计算机相关犯罪的侦查问题研究
[Abstract]:The increasing popularity of computer and Internet technology makes it possible to share information instantaneously, and the coming of information society in an all-round way also breeds new hotbeds of crime. The law is tired of dealing with it. The controversy about the definition of such crimes has never stopped. The definition of related crimes and concepts has always been the focus of controversy, and the law enforcers in reality are increasingly feeling at a loss in the law. How to break through the encirclement in the face of various difficulties, so that criminals are punished and maintain the rank of the virtual society? It is a problem worthy of serious exploration to prevent such crimes from infringing upon the facts of real society at the same time.
In addition to the introduction and conclusion, the full text is divided into three parts.
The first part is an overview of computer related crimes.
Firstly, this paper defines this kind of crime from the historical point of view and the realistic development trend, and determines the conceptual basis of this article, i.e. the definition of computer-related crime, to discuss the whole article. Secondly, it introduces the characteristics and manifestations of computer-related crime to establish that the target of computer-related crime is number. The theory of word information, then, establishes an invariable coordinate among the complicated and changeable phenomena of computer-related crimes, and provides a favorable supporting factor for the investigation of computer-related crimes. It also provides another favorable theoretical support for the difficult investigation work in reality.
The second part is a systematic exposition of the investigative measures of computer related crimes. It is divided into four main points:
First of all, it discusses the investigation of computer-related crime scene. Although the investigation of such crimes requires high technology and it is difficult to obtain evidence, it is still an important step that can not be ignored. The fact proves that this is very effective. Traditional investigative measures such as on-site confirmation, on-site protection and investigation visits can get the clues of crime from different angles. Secondly, on the basis of on-site investigation, the criminal reconstruction of computer-related crimes is carried out. The path of similar crimes should be reasoned reasonably, such as how criminals invade or attack the target computer. In this way, correct conclusions can be drawn for the follow-up investigation and evidence can be obtained to prove the facts of the crime. Thirdly, this paper systematically discusses the evidence collection of computer-related crimes. The application of evidence and evidence rules of such crimes has its own characteristics. Although the current legislation in China has not established its legal status, it can not be ignored in practice the role of such evidence in the proof of criminal facts. After obtaining the evidence, it is necessary to analyze the evidence and establish a reasonable evidence chain to provide a basis for the capture of criminals. Fourthly, it elaborates the problems in the process of investigation. The first is the thorny problems that the investigative subject, namely, the public security organ, faces in the process of investigation. The second is the problems that the victim has to face in the process of implementing the investigative measures by the public security organ. These problems may also bring some obstacles to the investigation of the public security organ. The theory of crime prevention provides realistic basis.
The third part is the prevention of computer-related crimes and the study of anti-hacker intrusion countermeasures. First, on the basis of the second part of the investigation practice of such crimes, the use of criminological crime prevention theory to study the prevention of such crimes. However, as long as the relevant legal system is perfected, the awareness of security is established, and the remedial measures for technical and computer security management loopholes are perfected, at the same time, the public security organs as the main body of investigation are strengthened. At the same time, we should also pay attention to the reference of other countries for the prevention and management of such crimes. Secondly, we should study the countermeasures against hacker intrusion. First, any crime has criminal motive, so long as we find the criminal motive, it is conducive to the investigation of the case. Computer-related crimes are no exception. Any hacker's attack and intrusion has a certain criminal motive, or pure pleasure to stimulate the psychology, or technical challenges of rebellion, or a simple sense of justice, or the greed for commercial interests and so on, it can be seen that the real moral standards can not bind them. Second, hackers mostly have their own unique criminal tools, but the manifestations of various types of crime can still be categorized, where hacker intrusion and attack of technical means and tools of analysis focus on the second part of the forensic technology and tools are different, here more emphasis on It is not difficult to see the similarities between the hackers'intrusion and attack, which shows that the investigative tools in computer-related crimes can learn from the hacker's technology and tools under the premise of legal permission. Law enforcers are increasingly discovering the benefits of alliances with "experts," and it may be a good solution for "good" hackers to deal with "evil" hackers.
Through the in-depth discussion of the above three parts, the author hopes to be able to fully realize some problems of computer-related crime, and on this basis put forward some feasible ideas for the investigation of practical work to provide some reference.
