日本免费精品视频,男人的天堂在线免费视频,成人久久久精品乱码一区二区三区,高清成人爽a毛片免费网站

在線客服
網絡犯罪學圖書
人氣:35

網絡犯罪學

正版圖書,品質保障^_^如需清單下單時請備注,下單即有精美書簽贈送!
  • 所屬分類:圖書 >法律>網絡法律法規  
  • 作者:[李興安]、[董淑君]
  • 產品參數:
  • 叢書名:--
  • 國際刊號:9787562072560
  • 出版社:中國政法大學出版社
  • 出版時間:2017-10
  • 印刷時間:2017-10-01
  • 版次:1
  • 開本:16開
  • 頁數:200
  • 紙張:膠版紙
  • 包裝:平裝-膠訂
  • 套裝:

內容簡介

本書探討了信息技術發展對于傳統社會控制機制樹立的挑戰,提出一個廣義的定義方法,認定了網絡犯罪的特點及其對于偵查概率和威懾效果的負面影響。鑒于現行有關網絡犯罪的法律框架在打擊網絡犯罪中其效甚微,本書主張,為使信息社會得到保護,法律威懾取得實效,國家之間、傳統空間與網絡空間之間的法律與管轄的鴻溝必須去除,才能追究犯罪主體的刑事責任。

編輯推薦

本店所有圖書均為正版 請放心購買,有任何問題請聯系在線客戶或致電,謝謝

作者簡介

李興安,旅歐華人學者。芬蘭圖爾庫大學法學博士,坦佩雷大學計算機科學博士。現任芬蘭國際信息社會研究所(三櫻智庫)首席科學家,愛沙尼亞塔林大學副教授,北京航空航天大學工業與信息化法治研究院特邀高級研究員,重點實驗室學術委員會委員。著有《網絡犯罪導論》、《網絡犯罪與威懾:構建網絡化信息社會的法律網絡》、《數據挖掘方法在犯罪研究中的應用》、《二十一世紀的網絡犯罪與網絡安全》、《網絡安全詞典》等。在國際學術刊物四十余篇。

董淑君,刑法學博士,中國政法大學副教授,碩士研究生導師,曾兼任北京市密云區人民檢察院副檢察長,曾任北京市華聯律師事務所執業律師。主要代表論著有:《刑法的要義》、《刑法概論》、《刑事錯判研究》等。

目錄

PREFACE

LIST OF FIGURES

LIST OF TABLES

TABLE OF CASES

ABBREVIATIONS

CHAPTER 1INTRODUCTION

11Social context of cybersecurity and cybercrime

12Structure of this book

CHAPTER 2DECIPHERING THE PHENOMENONOF CYBERCRIME

21Introduction

22Development of definition of computer crime

23Analysis of the previous shortcomings in defining

cybercrime

24How to define cybercrime?

25Reading of the "cyber" label of criminal phenomenon

26The necessity of a broad definition of cybercrime

27A definition based on roles of information systems

CHAPTER 3CLASSIFICATION OF CYBERCRIME

31What roles can information systems play in cybercrime?

32Comparison with other conceptions

33Conclusion

CHAPTER 4SUBJECTS AND SUBJECTIVEASPECTS OF CYBERCRIME

41Introduction

42Whats special with cybercriminals?

43The perceived context of the perpetrators

44Forms of organization

45Age and cybercrime

46Psychological features of cybercrime

47What motivates a cybercrime?

48Conclusion

CHAPTER 5RECOGNIZING CRITICAL FACTORSIN COMBATING CYBERCRIME

51Introduction

52Victimization in cybercrime

53Time in cybercrime

54Space in cybercrime

55The technological nature

56The complexity of cybercrime

57The costs of cybercrime

58The anonymity of the perpetrators

59Hidden victims

510The concealment of cybercrime traces

511The transterritoriality of cybercrime coverage

512The rampancy of cybercriminal phenomena

513Rentseeking from the exaggeration of insecurity

514Conclusions

CHAPTER 6THE HISTORICAL DEVELOPMENT OFCYBERCRIME AND DETERRENCE

61Basic observations on the development of criminalphenomena

62Computer hackers discovery of a lawless new frontier

63The rise of the law against the increasing number ofcybercrimes

64A legal system wrestling with networked adversaries

65The equilibrium between cybercrime and deterrence

66Conclusion

CHAPTER 7LIABILITY FOR CYBERCRIME

71Introduction

72Criminal liability, civil liability and administrative liability

73Individual liability and corporate liability

74Liability based on law and liability based on contract

75Intentional liability, negligent liability and reckless liability

76Direct liability and indirect liability

77Trespassers liability, third parties liability, and victimsliability

78Domestic liability, transnational liability, and internationalliability

79Offensive liability and defensive liability

710Punitive liability, exemplary liability and compensatoryliability

711Conclusion

CHAPTER 8CYBERJURISDICTION

81Introduction

82The legal basis for cybercriminal jurisdiction

83"Separate" or "international" jurisdiction?

84The specific space — the determination of the location ofconduct

85The specific player — the determination of the location of theperson

86Liabilitybased cybercriminal jurisdiction

87Critical factors in cybercriminal jurisdiction

88Conclusion

CHAPTER 9INTERNATIONAL ACTIONSAGAINST CRIMINALITY

91Introduction

92From domestic legislation to international harmonization

93Professional efforts of the International Criminal PoliceOrganization (Interpol

94Regional efforts

95Multinational efforts

96Global efforts by the United Nations (UN

97The focuses of international harmonization

98From conversation to the European Convention

99Limited progress in international harmonization

910Conclusion

CHAPTER 10CONCLUSIONS

101Dilemmas of cybercrime control

102The primary factors benefiting cybercrime

103The primary factors preventing cybercrime

REFERENCES

網友評論(不代表本站觀點)

免責聲明

更多出版社