期刊文献+

计算机网络犯罪的认定和防控——以利用计算机网络实施损害商誉罪为视角 被引量:2

Identification and Prevention of Cybercrime From Perspective of Taking Advantage of Internet Goodwill Impairment Crime
下载PDF
导出
摘要 在当今网络时代的信息化环境下,计算机网络犯罪与传统犯罪相比具有主体复杂化、实施行为便捷化、作案手段隐蔽化和损害后果严重化的显著特征。在这些伴随计算机网络而生的犯罪新变化下,司法实践中出现了现行立法依据不足、犯罪证据搜集受阻和犯罪情节认定复杂等问题。在认清计算机网络犯罪与传统犯罪的区别后,需要采取完善法律规范、改进侦查技术、量化评价情节和增强防范意识的对策来防止和控制计算机网络犯罪。 In today's Internet age of information technology environment and compared with traditional crime, the cyber crime is more complicated, more convenient and more serious of consequences. Under these new changes, there appeared insufficient ju- dicial practice, hindrance of collecting evidence and difficulty of identifying a crime. After knowing the differences between cy- bercrime and traditional crime, we need to improve the legal norms, improve investigative techniques, quantitative evaluation of the plot and enhance the awareness of strategies in order to prevent and control cyber crime.
出处 《重庆交通大学学报(社会科学版)》 2015年第4期44-48,共5页 Journal of Chongqing Jiaotong University:Social Sciences Edition
关键词 信息化环境 计算机网络犯罪 认定困难 防控 对策 information environment computer network crime affirmation difficulty prevention strategy
  • 相关文献

参考文献4

二级参考文献8

共引文献58

同被引文献36

  • 1申柳华.《德国刑法计算机犯罪修正案研究》,见明辉,李昊主编.《北航法律评论》2013年第1辑,第233-243页,法律出版社2014年版.
  • 2《恐怖主义的网上推手--"东伊运"恐怖音视频》专题片发布,载央视网http://news.entv.cn/2014/06/24/ARTll403575644096677.shtml,最后访问日期:2016年4月30日.
  • 3Mark M.Pollitt,"Cyberterrorism:Fact or Fancy",Computer Fraud&Security,no2(1998).
  • 4Denning,D.,Cyberterrorism.Testimony before the Special Oversight Panel of Terrorism Committee on Armed Services,US House of Representatives,23 May,2000,载乔治敦大学网http://www.cs.georgetown.edu/denning/infosec/cyberterror.html,最后访问日期:2016年5月8日.
  • 5Gordon S,Ford R,"Cyberterrorism?"Computer Security,no 7(2002).
  • 6United Nations Counter-Terrorism Implementation Task Force Working Group,Report on Countering the Use of the Internet for Terrorist Purposes,2009:5.
  • 7United Nations Counter- Terrorism Implementation Task Force Working Group,Report on Countering the Use of the In- ternet for Terrorist Purposes ,2009:5.
  • 8《"白宫爆炸奥巴马受伤"假消息令美国股市暴跌》,载中国新闻网http://news.china.corn/international/1000/20130424/17797401.html,最后访问日期:2016年4月30日.
  • 9Trevor Calafato,Paul Caruana," Terrorism in Transition: The Implications of Cyber -Terrorism" , in Societies in Transi- tion, ed. Savvas Katsikides and Pavlos I. Koktsidis (Switzerland: Springer International Publishing,2015 ) ,212.
  • 10Dorothy E. Denning, "A view of cyberterrorism five years later" , in Internet security : hacking, counterhacking , and society, ed. K. Himma. (Sudbury :Jones and Bartlett Publishers ,2007 ) , 124. jl.

引证文献2

二级引证文献26

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部