共查询到19条相似文献,搜索用时 46 毫秒
1.
2.
孔晓溪 《网络安全技术与应用》2012,(1):62-63
计算机信息技术的迅速发展和普及在给人们提供方便快捷的同时,也给了不法分子以可乘之机。跨国网络犯罪的滋生、蔓延和扩大不仅侵害到了人们的财产、隐私及安全,还对社会政治、经济秩序造成了严重的影响。把握跨国网络犯罪的特征,并提出切实有效的防控对策才能遏制和打击跨国网络犯罪的发展及其危害的扩大。 相似文献
3.
网络犯罪的国际刑事管辖权 总被引:2,自引:0,他引:2
随着网络犯罪的产生,网络犯罪管辖权的冲突亦随之出现。网络犯罪的犯罪行为地本身因为网络的虚拟性、跨国性、无国界性是难以确定的,而犯罪行为地往往与犯罪结果地不一致,这将导致凡是与该网络犯罪案件有联系的国家或地区都将对该案拥有管辖权,那么该怎样解决之? 相似文献
4.
戈治文 《网络安全技术与应用》2023,(10):145-146
跨国网络犯罪属于一种新兴的跨国犯罪类别,国际刑事司法协助因为其在打击跨国网络犯罪的过程中发挥的重要作用,越来越受到国际社会的关注和重视。但跨国网络犯罪与国际刑事司法协助固有特性的融合交叠容易诱发行管辖权激烈冲突、电子证据跨境调取困难和引渡受限等潜在法律风险。为了有效防范风险,推动跨国网络犯罪国际刑事发展协助的高效有序进行,应当完善协调管辖权冲突的规则,优化证据跨境调取的路径,完善引渡有关的制度。通过对跨国网络犯罪司法协助的途径以及具体规则的完善从而实现对跨国网络犯罪的治理。 相似文献
5.
网络犯罪是指行为人通过计算机、通信等技术手段,或者利用其所处的特殊地位,在网络环境中实施的,侵害或威胁法律所保护的利益的行为。其范围十分广泛,它不仅涉及对计算机系统及其信息的侵犯,也关系用户的合法利益,如财产权、知识产权、隐私权等,常常还会危及国家安全、公共安全、市场经济秩序、社会管理秩序等。 相似文献
6.
7.
8.
9.
10.
网络吸贩毒犯罪初探 总被引:1,自引:0,他引:1
李三珊 《网络安全技术与应用》2011,(12):63-64
近年来,公安机关打击互联网犯罪行动成果显著,然而,最近发生的"8.31特大网络吸贩毒案"又给我们敲响了警钟——打击网络犯罪任重道远。本文主要介绍了网络吸贩毒犯罪的现状、特点以及公安机关应该如何治理网络吸贩毒犯罪。 相似文献
11.
《Information Security Journal: A Global Perspective》2013,22(2):87-94
ABSTRACT This essay discusses the nature of transnational organized crime (TOC) and its activities affecting today's electronic landscape. It is assumed that the reader is familiar with IT-related information security in general, and therefore the technicalities around networks and information systems will be avoided as many papers and books cover these subjects extensively. Most security practitioners are familiar with the technical aspects of IT-related attacks (referred to here as cyber attacks or crimes) but not so with the organization and structure of the groups behind these attacks. We will further explore the origins and evolution of TOC, and how it influences and is influenced by today's omnipresent ‘speed of thought’ digital society. 相似文献
12.
孔晓溪 《网络安全技术与应用》2012,(3):67-68
互联网络是把双刃剑,提供方便的同时,也引发了诸多问题。国内外学者从各个视角研究和探讨了网络犯罪,但到目前为止,国内外学者还未对网络犯罪概念形成统一的认识。笔者通过对国内学者的网络犯罪定义进行理解评析和综合概括,认为网络犯罪是指以互联网络为工具或者对象的犯罪形式,并将其分为网络工具型犯罪及网络对象型犯罪。 相似文献
13.
本文以网吧中的网络犯罪为落脚点,剖析了网吧作为提供网络服务的场所,在网络犯罪日益猖獗的今天扮演了什么角色,阐述了网吧中主要存在的网络犯罪行为,通过分析最后从网吧治理、公安监管和政府保障三个方面深入阐述了预防网络犯罪的措施. 相似文献
14.
