首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   13篇
  免费   0篇
法律   13篇
  2011年   13篇
排序方式: 共有13条查询结果,搜索用时 250 毫秒
1.
Insider dealing has been unlawful in the UK since 1980 and market abuse, of which insider dealing is just one form, since 2000. It is from this time when the Financial Services Authority (FSA) was established and the creation of these as civil offences that they could be pursued rigorously. It is the purpose of this article to examine the FSA’s record of enforcement relative to (i) its estimated level of occurrence and (ii) the US experience.  相似文献   
2.
While a link is often made between the economy and crime levels, the evidence suggests that characteristics of an adverse economic climate can lead to either an increase or a decrease in crime. In this paper the impact of the recession on fraud is examined. This work is based on work undertaken by the author with fraud managers (via three group discussions), and interviews with sixteen fraudsters in prison. The findings underline the need for caution in making a link between increased levels of fraud and an adverse economic climate. More research is needed in this area to examine what types of offences, or what characteristics of them are most likely to be affected by poor economic conditions.  相似文献   
3.
The Copyright Act 1957 presents the face of modern copyright protection afforded to different intellectual works and is a key statement of intellectual property rights (IPR) in the Indian legislation governing this domain, as well as being compliant to the TRIPS Agreement on Trade Related Aspects of Intellectual Property Rights. This Act has been acceptably referred to on many occasions on global platforms, on account of its being one of the most elaborate and well-structured pieces of legislation in the field of intellectual property law. However, this well encompassing, highly creditable and widely acknowledged legislation seems to fall down in its practical implementation rendering its theoretical purpose partly futile. The situation so stands, that India continues to project major piracy rates with little regression in the trend despite the fact that this law is still very much in force. The reasons which deny effective copyright protection in India, for works of miscellaneous categories, have much to do with the lack of an equally strong enforcement mechanism. This paper provides an insight into the inadequacies of the Indian legal and administrative systems which have ultimately diminished the effectiveness of the copyright regime contrary to that envisioned by the law.  相似文献   
4.
The European Commission wants to boost the digital economy by enabling all Europeans to have access to online medical records anywhere in Europe by 2020. With the newly enacted Directive 2011/24/EU on patients’ rights in cross-border healthcare due for implementation by 2013, it is inevitable that a centralised European health record system will become a reality even before 2020. However, the concept of a centralised supranational central server raises concern about storing electronic medical records in a central location. The privacy threat posed by a supranational network is a key concern. Cross-border and Interoperable electronic health record systems make confidential data more easily and rapidly accessible to a wider audience and increase the risk that personal data concerning health could be accidentally exposed or easily distributed to unauthorised parties by enabling greater access to a compilation of the personal data concerning health, from different sources, and throughout a lifetime.  相似文献   
5.
This column provides a country-by-country analysis of the latest legal developments, cases and issues relevant to the IT, media and telecommunications’ industries in key jurisdictions across the Asia-Pacific region. The articles appearing in this column are intended to serve as ‘alerts’ and are not submitted as detailed analyses of cases or legal developments.  相似文献   
6.
In this paper we examine the legal aspects of the forensic investigation of peer-to-peer networks. Organisations may encounter instances where employees have used peer-to-peer software for a variety of types of computer misuse including the dissemination of copyrighted materials or indecent images, or instances where peer-to-peer software has been involved in the transmission of malware for malicious or criminal purposes. In this paper we examine the process of the forensic investigation of peer-to-peer networks, and the issues relating to obtaining digital evidence from such peer-to-peer networks.  相似文献   
7.
8.
Having regard to the impact of the credit crunch on fraud, the 19% average cuts in public spending and the wide disparities in fraud loss data, this article will argue for the mandating of fraud measurement through the introduction of legislation in the United Kingdom. The proposed statute applies to both the public and private sectors and incorporates minimum standards of measurement accuracy and the publication of findings and subsequent reduction strategies. In support of this contention this paper offers empirical evidence provided by the United States (US) Improper Payments Information Act of 2002. Further options for change are also presented including developing the role of the National Audit Office and the creation of an infrastructure for knowledge management through the sharing of best practice.  相似文献   
9.
Online auctions have emerged as one of the popular segments of e-commerce. The popularity of this technology-aided business model is evidenced by the continuous growth of eBay and other e-auction markets. However, this growth of online auctions has also led to a corresponding rise in deception and online criminal activity. This paper presents the findings of an original experiment undertaken to examine the evolving criminality associated with eBay auctions. The article examines eBay’s existing fraud prevention framework and evaluate its effectiveness in mitigating the risk. The research has identified foundation of eBay’s fraud problem - the inability of eBay’s fraud prevention architecture to identify and eliminate rogue traders with obscure identity and questionable reputation. The authors have proposed a proactive and holistic e-fraud prevention typology to enhance trader’s authentication to fight online auction fraud.  相似文献   
10.
With continual advances in Internet capability the child pornography market is experiencing a boom in demand and supply. Attempts to reduce the market challenge legislators, law enforcement agencies, practitioners and researchers alike – due in large part to the decentralised and global nature of the Internet. Much research has focused on frequent users of child pornography and whether such behaviour is interrelated with child sexual assaults. This article instead draws attention to onset, the first deliberate viewing of child pornography. It presents the results of a three-month study of a global Peer-to-Peer network, isoHunt. Analysis of the site’s Top 300 search terms indicated that child pornography is consistently shared. Risk factors for onset are discussed, including the potential normalisation of child pornography among Internet subcultures. Strategies are discussed to encourage subcultures to inhibit child pornography use and to increase understanding of the harms associated with such material. Implications for legal systems, policy and research are explored.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号