期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
诈术的双重视角分析
1
作者 孙利 《贵州警官职业学院学报》 2014年第5期3-9,共7页
在诈骗罪中,被害人之所以上当受骗,源于行为人使用了诈术。1诈术即欺瞒,表现为行为人与被害人之间的一个互动过程。对于诈术的判断,需要结合行为人、被害人两个维度进行分析。从行为人方面看行为人的行为是否具有危害性,从被害人角度看... 在诈骗罪中,被害人之所以上当受骗,源于行为人使用了诈术。1诈术即欺瞒,表现为行为人与被害人之间的一个互动过程。对于诈术的判断,需要结合行为人、被害人两个维度进行分析。从行为人方面看行为人的行为是否具有危害性,从被害人角度看被害人是否需要刑法来保护。只有从这两个方面考察都能得出肯定结论的,才是诈术,才能成立诈骗罪。结合两个维度来判断是否成立诈术的方法,可以为区分诈骗犯罪行为与民事欺诈行为提供思路。 展开更多
关键词 刑法 诈术 行为人 被害人 诈骗罪 民事欺诈行为
下载PDF
诈术盗窃与盗术诈骗的认定
2
作者 李刚 张生旭 《辽宁警察学院学报》 2015年第6期22-25,共4页
近几年来,随着经济的发展,盗窃与诈骗行为出现了一些新的方式,有的表现为盗中有骗,有的表现为骗中有盗,一度给司法工作带来认定上的难题,学者们对这两类行为该如何定性也是众说纷纭,观点不一。笔者试对这两类新形式的犯罪行为予以归纳,... 近几年来,随着经济的发展,盗窃与诈骗行为出现了一些新的方式,有的表现为盗中有骗,有的表现为骗中有盗,一度给司法工作带来认定上的难题,学者们对这两类行为该如何定性也是众说纷纭,观点不一。笔者试对这两类新形式的犯罪行为予以归纳,总结各家学说,分析学者们观点的利弊,并在此基础上提出自己的看法,以期抛砖引玉,引发学生们思考,给同行们提供深入研究的借鉴,为公检法一线部门提供理论上的参考。 展开更多
关键词 诈术盗窃 盗术诈骗 认定
下载PDF
丘吉尔与艾森豪威尔的兵诈术
3
作者 高士振 《航海》 1995年第4期13-13,共1页
1943年1月,美英首脑决定:北非战役一结束,立即集中欧、非地区的陆海空军主力,向意大利西西里岛发动进攻,扫除地中海交通线上的主要障碍,并迫使意大利投降。西西里岛为意大利属地,位于地中海中部系地中海要冲,战略地位十分重要。防守西... 1943年1月,美英首脑决定:北非战役一结束,立即集中欧、非地区的陆海空军主力,向意大利西西里岛发动进攻,扫除地中海交通线上的主要障碍,并迫使意大利投降。西西里岛为意大利属地,位于地中海中部系地中海要冲,战略地位十分重要。防守西西里岛的德意军共13个师,约36万人,另有飞机1400架。 展开更多
关键词 丘吉尔 艾森豪威尔 诈术 军事理论 希特勒 地中海舰队
下载PDF
透视民进党“反中牌”的诈术本质
4
《统一论坛》 2022年第1期65-66,共2页
全球最大政治风险咨询公司欧亚集团公布"2022年世界十大风险预测",认为科技巨头与政府争夺主权、美国中期选举将是全球最大风险,台湾问题因美中忙于内部问题而相对平稳,世界会进一步进入领导力真空的"零强国"(G-Ze... 全球最大政治风险咨询公司欧亚集团公布"2022年世界十大风险预测",认为科技巨头与政府争夺主权、美国中期选举将是全球最大风险,台湾问题因美中忙于内部问题而相对平稳,世界会进一步进入领导力真空的"零强国"(G-Zero)时代。 展开更多
关键词 民进党 领导力 美国中期选举 诈术 主权 风险
原文传递
法家与兵家 被引量:4
5
作者 赵小雷 《西北大学学报(哲学社会科学版)》 CSSCI 北大核心 2009年第1期44-49,共6页
分析法家对兵家的批判继承,采用综合比较的方法,以阐明法家思想中的军事因素,法家迫于战争环境的现实需要,其治国思想表现出很大的战时政策的特征,而兵家的治军理论则直接构成了它的思想渊源,兵家讲上下同欲者胜,法家讲一民于耕战;兵家... 分析法家对兵家的批判继承,采用综合比较的方法,以阐明法家思想中的军事因素,法家迫于战争环境的现实需要,其治国思想表现出很大的战时政策的特征,而兵家的治军理论则直接构成了它的思想渊源,兵家讲上下同欲者胜,法家讲一民于耕战;兵家讲恩威并重,法家讲以法赏罚;兵家讲立信,法家则讲信赏必罚;兵家讲诈敌,法家讲以循名责实驭臣民的诈术;兵家讲势,法家强调恃人不敢为非的制度化建设。法家在继承兵家思想的同时,将其治军措施扩大到了整个国家的领域,并更加系统化和制度化了。 展开更多
关键词 兵家 法家 赏罚 一民 诈术
下载PDF
The usage of technology in preventing and detecting fraud
6
作者 Vjollca Karapici Ibrahimi 《Chinese Business Review》 2010年第9期22-30,共9页
Auditors of information systems technology (IT) play a major role in the prevention of significant fraud and investigation. Fraud is hard to detect and even more difficult to prevent. All the auditors are responsibl... Auditors of information systems technology (IT) play a major role in the prevention of significant fraud and investigation. Fraud is hard to detect and even more difficult to prevent. All the auditors are responsible for detection, determination of fraud and use of anti-fraud programs. With rapid developments in information, communication and technology, it is no surprise that companies grow and secure IT system, but with the development of technology was developed and fraud schemes. Detection or not the auditor of the fraud, not fulfilling his work reflects you, or not drafting of a plan audit standards and procedures, but he has to do with personal ability auditor, to analyze the findings during the audit, use of tests, the natural limitations of internal control and the fact that most of the findings of the