clarke's mnemonic to explain preferences for items to steal. Measures of the elements of CRAVED were correlated with self-reported levels of theft for seven species of livestock using data from a cross-sectional, nationally representative survey of 11,280 households. Higher availability and disposability of livestock were significantly associated with higher levels of theft. Livestock displaying more CRAVED attributes were also stolen in greater numbers. The findings are cautiously interpreted as suggesting that livestock theft in Malawi is largely opportunistic. Implications from and for the application of CRAVED to livestock theft in Malawi are discussed.  相似文献   

7.
Digital identity management is fundamental to the further development of the Internet economy. It is a foundational requirement for most substantive e-commerce transactions and other online activities.  相似文献   

8.
Modern identity is valuable, multi-functional and complex. Today we typically manage multiple versions of self, made visible in digital trails distributed widely across offline and online spaces. Yet, technology-mediated identity leads us into crisis. Enduring accessibility to greater and growing personal details online, alongside increases in both computing power and data linkage techniques, fuel fears of identity exploitation. Will it be stolen? Who controls it? Are others aggregating or analysing our identities to infer new data about us without our knowledge or consent? New challenges present themselves globally around these fears, as manifested by concerns over massive online data breaches and automated identification technologies, which also highlight the conundrum faced by governments about how to safeguard individuals' interests on the Web while striking a fair balance with wider public interests. This paper reflects upon some of these problems as part of the inter-disciplinary, transatlantic ‘SuperIdentity’ project investigating links between cyber and real-world identifiers. To meet the crisis, we explore the relationship between identity and digitisation from the perspective of policy and law. We conclude that traditional models of identity protection need supplementing with new ways of thinking, including pioneering ‘technical-legal’ initiatives that are sensitive to the different risks that threaten our digital identity integrity. Only by re-conceiving identity dynamically to appreciate the increasing capabilities for connectivity between different aspects of our identity across the cyber and the physical domains, will policy and law be able to keep up with and address the challenges that lie ahead in our progressively networked world.  相似文献   

9.
Although the crime of identity theft has garnered a great deal of media attention, relatively little empirical research existed on the prevalence of the crime, its clearance rate by arrest, or the demographic characteristics of the victims and the identifiable offenders. The purpose of this article is to expand the knowledge of this growing crime. Using data from a large municipal police department located in Florida as a database, the findings suggested that the number of reported incidents of identity theft appeared to be growing at a greater rate than other theft-related offenses and the clearance rate for identity theft appeared to be declining. The typical apprehended offender was African American, female, unemployed, working alone, and was unknown to the victims, who tended to be White and male.  相似文献   

10.
本文结合史料,对汉语和我国法律中的“鉴定”与“司法鉴定”两个词语的来源与演变进行了回顾和分析。同时,还对鉴定一词当初引入法律和司法鉴定法律界定产生的历史和现实意义进行了初步阐述。  相似文献   

11.
Implementation of massively parallel sequencing platforms can bring a great contribution to Forensic Genetics field, with a great saving of time and costs, as well as allowing reliable results to be obtained from small or extremely degraded samples. The aim of this work was to analyze 124 SNP loci (90 autosomal and 34 Y-SNP) included in HID-Ion Ampliseq Identity Panel in a small sample from Rio de Janeiro state, Brazil. Samples from 12 non-related individuals were amplified with HID-Ion Ampliseq Identity Panel and sequenced on the Ion Torrent PGM platform (Thermo Fisher Scientific); genotypes were generated with HID SNP Genotyper plugin and forensic parameters were calculated with PowerStats v.12. All samples were successfully genotyped and were used to calculate allele frequencies, homozygosity, heterozygosity, random match probability (RMP) and exclusion power for all 90 autosomal SNP loci. Using the formula proposed by Budowle et al. (1996), only 4 of the 90 loci genotyped (4,4%) showed allele frequencies below the minimum required. It means that although a small set of individuals was used on this study, it may have shown a good perspective of Rio de Janeiro state allele frequencies. Among the 11 male samples analyzed, a prevalence of the haplogroup R1b of Y chromosome was observed, followed by the haplogroups E, Q and J. Such distribution reflects the results demonstrated in other studies for the population of Rio de Janeiro. All results together demonstrate the usefulness and applicability of SNP analysis on Ion Torrent PGM.  相似文献   

12.
This article analyses digital identity as an emergent legal concept in the United States of America, as a consequence of the move to place all federal government services on-line. The features and functions of digital identity and its legal nature are examined, and the consequences are considered.  相似文献   

