搜索
高级检索
高级搜索
书       名 :
著       者 :
出  版  社 :
I  S  B  N:
出版时间 :
网络犯罪学(英文版)
0.00     定价 ¥ 59.00
宁波大学园区图书馆
此书还可采购5本,持证读者免费借回家
  • ISBN:
    9787562072560
  • 作      者:
    作者:李兴安//董淑君
  • 出 版 社 :
    中国政法大学出版社
  • 出版日期:
    2017-09-01
收藏
内容介绍

本书探讨了信息技术发展对于传统社会控制机制树立的挑战,提出一个广义的定义方法,认定了网络犯罪的特点及其对于侦查概率和威慑效果的负面影响。鉴于现行有关网络犯罪的法律框架在打击网络犯罪中其效甚微,本书主张,为使信息社会得到保护,法律威慑取得实效,国家之间、传统空间与网络空间之间的法律与管辖的鸿沟必须去除,才能追究犯罪主体的刑事责任。

展开
目录
前言
PREFACE
LIST OF FIGURES
LIST OF TABLES
TABLE OF CASES
ABBREVIATIONS
CHAPTER 1 INTRODUCTION
1.1 Social context of cybersecurity and cybercrime
1.2 Structure of this book
CHAPTER 2 DECIPHERING THE PHENOMENON OF CYBERCRIME
2.1 Introduction
2.2 Development of definition of computer crime
2.3 Analysis of the previous shortcomings in defining cybercrime
2.4 How to define cybercrime?
2.5 Reading of the "cyber" label of criminal phenomenon
2.6 The necessity of a broad definition of cybercrime
2.7 A definition based on roles of information systems
CHAPTER 3 CLASSIFICATION OF CYBERCRIME
3.1 What roles can information systems play in cybercrime?
3.2 Comparison with other conceptions
3.3 Conclusion
CHAPTER 4 SUBJECTS AND SUBJECTIVE ASPECTS OF CYBERCRIME
4.1 Introduction
4.2 What's special with cybercriminals?
4.3 The perceived context of the perpetrators
4.4 Forms of organization
4.5 Age and cybercrime
4.6 Psychological features of cybercrime
4.7 What motivates a cybercrime?
4.8 Conclusion
CHAPTER 5 RECOGNIZING CRITICAL FACTORS IN COMBATING CYBERCRIME
5.1 Introduction
5.2 Victimization in cybercrime
5.3 Time in cybercrime
5.4 Space in cybercrime
5.5 The technological nature
5.6 The complexity of cybercrime
5.7 The costs of cybercrime
5.8 The anonymity of the perpetrators
5.9 Hidden victims
5.10 The concealment of cybercrime traces
5.11 The trans-territoriality of cybercrime coverage
5.12 The rampancy of cybercriminal phenomena
5.13 Rent-seeking from the exaggeration of insecurity
5.14 Conclusions
CHAPTER 6 THE HISTORICAL DEVELOPMENT OF CYBERCRIME AND DETERRENCE
6.1 Basic observations on the development of criminal phenomena
6.2 Computer hackers' discovery of a lawless new frontier
6.3 The rise of the law against the increasing number of cybercrimes
6.4 A legal system wrestling with networked adversaries
6.5 The equilibrium between cybercrime and deterrence
6.6 Conclusion
CHAPTER 7 LIABILITY FOR CYBERCRIME
7.1 Introduction
7.2 Criminal liability, civil liability and administrative liability
7.3 Individual liability and corporate liability
7.4 Liability based on law and liability based on contract
7.5 Intentional liability, negligent liability and reckless liability
7.6 Direct liability and indirect liability
7.7 Trespasser's liability, third parties' liability, and victim's liability
7.8 Domestic liability, trans-national liability, and international liability
7.9 Offensive liability and defensive liability
7.10 Punitive liability, exemplary liability and compensatory liability
7.11 Conclusion
CHAPTER 8 CYBERJURISDICTION
8.1 Introduction
8.2 The legal basis for cybercriminal jurisdiction
8.3 "Separate" or "international" jurisdiction?
8.4 The specific space -- the determination of the location of conduct
8.5 The specific player -- the determination of the location of the person
8.6 Liability-based cybercriminal jurisdiction
8.7 Critical factors in cybercriminal jurisdiction
8.8 Conclusion
CHAPTER 9 INTERNATIONAL ACTIONS AGAINST CRIMINALITY
9.1 Introduction
9.2 From domestic legislation to international harmonization
9.3 Professional efforts of the International Criminal Police Organization (Interpol)
9.4 Regional efforts
9.5 Multi-national efforts
9.6 Global efforts by the United Nations (UN)
9.7 The focuses of international harmonization
9.8 From conversation to the European Convention
9.9 Limited progress in international harmonization
9.10 Conclusion
CHAPTER 10 CONCLUSIONS
10.1 Dilemmas of cybercrime control
10.2 The primary factors benefiting cybercrime
10.3 The primary factors preventing cybercrime
REFERENCES
展开
加入书架成功!
收藏图书成功!
我知道了(3)
发表书评
读者登录

温馨提示:请使用宁波大学园区图书馆的读者帐号和密码进行登录

点击获取验证码
登录