首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   33篇
  免费   0篇
法律   31篇
综合类   2篇
  2020年   1篇
  2019年   3篇
  2018年   6篇
  2017年   3篇
  2014年   1篇
  2013年   4篇
  2012年   3篇
  2011年   5篇
  2010年   2篇
  2009年   3篇
  2008年   1篇
  2007年   1篇
排序方式: 共有33条查询结果,搜索用时 187 毫秒
1.
青少年网络犯罪具有模仿网游暴力,犯罪方式智能化,网络犯罪主要集中在侵犯财产和网络攻击等领域的特点。青少年网络犯罪的成因有青少年自身因素的影响,网吧的肆意经营,家庭和学校教育的缺失等几个方面。为了营造一个良好的社会和网络环境,使青少年在网络时代健康地成长,有必要采取网络道德教育、运用技术手段构筑网络安全的"防火墙"、加强网吧安全管理、依法规范经营等几项措施。  相似文献   
2.
Online child pornography is a repulsive reality which cannot be ignored; the biggest child pornography manufacturing ring in South African history was cracked with the arrest of eight family members. There are more than 116 000 Internet searches daily for child pornography. Pornography is no longer confined to consenting adults, children are not only being exposed to pornographic material but are increasingly being used as victims of child pornography. In South Africa, the Internet and Cell phone Pornography Bill tabled in 2010 aims to make it illegal for Internet and mobile phone service providers to distribute pornography or permit it to be distributed. The objective of the Bill is to protect children from child pornography and women from the indignity of being seen as objects of pornography. This paper takes as its focal point the continuing crisis which centres on the conceptual framework, the existing legislation regulating online child pornography and measures to curb infringement.  相似文献   
3.
With increasing access to information and communication technologies such as the Internet, Ethiopia has recently taken responsive legislative measures. One such legislative measure is enactment of cybercrime rules as part of the Criminal Code of 2004. These rules penalize three items of computer crimes namely hacking, dissemination of malware and denial of service attacks. The cybercrime rules are however slightly outdated due to changes that have occurred in the field of cybercrime since the enactment of the Code. The surge of new varieties of cybercrimes previously uncovered under the Code and the need to legislate tailored evidentiary and procedural rules for investigation and prosecution of cybercrimes have recently prompted the Ethiopian government to draft modern and comprehensive cybercrime legislation, but the draft law still needs further work on cybercrimes in light of other major legislative developments at regional and national levels. This article closely examines major developments in cybercrime law and practice in Ethiopia since the enactment of the first set of cybercrime rules and proffers recommendations towards a unified cybercrime regime.  相似文献   
4.
This article provides a critical analysis of the Council of Europe Cybercrime Convention Committee's Guidance Note of Production Orders, published on 1 March 2017. The article looks at the legal controversies surrounding production orders with a cross-border element. It explains the Guidance Note's background and origins, the basic provisions in the Cybercrime Convention allowing the law enforcement authorities to order and obtain certain information and discusses the requirements that follow from the relevant provisions of the Convention. This analysis is complemented by four critical remarks on the way the Guidance Note pushes the boundaries of acceptable treaty interpretation on the necessity of the Guidance Note, its position in regard to extraterritorial enforcement jurisdiction and sovereignty, its reticence towards fundamental rights and its refusal to define or clarify the important notion of “subscriber information”. The article argues that unilateralism is not a solution. Instead of soft law plumbing, what is needed is an agreement between sovereign states checked by their constituencies.  相似文献   
5.
The shared concern expressed in the two quotes below is that modern technologies provide criminals with a capability to evade investigation. This comment piece examines some of the policy and legal options available to governments and law enforcement agencies to try to address this concern. While accepting the claim that this phenomenon represents a real challenge to law enforcement agencies, we currently have insufficient evidence to show the true extent of the problem. What this piece does not accept is the implication contained in the quotes, and often made explicit by others, that the use of encryption represents a fundamental and irreversible shift in the balance of power between criminals and their investigators from what previously prevailed. Such claims tend to lack historical perspective, which is one of the themes of this 200th issue of Computer Law and Security Review.  相似文献   
6.