Francis Andoh-Baidoo Babajide Osatuyi K. Niki Kunene 《Information Technology for Development》2014,20(2):140-164
In this paper, we present architecture for managing knowledge on cybersecurity in Sub-Saharan Africa. This architecture captures the critical contextual factors in the Sub-Saharan African region. The architecture enables the creation, storage/retrieval, transfer and application of knowledge on cybersecurity especially for home users while providing awareness and enforcement mechanisms to help home users protect themselves against cyber threats. The architecture can facilitate the building of expertise on cybersecurity among the stakeholders. The implications of the proposed architecture are presented. 相似文献
15.
该文探讨了木马技术的工作原理和工作方式,分析了经典木马的启动方式、连接方式、运行方式、传播方式、AAV方式等技术。然后进一步分析了木马技术在云计算环境下的最新发展趋势及新的特征。并通过实例来阐明木马犯罪的危害性和严重性。最后该文呼吁加大针对利用木马技术违法犯罪的打击和防范力度。 相似文献
16.
内存取证研究与进展 总被引:1,自引:0,他引:1
网络攻击内存化和网络犯罪隐遁化,使部分关键数字证据只存在于物理内存或暂存于页面交换文件中,这使得传统的基于文件系统的计算机取证不能有效应对.内存取证作为传统文件系统取证的重要补充,是计算机取证科学的重要组成部分,通过全面获取内存数据、详尽分析内存数据,并在此基础上提取与网络攻击或网络犯罪相关的数字证据,近年来,内存取证已赢得安全社区的持续关注,获得了长足的发展与广泛应用,在网络应急响应和网络犯罪调查中发挥着不可替代的作用.首先回顾了内存取证研究的起源和发展演化过程;其次介绍了操作系统内存管理关键机制;然后探讨了内存取证的数据获取和分析方法,归纳总结目前内存取证研究的最新技术;最后讨论了内存取证存在的问题、发展趋势和进一步的研究方向. 相似文献
17.
面向云计算的计算机网络犯罪侦查取证的思考 总被引:1,自引:0,他引:1
栾润生 《网络安全技术与应用》2011,(12):68-70
随着计算机技术和网络技术的飞速发展,计算机网络犯罪案件也在迅猛增长,尤其是犯罪手法、手段不断变换。本文首先对计算机网络犯罪的概念、类型进行阐述,然后介绍云计算的有关概念,最后在云计算这一知识背景下思考计算机网络犯罪的侦查取证。 相似文献
18.
Assessing the relationship between autistic traits and cyberdeviancy in a sample of college students
Kathryn C. Seigfried-Spellar Casey L. O'Quinn Kellin N. Treadway 《Behaviour & Information Technology》2015,34(5):533-542
Case studies suggest a relationship between Asperger syndrome (AS) and computer hacking. The current study examined whether characteristics associated with AS were significantly related to hacking, cyberbullying, identity theft, and virus writing. Two hundred and ninety-six university undergraduate students completed an Internet-based anonymous survey measuring self-reported computer deviant behaviour and characteristics associated with AS (autism-spectrum quotient; AQ). Of the 296 university students, 179 (60%) engaged in some form of computer deviant behaviour, but only 2 (0.01%) yielded clinically significant scores according to the AQ. Contrary to the authors' expectations, hackers did not score higher on the AQ compared to non-computer hackers. However, virus writers, identity thieves, and cyberbullies scored higher on the AQ compared to their computer non-deviant counterparts. In addition, individuals who engaged in hacking, identity theft, cyberbullying, and virus writing scored higher on the AQ and reported poorer social skills, poorer communication, and poorer imagination compared to all other individuals engaging in computer deviant behaviours. Considerations for future research and study limitations are discussed. 相似文献
19.
While technological innovations over the last thirty years have markedly improved the ways in which people communicate and gather information, these advances have also led to computer crimes and related deviance becoming permanent fixtures in our society. In an effort to curtail internet offending, it is important for academics and practitioners alike to better understand why some individuals engage in cybercriminality. Criminologists have utilized several theories to investigate this type of deviance, including low self-control theory. However, the vast majority of this prior research has focused on a narrow scope of offending, namely digital piracy. The current study utilizes a sample of 488 undergraduate students to evaluate the theory’s generality hypothesis by examining the extent to which low self-control predicts online deviance in general and beyond digital piracy more specifically. Study results support the generality hypothesis in that low self-control is related to non-digital piracy online deviance. Specific findings, policy implications, and directions for future research are discussed. 相似文献