計算機相關(guān)犯罪的偵查問題研究
[Abstract]:The increasing popularity of computer and Internet technology makes it possible to share information instantaneously, and the coming of information society in an all-round way also breeds new hotbeds of crime. The law is tired of dealing with it. The controversy about the definition of such crimes has never stopped. The definition of related crimes and concepts has always been the focus of controversy, and the law enforcers in reality are increasingly feeling at a loss in the law. How to break through the encirclement in the face of various difficulties, so that criminals are punished and maintain the rank of the virtual society? It is a problem worthy of serious exploration to prevent such crimes from infringing upon the facts of real society at the same time.
In addition to the introduction and conclusion, the full text is divided into three parts.
The first part is an overview of computer related crimes.
Firstly, this paper defines this kind of crime from the historical point of view and the realistic development trend, and determines the conceptual basis of this article, i.e. the definition of computer-related crime, to discuss the whole article. Secondly, it introduces the characteristics and manifestations of computer-related crime to establish that the target of computer-related crime is number. The theory of word information, then, establishes an invariable coordinate among the complicated and changeable phenomena of computer-related crimes, and provides a favorable supporting factor for the investigation of computer-related crimes. It also provides another favorable theoretical support for the difficult investigation work in reality.
The second part is a systematic exposition of the investigative measures of computer related crimes. It is divided into four main points:
First of all, it discusses the investigation of computer-related crime scene. Although the investigation of such crimes requires high technology and it is difficult to obtain evidence, it is still an important step that can not be ignored. The fact proves that this is very effective. Traditional investigative measures such as on-site confirmation, on-site protection and investigation visits can get the clues of crime from different angles. Secondly, on the basis of on-site investigation, the criminal reconstruction of computer-related crimes is carried out. The path of similar crimes should be reasoned reasonably, such as how criminals invade or attack the target computer. In this way, correct conclusions can be drawn for the follow-up investigation and evidence can be obtained to prove the facts of the crime. Thirdly, this paper systematically discusses the evidence collection of computer-related crimes. The application of evidence and evidence rules of such crimes has its own characteristics. Although the current legislation in China has not established its legal status, it can not be ignored in practice the role of such evidence in the proof of criminal facts. After obtaining the evidence, it is necessary to analyze the evidence and establish a reasonable evidence chain to provide a basis for the capture of criminals. Fourthly, it elaborates the problems in the process of investigation. The first is the thorny problems that the investigative subject, namely, the public security organ, faces in the process of investigation. The second is the problems that the victim has to face in the process of implementing the investigative measures by the public security organ. These problems may also bring some obstacles to the investigation of the public security organ. The theory of crime prevention provides realistic basis.
The third part is the prevention of computer-related crimes and the study of anti-hacker intrusion countermeasures. First, on the basis of the second part of the investigation practice of such crimes, the use of criminological crime prevention theory to study the prevention of such crimes. However, as long as the relevant legal system is perfected, the awareness of security is established, and the remedial measures for technical and computer security management loopholes are perfected, at the same time, the public security organs as the main body of investigation are strengthened. At the same time, we should also pay attention to the reference of other countries for the prevention and management of such crimes. Secondly, we should study the countermeasures against hacker intrusion. First, any crime has criminal motive, so long as we find the criminal motive, it is conducive to the investigation of the case. Computer-related crimes are no exception. Any hacker's attack and intrusion has a certain criminal motive, or pure pleasure to stimulate the psychology, or technical challenges of rebellion, or a simple sense of justice, or the greed for commercial interests and so on, it can be seen that the real moral standards can not bind them. Second, hackers mostly have their own unique criminal tools, but the manifestations of various types of crime can still be categorized, where hacker intrusion and attack of technical means and tools of analysis focus on the second part of the forensic technology and tools are different, here more emphasis on It is not difficult to see the similarities between the hackers'intrusion and attack, which shows that the investigative tools in computer-related crimes can learn from the hacker's technology and tools under the premise of legal permission. Law enforcers are increasingly discovering the benefits of alliances with "experts," and it may be a good solution for "good" hackers to deal with "evil" hackers.
Through the in-depth discussion of the above three parts, the author hopes to be able to fully realize some problems of computer-related crime, and on this basis put forward some feasible ideas for the investigation of practical work to provide some reference.