Robust cyber-resilience depends on sound technical controls and testing of those controls in combination with rigorous cyber-security policies and practices. Increasingly, corporations and other organizations are seeking to test all of these, using methods more sophisticated than mere network penetration testing or other technical audit operations. More sophisticated organizations are also conducting so-called “Red Team” exercises, in which the organization tasks a small team of highly skilled and trained individuals to try to gain unauthorized access to physical and logical company assets and information. While such operations can have real value, they must be planned and conducted with great care in order to avoid violating the law or creating undue risk and reputational harm to the organization. This article explores these sometimes tricky issues, and offers practical risk-based guidance for organizations contemplating these types of exercises.  相似文献   
7.
《Global Crime》2013,14(1):146-157
Cyberspace and thus cybercrime know no boundaries. This chapter reviews some of the basic forms of cybercrime, draws specific attention to the issues that arise when offences occur across borders and in relation to organised criminal groupings, and provides illustrations based on some of the more celebrated cases of the past few years. The borderless nature of cyberspace and the exponential take-up of digital technology throughout the world guarantee that transnational cybercrime will remain a challenge. Fortunately, many nations are rising to this challenge, individually and collectively, but the web of international cooperation does have its holes and those nations that lag behind the leaders risk becoming havens for cybercriminals of the future.  相似文献   
8.
Following the example of Norway and other European Countries, such as Sweden and Denmark, in April 2007 the Dutch government started filtering and blocking web pages with child pornographic content. In this paper we present a research into the technological, legal and practical possibilities of this measure. Our study leads us to the conclusion that the deployment of filters by or on behalf of the Dutch government is not based on any founded knowledge concerning the effectiveness of the approach. Furthermore, the actions of the Dutch law enforcement authorities do not avail over legal powers to filter and block internet traffic. Consequently the Dutch filtering practice was found to be unlawful. The government could enact a law that provides the police with the relevant powers. However, child porn filters always cause a certain amount of structural overblocking, which means that the government is then engaged in structural blocking of information that is not against the law. This would be in conflict with basic rights as laid down in the European Convention on Human Rights and Fundamental Freedoms and in national legislation. Maintaining a blacklist that is serious in size (a necessary condition for being effective), and at the same time is up-to-date and error-free (which is needed to prevent overblocking), is very labour-intensive, if not impossible to maintain. From the Dutch national police policy perspective it follows that putting so much labour in maintaining a blacklist cannot be considered as a police task. Why then did the Dutch police start filtering? In a society where child pornography is judged with abhorrence, in which safety is rated higher then privacy, and in which managers and politicians frequently have a naive faith in technology, the advocates of internet filters against child pornography quickly find wide-spread support. Although this paper refers to the situation in The Netherlands, it includes a number of elements and issues that are relevant to other European States as well.  相似文献   
9.
Cybercrime is considered an issue of both local and global concern. Therefore, this study focuses on the local experience in cybercrime control of different countries, including the Republic of Turkey. The article discusses issues in cybersecurity policy and analyzes the legislative framework of the Republic of Turkey on cybercrime issues. The findings underlie the continuing education policy for cybersecurity employees. The study concludes that Turkey handles the current cybercrime situation with efficiency.  相似文献   
10.
It is increasingly argued that the primary motive of the cybercriminal and the major reason for the continued growth in cyber attacks is financial gain. In addition to the direct financial impact of cybercrime, it can also be argued that the digital data and the information it represents that can be communicated through the Internet, can have additional intrinsic value to the cybercriminal. In response to the perceived value and subsequent demand for illicit data, a sophisticated and self-sufficient underground digital economy has emerged. The aim of this paper is to extend the author’s earlier research that first introduced the concept of the Cybercrime Execution Stack by examining in detail the underlying data objectives of the cybercriminal. Both technical and non-technical law enforcement investigators need the ability to contextualise and structure the illicit activities of the cybercriminal, in order to communicate this understanding amongst the wider law enforcement community. By identifying the potential value of electronic data to the cybercriminal, and discussing this data in the context of data collection, data supply and distribution, and data use, demonstrates the relevance and advantages of utilising an objective data perspective when investigating cybercrime.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号