auditor of nature are more persuasive than effective. When you conduct an audit, auditor has a professional skeptic attitude that considers the risk of circumvention of control procedures by management and recognizes that simple fact, the audit procedures that are effective in connection with the discovery of errors, are not suitable for detection and identification fraud. This requires from the auditor to establish a procedure for considering the risk of fraud, in order to detect the exact appearance not as a result of fraud. A particular impact has The Model of Fraud Detection Strategy, as an 8 steps model for identifying fraud, using IT to collect, define and analyze the data and anomalies that highlight indicators of fraud. 展开更多
关键词 FRAUD TECHNOLOGY skeptic attitude
下载PDF
Forensic Auditing Techniques and Fraudulent Practices of Public Institutions in Nigeria
7
作者 Cletus O. Akenbor Uwaoma Ironkwe 《Journal of Modern Accounting and Auditing》 2014年第4期451-459,共9页
Public institutions are charged with the responsibility of providing essential services for the welfare of the citizens by manipulating the economy's financial flow through public expenditure, taxation, and so on. Th... Public institutions are charged with the responsibility of providing essential services for the welfare of the citizens by manipulating the economy's financial flow through public expenditure, taxation, and so on. The reliance on public institutions to provide public services in Nigeria has resulted in disappointing results, because chief executives of the institutions take less interest in the degree of its success, and this accounts for the high level of fraudulent practices in such institutions. This study, therefore, examined the relationship between forensic auditing and fraudulent practices in Nigerian public institutions. To achieve this purpose, some hypothetical statements were made and a review of relevant literature was explored. The population of the study consisted of the general managers and accountants of 12 public institutions in Nigeria. The data generated were statistically tested with the Pearson Product-Moment Correlation Coefficient. The findings suggest that both the proactive and reactive forensic auditing techniques have a negative significant relationship with fraudulent practices in Nigerian public institutions. Based on the above, it was recommended that: (1) The Economic and Financial Crime Commission (EFCC), the Independent Corrupt Practices Commission (ICPC), and other anti-corruption bodies in Nigeria should have, in their payroll, internal forensic auditors to supplement the duties of the internal auditors; (2) Forensic auditors should regularly undergo training and development programs to acquaint them with relevant knowledge and skills for effective forensic auditing; and (3) Forensic auditing should be made mandatory for public institutions by regulatory authorities rather than being voluntary. 展开更多
关键词 proactive auditing reactive auditing fraudulent practices forensic auditing Nigerian public institutions
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部