【学位授予单位】:西南政法大学
【学位级别】:硕士
【学位授予年份】:2008
【分类号】:D918
【相似文献】
相关期刊论文 前10条
1 李绘;;通缉制度史略考[J];犯罪研究;2011年03期
2 罗海晖;;试论强制性侦查措施的检察监督机制完善[J];上海公安高等专科学校学报;2011年03期
3 任华哲;陈孟彬;;我国刑事侦查启动模式之反思[J];武汉大学学报(哲学社会科学版);2011年05期
4 闫永黎;;经济犯罪刑事治理模式研究[J];吉林公安高等专科学校学报;2011年03期
5 杨洪平;陈启明;;应用视频侦查措施的十大结合[J];中国刑事警察;2010年06期
6 程红梅;;论我国刑事辨认制度的缺陷与完善[J];公民与法(法学版);2011年05期
7 杨洪平;;以刀找人——巧用作案凶器侦破命案两例[J];中国刑事警察;2010年03期
8 卞建林;李婵媛;;2010年刑事诉讼法学研究综述[J];人民检察;2011年02期
9 ;两种态度 不一样的结果——齐齐哈尔市“1997·12·08”李明明、张志奎抢劫杀人案剖析[J];中国刑事警察;2010年03期
10 徐锦华;刘禾平;;现场血痕利用的探讨[J];中国刑事警察;2010年03期
相关会议论文 前10条
1 谢财能;;强制性侦查措施检察监督机制的不足与完善[A];第五届国家高级检察官论坛论文集[C];2009年
2 李双其;;虚假信息诈骗犯罪侦查[A];中国犯罪学学会第十七届学术研讨会论文集[C];2008年
3 李贵方;;扩大刑事强制措施和侦查措施中律师辩护权的思考[A];规划·规范·规则——第六届中国律师论坛优秀论文集[C];2006年
4 余玲玉;;论毒品侦查中的线人边缘性问题[A];犯罪学论丛(第七卷)[C];2009年
5 万毅;;有组织犯罪及其对策研究[A];犯罪学论丛(第二卷)[C];2004年
6 刘黎明;;论和谐社会中的侦查制度[A];中国犯罪学研究会第十五届学术研讨会论文集(第一辑)[C];2006年
7 倪北海;;努力探索建立完善的刑事侦查逻辑学理论体系[A];第十四届全国法律逻辑学术讨论会论文集[C];2006年
8 李双其;;论黑社会性质组织犯罪侦查[A];中国犯罪学研究会第十五届学术研讨会论文集(第一辑)[C];2006年
9 万毅;;有组织犯罪及其对策研究[A];中国犯罪学研究会第十二届学术研讨会论文集[C];2003年
10 刘静坤;;论犯罪耗费理论与侦查效益[A];中国犯罪学研究会第十四届学术研讨会论文集(下册)[C];2005年
相关重要报纸文章 前10条
1 本报记者 赵阳;跨国打拐侦查措施很难同时实施[N];法制日报;2011年
2 北京市朝阳区人民检察院 谢财能;强制性侦查措施的概念应予规范[N];检察日报;2010年
3 河南省新密市人民检察院 张永超;对涉及财产权侦查措施如何强化监督[N];检察日报;2011年
4 张洪德;27小时侦破建市以来最大绑架案[N];黑龙江日报;2009年
5 王斗斗;侦查措施不足亟需修法解决[N];法制日报;2007年
6 记者 高健 实习生 双瑞;公安拖延返还扣押物当事人可投诉[N];北京日报;2010年
7 杨烨 李珩;狠抓命案侦查措施落实[N];人民公安报;2004年
8 曲歌、江玺才;全市治安整治行动取得良好战果[N];本溪日报;2009年
9 鲍国庆;三门实行“‘四侦联动’+巡防”模式[N];人民公安报;2009年
10 本报记者 刘新晖 特约记者 应春明 通讯员 刘洪生;提升百姓生活安全感[N];韶关日报;2010年
相关博士学位论文 前3条
1 王建明;职务犯罪侦查措施研究[D];中国政法大学;2007年
2 王彬;论刑事搜查[D];四川大学;2007年
3 李明;在犯罪控制与人权保障之间[D];四川大学;2005年
相关硕士学位论文 前10条
1 杨蕾;计算机相关犯罪的侦查问题研究[D];西南政法大学;2008年
2 廖觅;我国特殊侦查措施的规制与完善思考[D];华东政法大学;2011年
3 杨迪;论职务犯罪特殊侦查措施的应用现状和完善[D];中国政法大学;2011年
4 胡远陵;职务犯罪特殊侦查措施初探[D];湘潭大学;2010年
5 王永;论职务犯罪特殊侦查措施的应用规则[D];中国政法大学;2010年
6 李莉;职务犯罪特殊侦查措施的适用与控制[D];华东政法大学;2011年
7 张黎;监听制度研究[D];复旦大学;2010年
8 施亚芬;刑事技术侦查措施论[D];中国政法大学;2004年
9 刘卓;论监听的程序控制问题[D];内蒙古大学;2011年
10 孙维愈;计算机犯罪侦查问题研究[D];山西大学;2007年
,本文编号:2204241
本文链接:https://www.wllwen.com/shekelunwen/gongan/2204241.html