网站首页 软件下载 游戏下载 翻译软件 电子书下载 电影下载 电视剧下载 教程攻略
书名 | 网络犯罪学 |
分类 | 人文社科-法律-法学理论 |
作者 | 李兴安,董淑君 |
出版社 | 中国政法大学出版社 |
下载 | ![]() |
简介 | 内容推荐 网络犯罪是伴随网络的产生而出现的一种新型犯罪。近些年随着网络技术的迅猛发展,网络犯罪的发展态势日益严重。本书介绍了网络犯罪的历史,分析了网络犯罪的成因、定义、特征和分类,并探讨了网络犯罪难以应对的原因,进而提出了防治网络犯罪的有效对策。 作者简介 李兴安,旅欧华人学者。芬兰图尔库大学法学博士,坦佩雷大学计算机科学博士。现任芬兰靠前信息社会研究所(三樱智库)首席科学家,爱沙尼亚塔林大学副教授,北京航空航天大学工业与信息化法治研究院特邀不错研究员,重点实验室学术委员会委员。著有《网络犯罪导论》、《网络犯罪与威慑:构建网络化信息社会的法律网络》、《数据挖掘方法在犯罪研究中的应用》、《二十一世纪的网络犯罪与网络安全》、《网络安全词典》等。在靠前学术刊物发表论文四十余篇。 董淑君,刑法学博士,中国政法大学副教授,硕士研究生导师,曾兼任北京市密云区人民检察院副检察长,曾任北京市华联律师事务所执业律师。主要代表论著有:《刑法的要义》、《刑法概论》、《刑事错判研究》等。 目录 前言 PREFACE LIST OF FIGURES LIST OF TABLES TABLE OF CASES ABBREVIATIONS CHAPTER1 INTRODUCTION 1.1So context of cybersecurity and cybercrime 1.2Structure of this book CHAPTER2 DECIPHERING THE PHENOMENONOF CYBERCRIME 2.1Introduction 2.2Development of definition of computer crime 2.3Analysis of the previous shortcomings in defining cybercrime 2.4How to define cybercrime? 2.5Reading of the “cyber” label of criminal phenomenon 2.6The necessity of a broad definition of cybercrime 2.7A definition based on roles of information systems CHAPTER3 CLASSIFICATION OF CYBERCRIME 3.1What roles can information systems play in cybercrime? 3.2Comparison with other conceptions 3.3Conclusion CHAPTER4 SUBJECTS AND SUBJECTIVE ASPECTS OF CYBERCRIME 4.1Introduction 4.2Whats spe with cybercriminals? 4.3The perceived context of the perpetrators 4.4Forms of organization 4.5Age and cybercrime 4.6Psychological features of cybercrime 4.7What motivates a cybercrime? 4.8Conclusion CHAPTER5 RECOGNIZING CRITICAL FACTORS IN COMBATING CYBERCRIME 5.1Introduction 5.2Victimization in cybercrime 5.3Time in cybercrime 5.4Space in cybercrime 5.5The technological nature 5.6The complexity of cybercrime 5.7The costs of cybercrime 5.8The anonymity of the perpetrators 5.9Hidden victims 5.10The concealment of cybercrime traces 5.11The transterritoriality of cybercrime coverage 5.12The rampancy of cybercriminal phenomena 5.13Rentseeking from the exaggeration of insecurity 5.14Conclusions CHAPTER6 THE HISTORICAL DEVELOPMENT OF CYBERCRIME AND DETERRENCE 6.1Basic observations on the development of criminal phenomena 6.2Computer hackers discovery of a lawless new frontier 6.3The rise of the law against the increasing number of cybercrimes 6.4A legal system wrestling with networked adversaries 6.5The equilibrium between cybercrime and deterrence 6.6Conclusion CHAPTER7 LIABILITY FOR CYBERCRIME 7.1Introduction 7.2Criminal liability, civil liability and administrative liability 7.3Individual liability and corporate liability 7.4Liability based on law and liability based on contract 7.5Intentional liability, negligent liability and reckless liability 7.6Direct liability and indirect liability 7.7Trespassers liability, third parties liability, and victims liability 7.8Domestic liability, transnational liability,and international liability 7.9Offensive liability and defensive liability 7.10Punitive liability, exemplary liability and compensatory liability 7.11Conclusion CHAPTER8 CYBERJURISDICTION 8.1Introduction 8.2The legal basis for cybercriminal jurisdiction 8.3“Separate” or “international” jurisdiction? 8.4The specific space — the determination of the location of conduct 8.5The specific player — the determination of the location of the person 8.6Liabilitybased cybercriminal jurisdiction 8.7Critical factors in cybercriminal jurisdiction 8.8Conclusion CHAPTER9 INTERNATIONAL ACTIONS AGAINST CRIMINALITY 9.1Introduction 9.2From domestic legislation to international harmonization 9.3Professional efforts of the International Criminal Police Organization (Interpol) 9.4Regional efforts 9.5Multinational efforts 9.6Global efforts by the United Nations (UN) 9.7The focuses of international harmonization 9.8From conversation to the European Convention 9.9Limited progress in international harmonization 9.10Conclusion CHAPTER10 CONCLUSIONS 10.1Dilemmas of cybercrime control 10.2The primary factors benefiting cybercrime 10.3The primary factors preventing cybercrime REFERENCES |
随便看 |
|
霍普软件下载网电子书栏目提供海量电子书在线免费阅读及下载。