首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   59篇
  免费   1篇
各国政治   2篇
外交国际关系   5篇
法律   30篇
中国政治   2篇
政治理论   3篇
综合类   18篇
  2021年   3篇
  2020年   2篇
  2019年   3篇
  2018年   5篇
  2017年   5篇
  2016年   2篇
  2015年   4篇
  2014年   7篇
  2013年   7篇
  2012年   2篇
  2011年   2篇
  2010年   7篇
  2009年   2篇
  2008年   1篇
  2007年   3篇
  2006年   3篇
  2002年   1篇
  2001年   1篇
排序方式: 共有60条查询结果,搜索用时 0 毫秒
11.
网络犯罪伴随网络的产生而发展,尽管存在多年,但其法律定性一直受到争议.而我国法律、法规对网络犯罪的规定也存在诸多问题.当今,随着网络的普及,预防网络犯罪成为法学及犯罪学研究领域中最引人关注的课题,鉴于此,应对我国涉及网络犯罪的法律规定进行全方位的修改,以有效防止此类犯罪的急速蔓延.  相似文献   
12.
刘涛 《政治与法律》2020,(3):113-124
网络空间中的帮助行为实质不法具有行为对象上的不特定性、行为方式上的非外在可辨别性和侵害结果上的非实体性,网络帮助行为的不法归责模式因此具有独立化的必要。在功能主义的视角下,针对实质不法的特点,网络帮助行为不法归责模式凸显主观不法要素对不法归责范围的厘定效果和客观归责上的功能维护与管道治理的目标。网络帮助行为的不法归责不同于传统的犯罪参与归责模式,刑法对此类行为的规制较共犯归责原则宽松,但也应当对其进行合宪性解释,归责边界应当遵循社会宪治的理念,以社会功能分化的视角构建网络时代公民基本权利保护的刑法解释框架。  相似文献   
13.
The convergence of telecommunication and computer technologies that has evolved in the field of information and communication technologies (ICT) in the last two decades has had very important effects on new war technologies and the ongoing process of battlefield digitisation. The Stuxnet worm, uncovered in 2010 and responsible for the sabotaging of a uranium enrichment infrastructure in Iran, is a clear example of a digital weapon. The incident shows what is meant by cyber war and what the particular features of this new warfare dimension are compared to the conventional domains of land, sea, air and space, with relevance both at the operational and strategic levels. But cyberspace also extends to the semantic level, within the complimentary field of information warfare involving the content of messages flowing through the Internet for the purposes of propaganda, information, disinformation, consensus building, etc. The overall cyber warfare domain needs to be put into perspective internationally as many countries are developing strong cyber capabilities and an ‘arms race’ is already taking place, showing that these technologies can potentially be used to undermine international stability and security. What is needed is a public debate on the topic and its impact on global stability, and some kind of regulation or international agreement on this new warfare domain, including an approach involving confidence building measures (CBMs).  相似文献   
14.
Abstract

Cyber technology, both explicitly and implicitly, impacts every facet of local, state, national and international criminal justice operations. Unfortunately, technological changes, including cyber technologies, are rarely well thought out and may have unintended negative consequences. Additionally technology, and particularly cyber technology, evolves at a much faster pace than our understanding of the ethics, laws and policies involved. Consequently, citizens, criminals and justice professionals often rely on technology without the benefit of legal protections or explicit agency policy. This paper will examine how technology, both historically (non cyber) and contemporarily (cyber), has positively and negatively affected one aspect of the Criminal Justice enterprise – law enforcement.  相似文献   
15.
《Digital Investigation》2014,11(4):261-272
Internet technologies are beginning to influence the sale and supply of illicit drugs in Australia. One such technology, an online marketplace known as Silk Road, had dramatically increased in popularity since its worldwide launch in February 2011. This research and paper were completed prior to the Silk Road's founder, Ross Ulbricht being arrested on 2 October 2013 and Silk Road being taken off line. This research paper will consider such factors; as the increasing use of internet by Australians, the popularity of shopping online and the variance in the quality and price of products available on Silk Road to those available in other drug markets. The case study will provide an in-depth look at Silk Road from an Australian perspective and in light of the continuing popularity of illicit drug use in Australia. Though Silk Road is currently off line, ‘Bitcoin’ has survived and it will only be a matter of time before a substitute for Silk Road emerges.  相似文献   
16.
