检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:赵长江[1] 张硕 ZHAO Chang-jiang;ZHANG Shuo
机构地区:[1]重庆邮电大学
出 处:《四川警察学院学报》2019年第5期10-15,共6页Journal of Sichuan Police College
基 金:重庆市社科规划项目“云数据取证的法律规制研究”(2014YBFX103);重庆市教育委员会人文社会科学重点研究基地项目“云计算环境下电子数据保全法律规制研究”(17SKJ029);重庆市渝北区法学会项目“网络诈骗案件中电子数据运用研究”
摘 要:网络犯罪案件的侦查存在身份的复杂性、系统的依赖性、技术的对抗性等问题,破案重点在于查明“真实”的犯罪嫌疑人,其核心问题是网络身份和现实身份的同一认定。现已证实,在信息系统满足“合规”要求的条件下,可以将传统犯罪侦查中的洛卡德交换原理完美地适用于网络犯罪侦查。从网络工程学和社会工程学两个学科角度提出基于网络定位、网络账户信息、大数据挖掘和分析的身份同一性认定方法,即可有效地解决网络犯罪侦查中身份同一认定问题。这为侦查人员开展网络犯罪侦查活动提供了理论依据和指导方法。There are many problems in the investigation of cybercrime cases, such as the complexity of identity, the de. pendence of system, the confrontation of technology and so on. Identifying "real" criminal suspects is the key point in which core problem is how to confirm network identity and real identity are the same person. Under the condition that the informa. tion system satisfies the requirements of "compliance", it has been confirmed that the Locard’s exchange principle in tradi. tional crime investigation can be perfectly applied to cybercrime investigation. The method of confirming the same identity based on network location, network account information, big data mining and analysis from the perspectives of network engi. neering and social engineering can effectively solve the problems in cybercrime investigation, which provides a theoretical basis and guidance for investigators to carry out cybercrime investigation activities.
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:3.19.234.118