检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:桂梦美 邹依格 Gui Mengmei;Zou Yige(Northwest University of Political Science and Law,Xi'an 710063,Shanxi,China)
机构地区:[1]西北政法大学,陕西西安710063
出 处:《上海公安学院学报》2025年第1期22-33,74,共13页Journal of Shanghai Police College
摘 要:网络空间中的犯罪行为与其他传统犯罪行为相比具有更强的隐蔽性,这给侦查工作带来新的挑战。通过对隐蔽性证据信息概念的重新审视,并扩展实质内涵以期揭示其更广泛的应用潜力。隐蔽性证据信息在信息网络犯罪案件侦查过程中,通过整合侦查对象属性、协助穿透取证的方式,可以破解侦查中犯罪嫌疑人身份同一认定难、无法全链条打击犯罪的问题。隐蔽性证据信息运用过程中,存在虚假性、夸大信息价值、个人信息被泄露等风险,需要在侦查过程严格遵循侦查比例原则、保障讯问合法真实、引入大数据技术确保信息分析验证客观性等方面控制风险。Compared with other traditional offences,offences in cyberspace are more convert,which poses new challenges to the investigation.By reviewing the concept of covert evidentiary information,this paper extends its substantive connotation to reveal its wider application potentials.In the process of investigating cybercrime cases,convert evidentiary information can help solve the difficult problems of verifying criminal suspects'identities and the inability to combat crimes in a full-chain manner.It does this by integrating the attributes of investigation targets and assisting in the in-depth collection of evidence.However,in its application,there are risks such as faked and exaggerated information,and leakage of personal information.In the investigation process it is necessary to control these risks by strictly observing the principle of investigation proportionality,ensuring the legality and authenticity of interrogations,and introducing big data technology to guarantee the objectivity of information analysis and verification.
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.7