World leaders are beginning to look beyond temporary fixes to the challenge of securing the Internet. One possible solution may be an international arms control treaty for cyberspace. The 1997 Chemical Weapons Convention (CWC) provides national security planners with a useful model. CWC has been ratified by 98% of the world’s governments, and encompasses 95% of the world’s population. It compels signatories not to produce or to use chemical weapons (CW), and they must destroy existing CW stockpiles. As a means and method of war, CW have now almost completely lost their legitimacy. This article examines the aspects of CWC that could help to contain conflict in cyberspace. It also explores the characteristics of cyber warfare that seem to defy traditional threat mitigation.  相似文献   
17.
ABSTRACT

The prevalence and impact of cyber fraud continues to increase exponentially with new and more innovative methods developed by offenders to target and exploit victims for their own financial reward. Traditional crime reaction methods used by police have proved largely ineffective in this context, with offenders typically located outside of the police jurisdiction of their victims. Given this, some police agencies have begun to adopt a victim focused, crime prevention approach to cyber fraud. The current research explores with a sample of two hundred and eighteen potential cyber fraud victims, the relationship between online victimization risk, knowledge and use of crime prevention strategies. The study found those most at risk of cyber fraud victimization despite accurate perceptions of risk and knowledge of self-protective behaviors in the online environment underutilise online prevention strategies. This research has important implications for police agencies who are designing and delivering cyber fraud education. It provides guidance for the development of effective prevention programs based on practical skills development.  相似文献   
18.
Breaches of security, a.k.a. security and data breaches, are on the rise, one of the reasons being the well-known lack of incentives to secure services and their underlying technologies, such as cloud computing. In this article, I question whether the patchwork of six EU instruments addressing breaches is helping to prevent or mitigate breaches as intended. At a lower level of abstraction, the question concerns appraising the success of each instrument separately. At a higher level of abstraction, since all laws converge on the objective of network and information security – one of the three pillars of the EU cyber security policy – the question is whether the legal ‘patchwork’ is helping to ‘patch’ the underlying insecurity of network and information systems thus contributing to cyber security. To answer the research question, I look at the regulatory framework as a whole, from the perspective of network and information security and consequently I use the expression cyber security breaches. I appraise the regulatory patchwork by using the three goals of notification identified by the European Commission as a benchmark, enriched by policy documents, legal analysis, and academic literature on breaches legislation, and I elaborate my analysis by reasoning on the case of cloud computing. The analysis, which is frustrated by the lack of adequate data, shows that the regulatory framework on cyber security breaches may be failing to provide the necessary level of mutual learning on the functioning of security measures, awareness of both regulatory authorities and the public on how entities fare in protecting data (and the related network and information systems), and enforcing self-improvement of entities dealing with information and services. I conclude with some recommendations addressing the causes, rather than the symptoms, of network and information systems insecurity.  相似文献   
19.
Chinese officials are increasingly turning to a policy known as Informatisation, connecting industry online, to utilise technology to improve efficiency and tackle economic developmental problems in China. However, various recent laws have made foreign technology firms uneasy about perceptions of Rule of Law in China. Will these new laws, under China's stated policy of “Network Sovereignty” (“网络主权” “wangluo zhuquan”) affect China's ability to attract foreign technology firms, talent and importantly technology transfers? Will they slow China's technology and Smart City drive? This paper focuses on the question of whether international fears of China's new Cyber Security Law are justified. In Parts I and II, the paper analyses why China needs a cyber security regime. In Parts III and IV it examines the law itself.  相似文献   
20.
当今网络空间已成为人类生存的新空间、发展的新驱动和安全的新领域以及大国拓展国家利益、输出意识形态和建立战略优势的新载体,因此也成为大国竞争的新高地。大国网络竞争体现了新时代的新特点,中国作为重要的竞争方,既介于竞争之中,又深受竞争影响。大国网络竞争涉及多领域、多层面和多维度,主要围绕网络话语权和网络治理权展开,话语权是外在表现,核心是治理权以及由此延伸的主导权。大国网络竞争对中国网络安全的影响是全方位的,从技术、战术层面上升到政治、战略层面,对中国网络安全以及整体国家安全的重要性急剧上升。对中国来说,在网络空间领域机遇与挑战并存,如何利用好机遇、应对好挑战是筹划网络安全战略的重中之重。未来中国网络安全战略选择聚焦于破解以下四个问题,即树立什么样的网络安全理念、选择什么样的网络安全应对手段、提升什么样的网络安全能力、如何进行网络安全治理。在很大程度上,解答了这四个重要问题,等于找到了有效维护中国网络安全的正确路径。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号