13.
Public and private sector organisations are now able to capture and utilise data on a vast scale, thus heightening the importance of adequate measures for protecting unauthorised disclosure of personal information. In this respect, data breach notification has emerged as an issue of increasing importance throughout the world. It has been the subject of law reform in the United States and in other jurisdictions. This article reviews US, Australian and EU legal developments regarding the mandatory notification of data breaches. The authors highlight areas of concern based on the extant US experience that require further consideration in Australia and in the EU.  相似文献   

14.
This paper explores developments in privacy and data protection regulation in China. It argues that, since China is an emerging global economic power, the combination of domestic social economic development, international trade and economic exchange will encourage China to observe international standards of privacy and personal data protection in its future regulatory response.  相似文献   

15.
In the Internet of Things (IoT), identification and access control technologies provide essential infrastructure to link data between a user's devices with unique identities, and provide seamless and linked up services. At the same time, profiling methods based on linked records can reveal unexpected details about users' identity and private life, which can conflict with privacy rights and lead to economic, social, and other forms of discriminatory treatment. A balance must be struck between identification and access control required for the IoT to function and user rights to privacy and identity. Striking this balance is not an easy task because of weaknesses in cybersecurity and anonymisation techniques. The EU General Data Protection Regulation (GDPR), set to come into force in May 2018, may provide essential guidance to achieve a fair balance between the interests of IoT providers and users. Through a review of academic and policy literature, this paper maps the inherent tension between privacy and identifiability in the IoT. It focuses on four challenges: (1) profiling, inference, and discrimination; (2) control and context-sensitive sharing of identity; (3) consent and uncertainty; and (4) honesty, trust, and transparency. The paper will then examine the extent to which several standards defined in the GDPR will provide meaningful protection for privacy and control over identity for users of IoT. The paper concludes that in order to minimise the privacy impact of the conflicts between data protection principles and identification in the IoT, GDPR standards urgently require further specification and implementation into the design and deployment of IoT technologies.  相似文献   

16.
17.
The current study objective was to develop a revised version of the Measure of Criminal Social Identity (MCSI) with an increased number of indicators to more reliably capture three MCSI dimensions. Dimensionality and construct validity of the Measure of Criminal Social Identity – Revised (MCSI-R) was examined among a sample of systematically selected inmates (N = 2192). Four competing models of the MCSI-R were specified and tested using Mplus with weighted least squares with mean and variance adjustment estimation. Bifactor model with three meaningful factors (cognitive centrality, in-group affect and in-group ties) while controlling for the general factor was the best fit for the data. Good composite reliability of the three MCSI-R dimensions was established. The three subscales of the MCSI-R evidence differential predictive utility for prisonization, number of incarcerations, self-esteem and violent offending. Practical implications and directions for future research are discussed.  相似文献   

18.
论广东街面“两抢一盗”犯罪的精确打击   总被引:1,自引:0,他引:1  
刘国旌 《政法学刊》2007,24(1):47-50
严厉打击街面“两抢一盗”犯罪活动,是当前公安中心工作的重要任务之一。通过提高侦查人员的综合素质,加强对“两抢一盗”犯罪情报信息研判,精确获取街面“两抢一盗”犯罪证据,实施精确打击,是“专项整治”遏制“两抢一盗”犯罪的需要,是提高办案质量和对犯罪人员的打击处理率的重要保证,是公安机关打击街面“两抢一盗”犯罪这场战役是否取得成效的重要标准,也是我们当前加强街面“两抢一盗”犯罪案件侦查工作问题研究所面临的一个重要课题。  相似文献   

19.
当前中国盗窃、抢劫和抢夺犯罪形势严峻。严打行动的开展,对于遏制该类犯罪的高发态势有着积极意义,但也存在一些不足。治理犯罪,保护民生,需要多策并举、多措并举。  相似文献   

20.
陈家林 《法律科学》2011,(4):95-101
扒窃是指行为人以非法占有为目的,在公共场所秘密窃取他人随身携带财物的行为。《刑法修正案(八)》对盗窃罪的修改,即"……或者多次盗窃、入户盗窃、携带凶器盗窃、扒窃的……"因顿号的使用而容易产生歧义。对此应理解为"扒窃"行为是与多次盗窃、入户盗窃、携带凶器盗窃相并列的一种单独构成盗窃罪的条件,而不是仅将"携带凶器扒窃"的行为入罪化。扒窃行为区别于一般盗窃行为的特征:一是发生在公共场所;二是窃取的是"随身携带"的财物。这两个特征使扒窃行为的社会危害性程度超出了普通盗窃行为,而有了单独入罪的必要性与合理性。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号