Please wait a minute...
 
主管单位:广东省科学技术厅
主办单位:广东省科技合作研究促进中心
编辑出版:《电脑与电信》编辑部
ISSN 1008-6609 CN 44-1606/TN
邮发代号:46-95
国内发行:广东省报刊发行局
《电脑与电信》唯一官方网站。
电脑与电信  2022, Vol. 1 Issue (1-2): 36-39    DOI: 10.15966/j.cnki.dnydx.2022.z1.003
  基金项目 本期目录 | 过刊浏览 | 高级检索 |
从侦查取证角度看网络空间的治理问题及对策
甘肃政法大学 网络空间安全学院
The Governance Problems and Countermeasures of Network Space
from the Angle of Investigation and Evidence Collection
Gansu University of Political Science and Law
全文: PDF(0 KB)  
输出: BibTeX | EndNote (RIS)      
摘要 
网络飞速发展的今天,网络空间已成为我国第五大主权空间。人们的日常生活也逐渐离不开网络,但是由于技
术上和认知上的不成熟,让很多犯罪分子有了可乘之机。分析了网络犯罪技术性、智能性、隐蔽性等新特征,这给侦查取证带
来了诸多难点。侦查取证与网络空间治理间的联系,以及日益严重的网络犯罪对网络空间治理构成了的重大挑战。针对这些
挑战,从侦查取证的角度提出了完善审查规则,提升证据效力,加大对平台监管力度等网络空间治理对策,为依法治网提供新
的路径。

服务
把本文推荐给朋友
加入引用管理器
E-mail Alert
RSS
作者相关文章
关键词     
Abstract
With the rapid development of network, cyberspace has become the fifth largest sovereign space in China. People's daily
life is gradually inseparable from the Internet. Due to the immaturity of technology and cognition, many crimes have occurred. This paper analyzes the new characteristics of cybercrime, such as technology, intelligence and concealment, which bring many difficulties to investigation and evidence collection. The relationship between investigation and evidence collection and cyberspace governance, as well as the increasingly serious cybercrimes, pose a major challenge to cyberspace governance. In view of these challenges, this paper proposes to improve the review rules and enhance the effectiveness of evidence from the perspective of investigation and evidence collection; strengthen the supervision of the platform and other further cyberspace governance countermeasures to provide a new path for governing the network according to law.

Key words
年卷期日期: 2022-02-10      出版日期: 2022-01-31
基金资助:
人工智能及区块链技术的安全态势感知,项目编号:2020C-29。
作者简介: 何珍祥(1967—),男,甘肃人,工学学位,教授,研究方向为网络空间治理、网络安全。
引用本文:   
何珍祥 王丽莹.
从侦查取证角度看网络空间的治理问题及对策
[J]. 电脑与电信, 2022, 1(1-2): 36-39.
HE Zhen-xiang WANG Li-ying.
The Governance Problems and Countermeasures of Network Space
from the Angle of Investigation and Evidence Collection
. Computer & Telecommunication, 2022, 1(1-2): 36-39.
链接本文:  
http://www.computertelecom.com.cn/CN/10.15966/j.cnki.dnydx.2022.z1.003  或          http://www.computertelecom.com.cn/CN/Y2022/V1/I1-2/36
No related articles found!
[1] . [J]. , 2008, 1(8): 20 -21 .
[2] . [J]. , 2008, 1(8): 24 -26 .
[3] . [J]. , 2008, 1(8): 22 -23 .
[4] . [J]. , 2008, 1(8): 27 -28 .
[5] . [J]. , 2008, 1(8): 33 -35 .
[6] . [J]. , 2008, 1(8): 36 -38 .
[7] . [J]. , 2008, 1(8): 39 -40 .
[8] . [J]. , 2008, 1(8): 41 -43 .
[9] Zhang Yiyi. Protection Mechanisms of WDM Ring Networks[J]. , 2009, 1(4): 32 -33 .
[10] . [J]. , 2008, 1(8): 46 -48 .
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
  Copyright © 电脑与电信 All Rights Reserved.
地址:广州市连新路171号广东国际科技中心 邮编:510033
本系统由北京玛格泰克科技发展有限公司设计开发 技术支持:support@magtech.com.cn
粤ICP备05080322号-4