在线客服
网络犯罪学图书
人气:40

网络犯罪学

正版图书,品质保障^_^如需清单下单时请备注,下单即有精美书签赠送!
  • 所属分类:图书 >法律>网络法律法规  
  • 作者:[李兴安]、[董淑君]
  • 产品参数:
  • 丛书名:--
  • 国际刊号:9787562072560
  • 出版社:中国政法大学出版社
  • 出版时间:2017-10
  • 印刷时间:2017-10-01
  • 版次:1
  • 开本:16开
  • 页数:200
  • 纸张:胶版纸
  • 包装:平装-胶订
  • 套装:

内容简介

本书探讨了信息技术发展对于传统社会控制机制树立的挑战,提出一个广义的定义方法,认定了网络犯罪的特点及其对于侦查概率和威慑效果的负面影响。鉴于现行有关网络犯罪的法律框架在打击网络犯罪中其效甚微,本书主张,为使信息社会得到保护,法律威慑取得实效,国家之间、传统空间与网络空间之间的法律与管辖的鸿沟必须去除,才能追究犯罪主体的刑事责任。

编辑推荐

本店所有图书均为正版 请放心购买,有任何问题请联系在线客户或致电,谢谢

作者简介

李兴安,旅欧华人学者。芬兰图尔库大学法学博士,坦佩雷大学计算机科学博士。现任芬兰国际信息社会研究所(三樱智库)首席科学家,爱沙尼亚塔林大学副教授,北京航空航天大学工业与信息化法治研究院特邀高级研究员,重点实验室学术委员会委员。著有《网络犯罪导论》、《网络犯罪与威慑:构建网络化信息社会的法律网络》、《数据挖掘方法在犯罪研究中的应用》、《二十一世纪的网络犯罪与网络安全》、《网络安全词典》等。在国际学术刊物四十余篇。

董淑君,刑法学博士,中国政法大学副教授,硕士研究生导师,曾兼任北京市密云区人民检察院副检察长,曾任北京市华联律师事务所执业律师。主要代表论著有:《刑法的要义》、《刑法概论》、《刑事错判研究》等。

目录

PREFACE

LIST OF FIGURES

LIST OF TABLES

TABLE OF CASES

ABBREVIATIONS

CHAPTER 1INTRODUCTION

11Social context of cybersecurity and cybercrime

12Structure of this book

CHAPTER 2DECIPHERING THE PHENOMENONOF CYBERCRIME

21Introduction

22Development of definition of computer crime

23Analysis of the previous shortcomings in defining

cybercrime

24How to define cybercrime?

25Reading of the "cyber" label of criminal phenomenon

26The necessity of a broad definition of cybercrime

27A definition based on roles of information systems

CHAPTER 3CLASSIFICATION OF CYBERCRIME

31What roles can information systems play in cybercrime?

32Comparison with other conceptions

33Conclusion

CHAPTER 4SUBJECTS AND SUBJECTIVEASPECTS OF CYBERCRIME

41Introduction

42Whats special with cybercriminals?

43The perceived context of the perpetrators

44Forms of organization

45Age and cybercrime

46Psychological features of cybercrime

47What motivates a cybercrime?

48Conclusion

CHAPTER 5RECOGNIZING CRITICAL FACTORSIN COMBATING CYBERCRIME

51Introduction

52Victimization in cybercrime

53Time in cybercrime

54Space in cybercrime

55The technological nature

56The complexity of cybercrime

57The costs of cybercrime

58The anonymity of the perpetrators

59Hidden victims

510The concealment of cybercrime traces

511The transterritoriality of cybercrime coverage

512The rampancy of cybercriminal phenomena

513Rentseeking from the exaggeration of insecurity

514Conclusions

CHAPTER 6THE HISTORICAL DEVELOPMENT OFCYBERCRIME AND DETERRENCE

61Basic observations on the development of criminalphenomena

62Computer hackers discovery of a lawless new frontier

63The rise of the law against the increasing number ofcybercrimes

64A legal system wrestling with networked adversaries

65The equilibrium between cybercrime and deterrence

66Conclusion

CHAPTER 7LIABILITY FOR CYBERCRIME

71Introduction

72Criminal liability, civil liability and administrative liability

73Individual liability and corporate liability

74Liability based on law and liability based on contract

75Intentional liability, negligent liability and reckless liability

76Direct liability and indirect liability

77Trespassers liability, third parties liability, and victimsliability

78Domestic liability, transnational liability, and internationalliability

79Offensive liability and defensive liability

710Punitive liability, exemplary liability and compensatoryliability

711Conclusion

CHAPTER 8CYBERJURISDICTION

81Introduction

82The legal basis for cybercriminal jurisdiction

83"Separate" or "international" jurisdiction?

84The specific space — the determination of the location ofconduct

85The specific player — the determination of the location of theperson

86Liabilitybased cybercriminal jurisdiction

87Critical factors in cybercriminal jurisdiction

88Conclusion

CHAPTER 9INTERNATIONAL ACTIONSAGAINST CRIMINALITY

91Introduction

92From domestic legislation to international harmonization

93Professional efforts of the International Criminal PoliceOrganization (Interpol

94Regional efforts

95Multinational efforts

96Global efforts by the United Nations (UN

97The focuses of international harmonization

98From conversation to the European Convention

99Limited progress in international harmonization

910Conclusion

CHAPTER 10CONCLUSIONS

101Dilemmas of cybercrime control

102The primary factors benefiting cybercrime

103The primary factors preventing cybercrime

REFERENCES

网友评论(不代表本站观点)

免责声明

更多出版社