【學(xué)位授予單位】:西南政法大學(xué)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2008
【分類號】:D918
【相似文獻(xiàn)】
相關(guān)期刊論文 前10條
1 李繪;;通緝制度史略考[J];犯罪研究;2011年03期
2 羅海暉;;試論強制性偵查措施的檢察監(jiān)督機制完善[J];上海公安高等?茖W(xué)校學(xué)報;2011年03期
3 任華哲;陳孟彬;;我國刑事偵查啟動模式之反思[J];武漢大學(xué)學(xué)報(哲學(xué)社會科學(xué)版);2011年05期
4 閆永黎;;經(jīng)濟(jì)犯罪刑事治理模式研究[J];吉林公安高等專科學(xué)校學(xué)報;2011年03期
5 楊洪平;陳啟明;;應(yīng)用視頻偵查措施的十大結(jié)合[J];中國刑事警察;2010年06期
6 程紅梅;;論我國刑事辨認(rèn)制度的缺陷與完善[J];公民與法(法學(xué)版);2011年05期
7 楊洪平;;以刀找人——巧用作案兇器偵破命案兩例[J];中國刑事警察;2010年03期
8 卞建林;李嬋媛;;2010年刑事訴訟法學(xué)研究綜述[J];人民檢察;2011年02期
9 ;兩種態(tài)度 不一樣的結(jié)果——齊齊哈爾市“1997·12·08”李明明、張志奎搶劫殺人案剖析[J];中國刑事警察;2010年03期
10 徐錦華;劉禾平;;現(xiàn)場血痕利用的探討[J];中國刑事警察;2010年03期
相關(guān)會議論文 前10條
1 謝財能;;強制性偵查措施檢察監(jiān)督機制的不足與完善[A];第五屆國家高級檢察官論壇論文集[C];2009年
2 李雙其;;虛假信息詐騙犯罪偵查[A];中國犯罪學(xué)學(xué)會第十七屆學(xué)術(shù)研討會論文集[C];2008年
3 李貴方;;擴大刑事強制措施和偵查措施中律師辯護(hù)權(quán)的思考[A];規(guī)劃·規(guī)范·規(guī)則——第六屆中國律師論壇優(yōu)秀論文集[C];2006年
4 余玲玉;;論毒品偵查中的線人邊緣性問題[A];犯罪學(xué)論叢(第七卷)[C];2009年
5 萬毅;;有組織犯罪及其對策研究[A];犯罪學(xué)論叢(第二卷)[C];2004年
6 劉黎明;;論和諧社會中的偵查制度[A];中國犯罪學(xué)研究會第十五屆學(xué)術(shù)研討會論文集(第一輯)[C];2006年
7 倪北海;;努力探索建立完善的刑事偵查邏輯學(xué)理論體系[A];第十四屆全國法律邏輯學(xué)術(shù)討論會論文集[C];2006年
8 李雙其;;論黑社會性質(zhì)組織犯罪偵查[A];中國犯罪學(xué)研究會第十五屆學(xué)術(shù)研討會論文集(第一輯)[C];2006年
9 萬毅;;有組織犯罪及其對策研究[A];中國犯罪學(xué)研究會第十二屆學(xué)術(shù)研討會論文集[C];2003年
10 劉靜坤;;論犯罪耗費理論與偵查效益[A];中國犯罪學(xué)研究會第十四屆學(xué)術(shù)研討會論文集(下冊)[C];2005年
相關(guān)重要報紙文章 前10條
1 本報記者 趙陽;跨國打拐偵查措施很難同時實施[N];法制日報;2011年
2 北京市朝陽區(qū)人民檢察院 謝財能;強制性偵查措施的概念應(yīng)予規(guī)范[N];檢察日報;2010年
3 河南省新密市人民檢察院 張永超;對涉及財產(chǎn)權(quán)偵查措施如何強化監(jiān)督[N];檢察日報;2011年
4 張洪德;27小時偵破建市以來最大綁架案[N];黑龍江日報;2009年
5 王斗斗;偵查措施不足亟需修法解決[N];法制日報;2007年
6 記者 高健 實習(xí)生 雙瑞;公安拖延返還扣押物當(dāng)事人可投訴[N];北京日報;2010年
7 楊燁 李珩;狠抓命案偵查措施落實[N];人民公安報;2004年
8 曲歌、江璽才;全市治安整治行動取得良好戰(zhàn)果[N];本溪日報;2009年
9 鮑國慶;三門實行“‘四偵聯(lián)動’+巡防”模式[N];人民公安報;2009年
10 本報記者 劉新暉 特約記者 應(yīng)春明 通訊員 劉洪生;提升百姓生活安全感[N];韶關(guān)日報;2010年
相關(guān)博士學(xué)位論文 前3條
1 王建明;職務(wù)犯罪偵查措施研究[D];中國政法大學(xué);2007年
2 王彬;論刑事搜查[D];四川大學(xué);2007年
3 李明;在犯罪控制與人權(quán)保障之間[D];四川大學(xué);2005年
相關(guān)碩士學(xué)位論文 前10條
1 楊蕾;計算機相關(guān)犯罪的偵查問題研究[D];西南政法大學(xué);2008年
2 廖覓;我國特殊偵查措施的規(guī)制與完善思考[D];華東政法大學(xué);2011年
3 楊迪;論職務(wù)犯罪特殊偵查措施的應(yīng)用現(xiàn)狀和完善[D];中國政法大學(xué);2011年
4 胡遠(yuǎn)陵;職務(wù)犯罪特殊偵查措施初探[D];湘潭大學(xué);2010年
5 王永;論職務(wù)犯罪特殊偵查措施的應(yīng)用規(guī)則[D];中國政法大學(xué);2010年
6 李莉;職務(wù)犯罪特殊偵查措施的適用與控制[D];華東政法大學(xué);2011年
7 張黎;監(jiān)聽制度研究[D];復(fù)旦大學(xué);2010年
8 施亞芬;刑事技術(shù)偵查措施論[D];中國政法大學(xué);2004年
9 劉卓;論監(jiān)聽的程序控制問題[D];內(nèi)蒙古大學(xué);2011年
10 孫維愈;計算機犯罪偵查問題研究[D];山西大學(xué);2007年
,本文編號:2204241
本文鏈接:http://sikaile.net/shekelunwen/gongan/2204241.html