我國網(wǎng)絡(luò)犯罪及防控體系研究
[Abstract]:With the continuous development of information technology and the wide application of computer network, it brings great convenience to social life, at the same time, it also brings great pressure to network security. How to ensure the smooth and safe of the information superhighway, how to curb the spread and the continuous deterioration of the network crime is the realistic challenge faced by the information society, and it has very realistic social significance to solve these problems well. This paper begins with the historical evolution of the concept of network crime, compares the concept of network crime with that of computer crime, and finally defines the concept of network crime. Starting from the basic concept of network crime, this paper analyzes the basic characteristics of network crime, that is, fictitious, hidden, intelligent, wide-area and diffusive, so as to deepen the understanding of cybercrime. By studying the present situation of our country's network crime, the development trend of our country's network crime is summarized. The most prominent change in each trend is that the trend of cybercrime is more obvious, the underground black industry chain and criminal organizations begin to take shape. Among all kinds of network security problems, the social harm of cybercrime is enormous, which poses a great threat to economic operation, social management and the personal and property safety of individual citizens, and the losses brought about are far greater than those of traditional crimes. From the current situation, the research on the field of cybercrime is far from enough, there is also a lack of effective means to control and solve this problem. It is necessary to deepen the understanding and research on the causes of network crime and the shortcomings of network crime in legislation, judicature, network security management and so on. Because the network crime has infiltrated into the government, finance, commercial trade, intermediary service and other social fields, it is difficult to achieve the ideal effect to deal with the network crime only from a single aspect, must be multi-pronged, comprehensive management. It is necessary to change from a single strategy of prevention and control of network crime to a multi-level and multi-directional network crime prevention and control system. Starting from the current situation of prevention and control of network crime at home and abroad, this paper analyzes and studies comprehensively from five aspects: legislative prevention and control, judicial prevention and control, management prevention and control, technical prevention and control, and social prevention and control, and puts forward the prevention and control system of network crime. This paper expounds the prevention and control mode of the network crime prevention and control system, and divides it into three stages, namely, the pre-crime prevention and control, the mid-crime prevention and the post-crime prevention and control. Legislation, justice, management, technology, society and other means of prevention and control in different stages of play different roles, these means can only coordinate with each other to achieve the best effect of curbing cybercrime. Finally, in view of the difficulties encountered in the fight against network crime, combined with five aspects of the network crime prevention and control system, the paper puts forward more detailed countermeasures respectively. Computer forensics is an important way to restrain the spread of network crime with judicial means. In order to determine the identity of the network subject, the viewpoint that the second generation ID card of our country can also become the "network pass" to prove the identity is a bold idea, which has certain feasibility and innovation.
【學(xué)位授予單位】:上海交通大學(xué)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2008
【分類號】:D917
【參考文獻(xiàn)】
相關(guān)期刊論文 前10條
1 文軍,艾湘濤;略論信息犯罪及其安全對策[J];長沙電力學(xué)院學(xué)報(社會科學(xué)版);1998年01期
2 鄭麗萍;跨國性網(wǎng)絡(luò)犯罪行為及其立法[J];當(dāng)代法學(xué);2005年02期
3 沈木珠;論電子證據(jù)問題[J];法學(xué)雜志;2001年04期
4 畢惜茜;姜平;;美國計算機(jī)犯罪的刑事立法述評[J];法學(xué)家;1993年01期
5 周文;歐洲委員會控制網(wǎng)絡(luò)犯罪公約與國際刑法的新發(fā)展[J];法學(xué)評論;2002年03期
6 景釗;我國計算機(jī)網(wǎng)絡(luò)犯罪與犯罪心理淺析[J];公安大學(xué)學(xué)報;2000年01期
7 陳開琦;論計算機(jī)犯罪主體[J];貴州大學(xué)學(xué)報(社會科學(xué)版);1997年02期
8 朱運(yùn)喜;黑客工具箱大觀[J];電腦知識與技術(shù);2000年S3期
9 沈木珠;論電子證據(jù)的法律效力[J];河北法學(xué);2002年02期
10 田青,陶秋紅;網(wǎng)絡(luò)安全中的入侵檢測技術(shù)[J];河北職業(yè)技術(shù)學(xué)院學(xué)報;2005年02期
相關(guān)博士學(xué)位論文 前1條
1 卓翔;網(wǎng)絡(luò)犯罪若干問題研究[D];中國政法大學(xué);2004年
相關(guān)碩士學(xué)位論文 前5條
1 吳戈;網(wǎng)絡(luò)犯罪問題研究[D];四川大學(xué);2002年
2 付華;網(wǎng)絡(luò)犯罪研究[D];西南政法大學(xué);2003年
3 叢艷華;網(wǎng)絡(luò)犯罪研究[D];哈爾濱工程大學(xué);2003年
4 李R,
本文編號:2399603
本文鏈接:http://sikaile.net/shekelunwen/gongan/2399603.html